SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
FIVE MORAL DIMENSIONS OF
INFORMATION SYSTEMS
Facilitator: Mr. Roshan Bhattarai
FIVE MORAL DIMENSIONS OF
ISs
1. INFORMATION RIGHTS: PRIVACY AND
FREEDOM
• Privacy is the claim of individuals to be free from
surveillance or interference from others
• Millions of employees are subject to electronic and other
forms of high-tech surveillance
• IT threatens individuals claims to privacy by making the
invasion of privacy cheap, profitable and effective.
• In United States
– Right to information Act, 2005
– Computer Security Act, 1987
– Electronic Communications Privacy Act, 1986
– Children’s Online Privacy Protection Act (COPPA), 1998
– Fair Information Practices (FIP), 1973
– Health Insurance Portability and Accountability Act (HIPAA), 1996 : Personal
medical records
• In India
– Article 21 of Indian Constitution, right to privacy as fundamental Right
– Information Technology Rules, 2011
– The Credit Information Companies Regulation Act (CICRA), 2005 : customers
data protection of banks and others FIs
• European Directives
– European Commission’s Directive on Data Protection, 1998 : inform people
when they collect information about them
– Customers should provide Informed Consent (opt-in/opt-out) to
organizations
– US business firms should have a SAFE HARBOR, a self regulating policy or
enforcement that meet EU standards to use personal data
Internet Challenges to Privacy
• Information sent over internet can be monitored,
captured and stored before it reaches the destination
• Microsoft Advertising, Yahoo, Double Click etc are
capable of tracking all browsing behavior at thousands of
websites using cookies
• Cookies are small text files deposited on web site visitor’s
hard drive which identify the visitor’s web browser and
tracks visits to the website. The site can customize its
contents for each visitor’s interests.
• Web beacons are tiny objects invisibly embedded in
email messages and web pages that are designed to
monitor the behavior of the user visiting a website or
sending email.
• It captures and transmits information such as IP address,
time of visit, the type of web browser etc
• Web beacons are usually placed on popular sites by
third party firms who pay websites a fee for access to
audience.
• Spyware can secretly install itself on an Internet user’s
computer
• Once installed, it can report the user’s movements on the
Internet.. Also called a “tracking software”..
Technical solutions
• The Platform for Privacy Preferences, known as P3P,
enables automatic communications of privacy policies
between site and its visitors.
• P3P enables websites to translate their privacy policies
into a standard format that can be read by the user’s
browser software.
• The browser software evaluates the web site’s privacy
policy to determine whether it is compatible with the
user’s privacy preferences.
FIVE MORAL DIMENSIONS OF
ISs
2. PROPERTY RIGHTS: INTELLECTUAL PROPERTY
• ISs have challenged existing laws and social practices
that protect intellectual property
• Computerized information can be so easily copied or
distributed on networks
• Intellectual property is subject to a variety of
protections under 3 different legal traditions:
– Trade secrets
– Copyright
– Patent law
Trade Secret
• Any Intellectual work product- can be a formula, a
pattern, a device or compilation of data used for business
purpose can be classified as a trade secret
• Trade secret laws grant a monopoly on the ideas behind
a work product
• To make this claim, the creator or owner must take care
to bind employees and customers with nondisclosure
agreements and to prevent the secret from falling into
public domain.
Copyright
• Copyright is a legal grant that protects creators of
intellectual property from having their work copied by
others for any purpose during the life of the author plus
additional 70 years after author’s death.
• For corporate owned works, copyright protection lasts
for 95 years after their initial creation
• It includes books, software, lectures, dramas, maps,
musical compositions, drawings, artwork etc.
• The intent behind copyright laws has been to encourage
creativity and authorship by ensuring that creative
people receive the financial and other benefits of their
work.
• The underlying ideas behind a work are not protected,
only their manifestation (expression) of work
• “Look and feel” copyright infringements (violation)
lawsuits are precisely about the distinction between idea
and the expression.
Patents
• A patent grants the owner an exclusive monopoly on the
ideas behind an invention for 20 years
• The intent behind patent law is to ensure full financial
and other rewards
• Widespread use of invention is possible under license
from patent’s owner.
• The strength of patent protection is that it grants a
monopoly on the underlying concepts and ideas
• The difficulty is passing the criteria of originality, novelty
and invention.
Challenges to Intellectual Property Rights
• Digital media differs from other in terms of ease of
replication, transmission and alternation, making theft
easy and difficulties in establishing uniqueness
• Perfect digital copies cost almost nothing.
• Sharing of digital content over the Internet costs almost
nothing.
• Rate of global software piracy was 14% in 2010
• Over 60% of software sold in Asia-Pacific region is of
