Class Notes (974,141)
US (382,307)
UTSA (107)
IS 3003 (11)
Lecture 4

IS 3003 Lecture 4: Notes - Ethical and Social Issues

by OneClass1109422 , Fall 2015
5 Pages
78 Views
Fall 2015

Department
IS - Information Systems
Course Code
IS 3003
Professor
Nasim Talebi
Lecture
4

This preview shows pages 1-2. Sign up to view the full 5 pages of the document.
IS 3003
Ethical & Social Issues in Business
Chapter 4
Ethics: Principles/Standards of right and wrong that individuals, acting as free moral
agents, use to make choices and guide their behavior.
I. KEY TECH TRENDS THAT RAISE ETHICAL ISSUES
A. Doubling of Computer Power
More orgs depend on computer systems for critical operations
B. Rapidly Declining Data Storage Costs
Orgs can easily maintain detailed databases on individuals
C. Networking Advances and the Internet
Copying data from one location to another and accessing personal data
from remote locations are much easier
D. Mobile Device Growth
Tracking of individual cell phones
E. Advances in Data Analysis Techniques
Profiling: Combining data from multiple sources to create dossiers
of detailed information on individual
Non Obvious Relationship Awareness (NORA): Combining data
from multiple sources to find obscure hidden connections that
might help identify criminals or terrorists.
II. BASIC CONCEPTS FOR ETHICAL ANALYSIS
A. Definitions:
Responsibility: Accepting the potential costs, duties, and obligations
for decisions
Accountability: Mechanisms for identifying responsible parties
Liability: Permits individuals (and firms) to recover damages done
to them
Due Process: Laws are well known and understood, with an ability
to appeal to higher authorities.
B. Ethical Analysis
Identify and clearly describe the facts
Define the conflict or dilemma and identify the higher-order values
involved
1
Identify stakeholders
Identify the options that you can reasonably take
Identify the potential consequences of your options.
C. Candidate 6 Ethical Principles
Golden Rule: Do unto others as you would have them do unto you.
Immanuel Kant's Categorical Imperative: If an action is not right
for everyone to take, it is not right for anyone.
Descartes' Rule of Change: If an action cannot be taken repeatedly,
it is not right to take at all.
Utilitarian Principle: Take the action that achieves the higher or
greater value
Risk Aversion Principle: Take the action that produces the least
harm or least potential costs
Ethical "no free lunch" rule": Assume that virtually all tangible and
intangible objects are owned by someone unless there is a specific
declaration otherwise.
III. MORAL DIMENSIONS OF THE INFORMATION AGE
A. Information Rights and Obligations
Information Rights (privacy): Claim of individuals to be left alone,
free from surveillance or interference from other individuals,
organizations, or state. Claim to be able to control information
about yourself.
Internet Challenges to Privacy
Cookies:
Tiny text files downloaded by website to
visitor's hard drive.
Identify visitor's browser and track visits
to site.
Can include computer info, browser
type, given info to site.
Server's are decentralizing
information to different people
so they don't have to keep all
the information. Cookies have a
lifespan. Cannot bring cookies
from other sites.
Web
beacons/Web
bugs/tracking
files:
Tiny invisible software programs
embedded in email messages and web
pages. Monitor who is reading email
message or visiting site. Used to evaluate
the effectiveness of online marketing.
Done by a 3rd party not
necessarily with consent.
Spyware:
Software that secretly gathers
information about users while they
browse the web. Can come hidden in free
downloads; tracks online movements.
More dangerous than
cookies or web bugs.
2

Loved by over 2.2 million students

Over 90% improved by at least one letter grade.

Leah — University of Toronto

OneClass has been such a huge help in my studies at UofT especially since I am a transfer student. OneClass is the study buddy I never had before and definitely gives me the extra push to get from a B to an A!

Leah — University of Toronto
Saarim — University of Michigan

Balancing social life With academics can be difficult, that is why I'm so glad that OneClass is out there where I can find the top notes for all of my classes. Now I can be the all-star student I want to be.

Saarim — University of Michigan
Jenna — University of Wisconsin

As a college student living on a college budget, I love how easy it is to earn gift cards just by submitting my notes.

Jenna — University of Wisconsin
Anne — University of California

OneClass has allowed me to catch up with my most difficult course! #lifesaver

Anne — University of California
Description
IS3003 Ethical&SocialIssuesinBusiness Chapter 4 Ethics:​ Principles/Standards of right and wrong that individuals, acting as free moral agents, use to make choices and guide their behavior. I. KEY TECH TRENDS THAT RAISE ETHICAL ISSUES A. Doubling of Computer Power ➢ More orgs depend on computer systems for critical operations B. Rapidly Declining Data Storage Costs ➢ Orgs can easily maintain detailed databases on individuals C. Networking Advances and the Internet ➢ Copying data from one location to another and accessing personal data from remote locations are much easier D. Mobile Device Growth ➢ Tracking of individual cell phones E. Advances in Data Analysis Techniques ➢ Profiling:​ Combining data from multiple sources to create dossiers of detailed information on individual ➢ Non Obvious Relationship Awareness (NORA): ​Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists. II. BASIC CONCEPTS FOR ETHICAL ANALYSIS A. Definitions: ➢ Responsibility: ​Accepting the potential costs, duties, and obligations for decisions ➢ Accountability​: Mechanisms for identifying responsible parties ➢ Liability:​ Permits individuals (and firms) to recover damages done to them ➢ Due Process:​ Laws are well known and understood, with an ability to appeal to higher authorities. B. Ethical Analysis ○ Identify and clearly describe the facts ○ Define the conflict or dilemma and identify the higher-order values involved 1 ○ Identify stakeholders ○ Identify the options that you can reasonably take ○ Identify the potential consequences of your options. C. Candidate 6 Ethical Principles ➢ Golden Rule:​ Do unto others as you would have them do unto you. ➢ Immanuel Kant's Categorical Imperative:​ If an action is not right for everyone to take, it is not right for anyone. ➢ Descartes' Rule of Change:​ If an action cannot be taken repeatedly, it is not right to take at all. ➢ Utilitarian Principle:​ Take the action that achieves the higher or greater value ➢ Risk Aversion Principle:​ Take the action that produces the least harm or least potential costs ➢ Ethical "no free lunch" rule": ​Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise. III. MORAL DIMENSIONS OF THE INFORMATION AGE A. Information Rights and Obligations ➢ Information Rights (privacy): ​Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself. ➢ Internet Challenges to Privacy   Cookies: Tiny ​text files​ downloaded by website to Server's are decentralizing visitor's hard drive. information to different people Identify visitor's browser and track visiso they don't have to keep all to site. the information. Cookies have a Can include computer info, browser lifespan. Cannot bring cookies type, given info to site. from other sites. Web Tiny invisible software programs Done by a 3rd party not beacons/Web embedded in email messages and web necessarily with consent. bugs/tracking pages. Monitor who is reading email files: message or visiting site. Used to evaluate the effectiveness of online marketing. Spyware: Software ​that secretly gathers More dangerous than information about users while they cookies or web bugs. browse the web. Can come hidden in free downloads; tracks online movements. 2 May transmit user's keystrokes or display unwanted ads. ➢ Social Engineering:​ Talking a person into revealing critical information that can be used to obtain personal information. ➢ Shoulder Surfing:​ Standing next to someone and watching as they fi
More Less
Unlock Document

Only pages 1-2 are available for preview. Some parts have been intentionally blurred.

Unlock Document
You're Reading a Preview

Unlock to view full version

Unlock Document

You've reached the limit of 4 previews this month

Create an account for unlimited previews.

Already have an account?

Log In


OR

Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit