Free Essay

Information System Ethics Notes

In:

Submitted By krh421
Words 983
Pages 4
Chapter 11 Ethical and Social Issues 11.1. Understanding Ethical and Social Issues related to Systems * Ethics: principles of right and wrong that individuals use to make choices to guide their behaviour. IS creates opportunities for intense social change, threatening existing distributions of power, money, rights and obligations. * Internet and digital firm techs make it easier to assemble, integrate and distribute info, unleashing new concerns about appropriate use of customer info, protection of personal privacy and protection of intellectual property * Other issues: establishing accountability, setting standards to safeguard system quality, and preserving values and institutions * 5 moral dimensions of the info age * Info rights and obligations individuals/firms possess in respect to themselves * Privacy – Claim of individuals to be left alone, free from surveillance/interference from other individuals, organizations, or the state; claim to be able to control info about yourself * Privacy in public spaces * Data storage & exchange * Laws & expectations in US Vs. EU & Australia * Protecting traditional intellectual property rights in digital society * Who is held accountable and liable for harm done to info and property rights * System quality: standards of data and system quality to protect individual rights * Quality of life: preservation of values in an info and knowledge based society * 4 technological trends of concern * Computing power doubles every 18 months
Increased reliance on, and vulnerability to, computer sys * Data storage costs rapidly declining
Multiplying database on individuals * Data analysis advances
Greater ability to find detailed personal info on individuals * Networking advanced and the Internet
Enables moving and accessing large quantities or personal data

* Software errors cause losses in productivity. Major problem is the presence of bugs. * Main source of bugs in the complexity of decision-making code * Flaws in software create security vulnerabilities that open networks to intruders

11.2. Ethics in an Information Society * Responsibility – accept the potential costs, duties and obligations for decisions made * Accountability – feature of systems and social institutions, means that mechanisms are in place to determine who took responsible action and who is responsible * Liability – feature of political system in which body of laws is in place that permits individuals to recover the damages done to them by other actors, systems or organisations * Due process – laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly * Ethical analysis * Identify and describe clearly the facts * Define the conflict or dilemma and identify the higher-order value involved * Identify the stakeholders * Identify options that you can reasonably value – arriving at an ethical solution may not always be a balancing of consequences to stakeholders * Candidate ethical principles * Golden rule – thinking of yourself as the object of the decision * Immanuel Kant’s Categorical Imperative – action is not right not everyone to take, it is not right for anyone * Descartes’ rule of change – if action cannot be taken repeatedly, it is not right to take at all * Utilitarian principle – take the action that achieves the higher or greater value * Risk Aversion principle – take action that produces least harm or least potential cost * Ethical “no free lunch” rule – assume that all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise * When people claim to be professionals, they take on special rights and obligations as they have special claims to knowledge, wisdom and respect. * Dilemmas: employees displaced by IS may argue that employers have some responsibility for their welfare. Business owners might feel obligated to monitor employee email and Internet use to minimise drains on productivity.

11.3. Moral Dimensions of IS * Privacy: claim on individuals to be left alone, free from surveillance or interference from other individuals or organisations * Fair info practices (FIP): based on mutuality of interest between record holder and the individual. Once record is gathered, it may not be used to support other activities without individual’s consent. * Privacy protection for consumers of financial services – all FIs are required to disclose their policies and practices for protecting the privacy of non-public personal info and to allow customers to opt out of info-sharing arrangements with non-affiliated 3rd parties * Informed consent: consent given with knowledge of all the facts needed to make rational decisions * Safe harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of govt regulators but does not involve govt regulation or enforcement * Challenges to privacy: * Cookies identify the visitor’s Web browser software and track visits to the web site. * Web beacons are tiny objects invisibly embedded in email messages and Web pages that monitor the behaviour of user visiting a website or sending email. * Spyware can secretly install itself on an Internet user’s computer by piggybacking on larger applications. Once installed, the spyware calls out to websites to send banner ads and other unsolicited material to the user, and it can also report the user’s movements on the Internet to other computers. * P3P provides a standard for communicating a website’s privacy policy to Internet users and for comparing that policy to the user’s preferences or to other standards. Users can use P3P to select the level of privacy they wish to maintain

