chapter 4

7 Pages
108 Views
Unlock Document

Department
Information Technology Management
Course
ITM 102
Professor
Vikraman Baskaran
Semester
Fall

Description
ITM Chapter 4 TECH DATA - A leading IT distributor of hardware and software across Canada - has an anti-piracy program that helps its customers recognize pirated software and pursue purchasing legitimate software. - Microsoft, who is heavily affected by piracy pledged to help with financial and material needs for the seminars that TDC wanted to run across Canada. 4.1 - UNDERSTANDING SOCIAL, LEGAL, AND ETHICAL ISSUES RELATED TO SYSTEMS - development of IT provides many costs and benefits. A Model for Thinking About Ethical, Social, and Political Issues - technology is like throwing a rock into a peaceful pond - social institutions cannot respond to these ripples overnight, it may take years to develop the proper, etiquette/politically correct attitudes towards them. - political institutions require time before developing new laws and often require a demonstration of real harm before they act. In the meantime, there is a grey area for HOW TO ACT. Ethical -->social-->legal issues Individual-->society-->Polity Five Moral Dimensions of the Information Age Information rights & obligations: Property rights & obligations: Accountability & control: System quality: Quality of life: Key Technological Trends that Raise Ethical Issues 1. Computing power doubles every 18 months : more organizations depend on computer systems for critical operations 2. Data storage costs rapidly declining: Organizations can easily maintain databases on individuals. 3. Data analysis advances: Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behaviour. 4. Networking advances and the Internet: Copying data from one location to another and accessing personal data from remote locations are much easier profiling: the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals. DOUBLECLICK.com creates dossiers of customer preferences in exchange for revenue ChoicePoint gathers data from police, criminal and motor vehicle records, insurance claims etc to keep records of every adult in the U.S. They sell this info to businesses and the govt. NORA (nonobvious relationship awareness): takes info about people from many sources and finds obscure, nonobvious relationships. E.g. applicant for a casino job shares the same cellphone number as a known criminal 4.2 - ETHICS IN AN INFORMATION SOCIETY Basic Concepts •Responsibility: Accepting the potential costs, duties, and obligations for decisions •Accountability: Mechanisms for identifying responsible parties •Liability: Permits individuals to recover damages done to them •Due process: Laws are well known and understood, with an ability to appeal to higher authorities Ethical Analysis 1. Identify & clearly describe the facts 2. Define the conflict/dilemma and identify the higher-order values involved (e.g. freedom, privacy, protection of property, the free enterprise system). 3. Identify the stakeholders 4. Identify the reasonable options 5. Identify the potential consequences of your options. Candidate Ethical Principles •Golden Rule: Do unto others as you would have them do unto you •Immanuel Kant’s Categorical Imperative: If an action is not right for everyone to take, then it is not right for anyone •Descartes’ rule of change: If an action cannot be taken repeatedly, then it is not right to be taken at any time •Utilitarian Principle: Take the action that achieves the greatest value for all concerned •Risk Aversion Principle: Take the action that produces the least harm or incurs the least cost to all concerned •Ethical “no free lunch” rule: Assume that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise Professional Codes of Conduct CMA CBA CIPS - comp info processing society 4.3- THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age privacy: The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. - Charter of Rights and Freedoms : the right to be secure from unreasonable search/seizure. - PIPEDA - Personal Info Protection and Electronic Documents Act - The CODE ….(Canadian Standards Association’s Model Privacy Code) → identify the purpose of collection of personal info → obtaining consent → limiting collection → limiting use, disclosure and retention → Accuracy → safeguards (providing adequate security) → providing individuals with access to info about themselves → giving people the right to challenge an organization with compliance to these principles Fair Information Practices (FIP): set of principles governing the collection and use of info about individuals. 1. Notice/awareness (core principle) 2. Choice/consent (core principle) 3. Access/participation 4. Security 5. Enforcement The European Directive on Data Protection - Euro countries have strict privacy rules - consumers must provide informed consent before any company can legally use data about them, and they have the right to access it, correct it, and request that no further data be collected safe harbour: a private, self regulating policy and enforcement mechanism that meets the objectives of government regulations, but does not involve government regulation or enforcement. Internet Challenges to Privacy cookies: tiny files deposited on a user’s computer hard drive when a use visits certain websites. Cookies identify the user’s Web Browser software and track visits
More Less

Related notes for ITM 102

Log In


OR

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit