Ethics in Information Technology PDF 5th Edition
Document Details
Uploaded by EnticingSerpent
Strayer University
George W. Reynolds
Tags
Summary
Ethics in Information Technology, 5th Edition, by George W. Reynolds, is a textbook on the ethical issues in information technology.
Full Transcript
ETHICS IN INFORMATION TECHNOLOGY Fifth Edition Copyright...
ETHICS IN INFORMATION TECHNOLOGY Fifth Edition Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. ETHICS IN INFORMATION TECHNOLOGY Fifth Edition George W. Reynolds Strayer University Australia Brazil Mexico Singapore United Kingdom United States Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Ethics in Information Technology, © 2015 Cengage Learning Fifth Edition WCN: 02-200-203 George W. Reynolds ALL RIGHTS RESERVED. No part of this work covered by the Product Director: Joe Sabatino copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, Product Manager: Clara Goosman including but not limited to photocopying, recording, scanning, Senior Content Developer: Kate Mason digitizing, taping, Web distribution, information networks, or Product Assistant: Brad Sullender information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without Senior Rights Acquisitions Specialist: the prior written permission of the publisher. Christine Myaskovsky Senior Brand Manager: Robin LeFevre For product information and technology assistance, contact us at Art and Cover Direction, Production Cengage Learning Customer & Sales Support, 1-800-354-9706. Management, and Composition: PreMediaGlobal For permission to use material from this text or product, submit all Associate Market Development Manager: requests online at www.cengage.com/permissions. Roy Rosa Further permissions questions can be e-mailed to [email protected]. Marketing Coordinator: Christopher Walz Senior Media Developer: Mike Jackson Some of the product names and company names used in this Manufacturing Planner: Ron Montgomery book have been used for identification purposes only and may Cover Images: © Paul Price/Ikon Images/ be trademarks or registered trademarks of their respective Getty Images. manufacturers and sellers. Library of Congress Control Number: 2013945101 ISBN-13: 978-1-285-19715-9 ISBN-10: 1-285-19715-1 Instructor Edition: ISBN-13: 978-1-285-19718-0 ISBN-10: 1-285-19718-6 Cengage Learning 20 Channel Center Street Boston, MA 02210 USA Microsoft and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Cengage Learning is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. iPhone, iPad, and iPod are registered trademarks of Apple Inc. Cengage Learning reserves the right to revise this publication and make changes from time to time in its content without notice. Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: www.cengage.com/global Cengage Learning products are represented in Canada by Nelson Education, Ltd. To learn more about Cengage Learning, visit www.cengage.com Purchase any of our products at your local college store or at our preferred online store: www.cengagebrain.com Printed in the United States of America 1 2 3 4 5 6 7 17 16 15 14 13 Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. BRIEF CONTENTS Preface xiii Chapter 1 An Overview of Ethics 1 Chapter 2 Ethics for IT Workers and IT Users 41 Chapter 3 Computer and Internet Crime 81 Chapter 4 Privacy 131 Chapter 5 Freedom of Expression 179 Chapter 6 Intellectual Property 217 Chapter 7 Software Development 261 Chapter 8 The Impact of Information Technology on Productivity and Quality of Life 297 Chapter 9 Social Networking 335 Chapter 10 Ethics of IT Organizations 369 Appendix A A Brief Introduction to Morality 411 Appendix B Answers to Self-Assessment Questions 427 Glossary 429 Index 441 Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. TABLE OF CONTENTS Preface xiii Chapter 1 An Overview of Ethics 1 Vignette 1 Cisco Chairman and CEO Advocates Ethical Behavior 1 What Is Ethics? 3 Definition of Ethics 3 The Importance of Integrity 4 The Difference Between Morals, Ethics, and Laws 5 Ethics in the Business World 5 Corporate Social Responsibility 8 Why Fostering Corporate Social Responsibility and Good Business Ethics Is Important 8 Improving Corporate Ethics 12 Creating an Ethical Work Environment 18 Including Ethical Considerations in Decision Making 20 Develop a Problem Statement 21 Identify Alternatives 21 Evaluate and Choose an Alternative 22 Implement the Decision 24 Evaluate the Results 24 Ethics in Information Technology 24 Summary 26 Key Terms 27 Self-Assessment Questions 27 Discussion Questions 28 What Would You Do? 29 Cases 31 End Notes 35 Chapter 2 Ethics for IT Workers and IT Users 41 Vignette 41 New York City Payroll Project Riddled with Fraud 41 IT Professionals 43 Are IT Workers Professionals? 