SlideShare une entreprise Scribd logo
1  sur  44
Management Information Systems 
BCO-216 
Fall 2014 
(Social Media and Enterprise) 
Raymond Gao, MBA
Agenda 
• (1st half) 
– What is Social Media? 
– How is it used in enterprises? 
– Ethics, Moral, etc. 
– It’s Impacts: Privacy, IP, etc. 
• (2nd half) 
– Case Study: Facebook
Snapchat Hacked
Social Media
What is Social Media?* 
A: People have innate desire to communicate and to build 
communities. Hence, tools, facilitating those interactions, are 
called social media tools.
Example Social Enterprise - Salesforce
Gartner Magic Quadrant of Enterprise Social S/W* 
1. Leaders* 
2. Challengers* 
3. Visionaries* 
4. Niche Players*
LEARNING OBJECTIVES 
• What ethical, social, and political issues are raised by information systems? 
• What specific principles for conduct can be used to guide ethical decisions? 
• Why do contemporary information systems technology and the Internet pose challenges to the protection of individual 
privacy and intellectual property? 
• How have information systems affected everyday life?
Behavioral Targeting: Your Privacy Is the Target 
• Problem: Need to efficiently target online ads. 
• Solutions: Behavioral targeting allows businesses and organizations to more precisely target desired demographics. 
• Google uses tracking files to monitor user activity on thousands of sites; businesses monitor activity on their own sites to 
better understand customers. 
• Demonstrates IT’s role in organizing and distributing information. 
• Illustrates the ethical questions inherent in online information gathering.
Understanding Ethical and Social Issues Related to Systems 
• Recent cases of failed ethical judgment in business: 
– Barclay’s Bank, GlaxoSmithKline, Walmart 
– In many, information systems used to bury decisions from public scrutiny 
• Ethics 
– Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their 
behaviors
Understanding Ethical and Social Issues Related to Systems 
• Information systems and ethics 
– Information systems raise new ethical questions because they create opportunities for: 
• Intense social change, threatening existing distributions of power, money, rights, and obligations 
• New kinds of crime (i.e. Photo Leaks, etc.)
Understanding Ethical and Social Issues Related to Systems 
• A model for thinking about ethical, social, and political Issues 
– Society as a calm pond 
– IT as rock dropped in pond, creating ripples of new situations not covered by old rules 
– Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, 
expectations, laws 
• Requires understanding of ethics to make choices in legally gray areas
The introduction of new 
information technology has a 
ripple effect, raising new 
ethical, social, and political 
issues that must be dealt with 
on the individual, social, and 
political levels. These issues 
have five moral dimensions: 
information rights and 
obligations, property rights and 
obligations, system quality, 
quality of life, and 
accountability and control. 
Figure 4-1 
THE RELATIONSHIP AMONG ETHICAL, SOCIAL, POLITICAL 
ISSUES IN AN INFORMATION SOCIETY
*Understanding Ethical and Social Issues Related to Systems 
• Five moral dimensions* of the 
information age: 
– Information rights and obligations 
– Property rights and obligations 
– Accountability and control 
– System quality 
– Quality of life
Understanding Ethical and Social Issues Related to Systems 
• Key technology trends that raise ethical issues 
– Doubling of computer power 
• More organizations depend on computer systems for critical operations. 
– Rapidly declining data storage costs 
• Organizations can easily maintain detailed databases on individuals. 
– Networking advances and the Internet 
• Copying data from one location to another and accessing personal data from remote locations are much easier.
Understanding Ethical and Social Issues Related to Systems 
– Advances in data analysis techniques 
• Profiling 
– Combining data from multiple sources to create dossiers of detailed information on individuals 
• Nonobvious relationship awareness (NORA) 
– Combining data from multiple sources to find obscure hidden connections that might help identify 
criminals or terrorists 
– Mobile device growth 
• Tracking of individual cell phones
NORA technology can take 
information about people from 
disparate sources and find 
obscure, nonobvious 
relationships. It might discover, 
for example, that an applicant 
for a job at a casino shares a 
telephone number with a 
known criminal and issue an 
alert to the hiring manager. 
Figure 4-2 
NONOBVIOUS RELATIONSHIP AWARENESS (NORA)
Ethics in an Information Society 
• Basic concepts for ethical analysis 
– Responsibility: 
