0 evaluări0% au considerat acest document util (0 voturi)
27 vizualizări39 pagini
'( 5N6ERSAN6ING e / ICAL AN6 SOCIAL ISS5ES RELAE6 O S7SE3S A 3odel for hin8in" this chapter# you $ill %e a%le to ans$er the follo$in" &uestions' () hat ethical# social# and political issues are raised %y information systems+,) hat specific principles for conduct can %e used to "uide
'( 5N6ERSAN6ING e / ICAL AN6 SOCIAL ISS5ES RELAE6 O S7SE3S A 3odel for hin8in" this chapter# you $ill %e a%le to ans$er the follo$in" &uestions' () hat ethical# social# and political issues are raised %y information systems+,) hat specific principles for conduct can %e used to "uide
'( 5N6ERSAN6ING e / ICAL AN6 SOCIAL ISS5ES RELAE6 O S7SE3S A 3odel for hin8in" this chapter# you $ill %e a%le to ans$er the follo$in" &uestions' () hat ethical# social# and political issues are raised %y information systems+,) hat specific principles for conduct can %e used to "uide
Information Systems LEARNING OBJECI!ES After readin" this chapter# you $ill %e a%le to ans$er the follo$in" &uestions' () *hat ethical# social# and political issues are raised %y information systems+ ,) *hat specific principles for conduct can %e used to "uide ethical decisions+ -) *hy do contemporary information systems technolo"y and the Internet pose challen"es to the protection of indi.idual pri.acy and intellectual property+ 4) /o$ ha.e information systems affected e.eryday life+ Interacti.e Sessions' Green I at *ipro 0le1i%le Schedulin" at *al23art' Good or Bad for Employees+ C/A4ER O5LINE 4)( 5N6ERSAN6ING E/ICAL AN6 SOCIAL ISS5ES RELAE6 O S7SE3S A 3odel for hin8in" A%out Ethical# Social# and 4olitical Issues 0i.e 3oral 6imensions of the Information A"e 9ey echnolo"y rends that Raise Ethical Issues 4), E/ICS IN AN IN0OR3AION SOCIE7 Basic Concepts' Responsi%ility# Accounta%ility# Lia%ility Ethical Analysis Candidate Ethical 4rinciples 4rofessional Codes of Conduct Some Real2*orld Ethical 6ilemmas 4)- /E 3ORAL 6I3ENSIONS O0 IN0OR3AION S7SE3S Information Ri"hts' 4ri.acy and 0reedom in the Internet A"e 4roperty Ri"hts' Intellectual 4roperty Accounta%ility# Lia%ility# and Control System :uality' 6ata :uality and System Errors :uality of Life' E&uity# Access# and Boundaries 4)4 /AN6S2ON 3IS 4ROJECS 3ana"ement 6ecision 4ro%lems Achie.in" Operational E1cellence' Creatin" a Simple Blo" Impro.in" 6ecision 3a8in"' 5sin" Internet Ne$s"roups for Online 3ar8et Research LEARNING RAC9S 3O65LES 6e.elopin" a Corporate Code of Ethics for Information Systems Creatin" a *e% 4a"e E/ICAL ISS5ES 0ACING /E 5SE O0 EC/NOLOGIES 0OR /E AGE6 CO335NI7 he Australian "o.ernment ta8es a stron" interest in the use of I for the direct and indirect care of the a"ed community) Indirect care includes the administrati.e
aspects of a"ed care in nursin" and a"ed care communities) No dou%t# I has the potential to impro.e the &uality of lifestyle for the a"ed) 0or e1ample# access to the Internet ma8es the a"ed feel more in touch $ith the rest of the $orld and# in many cases# can assist $ith day2to2day li.in" such as online "rocery purchases# online %ill payment and chec8in" %an8 statements) /o$e.er; this is conditional upon .arious factors such as their feelin" com2 forta%le $ith computers# ha.in" the computer 8no$led"e and s8ill and# of course# a trust in online transactions) Increasin"ly# ne$ ideas are "enerated throu"h research and de.elopment in an effort to enhanceet chronic illnesses li8e heart conditions# and dia%etes) It is particularly the use of these technolo"ies that poses a plethora of ethical issues of concern to healthcare pro.iders and consumers) he <Smart /ouse< is a Sydney initiati.e# desi"ned to allo$ future "enerations to remain in their o$n homes $hile a"ein") It uses a ran"e of <telecare< sensor technolo"y) <his Smart /ouse technolo"y includes passi.e infrared detectors and a door2entry system# $hich $ill allo$ the resident to see $ho is at the door# .ia their !# and open the door remotely) he technolo"y also features emer"ency pendants and pull cords to tri""er an emer2 "ency monitorin" system# alon" $ith %ed and chair sensors) 0uture incorporations into the Smart /ouse $ill include central loc8in" systems# electric $indo$s and doors# electric curtain and %lind openers and other de.ices)< =BCS# ,>>?