* Intellectual property (IP) * Trade secret laws grant a monopoly on the ideas behind a product. Software that contains novel or unique elements, procedures or compilations can be included as a trade secret. * Copyright: statutory grant that protects creators of IP from having their work copied by others for any purpose * Patent grants the owner an exclusive monopoly on ideas behind an invention for 20 years. * Computer abuse: commission of acts involving a computer that may not be illegal but that are considered unethical * Digital millennium Copyright Act (DMCA) makes it illegal to circumvent technology-based protections of copyrighted materials. ISPs are required to take down sites of copyright infringers. * Redesigning of biz processes cause millions of mid-level managers and clerical workers to lose their jobs

Similar Documents

Premium Essay

Dsfsdfd

...Organizational Structure Template |Name William Phillips |Date Completed 11/30/2014 | Purpose and Overview The purpose of this assignment is to help you prepare for successful, enjoyable participation in a positive team experience for Units 8–10. In this assignment, you will research and compose descriptions of a fictitious anonymous company's five functional areas. Further, you will explore organization’s code of ethics and executive summaries of reports to understand what they are and how to compose them. Your main task is to develop a broad overview of the mission and purpose to be prepared to participate in the team activity for Unit 8. Note: Your assigned role for the team is not needed or related to this assignment. As you complete this assignment on this template, refer to information provided in the unit 7 studies. Specifically, utilize these provided resources and perform research to satisfactorily complete this assignment. • Teamwork Activity Challenge. • Organizational Structure reading. • Functional Areas Managers reading. Important: This assignment is due Sunday of week 7. Learners completing it on time will be performing Unit 8 as part of a team. Learners without a successful, timely assignment cannot be on a team. Important: Utilize paragraph structure in your document, not outline format, and support your ideas with...

Words: 2610 - Pages: 11

Free Essay

Phl/323

...due, please remember this syllabus is considered to be the ruling document. [pic] Course Information COURSE NUMBER: PHL 323 COURSE TITLE: Ethics in Management COURSE START DATE: 3/9/2010 COURSE END DATE: 4/12/2010 |Required Text: |Nelson, K., & Trevino, L. (2004). Managing business ethics: Straight talk about how to do it | | |right (3rd ed.). New York: Wiley | | |Note: All materials can be found on the [pic] course page. The [pic]page can be accessed | | |through the University of Phoenix Student and Faculty Web site at http://ecampus.phoenix.edu | |Electronic Resources: |View the Electronic Reserve Readings page in [pic] for selected articles. | | |University Library Electronic Reserve Readings (ERR) (2004). Retrieved May 1st, 2004, from | | |University of Phoenix Library. Weekly Electronic Reserve Readings can be located on the | | |[pic] page for this course. | [pic] Facilitator Information Penny E. Hylton, Ph.D., MBA phylton@email .phoenix.edu (University of Phoenix) pennye98@yahoo...

Words: 1974 - Pages: 8

Premium Essay

Accounting Information Sytem

...reliable financial information needed to support all fiscal and budget management, decisionmaking, and reporting processes. The diagnostic questionnaires that were used in this assessment collected information on the current arrangements and the apparent gaps in Maldives for accounting laws and regulations; education and training of public sector accountants; application of a code of conduct; and numbers and characteristics of public sector accountants. (1) Accounting Laws and Regulations 6. The Public Finance Act and the Financial Regulations are prescriptive about the maintenance and compilation of accounts but make no mention of International Accounting Standards. The Public Finance Act (see Annex C) should require conformance with International Public Sector Accounting Standards (IPSAS). However, under the Public Finance Act, there are proposed rules that would promulgate the allowance of IPSAS to be followed. The future accounts should be based on Cash Basis IPSAS with notes providing other information on assets, liabilities, and contingent liabilities as required by the Public Finance Act. Progression to accrual-based statements would occur as adequate computerized accounting systems are rolled out. 7. A modern financial reporting framework is required for better accountability. The accounting function has been located in the Treasury. However, this has not provided a good separation of duties among departments. As new computerized public accounting systems are implemented...