• Accepting the potential costs, duties, and obligations for decisions 
– Accountability: 
• Mechanisms for identifying responsible parties 
– Liability: 
• Permits individuals (and firms) to recover damages done to them 
– Due process: 
• Laws are well-known and understood, with an ability to appeal to higher authorities
• Five-step ethical analysis 
Ethics in an Information Society 
1. Identify and clearly describe the facts. 
2. Define the conflict or dilemma and identify the higher-order values involved. 
3. Identify the stakeholders. 
4. Identify the options that you can reasonably take. 
5. Identify the potential consequences of your options.
• Candidate ethical principles 
– Golden Rule 
Ethics in an Information Society 
• Do unto others as you would have them do unto you. 
– Immanuel Kant’s Categorical Imperative 
• If an action is not right for everyone to take, it is not right for anyone. 
– Descartes’ Rule of Change 
• If an action cannot be taken repeatedly, it is not right to take at all.
Ethics in an Information Society 
• Candidate ethical principles (cont.) 
– Utilitarian Principle 
• Take the action that achieves the higher or greater value. 
– Risk Aversion Principle 
• Take the action that produces the least harm or potential cost. 
– Ethical “No Free Lunch” Rule 
• Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific 
declaration otherwise.
• Professional codes of conduct 
– Promulgated by associations of professionals 
• Examples: AMA, ABA, AITP, ACM 
– Promises by professions to regulate themselves in the general interest of society 
• Real-world ethical dilemmas 
– One set of interests pitted against another 
• Example: right of company to maximize productivity of workers versus workers right to use Internet for short 
personal tasks 
Ethics in an Information Society
The Moral Dimensions of Information Systems 
• Information rights: privacy and freedom in the Internet age 
– Privacy: 
• Claim of individuals to be left alone, free from surveillance or interference from other individuals, 
organizations, or state; claim to be able to control information about yourself 
– In the United States, privacy protected by: 
• First Amendment (freedom of speech) 
• Fourth Amendment (unreasonable search and seizure) 
• Additional federal statues (e.g., Privacy Act of 1974)
The Moral Dimensions of Information Systems 
• Fair information practices: 
– Set of principles governing the collection and use of information 
• Basis of most U.S. and European privacy laws 
• Based on mutuality of interest between record holder and individual 
• Restated and extended by FTC in 1998 to provide guidelines for protecting online privacy 
– Used to drive changes in privacy legislation 
• COPPA 
• Gramm-Leach-Bliley Act 
• HIPAA 
• Do-Not-Track Online Act of 2011
• FTC FIP principles: 
The Moral Dimensions of Information Systems 
– Notice/awareness (core principle) 
• Web sites must disclose practices before collecting data. 
– Choice/consent (core principle) 
• Consumers must be able to choose how information is used for secondary purposes. 
– Access/participation 
• Consumers must be able to review and contest accuracy of personal data.
The Moral Dimensions of Information Systems 
• FTC FIP principles (cont.) 
– Security 
• Data collectors must take steps to ensure accuracy, security of personal data. 
– Enforcement 
• Must be mechanism to enforce FIP principles.
The Moral Dimensions of Information Systems 
• European Directive on Data Protection: 
– Companies must inform people information is collected and disclose how it is stored and used. 
– Requires informed consent of customer. 
– EU member nations cannot transfer personal data to countries without similar privacy protection (e.g., the United 
States). 
– U.S. businesses use safe harbor framework. 
• Self-regulating policy and enforcement that meets objectives of government legislation but does not involve 
government regulation or enforcement.
The Moral Dimensions of Information Systems 
• Internet challenges to privacy: 
– Cookies 
• Identify browser and track visits to site 
• Super cookies (Flash cookies) 
– Web beacons (Web bugs) 
• Tiny graphics embedded in e-mails and Web pages 
• Monitor who is reading e-mail message or visiting site 
– Spyware 
• Surreptitiously installed on user’s computer 
• May transmit user’s keystrokes or display unwanted ads 
– Google services and behavioral targeting
Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web 
server requests the ID number from the cookie and uses it to access the data stored by that server on that 
visitor. The Web site can then use these data to display personalized information. 
Figure 4-3 
HOW COOKIES IDENTIFY WEB VISITORS
The Moral Dimensions of Information Systems 