44 Professional Relationships That Must Be Managed 44 Professional Codes of Ethics 54 Professional Organizations 55 Certification 57 Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Government Licensing 58 IT Professional Malpractice 60 IT Users 61 Common Ethical Issues for IT Users 61 Supporting the Ethical Practices of IT Users 63 Compliance 64 Summary 67 Key Terms 68 Self-Assessment Questions 68 Discussion Questions 69 What Would You Do? 70 Cases 72 End Notes 76 Chapter 3 Computer and Internet Crime 81 Vignette 81 The Reveton Ransomware Attacks 81 IT Security Incidents: A Major Concern 84 Why Computer Incidents Are So Prevalent 84 Types of Exploits 88 Types of Perpetrators 95 Federal Laws for Prosecuting Computer Attacks 99 Implementing Trustworthy Computing 100 Risk Assessment 102 Establishing a Security Policy 104 Educating Employees and Contract Workers 105 Prevention 105 Detection 110 Response 110 Summary 115 Key Terms 116 Self-Assessment Questions 116 Discussion Questions 118 What Would You Do? 118 Cases 120 End Notes 125 Chapter 4 Privacy 131 Vignette 131 What Is the National Security Agency (NSA) Up To? 131 Privacy Protection and the Law 133 Information Privacy 135 Privacy Laws, Applications, and Court Rulings 135 Key Privacy and Anonymity Issues 151 Data Breaches 151 Electronic Discovery 153 Consumer Profiling 154 viii Table of Contents Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Workplace Monitoring 155 Advanced Surveillance Technology 157 Summary 160 Key Terms 162 Self-Assessment Questions 163 Discussion Questions 164 What Would You Do? 165 Cases 167 End Notes 171 Chapter 5 Freedom of Expression 179 Vignette 179 Reputation Changer, Online Reputation Management Company 179 First Amendment Rights 181 Obscene Speech 183 Defamation 183 Freedom of Expression: Key Issues 184 Controlling Access to Information on the Internet 184 Strategic Lawsuit Against Public Participation (SLAPP) 189 Anonymity on the Internet 190 Hate Speech 193 Pornography 194 Summary 199 Key Terms 200 Self-Assessment Questions 201 Discussion Questions 202 What Would You Do? 203 Cases 205 End Notes 209 Chapter 6 Intellectual Property 217 Vignette 217 Sinovel Steals Millions in Trade Secrets from American Superconductor 217 What Is Intellectual Property? 220 Copyrights 221 Copyright Term 221 Eligible Works 222 Fair Use Doctrine 222 Software Copyright Protection 223 The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 224 General Agreement on Tariffs and Trade (GATT) 224 The WTO and the WTO TRIPS Agreement (1994) 224 The World Intellectual Property Organization (WIPO) Copyright Treaty (1996) 225 The Digital Millennium Copyright Act (1998) 225 Table of Contents ix Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Patents 228 Leahy-Smith America Invents Act (2011) 230 Software Patents 230 Cross-Licensing Agreements 231 Trade Secrets 231 Trade Secret Laws 232 Employees and Trade Secrets 233 Key Intellectual Property Issues 234 Plagiarism 234 Reverse Engineering 236 Open Source Code 238 Competitive Intelligence 239 Trademark Infringement 242 Cybersquatting 243 Summary 244 Key Terms 246 Self-Assessment Questions 247 Discussion Questions 248 What Would You Do? 249 Cases 250 End Notes 255 Chapter 7 Software Development 261 Vignette 261 Stock Markets Susceptible to Software Glitches 261 Strategies for Engineering Quality Software 264 The Importance of Software Quality 267 Software Product Liability 268 Software Development Process 270 Capability Maturity Model Integration 273 Key Issues in Software Development 275 Development of Safety-Critical Systems 275 Quality Management Standards 279 Summary 282 Key Terms 283 Self-Assessment Questions 284 Discussion Questions 285 What Would You Do? 286 Cases 288 End Notes 292 Chapter 8 The Impact of Information Technology on Productivity and Quality of Life 297 Vignette 297 Problems with the E-Rate Program 297 The Impact of IT on the Standard of Living and Worker Productivity 301 IT Investment and Productivity 301 The Digital Divide 306 x Table of Contents Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. The Impact of IT on HealthCare Costs 310 Electronic Health Records 310 Use of Mobile and Wireless Technology in the Healthcare Industry 314 Telehealth 