Management Information Systems

Similar documents
E-business Fundamentals

E-commerce. E-commerce: Digital Markets and Digital Goods

Wallet Technology. Information Presentation

TESTIMONY OF STEVE MAIMAN CO-OWNER, STONY APPAREL LOS ANGELES, CALIFORNIA IN OPPOSITION TO H.R U.S

EXAMINATION WORD PROCESSOR POLICY

Tips for proposers. Cécile Huet, PhD Deputy Head of Unit A1 Robotics & AI European Commission. Robotics Brokerage event 5 Dec Cécile Huet 1

Color Swatch Add-on User Guide

Hi! I m Diane. I m a startup founder with deep experience in personalization and e-commerce whose formal training is in user research.

ALUTIIQ MUSEUM & ARCHAEOLOGICAL REPOSITORY 215 Mission Road, Suite 101! Kodiak, Alaska 99615! ! FAX EXHIBITS POLICY

29 JULY 2018 BARBER COMPETITION TIMETABLE, CATEGORIES AND CRITERIA RULES AND CONDITIONS OF ENTRY MANAGED BY.

This unit is an optional unit included in the framework of the SQA Advanced Certificate /Diploma in Retail Management.

APPAREL, MERCHANDISING AND DESIGN (A M D)

The Higg Index 1.0 Index Overview Training

JOB INFORMATION PACK GALLERY ASSISTANTS (CASUAL)

OSHAWA CENTRE STYLE ICON CONTEST RULES & REGULATIONS

ICE Alert System training manual Phase 2 (2013 onwards)

INFORMATION NOTE No 354: SUNBED REGULATION ACT 2010

Market Surveillance in Practice a practical overview of market surveillance of cosmetics on the Irish market

University of Wisconsin-Madison Hazard Communication Standard Policy Dept. of Environment, Health & Safety Office of Chemical Safety

Head Lice Awareness and Education ORCUTT UNION SCHOOL DISTRICT OCTOBER 2015

FF: Fashion Design-Art (See also AF, AP, AR, DP, FD, TL)

UNIVERSITIES AGES 18+

SA The standard. Requirements

B15. Smart Healthy Bracelet BRACELET USER GUIDE

XXIInd INTERNATIONAL BIENNIAL OF ARTISTIC CERAMICS CONTEMPORARY CREATION AND CERAMIC Vallauris July November 2012

Higher National Unit Specification. General information for centres. Fashion: Commercial Design. Unit code: F18W 34

Regulating the Blockchain. An in-depth look at the most pressing legal issues facing these technologies.

Chapter 3 Your Professional Image

1. Charging. 2. In-app Setup. 3. Physical Installation. 4. Features. 5. Troubleshooting. Home Security Begins at the Front Door.

ISO INTERNATIONAL STANDARD. Protective clothing for protection against chemicals Classification, labelling and performance requirements

Case Study Example: Footloose

SOLIDWORKS Apps for Kids New Designs

Remote Skincare Advice System Using Life Logs

How to Create Your Cryptocurrency Wallet and Add PumaPay Tokens

The 61 st Bangkok Gems & Jewelry Fair. The 62 nd Bangkok Gems & Jewelry Fair February 2018, hrs. 25 February 2018, hrs.

BUSINESS STRATEGY AND POLICY - MGMT3031

CCS Administrative Procedure T Biosafety for Laboratory Settings

BARBER COMPETITION TIMETABLE, CATEGORIES AND CRITERIA 2019& RULES AND CONDITIONS OF ENTRY

REACH AND ITS IMPACT ON COSMETICS

PLEASE NOTE: ADDITIONAL DOCUMENTATION ON PAGE 2 MUST BE SUBMITTED WITH THIS APPLICATION. Name Business is Conducted Under (DBA):

Home Security Begins at the Front Door

REACH AND ITS IMPACT ON COSMETICS

ISO INTERNATIONAL STANDARD. Cosmetics Sun protection test methods In vivo determination of the sun protection factor (SPF)

COURSE #: COS 3101 TITLE: Manicurist SEMESTER: Varies INSTRUCTOR: M. Cole

Clean Clothes Campaign Wage Survey

( ) Typical properties of Thinsulate Insulation Type G. Approved claims. Relative Warmth (in Clo)

Session 3. Tests and testing. Trainer requirements to teach this lesson. Trainer notes. For this session you will need the following:

Lesson Plan for Teaching Module Title: Ethics and Consumer Protection in Fashion Marketplace

RULES. The Wall of Fame Belgium 2019

THINK AND GET LAID: THE 11 KEYS TO UNLOCKING FEMALE ATTRACTION BY DOMINIC MANN

Overview. Label Gallery SDK User Guide

TECHNOLOGY October 2016 PLATFORM OVERVIEW

THE IMMIGRATION ACTS. Before MR C M G OCKELTON, VICE PRESIDENT DEPUTY UPPER TRIBUNAL JUDGE MCCLURE. Between. and

SUCCESSFUL GROWTH C20+ REGNSKABSPRISEN, 2 JUN 2016 PANDORA A/S BY PETER VEKSLUND, EVP & CFO

ADVANCED DIPLOMA OF BUSINESS BSB60215

H 7915 S T A T E O F R H O D E I S L A N D

Chapter 2 Relationships between Categorical Variables

IT S TIME TO... COMBAT OCCUPATIONAL SKIN DISEASE

THE WORLD S MOST INTELLIGENT FACIAL CLEANSING BRUSH

2011 No. 327 ANIMALS. The Pigs (Records, Identification and Movement) (Scotland) Order 2011

Creative Age Publications

MEDICAL OIL-FREE COMPRESSORS

General Certificate of Education Advanced Level Examination June 2010

Introduction to Fashion and Interior Design

Gorizia/ Nova Gorica/ Miren/ Trieste/ 3-7 giugno 2015 IN\VISIBLE CITIES / URBAN MULTIMEDIA FESTIVAL OPEN CALL / ARTISTS IN RESIDENCE THE FESTIVAL

Alarm.com Wi-Fi Doorbell Camera and Slim Line

United States Hair Mousse Industry 2015 Market Research Report

THE EUROPEAN UNION S REGULATORY ENVIRONMENT FOR COSMETICS

Response to the Police Offences Amendment Bill 2013 Tattooing, Body Piercing & Body Modification of Youth

Strengthening the Compliance to the Malaysia Cosmetic Regulation & Requirements

Apparel, Textiles & Merchandising. Business of Fashion. Bachelor of Science

Minister Application of Tiffany M. LeClair

For- Credit Courses and Certificate Programs in Apparel Merchandising & Management for Industry Professionals

Home Security Begins at the Front Door

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF MISSOURI EASTERN DIVISION ) ) ) ) ) ) ) ) )

The 17 th Western China International Fair 2018

User Manual Banknotes

[Second Reprint] ASSEMBLY, No STATE OF NEW JERSEY. 218th LEGISLATURE INTRODUCED FEBRUARY 8, 2018

YOUNG TALENTS Curated by

Line Development. Chapter Objectives. Chapter Objectives. Approaches to Line Planning. Approaches to Line Planning 1/27/12.

Non-SAC Member Facility Higg Index Guide: Overview

This unit is suitable for those who have no previous qualifications or experience.

Australian Standard. Sunglasses and fashion spectacles. Part 1: Safety requirements AS

Charles W. Eisemann Center Forrest & Virginia Green Mezzanine-Gallery Policies & Procedures for Exhibiting

SM ART FAC IA L CLEANSING & MASSAGING BRUSH

Understanding the fashion retail market

BY KATSUNARI OKAMOTO - FUNDAMENTALS OF OPTICAL WAVEGUIDES: 2ND (SECOND) EDITION BY KATSUNARI OKAMOTO

Case 3:07-cv MLC-JJH Document 1 Filed 08/21/2007 Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY

