🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

ethics-in-information-technology-6th-edition_compress.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Document Details

2019

Tags

ethics information technology computer ethics

Full Transcript

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 ETHICS IN INFORMATION TECHNOLOGY...

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 ETHICS IN INFORMATION TECHNOLOGY Sixth Edition Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. ETHICS IN INFORMATION TECHNOLOGY Sixth Edition George W. Reynolds Australia Brazil Mexico Singapore United Kingdom United States Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Ethics in Information Technology, © 2019 Cengage Learning, Inc. Sixth Edition ALL RIGHTS RESERVED. No part of this work covered by the George W. Reynolds copyright herein may be reproduced or distributed in any form or by SVP, GM Science, Technology & any means, except as permitted by U.S. copyright law, without the Math: Balraj S. Kalsi prior written permission of the copyright owner. Senior Product Director: Kathleen McMahon SOURCE FOR ILLUSTRATIONS: © Cengage Learning, Inc. Product Team Manager: Kristin McNary All screenshots, unless otherwise noted, are used with permission Associate Product Manager: Kate Mason from Microsoft Corporation. Microsoft® is a registered trademark of Senior Director, Development: Julia Caballero the Microsoft Corporation. Senior Content Development Manager: For product information and technology assistance, contact us at Leigh Hefferon Cengage Customer & Sales Support, 1-800-354-9706. Associate Content Developer: Maria Garguilo For permission to use material from this text or product, submit all Product Assistant: Jake Toth requests online at www.cengage.com/permissions. VP, Marketing for Science, Technology, & Further permissions questions can be e-mailed to Math: Jason Sakos [email protected]. Marketing Director: Michele McTighe Some of the product names and company names used in this Marketing Manager: Stephanie Albracht book have been used for identification purposes only and Production Director: Patty Stephan may be trademarks or registered trademarks of their respective manufacturers and sellers. Content Project Manager: Michele Stulga Art Director: Diana Graham Library of Congress Control Number: 2017950121 Cover Designer: Roycroft Design ISBN: 978-1-337-40587-4 (roycroftdesign.com) Cengage Cover Image: iStock.com/sumkinn 20 Channel Street Boston, MA 02210 USA Microsoft and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Cengage is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. iPhone, iPad, and iPod are registered trademarks of Apple Inc. Cengage reserves the right to revise this publication and make changes from time to time in its content without notice. Cengage is a leading provider of customized learning solutions with employees residing in nearly 40 different countries and sales in more than 125 countries around the world. Find your local representative at www.cengage.com. Cengage products are represented in Canada by Nelson Education, Ltd. To learn more about Cengage, visit www.cengage.com Purchase any of our products at your local college store or at our preferred online store: www.cengagebrain.com Notice to the Reader Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain and include information other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following the instructions contained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes no representations or warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher takes no responsibility with respect to such material. The publisher shall not be liable for any special, consequential, or exemplary damages resulting, in whole or part, from the readers’ use of, or reliance upon, this material. Printed in the United States of America Print Number: 01 Print Year: 2017 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. BRIEF CONTENTS Preface xiii Chapter 1 An Overview of Ethics 1 Chapter 2 Ethics for IT Workers and IT Users 43 Chapter 3 Cyberattacks and Cybersecurity 83 Chapter 4 Privacy 133 Chapter 5 Freedom of Expression 185 Chapter 6 Intellectual Property 221 Chapter 7 Ethical Decisions in Software Development 263 Chapter 8 The Impact of Information Technology on Society 299 Chapter 9 Social Media 329 Chapter 10 Ethics of IT Organizations 357 Appendix A A Brief Introduction to Morality 397 Glossary 413 Index 427 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. TABLE OF CONTENTS Preface xiii Chapter 1 An Overview of Ethics 1 Organizations Behaving Badly 1 What Is Ethics? 3 The Importance of Integrity 5 The Difference Between Morals, Ethics, and Laws 5 Ethics in the Business World 7 Corporate Social Responsibility 10 Why Fostering Corporate Social Responsibility and Good Business Ethics Is Important? 