pirated version- Business Software Alliance, 2011
• Digital Millennium Copyright Act (DCMA), 1998 is
providing copyright protection to sell and distribute
books, articles and other intellectual property legally.
FIVE MORAL DIMENSIONS OF
ISs
3. ACCOUNTABILITY, LIABILITY AND CONTROL
• New ISs are challenging existing liability laws and social
practices for holding individuals and institutions
accountable.
• If a person is injured by a machine controlled by
software, who should be held accountable and held
liable?
• If you outsource your information processing, can you
hold the external vendor liable for injuries done to your
customers?
• Should public online services permit the transmission of
offensive material?
Computer related liability problems
• According to banking regulation, the banks are the
custodians of the client’s money and hence are
responsible for its security and disbursal. Who should be
held responsible for cloned cards being worked through
the system?
• Computer software is a part of a machine, and the
machine injures someone physically or economically, the
producer of the software and the operator can be held
liable for damages
• Organizations can be held liable for offensive content on
their websites
• Online services might be held liable for postings by their
users
FIVE MORAL DIMENSIONS OF
ISs
4. SYSTEM QUALITY: DATA QUALITY AND SYSTEM ERRORS
• What is an acceptable, technologically feasible level of
system quality?
• Individuals and organizations may be held responsible for
avoidable and foreseeable consequences
• Some system errors are correctable and foreseeable only
at very great expense, en expense so great that pursuing
this level of perfection is not feasible economically-no
one could afford the product.
• What is the responsibility of a producer of computer
services-should it withdraw the product that can never
be perfect, warn the user, or forget about the risk?
• Three principal sources of poor system performance are
– software bugs/errors
– hardware failure
– poor data input quality
• There is a technological barrier to perfect software and
users must be aware of the potential failure.
• No testing standards for producing acceptable software
has been arrived yet.
• By far, the most common source of business system
failure is the input data quality.
FIVE MORAL DIMENSIONS OF
ISs
5. QUALITY OF LIFE
• The negative social costs of introducing information
technologies are beginning to mount along with the
power of technology
• Computers and Information technologies potentially can
destroy valuable elements of our culture and society
Some of the negative social consequences of systems are
discussed below:
• Maintaining boundaries: family, work and leisure
– Extensive internet use, takes people away from family and
friends
– “Do anything anywhere” can blur boundaries between work
and family time
– Lead to anti-social behavior
• Dependence and vulnerability
– Our institutions are highly dependent on information systems
and therefore highly vulnerable if these systems fail
– There are few regulatory standards to protect us from the
failure of complex electrical, communications, and computer
networks upon which we all depend
• Rapidity of Change: Reduced time to competition
– Businesses may not have enough time to respond to global
competitors, may wiped out of market
• Employment: Trickle down Technology and Job Loss
– Redesigning business processes could potentially cause
millions of workers to lose their jobs
– The rapid development of the Internet has made it possible to
offshore hundreds of thousands of jobs from high-wage
countries to low- wage countries.
• Equity and Access: Increasing Social Class Cleavages
– Does everyone have an equal opportunity to participate in the
digital age?
– Or will the cleavages be increased permitting the better off to
become even more better off relative to others?
– The digital divide could lead to a society of information haves,
literate, and skilled versus have-nots, illiterate and unskilled
• Computer Crime and Abuse
– New technologies create new opportunities for committing
crime and unethical activities
– Eg: Destroying company’s computer, Illegal access to critical
information, Spam messages, text messaging while driving etc.
• Health Risks
– The most common type of computer related Repetitive
Stress Injury (RSI) is Carpal Tunnel Syndrome (CTS), in
which pressure on the median nerve through the wrist’s
bony structure, called a carpal tunnel, produces pain.
– Computer Vision Syndrome (CVS) is an eyestrain condition
related to display screen use in desktops, laptops, smart
phones etc more than 3 hours a day
– Techno-stress is induced by computer use resulting
impatience, fatigue, aggression towards humans etc.
– Experts say: humans working continuously with computers
come to expect other humans to behave like computers
providing instant responses, attentiveness, and absence of
emotion
– Also prevents humans from focusing and thinking clearly..
• Balancing Power: Center versus Periphery
– Centralized computing to centralize power and
decentralized computing to empower lower levels
– Lower levels may be empowered to make minor
decisions but key policy decisions may be centralized
– Is IT centralizing decision-making power in the hands of a
few, or is it allowing many more people to participate in
decisions that affect their lives?

