Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Similar documents
Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4 INFORMATION SYSTEMS

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems

Ethical and social aspects of management information systems

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

2) Software piracy is bad for business. 2) Answer: True False

Computer and Information Ethics

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

Ethical and Social Issues in Information Systems

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

YOUNG PERSONS PRIVACY NOTICE

VALLIAMMAI ENGINEERING COLLEGE

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

Whatever Happened to the. Fair Information Practices?

Chapter 4. Ethical and Social Issues in Information Systems. After completing this chapter, students should be able to answer the following questions:

Privacy Policy SOP-031

Efese, ethics in research

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals

Danielle Vanderzanden

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Innovation and Technology Law Curriculum

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

Joint Research Centre. The European Commission s in-house science service

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

Developing a Code of Practice for the Connected Car IT.CAN 21st Annual Conference October 23, Abstract

1.1 In these Venue Owners Conditions the following terms have the meaning set out behind the terms:

Dr Nicholas J. Gervassis University of Plymouth THE EMERGING UK DATA PROTECTION FRAMEWORK AND BEYOND

Epilogue The Future of Knowledge Management

CSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed

Privacy Law in Canada: Obligations and Risks in the Cyber Age Dina L. Maxwell Associate Lawyer

Cyberspace: The new international legal frontier

The SAFARI Syndrome. Implementing CRIS and Open Science By Joachim Schöpfel, University of Lille 3

Self regulation applied to interactive games : success and challenges

Mellor Community Primary School Policy for Photographs and Photography

NASW Code of Ethics Revisions Effective January 1, 2018

SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by at:

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.

The BioBrick Public Agreement. DRAFT Version 1a. January For public distribution and comment

CONFLICT DISCLOSURE AND CONSENT LETTERS

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)

UW REGULATION Patents and Copyrights

Batya F. Forsyth Partner

The computer can outperform human beings in speed, memory, repetition and accuracy.

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016

Notice of Privacy Practices

Supplemental end user software license agreement terms

Risky Business: New Compliance Challenges for FDA-Regulated Industry

Effective Intellectual Property Management

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor

Book review: Group Privacy: New Challenges of Data Technologies

Design and Technology

Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p.

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 2015

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate?

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).

GAMING POLICY FRAMEWORK

FIPPs Fair Information Practice Principles

Getting on the same page

12 April Fifth World Congress for Freedom of Scientific research. Speech by. Giovanni Buttarelli

Teaching the Ethics of Big Data

Ethics, privacy and legal issues concerning GIS. This is lecture 12

Christina Narensky, Psy.D.

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION

1/1/2017. Service Orientation Guide

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Standard-Essential Patents

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION

DATA PROTECTION IMPACT ASSESSMENT

IET Guidelines for Volunteers: Data Protection

A Day in the Life of the Jos Curriculum Connections. Prince Edward Island

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2

Jay A. Yurkiw. Partner

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Privacy Impact Assessment on use of CCTV

Discovery: From Concept to the Patient - The Business of Medical Discovery. Todd Sherer, Ph.D.

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION

Lex Informatica and Cyberspace

A Comprehensive Statewide Study of Gambling Impacts: Implications for Public Health

R. Cameron Garrison. Managing Partner

GENERAL TERMS AND CONDITIONS

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan

the practice of law the way it should be

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC)

STRANDS AND STANDARDS

Ethics in Artificial Intelligence

Answer to Community Patent Consultation To:

CILIP Privacy Briefing 2017

RBI Working Group report on FinTech: Key themes

EL PASO COMMUNITY COLLEGE PROCEDURE

ITGS Areas of Impact Revision. By Panagiotis Kafkarkou

European Charter for Access to Research Infrastructures - DRAFT

Transcription:

Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1

Online activity is tracked and ads are displayed depending on your activity Behavioural targeting allows businesses and organizations to more precisely target desired demographics... Behavioural Targeting: Your Privacy is the Target Continued 4-2

Behavioural Targeting: Your Privacy is the Target (continued) Increased use of behavioural targeting has drawn attention of Parliament and the Office of the Privacy Commissioner. 4-3

Five Moral Dimensions of the Information Age Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life 4-4

Technology Trends that Raise Ethical Issues [INSERT Table 4-2] Continued 4-5

Ethical Analysis 1. Identify and describe the facts clearly 2. Define the conflict or dilemma, and identify the higherorder values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options 4-6

Candidate Ethical Principles 1. Golden Rule: Do unto others as you would have them do unto you 2. Appeal to respected authority (e.g. Gandhi, Mother Teresa) 3. Religious codes Continued. 4-7

Candidate Ethical Principles (Continued) 4. Utilitarian Principle: Take the action that achieves the greatest value for all concerned 5. Risk Aversion Principle: Take the action that produces the least harm or the least potential cost 4-8

Professional Codes of Conduct Promises by professionals to regulate themselves in the general interest of society 4-9

Real-World Ethical Dilemmas - Using technology to reduce workforce - Selling subscriber information to advertisers - Employees using corporate IT for personal use - Using IT to monitor employees 4-10

The Moral Dimensions of Information Systems Information rights: Privacy and Freedom in the Internet Age Privacy: Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. Personal Information Protection and Electronic Documents Act (PIPEDA) establishes principles for collection, use, and disclosure of personal information 4-11

Fair Information Practices Principles Identifying purpose and awareness Consent and choice Enforcement Safeguards and safety Openness and individual access 4-12

Internet Challenges to Privacy Cookies Identify browser and track visits to site Spyware Surreptitiously installed on users computers May transmit a user s keystrokes or display unwanted ads 4-13

How Cookies Identify Web Visitors [Catch Figure 4-3] 4-14

Trade Secrets Intellectual work or product belonging to business, not in the public domain 4-15

Challenges to Intellectual Property Rights Perfect digital copies cost almost nothing Sharing of digital content over the Internet costs almost nothing Sites, software, and services for file trading are not easily regulated. A web page may present data from many sources, and incorporate framing 4-16

Accountability, Liability, and Control Computer-related liability problems Who should be held responsible (producer of software, programmer, manager, IT head) 4-17

System Quality Data Quality and System Errors Ship it when not quite right? Three principal sources of poor system performance Software bugs and errors Hardware or facility failures Poor input data quality 4-18

Quality of Life: Equity, Access, and Boundaries The digital divide (equity and access) Health risks (e.g. carpal tunnel, RSI) Maintaining boundaries: Family, work and leisure Job losses due to technology Computer crime and abuse, including spam Continued 4-19

Management Opportunities and Challenges 1. Managers have the opportunity to use information technology to create an ethical business and social environment 2. This does not mean management actions will always please all stakeholders, but at least management actions should take into account the ethical dimensions of IT-related decisions Continued 4-20

Management Opportunities and Challenges 3. Management must make decisions on behalf of the organization 4. Understanding the moral risks of new technology 5. Establishing corporate ethics policies that include information systems issues 4-21

Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-22