The Moral dimension of Information systems
Understand ethical & social issues related to systems Ethics in an information society Moral dimension of information systems
3/23/2014
IBA
4 key TECHNOLOGY TRENDS & ETHICAL ISSUES
Trend Trend Computing power doubles every 18 months Rapidly declining data storage costs Data analysis advances Impact Impact More organizations depend on computer systems for critical operations Organizations can easily maintain detailed databases on individuals Companies can analyze vast quantities of data profiles of individual to develop detailed behavior Copying data from one location to another and accessing personal data from remote locations are much easier
Networking advances and the Internet
3/23/2014
IBA
ETHICAL, SOCIAL & POLITICAL ISSUES
Ethics are the principles and practices, which guides to decide whether the action taken is morally right or wrong.
INFORMATION RIGHTS & OBLIGATIONS
POLITICAL ISSUES SOCIAL ISSUES ETHICAL ISSUES
PROPERTY RIGHTS & OBLIGATIONS
INFORMATION & TECHNOLOGY
ACCOUNTABILITY & CONTROL
INDIVIDUAL SOCIETY POLITY
SYSTEM QUALITY
3/23/2014
IBA OF LIFE QUALITY
MORAL DIMENSIONS OF THE INFORMATION AGE
Property rights and obligations
Information rights and obligations
Accountability and control Moral Dimensions of Information System
Quality of life
System quality
3/23/2014
IBA
Information Rights & Obligations
The right of an individual to protect or disclose any part of his/her information. Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations. While some information is private to a party (e.g. medical condition, bank account information), it may not be considered private to another party. E.g. Satyam scandal , Raja Spectrum
3/23/2014 IBA 6
Property rights & Obligations
INTELLECTUAL PROPERTY: Intangible creations protected by law
TRADE SECRET: is a formula, practice, process, design, instrument, pattern or compilation of information which is not generally known, by which a business can obtain an enormous economic advantage over competitors or customers. E.g. Coca cola COPYRIGHT: is a set of exclusive rights granted by the law of jurisdiction to the author or creator of an original work, including the right to copy, distribute and adapt the work. E.g. books, software PATENT: A patent is a set of exclusive rights granted by a national government to an investor or their assignee for a limited period of time in exchange for a public disclosure of an invention. E.g. medicines
3/23/2014
IBA
Geographical Indications Registry
What is a geographical indication? It is an indication or appellation of origin. It is used to identify agricultural, natural or manufactured goods. Originating in the said area. It should have a special quality or characteristics or reputation based upon the climatic or production characteristics unique to the geographical location. Examples of possible Geographical Indications in India. Some of the examples of possible Geographical Indications in India include Basmati Rice, Darjeeling Tea, Kanchipuram Silk Saree, Alphonso Mango, Nagpur Orange etc.
3/23/2014
IBA
Accountability & Control
Responsibility: Accepting the potential costs, duties, and obligations for the decisions you make. Accountability: Mechanisms for identifying responsible parties. Liability: Permits individuals (and firms) to recover damages done to them.
3/23/2014
IBA
10
QUALITY OF LIFE
Rapidity of Change: Rapidity of technological change gives businesses less time to respond or adjust to the competition Maintaining Boundaries: Family, Work, and Leisure Hard to maintain boundaries between family, work, and leisure due to a do anything anywhere environment HEALTH RISKS: REPETITIVE STRESS INJURY (RSI) COMPUTER VISION SYNDROME (CVS) TECHNOSTRESS: Irritation, hostility, impatience, enervation, fear VDT RADIATION 3/23/2014 IBA
12
Ethics in Information Society
Ethical Analysis
Identify and clearly describe the facts Define the conflict or dilemma and identify the higher order values involved
Identify the stakeholders
Identify the options that you can reasonably take Identify the potential consequences of your options
3/23/2014 IBA 14
Ethics in Information Society
Candidate Ethical Principles Golden Rule Do unto others as you would have them do unto you (Treat others as you want to be treated) Immanuel Kants Categorical Imperative If an action is not right for everyone to take, it is not right for anyone Descartes' rule of change If an action cannot be taken repeatedly, it is not right to take at all Utilitarian Principle Take the action that achieves the higher or greater value Risk Aversion Principle Take the action that produces the least harm or least potential cost Ethical no free lunch rule Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
3/23/2014 IBA 15
INFORMATION RIGHTS
PRIVACY: Right to be left alone FAIR INFORMATION PRACTICES (FIP): No secret personal records Individuals can access, amend information about them Use information only with prior consent Managers accountable for damage done by systems Governments can intervene
3/23/2014
IBA
16
U.S. FEDERAL PRIVACY LAWS
FREEDOM OF INFORMATION ACT, 1968 PRIVACY ACT OF 1974 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 COMPUTER MATCHING AND PRIVACY PROTECTION ACT OF 1988 COMPUTER SECURITY ACT OF 1987 FEDERAL MANAGERS FINANCIAL INTEGRITY ACT OF 1982
3/23/2014
IBA
17
PRIVACY LAWS AFFECTING PRIVATE INSTITUTIONS
FAIR CREDIT REPORTING ACT, 1970 FAMILY EDUCATION RIGHTS & PRIVACY ACT OF 1978 RIGHT TO FINANCIAL PRIVACY ACT OF 1978 PRIVACY PROTECTION ACT OF 1980 CABLE COMMUNICATIONS POLICY ACT OF 1984 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1997
3/23/2014
IBA
18
ACCOUNTABILITY, LIABILITY & CONTROL
ETHICAL ISSUES: Who is morally responsible for consequences of use? SOCIAL ISSUES: What should society expect and allow? POLITICAL ISSUES: To what extent should government intervene, protect?
3/23/2014
IBA
20
INTERNET CRIME & ABUSE
HACKING: Access to proprietary data JAMMING: Tie up host computer MALICIOUS SOFTWARE: Viruses disable computer SNIFFING: Intercept data passing through system, e.g. credit card data SPOOFING: Fraudulent misrepresentation
3/23/2014
IBA
21
Internet Challenges to Privacy
Cookies Tiny files downloaded by Web site to visitors hard drive Identify visitors browser and track visits to site
Allow Web sites to develop profiles on visitors
Web bugs Tiny graphics embedded in e-mail messages and Web pages
Designed to monitor who is reading message and transmit
information to another computer Spyware Surreptitiously installed on users computer May transmit users keystrokes or display unwanted ads
3/23/2014 IBA 22