Вы находитесь на странице: 1из 13

BIS3328

Social, Professional and Ethical


Issues in Information Systems

Milestone 3
Deadline for Submission
July 21st, 18.10 pm, 2015
Day/time of Seminar: 24 weeks
Seminar Tutor Name: Mr. Pradeep Pallegama
Student Name: R.M. Kumuthu Shashiprabha Rathnayake
Student Number: M00542458
Campus:
London
Overseas (name): ICBT Kandy Campus, Sri Lanka

School of Science and Technology

Dr Penny Duquenoy
This date does not apply to students at collaborative institutions which are not open for teaching on a Friday
local tutors will advise.
For Dubai students, submission deadline is the end of week 7 the local tutor will advise the date and time.

R.M Kumuthu Shashiprabha Rathnayake (M00542458)

Ethical, Social, Professional and Legal Issues Related to Geographical


Positioning System

Global Positioning System (GPS) is a navigation system greatly relies on satellite which
consist of 24 orbiting satellites that has the capability to offer location and time information
(Coffed, 2014a, p.g 2). In the beginning GPS was developed for military purposes however in
1980s Ronald Reagan decided that it should be made available for civilian use (Rice, 2014).
The USA government maintains GPS facility and it can freely accessed by a GPS receiver.
GPS receivers are vehicle tracking system, hand-held devices and smartphones (Coffed,
2014b, p.g 2).
GPS satellites move around the earth twice per day at an altitude of 13,000 miles accurately
in orbit transmitting signal information. A satellite repeatedly transmits the location and time
which is determined by precise on board atomic clocks. Then the GPS receiver will evaluate
by comparing the time indicated in the internal clock of the GPS receiver and analyse how far
it is from a single satellite with the help of a technique called triangulation. After that this
information is then shown as the persons positions on an electronic map (Coffed, 2014c, p.g
3).
There are different types of GPS systems available which are providing assistance to users in
many ways. The basic unit which provide location based on the latitude and longitude. This
unit have a small processor and limited memory space which can be bought for few dollars.
Portable units like personal assistant devices and tablets have GPS technology. In car GPS
systems can be integrated as portable add unit and GPS systems in some cars are permanently
installed as in dash unit. In dash units are expensive and cannot be removed from the car so it
is pose for lot of threats (US Global Stat Incoporated , 2014).
As the evolution of the GPS widespread and became crucial technological device to
everyone. Therefore various advantages and disadvantages came up.
One of the main advantage is GPS enabled Fleet management and vehicle routing because
knowing the nearest location of these vehicles could be sent Many people can use GPS to
know the location of someone. For example this device is very useful for people with
diseases like dementia because they can be tracked 24/7 and the device could use some
intelligence to automatically report the whereabouts of the patient in case if they leave the
Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


normal area (Manoharan, 2009a, p.g 416). A GPS device could be attached to prisoners to
know the whereabouts of the prisoners if they escape. Another advantage is that it could
attach to wildlife animals in order to tack their whereabouts. Scientists can use this
technology to study the behaviour and movement of wildlife animals. These devices should
be lower in maintenance, small in size, powering and should not cause distress to the animal
(Manoharan, 2009b, p.g 416).
With emerging technology of GPS, GPS signals are vulnerable for spoofing attacks and
jamming so there can possible failures and problems come up. For example inaccurate
information will provide on GPS receiver. If a user is using a GPS device to see the route to
get to a particular destination then there is high chance that buildings in cities might block
satellite signals and prevent the device from updating the users position. Sometimes
environmental aspects like geo magnetic storms resulted by solar effects can provide
inaccurate location information on the GPS device (Mack, 2015). Just like the mobile phone
a GPS receiver consists of a battery which can run out during an emergency so this can be
considered as a drawback. Every GPS device does not have the option to turn off location so
there is a high chance where people can anonymously use the location information of the
user.
Due to these benefits and drawbacks of GPS systems ethical, social, professional and legal
issues have raised in this area. Privacy and security of the individual who uses GPS systems
are at risk. Professional code of conduct and other legal Acts are breached due to GPS.
According to a CBC News (2013) article it states that two British Columbian use GPS to
track their working employees. ThyssenKrupp have fixed GPS trackers on its vehicles to
track their company mechanics and Kone has provided mobile phones with GPS trackers
which records all the activities of the mechanic. However arguments have being raised
against this GPS tracking by their own working employees. The employees state that GPS
tracking violates the privacy and offence to the dignity of the organisation employees (The
Canadian Press , 2013a). They also argued that sufficient information was not provided about
this technology and how it is used. However the companies stated that GPS data was used to
deploy the employees efficiently, to locate employees during emergency, offer correct billing
information and to check whether employees are working in the place they have said. Kone
Company has stated that they have provided sufficient notice about this technology through
letters and presentation but ThyssenKrupp didnt mention a notice at all (The Canadian

