Class Notes (885,074)
US (343,770)
UTSA (103)
IS 3003 (11)
Lecture 4

IS 3003 Lecture 4: Notes - Ethical and Social Issues

5 Pages
78 Views

Department
IS - Information Systems
Course Code
IS 3003
Professor
Nasim Talebi

This preview shows pages 1 and half of page 2. Sign up to view the full 5 pages of the document.

Loved by over 2.2 million students

Over 90% improved by at least one letter grade.

Leah — University of Toronto

OneClass has been such a huge help in my studies at UofT especially since I am a transfer student. OneClass is the study buddy I never had before and definitely gives me the extra push to get from a B to an A!

Leah — University of Toronto
Saarim — University of Michigan

Balancing social life With academics can be difficult, that is why I'm so glad that OneClass is out there where I can find the top notes for all of my classes. Now I can be the all-star student I want to be.

Saarim — University of Michigan
Jenna — University of Wisconsin

As a college student living on a college budget, I love how easy it is to earn gift cards just by submitting my notes.

Jenna — University of Wisconsin
Anne — University of California

OneClass has allowed me to catch up with my most difficult course! #lifesaver

Anne — University of California
Description
IS3003 Ethical&SocialIssuesinBusiness Chapter 4 Ethics:​ Principles/Standards of right and wrong that individuals, acting as free moral agents, use to make choices and guide their behavior. I. KEY TECH TRENDS THAT RAISE ETHICAL ISSUES A. Doubling of Computer Power ➢ More orgs depend on computer systems for critical operations B. Rapidly Declining Data Storage Costs ➢ Orgs can easily maintain detailed databases on individuals C. Networking Advances and the Internet ➢ Copying data from one location to another and accessing personal data from remote locations are much easier D. Mobile Device Growth ➢ Tracking of individual cell phones E. Advances in Data Analysis Techniques ➢ Profiling:​ Combining data from multiple sources to create dossiers of detailed information on individual ➢ Non Obvious Relationship Awareness (NORA): ​Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists. II. BASIC CONCEPTS FOR ETHICAL ANALYSIS A. Definitions: ➢ Responsibility: ​Accepting the potential costs, duties, and obligations for decisions ➢ Accountability​: Mechanisms for identifying responsible parties ➢ Liability:​ Permits individuals (and firms) to recover damages done to them ➢ Due Process:​ Laws are well known and understood, with an ability to appeal to higher authorities. B. Ethical Analysis ○ Identify and clearly describe the facts ○ Define the conflict or dilemma and identify the higher-order values involved 1 ○ Identify stakeholders ○ Identify the options that you can reasonably take ○ Identify the potential consequences of your options. C. Candidate 6 Ethical Principles ➢ Golden Rule:​ Do unto others as you would have them do unto you. ➢ Immanuel Kant's Categorical Imperative:​ If an action is not right for everyone to take, it is not right for anyone. ➢ Descartes' Rule of Change:​ If an action cannot be taken repeatedly, it is not right to take at all. ➢ Utilitarian Principle:​ Take the action that achieves the higher or greater value ➢ Risk Aversion Principle:​ Take the action that produces the least harm or least potential costs ➢ Ethical "no free lunch" rule": ​Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise. III. MORAL DIMENSIONS OF THE INFORMATION AGE A. Information Rights and Obligations ➢ Information Rights (privacy): ​Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself. ➢ Internet Challenges to Privacy   Cookies: Tiny ​text files​ downloaded by website to Server's are decentralizing visitor's hard drive. information to different people Identify visitor's browser and track visiso they don't have to keep all to site. the information. Cookies have a Can include computer info, browser lifespan. Cannot bring cookies type, given info to site. from other sites. Web Tiny invisible software programs Done by a 3rd party not beacons/Web embedded in email messages and web necessarily with consent. bugs/tracking pages. Monitor who is reading email files: message or visiting site. Used to evaluate the effectiveness of online marketing. Spyware: Software ​that secretly gathers More dangerous than information about users while they cookies or web bugs. browse the web. Can come hidden in free downloads; tracks online movements. 2 May transmit user's keystrokes or display unwanted ads. ➢ Social Engineering:​ Talking a person into revealing critical information that can be used to obtain personal information. ➢ Shoulder Surfing:​ Standing next to someone and watching as they fi
More Less
Unlock Document
Subscribers Only

Only pages 1 and half of page 2 are available for preview. Some parts have been intentionally blurred.

Unlock Document
Subscribers Only
You're Reading a Preview

Unlock to view full version

Unlock Document
Subscribers Only

Log In


OR

Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit