Chapter 4: Personal, Legal, Ethical, & Organizational Issues of Information Systems Flashcards
Acceptable use policy
A set of rules specifying the legal and ethical use of a system and the consequences of noncompliance
Accountability
Issues involving both the user’s and the organizations’s responsibilities and liabilities
Nonrepudiation
Method for binding all the parties to a contract
Spam
- Unsolicited e-mails sent for advertising purposes
- Junk mail usually sent in bulk using automated mailing software
Cookies
- Small text files with unique ID tags that are embedded in a web browser and saved on the user’s hard drive
- Helps web sites customize pages for users (recommend products)
- Can be disabled by installing a cookie manager
Log Files
- Records a user’s actions on a web
- Generated by web server software
- Helps identify when people lie about their identities online
Invasion of privacy =
- When user’s information is used without prior consent
- Information about every aspect of people’s lives are stored on a variety of databases
- Laws have flaws and loopholes
Public Information
- Posted by organization or public agency
- Censored for public policy reasons (secret/private information) or if content is offensive
Private Information
Posted by a person, usually uncensored because of freedom of expression, can be censored by an organization that you work for
Internet Neutrality/Net Neutrality
States that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally
Intelectual Property
- Legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents developed by people or businesses
- Includes Industrial property and copyright material
Industrial Property (type of intellectual property)
- Includes inventions, trademarks, logos, and industrial designs
- Trademark: Protects product names and identifying marks such as logos
- Patent: Protects new processes such as inventions
Copyrighted material (type of intellectual property)
- Includes literary (written) and artistic works as well as online materials such as Web pages, HTML code, and computer graphics
Fair Use Doctrine
Exception to the copyright law that allows the use of copyrighted material for certain purposes
Cybersquatting
- Registering, selling, or using a domain name to profit from someone else’s trademark
- Ex: Verizon.com, sell name of website to Verizon to make money
Typosquatting/URL hijacking
- A variation of cybersquatting that relies on typographical errors made by Web users when typing a Web site address into a Web browser
- Ex: Goggle.com instead of google.com, companies will want to buy typo website names so they can direct users to their website
Digital Divide
Divide created between the information rich and the information poor by information technology and the Internet
Virtual organizations
- Networks of independent companies, suppliers, customers, and manufacturers connected via information technologies
- Share skills and costs, have access to each other’s markets
Telecommunicating
Working from home
Green Computing
- Promotes a sustainable environment and consumes the least amount of energy
- Involves the design, manufacture, use, and disposal of computers, servers, and computing devices with minimal impact on the environment
- Helps an organization save on energy costs while improving the quality of the environment
You make two copies of a software package you just bought and sell one to a friend
Illegal (to copy software package) and unethical (to sell to a friend) = Quadrant 4
You make two copies of a software package you just bought for personal use in case the original software fails and you need a back up
Illegal (to copy software package) and ethical (because it’s for personal use) = Quadrant 2
A banker uses the information a client enters in loan applications to sell other financial products to this client
Legal (client provided information, consented to you knowing private information) and unethical (because you’re using information in a way not initially intended, to see more products) = Quadrant 3
A credit card company sells its customer’s mailing address to its competitors
Legal (customer provided information) and unethical (because your selling private information to someone else) = Quadrant 3
A supervisor fines a programer who has intentionally spread viruses to the organization’s network
Legal (to fire employee) and ethical (because employee committed espionage) = Quadrant 1