Вы находитесь на странице: 1из 17

The Moral dimension of Information systems

Understand ethical & social issues related to systems Ethics in an information society Moral dimension of information systems

3/23/2014

IBA

4 key TECHNOLOGY TRENDS & ETHICAL ISSUES


Trend Trend Computing power doubles every 18 months Rapidly declining data storage costs Data analysis advances Impact Impact More organizations depend on computer systems for critical operations Organizations can easily maintain detailed databases on individuals Companies can analyze vast quantities of data profiles of individual to develop detailed behavior Copying data from one location to another and accessing personal data from remote locations are much easier

Networking advances and the Internet

3/23/2014

IBA

ETHICAL, SOCIAL & POLITICAL ISSUES


Ethics are the principles and practices, which guides to decide whether the action taken is morally right or wrong.
INFORMATION RIGHTS & OBLIGATIONS
POLITICAL ISSUES SOCIAL ISSUES ETHICAL ISSUES

PROPERTY RIGHTS & OBLIGATIONS

INFORMATION & TECHNOLOGY

ACCOUNTABILITY & CONTROL

INDIVIDUAL SOCIETY POLITY

SYSTEM QUALITY

3/23/2014

IBA OF LIFE QUALITY

MORAL DIMENSIONS OF THE INFORMATION AGE


Property rights and obligations
Information rights and obligations

Accountability and control Moral Dimensions of Information System

Quality of life

System quality

3/23/2014

IBA

Information Rights & Obligations


The right of an individual to protect or disclose any part of his/her information. Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations. While some information is private to a party (e.g. medical condition, bank account information), it may not be considered private to another party. E.g. Satyam scandal , Raja Spectrum
3/23/2014 IBA 6

Property rights & Obligations


INTELLECTUAL PROPERTY: Intangible creations protected by law

TRADE SECRET: is a formula, practice, process, design, instrument, pattern or compilation of information which is not generally known, by which a business can obtain an enormous economic advantage over competitors or customers. E.g. Coca cola COPYRIGHT: is a set of exclusive rights granted by the law of jurisdiction to the author or creator of an original work, including the right to copy, distribute and adapt the work. E.g. books, software PATENT: A patent is a set of exclusive rights granted by a national government to an investor or their assignee for a limited period of time in exchange for a public disclosure of an invention. E.g. medicines

3/23/2014

IBA

Geographical Indications Registry


What is a geographical indication? It is an indication or appellation of origin. It is used to identify agricultural, natural or manufactured goods. Originating in the said area. It should have a special quality or characteristics or reputation based upon the climatic or production characteristics unique to the geographical location. Examples of possible Geographical Indications in India. Some of the examples of possible Geographical Indications in India include Basmati Rice, Darjeeling Tea, Kanchipuram Silk Saree, Alphonso Mango, Nagpur Orange etc.

3/23/2014

IBA

Accountability & Control


Responsibility: Accepting the potential costs, duties, and obligations for the decisions you make. Accountability: Mechanisms for identifying responsible parties. Liability: Permits individuals (and firms) to recover damages done to them.

3/23/2014

IBA

10

QUALITY OF LIFE
Rapidity of Change: Rapidity of technological change gives businesses less time to respond or adjust to the competition Maintaining Boundaries: Family, Work, and Leisure Hard to maintain boundaries between family, work, and leisure due to a do anything anywhere environment HEALTH RISKS: REPETITIVE STRESS INJURY (RSI) COMPUTER VISION SYNDROME (CVS) TECHNOSTRESS: Irritation, hostility, impatience, enervation, fear VDT RADIATION 3/23/2014 IBA

12

Ethics in Information Society


Ethical Analysis
Identify and clearly describe the facts Define the conflict or dilemma and identify the higher order values involved

Identify the stakeholders

Identify the options that you can reasonably take Identify the potential consequences of your options
3/23/2014 IBA 14

Ethics in Information Society


Candidate Ethical Principles Golden Rule Do unto others as you would have them do unto you (Treat others as you want to be treated) Immanuel Kants Categorical Imperative If an action is not right for everyone to take, it is not right for anyone Descartes' rule of change If an action cannot be taken repeatedly, it is not right to take at all Utilitarian Principle Take the action that achieves the higher or greater value Risk Aversion Principle Take the action that produces the least harm or least potential cost Ethical no free lunch rule Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
3/23/2014 IBA 15

INFORMATION RIGHTS
PRIVACY: Right to be left alone FAIR INFORMATION PRACTICES (FIP): No secret personal records Individuals can access, amend information about them Use information only with prior consent Managers accountable for damage done by systems Governments can intervene

3/23/2014

IBA

16

U.S. FEDERAL PRIVACY LAWS


FREEDOM OF INFORMATION ACT, 1968 PRIVACY ACT OF 1974 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 COMPUTER MATCHING AND PRIVACY PROTECTION ACT OF 1988 COMPUTER SECURITY ACT OF 1987 FEDERAL MANAGERS FINANCIAL INTEGRITY ACT OF 1982

3/23/2014

IBA

17

PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS


FAIR CREDIT REPORTING ACT, 1970 FAMILY EDUCATION RIGHTS & PRIVACY ACT OF 1978 RIGHT TO FINANCIAL PRIVACY ACT OF 1978 PRIVACY PROTECTION ACT OF 1980 CABLE COMMUNICATIONS POLICY ACT OF 1984 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1997

3/23/2014

IBA

18

ACCOUNTABILITY, LIABILITY & CONTROL

ETHICAL ISSUES: Who is morally responsible for consequences of use? SOCIAL ISSUES: What should society expect and allow? POLITICAL ISSUES: To what extent should government intervene, protect?

3/23/2014

IBA

20

INTERNET CRIME & ABUSE


HACKING: Access to proprietary data JAMMING: Tie up host computer MALICIOUS SOFTWARE: Viruses disable computer SNIFFING: Intercept data passing through system, e.g. credit card data SPOOFING: Fraudulent misrepresentation

3/23/2014

IBA

21

Internet Challenges to Privacy


Cookies Tiny files downloaded by Web site to visitors hard drive Identify visitors browser and track visits to site

Allow Web sites to develop profiles on visitors


Web bugs Tiny graphics embedded in e-mail messages and Web pages

Designed to monitor who is reading message and transmit


information to another computer Spyware Surreptitiously installed on users computer May transmit users keystrokes or display unwanted ads
3/23/2014 IBA 22

Вам также может понравиться