You are on page 1of 34

GROUP REPORT ON Chapter 4: Ethical & Social Issues in the Information Systems

SANJAY KUMAR SHARMA MRIDULA KHANNA SWATI ROY RAJ NARAYAN NIRBHAY ASHWANI RAHUL DEV
SUBMITTED TO PROF. KAMAL PARSAI

ACKNOWLEDGMENT

I wish my sincere thanks to PROF. KAMAL PARSAI for giving us the opportunity to present a report on MIS. This gave us an insight how theoretical concepts are applied in organizations.

Outline

Technology Trends and the Ethical Issues The Model

Social, Ethical and Legal issues of information systems

Privacy Intellectual Property Accountability, Liability and Control System Quality Quality of Life

Key Technology Trends that Raise Ethical Issues


Technology Trend Ethical Issues

Computing Power Doubles Every - Dependence on computer systems - Processing power facilitates security 18 Months (Moors Law)
breach

Rapidly Declining Data Storage Costs Data analysis Advances Networking Advances and the Internet

Easy main individuals info

Analysis of vast quantities of data to develop detailed profiles of an individual Remote access to personal data

Non-obvious Relationship Awareness (NORA)

The Model
A model for thinking about ethical, social, and political issues Illustrates the dynamics connecting ethical, social, and political issues Identifies the moral dimensions of the information society, across individual, social, and political levels of action

The relationship between ethical, social, and political issues in an information society

ADM2372: Management Information Systems

Five moral dimensions of the information age

Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life
8

Ethics

Principles of right and wrong Can be used by individuals acting as free moral agents to make choices to guide their behavior Have been given new urgency by the use of the Internet, electronic commerce, and digital technologies

Candidate Ethical Principles

Golden Rule: Do unto others as you would have them do unto you Kants Categorical Imperative: If an action is not right for everyone to take, then it is not right for anyone Descartes rule of change: If an action cannot be taken repeatedly, then it is not right to be taken at any time Utilitarian Principle: Put values in rank order and understand consequences of various courses of action Risk Aversion Principle: Take the action that produces the least harm or incurs the least cost Ethical No Free Lunch Rule: All tangible and intangible objects are owned by creator who wants compensation for the work
10

Professional Codes of Conduct

Promises by professions to regulate themselves in the general interest of society


Promulgated by associations such as the Canadian Medical Association (CMA), the Canadian Bar Association (CBA), and the Association of Information Technology Professionals (AITP)

11

Some Real-World IT Ethical Dilemmas

Using systems to increase efficiency, causing layoffs and personal hardships Monitoring employee use of the Internet at work to increase productivity, decreasing employee privacy

12

The relationship between ethical, social, and political issues in an information society

13

Information Rights: Privacy

The right of an individual to protect or disclose any part of his/her information. Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state While some information is private to a party (e.g. medical condition, bank account information), it may not be considered private to another party. Fair Information Practices (FIP); U.S. (1973): Set of principles governing the collection and use of information; the basis of most North American and European privacy laws

14

Principles of Fair Information Practices


1.

There should be no personal record systems whose existence is secret. Individuals have right of access to systems that contain information about them. There must be no use of personal information for purposes other than those for which it was gathered. Mangers of systems are responsible and can be held accountable and liable for the damage done by systems for their reliability and security. Governments have the right to intervene in the information relationships among private parties.
15

2.

3.

4.

5.

Internet Challenges to Privacy

Cookies
Tiny files deposited on a hard drive Used to identify the visitor and track visits to the Web site How it works?

1. 2. 3. 4. 5.

User selects a web site to visit Users computer (client) sends a request to Server The server sends the web page information to client along with a data file (cookie) which contains user ID, time of visit, what user visited, etc. The users computer (client) receives the cookie and saves it on the users hard drive Next time, when users wants to visit the same web site, the server uses the cookie (available on users computer) to identify the user.

User (Client)

2 3 4

Request
cookie cookie

Server 5
16

Internet Challenges to Privacy (contd)

Web Bugs

Tiny graphic files embedded in e-mail messages and Web pages Designed to monitor online Internet user behavior

Spyware

software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers processor and storage for some task you know nothing about. Spyware is also used to call for ads from third-party servers, or to divert customers from one site to a preferred site.
17

The relationship between ethical, social, and political issues in an information society

18

Intellectual Property

Intellectual Property: Intangible property created by individuals or corporations Subject to protections under trade secret, copyright, and
patent law

Three main ways that intellectual property is protected:


Trade secret Copyright Patents

19

Trade Secret

1. 2. 3.

Intellectual work or product belonging to business, not in the public domain Supreme Court test for breach of confidence:
information conveyed must be confidential information must have been communicated in confidence information must have been misused by the party to whom it was communicated

Trademark
A sign that identifies certain goods & services Any combination of words, letters, numbers, drawings, symbols, images, or musical sounds Indefinite
20

Patent

Invention

product or a process that provides a new way of doing something or offers a new technical solution to a problem

Patent:

Legal document granting the owner an exclusive monopoly on the ideas behind an invention for 17 to 20 years. exclusive rights to make, distribute, and sell invention.

21

Challenges to Intellectual Property Rights Ethical issues

Should you copy for your own use a piece of software or other digital content that is protected by copyright, trade secret or patent?

Social issues

Current intellectual property laws breaking down

Political issues

Creation of new property protection measures

22

The relationship between ethical, social, and political issues in an information society

23

Basic concepts: Responsibility, Accountability, and Liability

Responsibility: Accepting the potential costs, duties, and obligations for decisions Accountability: Mechanisms for identifying responsible parties Liability: Permits individuals (and firms) to recover damages done to them Due process: Laws are well known and understood, with an ability to appeal to higher authorities
24

Who is Liable?

The producer of SW code? The producer of the machine who should test the code,? The organization/facility (e.g. Hospital, Bank) where the damage was done?
Ethical Issues: Who is morally responsible for consequences of use? Social Issues: What should society expect and allow? Political Issues: To what extent should government intervene and
protect?

25

Computer-Related Liability

Information Systems executives are responsible for harm done by systems developed by their staffs. When SW is a part of a machine, and the machine harms someone physically or economically, the producer of the SW and the operator can be held liable for damages. If the SW acts like a book by storing and displaying information, then it is very difficult (if not impossible) to hold SW producer liable for their products. Historically, print publishers have not been held liable in accordance with freedom of expression (with the exception of fraud and defamation) Telephone Systems have not been held liable for the messages transmitted, but Internet Service Providers (AOL, MSN, etc) can be held liable for the offensive content of the postings by their users.
26

Yahoo Case in France

Yahoo case in France in 2000, auctioning Nazirelated materials

The court ruled that even the server in the US should stop auctioning Nazi-related stuff (fine: US 10,000 per day) Advocate of freedom of speech, and the rule of the Internet as an open source media.

27

The relationship between ethical, social, and political issues in an information society

28

System Quality: Data Quality and System Errors

Three principal sources of poor system performance:

Ethical Issues: At what point to release the software/services for


consumption? What are you obliged to know about the quality of your SW?

1. SW bugs and errors (there is no perfect SW, no industry testing standards for producing SW of acceptable performance) 1. HW or facility failures 2. Poor quality of input data

Social Issues: Should people be encouraged to believe systems


are perfect?

Political Issues: Laws of responsibility and accountability.


The Standards Council of Canada sets Canadian standards, including the international ISO 9000 and ISO 14000. (penalties for failure to abide by the standards are unclear)

29

The relationship between ethical, social, and political issues in an information society

ADM2372: Management Information Systems

30

IT and Quality of Life: Equity, Access, and Boundaries

Balancing Power: Centre versus Periphery

Is IT centralizing decision-making power in the hands of a few, or is it allowing many more people to participate in decisions that affect their lives?

Rapidity of Change:

Rapidity of technological change gives businesses less time to respond or adjust to competition

Maintaining Boundaries: Family, Work, and Leisure

Hard to maintain boundaries between family, work, and leisure due to a do anything anywhere environment

Dependence and Vulnerability

we are so dependent on Info Sys that an outage can affect many aspects of our daily activities There are few regulatory standards to protect us from the failure of complex electrical, communications, and computer networks upon which we all depend.

31

Computer Crime and Abuse

Computer Crime:

Commission of illegal acts through the use of a computer or against a computer system Example: Hacking, Sniffing

Computer Abuse:

Commission of acts involving a computer that may not be illegal but are considered unethical Example: Spamming Productivity drain at work: use of computer and Internet access for non-work related purposes Question: does employer have the right to monitor employees email and internet activities?
32

IT and Quality of Life: Re-Engineering and Job Lost

Workers lose their jobs due to automation, re-engineering the workforce, and outsourcing The rapid development of the Internet has made it possible to offshore hundreds of thousands of jobs from high-wage countries to low- wage countries. Reengineering existing jobs using IT also results in few jobs (generally). While this benefits low-wage countries enormously, the costs are paid by high-wage country workers.

33

CONCLUSION

The presentation was really fruitful to us. After this report we are now able to analyze the relationship among ethical, social and political issues that are raised by IS. During the course of writing this report we were able to evaluate the impact of contemporary IS and internet and protection of individual privacy and intellectual property.

34

You might also like