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


Press , 2013b). This case is in grey area which means it has point in favour and points
against. The point in favour would be the companies are tracking their employees considering
the benefits it provides for the organisation and considering the safety of their employees so
this is ethically right. The point in against would be one company didnt give sufficient
information how this technology works and what data is taken so this will invade the privacy
of the employee. The ethical principle is ThyssenKrupp Company is not respecting the
freedom and privacy of the employees since without a prior notice they are using GPS to
track their employees. Therefore they have the right to argue against this matter and take
necessary actions.
The deontological theory means that emphasizing duty and absolute rules should be adhered
even though it leads to good or ill consequences in certain cases (Baase, 2012).According to
this theory actions ThyssenKrupp company is wrong regardless any consequences because it
violates the privacy of the employees. When using GPS technology to track people the
organisation should think how it will affect the mechanics and how they are affected by it.
Especially they should respect each employees privacy.
GPS locators such as Zoombak help car owners to track their cars in case if it is stolen.
Bailey who is a security consultant of iSec Partners hacked the particular device and
discovered that using security weakness he can check the movements of a particular device
and he states that users can be tricked into thinking that information shown about the location
in the device is true when it is not (Mills, 2011). The user thinks that this device is following
the security laws to keep their children safe by enabling the parents to check where their
children are all the time. How do parents know that the location information about the child
provided by the device is true or not? Therefore this causes a major ethical concern because
the trust worthiness of such devices are at risk. In here the main ethical principle is the trust
of these devices so if the trusts of these devices are broken then there is high chance that
people wont use this device. In order to make people build a good trust about this device the
developers integrate strong security mechanisms into it.
An article written by Carrington (2014) provide evidence how activists make use of GPS to
trace and capture loggers who are illegal cutting down trees in the Amazon Rainforest located
in Brazil. The article states that activists have secretly gone undercover to attach GPS trackers
on the trucks that are assumed to illegally logging. Satellite images were gathered and used to
study about the behaviour of these illegal loggers. The consequentialist theory means actions

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


are right or wrong based on a certain consequences (Baase, 2012). When applying this
theory to this case the actions are right and ethically correct to attach GPS tracker
anonymously on the trucks because it is used to expose the illegal logging and to stop
deforestation. If it is not exposed many issues will rise like old historical trees will be
eventually cut down and valuable plants and shrubs are crushed and destroyed by falling
tress. In these ways GPS technology can be used expose and eliminate criminal and other
illegal activities happening around the world.
A social issue can be considered in New York City a group cab drivers were protesting on a
decision to install a system which consists of GPS tracking. Even in this case these drivers
fear that the GPS surveillance will invade the privacy of them (HALPERIN, 2007a). The
tracking of employees will be constantly going on and information such as number of
journeys for a single shift and number of breaks these taxicab drivers are recorded. These taxi
cab drivers are very much concerned about whose keeping this data and for what purpose
(HALPERIN, 2007b). Everyone has the right to have their own privacy so when this is
invaded many people feel uncomfortable as they know that being watched and tracked.
Sometimes they might be accused for some reasons if there is a failure in the GPS device.
Today GPS jamming has become huge issue as GPS expert and professor from University of
Texas indicates that this technology can create huge problem in the national security (Neal,
2013a). Todd Humphreys demonstrated how a hacker can use a GPS system to hijack any
vehicle by using $3,000 worth device called GPS spoofer and having a simple knowledge of
hacking. The world first GPS spoofer was developed by Humphreys team (Neal, 2013b).
The GPS spoofer adds spoofing signals to the ships GPS antennas so it gives wrong
information. Basically a hacker might take control of the ship without letting the ship crew
know. Just imagine how this kind of technology will lead to major social concern by
threatening crew inside a vehicle. GPS is globally recognized technology and this is very
crucial to certain people but for now these kind of technology stays vulnerable (Neal, 2013c).
But in the future these technological implications can improve and cause global consequences
like threats to national security of each country and ability to take control of military vehicle
like tankers and submarines.
The evidence provided by the Threats of GPS Jamming (2014) reveals that jamming of GPS
signals poses a lot of risks to daily lives of the people. For example in 2007 GPS services
were interrupted throughout the city San Diego. Many effects occurred due to this the