Contenu connexe

Tendances

Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...Tonmoy zahid Rishad
 
Chapter 8 securing information systems
Chapter 8 securing information systemsChapter 8 securing information systems
Chapter 8 securing information systemsVan Chau
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationSukanya Ben
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsSukanya Ben
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERPTom Matys
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Role of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentRole of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentAnand Jha
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingSukanya Ben
 
Enterprise Resource Planning- BEST PPT
Enterprise Resource Planning- BEST PPTEnterprise Resource Planning- BEST PPT
Enterprise Resource Planning- BEST PPTSiddharth Modi
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeSukanya Ben
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital FirmsPulkit Sharma
 

Tendances (20)

Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
Chapter 8 securing information systems
Chapter 8 securing information systemsChapter 8 securing information systems
Chapter 8 securing information systems
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
 
Chapter 1 MIS
Chapter 1 MISChapter 1 MIS
Chapter 1 MIS
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERP
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
Chapter 7 e business systems
Chapter 7  e business systemsChapter 7  e business systems
Chapter 7 e business systems
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Chapter 3 MIS
Chapter 3 MISChapter 3 MIS
Chapter 3 MIS
 
Electronic Supply Chain Management
Electronic Supply Chain ManagementElectronic Supply Chain Management
Electronic Supply Chain Management
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Role of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentRole of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain Manageent
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
Enterprise Resource Planning- BEST PPT
Enterprise Resource Planning- BEST PPTEnterprise Resource Planning- BEST PPT
Enterprise Resource Planning- BEST PPT
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing Knowledge
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
 

Similaire à Five moral dimensions of information systems pdf

Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptRogerPrimo2
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Ethics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchEthics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan kabir Solicitor
 

Similaire à Five moral dimensions of information systems pdf (20)

PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
AI and the Law
AI and the LawAI and the Law
AI and the Law
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Ethics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchEthics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical Research
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
E commerce
E commerce E commerce
E commerce
 

Plus de Ace Institute of Management (Nepal), Institute of Management Studies (Nepal)

Plus de Ace Institute of Management (Nepal), Institute of Management Studies (Nepal) (20)

Innovation and its Types
Innovation and its TypesInnovation and its Types
Innovation and its Types
 
Electronic Environment
Electronic EnvironmentElectronic Environment
Electronic Environment
 
Forms of Online/Electronic/Internet Advertising (Marketing)
Forms of Online/Electronic/Internet Advertising (Marketing)Forms of Online/Electronic/Internet Advertising (Marketing)
Forms of Online/Electronic/Internet Advertising (Marketing)
 
Issues with Online Marketing
Issues with Online MarketingIssues with Online Marketing
Issues with Online Marketing
 
Introduction to Online/Electronic Marketing
Introduction to Online/Electronic MarketingIntroduction to Online/Electronic Marketing
Introduction to Online/Electronic Marketing
 
Credit Card Systems
Credit Card SystemsCredit Card Systems
Credit Card Systems
 
Electronic Banking in Nepal
Electronic Banking in NepalElectronic Banking in Nepal
Electronic Banking in Nepal
 
Electronic Payment Systems: Risk and Requirements
Electronic Payment Systems: Risk and RequirementsElectronic Payment Systems: Risk and Requirements
Electronic Payment Systems: Risk and Requirements
 
Types of Computer
Types of ComputerTypes of Computer
Types of Computer
 
Introduction to Computer Software
Introduction to Computer SoftwareIntroduction to Computer Software
Introduction to Computer Software
 
Technology Life Cycle
Technology Life CycleTechnology Life Cycle
Technology Life Cycle
 
Technology Adoption Life Cycle
Technology  Adoption Life CycleTechnology  Adoption Life Cycle
Technology Adoption Life Cycle
 
Introduction to Mobile Commerce
Introduction to Mobile CommerceIntroduction to Mobile Commerce
Introduction to Mobile Commerce
 
Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
 
Sources and types of Technology
Sources and types of TechnologySources and types of Technology
Sources and types of Technology
 
Types of Network and Transmission Media
Types of Network and Transmission MediaTypes of Network and Transmission Media
Types of Network and Transmission Media
 
Information Technology and its Applications
Information Technology and its ApplicationsInformation Technology and its Applications
Information Technology and its Applications
 
Key concepts of Technology Management
Key concepts of Technology ManagementKey concepts of Technology Management
Key concepts of Technology Management
 
