You are on page 1of 9

Issues & Opinions

Four Ethical Issues of Accuracy: Who is responsibie for the authen-


ticity, fideiity and accuracy of information?
the Information Age Simiiariy, who is to be heid accountabie for
errors in information and how is the injured
party to be made whole?
Today in western societies more peopie are
empioyed collecting, handling and distribut- Property: Who owns information? What are
ing information than in any other occupation. the just and fair prices for its exchange?
Miilions of computers inhabit the earth and Who owns the channels, especially the air-
many miilions of miles of opticai fiber, wire ways, through which information is transmit-
and air waves iink peopie, their computers ted? How shouid access to this scarce re-
and the vast array of information handiing source be aiiocated?
devices together. Our society is truly an infor-
mation society, our time an information age. Accesslbiiity: What information does a per-
The question before us now is whether the son or an organization have a right or a privii-
kind of society being created is the one we ege to obtain, under what conditions and with
want. It is a question that shouid especiaily what safeguards?
concern those of us in the MIS community for
we are in the forefront of creating this new Privacy
society.
What information shouid one be required to
There are many unique chailenges we face in divuige about one's self to others? Under
this age of information. They stem from the what conditions? What information shouid
nature of information itseif. Information is the one be able to keep strictiy to one's seif?
means through which the mind expands and These are among the questions that a concern
increases its capacity to achieve its goais, for privacy raises. Today more than ever cau-
often as the resuit of an input from another tious citizens must be asking these questions.
mind. Thus, information forms the intellectuai Two forces threaten our privacy. One is the
capital from which human beings craft their growth of information technology, with its en-
iives and secure dignity. hanced capacity for surveillance, communi-
However, the building of inteilectual capital is cation, computation, storage, and retrievai. A
vuinerabie in many ways. For example, peo- second, and more insidious threat, is the in-
ple's intellectuai capitai is Impaired when- creased value of information in decision-
ever they lose their personai information with- making. Information is increasingiy vaiuabie
out being compensated for it, when they are to poiicy makers; they covet it even if acquir-
precluded access to information which is of ing it invades another's privacy.
value to them, when they have revealed infor- A case in point is the situation that occurred
mation they hoid intimate, or when they find a few years ago in Fiorida. The Florida Legis-
out that the information upon which their liv- iature believed that the state's building codes
ing depends is in error. The social contract might be too stringent and that, as a resuit,
among peopie in the information age must the taxpayers were burdened by paying for
deal with these threats to human dignity. The buildings which were underutilized. Several
ethicai issues involved are many and varied, studies were commissioned. In one study at
however, it is helpful to focus on just four. the Tallahassee Community College, moni-
These may be summarized by means of an tors were stationed at ieast one day a week in
acronym — PAPA. every bathroom.
Privacy: What information about one's seif or Every 15 seconds, the monitor observed the
one's associations must a person reveai to usage of the toilets, mirrors, sinks and other
others, under what conditions and with what facilities and recorded them on a form. This
safeguards? What things can people keep to data was subsequently entered into a data-
themselves and not be forced to reveal to base for further analyses. Of course the stu-
others? dents, faculty and staff complained bitteriy.