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


emergency pagers of Naval Medical Centre eventually stopped working, the harbour traffic
management system failed which directs boats, users who use mobile phones did not have
signals and the ATM machines didnt work properly so bank customer were unable to
withdraw cash (Coffed, 2014a p.g 6). Three days were taken to find the problem as two Navy
ships were carrying out a training exercise by jamming radio signal so accidentally they have
disrupted GPS signals throughout the city (Coffed, 2014b p.g 6). Jamming is possible
because of GPS technology so this causes lot of distress and discomfort to the people as their
daily routines and important activities are disrupted. These signal failures can probably have
a huge impact on safety systems and other important devices of economy. This shows that
GPS technology is very vital for every human life because without GPS many difficulties will
arise and people wont be able to do certain daily activities without it.
GPS tracking devices is very useful to people who are suffering diseases like dementia. A
recent study carried out proves that 200 people with dementia in Norway have benefited a
calm mind and physical activities of the people have increased after using GPS devices
(Medical Express ,2015a). For example an old man who was living in a secure ward of a
nursing house was permitted of going out as this man always gets lost so lot of distressed was
caused by him to the staff. When the elderly man was given GPS device and he was allowed
to go out and all the distress caused was settled. If he didnt come back the nursing home staff
could easily find him (Medical Express ,2015b). Therefore using GPS devices by these
patients will be great benefit to them and person who look after them. This is a major social
benefit because all the people who are suffering from other mental disorders like Alzheimers
disease and disabled people can be tracked easily where ever they are in case if they get lost
or during an emergency and it ensure the safety of these individuals.
Many people who uses devices, systems and other services of professional does not know
how it functions and does not know the quality and safety of these things. Therefore this
makes responsibilities for the professionals (Quinn, 2012). A professional who develops GPS
enabled mobile applications and people uses GPS devices should follow codes of conduct
like BCS and ACM code of conduct to properly develop and use these technological devices.
Professionals in Iran hijacked GPS signals in order to get hold of a USA drone. The drones
software was exploited using a common bug which made it believe that it was making a land
on American airfield and not within Iran. According to an engineer from Iran GPS signals are
very easy to spoof so GPS devices are at risk (Schwartz, 2011). When taking this case into

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


consideration the Iranians are breaching the BCS code of Conduct (BCS The Chartered
Institute for IT, 2015). In the BCS code of conduct it states that under duty to the
profession professionals should enhance the professional standards by helping in
development, use and enforcement. Iranians should help in the development and
improvements of GPS signals to prevent GPS spoofing without using it to hijack drones so
simply their breaching the code of conduct. Iranians can use GPS technology for the
betterment of the society by enhancing the technology so that people can use it properly
rather than hijacking and it is the relevancy of the professions since hijacking is somewhat
away from professional practice.
Nowadays GPS technology is embedded in many tablets and smart phone and these
technological devices are used by many children. Sexual abusers and predators have the
chance to use GPS technology to track children. John Scarlett has stated that sexual predators
can use GPS enabled tablets and smartphones to track their movements so children are
vulnerable to such people (RT Question More , 2014). The devices of young children will be
hacked these predator to track the movements of them. The ACM code of conduct is breached
and under be fair and take action to discriminate it states that discrimination on the basis
of sex is breached and such behaviour will be not abided (Association for Computer
Machinery , 2015). The safety of these children is threatened by such people. Steps should be
taken to prevent children from becoming sexual preys to such sexual abusers. Parents should
switch off any location services on handheld devices and they should not let the children use
smartphones and other GPS enabled devices.
The Wall Street Journal states that Coco Cola organisation is accused by the Chinese
authority for using handheld GPS enabled gadgets to see certain parts of south western
Yunnan province (Blagdon, 2013a). However the Coca-Cola Company denies this accusation
because they used electronic maps and logistics systems which are based on customers
location in order to raise the fuel efficiency and offer improved services to the customers
(Blagdon, 2013b). These devices are commonly used by many other Chinese companies and
other global companies. When considering this case Coca Cola Company is not merely
breaching the code of conducts because they are using GPS devices for the benefit of
organisation and the customers and they are working due regard of the code of conducts.
Antoine Jone a person who was suspected for using drugs was constantly tracked by law
enforcement. GPS enabled device was attached on Jones car without a proper search warrant.