@)A A recurrin" ethical issue in the use of such technolo"y is in.asion of the a"ed con2 sunrers< pri.acy) 3any may not feel comforta%le a%out %ein" monitored in their o$n homes# ,42hours a day# e.en thou"h they may see the %ene2 fits of such systems) here is also the &uestion of a$areness# consent# o$nership# and access of any data collected from these a"ed consumers) /ealth2related data is particu2 larly .ery sensiti.e and# thus# should not %e "i.en pu%lic access $ithout prior pri.acy# security# and safety considera2 tions) Socially and culturally# these systems may also not %e accepta%le as a replacement for traditional human carers =most often close family mem2 %ers@ $ho can produce a much more personalised le.el of care) In Australia# a num%er of a"ed care pro.iders focus on (4B ( (C> 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise different minority "roups =for e1ample Chinese and 9oreans@ and there is increasin" a$areness that the technolo"y adopted for them must %e socially accepta%le and culturally competent# *ith the facility to adapt to the social and cultural needs of these minority "roups =for e1ample# use of appropriate lan"ua"e 2 .oice or te1tual 2 interface# or e1hi%itin" understandin" of the li.in" ha%its and preferences in the desi"n of the technolo"y@) Sources' BCS =,>>?@) Smart /ouse holds 8ey to future a"ed care needs# Baptist Community Ser.ices NS* E AC# 3edia Release# (st 3ay ,>>?# http'FF$$$)%cs)or")auF resourceF R>>CGCorp)pdf) he openin" case hi"hli"hts a num%er of ethical issues that are specific to healthcare for the a"ein" population) /o$e.er# some of these are recur2 rin" issues in other healthcare domains# or in or"aniDations in "eneral =such as pri.acy and security@) 0or e1ample# the data collected from the monitorin" and trac8in" of consumers can %e %oth %eneficial from a %usiness .ie$point =in the openin" case# it can impro.e the &uality of life# andFor the clinical care of the a"ed@# %ut at the same time# it also creates opportunities for ethical a%use %y in.adin" the pri.acy of consumers) Such ethical dilemmas arise in the %uildin" of ne$ information systems that potentially promise increased efficiency and effecti.eness in %usiness processes) In this chapter# $e *ish to hi"hli"ht the need to %e a$are of the ne"ati.e impact of information systems# alon"side the positi.e %enefits) In many cases# mana"ement needs to create an accepta%le trade2off throu"h the creation of appropriate policies and standards# as a"reed upon %y all sta8eholders# prior to system implementation) H Case contri%uted %y 6r) Lesley Land# 5ni.ersity of Ne$ South *ales Business Challen"es H In.ol.e users in desi"n process H 6esi"n features $ith ethical considerations in mind H Redesi"n %usiness processes H Allocate sufficient 3ana"ement Oitir"anDaon r H Administration %urden due to uninte"rated systems H Lac8 of I s8ills for consumers and administrators Information usiness System Ilutions I resources H 6eploy ne$ technolo"ies to meet user needs H Assist a"ed care H Increase efficiency residents in mana"in" H Increase &uality of care echnolo"y their health usin" health care technolo"ies I Chapter 4 Ethical and Social Issues in Information Systems (C( 5N6ERSAN6ING E/ICAL AN6 SOCIAL ISS5ES RELAE6 O S7SE3S n the past ten years $e ha.e $itnessed# ar"ua%ly# one of the most ethically challen"in" periods for 5)S) and "lo%al %usiness) a%le 42( pro.ides a small sample of recent cases demonstratin" failed ethical Jud"ment %y senior and middle mana"ers) hese lapses in mana"ement ethical and %usiness Jud"ment occurred across a %road spectrum of industries) In today<s ne$ le"al en.ironment# mana"ers $ho .iolate the la$ and are con.icted $ill most li8ely spend time in prison) 5)S) 0ederal Sentencin" Guidelines adopted in (BGK mandate that federal Jud"es impose stiff sentences on %usiness e1ecuti.es %ased on the monetary .alue of the crime# the presence of a conspiracy to pre.ent disco.ery of the crime# the use of structured financial transactions to hide the crime# and failure to cooperate $ith prosecutors =5)S) Sentencin" Commission# ,>>4@) Althou"h in the past %usiness firms $ould often pay for the le"al defense of their employees enmeshed in ci.il char"es and criminal in.esti"ations# no$ f i rms are encoura"ed to cooperate $ith prosecutors to reduce char"es a"ainst the entire firm for o%structin" in.esti"ations) hese de.elopments mean that# more than e.er# as a mana"er or an employee# you $ill ha.e to decide for yourself $hat constitutes proper le"al and ethical conduct) Althou"h these maJor