MIS Quarterly/March 1986 5


Issues & Opinions

feeling that this was an invasion of their was that no one knew. Later, city officials
privacy and a violation of their rights. State established rules for the computer center to
officials responded however, that the study prevent this form of invasion of privacy from
would provide valuable information for policy happening again. In light of recent proposals
making, in effect the State argued that the to develop a central federal databank con-
value of the information to the administrators sisting of fiies from most U.S. government
was greater than any possibie indignities suf- agencies, this story takes on new meaning, it
fered by the students and others. Soon the shows what can happen when a group of eager
ACLU joined the fray. At their insistence the computer operators or unscrupulous adminis-
study was stopped, but oniy after the state trators start playing around with data.
got the information it wanted.
The threat to privacy here is one that many of
Most invasions of privacy are not this drama- us don't fully appreciate. I caii it the threat of
tic or this visibie. Rather, they creep up on us exposure by minute description. It stems
slowiy as, for example, when a group of from the coliection of attributes about our-
diverse fiies relating to a person and his or seives and use of the iogicai connector
her activities are integrated into a singie large "and." For example, I may authorize one in-
database. Collections of information reveal stitution to collect information "A" about me,
intimate detaiis about a person and can there- and another institution to collect information
by deprive the person of the opportunity to "B" about me; but I might not want anyone to
form certain professionai and personal rela- possess "A and B" about me at the same
tionships. This is the ultimate cost of an inva- time. When " 0 " is added to the list of con-
sion of privacy. So why do we integrate data- junctions, the possessor of the new informa-
bases in the first place? It is because the tion will khow even more about me. And then
bringing together of disparate data makes the "D" is added and so forth. Each additional
development of new informational relation- weaving together of my attributes reveais
ships possible. These new relationships may more and more about me. in the process, the
be formed, however, without the affected par- fabric that is created poses a threat to my
ties' permission. You or. 1 may have con- privacy.
tributed information about ourseives freely to
each of the separate databases but that by it- The threads which emanate from this fore-
self does not amount to giving consent to boding fabric usuaiiy converge in personnei
someone to merge the data, especially if that fiies and in dossiers, as Aleksandr Solzhenit-
merger might reveai something else about us. syn describes in The Cancer Ward:
Consider the story that was circuiating during ". . . Every person fills out quite a few
the eariy 1970s. It's probably been embellish- forms in his iife, and each form contains
ed in the retellings but it goes something iike an uncounted number of questions. The
this, it seems that a coupie of programmers answer of just one person to one question
at the city of Chicago's computer center began in one form is already a thread linking that
matching tape files from many of the city's person forever with the local center of the
different data processing appiications on dossier department. Each person thus radi-
name and I.D. They discovered, for exampie, ates hundreds of such threads, which aii
that several high paid city empioyers had un- together, run into the miiiions. If these
paid parking fines. Boistered by this reveia- threads were visibie, the heavens wouid be
tion they pressed on. Soon they uncovered webbed with them, and if they had sub-
the names of several employees who were stance and resiiience, the buses, street-
stiil listed on the register but who had not cars and the peopie themselves would no
paid a variety of fees, a few of whom ap- longer be able to move.... They are neith-
peared in the fiies of the aicohoiic and drug er visible, nor material, but they were con-
abuse program. When this finding was ieaked stantly felt by m a n . . . .
to the public the city empioyees, of course, Constant awareness of these invisible
were furious. They demanded to know who threads naturaliy bred respect for the peo-
had authorized the investigation. The answer ple in charge of that most intricate dossier

6 MIS Quarterly/March 1986


issues & Opinions

department. It bolstered their authority." years of our life. Retrieval is impractical


and often impossible. A central data bank
removes compieteiy this safeguard. I have
The threads leading to Americans are many. every confidence that ways will be found
The United States Congress' Privacy Protec- for all of us to benefit from the great ad-
tion Commission, chaired by David F. vances of the computermen, but those
Linowes, estimated that there are over 8,000 benefits must never be purchased at the
different record systems in the files of the price of our freedom to live as individuals
federal government that contain individually with private lives . . ." [2, p. 6].
identifiable data on citizens. Each citizen, on
average, has 17 fiies in federal agencies and There is another threat Inherent in merging
administrations. Using these files, for exam- data files. Some of the data may be in error.
ple, Sociai Security data has been matched More than 60,000 state and local agencies, for
with Selective Service data to reveai draft example, provide information to the National
resisters. IRS data has been matched with Crime Information Center and it is accessed
other administrative records to tease out by law officers nearly 400,000 times a day. Yet
possible tax evaders. Federal employment studies show that over 4% of the stolen vehi-
records have been matched with delinquent cie entries, 6% of the warrant entries, and
student ioan records to identify some 46,860 perhaps as much as one haif of the local law
federal and military employees and retirees enforcement criminai history records are in
whose pay checks might be garnished. In error. At risk is the safety of the law enforce-
Massachusetts welfare officials sent tapes ment officers who access it, the effectiveness
bearing welfare recipients Social Security of the police in controlling crime, and the free-
numbers to some 117 banks to find out dom of the citizens whose names appear in
whether the recipients had bank accounts in
the fiies. This ieads to a concern for accuracy.
excess of the allowable amount. During the
first pass some 1600 potential vioiaters were
discovered. Accuracy
Misinformation has a way of fouling up peo-
Computer matching and the integration of ple's lives, especially when the party with the
data files into a central databank have enor- inaccurate IniFormation has an advantage in
mous ethical implications. On the one hand, power and authority. Consider the piight of
the new information can be used to uncover one Louis Marches. Marches, an immigrant,
criminals and to identify service requirements was a hard working man who, with his wife
for the needy. On the other hand, it provides Eiieen, finally saved enough money to pur-
powerfui politicai knowledge for those few chase a home in Los Angeles during the
who have access to it and control over it. It is 1950s. They took out a long term ioan from
ripe for privacy invasion and other abuses. Crocker National Bank. Every month Louis
For this reason many politicians have spoken Marches would walk to his neighborhood
out against centralized governmental data- bank, loan coupon book in hand, to make his
banks. As early as 1966 Representative Frank payment of $195.53. He always checked with
Horton of New York described the threat as care to insured that the teller had stamped
follows: "paid" in his book on the proper line just op-
posite the month for which the payment was
"The argument is made that a centrai data due. And he continued to do this long after
bank would use oniy the type of informa- the bank had converted to its automated loan
tion that now exists and since no new prin- processing system.
ciple is involved, existing types of safe-
guards wili be adequate. This is fallacious. One September a few years ago Marches was
Good computermen know that one of the notified by the bank that he had failed to
most practicai of our present safeguards make his current house payment. Marches
of privacy is the fragmented nature of pre- grabbed his coupon book, marched to the
sent information. It is scattered in iittie bank and, in broken English that showed
bits and pieces across the geography and traces of his old country heritage, tried to ex-