Data warehouses and data mining
Data warehouses and data miningData warehouses and data mining
Data warehouses and data mining
 
Michael porter's competitive forces model
Michael porter's competitive forces modelMichael porter's competitive forces model
Michael porter's competitive forces model
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Five moral dimensions of information systems pdf

  • 1. FIVE MORAL DIMENSIONS OF INFORMATION SYSTEMS Facilitator: Mr. Roshan Bhattarai
  • 2. FIVE MORAL DIMENSIONS OF ISs 1. INFORMATION RIGHTS: PRIVACY AND FREEDOM • Privacy is the claim of individuals to be free from surveillance or interference from others • Millions of employees are subject to electronic and other forms of high-tech surveillance • IT threatens individuals claims to privacy by making the invasion of privacy cheap, profitable and effective.
  • 3. • In United States – Right to information Act, 2005 – Computer Security Act, 1987 – Electronic Communications Privacy Act, 1986 – Children’s Online Privacy Protection Act (COPPA), 1998 – Fair Information Practices (FIP), 1973 – Health Insurance Portability and Accountability Act (HIPAA), 1996 : Personal medical records • In India – Article 21 of Indian Constitution, right to privacy as fundamental Right – Information Technology Rules, 2011 – The Credit Information Companies Regulation Act (CICRA), 2005 : customers data protection of banks and others FIs • European Directives – European Commission’s Directive on Data Protection, 1998 : inform people when they collect information about them – Customers should provide Informed Consent (opt-in/opt-out) to organizations – US business firms should have a SAFE HARBOR, a self regulating policy or enforcement that meet EU standards to use personal data
  • 4. Internet Challenges to Privacy • Information sent over internet can be monitored, captured and stored before it reaches the destination • Microsoft Advertising, Yahoo, Double Click etc are capable of tracking all browsing behavior at thousands of websites using cookies • Cookies are small text files deposited on web site visitor’s hard drive which identify the visitor’s web browser and tracks visits to the website. The site can customize its contents for each visitor’s interests.
  • 5. • Web beacons are tiny objects invisibly embedded in email messages and web pages that are designed to monitor the behavior of the user visiting a website or sending email. • It captures and transmits information such as IP address, time of visit, the type of web browser etc • Web beacons are usually placed on popular sites by third party firms who pay websites a fee for access to audience. • Spyware can secretly install itself on an Internet user’s computer • Once installed, it can report the user’s movements on the Internet.. Also called a “tracking software”..
  • 6. Technical solutions • The Platform for Privacy Preferences, known as P3P, enables automatic communications of privacy policies between site and its visitors. • P3P enables websites to translate their privacy policies into a standard format that can be read by the user’s browser software. • The browser software evaluates the web site’s privacy policy to determine whether it is compatible with the user’s privacy preferences.
  • 7. FIVE MORAL DIMENSIONS OF ISs 2. PROPERTY RIGHTS: INTELLECTUAL PROPERTY • ISs have challenged existing laws and social practices that protect intellectual property • Computerized information can be so easily copied or distributed on networks • Intellectual property is subject to a variety of protections under 3 different legal traditions: – Trade secrets – Copyright – Patent law
  • 8. Trade Secret • Any Intellectual work product- can be a formula, a pattern, a device or compilation of data used for business purpose can be classified as a trade secret • Trade secret laws grant a monopoly on the ideas behind a work product • To make this claim, the creator or owner must take care to bind employees and customers with nondisclosure agreements and to prevent the secret from falling into public domain.
  • 9. Copyright • Copyright is a legal grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus additional 70 years after author’s death. • For corporate owned works, copyright protection lasts for 95 years after their initial creation • It includes books, software, lectures, dramas, maps, musical compositions, drawings, artwork etc.
  • 10. • The intent behind copyright laws has been to encourage creativity and authorship by ensuring that creative people receive the financial and other benefits of their work. • The underlying ideas behind a work are not protected, only their manifestation (expression) of work • “Look and feel” copyright infringements (violation) lawsuits are precisely about the distinction between idea and the expression.
  • 11. Patents • A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years • The intent behind patent law is to ensure full financial and other rewards • Widespread use of invention is possible under license from patent’s owner. • The strength of patent protection is that it grants a monopoly on the underlying concepts and ideas • The difficulty is passing the criteria of originality, novelty and invention.