instances of failed ethical and le"al Jud"ment $ere not masterminded %y information systems departments# information systems $ere instrumental in many of these frauds) In many cases# the perpetrators of these crimes artfully used financial reportin" information systems to %ury their decisions from pu%lic scrutiny in the .ain hope they $ould ne.er %e cau"ht) *e deal $ith the issue of control in information systems in Chapter G) In this chapter# $e tal8 a%out the ethical dimensions of these and other actions %ased on the use of information systems) Ethics refers to the principles of ri"ht and $ron" that indi.iduals# actin" as free moral a"ents# use to ma8e choices to "uide their %eha.iors) Information systems raise ne$ ethical &uestions for %oth indi.iduals and societies %ecause they create opportunities for intense social chan"e# and thus threaten e1istin" distri%utions of po$er# money# ri"hts# and o%li"ations) Li8e other technolo"ies# such as steam en"ines# electricity# the telephone# and the radio# information technolo"y can %e used to achie.e social pro"ress# %ut it can also %e used to RECEN ELA34LES O0 0AILE6 E/ICAL J56G3EN B7 3ANAGERS Enron op three e1ecuti.es con.icted for misstatin" earnin"s usin" ille"al accountin" schemes and ma8in" false representations to shareholders) Ban8ruptcy declared in ,>>() *orldCom Second2lar"est 5)S) telecommunications firm) Chief e1ecuti.e con.icted for improperly inflatin" re.enue %y %illions usin" ille"al accountin" methods) Ban8ruptcy declared in July ,>>, $ith M4( %illion in de%ts) Brocade Communications CEO con.icted for %ac8datin" stoc8 options and concealin" millions of dollars of compensation e1penses from shareholders) 4armalat en e1ecuti.es in Italy<s ei"hth2lar"est industrial "roup con.icted for misstatin" more than MC %illion in re.enues# earnin"s# and assets o.er se.eral years) Bristol23yers S&ui%% 4harmaceutical firm a"reed to pay a fine of M(C> million for misstatin" its re.enues %y M()C %illion# and inflatin" its stoc8 .alue) (C, 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise commit crimes and threaten cherished social .alues) he de.elopment of information technolo"y $ill produce %enefits for many and costs for others) Ethical issues in information systems ha.e %een "i.en ne$ ur"ency %y the rise of the Internet and electronic commerce) Internet and di"ital firm technolo"ies ma8e it easier than e.er to assem%le# inte"rate# and distri%ute information# unleashin" ne$ concerns a%out the appropriate use of customer information# the protection of personal pri.acy# and the protection of intellec2 tual property) Other pressin" ethical issues raised %y information systems include esta%lishin" accounta%ility for the conse&uences of information systems# settin" standards to safe"uard system &uality that protects the safety of the indi.idual and society# and preser.in" .alues and institutions considered essential to the &uality of life in an information society) *hen usin" informa2 tion systems# it is essential to as8# A*hat is the ethical and socially responsi%le course of action+A A 3O6EL 0OR /IN9ING ABO5 E/ICAL# SOCIAL# AN6 4OLIICAL ISS5ES Ethical# social# and political issues are closely lin8ed) he ethical dilemma you may face as a mana"er of information systems typically is reflected in social and political de%ate) One $ay to thin8 a%out these relationships is "i.en in 0i"ure 42() Ima"ine society as a more or less calm pond on a summer day# a delicate ecosystem in partial e&uili%rium $ith indi.iduals and $ith social and political institutions) Indi.iduals 8no$ ho$ to act in this pond %ecause social institutions =family# education# or"aniDations@ ha.e de.eloped $ell2honed rules of %eha.ior# and these are supported %y la$s de.eloped in the political sector that prescri%e %eha.ior and promise sanctions for .iolations) No$ toss a roc8 into the center of the pond) But ima"ine instead of a roc8 that the distur%in" force is a po$erful shoc8 of ne$ information technolo"y and systems hittin" a society more or less at rest) *hat happens+ Ripples# of course) Suddenly# indi.idual actors are confronted $ith ne$ situations often not co.ered %y the old rules) Social institutions cannot respond o.erni"ht to these ripples2it may ta8e years to de.elop eti&uette# e1pectations# social responsi%il2 ity# politically correct attitudes# or appro.ed rules) 4olitical institutions also re&uire time %efore de.elopin" ne$ la$s and often re&uire the demonstration of real harm %efore they act) In the meantime# you may ha.e to act) 7ou may%e forced to act in a le"al "ray area) *e can use this model to illustrate the dynamics that connect ethical# social# and political issues) his model is also useful for identifyin" the main moral dimensions of the information society# $hich cut across .arious le.els of action2 indi.idual# social# and political) 0I!E 3ORAL 6I3ENSIONS O0 /E IN0OR3AION AGE he maJor ethical# social# and political issues raised %y information systems include the follo$in" moral dimensions' Information ri"hts and o%li"ations) *hat information ri"hts do indi.iduals and or"aniDations possess $ith respect to themsel.es+ *hat can they protect+ *hat o%li"ations do indi.iduals and or"aniDations ha.e concernin" this information+ Chapter 4 Ethical and Social Issues in Information Systems (C- !It 5Rt 4)( /E RELAIONS/I4 BE*EEN E/ICAL# SOCIAL# AN6 4OLIICAL ISS5ES IN AN IN0OR3AION SOCIE7 :uality of Life he introduction of ne$ information technolo"y has a ripple effect# raisin" ne$ ethical# social# and political issues that must %e dealt $ith on the indi.idual# social# and political le.els) hese issues ha.e fi.e moral dimensions' information ri"hts and o%li"ations# property ri"hts and o%li"ations# system &uality# &uality of life# and accounta%ility and control) 4roperty li"hts and o%li"ations) /o$ $ill traditional intellectual property ri"hts %e protected in a di"ital society in $hich tracin" and accountin" for o$nership are difficult and i"norin" such property ri"hts is so easy+ Accounta%ility and control) *ho can and $ill %e held accounta%le and lia%le for the harm done to indi.idual and collecti.e information and property ri"hts+ System &uality) *hat standards of data and system &uality should $.e demand to protect indi.idual ri"hts and the safety of society+ :uality of life) *hat .alues should %e preser.ed in an information2 and 8no$led"e2%ased society+ *hich institutions should $e protect from .iolation+ *hich cultural .alues and practices are supported %y the ne$ information technolo"y+ *e e1plore these moral dimensions in detail in Section 4)-) 9E7 EC/NOLOG7 REN6S /A RAISE E/ICAL ISS5ES Ethical issues lon" preceded information technolo"y) Ne.ertheless# informa2 tion technolo"y has hei"htened ethical concerns# ta1ed e1istin" social arran"e2 ments# and made some la$s o%solete or se.erely crippled) here are four 8ey technolo"ical trends responsi%le for these ethical stresses and they are summariDed in a%le 42,) (C4 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise EC/NOLOG7 REN6S /A RAISE E/ICAL ISS5ES REN6 I34AC Computin" po$er dou%les e.ery (G months 6ata stora"e costs rapidly declinin" 6ata analysis ad.ances Net$or8in" ad.ances and the Internet 3ore or"aniDations depend on computer systems for critical operations Or"aniDations can easily maintain detailed data%ases on indi.iduals Companies can analyDe .ast &uantities of data "athered on indi.iduals to de.elop detailed profiles of indi.idual %eha.ior Copyin" data from one location to another and accessin" personal data from remote locations are much easier he dou%lin" of computin" po$er e.ery (G months has made it possi%le for most or"aniDations to use information systems for their core production processes) As a result# our dependence on systems and our .ulnera%ility to system errors and poor data &uality ha.e increased) Social rules and la$s ha.e not yet adJusted to this dependence) Standards for ensurin" the accuracy and relia%ility of information systems =see Chapter G@ are not uni.ersally accepted or enforced) Ad.ances in data stora"e techni&ues and rapidly declinin" stora"e costs ha.e %een responsi%le for the multiplyin" data%ases on indi.iduals2employees# customers# and potential customers2maintained %y pri.ate and pu%lic or"aniDations) hese ad.ances in data stora"e ha.e made the routine .iolation of indi.idual pri.acy %oth cheap and effecti.e) Already massi.e data stora"e systems are cheap enou"h for re"ional and e.en local retailin" firms to use in identifyin" customers) Ad.ances in data analysis techni&ues for lar"e pools of data are another technolo"ical trend that hei"htens ethical concerns %ecause companies and "o.ernment a"encies are a%le to find out much detailed personal information a%out indi.iduals) *ith contemporary data mana"ement tools =see Chapter ?