• The United States allows businesses to gather transaction information and use this for other marketing purposes. 
– Opt-out vs. opt-in model 
• Online industry promotes self-regulation over privacy legislation. 
• However, extent of responsibility taken varies: 
– Complex/ambiguous privacy statements 
– Opt-out models selected over opt-in 
– Online “seals” of privacy principles
• Technical solutions 
The Moral Dimensions of Information Systems 
– E-mail encryption 
– Anonymity tools 
– Anti-spyware tools 
– Browser features 
• “Private” browsing 
• “Do not track” options 
– Overall, few technical solutions
The Moral Dimensions of Information Systems* 
• Property rights: Intellectual property 
– Intellectual property: intangible property of any kind created by individuals or corporations 
– Three main ways that intellectual property is protected: * 
• Trade secret*: intellectual work or product belonging to business, not in the public domain 
• Copyright*: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 
years 
• Patents*: grants creator of invention an exclusive monopoly on ideas behind invention for 20 year 
– Plant, Utility, Design Patents (http://www.neustel.com/Design-Utility-Patents/Design-Patent-vs-Utility- 
Patent.aspx) 
• Design Rights: Against unauthorized party making copycat products.
The Moral Dimensions of Information Systems 
• Challenges to intellectual property rights 
– Digital media different from physical media (e.g., books) 
• Ease of replication 
• Ease of transmission (networks, Internet) 
• Difficulty in classifying software 
• Compactness 
• Difficulties in establishing uniqueness 
• Digital Millennium Copyright Act (DMCA) 
– Makes it illegal to circumvent technology-based protections of copyrighted materials
The Moral Dimensions of Information Systems 
• Accountability, liability, control 
– Computer-related liability problems 
• If software fails, who is responsible? 
– If seen as part of machine that injures or harms, software producer and operator may be liable. 
– If seen as similar to book, difficult to hold author/publisher responsible. 
– What should liability be if software seen as service? Would this be similar to telephone systems not 
being liable for transmitted messages?
The Moral Dimensions of Information Systems 
• System quality: Data quality and system errors 
– What is an acceptable, technologically feasible level of system quality? 
• Flawless software is economically unfeasible. 
– Three principal sources of poor system performance: 
• Software bugs, errors 
• Hardware or facility failures 
• Poor input data quality (most common source of business system failure)
The Moral Dimensions of Information Systems 
• Quality of life: Equity, access, boundaries 
– Negative social consequences of systems 
• Balancing power: although computing power decentralizing, key decision making remains centralized 
• Rapidity of change: businesses may not have enough time to respond to global competition 
• Maintaining boundaries: computing, Internet use lengthens work-day, infringes on family, personal time 
• Dependence and vulnerability: public and private organizations ever more dependent on computer systems
The Moral Dimensions of Information Systems 
• Computer crime and abuse 
– Computer crime: commission of illegal acts through use of computer or against a computer system—computer may 
be object or instrument of crime 
– Computer abuse: unethical acts, not illegal 
• Spam: high costs for businesses in dealing with spam 
• Employment: 
– Reengineering work resulting in lost jobs 
• Equity and access—the digital divide: 
– Certain ethnic and income groups in the United States less likely to have computers or Internet access
• Health risks: 
The Moral Dimensions of Information Systems 
– Repetitive stress injury (RSI) 
• Largest source is computer keyboards 
• Carpal tunnel syndrome (CTS) 
– Computer vision syndrome (CVS) 
• Eyestrain and headaches related to screen use 
– Technostress 
• Aggravation, impatience, fatigue
2nd Half
1. How do you use Social Media? 
2. Do people who use Facebook have a 
legitimate claim to privacy when 
they themselves are posting 
information about themselves? 
3. How can using the sharing privacy 
controls help preserve your privacy 
on Facebook? In what ways is the 
sharing control ineffective? 
4. How will changing your Connection 
settings on Facebook help protect 
your privacy? 
5. Why are Facebook’s facial 
recognition software and policies a 
potential threat to privacy? 
Case Study - Facebook
Social Media Bubble Trouble 
Social media bubble trouble? http://a.msn.com/09/en-us/BB83jQ4
THANK YOU! 
email: raymond.gao@euruni.edu 
Twitter: @raygao
Backups
Link to video/article

Contenu connexe

Tendances

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Ethics in an information society
Ethics in an information societyEthics in an information society
Ethics in an information societyPrakash Raval
 

Tendances (20)

Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
Review questions
Review questionsReview questions
Review questions
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Ethics in an information society
Ethics in an information societyEthics in an information society
Ethics in an information society
 

Similaire à 3 - Social Media and Enterprise

3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Ethical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxEthical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxMICHAELJOHNPEDRASA1
 
Ethical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptEthical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptAfricaRealInformatic
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfAliMurat5
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
Chapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsChapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsVan Chau
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan kabir Solicitor
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptRogerPrimo2
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical mallisonshavon
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 

Similaire à 3 - Social Media and Enterprise (20)

3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Ethical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptxEthical and Social Issues in IT.pptx
Ethical and Social Issues in IT.pptx
 
Ch 4.pdf
Ch 4.pdfCh 4.pdf
Ch 4.pdf
 
Ethical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptEthical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .ppt
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdf
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
MIS_session06.pptx
MIS_session06.pptxMIS_session06.pptx
MIS_session06.pptx
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
Chapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsChapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systems
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1).ppt
 
Ethical
EthicalEthical
Ethical
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 

Plus de Raymond Gao

System modeling and design
System modeling and designSystem modeling and design
System modeling and designRaymond Gao
 
2020 Enterprise IT Outlook
2020 Enterprise IT Outlook2020 Enterprise IT Outlook
2020 Enterprise IT OutlookRaymond Gao
 
Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216
Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216
Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216Raymond Gao
 
Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Raymond Gao
 
10 - Project Management
10 - Project Management10 - Project Management
10 - Project ManagementRaymond Gao
 
7 - Enterprise IT in Action
7 - Enterprise IT in Action7 - Enterprise IT in Action
7 - Enterprise IT in ActionRaymond Gao
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
4 - Mobiility & Impacts
4 - Mobiility & Impacts4 - Mobiility & Impacts
4 - Mobiility & ImpactsRaymond Gao
 
2 - Value Chain & Porter's 5 Forces
2 - Value Chain & Porter's 5 Forces2 - Value Chain & Porter's 5 Forces
2 - Value Chain & Porter's 5 ForcesRaymond Gao
 
IUT presentation - English
IUT presentation - EnglishIUT presentation - English
IUT presentation - EnglishRaymond Gao
 
2nd iut presentation - French
2nd iut presentation - French2nd iut presentation - French
2nd iut presentation - FrenchRaymond Gao
 
5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBCRaymond Gao
 
Salesforce & SAP Integration
Salesforce & SAP IntegrationSalesforce & SAP Integration
Salesforce & SAP IntegrationRaymond Gao
 
Lean Start & Cloud Computing Methodology in French
Lean Start & Cloud Computing Methodology in FrenchLean Start & Cloud Computing Methodology in French
Lean Start & Cloud Computing Methodology in FrenchRaymond Gao
 
What is CloudSpokes?
What is CloudSpokes?What is CloudSpokes?
What is CloudSpokes?Raymond Gao
 
Building Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and SalesforceBuilding Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and SalesforceRaymond Gao
 

Plus de Raymond Gao (19)

System modeling and design
System modeling and designSystem modeling and design
System modeling and design
 
2020 Enterprise IT Outlook
2020 Enterprise IT Outlook2020 Enterprise IT Outlook
2020 Enterprise IT Outlook
 
Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216
Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216
Student Presentation - Social Media & E-Commerce (Groupon) / BCO-216
 
Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)
 
10 - Project Management
10 - Project Management10 - Project Management
10 - Project Management
 