315 Medical Information Web Sites for Laypeople 317 Summary 319 Key Terms 320 Self-Assessment Questions 320 Discussion Questions 322 What Would You Do? 322 Cases 324 End Notes 328 Chapter 9 Social Networking 335 Vignette 335 Wanelo: Social Shopping Web Site Headed for Success 335 What Is a Social Networking Web Site? 337 Business Applications of Online Social Networking 338 Social Network Advertising 339 The Use of Social Networks in the Hiring Process 342 The Use of Social Media to Improve Customer Service 343 Social Shopping Web Sites 344 Social Networking Ethical Issues 345 Cyberbullying 346 Cyberstalking 347 Encounters with Sexual Predators 348 Uploading of Inappropriate Material 350 Online Virtual Worlds 351 Crime in Virtual Worlds 352 Educational and Business Uses of Virtual Worlds 353 Summary 354 Key Terms 355 Self-Assessment Questions 355 Discussion Questions 356 What Would You Do? 357 Cases 358 End Notes 362 Chapter 10 Ethics of IT Organizations 369 Vignette 369 HP Finds Autonomy a Tough Pill to Swallow 369 Key Ethical Issues for Organizations 371 The Need for Nontraditional Workers 372 Contingent Workers 374 Advantages of Using Contingent Workers 375 Disadvantages of Using Contingent Workers 375 Deciding When to Use Contingent Workers 376 H-1B Workers 377 Table of Contents xi Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. H-1B Application Process 379 Using H-1B Workers Instead of U.S. Workers 380 Potential Exploitation of H-1B Workers 380 Outsourcing 381 Offshore Outsourcing 381 Pros and Cons of Offshore Outsourcing 383 Strategies for Successful Offshore Outsourcing 384 Whistle-Blowing 385 Protection for Whistle-Blowers 386 Whistle-Blowing Protection for Private-Sector Workers 387 Dealing with a Whistle-Blowing Situation 387 Green Computing 390 ICT Industry Code of Conduct 392 Summary 394 Key Terms 395 Self-Assessment Questions 395 Discussion Questions 397 What Would You Do? 398 Cases 401 End Notes 405 Appendix A A Brief Introduction to Morality 411 Introduction 411 The Knotty Question of Goodness 412 Relativism: Why “Common Sense” Won’t Work 413 Egoism vs. Altruism 414 Deontology, or The Ethics of Logical Consistency and Duty 416 Happy Consequences, or Utilitarianism 418 Promises and Contracts 420 A Return to The Greeks: The Good Life of Virtue 421 Feminism and the Ethics of Care 423 Pluralism 424 Summary 425 Appendix B Answers to Self-Assessment Questions 427 Glossary 429 Index 441 xii Table of Contents Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. PREFACE We are excited to publish the fifth edition of Ethics in Information Technology. This new edition builds on the success of the previous editions and meets the need for a resource that helps readers understand many of the legal, ethical, and societal issues associated with information technology. We have responded to the feedback from our previous edition adopters, students, and other reviewers to create an improved text. We think you will be pleased with the results. Ethics in Information Technology, Fifth Edition, fills a void of practical business information for business managers and IT professionals. The typical introductory infor- mation systems book devotes one chapter to ethics and IT, which cannot possibly cover the full scope of ethical issues related to IT. Such limited coverage does not meet the needs of business managers and IT professionals—the people primarily responsible for addressing ethical issues in the workplace. Missing is an examination of the different ethical situations that arise in IT as well as practical advice for addressing these issues. Ethics in Information Technology, Fifth Edition, has enough substance for an instructor to use it in a full-semester course in computer ethics. Instructors can also use the book as a reading supplement for such courses as Introduction to Management Information Systems, Principles of Information Technology, Managerial Perspective of Information Technology, Computer Security, E-Commerce, and so on. WHAT’S NEW Ethics in Information Technology, Fifth Edition, has been updated and revised to incor- porate the many new developments and ethical issues that have arisen since the last edi- tion. There is new or expanded coverage of the following topics: the increased security risks of bring your own device (BYOD) business policies, the role of the National Security Agency in breaking of codes used to encrypt sensitive communications and for the inter- ception of signals on behalf of the federal government, the