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


This causes a legal issue as law enforcements attached a GPS without the consent of Jones
and without a proper search warrant (Crump, 2011). The Fourth Amendment regulation was
breached by them. Fourth Amendment simply protects peoples rights to be secured in their
houses, papers and various effects from unwanted searches and seizures. (Iqbal & Lim,
2008). The police and other law enforcement should not neglect the use of search warrants
during searches and seizures. Sometimes law enforcements can misuse these GPS technology
and search warrants for their own personal benefits.
Location information is mainly based on the geographical location of a user. Nowadays there
are many mobile applications that gather location information of the user unknowingly to
them. For example iPhone applications Paper Toss which is a game where people can gain
point by virtually throwing a paper in to the bin and then gather the users location
information (Clark, 2011). Many mobile users arent aware of the fact that these mobile
developers and providers sell the users location information to marketing organisations. If a
Verizon wireless user browses a website using their smartphone then the data about the
visited website, demographic background and the location data will ultimately store as a data
point inside a product known as Precision Market Insight (TROIANOVSKI, 2013a). This is
where the Data Protection Act 1998 comes into consideration. This Act is merely controlling
how the information of a user is handled and provides legal rights to users who will store the
data about them (Legislation.gov.uk, 2015). These organisations use this information in the
benefit for their organisation. For example carriers know the sensitivity and valuable of the
data however the marketers needs more comprehensive data about the customers and mobile
phone carriers need to find a way to increase revenue among the growing mobile industry
(TROIANOVSKI, 2013b).The organisation states that they are not selling inormation about
the users however sells data about a set of people and Verizon company have reported that
they have given priror notice that the information could be used in a way like this. Therefore
the Data Protection Act might not be breached (TROIANOVSKI, 2013c). But how can the
users or the customer assure that the information is safe when considering security aspect of
it. Hackers or other attackers can gain unauthorised access to this organisation database and
steal users data. Therefore this is where the Computer Misuse Act can be breached.
Fuller (2014) writes to the International Business Times that legislator s are trying to limit
application developers based on the GPS technology in intention of making the roads safer
and sound.

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


The Location Privacy Protection Act 2014 forbid organisations for gathering and selling
location information from any GPS enabled device without permission of the users. However
it gave exceptions for parents so that they can track their kids for safety, law enforcement and
other emergency services (GPS.gov, 2015) .
There are many polices based on GPS technology. For example the policy GPS
Modernization supports the US leaderships based on the service, provisions and based on
utilization of satellite navigation systems (GPS.gov, 2015). International cooperation policy
indicates that USA could utilize foreign position, navigations and timing service to boost and
enhance the GPS resiliency (GPS.gov, 2015).
In conclusion GPS is a ubiquitous technology that provides support crucial infrastructure
such as transportation, communication, financial transactions, navigations and law
enforcement like the military. Most of all it has turned out to essential source for human life
and benefits in economy. Many jobs (3.3 million jobs) in United States are greatly based on
the GPS technology (Coffed, 2014 p.g 10).
GPS is an emerging and innovative technology and many applications and devices are
developed based on this technology. However these implications cause many ethical social,
professional and legal issues. In order to minimize these issues recommendations are
provided.
People should be aware of the risks and threats posed by GPS. Therefore awareness of these
threats and risks can share through social media websites like Facebook and Twitter. In public
places GPS based technological threats can be shared through posters and banner. People
should minimize turn off the location services of tablets an smartphones when they are not in
used. Keep an eye on the children who uses GPS and try limiting the access to GPS devices
by the children. Before purchasing a GPS based device people should always do a research
about that GPS device to find whether it poses any risks or threats. Professional or experts
who develop GPS devices or who stores location information should follow the code of
conduct and other Acts. Organisation should inform the employees if they are being tracked
and the reason for tracking them.
In order to keep critical devices safe, appropriate measures must be taken to stop the
interruption to GPS signals. Implementing new law and regulations based on GPS jammers
would be ideal and price of a GPS jammer should be increased. Another point is that early

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


measures can be taken to detect fake signals and to detect whether inaccurate information
about the location is provided.

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)

References

Association for Computer Machinery , 2015. Association for Computer Machinery. [Online]
Available at: https://www.acm.org/about/code-of-ethics [Accessed 10 July 2015].
Baase, S., 2012. A Gift of Fire. 4th ed. San Diego: Prentice Hall.
BCS The Chartered Institute for IT, 2015. BCS The Chartered Institute for IT. [Online]
Available at: http://www.bcs.org/category/6030 [Accessed 09 July 2015].
Blagdon,

J.,

2013.

The

Verge.

[Online]

Available

at:

http://www.theverge.com/2013/3/13/4101334/coca-cola-under-investigation-for-illegalmapping-in-china [Accessed 11 July 2015].