9 - Security
9 - Security9 - Security
9 - Security
 
8 E-Commerce
8 E-Commerce8 E-Commerce
8 E-Commerce
 
7 - Enterprise IT in Action
7 - Enterprise IT in Action7 - Enterprise IT in Action
7 - Enterprise IT in Action
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
4 - Mobiility & Impacts
4 - Mobiility & Impacts4 - Mobiility & Impacts
4 - Mobiility & Impacts
 
2 - Value Chain & Porter's 5 Forces
2 - Value Chain & Porter's 5 Forces2 - Value Chain & Porter's 5 Forces
2 - Value Chain & Porter's 5 Forces
 
1-Intro to MIS
1-Intro to MIS1-Intro to MIS
1-Intro to MIS
 
IUT presentation - English
IUT presentation - EnglishIUT presentation - English
IUT presentation - English
 
2nd iut presentation - French
2nd iut presentation - French2nd iut presentation - French
2nd iut presentation - French
 
5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC
 
Salesforce & SAP Integration
Salesforce & SAP IntegrationSalesforce & SAP Integration
Salesforce & SAP Integration
 
Lean Start & Cloud Computing Methodology in French
Lean Start & Cloud Computing Methodology in FrenchLean Start & Cloud Computing Methodology in French
Lean Start & Cloud Computing Methodology in French
 
What is CloudSpokes?
What is CloudSpokes?What is CloudSpokes?
What is CloudSpokes?
 
Building Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and SalesforceBuilding Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and Salesforce
 

Dernier

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Dernier (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

3 - Social Media and Enterprise

  • 1. Management Information Systems BCO-216 Fall 2014 (Social Media and Enterprise) Raymond Gao, MBA
  • 2. Agenda • (1st half) – What is Social Media? – How is it used in enterprises? – Ethics, Moral, etc. – It’s Impacts: Privacy, IP, etc. • (2nd half) – Case Study: Facebook
  • 5. What is Social Media?* A: People have innate desire to communicate and to build communities. Hence, tools, facilitating those interactions, are called social media tools.
  • 7. Gartner Magic Quadrant of Enterprise Social S/W* 1. Leaders* 2. Challengers* 3. Visionaries* 4. Niche Players*
  • 8. LEARNING OBJECTIVES • What ethical, social, and political issues are raised by information systems? • What specific principles for conduct can be used to guide ethical decisions? • Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? • How have information systems affected everyday life?
  • 9. Behavioral Targeting: Your Privacy Is the Target • Problem: Need to efficiently target online ads. • Solutions: Behavioral targeting allows businesses and organizations to more precisely target desired demographics. • Google uses tracking files to monitor user activity on thousands of sites; businesses monitor activity on their own sites to better understand customers. • Demonstrates IT’s role in organizing and distributing information. • Illustrates the ethical questions inherent in online information gathering.
  • 10. Understanding Ethical and Social Issues Related to Systems • Recent cases of failed ethical judgment in business: – Barclay’s Bank, GlaxoSmithKline, Walmart – In many, information systems used to bury decisions from public scrutiny • Ethics – Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors
  • 11. Understanding Ethical and Social Issues Related to Systems • Information systems and ethics – Information systems raise new ethical questions because they create opportunities for: • Intense social change, threatening existing distributions of power, money, rights, and obligations • New kinds of crime (i.e. Photo Leaks, etc.)
  • 12. Understanding Ethical and Social Issues Related to Systems • A model for thinking about ethical, social, and political Issues – Society as a calm pond – IT as rock dropped in pond, creating ripples of new situations not covered by old rules – Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws • Requires understanding of ethics to make choices in legally gray areas
  • 13. The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control. Figure 4-1 THE RELATIONSHIP AMONG ETHICAL, SOCIAL, POLITICAL ISSUES IN AN INFORMATION SOCIETY
  • 14. *Understanding Ethical and Social Issues Related to Systems • Five moral dimensions* of the information age: – Information rights and obligations – Property rights and obligations – Accountability and control – System quality – Quality of life
  • 15. Understanding Ethical and Social Issues Related to Systems • Key technology trends that raise ethical issues – Doubling of computer power • More organizations depend on computer systems for critical operations. – Rapidly declining data storage costs • Organizations can easily maintain detailed databases on individuals. – Networking advances and the Internet • Copying data from one location to another and accessing personal data from remote locations are much easier.
  • 16. Understanding Ethical and Social Issues Related to Systems – Advances in data analysis techniques • Profiling – Combining data from multiple sources to create dossiers of detailed information on individuals • Nonobvious relationship awareness (NORA) – Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists – Mobile device growth • Tracking of individual cell phones
  • 17. NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job at a casino shares a telephone number with a known criminal and issue an alert to the hiring manager. Figure 4-2 NONOBVIOUS RELATIONSHIP AWARENESS (NORA)
  • 18. Ethics in an Information Society • Basic concepts for ethical analysis – Responsibility: • Accepting the potential costs, duties, and obligations for decisions – Accountability: • Mechanisms for identifying responsible parties – Liability: • Permits individuals (and firms) to recover damages done to them – Due process: • Laws are well-known and understood, with an ability to appeal to higher authorities
  • 19. • Five-step ethical analysis Ethics in an Information Society 1. Identify and clearly describe the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. 3. Identify the stakeholders. 4. Identify the options that you can reasonably take. 5. Identify the potential consequences of your options.
  • 20. • Candidate ethical principles – Golden Rule Ethics in an Information Society • Do unto others as you would have them do unto you. – Immanuel Kant’s Categorical Imperative • If an action is not right for everyone to take, it is not right for anyone. – Descartes’ Rule of Change • If an action cannot be taken repeatedly, it is not right to take at all.
  • 21. Ethics in an Information Society • Candidate ethical principles (cont.) – Utilitarian Principle • Take the action that achieves the higher or greater value. – Risk Aversion Principle • Take the action that produces the least harm or potential cost. – Ethical “No Free Lunch” Rule • Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise.
  • 22. • Professional codes of conduct – Promulgated by associations of professionals • Examples: AMA, ABA, AITP, ACM – Promises by professions to regulate themselves in the general interest of society • Real-world ethical dilemmas – One set of interests pitted against another • Example: right of company to maximize productivity of workers versus workers right to use Internet for short personal tasks Ethics in an Information Society
  • 23. The Moral Dimensions of Information Systems • Information rights: privacy and freedom in the Internet age – Privacy: • Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself – In the United States, privacy protected by: • First Amendment (freedom of speech) • Fourth Amendment (unreasonable search and seizure) • Additional federal statues (e.g., Privacy Act of 1974)
  • 24. The Moral Dimensions of Information Systems • Fair information practices: – Set of principles governing the collection and use of information • Basis of most U.S. and European privacy laws • Based on mutuality of interest between record holder and individual • Restated and extended by FTC in 1998 to provide guidelines for protecting online privacy – Used to drive changes in privacy legislation • COPPA • Gramm-Leach-Bliley Act • HIPAA • Do-Not-Track Online Act of 2011
