Chapter 4: Ethical and Social Issues in Information Systems Flashcards

1
Q

What are Ethics

A
  • principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours -> use IS to investigate decision-making
  • IT can be used to achieve social progress but also to commit crimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IS raise ethical questions because they create opportunities for

A
  • intense social change, threatening existing distributions of power, money, rights and obligations
  • new opportunities for crime: attacking companies
  • new kinds of crime: blackmail, stealing data, industry espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Five moral dimensions of the information age

A
  • information rights and obligations: right to know what kind of data is stored
  • accountability and control: who is accountable for which system?
  • property rights and obligations: easy video/music sharing
  • system quality: standards of data and system quality
  • quality of life: monitoring, pressure on employees, remote work -> which values should be preserved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key technology trends that raise ethical issues

A
  • doubling of computing power every 18 months (vulnerability to errors as more organisations depend on computer systems for critical operations)
  • rapidly declining data storage costs (organisations can easily maintain detailed databases on individuals)
  • networking advances and the internet (copying data from one location to another and accessing personal data from remote locations are much easier)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advances in data analysis techniques

A
  • profiling: combining data from multiple sources to create dossiers of detailed information on individuals
  • non-obvious relationship awareness (NORA): combining data from multiple sources to find obscure hidden connections that might help identify or terrorists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Basic concepts for ethical analysis

A
  • responsibility
  • accountability
  • liability
  • due process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Principles to guide ethical decisions

A

Five-step ethical analysis
a. identify and clearly describe the facts
b. define the conflict or dilemma and identify the higher-order values involved
c. identify the stakeholders
d. identify the options that you can reasonably take
e. identify the potential consequences of your options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Golden Rule

A

do unto others as you would have them do unto you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Immanuel Kant’s Categorical Imperative

A

if an action is not right for everyone, it is not right for anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Slippery slope rule

A

if an action cannot be taken repeatedly, it is not right to take at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Utilitarian principle

A

take the action that achieves the higher or greater value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk aversion principle

A

take the action that produces the least harm or potential cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethical “no free lunch” rule

A

assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Professional codes of conduct

A
  • promulgated (made known) by associations of professionals
  • promises by professions to regulate themselves in the general interest of society
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information rights: privacy and freedom in the internet age

A

privacy: claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet challenges to privacy

A
  • new challenges for the protection o individual privacy
  • Cookies: identify browser and track visit to site, super cookies (flash cookies)
  • small text files deposited on computer hard drive when a user visits websites
  • cannot directly identify visitors’ names and addresses but can be combined
17
Q

Spyware

A
  • can secretly install itself on an internet user’s computer by piggybacking on larger applications
  • may transmit user’s keystrokes or display unwanted ads
18
Q

Google services and behavioural targeting

A
  • nearly 80 percent of global internet users use google search (largest collector of online user data)
  • enormous impact on online privacy
19
Q

Intellectual property

A

tangible & intangible products of the mind created by individuals created by individuals or corporations

20
Q

Four ways that intellectual property is protected

A

a. Copyright: statuatory grant protecting intellectual property from being copied for the life of the author, plus additional 70 years
b. Patents: grants creator of invention an exclusive monopoly based on ideas behind invention for 20 years
c. Trademark: marks, symbols and images used to distinguish products in the marketplace
d. Trade secret: intellectual work or product belonging to business, not in the public domain

21
Q

Challenges to intellectual property rights

A
  • digital media different from physical media (ease of replication, ease of transmission, ease of alteration)
  • Digital Millenium Copyright Act (DMCA) (makes it illegal to circumvent technology-based protections of copyrighted materials)
22
Q

computer-related liability problems: If software fails , who is responsible?

A
  • if seen as part of machine that injures or harms -> software producer and operator
  • if seen as similar to book, difficult to hold author/publisher responsible
23
Q

Computer crime and abuse

A
  • computer crime: commission of illegal acts through use of computer or against a computer system (computer may be object or instrument of crime)
  • computer abuse: unethical acts, not illegal -> spam: junk mail, high costs for businesses in dealing with spam
24
Q

Employment: trickle-down tech and re-engineering job loss

A
  • reengineering work resulting in lost jobs: threatens middle-class, white -collar jobs
  • others argue that new tech has created more jobs than destroyed
25
Q

Health risks

A
  • repetitive stress injury (RSI)
  • carpal tunnel syndrome (CTS): largest source is computer keyboards
  • computer vision syndrome (CVS): eyestrain and headaches related to screen use
    technostress: aggravation, impatience, fatigue