Class Notes (1,036,669)
US (406,991)
UTSA (112)
(11)
IS 3003 (11)
Lecture 4

IS 3003 Lecture Notes - Lecture 4: Categorical Imperative, Copyright Infringement, Domain Registration

5 pages79 viewsFall 2015

Department
IS - Information Systems
Course Code
IS 3003
Professor
Nasim Talebi
Lecture
4

This preview shows page 1. to view the full 5 pages of the document.
IS 3003
Ethical & Social Issues in Business
Chapter 4
Ethics: Principles/Standards of right and wrong that individuals, acting as free moral
agents, use to make choices and guide their behavior.
I. KEY TECH TRENDS THAT RAISE ETHICAL ISSUES
A. Doubling of Computer Power
More orgs depend on computer systems for critical operations
B. Rapidly Declining Data Storage Costs
Orgs can easily maintain detailed databases on individuals
C. Networking Advances and the Internet
Copying data from one location to another and accessing personal data
from remote locations are much easier
D. Mobile Device Growth
Tracking of individual cell phones
E. Advances in Data Analysis Techniques
Profiling: Combining data from multiple sources to create dossiers
of detailed information on individual
Non Obvious Relationship Awareness (NORA): Combining data
from multiple sources to find obscure hidden connections that
might help identify criminals or terrorists.
II. BASIC CONCEPTS FOR ETHICAL ANALYSIS
A. Definitions:
Responsibility: Accepting the potential costs, duties, and obligations
for decisions
Accountability: Mechanisms for identifying responsible parties
Liability: Permits individuals (and firms) to recover damages done
to them
Due Process: Laws are well known and understood, with an ability
to appeal to higher authorities.
B. Ethical Analysis
Identify and clearly describe the facts
Define the conflict or dilemma and identify the higher-order values
involved
1
You're Reading a Preview

Unlock to view full version

Only half of the first page are available for preview. Some parts have been intentionally blurred.

Identify stakeholders
Identify the options that you can reasonably take
Identify the potential consequences of your options.
C. Candidate 6 Ethical Principles
Golden Rule: Do unto others as you would have them do unto you.
Immanuel Kant's Categorical Imperative: If an action is not right
for everyone to take, it is not right for anyone.
Descartes' Rule of Change: If an action cannot be taken repeatedly,
it is not right to take at all.
Utilitarian Principle: Take the action that achieves the higher or
greater value
Risk Aversion Principle: Take the action that produces the least
harm or least potential costs
Ethical "no free lunch" rule": Assume that virtually all tangible and
intangible objects are owned by someone unless there is a specific
declaration otherwise.
III. MORAL DIMENSIONS OF THE INFORMATION AGE
A. Information Rights and Obligations
Information Rights (privacy): Claim of individuals to be left alone,
free from surveillance or interference from other individuals,
organizations, or state. Claim to be able to control information
about yourself.
Internet Challenges to Privacy
Cookies:
Tiny text files downloaded by website to
visitor's hard drive.
Identify visitor's browser and track visits
to site.
Can include computer info, browser
type, given info to site.
Server's are decentralizing
information to different people
so they don't have to keep all
the information. Cookies have a
lifespan. Cannot bring cookies
from other sites.
Web
beacons/Web
bugs/tracking
files:
Tiny invisible software programs
embedded in email messages and web
pages. Monitor who is reading email
message or visiting site. Used to evaluate
the effectiveness of online marketing.
Done by a 3rd party not
necessarily with consent.
Spyware:
Software that secretly gathers
information about users while they
browse the web. Can come hidden in free
downloads; tracks online movements.
More dangerous than
cookies or web bugs.
2
You're Reading a Preview

Unlock to view full version


Loved by over 2.2 million students

Over 90% improved by at least one letter grade.