13 Gaining the Goodwill of the Community 13 Creating an Organization That Operates Consistently 14 Fostering Good Business Practices 15 Protecting the Organization and Its Employees from Legal Action 15 Avoiding Unfavorable Publicity 16 How Organizations Can Improve Their Ethics 17 Appoint a Corporate Ethics Officer 18 Require the Board of Directors to Set and Model High Ethical Standards 19 Establish a Corporate Code of Ethics 20 Conduct Social Audits 21 Require Employees to Take Ethics Training 22 Include Ethical Criteria in Employee Appraisals 22 Create an Ethical Work Environment 23 Including Ethical Considerations in Decision Making 24 Develop Problem Statement 24 Identify Alternatives 25 Choose Alternative 26 Implement the Decision 26 Evaluate the Results 26 Ethics in Information Technology 27 Summary 29 Key Terms 30 Self-Assessment Questions 30 Self-Assessment Answers 32 Discussion Questions 33 What Would You Do? 33 Cases 34 End Notes 39 Chapter 2 Ethics for IT Workers and IT Users 43 Organizations Behaving Badly 43 IT Worker Relationships That Must Be Managed 44 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Relationships Between IT Workers and Employers 44 Relationships Between IT Workers and Clients 47 Relationships Between IT Workers and Suppliers 50 Relationships Between IT Workers and Other Professionals 54 Relationships Between IT Workers and IT Users 55 Relationships Between IT Workers and Society 55 Encouraging the Professionalism of IT Workers 56 Professional Codes of Ethics 56 Professional Organizations 57 Certification 59 Licensing of IT Professionals 60 What Can Be Done to Encourage the Ethical Use of IT Resources Among Users? 64 Common Ethical Issues for IT Users 64 Supporting the Ethical Practices of IT Users 66 Summary 70 Key Terms 72 Self-Assessment Questions 72 Self-Assessment Answers 74 Discussion Questions 74 What Would You Do? 75 Cases 76 End Notes 80 Chapter 3 Cyberattacks and Cybersecurity 83 Organizations Behaving Badly 83 The Threat Landscape 85 Why Computer Incidents Are So Prevalent? 86 Types of Exploits 88 Federal Laws for Prosecuting Computer Attacks 99 The CIA Security Triad 100 Implementing CIA at the Organization Level 101 Implementing CIA at the Network Level 107 Implementing CIA at the Application Level 111 Implementing CIA at the End-User Level 112 Response to Cyberattack 114 Incident Notification 114 Protection of Evidence and Activity Logs 115 Incident Containment 115 Eradication 115 Incident Follow-Up 115 Using an MSSP 116 Computer Forensics 117 Summary 119 Key Terms 120 Self-Assessment Questions 121 Self-Assessment Answers 123 viii Table of Contents Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Discussion Questions 123 What Would You Do? 124 Cases 125 End Notes 129 Chapter 4 Privacy 133 Organizations Behaving Badly 133 Privacy Protection and the Law 135 Information Privacy 138 Privacy Laws, Applications, and Court Rulings 138 Key Privacy and Anonymity Issues 157 Consumer Profiling 157 Electronic Discovery 161 Workplace Monitoring 162 Advanced Surveillance Technology 164 Summary 167 Key Terms 170 Self-Assessment Questions 171 Self-Assessment Answers 173 Discussion Questions 173 What Would You Do? 174 Cases 175 End Notes 179 Chapter 5 Freedom of Expression 185 Organizations Behaving Badly 185 First Amendment Rights 187 Obscene Speech 188 Defamation 189 Freedom of Expression: Key Issues 189 Controlling Access to Information on the Internet 190 Internet Censorship 195 Strategic Lawsuit Against Public Participation 196 Anonymity on the Internet 197 John Doe Lawsuits 199 Hate Speech 201 Pornography on the Internet 202 Fake News 205 Summary 208 Key Terms 210 Self-Assessment Questions 210 Self-Assessment Answers 211 Discussion Questions 211 What Would You Do? 213 Cases 214 End Notes 217 Table of Contents ix Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Chapter 6 Intellectual Property 221 Organizations Behaving Badly 221 What Is Intellectual Property? 224 Copyrights 225 Patents 231 Trade Secrets 235 Current Intellectual Property Issues 239 Plagiarism 239 Reverse Engineering 241 Open Source Code 242 Competitive Intelligence 244 Trademark Infringement 246 Cybersquatting 247 Summary 249 Key Terms 252 Self-Assessment Questions 252 Self-Assessment Answers 253 Discussion Questions 254 What Would You Do? 254 Cases 255 End Notes 259 Chapter 7 Ethical Decisions in Software Development 263 Organizations Behaving Badly 263 Software Quality and Why It Is Important 265 The Importance of Software Quality 268 Software Product Liability 269 Strategies for Developing Quality Software 271 Software Development Methodologies 271 Capability Maturity Model Integration 276 Developing Safety-Critical Systems 278 Risk Management 280 Quality Management Standards 282 Summary 286 Key Terms 288 Self-Assessment