CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS Flashcards

1
Q

WHAT ETHICAL, SOCIAL, AND POLITICAL ISSUES ARE RAISED BY INFORMATION SYSTEMS?

A

Information technology is introducing changes for which laws and rules of acceptable conduct have not yet been developed. Increasing computing power, storage, and networking capabilities–including the Internet–expand the reach individual and organizational actions and magnify their impacts. The ease and anonymity with which information is now communicated, copied, and manipulated in online environments pose new challenges to the protection of privacy and intellectual property. The main ethical, social, and political issue raised by information systems center around information rights and obligations, property rights and obligations, accountability and control, system quality, and quality of life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT SPECIFIC PRINCIPLES FOR CONDUCT CAN BE USED TO GUIDE ETHICAL DECISIONS?

A

Six ethical principles for judging conduct include the Golden Rule, Immanuel Kant’s Categorical Imperative, Descates’ rule or change, the Utilitarian Principle, the Risk Aversion Principle, and the ethical “no free lunch” rule. These principles should be used in conjunction with an ethical analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHY DO CONTEMPORARY INFORMATION SYSTEMS TECHNOLOGY AND THE INTERNET POSE CHALLENGES TO THE PROTECTION OF INDIVIDUAL PRIVACY AND INTELLECTUAL PROPERTY?

A

Contemporary data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profile about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. Cookies and other Web monitoring tools closely track the activities of Web site visitors. Not all Web sites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information. Traditional copyright laws are insufficient to protect against software privacy because digital material can be copied so easily and transmitted to many different locations simultaneously over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HOW MANY INFORMATION SYSTEMS AFFECTED EVERYDAY LIFE?

A

Although computer systems have been source of efficiency and wealth, they have some negative impacts. Computer errors can cause serious harm to individuals and organizations. Poor data quality is also responsible for disruptions and losses for business. Jobs can be lost when computers replace workers or tasks become unnecessary in reengineered business process. The ability to own and use a computer may be exacerbating socioeconomic disparities among different racial groups and social classes. Widespread use of computers increases opportunities for computer crime and computer abuse. Computers can also create health problems, such as RSI, computer vision syndrome, and technostress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Five moral dimension of information age

A

1.) Information rights and obligations
2.) Property rights and obligations
3.) Accountability and control
4.) System quality
5.) Quality of life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information systems raise new ethical questions because they create opportunities for:

A

1.) Intense social change, threatening existing distributions of power, money, rights, and obligations
2.) New kinds of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Combining data from multiple sources to create dossiers of detailed information on individuals.

A

Profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists.

A

Nonobvious relationship awareness (NORA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethics analysis: A five-step process

A

1.) Identify and clearly describe the facts.
2.) Define the conflict or dilemma and identify the higher-order values involved.
3.) Identify the stakeholders.
4.) Identify the options that you can reasonably take.
5.) Identify the potential consequences of your options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accepting the potential costs, duties, and obligations for decisions.

A

Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mechanisms for identifying responsible parties.

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If an action is not right for everyone to take, it is not right for anyone.

A

Immanuel Kant’s Categorical Imperative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Laws are well known and understood, with an ability to appeal to higher authorities.

A

Due process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Permits individuals (and firms) to recover damages done to them.

A

Liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Do unto others as you would have them do unto you.

A

Golden Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If an action cannot be taken repeatedly, it is not right to take.

A

Descartes’ Rule of Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Take the action that achieves the higher or greater value.

A

Utilitarian Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Take the action that produces the least harm or potential cost.

A

Risk Aversion Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise.

A

Ethical “No Free Lunch” Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consumers must be able to choose how information is used for secondary purposes.

A

Choice/consent (core principle)

15
Q

Consumers must be able to review, contest accuracy of personal data.

A

Access/participation

15
Q

Websites must disclose practices before collecting data

A

Notice/awareness (core principle)

16
Q

Data collectors must take steps to ensure accuracy, ___________ of personal data.

A

Security

17
Q

Must be mechanism to enforce FIP principles.

A

Enforcement

18
Q

Tiny files downloaded by Web site to visitor’s hard drive. Identify visitor’s browser and track visits to site.

A

Cookies

18
Q

Tiny graphics embedded in e-mail messages and Web pages. Monitor who is reading e-mail message or visiting site.

A

Web beacons (Web bugs)

18
Q

Three main ways that intellectual property is protected

A

1.) Trade secret
2.) Copyright
3.) Patents

18
Q

Intellectual work or product belonging to business, not in the public domain

A

Trade secret

19
Q

Surreptitiously installed on user’s computer. May transmit user’s keystrokes or display unwanted ads.

A

Spyware

20
Q

Intangible property of any kind created by individuals or corporations.

A

Intellectual property

21
Q

Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years

A

Copyright

22
Q

Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years

A

Patents

23
Q

What is an acceptable, technologically feasible level of system quality?

A

Flawless software is economically unfeasible.

24
Q

Three principle sources of poor system performance:

A

1.) Software bugs, errors
2.) Hardware or facility failures
3.) Poor input data quality (most common source of business system failure)

25
Q

Although computing power decentralizing, key decision making remains centralized.

A

Balancing power

26
Q

Businesses may not have enough time to respond to global competition.

A

Rapidity of change

27
Q

Computing, internet use lengthens work-day, infringes on family, personal time.

A

Maintaining boundaries

28
Q

Public and private organizations ever more dependent on computer systems.

A

Dependence and vulnerability

29
Q

Commission of illegal acts through use of compute or against a computer system - computer may be object or instrument of crime

A

Computer crime

30
Q

Unethical acts, not illegal

A

Computer abuse

31
Q

Certain ethnic and income groups in the US less likely to have computers or Internet access.

A

Digital divide

32
Q

Largest source is computer keyboards. Carpel Tunnel Syndrome (CTS)

A

Repetitive stress injury (RSI)

33
Q

Eyestrain and headaches related to screen use.

A

Computer vision syndrome (CVS)

34
Q

Aggravation, impatience, fatigue.

A

Technostress

35
Q

Pressure on the median nerve through the wrist’s bony structure produces pain.

A

Carpal tunnel syndrome (CTS)

36
Q

Implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials.

A

Digital millennium copyright act (DMCA)

37
Q

A set of principles governing the collection and use of information about individuals. Principles based on the notion of a mutuality of interest between the record holder and the individual.

A

Fair Information Practices (FIP)

38
Q

The rights that individuals and organizations have with respect to information that pertains to them.

A

Information rights

39
Q

Consent given with knowledge of all the facts needed to make a rational decision.

A

Informed consent

40
Q

Model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.

A

Opt-in

41
Q

Model of informed consent permits the collection of personal information until the consumer specifically requests the data not to be collected.

A

Opt-out

42
Q

A private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.

A

Safe harbor