Chapter Five - Carl Rebman Associate Professor of Information

Download Report

Transcript Chapter Five - Carl Rebman Associate Professor of Information

Chapter Five
Ethical and Social Impact of
Information Systems
Understanding Ethical and Social
Issues Related To Systems
Ethics – principles of right and wrong
that can be used by individuals acting as
free moral agents to make choices to
guide their behavior
Information rights – the rights that
individuals and organizations have with
respect to information that pertains to
themselves
Five Moral Dimensions of the
Information Age
Information rights and obligations
What information rights do individuals have
with respect to information about
themselves?
Property Rights
How will traditional intellectual property
rights be protected in a digital society in
which tracing and accounting for ownership
is difficult.
Five Moral Dimensions of the
Information Age
Accountability and control
Who can and will be held accountable and liable for
the harm done to the individual and collective
information and property rights?
System Quality
What standards of data and system quality should
we demand to protect individual rights and the
safety of society?
Quality of Life
What values should be preserved in an information
and knowledge-based society?What institutions
should we protect? What cultures and values?
Key Technology Trends that
raise Ethical Issues
The doubling of computing power increases
power, but system errors and poor data quality.
Advances in data storage helps companies and
individuals to obtain and store more private or
protected info/material
Advances in datamining enable people to find
much more information than before
Advances in networking greatly reduces the cost
of the obtaining information and moving
information.
Basic Ethics Concepts
Responsibility – accepting the potential costs,
duties, and obligations for the decisions that
one makes
Accountability – the mechanisms for assessing
responsibility for decisions made and actions
taken
Liability – the existence of laws that permit
individuals to recover the damages done to
them by other actors, systems, or organizations
Due process – a process in which laws are wellknown and there is a system to appeal to higher
authorities to ensure that laws are applied
correctly
Ethical Analysis
Identify and describe clearly the facts
Define the conflict or dilemma and
identify the higher order values involved.
Identify the stakeholders
Identify the options that you can
reasonably take.
Identify the potential consequences of
your options.
Candidate Ethical Principles
Golden Rule
Immanual Kant’s Categorical Imperative
A principle that if an action is not right for everyone
to take than it is not right for anyone
Descates’ Rule of Change
A principle that states if an action cannot be
repeatedly taken than it is not right to be taken at
any time.(also known as the slippery slope rule)
Candidate Ethical Principles
Utilitarian Principle
Principle that one assumes one can put values in
rank order and understand the consequences of
various courses of action.
Risk Aversion Principle
Principle that one should take the action the
produces the least amount of harm or incurs the
least cost.
Ethical ‘no free lunch’ rule
Assumption that all tangible and intangible objects
are owned by someone else unless there is a
specified declaration otherwise, ie the creator.
Professional Codes of Conduct
Associations comprised of people wishing
to be called professional and recognized
for their expertise and knowledge.
AMA
ABA
DPMA
ACM
Fair Information Practices
Principles
Privacy – the claim of individuals to be left
alone, free from surveillance or interference
from other individuals, organizations, or the
state
FIP – 1973
There should be no personal record systems that are
kept secret
Individuals have rights of access, inspections,
review, and amendment to systems that contain
information about them.
Fair Information Practices
Principles
FIP (1973) Continued
There must be no use of personal information for
purposes other than those for which it was granted
without prior consent
Managers of systems are responsible and can be
held accountable and liable for the damage done by
systems for their reliability and security
Governments have the right to intervene in the
information relationships among private parties.
Know Table 5.2 page 135
Property Rights
Intellectual property
Intangible property created by individuals or
corporations that is subject to protections under
trade secret, copyright, and patent laws
Trade secret- any intellectual work or product used
for a business purpose that can be classified as
belonging to that business, provided it is not based
on information in the public domain
Copyright – a statutory grant that protects the
creators of intellectual property against copying by
others for any purpose for a period of 28 years
Patent – a legal document that grants the owner an
exclusive monopoly on the ideas behind an invention
for 17 years
Internet Challenges to Privacy
Spamming – the practice of sending
unsolicited email and other electronic
communication.
Web pages, content and framing issues
Accountability, Liability, and
Control
The EDS ATM example
The Shell Oil Example
Questions, who is at fault? Who should
pay?
Computer Crime and Abuse
Computer crime
The commission of illegal acts through the
use of a computer or against a computer
system.
Computer Abuse
The commission of acts involving a computer
that may not be illegal but are considered
unethical
Internet Crime and Abuse
Taken from table 5.4 page 147
Hacking – exploiting weaknesses in Web site
security to obtain data or insert viruses.
Jamming – using software to tie up computers
hosting web sites so visitors cannot access site
Malicious software – viruses sent to disable
computers or cause harm
Sniffing – using software to electronically eavesdrop
on communications transmissions
Spoofing – setting up false web sites with the
purpose of obtaining information from unsuspecting
visitors
Health Risks of Computers
 Repetitive stress injury (RSI)
 Occupational disease that occurs when muscle groups are
forced through repetitive actions with high-impact loads or
thousands of repetitive actions with low-impact loads.
 Carpal tunnel syndrome (CTS)
 Type of RSI in which pressure on the median nerve through the
wrist bone carpal tunnel structures produces pain
 Computer vision syndrome (CVS)
 Eye strain condition related to computer display screen use
with symptoms including headaches, blurred vision, and dry,
irritated eyes.
 Technostress
 Stress induced by computer use whose symptoms include
aggravations and hostility towards computers and human
Finale: Corporate Code of
Ethics
Addresses
Information rights and privacy
Property rights and information
Accountability and control
System quality
Quality of Life