Questions 289 Self-Assessment Answers 291 Discussion Questions 291 What Would You Do? 292 Cases 293 End Notes 297 Chapter 8 The Impact of Information Technology on Society 299 Organizations Behaving Badly 299 The Impact of IT on the Standard of Living and Worker Productivity 302 IT Investment and Productivity 302 IT and Workplace Automation 305 Artificial Intelligence 306 x Table of Contents Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. The Impact of IT on Health Care 309 Computerized Patient Records 311 Clinical Decision Support 313 Computerized Provider Order Entry 313 Telehealth 313 Summary 317 Key Terms 319 Self-Assessment Questions 319 Self-Assessment Answers 321 Discussion Questions 321 What Would You Do? 322 Cases 323 End Notes 326 Chapter 9 Social Media 329 Organizations Behaving Badly 329 What Is Social Media? 330 Social Networking Platforms 331 Business Applications of Social Media 333 Social Media Marketing 334 Social Media in the Hiring Process 336 Improving Customer Service Using Social Media 336 Social Shopping Platforms 337 Social Networking Ethical Issues 338 Cyberabuse, Cyberharassment, and Cyberstalking 338 Encounters with Sexual Predators 341 Uploading of Inappropriate Material 343 Employee Participation on Social Media Networks 343 Miscellaneous Social Media Issues 344 Summary 346 Key Terms 348 Self-Assessment Questions 348 Self-Assessment Answers 350 Discussion Questions 350 What Would You Do? 351 Cases 351 End Notes 354 Chapter 10 Ethics of IT Organizations 357 Organizations Behaving Badly 357 Use of Contingent Workers 359 The Gig Economy 360 Independent Contractors 361 Advantages of Using Contingent Workers 362 Disadvantages of Using Contingent Workers 363 Deciding When to Use Contingent Workers 363 H-1B Workers 365 Using H-1B Workers Instead of U.S. Workers 366 Table of Contents xi Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Gaming the H-1B Visa Program 367 The Need for H-1B Workers 368 Outsourcing 371 Offshore Outsourcing 371 Pros and Cons of Offshore Outsourcing 372 Strategies for Successful Offshore Outsourcing 374 Whistle-Blowing 375 Protection for Whistle-Blowers 375 Whistle-Blowing Protection for Private-Sector Workers 377 Dealing with a Whistle-Blowing Situation 377 Green Computing 380 Summary 383 Key Terms 385 Self-Assessment Questions 385 Self-Assessment Answers 388 Discussion Questions 388 What Would You Do? 389 Cases 390 End Notes 394 Appendix A A Brief Introduction to Morality 397 Introduction 397 The Knotty Question of Goodness 398 Relativism: Why “Common Sense” Won’t Work 399 Egoism versus Altruism 401 Deontology, or the Ethics of Logical Consistency and Duty 402 Happy Consequences, or Utilitarianism 404 Promises and Contracts 406 A Return to the Greeks: The Good Life of Virtue 407 Feminism and the Ethics of Care 409 Pluralism 410 Summary 411 Glossary 413 Index 427 xii Table of Contents Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. PREFACE We are excited to publish the sixth edition of Ethics in Information Technology. This new edition builds on the success of the previous editions and meets the need for a resource that helps readers understand many of the legal, ethical, and societal issues associated with information technology. We have responded to the feedback from our previous edition adopters, students, and other reviewers to create an improved text. We think you will be pleased with the results. Ethics in Information Technology, Sixth Edition, fills a void of practical business information for business managers and IT professionals. The typical introductory information systems book devotes one chapter to ethics and IT, which cannot possibly cover the full scope of ethical issues related to IT. Such limited coverage does not meet the needs of business managers and IT professionals—the people primarily responsible for addressing ethical issues in the workplace. What is missing is an examination of the different ethical situations that arise in IT as well as practical advice for addressing these issues. Ethics in Information Technology, Sixth Edition, has enough substance for an instructor to use it in a full-semester course in computer ethics. Instructors can also use the book as a reading supplement for such courses as Introduction to Management Information Systems, Principles of Information Technology, Managerial Perspective of Information Technology, Computer Security, E-Commerce, and so on. WHAT’S NEW Ethics in Information Technology, Sixth Edition, has been updated and revised to incorporate the many new developments and ethical issues that are affecting IT professionals and influencing professional ethics, such as state licensing of IT professionals; cyberterrorism and hacktivism; the erosion of privacy due to electronic surveillance; the positive and negative impacts of social networking; the design and implementation of safety-critical systems; and the impact of IT on the standard of living, worker productivity, and health care. Each chapter opens with a new “Organizations Behaving Badly” real-world scenario that highlights key issues from the chapter and raises thought-provoking questions. Critical thinking exercises, also a new feature, are strategically placed at the end of each major chapter section to encourage the reader to pause, consider, and apply what they’ve just read. Each chapter ends with a list of key terms and a set of self-assessment questions that students can use to check their grasp of key points from the chapter. New—and more varied—end-of-chapter exercises have been added to encourage critical application of chapter concepts. Students can practice principles they’ve learned with revised Discussion Questions, and What Would You Do? exercises, as well as all new Cases. Instructors of Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. online courses can use this wealth of material as the basis for discussion forums that allow their online students to share a variety of perspectives and experiences and to create a learning community. Such discussions provide students the opportunity to more deeply understand the material while challenging their critical thinking skills. We think you will like these changes and additions. ORGANIZATION Each of the 10 chapters in this book addresses a different aspect of ethics in information technology: Chapter 1, “An Overview of Ethics,” introduces ethics, ethics in business, and the importance of ethics in IT. The distinction between morals, ethics, and laws is defined. The trends that have increased the likelihood of unethical behavior are identified. The concept of corporate social responsibility is defined and discussed. The chapter presents reasons why practicing good business ethics is important in business. A model for improving corporate ethics is provided. The most commonly observed types of misconduct in the workplace are identified. The need for an organizational code of ethics is discussed. Key steps in establishing a sound ethics program are outlined. The role of the chief ethics officer and board of directors in establishing a strong organizational ethics program is examined. A useful model for ethical decision making is provided. The chapter ends with a discussion of the role of ethics in IT. Chapter 2, “Ethics for IT Workers and IT Users,” explains the importance of ethics in the business relationships of IT professionals, including those between IT workers and employers, clients, suppliers, other professionals, IT users, and society. The chapter provides suggestions for what can be done to encourage the professionalism of IT workers by emphasizing the significance of IT professional organizations and their codes of ethics as well as certification and licensing. Some ethical issues faced by IT users are discussed, including software piracy, inappropriate use of computing resources, and inappropriate sharing of information. Actions that can be taken to encourage the ethical use of IT resources by end-users are outlined. The chapter introduces the topic of internal control and compliance and the role the audit committee and members of the internal audit team have in ensuring that both the IT organization and IT users follow organizational guidelines and policies, as well as various legal and regulatory practices. Chapter 3, “Cyberattacks and Cybersecurity,” describes the types of ethical decisions that IT professionals must make, as well as the business needs they must balance when dealing with security issues. The chapter identifies the most common computer-related security incidents and provides numerous reasons why such incidents are increasing. This chapter includes information on the use of cloud computing, virtualization software, and bring your own device corporate business policies. It describes some of the more common hacker attacks, including ransomware, viruses, worms, Trojan horses, blended threats, distributed denial-of-service, rootkits, advanced persistent xiv Preface Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. threats, spam, phishing, spear-phishing, smishing, and vishing. Cyberespionage and cyberterrorism are also covered including the roles of the United States Computer Emergency Readiness Team (US-CERT) and the Department of Homeland Security in defending against cyberterrorism. In addition to providing a useful classification of computer crimes and their perpetrators, the chapter summarizes the major federal laws that address computer crime. The chapter introduces the concept of the CIA triad (confidentiality, integrity, and availability) and outlines steps to implement this concept throughout the organization at all levels. The chapter discusses the need for a