ethics of using online reputa- tion management companies, the use of strategic lawsuits against public participation (SLAPP) and anti-SLAPP lawsuits, the theft by China of trade secrets from the United States and Western Europe, and telehealth and telemedicine and their role in the delivery of health care. All opening vignettes and two-thirds of the end-of-chapter cases are new or exten- sively updated. Dozens of new real-world examples are presented in each chapter. At least 50 percent of the “Self-Assessment Questions,” “Discussion Questions,” and “What Would You Do?” exercises are new. Based on reviewer feedback, we have also increased the number of “Discussion Questions” and “What Would You Do?” exercises. Instructors of online courses frequently use these as the basis for discussion forums that allow online Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. students to share a variety of perspectives and experiences and to create a learning com- munity. Such discussions provide students the opportunity to more deeply understand the material while challenging their critical thinking skills. ORGANIZATION Each of the 10 chapters in this book addresses a different aspect of ethics in information technology: Chapter 1, “An Overview of Ethics,” provides an introduction to ethics,ethics in business, and the relevance of discussing ethics in IT. The chapter defines the distinction between morals, ethics, and laws. It identifies the most com- mon forms of employee misconduct. The concept of corporate social respon- sibility is defined and discussed. It presents five reasons why practicing good business ethics is important in business and provides a model for improving corporate ethics. It examines the role of the chief ethics officer and board of directors in establishing a strong organizational ethics program. The chapter also outlines the need for an organizational code of ethics and describes key steps in establishing a sound ethics program. It suggests a model for ethical decision making and also discusses four commonly used philosophical approaches to ethical decision making. The chapter ends with a discussion of the role of ethics in IT. Chapter 2, “Ethics for IT Workers and IT Users,” begins with a vignette that illustrates major fraud on a real IT project involving the New York City Payroll. This chapter explains the importance of ethics in the business relationships of IT professionals, including those between IT workers and employers, clients, suppliers, other professionals, IT users, and society. The chapter also emphasizes the significance of IT professional organizations and their codes of ethics, and it discusses the roles that certification and licensing can play in legitimizing professional standards. The chapter also points out the difficulties in licensing IT workers. The chapter touches on some ethical issues faced by IT users—including software piracy, inappropriate use of computing resources, and inappropriate sharing of information—and outlines actions that can be taken to support the ethical practices of IT users. The chapter introduces the topic of compliance and the role the audit committee and members of the internal audit team have in ensuring that both the IT organization and IT users are in compliance with organizational guidelines and policies, as well as various legal and regulatory practices. Chapter 3, “Computer and Internet Crime,” describes the types of ethical decisions that IT professionals must make, as well as the business needs they must balance when dealing with security issues. The chapter identifies the most common computer-related security incidents and provides numerous reasons why such incidents are increasing. Including the use of cloud com- puting, virtualization software, and bring your own device corporate business policies. It describes some of the more common hacker attacks, including viruses, worms, Trojan horses, distributed denial-of-service, rootkits, spam, xiv Preface Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. phishing, spear-phishing, smishing, vishing, and ransom ware. In addition to providing a useful classification of computer crimes and their perpetrators, the chapter summarizes the major federal laws that address computer crime. The chapter outlines both how to implement trustworthy computing to man- age security vulnerabilities and how to respond to specific security incidents to quickly resolve problems and improve ongoing security measures. A pro- cess