Вы находитесь на странице: 1из 2

Chapter 4 Ethical and Social Issues in Information Systems 155

LEARNING TRACK MODULES


The following Learning Tracks provide content relevant to the topics covered in this chapter:
1. Developing a Corporate Code of Ethics for Information Systems
2. Creating a Web Page

Review Summary
1. What ethical, social, and political issues are raised by information systems?
Information technology is introducing changes for which laws and rules of acceptable conduct have
not yet been developed. Increasing computing power, storage, and networking capabilities—including
the Internet—expand the reach of individual and organizational actions and magnify their impacts.
The ease and anonymity with which information is now communicated, copied, and manipulated in
online environments pose new challenges to the protection of privacy and intellectual property. The
main ethical, social, and political issues raised by information systems center around information
rights and obligations, property rights and obligations, accountability and control, system quality, and
quality of life.
2. What specific principles for conduct can be used to guide ethical decisions?
Six ethical principles for judging conduct include the Golden Rule, Immanuel Kant’s Categorical
Imperative, Descartes’ rule of change, the Utilitarian Principle, the Risk Aversion Principle, and the
ethical “no free lunch” rule. These principles should be used in conjunction with an ethical analysis.
3. Why do contemporary information systems technology and the Internet pose challenges to the
protection of individual privacy and intellectual property?
Contemporary data storage and data analysis technology enables companies to easily gather
personal data about individuals from many different sources and analyze these data to create detailed
electronic profiles about individuals and their behaviors. Data flowing over the Internet can be
monitored at many points. Cookies and other Web monitoring tools closely track the activities of Web
site visitors. Not all Web sites have strong privacy protection policies, and they do not always allow for
informed consent regarding the use of personal information. Traditional copyright laws are insufficient
to protect against software piracy because digital material can be copied so easily and transmitted to
many different locations simultaneously over the Internet.
4. How have information systems affected everyday life?
Although computer systems have been sources of efficiency and wealth, they have some negative
impacts. Computer errors can cause serious harm to individuals and organizations. Poor data quality is
also responsible for disruptions and losses for businesses. Jobs can be lost when computers replace
workers or tasks become unnecessary in reengineered business processes. The ability to own and use
a computer may be exacerbating socioeconomic disparities among different racial groups and social
classes. Widespread use of computers increases opportunities for computer crime and computer abuse.
Computers can also create health problems, such as RSI, computer vision syndrome, and technostress.

Key Terms
Ethical “no free lunch” rule, 130
Accountability, 129 Ethics, 124
Carpal tunnel syndrome (CTS), 149 Fair Information Practices (FIP), 132
Computer abuse, 145 Golden Rule, 130
Computer crime, 145 Immanuel Kant’s Categorical Imperative, 130
Computer vision syndrome (CVS), 149 Information rights, 125
Cookies, 134 Informed consent, 134
Copyright, 139 Intellectual property, 138
Descartes’ rule of change, 130 Liability, 129
Digital divide, 148 Nonobvious relationship awareness (NORA), 128
Digital Millennium Copyright Act Opt-in, 137
(DMCA), 141 Opt-out, 136
Due process, 129
156 Part One Organizations, Management, and the Networked Enterprise

P3P, 137 Safe harbor, 134


Patent, 140 Spam, 145
Privacy, 131 Spyware, 135
Profiling, 127 Technostress, 149
Repetitive stress injury (RSI), 149 Trade secret, 139
Responsibility, 129 Utilitarian Principle, 130
Risk Aversion Principle, 130 Web beacons, 135

Review Questions • Define privacy and fair information practices.


• Explain how the Internet challenges the
1. What ethical, social, and political issues are raised protection of individual privacy and intellec-
by information systems? tual property.
• Explain how ethical, social, and political • Explain how informed consent, legislation,
issues are connected and give some industry self-regulation, and technology tools
examples. help protect the individual privacy of Internet
• List and describe the key technological trends users.
that heighten ethical concerns. • List and define the three different regimes that
• Differentiate between responsibility, protect intellectual property rights.
accountability, and liability. 4. How have information systems affected every-
day life?
2. What specific principles for conduct can be used
to guide ethical decisions? • Explain why it is so difficult to hold software
services liable for failure or injury.
• List and describe the five steps in an ethical
analysis. • List and describe the principal causes of
system quality problems.
• Identify and describe six ethical principles.
• Name and describe four quality-of-life impacts
3. Why do contemporary information systems of computers and information systems.
technology and the Internet pose challenges to • Define and describe technostress and RSI and
the protection of individual privacy and intellec- explain their relationship to information
tual property? technology.

Discussion Questions Video Cases


1. Should producers of software-based services, such Video Cases and Instructional Videos illustrating
as ATMs, be held liable for economic injuries some of the concepts in this chapter are available.
suffered when their systems fail? Contact your instructor to access these videos.
2. Should companies be responsible for unemploy-
ment caused by their information systems? Why
or why not?
3. Discuss the pros and cons of allowing companies
to amass personal data for behavioral targeting.

Collaboration and Teamwork: Developing a Corporate Ethics Code


With three or four of your classmates, develop a cor- lifestyle, marital arrangements, and so forth). If pos-
porate ethics code that addresses both employee sible, use Google Sites to post links to Web pages,
privacy and the privacy of customers and users of team communication announcements, and work
the corporate Web site. Be sure to consider e-mail assignments; to brainstorm; and to work
privacy and employer monitoring of worksites, as collaboratively on project documents. Try to use
well as corporate use of information about employ- Google Docs to develop your solution and presenta-
ees concerning their off-the-job behavior (e.g., tion for the class.

Вам также может понравиться