You are on page 1of 31

BUS 516

Computer Information Systems


Ethical and Social Issues in
Information Systems
The dark side of big data

Predictive policing Insurance rates

Computerized hiring

Technology can be a double edged sword

2
What is ethics?

Individuals acting as free moral agents


3
Ethical, social, and political issues
raised by information systems

4
Technology trends that raise ethical issues

5
You generate digital information about
YOURSELF

6
You generate digital information about
YOURSELF

7
You generate digital information about
YOURSELF
Put together and mined properly, this information
could reveal

your credit information


your driving habits,
your tastes,
your associations,
what you read and watch,
and your political interests

8
You generate digital information about
YOURSELF

9
You generate digital information about
YOURSELF
The use of computers to combine data from multiple sources
and create digital dossiers of detailed information on
individuals is called profiling.

10
You generate digital information about
YOURSELF

11
Information Rights: Privacy and Freedom in
the Internet Age

Privacy is the claim of individuals to be left alone, free from


surveillance or interference from other individuals or organizations,
including the state.

Fair Information Practices (FIP)

Informed Consent

Digital Security Act, Bangladesh

12
Internet Challenges to Privacy
Cookies

Cookies are small text files deposited on a computer hard drive


when a user visits websites.

Cookies identify the visitor’s web browser software and track


visits to the website.

When the visitor returns to a site that has stored a cookie, the
website software searches the visitor’s computer, finds the cookie,
and knows what that person has done in the past.

It may also update the cookie, depending on the activity during the
visit. In this way, the site can customize its content for each visitor’s
interests.

13
Internet Challenges to Privacy
Cookies

14
Internet Challenges to Privacy
Cookies

Websites using cookie technology cannot directly obtain visitors’


names and addresses.

However, if a person has registered at a site, that information can be


combined with cookie data to identify the visitor.

Website owners can also combine the data they have gathered from
cookies and other website monitoring tools with personal data from
other sources, such as offline data collected from surveys or paper
catalog purchases, to develop very detailed profiles of their visitors.

15
Internet Challenges to Privacy
Web beacons / bugs

Web beacons , also called web bugs (or simply tracking files), are tiny
software programs that keep a record of users’ online clickstreams.

They report this data back to whomever owns the tracking file
invisibly embedded in e-mail messages and web pages that are
designed to monitor the behavior of the user visiting a website or
sending e-mail.

Web beacons are placed on popular websites by third-party firms who


pay the websites a fee for access to their audience.

16
Internet Challenges to Privacy
Web beacons / bugs

50 sites

3,180
5 times
17
Internet Challenges to Privacy
Web beacons / bugs

18
Internet Challenges to Privacy
Spyware

Spyware can secretly install itself on an Internet user’s computer by


piggybacking on larger applications.

Once installed, the spyware calls out to websites to send banner


ads and other unsolicited material to the user, and it can report
the user’s movements on the Internet to other computers.

19
Internet Challenges to Privacy

20
Internet Challenges to Privacy
A recent study found that 88 percent of 400,000 websites had at
least one Google tracking bug.

21
Internet Challenges to Privacy

Opt out model X

Opt in model √

22
Internet Challenges to Privacy
Technical Solutions

23
Property Rights: Intellectual Property

24
Challenges to Intellectual Property Rights

Global Software Piracy rate in 2015

39%
Music Books Video

25
Computer-Related Liability Problems
Who is liable for any economic harm caused to individuals or
businesses whose credit cards were compromised?

Are information system managers responsible for the harm that


corporate systems can do?

If a computer software is part of a machine, and the machine injures


someone physically or economically, can the producer of the software
and the operator be held liable for damages?

What about software as a service? ATMs?

26
System Quality: Data Quality and
System Errors

December 24, 2012

27
System Quality: Data Quality and
System Errors

What is an acceptable, technologically feasible


level of system quality?

At what point should system managers say, “Stop testing,


we’ve done all we can to perfect this software. Let’s go
live!”

What if the product was not offered on the marketplace?


Would social welfare as a whole falter and perhaps even
decline?

28
System Quality: Data Quality and
System Errors
Three principal sources of poor system performance are -

(1) software bugs and errors,

(2) hardware or facility failures caused by natural or other


causes,

(3) poor input data quality

Few companies routinely measure the quality of their


data, but individual organizations report data error
rates ranging from 0.5 to 30 percent.

29
Quality of Life: Equity, Access, and
Boundaries

Balancing Power: Center Versus Periphery

Rapidity of Change: Reduced Response Time to


Competition

Maintaining Boundaries: Family, Work, and


Leisure

Dependence and Vulnerability

30
Quality of Life: Equity, Access, and
Boundaries

Computer Crime and Abuse

Equity and Access: Increasing Racial and Social


Class Cleavages

Health Risks: RSI, CVS, and Cognitive Decline

31

You might also like