for performing an assessment of an organization’s computers and net- work from both internal and external threats is presented. The chapter discusses the need for a corporate security policy and offers both a process for establishing a security policy and a number of security-related policy templates that can help an organization to quickly develop effective security policies. The roles of the United States Computer Emergency Readiness Team (US-CERT) and the Department of Homeland Security in defending against cyberterrorism are also discussed. Chapter 4, “Privacy,” begins with a vignette on the National Security Agency and its role in the interception of communications signals on behalf of the federal government. This chapter goes on to explain how the use of IT affects privacy rights and discusses several key pieces of legislation that have addressed privacy rights over the years. The Fourth Amendment is explained, and laws designed to protect personal financial and health data—as well as the privacy of children—are discussed. Electronic surveillance is covered, along with many laws associated with this activity, including the Foreign Intelligence Surveillance Act and the USA Patriot Act. The chapter also covers the various regulations affecting the export of personal data from one country to another. The chapter explains how the personal information busi- nesses gather using IT can be used to obtain or keep customers (or to moni- tor employees). It also discusses the concerns of privacy advocates regarding how much information can be gathered, with whom it can be shared, how the information is gathered in the first place, and how it is used. These concerns also extend to the information-gathering practices of law enforcement and government. Identity theft and data breaches are covered along with various tactics used by identity thieves; the chapter also presents some safeguards that can thwart identity theft. The expanding use of electronic discovery, workplace monitoring, camera surveillance, and consumer profiling is dis- cussed. Guidelines and principles for treating consumer data responsibly are offered. Chapter 5, “Freedom of Expression,” addresses issues raised by the growing use of the Internet as a means for freedom of expression, while also exa- mining the types of speech protected by the First Amendment of the U.S. Constitution. The chapter opens with a discussion of Reputation Changer, an online reputation management company that helps businesses manage potentially damaging information on the Web. It goes on to cover the ways in which the ease and anonymity with which Internet users can communi- cate can pose problems for people who might be adversely affected by such communications. It describes attempts at using legislation (such as the Preface xv Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Communications Decency Act, the Child Online Protection Act, and the Children’s Internet Protection Act) and technology, such as Internet filtering, to control access to Internet content that is unsuitable for children or unnecessary in a business environment. The use of strategic lawsuits against public participation (SLAPP) lawsuits is covered. The use of John Doe law- suits to reveal the identities of anonymous posters is discussed. Defamation and hate speech, pornography on the Internet, and spam are also covered. Chapter 6, “Intellectual Property,” defines intellectual property and explains the varying degrees of ownership protection offered by copyright, patent, and trade secret laws. The opening vignette discusses how a Chinese company stole valuable trade secrets from a U.S. firm and makes the point that the theft of trade secrets by Chinese companies from the U.S. and Western com- panies represents the “greatest transfer of wealth in history.” Copyright, patent, and trademark infringement are examined, using many examples. Key U.S. and international rules aimed at protecting intellectual property are dis- cussed, including the Prioritizing Resources and Organization for Intellectual Property Act, the General Agreement on Tariffs and Trade, the World Trade Organization Agreement on Trade-Related Aspects of Intellectual Property Rights, the World Intellectual Property Organization Copyright Treaty, and the Digital Millennium Copyright Act. The chapter explains software patents and the use of cross-licensing agreements. It also addresses key intellectual property issues such as plagiarism, reverse engineering, open source