@# companies can assem%le and com%ine the myriad pieces of information a%out you stored on computers much more easily than in the past) hin8 of all the $ays you "enerate computer information a%out yourself2 credit card purchases; telephone calls; ma"aDine su%scriptions; .ideo rentals; mail2order purchases; %an8in" records; local# state# and federal "o.ernment records =includin" court and police records@; and .isits to *e% sites) 4ut to"ether and mined properly# this information could re.eal not only your credit information %ut also your dri.in" ha%its# your tastes# your associations# and your political interests) Companies $ith products to sell purchase rele.ant information from these sources to help them more finely tar"et their mar8etin" campai"ns) Chapters - and ? descri%e ho$ companies can analyDe lar"e pools of data from multiple sources to rapidly identify %uyin" patterns of customers and su""est indi.idual responses) he use of computers to com%ine data from multiple sources and create electronic dossiers of detailed information on indi.iduals is called profilin") 0or e1ample# hundreds of *e% sites allo$ 6ou%leClic8 =$$$)dou%leclic8)net@# an Internet ad.ertisin" %ro8er# to trac8 the acti.ities of their .isitors in e1chan"e for re.enue from ad.ertisements %ased on .isitor information 6ou%leClic8 "athers) 6ou%leClic8 uses this information to create a profile of each online Chapter 4 Ethical and Social Issues in Information Systems (CC Credit card purchases can ma8e personal information a.aila%le to rnarlNet researchers# telemar8eters# and direct2mail companies) Ad.ances in information technolo"y facilitate the in.asion of pri.acy) .isitor# addin" more detail to the profile as the .isitor accesses an associated 6ou%leClic8 site) O.er time# 6ou%leClic8 can create a detailed dossier of a person<s spendin" and computin" ha%its on the *e% that is sold to companies to help them tar"et their *e% ads more precisely) Choice4oint "athers data from police# criminal# and motor .ehicle records; credit and employment histories; current and pre.ious addresses; professional licenses; and insurance claims to assem%le and maintain electronic dossiers on almost e.ery adult in the 5nited Sates) he company sells this personal information to %usinesses and "o.ernment a"encies) 6emand for personal data is so enormous that data %ro8er %usinesses such as Choice4oint are flourishin") A ne$ data analysis technolo"y called nono%.ious relationship a$areness =NORA@ has "i.en %oth the "o.ernment and the pri.ate sector e.en more po$erful profilin" capa%ilities) NORA can ta8e information a%out people from many disparate sources# such as employment applications# telephone records# customer listin"s# andA $antedA lists# and correlate relationships to find o%scure hidden connections that mi"ht help identify criminals or terrorists =see 0i"ure 42,@) NORA technolo"y scans data and e1tracts information as the data are %ein" "enerated so that it could# for e1ample# instantly disco.er a man at an airline tic8et counter $ho shares a phone num%er $ith a 8no$n terrorist %efore that person %oards an airplane) he technolo"y is considered a .alua%le tool for homeland security %ut does ha.e pri.acy implications %ecause it can pro.ide such a detailed picture of the# acti.ities and associa2 tions of a sin"le indi.idual) 0inally# ad.ances in net$or8in"# includin" the Internet# promise to reduce "reatly the costs of mo.in" and accessin" lar"e &uantities of data and open the possi%ility of minin" lar"e pools of data remotely usin" small des8top machines# permittin" an in.asion of pri.acy on a scale and $ith a precision heretofore unima"ina%le) (C? 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise E) (? 54# NONOB!IO5S RELAIONS/I4 A*ARENESS =NORA@ NORA Alerts Name standardiDation 3atch 3er"e NORA technolo"y can ta8e information a%out people from disparate sources and find o%scure# nono%.ious relationships) It mi"ht disco.er# for e1ample# that an applicant for a Jo% at a casino shares a telephone num%er $ith a 8no$n criminal and issue an alert to the hirin" mana"er) he de.elopment of "lo%al di"ital superhi"h$ay communication net$or8s *idely a.aila%le to indi.iduals and %usinesses poses many ethical and social concerns) *ho $ill account for the flo$ of information o.er these net$or8s+ *ill you %e a%le to trace information collected a%out you+ *hat $ill these net$or8s do to the traditional relationships %et$een family# $or8# and