MiS Quarterly/March 1986 7


issues & Opinions

piain to the teller that this dunning notice was forecasts at ieast 100 miles out to sea. The
wrong. He had made his payment he claimed. forecasts assured him that his destination
The stamp on his coupon book proved that he area near Georges Bank, although it might
had paid. The teller punched Marches' loan get showers, was safe from the hurricane-like
number on the keyboard and reviewed the storm that the weather bureau had predicted
resuiting screen. Unfortunateiy she couidn't wouid go far to the east of his course. So he
confirm Marches' ciaim, nor subsequently kept to his course. Soon, however, his ship
could the head teller, nor the branch was engulfed in howiing winds of 80 knots
manager. When faced with a computer gen- and waves cresting at 60 feet. In the turbu-
erated screen that clearly showed that his ac- lence Gary Brown, a crew member, was
count was delinquent, this hierarchy of bank- washed overboard.
ers simply ignored the entries recorded in his
coupon book and aiso his attendant raving. The source of the fatai error was failure of a
Confused, Marches ieft the bank in disgust. large scale information system which col-
lects data from high atmosphere balloons,
In October, however, Marches dutifully went satellites, ships, and a series of buoys. This
to the bank to make his next payment. He was data is then transmitted to a National Oceano-
told that he couid not make his October pay- graphic and Atmospheric Administration
ment because he was one month in arrears. computer which anaiyzes it and produces
He again showed the teiler his stamped cou- forecasts. The forecasts, in turn, are broad-
pon book. She refused to accept it and he cast widely.
stormed out of the bank. In November he re-
turned on schedule as he had done for over 20 The forecast Peter Brown relied on when he
years and tried to make his payment again, decided to proceed into the North Atiantic
only to be told that he was now two months in was in error because just one buoy — station
arrears. And so it went until inevitabiy the 44003 Georges Bank — was out of service. As
bank foreciosed. Eiieen iearned of the foreclo- a resuit the wind speed and direction data it
sure from an overzeaious bank debt collector normaily provided were lost to the computer
while she was in bed recovering from a heart modei. This caused the forecasted trajectory
attack. She collapsed upon hearing the news of the storm to be canted by severai miles,
and suffered a near fatal stroke which , deceiving skipper Peter Brown and conse-
paralzyed her right side. Sometime during quentiy sending Gary Brown to his death.
this melee Marches, who until this time had
Among the questions this raises for us in the
done his own legai work, was introduced to
information age are these: "How many Louis
an attorney who agreed to defend him. They
Marches and Gary Browns are there out
sued the bank. Ultimateiy, after months of
there?" "How many are we creating every-
anguish, the Marches received a settiement
day?" The Marches received a iarge financial
for $268,000. All that the bank officials who
settiement; but can they ever be repaid for the
testified couid say was, "Computers make
irreparabie harm done to them and to their
mistakes. Banks make mistakes, too."
dignity? Honour Brown, Gary's widow, re-
ceived a judgment in her case; but has she
A special burden is placed on the accuracy of been repaid for the ioss of Gary? The point is
information when people rely on it for matters this: We run the risk of creating Gary Browns
of life and death, as we increasingiy do. This and Louis Marches every time we design in-
came to iight in a recent $3.2 million lawsuit formation systems and place information in
charging the National Weather Service for fail- databases which might be used to make deci-
ing to predict accurately a storm that raged sions. So it is our responsibility to be vigilant
on the southeast slope of Georges Bank in in the pursuit of accuracy in information. To-
1980. As Peter Brown steered his ship — the day we are producing so much information
Sea Fever — from Hyannis Harbor toward his about so many people and their activities that
lobster traps near Nova Scotia, he monitored our exposure to problems of inaccuracy is
weather conditions using a iong range, single enormous. And this growth in information
sideband radio capable of receiving weather also raises another issue: Who owns it?