corporate security policy and offers both a process for establishing a security policy and several security-related policy templates that can help an organization to quickly develop effective security policies. A process for performing an assessment of an organization’s IT resources from both internal and external threats is presented. Useful guidelines are provided on how to respond to specific security incidents to quickly resolve problems and improve ongoing security measures. Chapter 4, “Privacy,” explains how the use of IT affects privacy rights and discusses several key pieces of legislation that have addressed privacy rights over the years. The Fourth Amendment is explained, and laws designed to protect personal financial and health data—as well as the privacy of children—are discussed. Electronic surveillance is covered, along with many laws associated with this activity, including Executive Order 12333, the Foreign Intelligence Surveillance Act, and the USA PATRIOT Act including its various amendments and extensions. Various regulations affecting the export of personal data from one country to another are covered. The chapter explains how the personal information businesses gather using IT can be used to obtain or keep customers (or to monitor employees). It also discusses the concerns of privacy advocates regarding how much information can be gathered, with whom it can be shared, how the information is gathered in the first place, and how it is used. These concerns also extend to the information- gathering practices of law enforcement and government. Identity theft and data breaches are covered along with various tactics used by identity thieves; the chapter also presents some safeguards that can thwart identity theft. Guidelines and principles for treating consumer data responsibly are offered. The pros and cons of consumer profiling as well as various tactics for profiling are discussed. The expanding use of electronic discovery, workplace monitoring, camera surveillance, vehicle data recorders, and stalking apps is discussed. Chapter 5, “Freedom of Expression,” addresses issues raised by the growing use of the Internet as a means for freedom of expression, while also examining the types of speech protected by the First Amendment of the U.S. Constitution. The chapter covers the ways in which the ease and anonymity with which Internet users can communicate may pose problems for people who might be adversely affected by such communications. It describes attempts at using legislation (such as the Communications Decency Act, the Children Online Protection Act, and the Children’s Internet Protection Act) and Preface xv Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. technology, such as Internet filtering, to control access to Internet content that is unsuitable for children or unnecessary in a business environment. The use of strategic lawsuits against public participation (SLAPP) lawsuits is covered. The use of John Doe lawsuits to reveal the identities of anonymous posters is discussed. Internet censorship, doxing, sexting, fake news, defamation, hate speech, pornography on the Internet, and spam are also covered. Chapter 6, “Intellectual Property,” defines intellectual property and explains the varying degrees of ownership protection offered by copyright, patent, and trade secret laws. Copyright, patent, and trademark infringement are examined, using many examples. Key U.S. and international rules aimed at protecting intellectual property are discussed, including the Prioritizing Resources and Organization for Intellectual Property Act, the General Agreement on Tariffs and Trade, the World Trade Organization Agreement on Trade-Related Aspects of Intellectual Property Rights, the World Intellectual Property Organization Copyright Treaty, and the Digital Millennium Copyright Act. The chapter explains software patents and software licensing as well as the use of cross-licensing agreements. It also addresses key intellectual property issues such as plagiarism, reverse engineering, open source code, competitive intelligence, trademark infringement, and cybersquatting. The use of nondisclosure agreements and noncompete clauses in work contracts is also discussed. Finally, the chapter addresses several key issues relevant to ethics in IT, including plagiarism, reverse engineering of software, open source code, competitive intelligence gathering, and cybersquatting. Chapter 7, “Ethical Decisions in Software Development,” provides a thorough discussion of the software development process and the importance of software quality. It covers the ethical and economic issues that software manufacturers must consider when deciding “how good is good enough?” with regard to their software products—particularly when the software is safety-critical and its failure can cause