  • 25. • FTC FIP principles: The Moral Dimensions of Information Systems – Notice/awareness (core principle) • Web sites must disclose practices before collecting data. – Choice/consent (core principle) • Consumers must be able to choose how information is used for secondary purposes. – Access/participation • Consumers must be able to review and contest accuracy of personal data.
  • 26. The Moral Dimensions of Information Systems • FTC FIP principles (cont.) – Security • Data collectors must take steps to ensure accuracy, security of personal data. – Enforcement • Must be mechanism to enforce FIP principles.
  • 27. The Moral Dimensions of Information Systems • European Directive on Data Protection: – Companies must inform people information is collected and disclose how it is stored and used. – Requires informed consent of customer. – EU member nations cannot transfer personal data to countries without similar privacy protection (e.g., the United States). – U.S. businesses use safe harbor framework. • Self-regulating policy and enforcement that meets objectives of government legislation but does not involve government regulation or enforcement.
  • 28. The Moral Dimensions of Information Systems • Internet challenges to privacy: – Cookies • Identify browser and track visits to site • Super cookies (Flash cookies) – Web beacons (Web bugs) • Tiny graphics embedded in e-mails and Web pages • Monitor who is reading e-mail message or visiting site – Spyware • Surreptitiously installed on user’s computer • May transmit user’s keystrokes or display unwanted ads – Google services and behavioral targeting
  • 29. Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Figure 4-3 HOW COOKIES IDENTIFY WEB VISITORS
  • 30. The Moral Dimensions of Information Systems • The United States allows businesses to gather transaction information and use this for other marketing purposes. – Opt-out vs. opt-in model • Online industry promotes self-regulation over privacy legislation. • However, extent of responsibility taken varies: – Complex/ambiguous privacy statements – Opt-out models selected over opt-in – Online “seals” of privacy principles
  • 31. • Technical solutions The Moral Dimensions of Information Systems – E-mail encryption – Anonymity tools – Anti-spyware tools – Browser features • “Private” browsing • “Do not track” options – Overall, few technical solutions
  • 32. The Moral Dimensions of Information Systems* • Property rights: Intellectual property – Intellectual property: intangible property of any kind created by individuals or corporations – Three main ways that intellectual property is protected: * • Trade secret*: intellectual work or product belonging to business, not in the public domain • Copyright*: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years • Patents*: grants creator of invention an exclusive monopoly on ideas behind invention for 20 year – Plant, Utility, Design Patents (http://www.neustel.com/Design-Utility-Patents/Design-Patent-vs-Utility- Patent.aspx) • Design Rights: Against unauthorized party making copycat products.
  • 33. The Moral Dimensions of Information Systems • Challenges to intellectual property rights – Digital media different from physical media (e.g., books) • Ease of replication • Ease of transmission (networks, Internet) • Difficulty in classifying software • Compactness • Difficulties in establishing uniqueness • Digital Millennium Copyright Act (DMCA) – Makes it illegal to circumvent technology-based protections of copyrighted materials
  • 34. The Moral Dimensions of Information Systems • Accountability, liability, control – Computer-related liability problems • If software fails, who is responsible? – If seen as part of machine that injures or harms, software producer and operator may be liable. – If seen as similar to book, difficult to hold author/publisher responsible. – What should liability be if software seen as service? Would this be similar to telephone systems not being liable for transmitted messages?
  • 35. The Moral Dimensions of Information Systems • System quality: Data quality and system errors – What is an acceptable, technologically feasible level of system quality? • Flawless software is economically unfeasible. – Three principal sources of poor system performance: • Software bugs, errors • Hardware or facility failures • Poor input data quality (most common source of business system failure)
  • 36. The Moral Dimensions of Information Systems • Quality of life: Equity, access, boundaries – Negative social consequences of systems • Balancing power: although computing power decentralizing, key decision making remains centralized • Rapidity of change: businesses may not have enough time to respond to global competition • Maintaining boundaries: computing, Internet use lengthens work-day, infringes on family, personal time • Dependence and vulnerability: public and private organizations ever more dependent on computer systems
  • 37. The Moral Dimensions of Information Systems • Computer crime and abuse – Computer crime: commission of illegal acts through use of computer or against a computer system—computer may be object or instrument of crime – Computer abuse: unethical acts, not illegal • Spam: high costs for businesses in dealing with spam • Employment: – Reengineering work resulting in lost jobs • Equity and access—the digital divide: – Certain ethnic and income groups in the United States less likely to have computers or Internet access
  • 38. • Health risks: The Moral Dimensions of Information Systems – Repetitive stress injury (RSI) • Largest source is computer keyboards • Carpal tunnel syndrome (CTS) – Computer vision syndrome (CVS) • Eyestrain and headaches related to screen use – Technostress • Aggravation, impatience, fatigue
  • 40. 1. How do you use Social Media? 2. Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves? 3. How can using the sharing privacy controls help preserve your privacy on Facebook? In what ways is the sharing control ineffective? 4. How will changing your Connection settings on Facebook help protect your privacy? 5. Why are Facebook’s facial recognition software and policies a potential threat to privacy? Case Study - Facebook
  • 41. Social Media Bubble Trouble Social media bubble trouble? http://a.msn.com/09/en-us/BB83jQ4
  • 42. THANK YOU! email: raymond.gao@euruni.edu Twitter: @raygao