Responsible Wood. Work Instruction. WI12 Issuance of PEFC & AFS Logo use licences by Responsible Wood (PEFC Australia)

Bill Redirect Send BluePrint fingerprint Symcod reader numbers directly in your existing application software

Dr. Matteo Zanotti Russo

GHS the United Nations Globally Harmonized System of Classification & Labeling of Chemicals

Sew and Tell Project Planner

SAULT COLLEGE 443 NORTHERN AVENUE SAULT STE. MARIE, ON P6B 4J3, CANADA

LICENSE AGREEMENT FOR MANAGEMENT 3.0 FACILITATORS

PESTEL ANALYSIS Submitted By: Arcega, Kezziah Josh Baustista, Marianne Cama, Louisa Corpuz, Olive Rose Leoncio, Jamaica Lozada, Angeline

175 new colors to celebrate! FASHION+HOME. Ready to Inspire.

RUNWAY PARTICIPATION FORM

STATE OF MICHIGAN COURT OF APPEALS

Community Services Committee 14 December Report for Decision. The Eden Hore Collection Building from the Feasibility Study (COM )

Transcription:

Ethical and Social Issues in Information Systems Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation, Ghana Email: richard@pearlrichards.org 4.1 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Chapter 4 Ethical and Social Issues in Information Systems 4.2 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Class Website www.vivaafrica.net Use the class website WEEKLY, ask/comment on the articles, and JOIN the FACEBOOK Please Add your name and the course code 4.3 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Learning Objectives Ethical, social, and political issues are closely in the information world. Ethical issues spring up both social and political issues. For one, customer service has become the organisational function or service which attracts the largest ethical challenges. Moreover, the lack of training regarding internet usage has afforded many individuals to participate in conduct that questions their ethics. This session explores these issues. Learning Objectives include: 1. Identify the ethical, social, and political issues that are raised by information systems. 2. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 3. Assess how information systems have affected everyday life. 4.4 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Ethics Understanding Ethical and Social Issues Related to Systems Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior Information systems and ethics Information systems raise new ethical questions because they create opportunities for: Intense social change, threatening existing distributions of power, money, rights, and obligations New kinds of crime 4.5 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Vodafone 3030, the complete Love Story http://www.youtube.com/watch?v=5dy1clgxqbe 4.6 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Understanding Ethical and Social Issues Related to Systems Five moral dimensions of information age Major issues raised by information systems include: Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life 4.7 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Understanding Ethical and Social Issues Related to Systems Four key technology trends that raise ethical issues Computing power doubles every 18 months {faster access} Increased reliance on, and vulnerability to, computer systems Data storage costs rapidly declining {storing data online} Multiplying databases on individuals Data analysis advances {easy profiling} Greater ability to find detailed personal information on individuals Profiling and nonobvious relationship awareness (NORA) Networking advances and the Internet {data everywhere} Enables moving and accessing large quantities of personal data 4.8 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Understanding Ethical and Social Issues Related to Systems Nonobvious Relationship Awareness (NORA) NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job at a casino shares a telephone number with a known criminal and issue an alert to the hiring manager. Figure 4-2 4.9 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Ethics in an Information Society Candidate Ethical Principles Golden Rule Do unto others as you would have them do unto you Immanuel Kant s Categorical Imperative If an action is not right for everyone to take, it is not right for anyone Descartes' rule of change If an action cannot be taken repeatedly, it is not right to take at all 4.10 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Ethics in an Information Society Candidate Ethical Principles (cont.) Utilitarian Principle Take the action that achieves the higher or greater value Risk Aversion Principle Take the action that produces the least harm or least potential cost Ethical no free lunch rule Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise 4.11 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Information rights and obligations Privacy The Moral Dimensions of Information Systems Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. Ability to control information about yourself In U.S., privacy protected by: First Amendment (freedom of speech) Fourth Amendment (unreasonable search and seizure) Additional federal statues Privacy Act of 1974 4.12 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems Fair information practices principles: Notice/awareness (core principle): Web sites must disclose practices before collecting data Choice/consent (core principle): Consumers must be able to choose how information is used for secondary purposes Access/participation: Consumers must be able to review, contest accuracy of personal data Security: Data collectors must take steps to ensure accuracy, security of personal data Enforcement: Must be mechanism to enforce FIP principles 4.13 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems Internet Challenges to Privacy: Cookies Tiny files downloaded by Web site to visitor s hard drive Identify visitor s browser and track visits to site Allow Web sites to develop profiles on visitors Web bugs Tiny graphics embedded in e-mail messages and Web pages Designed to monitor who is reading a message and transmitting that information to another computer on the Internet Spyware Surreptitiously installed on user s computer May transmit user s keystrokes or display unwanted ads 4.14 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems How Cookies Identify Web Visitors Cookies are written by a Web site on a visitor s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Figure 4-3 4.15 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems Property Rights: Intellectual Property Intellectual property: Intangible property of any kind created by individuals or corporations Three ways that intellectual property is protected Trade secret: Intellectual work or product belonging to business, not in the public domain Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years 4.16 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems Challenges to Intellectual Property Rights Digital media different from physical media (e.g. books) Ease of replication Ease of transmission (networks, Internet) Difficulty in classifying software Compactness Difficulties in establishing uniqueness Digital Millenium Copyright Act (DMCA) Makes it illegal to circumvent technology-based protections of copyrighted materials 4.17 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems Accountability, Liability, Control Computer-related liability problems If software fails, who is responsible? If seen as a part of a machine that injures or harms, software producer and operator may be liable If seen as similar to a book, difficult to hold software author/publisher responsible What should liability be if software is seen as service? Would this be similar to telephone systems not being liable for transmitted messages (so-called common carriers ) 4.18 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems System Quality: Data Quality and System Errors What is an acceptable, technologically feasible level of system quality? Flawless software is economically unfeasible Three principal sources of poor system performance: Software bugs, errors Hardware or facility failures Poor input data quality (most common source of business system failure) 4.19 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

