...that exist in the form of bits and bytes activated by electromagnetic energy and made powerful by IT and the internet-has changed the way we relate to one another. It has also revolutionized economics and business”. The authors state that while e-commerce, the sale of goods over the internet, has boosted online sales, especially products like books, CDs and computer products; it has also raised important new ethical challenges. These challenges revolve around four main issues: security, privacy, identity and transaction non-refutability. There is no doubt that a new ethical dilemma has arisen and these authors propose two universal principles that must be upheld by internet commerce. The first ethical challenge of internet commerce is security, commonly referred to as “hacking”, ‘cracking”, or “page jacking”. Internet security breaches involve trespassing or breaking into computer networks, websites, and mailboxes. Hackers will steal information from confidential files, steal services or damage a system by swamping a PC, a server or a network. The second ethical challenge relates to privacy, which involves protecting the collection, storage, processing, disseminating and destruction of personal information. They continue that no one is anonymous on-line and what is nirvana for direct marketers is a nightmare for any consumer who wants to protect his or her privacy. On-line advertising can be targeted with great precision today, thanks to “cookies”, a mall text files that...
Words: 730 - Pages: 3
...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...
Words: 5310 - Pages: 22
...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...
Words: 5310 - Pages: 22
...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...
Words: 5310 - Pages: 22
...no matter the magnitude of the issue decisions will have to be made regarding it. The health care industry is no different, some of those ethical issues include patient privacy (or lack of), transplant allocation, refusal of care, patient dumping, access of care, biomedical research and patient noncompliance with treatment. For this paper I will focus on patient privacy, the ethical issue of patient privacy is how patient information is getting leaked unintentionally. An examination of how each of the four major ethical principles can be applied towards this issue will be provided. Patient Privacy The Health Insurance Portability and Accountability Act of 1996 (HIPAA) original intents were to enable workers to change jobs without fear of losing health care coverage (Liebler & McConnell, 2012), but HIPAA is more commonly known for protecting patient privacy. When organizations had to be HIPAA compliant by April 14, 2003 those organizations were required to train employees in the proper handling of protected health information (PHI), publish policies and procedures addressing the handling of patient medical information (Liebler & McConnell, 2012) . Any release of patient information for purposes other than treatment, payment, or operations requires written authorization (Buppert, 2002). Under the patient privacy rule EVERYTHING is protected, diagnosis, name, address, etc. With all the training provided to staff members, PHI is still being compromised intentionally and unintentionally...
Words: 1230 - Pages: 5
...Internet Privacy Abstract As more and more people continue to use the Internet and disclose their personal information, privacy concerns are paramount. Marketing companies are fiercely competing for their share of the booming e-commerce industry estimated at 75 billion dollars in 2010. Government agencies after 9/11 are using personal communications such as e-mail and social networking sites to scrutinize and evaluate potential threats to the United States. Legislation including the Patriot Act has empowered a new generation of public officials with information gathering capabilities on demand. In some cases a court order is not needed to inspect all of a person’s electronic communications. Exploitation of highly sensitive personal information is a reality as companies routinely sell this information to third parties without an individual’s consent. Opting out is a disclaimer written into privacy statements on websites that are often buried in the fine print. Many Americans assume that privacy is included in the operating system they purchase. It is the collating of personal information from multiple data sources on the Internet that remains a key point of contention among those who view privacy as fundamental American right implicit in the Constitution. In this sense, privacy is deeply personal to the dignity and respect of our society. Yet, the relevance of security issues must seek a balance and address the notion of the possibility of abuse. One significant...
Words: 4923 - Pages: 20
...(曾祥財 曾祥財) 曾祥財 FIT, MUST 1 Chapter 4 Ethical and Social Issues in Information Systems 2 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES • Identify the ethical, social, and political issues that are raised by information systems. • Identify the principles for conduct that can be used to guide ethical decisions. • Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. • Assess how information systems have affected everyday life. 3 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Is Your Student Loan Data on Loan? • Problem: Insufficient privacy protections for sensitive data related to student loans. • Solutions: Improve system security and protect student information to restore confidence in the system. • Revoke over 52,000 user IDs suspected of misusing access to students’ private information. • Demonstrates IT’s role in providing quick and convenient access to data. • Illustrates how the very same technology has the potential to threaten privacy and cause more harm than good. 4 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Understanding Ethical and Social Issues Related to Systems • Past five years: One of the most ethically challenged periods in U.S. history • Lapses in management ethical and business judgment...
Words: 2655 - Pages: 11
...information society and specific principles for conduct that can be used to guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using Internet Newsgroups for Online Market Research 4.2 4.3 4.4 Interactive Sessions: Data for Sale The Internet: Friend or Foe to Children? LEARNING TRACK MODULE Developing a Corporate Code of Ethics for Information Systems DOES LOCATION TRACKING THREATEN PRIVACY? F or many years, parents...
Words: 20079 - Pages: 81
...Introduction……………………………………………………………………………………4 Literature Review………………………………………………………………………………7 Data Analysis........................................................................................................................…...14 Results and Conclusion…………………………………………………………………………17 References………………………………………………………………………………………19 Today’s Risk of Fraud: Forensic Accountants Help Protect Identity Theft Introduction Technology today is more advanced than it ever has been and almost everyone this day and age owns a computer, tablet, or smart phone. Most Americans utilize their computers, tablets, or phones to pay bills, shop, play games, and the list could be endless, technology has allowed us the ability to live our lives through the internet. The internet can be a wonderful tool to have, but, on the other hand, it can be very chilling as it allows for people on the outside to access our personal information. In recent years, there have been several security breaches or system...