8 MIS Quarterly/March 1986


Issues & Opinions

Property which a system of rectanguiar, punched


holes captured the weaver's skiil for directing
One of the most complex issues we face as a
the ioom's mechanical fingers and for con-
society is the question of intellectual proper-
trolling the warp and weft of the threads.
ty rights. There are substantial economic and
These Jacquard looms created a new kind of
ethical concerns surrounding these rights;
capital which was produced by disembodying
concerns revolving around the special attri-
energy and skill from the craftsmen and then
butes of information itself and the means by
reembodying it into the machines. In effect,
which it is transmitted. Any individual item of
an exchange of property took place. Weaving
information can be extremely costly to pro-
skills were transferred from the craftsman to
duce in the first instance. Yet, once it is pro-
the owner of the machines. With this techno-
duced, that information has the illusive quali-
logical innovation Lyon eventually regained
ty of being easy to reproduce and to share
its position as one of the leading silk pro-
with others. Moveover, this replication can
ducers in the world. The weavers themselves,
take place without destroying the originai.
however, suffered unemployment and degra-
This makes information hard to safeguard
dation because their craft was no longer
since, unlike tangible property, it becomes
economicaily viable. A weavers value as a
communicable and hard to keep it to one's
person and a craftsman was taken away by
self. It is even difficult to secure appropriate
the new machines.
reimbursements when somebody else uses
your information. There is undoubtedly a harbinger of things to
We currently have several imperfect institu- come in these 18th century events. As they
tions that try to protect intellectual property unfoided civilization witnessed one of the
rights. Copyrights, patents, encryption, oaths greatest outpourings of moral philosophy it
of confidentiality, and such old fashioned has as ever seen: Adam Smith's Theory of
Moral Sentiments and his Wealth of Nations:
vaiues as trustworthiness and loyalty are the
the American revolution and its ciassic docu-
most commonly used protectors of our in-
ments on liberty and freedom; the French
tellectual property. Problem issues, however,
revolution and its concern for fraternity and
stiil abound in this area. Let us focus on just
equality; John Stuart Mill and Jeremy Ben-
one aspect: artifical inteliigence and its ex- tham and their ethical call for the greatest
panding subfield, expert systems. good for the greatest number, and Immanuel
To fully appreciate our moral plight regarding Kant and his categorical imperative which
expert systems it is necessary to run back the leads to an ethicai Utopia called the "king-
clock a bit, about two hundred years, to the dom of ends." Ail of this ethical initiative took
beginnings of another society: the steam place within the historically short span of
energy-industrial society. From this vantage time of about 50 years. Common to these
point we may anticipate some of the pro- ideas was a spirit which sought a new mean-
blems of the information society. ing in human life and which demanded that a
just allocation be made of social resources.
As the industrial age unfolded in England and
Western Europe a significant change took Today that moral spirit may be welling up
place in the relationship between people and within us again. Only this time it has a dif-
their work. The steam engine replaced man- ferent provocator. Nowhere is the potential
power by reducing the level of personal physi- threat to human dignity so severe as it is in
cal energy required to do a job. The factory the age of information technology, especially
system, as Adam Smith described in his in the field of artificial intelligence. Practi-
essay on the pin factory, effectively replaced tioners of artificiai inteiligence proceed by ex-
the laborer's contribution of his energy and of tracting knowledge from experts, workers and
his skiils. This was done by means of new the knowledgeable, and then implanting it in-
machines and new organizational forms. The to computer software where it becomes capi-
process was carried even further in the tal in the economic sense. This process of
French community of Lyon. There, Joseph "disemminding" knowledge from an indivi-
Marie Jacquard created a weaving loom in duai, and subsequently "emminding" it into