Words: 1667 - Pages: 7

Premium Essay

Case Study About Moral of Hacking

...Contemporary Practices in Information Technology 7WCM0005/7WCM0006 (SDL) Case Study - Coursework 1 The morality of hacking - Gary McKinnon – Did he break the British Computer Society Code of Conduct? Gary McKinnon was a Scottish Systems Administrator who in 2002 was accused of carrying out the “biggest military computer hack of all time”. McKinnon claimed that he was merely looking for evidence of a cover-up of Unidentified Flying Objects (UFO) activities. The US authorities claimed that McKinnon deleted files from US military operating systems which led to a shut-down of military computers. Some sources claim that what McKinnon did was a harmless incident whereas others regard it as a serious attack on US computer systems. Coursework Research the case of Garry McKinnon and present your arguments for and against the hacking activities of Gary McKinnon following the three sections below. Give your own conclusion as to whether Gary McKinnon acted ethically or not and whether he broke the BCS code of conduct. Our methodology for the evaluation of moral problems in Unit One of the module was to evaluate a moral problem from the point of view of Kantianism, Act Utilitarianism, Rule Utilitarianism, and Social Contract theory. (For example in the Case Study from page 78-79.) Another way to evaluate information technology-related moral problems is to make use of a software code of ethics and professional practice as dealt with in Unit 2 in the module. From page 363 in...

Words: 697 - Pages: 3

Premium Essay

Course Outline

...Introduction Overview The skills and knowledge measured by performance assessment VLT2 are derived from a survey of information security professionals from around the world and are also based on the many different information security and assurance frameworks (ISO 27001/2, COBIT, ITL, etc.). The results of this survey were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content. The Security Policy and Standards subdomain focuses on creating organizational security activities and policies; assessing information security risk; and implementing and auditing information security management programs, information assurance certification programs, and security ethics. Watch the following video for an introduction to this course: Competencies This course provides guidance to help you demonstrate the following 3 competencies: Competency 427.3.2: Controls and Countermeasures The graduate evaluates security threats and identifies and applies security controls based on analyses and industry standards and best practices. Competency 427.3.3: Security Audits The graduate evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices. Competency 427.3.4: Certifications and Accreditations The graduate identifies and discusses the Information Assurance certification and accreditation (C&A) process. Course Mentor Assistance As you prepare to successfully...

Words: 4354 - Pages: 18

Premium Essay

Acca Paper P1 Notes

... Risk & Ethics Please spread the word about OpenTuition, so that all ACCA students can benefit. ONLY with your support can the site exist and continue to provide free study materials! Visit opentuition.com for the latest updates watch the free lectures that accompany these notes; attempt free tests online; get free tutor support, and much more. OpenTuition Lecture Notes can be downloaded FREE from http://opentuition.com Copyright belongs to OpenTuition.com - please do not support piracy by downloading from other websites. r The best things in life are free IMPORTANT!!! PLEASE READ CAREFULLY To benefit from these notes you must watch the free lectures on the OpenTuition website in which we explain and expand on the topics covered In addition question practice is vital!! You must obtain a current edition of a Revision / Exam Kit from one of the ACCA approved content providers they contain a great number of exam standard questions (and answers) to practice on. You should also use the free “Online Multiple Choice Tests” and the “Flashcards” which you can find on on the OpenTuition website. http://opentuition.com/acca/ December 2015 Examinations ACCA P1 1 Content 1. Corporate Governance 2. Approaches to Corporate Governance 11 3. The Board of Directors 19 4. Board committees 37 5. Corporate Governance and Corporate Social Responsibility 49 6. Corporate governance – control systems 57 ...

Words: 27873 - Pages: 112

Free Essay

Bsbrsk501

...Government policy. Steps in the decision making process: 1. Establish goals. 2. Gather available information on alternatives. 3. Determine consequences of alternatives. 4. Choose a course of action. In a complex society decision makers have to rely on data supplied by specialists. The accountant (as a specialist): o Is involved in steps 2 and 3 of the decision making process; o To offer advice regarding step 4; and o To measure the outcomes or consequences of the decision-making process. 2. Accounting Defined  “The process of o Identifying - observing economic events and determining which of those events represents economic activities relevant to a particular business; o Measuring; o Recording – classification and summarisation; and o Communicating – preparing and distributing accounting reports economic information to permit informed judgements and economic decisions by users of the information”. 3. Users of Accounting Information    The first objective of accounting is to provide information in reports which can be used by internal and external decision makers. Internal decision makers (Management Accounting): o Information is presented to management in the form of special-purpose financial reports. o Special-purpose financial reports are prepared for users who have specialised needs and who possess authority to obtain information to meet those needs. External decision makers (Financial Accounting): o...