Words: 4916 - Pages: 20
...company’s Intranet? E-commerce is a fantastic way for businesses to connect with customers around the world in a way that has never before been possible. Yet, that is not to say that eBusiness does not have risks that entrepreneurs must be aware of before setting up a presence online. Harley-Davidson faces a variety of risks by integrating eBusiness into its supply-chain management system and allowing supplier to have access to the company’s Intranet. 1) Although the eBusiness system implemented by Harley-Davidson is full-proof, considerable risks associated with hackers, viruses, and interception of credit card numbers travelling over the communication lines still exist in the system. Credit card information can be easily intercepted via internet for deceitful purposes increasing the risk of fraudulent transactions. 2) Technology itself poses a risk to eBusiness, simply because ecommerce is so dependent on it. Infrastructure problems, such as a server malfunctioning, can shut down a website. Likewise, viruses can delete valuable data, and software glitches can keep a site from working properly. 3) Suppliers may violate confidentiality agreements and disclose confidential information to competitors. They can also manipulate the computer system and take advantage of their increased access to Harley-Davidson’s purchasing schedules. 4) Harley-Davidson and suppliers may have inadequate procedures for processing, transmitting and storing information. 5) Suppliers may not know well...
Words: 2420 - Pages: 10
...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...
Words: 3771 - Pages: 16
...regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction: This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and other user activities. This information really caused many Americans to really stat freaking out. With all this freaking out is making it hard to decipher what, exactly is happening and what is the means of all this. So now with what’s been stated so far let’s take a deep breath and break down what we know so far and elaborate some on the Patriot Act. * Theories: The ethical dilemma...
Words: 2521 - Pages: 11
...http://search.proquest.com/docview/1493278555/6428ED186E8C42A8PQ/20?accountid=14693 International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 3, June 2014 Legal Risks in Social Media Marketing Jawahitha Sarabdeen Abstract Social media is an important communication channel for marketers. The research conducted earlier shows that more than 81% of the businesses are using social media or planning to use social media for marketing purposes. The social media is used for engagement marketing, buzz marketing, building customer relationships and to revitalise brand image. As social media marketing facilitates two way communications between the marketers and the users, the content generated in social media is considered trustworthy and reliable by the customers. The marketers while using the social media should be aware of the legal risks involved in social media marketing. This research paper by using content analysis looks at social media marketing and legal risks involved in social media marketing. Index Terms—Social media, marketing, legal risks, regulations. I. INTRODUCTION Social media marketing is a phenomenon where businesses are seeking new ways to create value. The introduction of social media considerably changes the marketing activities and consumers‘ behaviours. With the introduction of various technologies associated with social media the businesses and consumers participate in marketing activities easily without cost. Though...
Words: 6386 - Pages: 26
...Perrolle, 1993). The ACM Code of Ethics is broken down into four sections with the imperatives listed below them. Section 1 pertains to general moral guidelines, section 2 pertains to guidelines that are more specific, section 3 is organizational leadership imperatives, and section 4 is compliance (Anderson, Johnson, Gotterbarn, & Perrolle, 1993). The moral guidelines section contains contributing to the well-being of humans and society, avoiding harm to people, honesty, fairness, honor property rights and copyrights, and giving credit for intellectual property. The moral guidelines section contains contributing to the well-being of humans and society, avoiding harm to people, honesty, fairness, honor property rights and copyrights, giving credit for intellectual property, respecting others privacy, and honoring confidentiality (Anderson, Johnson, Gotterbarn, & Perrolle, 1993). Section 2 demands that ACM members strive for high quality work, remain competent in their work, know and abide by laws, seek review from professionals, give thorough analysis of systems, honor commitments, aid the public with understanding computing, and only use access to systems when appropriate (Anderson, Johnson, Gotterbarn, & Perrolle, 1993). Section 3 requires member to meet social responsibilities, manage human resources to enhance quality of life, define proper and improper behavior with systems, address needs of users, ensure personal privacy is protected, and foster future learning of systems (Anderson...
Words: 1288 - Pages: 6
...4/29/2012 Moral Theology Final Paper – Online Privacy One of the most fascinating things in the twenty first century has to be the internet. We rely heavily on to for our news, entertainment, gaming, research, school work, shopping and pretty much anything that you can think of can be found on the internet. It has had such a large impact on our lives, but at what cost has this come to the user. What is really going on in the background of websites, are we being followed and tracked to just be sold off as a product to a marketing company. Many companies such a Google, Facebook, Microsoft, Yahoo, Twitter, and Apple all participate in the data collection. This data can be found as a cookie, a post, tweet, search, or an account that you may have with any of these particular companies. Each of these companies states their reasoning for tracking and it always comes down to providing a better experience. I believe that it is ok for companies such as Google, Facebook, Microsoft, Yahoo, Twitter, and Apple to track our searches and compile data about us as long as they keep the advertising online. Once they invade our home life such as phone calls and direct mailing, then I believe that they have gone too far. Nothing is ever truly free these companies are in it to make money and they make considerable amount of revenue from using our information to advertise to use. For now I will enjoy the free services that Google, Facebook and many other sites have to offer. Google the world’s...
Words: 2712 - Pages: 11