  • 12. Challenges to Intellectual Property Rights • Digital media differs from other in terms of ease of replication, transmission and alternation, making theft easy and difficulties in establishing uniqueness • Perfect digital copies cost almost nothing. • Sharing of digital content over the Internet costs almost nothing. • Rate of global software piracy was 14% in 2010 • Over 60% of software sold in Asia-Pacific region is of pirated version- Business Software Alliance, 2011 • Digital Millennium Copyright Act (DCMA), 1998 is providing copyright protection to sell and distribute books, articles and other intellectual property legally.
  • 13. FIVE MORAL DIMENSIONS OF ISs 3. ACCOUNTABILITY, LIABILITY AND CONTROL • New ISs are challenging existing liability laws and social practices for holding individuals and institutions accountable. • If a person is injured by a machine controlled by software, who should be held accountable and held liable? • If you outsource your information processing, can you hold the external vendor liable for injuries done to your customers? • Should public online services permit the transmission of offensive material?
  • 14. Computer related liability problems • According to banking regulation, the banks are the custodians of the client’s money and hence are responsible for its security and disbursal. Who should be held responsible for cloned cards being worked through the system? • Computer software is a part of a machine, and the machine injures someone physically or economically, the producer of the software and the operator can be held liable for damages • Organizations can be held liable for offensive content on their websites • Online services might be held liable for postings by their users
  • 15. FIVE MORAL DIMENSIONS OF ISs 4. SYSTEM QUALITY: DATA QUALITY AND SYSTEM ERRORS • What is an acceptable, technologically feasible level of system quality? • Individuals and organizations may be held responsible for avoidable and foreseeable consequences • Some system errors are correctable and foreseeable only at very great expense, en expense so great that pursuing this level of perfection is not feasible economically-no one could afford the product. • What is the responsibility of a producer of computer services-should it withdraw the product that can never be perfect, warn the user, or forget about the risk?
  • 16. • Three principal sources of poor system performance are – software bugs/errors – hardware failure – poor data input quality • There is a technological barrier to perfect software and users must be aware of the potential failure. • No testing standards for producing acceptable software has been arrived yet. • By far, the most common source of business system failure is the input data quality.
  • 17. FIVE MORAL DIMENSIONS OF ISs 5. QUALITY OF LIFE • The negative social costs of introducing information technologies are beginning to mount along with the power of technology • Computers and Information technologies potentially can destroy valuable elements of our culture and society
  • 18. Some of the negative social consequences of systems are discussed below: • Maintaining boundaries: family, work and leisure – Extensive internet use, takes people away from family and friends – “Do anything anywhere” can blur boundaries between work and family time – Lead to anti-social behavior • Dependence and vulnerability – Our institutions are highly dependent on information systems and therefore highly vulnerable if these systems fail – There are few regulatory standards to protect us from the failure of complex electrical, communications, and computer networks upon which we all depend • Rapidity of Change: Reduced time to competition – Businesses may not have enough time to respond to global competitors, may wiped out of market
  • 19. • Employment: Trickle down Technology and Job Loss – Redesigning business processes could potentially cause millions of workers to lose their jobs – The rapid development of the Internet has made it possible to offshore hundreds of thousands of jobs from high-wage countries to low- wage countries. • Equity and Access: Increasing Social Class Cleavages – Does everyone have an equal opportunity to participate in the digital age? – Or will the cleavages be increased permitting the better off to become even more better off relative to others? – The digital divide could lead to a society of information haves, literate, and skilled versus have-nots, illiterate and unskilled • Computer Crime and Abuse – New technologies create new opportunities for committing crime and unethical activities – Eg: Destroying company’s computer, Illegal access to critical information, Spam messages, text messaging while driving etc.
  • 20. • Health Risks – The most common type of computer related Repetitive Stress Injury (RSI) is Carpal Tunnel Syndrome (CTS), in which pressure on the median nerve through the wrist’s bony structure, called a carpal tunnel, produces pain. – Computer Vision Syndrome (CVS) is an eyestrain condition related to display screen use in desktops, laptops, smart phones etc more than 3 hours a day – Techno-stress is induced by computer use resulting impatience, fatigue, aggression towards humans etc.
  • 21. – Experts say: humans working continuously with computers come to expect other humans to behave like computers providing instant responses, attentiveness, and absence of emotion – Also prevents humans from focusing and thinking clearly.. • Balancing Power: Center versus Periphery – Centralized computing to centralize power and decentralized computing to empower lower levels – Lower levels may be empowered to make minor decisions but key policy decisions may be centralized – Is IT centralizing decision-making power in the hands of a few, or is it allowing many more people to participate in decisions that affect their lives?