You are on page 1of 5

SKSBM

1

Ethical and Social Issues in Information Systems

Ethics is defined as the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours. Ethical issues have become more prominent because of the evolution of information systems. Ethical, social, and political issues are closely connected in an information society. When one area is disturbed it causes an effect on the other two areas. These issues raised by information systems canter around five moral dimensions: information rights and obligations, property rights and obligations, accountability and control, system quality, and quality of life.

Responsibility, accountability, and liability are the basic concepts that form the foundation of an ethical analysis of information systems. In order to analyze a potential ethical situation, the following five-step process is helpful. First the facts must be clearly identified and described. Next the issue should be defined and the higher-order values involved identified. Third the stakeholders must be

identified. Then the options that can be reasonable taken are identified. Last identify potential consequences of one’s options.

Once the analysis of the possible ethical situation is complete, several specific principles for conduct can be used to guide in the ethical decision. These include the Golden Rule, Immanuel Kant’s Categorical Imperative, Descartes’ rule of change, the Utilitarian Principle, the Risk Aversion Principle, and the ethical “no free lunch” rule.

Several privacy laws have been developed over the years to protect individuals and firms who use information systems. The Privacy Act of 1974 has been the most important because it regulates the federal government’s collection, use, and disclosure of information. Other federal privacy laws have been put in place to handle areas such as credit reporting, education, financial records, newspaper records, and
1|Page

Cookies. and European privacy laws. As computer users access information. for preventing computers from accepting cookies.SKSBM electronic communications. This is due to the ease of copying or distributing computerized information on networks. 2|Page . and storing communications that pass through it. One such tool is the Platform for Privacy Preferences which is used to enable automatic communication of privacy policies between a Web site and its visitors. Due to the weak or lack of privacy protection policies. and for detecting and eliminating spyware. capturing. Another challenge faced by Internet users is the existing laws and social practices that protect private intellectual property. federal laws apply only to the federal government. The use of the Internet has opened up a challenge to protect an individual’s privacy. individuals are not always informed on their use of the user’s personal information.S. Trade secret laws protect the actual ideas in a work product.S. The rise of the use of the Internet and other electronic networks has made it more difficult to protect intellectual property. and spyware are types of information that can be secretly put onto one’s computer to track their browsing activity. Each network it passes through is capable of monitoring. Patents grant the owner an exclusive monopoly on the ideas behind an invention for 20 years. it is sent over many networks before reaching its final destination. Copyright protects the creators of intellectual property from having their work copied by others for any purpose for a minimum of 70 years. Most U. New technologies are now available to protect user privacy during Web use. web beacons. Fair Information Practices (FIP) was set forth to govern the collection and use of information about individuals and forms the basis of most U. They are used for encrypting e-mail and making surfing activities appear anonymous.

increase in computer crime and abuse. and political institutions. and the increase of health risks. societies.g. they also hold many challenges. and techno stress. 2 Different Ways to Overcome From Ethical and Social Issues in Information Systems Technical solutions The Platform for Privacy Preferences (P3P) • Allows Web sites to communicate privacy policies to visitor’s Web browser – user • User specifies privacy levels desired in browser settings • E. computer errors can cause serious harm to individuals and organizations. In addition. Poor data quality is also to blame for disruptions and losses for businesses. work. and leisure.SKSBM Information technologies are also challenging existing liability laws and social practices for holding individuals and institutions accountable. Some of the negative consequences include the balancing power between centralizing and decentralizing computing and decision making. Although information technologies hold many benefits to the quality of life of individuals. such as repetitive stress injury. maintaining boundaries between family. computer vision syndrome. the increase of racial and social class split. “medium” level accepts cookies from first party host sites that have opt-in or opt-out policies but rejects third-party cookies that use personally identifiable information without an opt-in policy. reduced response time to competition due to the more efficient global marketplace. loss of jobs. dependability on information systems and vulnerability if they fail. 3|Page . Negative social consequences can be extremely harmful to individuals.

g. not in the public domain 2. Liability. Internet) • Difficulty in classifying software • Compactness • Difficulties in establishing uniqueness Digital Millennium Copyright Act (DMCA) Makes it illegal to circumvent technology-based protections of copyrighted materials Accountability. Trade secret: Intellectual work or product belonging to business. Copyright: Statutory grant protecting intellectual property from being copied for the life of the author. software producer and operator may be liable – If seen as similar to book. books) • Ease of replication Ease of transmission (networks. difficult to hold author/publisher responsible –What should liability be if software seen as service? Would this be similar to telephone systems not being liable for transmitted messages? 4|Page . Control Computer-related liability problems • If software fails. plus 70 years 3.SKSBM Property rights: Intellectual property Intellectual property: Intangible property of any kind created by individuals or corporations Three main ways those protect intellectual property 1. Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years Challenges to intellectual property rights Digital media different from physical media (e. who is responsible? – If seen as part of machine that injures or harms.

personal time • Dependence and vulnerability: Public and private organizations ever more dependent on computer systems 30 © P Computer crime and abuse Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime – Computer abuse: Unethical acts. errors • Hardware or facility failures • Poor input data quality (most common source of business system failure) Quality of life: Equity. and boundaries Negative social consequences of systems • Balancing power: Although computing power decentralizing. access. infringes on family. not illegal • Spam: High costs for businesses in dealing with spam Employment: – Reengineering work resulting in lost jobs • Equity and access – the digital divide: – Certain ethnic and income groups in the United States less likely to have computers or Internet access 5|Page . key decisionmaking remains centralized • Rapidity of change: Businesses may not have enough time to respond to global competition • Maintaining boundaries: Computing.SKSBM System Quality: Data Quality and System Errors what is an acceptable. Internet use lengthens work-day. technologically feasible level of system quality? • Flawless software is economically unfeasible – Three principal sources of poor system performance: • Software bugs.