Words: 800 - Pages: 4

Premium Essay

Fraud

...The Role of Accounting in the Medical Office By Joy Hicks Medical Office Expert An accounting department plays an enormous role within the medical office. As the backbone of the organization, the accounting department allows the organization to operate at its fullest potential. Without an accounting department, it would be impossible for any type of organization to operate in a cost effective manner. General Accepted Accounting Principles (GAAP) are the common set of accounting principles, standards and procedures that companies use to compile their financial statements. GAAP, are simply put, the customarily accepted ways of recording and reporting accounting information. Each organization may operate differently but all have to follow by set guidelines within the organizations community, state and at the federal level. If these standards and procedures are not followed the U.S. Security and Exchange Commission (SEC) will fine the organization and possibly pursue criminal action to enforce compliance. Within accounting and financial management, there are four key elements recognized. The four elements are: Planning, Controlling, Organizing and Directing and Decision Making. The planning element allows an organization to set forth goals and guidelines to ensure the future success and accomplishments of the medical office. Controlling provides the organization the opportunity to ensure that all areas within the organization are following the previous planned...

Words: 1587 - Pages: 7

Premium Essay

Zdckakcj; Zc

...Management Business Ethics HM 04/28 Module Handbook 2011-2012 Module Leader: Rakesh Katyayani Email: rakesh.katyayani@tajhotels.com rakesh.katyayani @ihma.ac.in HM 04 / 28 Business Ethics Introduction: This module examines the values and value conflicts inherent in the modern practices of the business world, investigates the major philosophical issues that challenge the conduct of ethics as a rational enterprise, exposes students to major traditions in philosophical normative ethics and applies those traditions to specific value conflicts in the business world. A critical thinking component is included in the course. Specific problems relating to topics such as corporate responsibility, employee rights, and the nature of the free enterprise system, environmental concern and ethical business practices. In deciding how to act, managers reveal their inner values, test their commitment to those values, and ultimately shape their characters. In general, Ethics is both an academic “subject” and a thoughtful way of doing things.  Theoretical Ethics is that branch of Philosophy concerned with determining what is right (with regard to principles and actions) and what is good (what ends or ideals are worth pursuing and what values are worth holding).  Practical Ethics is the art or techne (know-how) of figuring out how to make things better rather than worse with regard to concrete or actual situations.  Business Ethics is a type of applied ethics.  As such, it is concerned...

Words: 3480 - Pages: 14

Free Essay

Bsbrsk501

...Government policy. Steps in the decision making process: 1. Establish goals. 2. Gather available information on alternatives. 3. Determine consequences of alternatives. 4. Choose a course of action. In a complex society decision makers have to rely on data supplied by specialists. The accountant (as a specialist): o Is involved in steps 2 and 3 of the decision making process; o To offer advice regarding step 4; and o To measure the outcomes or consequences of the decision-making process. 2. Accounting Defined  “The process of o Identifying - observing economic events and determining which of those events represents economic activities relevant to a particular business; o Measuring; o Recording – classification and summarisation; and o Communicating – preparing and distributing accounting reports economic information to permit informed judgements and economic decisions by users of the information”. 3. Users of Accounting Information    The first objective of accounting is to provide information in reports which can be used by internal and external decision makers. Internal decision makers (Management Accounting): o Information is presented to management in the form of special-purpose financial reports. o Special-purpose financial reports are prepared for users who have specialised needs and who possess authority to obtain information to meet those needs. External decision makers (Financial Accounting): o...

Words: 800 - Pages: 4

Premium Essay

Engineer

...KNOWLEDGE & LEARNING  Earlier this year, Texas Tech University’s National Institute for Engineering Ethics released an ethics dvd entitled Henry’s Daughters. This 32-minute film dramatizes a case study involving numerous ethical dilemmas and concerns and is supplemented by discussion questions and other training materials designed to make the dvd an effective educational tool. This month’s column focuses on one of the situations depicted in Henry’s Daughters and explores the questions it raises from the perspective of ASCE’s Code of Ethics.  SITUATION: A state department of transportation (DOT) has awarded two grants for the purpose of funding a yearlong “smart highway” research and development project. The project is organized as a competition between the two recipients; each is to prepare design specifications for an automated highway and car control system, and at the end of the year the DOT will award one recipient a $25-million contract to implement its design. To ensure the integrity of the competition and to protect each team’s intellectual property, the four DOT staff members assigned to this project are split equally between the grant recipients, each staff member providing help and input only to his or her team.  Laura, a licensed professional engineer, is the project manager for the DOT’s smart highway project; her responsibilities include overseeing the four staff members assigned to the grant recipients as well as making recommendations to the DOT commissioner...