Carrington,

D.,

2014.

The

Guardian.

[Online]

Available

at:

http://www.theguardian.com/environment/2014/oct/15/activists-use-gps-to-track-illegalloggers-in-brazils-amazon-rainforest [Accessed 30 June 2015].


Clark,

P.,

2011.

Taylor

Wessing.

[Online]

Available

http://www.taylorwessing.com/download/article_satnav.html#.Va3Z7_kirIU

[Accessed

at:
15

July 2015].
Coffed, J., 2014. The Threats of GPS Jamming. The Threats of GPS Jamming , p.16.
Crump,

C.,

2011.

CNN.

[Online]

Available

at:

http://edition.cnn.com/2011/11/07/opinion/crump-gps/ [Accessed 15 July 2015].


Fuller,

C.,

2014.

Internationale

Business

Times.

[Online]

Available

at:

http://www.ibtimes.com/legislators-looking-limit-gps-app-developers-hopes-making-roadssafer-1603376 [Accessed 17 July 2015].


GPS.gov, 2015. GPS.gov. [Online] Available at: http://www.gps.gov/policy/legislation/gpsact/ [Accessed 15 July 2015].
GPS.gov,

2015.

GPS.gov.

[Online]

Available

at:

http://www.gps.gov/systems/gps/modernization/ [Accessed 19 July 2015].

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


GPS.gov, 2015. GPS.gov. [Online] Available at: http://www.gps.gov/policy/cooperation/
[Accessed 19 July 2015].
HALPERIN,

K.,

2007.

PC

Mag.

[Online]

Available

at:

http://www.pcmag.com/article2/0,2817,2113899,00.asp [Accessed 30 June 2015].


Iqbal, M.U. & Lim, S., 2008. Legal and Ethical Implications of GPS Vulnerabilities. Journal
of International Commercial Law and Technology, 3(3).
Legislation.gov.uk,

2015.

Legislation.gov.uk.

[Online]

Available

at:

http://www.legislation.gov.uk/ukpga/1998/29/contents [Accessed 15 July 2015].


Mack,

S.,

2015.

eHow.

[Online]

Available

at:

http://www.ehow.co.uk/list_5912431_advantages-disadvantages-gps-systems.html [Accessed
30 June 2015].
Manoharan, S., 2009. 2009 Fifth International Conference on Networking and Services. On
GPS Tracking of Mobile Devices.
Medical

Express

2015.

Medical

Express.

[Online]

Available

http://medicalxpress.com/news/2015-07-documenting-dementia-benefit-gps.html

at:

[Accessed

06 July 2015].
Mills, E., 2011. CNET. [Online] Available at: http://www.cnet.com/news/personal-safety-gpsdevice-presents-security-risk/ [Accessed 2015 June 25].
Neal,

R.W.,

2013.

Iternationale

Business

Times.

[Online]

Available

at:

http://www.ibtimes.com/gps-terrorism-hackers-could-exploit-location-technology-hijackships-airplanes-1362937 [Accessed 05 July 2015].


Quinn, M., 2012. Ethics for Information Age. 5th ed. Seatlle : Addison Wesley.
Rice, C., 2014. BBC News. [Online] Available at: http://www.bbc.com/news/technology26153506 [Accessed 30 June 2015].
RT

Question

More

2014.

RT

Question

More.

[Online]

http://www.rt.com/uk/192488-children-vulnerable-sexual-predators/

Available

[Accessed

10

at:
July

2015].

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

R.M Kumuthu Shashiprabha Rathnayake (M00542458)


Schwartz,

M.J.,

2011.

Dark

Reading.

[Online]

Available

at:

http://www.darkreading.com/attacks-and-breaches/iran-hacked-gps-signals-to-capture-usdrone/d/d-id/1101882? [Accessed 09 July 2015].


The

Canadian

Press

2013.

CBC

News.

[Online]

Available

at:

http://www.cbc.ca/news/canada/british-columbia/bosses-can-track-workers-with-gps-saysprivacy-watchdog-1.1371652 [Accessed 25 June 2015].


TROIANOVSKI,

A.,

2013.

The

Wall

Street

Journal.

[Online]

Available

at:

http://www.wsj.com/articles/SB10001424127887323463704578497153556847658
[Accessed 15 July 2015].
US Global Stat Incoporated , 2014. US Global Stat Incoporated. [Online] Available at:
http://usglobalsat.com/s-29-different-types-of-gps.aspx [Accessed 27 July 2015].

Ethical, Social, Professional and Legal Issues in Information Systems (BIS3328)

Вам также может понравиться