code, competitive intelligence, trademark infringement, and cybersquatting. The use of nondisclosure agreements and noncompete clauses in work con- tracts is also discussed. Finally, the chapter covers several key issues relevant to ethics in IT, including plagiarism, reverse engineering of software, open source code, competitive intelligence gathering, and cybersquatting. Chapter 7, “Software Development,” provides a thorough discussion of the software development process and the importance of software quality. The opening vignette illustrates how susceptible stock markets are to software glitches. The chapter covers issues software manufacturers must consider when deciding “how good is good enough?” with regard to their software products—particularly when the software is safety-critical and its failure can cause loss of human life. Topics include software product liability, risk analy- sis, and different approaches to quality assurance testing. The chapter also examines Capability Maturity Model Integration (CMMI), the ISO 9000 family of standards, and the failure mode and effects analysis (FMEA) technique. Chapter 8, “The Impact of Information Technology on Productivity and the Quality of Life,” examines the effect that IT investment has had on the stan- dard of living and worker productivity around the world. The increase in the use of telework (also known as telecommuting) is discussed, as are the pros and cons of this work arrangement. The chapter also discusses the digital divide and profiles some programs designed to close that gap. The chapter takes a look at the impact of IT on the delivery of health care and healthcare costs. The potential costs and benefits associated with electronic health xvi Preface Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. records is discussed. Telehealth and telemedicine are defined and their role in the delivery of health care are discussed. Chapter 9, “Social Networking,” discusses how people use social networks, identifies common business uses of social networks, and examines many of the ethical issues associated with the use of social networks. The opening vignette illustrates how the use of social networks raises many privacy issues. The business applications of social networks are covered including their use in advertising, marketing, the hiring process, and improving employee com- munications and customer service. Social network ethical issues including cyberbullying, cyberstalking, encounters with sexual predators, and the uploading of inappropriate material are also discussed. The chapter covers virtual life communities and the ethical issues associated with virtual worlds. Chapter 10, “Ethics of IT Organizations,” covers a range of ethical issues fac- ing IT organizations, including those associated with the use of nontraditional workers, such as temporary workers, contractors, consulting firms, H-1B workers, and the use of outsourcing and offshore outsourcing. The chapter also discusses the risks, protections, and ethical decisions related to whistle- blowing, and it presents a process for safely and effectively handling a whistle-blowing situation. In addition to introducing the concept of green computing, the chapter discusses the ethical issues that both IT manufac- turers and IT users face when a company is considering how to transition to green computing—and at what cost. It discusses the use of the Electronic Product Environment Assessment Tool to evaluate, compare, and select elec- tronic products based on a set of 51 environmental criteria. Finally, the chapter examines a code of conduct for the electronics and information and communications technology (ICT) industries designed to address ethical issues in the areas of worker safety and fairness, environmental responsibil- ity, and business efficiency. Appendix A provides an in-depth discussion of how ethics and moral codes developed over time. Appendix B provides answers to the end-of-chapter Self-Assessment Questions. PEDAGOGY Ethics in Information Technology, Fifth Edition, employs a variety of pedagogical features to enrich the learning experience and provide interest for the instructor and student: Opening Quotation. Each chapter begins with a quotation to stimulate interest in the chapter material. Vignette. At the beginning of each chapter, a brief real-world example illustrates the issues to be discussed and piques the reader’s interest. Questions to Consider. Carefully crafted focus questions follow the vignette