Words: 1936 - Pages: 8

Premium Essay

Business

...learn how a person working in your selected industry meets the challenges of current compliance requirements. It is not necessary to address all aspects of compliance in this industry or selected company. Rather, you should educate yourself in broad terms about the kinds of governmental and industry standards covering your interviewee's business, then select a few key aspects to explore in depth with your research and your interviewee. As you learn about the current state of regulatory affairs in this industry, you should gain insight about the current and future compliance activities in that industry. Additionally, this assignment is designed to inform you about emerging careers in compliance and ethics. You will visit several websites that provide a glimpse into the field of ethics and...

Words: 4325 - Pages: 18

Premium Essay

Mis 513 Chapter1

...digital world and the advent of the information age. Define globalization, describe how it evolved over time, and describe the key drivers of globalization. Explain what an information system is, contrasting its data, technology, people, and organizational components. Describe the dual nature of information systems in the success and failure of modern organizations. Describe how computer ethics impact the use of information systems and discuss the ethical concerns associated with information privacy and intellectual property. CHAPTER OVERVIEW This chapter helps the student understand the role of information systems as organizations move into the digital world, and how they have helped fuel globalization. The student will learn what information systems are, how they have evolved to become a vital part of modern organizations, and why this understanding is necessary to become an effective manager in the digital world. The student will also learn how globalization evolved, and what opportunities globalization presents for organizations. The importance of ethics as it relates to IS is discussed especially as it relates to information privacy, accuracy, property, and accessibility. A number of cases and illustrations are used, for example, Apple products and how they have evolved over time (such as the iPhone, Mac Air, iPod, and iPad). CHAPTER OUTLINE PREVIEW Managing in the Digital World: Apple INFORMATION SYSTEMS TODAY The Rise of the Information Age BRIEF CASE Technology at Starbucks...

Words: 3147 - Pages: 13

Premium Essay

Ethical Considerations

...Ethical Considerations in Primary Research Summary: Primary research involves collecting data about a given subject directly from the real world. This section includes information on what primary research is, how to get started, ethics involved with primary research and different types of research you can do. It includes details about interviews, surveys, observations, and analysis. Contributors:Dana Lynn Driscoll, Allen Brizee Last Edited: 2012-09-21 10:05:43 Primary research is conducted all of the time--journalists use it as their primary means of reporting news and events; national polls and surveys discover what the population thinks about a particular political figure or proposal; and companies collect data on their consumer base and market trends. When conducting research in an academic or professional setting, you need to be aware of the ethics behind your research activity. Here are some specific points to consider: * You should have the permission of the people who you will be studying to conduct research involving them. * Not all types of research require permission—for example, if you are interested in analyzing something that is available publicly (such as in the case of commercials, public message boards, etc) you do not necessarily need the permission of the authors. * You don’t want to do anything that would cause physical or emotional harm to your subjects. This could be something as simple as being careful how you word sensitive or difficult...

Words: 3241 - Pages: 13

Premium Essay

Zambia and Politics

...Vioxx Rod Carveth, Marywood University Claire Ferraris, Western Oregon University Nick Backus, Western Oregon University Abstract In this paper we demonstrate how to focus an empirical application in reaching an ethical decision by working with the Potter Box, a model created by Ralph Potter as an analytical tool assessing the ethics of corporate decision-making, The facts emerging in news accounts regarding lawsuits against the pharmaceutical company Merck and its painkiller Vioxx are analyzed for ethical consideration. Utilizing the Potter Box model, the case against Merck can be interpreted and studied in light of ethical considerations. The results demonstrate not only how a decision is argued, but what is missing in the overall consideration for the decision. Introduction The mythos of freedom and responsibility in the United States is premised on the ethical actions of members of the society, particularly those in positions of power. And ethics in communication takes a place of preeminence since the words spoken by authorities are often all a public relies upon to pass judgment. How is the citizen or the communication analyst to evaluate the ethics of the utterances of others? And how does the communicator determine the ethical appropriateness of a planned message? This paper is an introduction to an accessible method of ethical decision-making in communication. The Potter Box allows both student and scholar to analyze the ethical responsibilities of communicators in terms...

Words: 4979 - Pages: 20