MIS Quarterly/March 1986 9


issues & Opinions

machines transfers control of the property to flow of clear information through the air. How
those who own the hardware and software. Is wiii the iimited resource of bandwidth be
this exchange of property warranted? Con- aiiocated? Who will have access? This ieads
sider some of the most successfui commer- us to the fourth issue.
cial artificiai intelligence systems of the day.
Who owns, for example, the chemical knowl- Access
edge contained in DYNDREL, the medical Our main avenue to information is through
knowledge contained in MYCIN, or the geo- literacy. Literacy, since about 1500 A.D. when
logical knowledge contained in PROSPEC- the Syrians first conceived of a consonant
TOR. How is the contributor of his knowl- alphabet, has been a requirement for fuil par-
edge to be compensated? These are among ticipation in the fabric of society. Each inno-
the issues we must resoive as more intelli- vation in information handiing, from the in-
gent information systems are created. vention of paper to the modern computer, has
placed new demands on achieving literacy. In
Concern over intellectual property rights re- an information society a citizen must pos-
lates to the content of information. There are sess at least three things to be literate:
some equally pressing property rights issues
surrounding the conduits through which in- One must have the inteilectual skiiis to
formation passes. Bandwidth, the measure of deai with information. These are skiiis
capacity to carry information, is a scarce and such as reading, writing, reasoning, and
uitimately fixed commodity. It is a "com- caiculating. This is a task for education.
mons." A commons is iike an empty vessel in- One must have access to the information
to which drops of water can be placed freely technologies which store, convey and pro-
and easiiy until it fiils and overflows. Then its cess information. This includes libraries,
capacity is gone. As a resource it is finite. radios, teievisions, teiephones, and increas-
ingly, personal computers or terminals
In an age in which people benefit by the com- iinked via networks to mainframes. This is
munication of information, there is a tenden- a probiem in social economics.
cy for us to treat bandwidth and transmission Finaily, one must have access to the infor-
capacity as a commons in the same way as
mation itself. This requirement returns to
did the herdsmen in Garrett Hardin's poig-
the issue of property and is aiso a prob-
nant essay, "The Tragedy of the Commons,"
(subtitied: "The popuiation problem has no lem in social economics.
technicai solution; it requires a fundamental These requirements for iiteracy are a function
extension in morality). Each herdsman re- of both the knowledge ievel and the economic
ceived direct benefits from adding an animal level of the individuai. Unfortunateiy, for
to a pasture shared in common. As long as many people in the worid today both of these
there was plenty of grazing capacity the ieveis are currentiy deteriorating.
iosses due to the animai's consumption were
spread among them and felt only indirectly There are powerful factors working both for
and proportionaliy much iess. So each herds- and against contemporary iiteracy in our or-
man was motivated to increase his flock. In ganizations and in our society. For example,
the end, however, the commons was destroyed the cost of computation, as measured in, say
and everybody lost. doliars per MIPS (miilions of instructions per
second), has gone down exponentially since
Today our airways are becoming ciogged with the introduction of computers. This trend has
a plethora of data, voice, video, and message made technology more accessible and eco-
transmission. Organizations and individuais nomicaiiy attainabie to more peopie. However,
are expanding their use of communications corporations and other pubiic and private
because it is prof itabie for them to do so. But organizations have benefited the most from
if the soeiai checks on the expanded use of these economies. As a result, cost economies
bandwidth are inadequate, and a certain de- in computation are primarily available to mid-
gree of temperance isn't followed, we may die and upper income people. At the same
find that jamming and noise wiii destroy the time computer usage flourishes among some.

10 MiS Quarteriy/March 1986


issues & Opinions

we are creating a large group of information integrated circuits, photoelectric ceils,


poor people who have no direct access to the vacuum tubes, and ferrite cores are among
more efficient computational technology and the technological yieid of this scientific
who have iittie training in its use. theory. In a curious way quantum theory
underiies the four issues as weil. Plank's
Reflect for a moment on the soeiai effects of theory, and all that followed it, have ied us to
eiectronicaiiy stored databases. Prior to their a point where the stakes surrounding society's
invention, vast quantities of data about publi- poiicy agenda are incredibiy high. At stake
cations, news events, economic and soeiai with the use of nuciear energy is the very sur-
statistics, and scientific findings have been vivai of mankind itself. If we are unwise we
avaiiable in printed, microfilm, or microfiche wiii either biow ourseives up or contaminate
form at a reiativeiy low cost. For most of us our worid forever with nuciear waste. At stake
access to this data has been substantially with the increased use of information tech-
free. We merely went to our public or schooi nology is the quality of our lives should we, or
iibrary. The library, in turn, paid a few hundred our chiidren, survive. If we are unwise many
dollars for the service and made it avaiiable people will suffer information bankruptcy or
to whomever asked for it. Today, however, desolation.
much of this information is being converted
to computerized databases and the cost to Our moral imperative is ciear. We must insure
access these databases can run in the thou- that information technology, and the informa-
sands of doiiars. tion it handies, are used to enhance the digni-
ty of mankind. To achieve these goals we
Frequently, access to databases is gained must formulate a new social contract, one
oniy by means of acquiring a terminal or per- that insures everyone the right to fulfill his or
sonal computer. For exampie, if you want ac- her own human potential.
cess to the New Yori< Times index through the
In the new soeiai contract information sys-
Mead Corporation service you must first have
access to a terminal and communication line tems should not unduly invade a person's pri-
and then pay additional hook-up and access vacy to avoid the indignities that the students
fees in order to obtain the data. This nneans in Tallahassee suffered.
that the people who wish to use this service Information systems must be accurate to
possess severai things. First, they know that avoid the indignities the Marches and the
the database exists and how to use it. Second, Browns suffered.
they have acquired the requisite technoiogy
to access it. And third, they are able to pay Information systems should protect the via-
the fees for the data. Thus the educational biiity of the fixed conduit resource through
and economic ante is really quite high for which it is transmitted to avoid noise and
playing the modern information game. Many jamming pollution and the indignities of "The
people cannot or choose not to pay it and Tragedy of the Commons."
hence are exciuded from participating fully in
Information systems shouid protect the sanc-
our society. In effect, they become informa-
tity of intellectual property to avoid the indig-
tion "drop outs" and in the iong run will
nities of unwitting "disemmindment" of
become the source of many soeiai probiems.
knowiedge from individuals.

PAPA And information systems shouid be accessi-


bie to avoid the indignities of information il-
Privacy, accuracy, property and accessibiiity, literacy and deprivation.
these are the four major issues of information
ethics for the information age. Max Plank's This is a tall order; but it is one that we in the
1900 conception that energy was released in MiS community shouid address. We must as-
smail discrete packets called "quanta" not sume some responsibility for the soeiai con-
only gave rise to atomic theory but aiso per- tract that emerges from the systems that we
mitted the development of information tech- design and impiement. In summary, we must
nology as well. Semiconductors, transistors. insure that the flow of those little packets of

MiS Quarteriy/March 1986 11


Issues & Opinions

energy and information cailed quanta, that References


Max Plank bequeathed to us some 85 years
ago, are used to create the kind of world in [1] Solzhenitsyn, Aleksandr I., The Cancer
which we wish to iive. Ward, Dial Press, New York, New York,
1968.
[2] U.S. House of Representatives, The Com-
puter and Invasion of Privacy, U.S. Govern-
ment Printing Office, Washington D.C,
1966.

Richard 0 . Mason
Carr P. Collins Distinguished
Professor of Management
Information Sciences
Edwin L. Cox School of Business
Southern Methodist University
Daiias, Texas

12 MIS Quarterly/March 1986

You might also like