loss of human life. Topics include software product liability, risk management, quality management, and quality assurance. An overview of and the pros and cons of the waterfall and agile software development approaches are presented. The chapter also examines the Capability Maturity Model Integration (CMMI), the ISO 9000 family of standards, and the Failure mode and effects analysis (FMEA) technique as strategies for improving software quality. Chapter 8, “The Impact of Information Technology on Society,” examines the effect that IT investment has had on the standard of living and worker productivity. Also covered are how advances in artificial intelligence, machine learning, robotics, and natural language processing are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers. The chapter looks at the impact of IT on the delivery of health care and healthcare costs. Electronic medical records, electronic health records, and health information exchanges are explained. The issues with implementing a successful electronic health records system xvi Preface Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. are discussed. Telehealth and telemedicine are defined and how they help deliver of health care are discussed. Chapter 9, “Social Media,” discusses how people use social media, identifies common business uses of social media, and examines many of the ethical issues associated with the use of social media. The most popular social networking platforms are identified. The business applications of social media are covered, including the use of social networks to communicate and promote the benefits of products and services, the use of social media in the hiring process, improving customer service, and the creation of social shopping platforms. Common ethical issues that arise for members of social networking platforms including online abuse, harassment, stalking, cyberbullying, encounters with sexual predators, the uploading of inappropriate material, and the inappropriate participation of employees in social networking are discussed. Other social networking issues covered include the increased risk of accidents associated with social media interaction while driving, the tendency of many social media users to become narcissist in their postings, and the ability to perform self-image manipulation. Chapter 10, “Ethics of IT Organizations,” covers a range of ethical issues facing IT organizations, including those associated with the use of nontraditional workers, such as temporary workers, contractors, consulting firms, H-1B workers, and the use of outsourcing and offshore outsourcing. Also raised is the issue of discriminatory hiring practices at many large IT firms and the special issues of independent contractors working in the gig economy. Factors that are considered in classifying a worker as either an employee or an independent contractor are provided. The chapter also discusses the risks, protections, and ethical decisions related to whistle-blowing, and it presents a process for safely and effectively handling a whistle-blowing situation. In addition to introducing the concept of green computing, the chapter discusses the ethical issues that both IT manufacturers and IT users face when a company is considering how to transition to green computing—and at what cost. It discusses the use of the Electronic Product Environment Assessment Tool to evaluate, compare, and select electronic products based on a set of 51 environmental criteria. Appendix A provides an in-depth discussion of how ethics and moral codes developed over time. PEDAGOGY Ethics in Information Technology, Sixth Edition, employs a variety of pedagogical features to enrich the learning experience and provide interest for the instructor and student: Opening Quotation. Each chapter begins with a quotation to stimulate interest in the chapter material. Organizations Behaving Badly. At the beginning of each chapter, a brief real-world scenario illustrates the issues to be discussed, and carefully crafted focus questions pique the reader’s interest. Preface xvii Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Learning Objectives. Learning Objectives appear at the start of each chapter. They are presented in the form of questions for students to consider while reading the chapter. Critical Thinking Exercises. New, thought-provoking critical thinking exercises are strategically placed at the end of each major chapter section to encourage the reader to pause, consider, and apply what they’ve just read. Key Terms. Key terms appear in bold in the text and are listed at the end of the chapter. They are also defined in the glossary at the end of the book. Manager’s Checklist. Chapters include a checklist that provides a practical and useful list of questions to consider when

Use Quizgecko on...
Browser
Browser