The Moral Dimensions of Information Systems Quality of Life: Negative social consequences of systems Balancing power: Although computing power is decentralizing, key decision-making power remains centralized Rapidity of change: Businesses may not have enough time to respond to global competition Employment: Reengineering work resulting in lost jobs Dependence and vulnerability: Public and private organizations ever more dependent on computer systems 4.20 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Health risks: Repetitive stress injury (RSI) Largest source is computer keyboards Computer vision syndrome (CVS) Technostress Role of radiation, screen emissions, low-level electromagnetic fields 4.21 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Ethical Issues in Mobile Commerce 1. Aggressive mobile networks collect users' email addresses or phone numbers without permission, while others install icons to home screens, track users whereabouts or push ads to notification bar. Mobile users should be assured that their mobile information names and mobile number would not be sold or available to a third party institution without prior notice. 2. In 2009, T-Mobile confirmed its biggest mobile phone customer data breach, when an employee stole and sold personal account details of mobile users to rival firms. 4.22 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Liability in Mobile Commerce 'Missed' calls that empty your wallet: If you are in the habit of returning missed calls from unidentified numbers, it's time to put such instincts on hold. An international crime cartel involved in lottery scams rakes in the money when you call back on these premium numbers, which generally originate abroad. In some cases, even official service providers connive to hatch a revenue- sharing plot. 4.23 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Mobile Sales Promotion text messaging contest 1. Should be viewed as quick and easy 2. Opt in procedure 3. Transparency in costs involved OFTEN MISLEADING 4.24 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)

Ethics in an Information Society Ethical Analysis Five-step Process for Analysis 1. Identify and describe clearly the facts 2. Define the conflict and identify the higherorder values involved 3. Identify the stakeholders 4. Identify reasonable options 5. Identify potential consequences of these options 4.25 www.vivaafrica.net Dr. Richard Boateng (richard@pearlrichards.org)