leisure+ /o$ $ill traditional Jo% desi"ns %e altered $hen millions of AemployeesA %ecome su%contractors usin" mo%ile offices for $hich they themsel.es must pay+ In the ne1t section# $e consider some ethical princi2 ples and analytical techni&ues for dealin" $ith these 8inds of ethical and social concerns) E/ICS IN AN IN0OR3AION SOCIE7 Ethics is a concern of humans $ho ha.e freedom of choice) Ethics is a%out indi.idual choice' *hen faced $ith alternati.e courses of action# $hat is the correct moral choice+ *hat are the main features of ethical choice+ Chapter 4 Ethical and Social Issues in Information Systems (CK BASIC CONCE4S' RES4ONSIBILI7# ACCO5NABILI7# AN6 LIABILI7 Ethical choices are decisions made %y indi.iduals $ho are responsi%le for the conse&uences of their actions) Responsi%ility is a 8ey element of ethical action) Responsi%ility means that you accept the potential costs# duties# and o%li"ations for the decisions you ma8e) Accounta%ility is a feature of systems and social institutions' It means that mechanisms are in place to determine $ho too8 responsi%le action# $ho is responsi%le) Systems and institutions in $hich it is impossi%le to find out $ho too8 $hat action are inherently incapa%le of ethical analysis or ethical action) Lia%ility e1tends the concept of responsi2 %ility further to the area of la$s) Lia%ility is a feature of political systems in $hich a %ody of la$s is in place that permits indi.iduals to reco.er the dama"es done to them %y other actors# systems# or or"aniDations) 6ue process is a related feature of la$2"o.erned societies and is a process in $hich la$s are 8no$n and understood and there is an a%ility to appeal to hi"her authorities to ensure that the la$s are applied correctly) hese %asic concepts form the underpinnin" of an ethical analysis of information systems and those $ho mana"e them) 0irst# information technolo2 "ies are filtered throu"h social institutions# or"aniDations# and indi.iduals) Systems do not ha.e impacts %y themsel.es) *hate.er information system impacts e1ist are products of institutional# or"aniDational# and indi.idual actions and %eha.iors) Second# responsi%ility for the conse&uences of technol2 o"y falls clearly on the institutions# or"aniDations# and indi.idual mana"ers $ho choose to use the technolo"y) 5sin" information technolo"y in a socially responsi%le manner means that you can and $ill %e held accounta%le for the conse&uences of your actions) hird# in an ethical# political society# indi.iduals and others can reco.er dama"es done to them throu"h a set of la$s characteriDed %y due process) E/ICAL ANAL7SIS *hen confronted $ith a situation that seems to present ethical issues# ho$ should you analyDe it+ he follo$in" fi.e2step process should help) () Identify and descri%e clearly the facts) 0ind out $ho did $hat to $hom# and $here# $hen# and ho$) In many instances# you $ill %e surprised at the errors in the initially reported facts# and often you $ill find that simply "ettin" the facts strai"ht helps define the solution) It also helps to "et the opposin" parties in.ol.ed in an ethical dilemma to a"ree on the facts) ,) 6efine the conflict or dilemma and identify the hi"her2order .alues in.ol.ed) Ethical# social# and political issues al$ays reference hi"her# .alues) he parties to a dispute all claim to %e pursuin" hi"her .alues =e)"); freedom# pri.acy# protection of property# and the free enterprise system@) ypically# an ethical issue in.ol.es a dilemma' t$o diametrically opposed courses of action that support $orth$hile .alues) 0or e1ample# the chapter2endin" case study illustrates t$o competin" .alues' the need to impro.e health care record 8eepin" and the need to protect indi.idual pri.acy) -) Identify the sta8eholders) E.ery ethical# social# and political issue has sta8ehold2 ers' players in the "ame $ho ha.e an interest in the outcome# $ho ha.e in.ested in the situation# and usually $ho ha.e .ocal opinions) 0ind out the identity of these "roups and $hat they $ant) his JAOill %e useful later $hen desi"nin" a solution) (CG 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise 4) Identify the options that you can reasona%ly ta8e) 7ou may find that none of the options satisfy all the interests in.ol.ed# %ut that some options do a %etter Jo% than others) Sometimes arri.in" at a "ood or ethical solution may not al$ays %e a %alancin" of conse&uences to sta8eholders) C) IdentifiJ the potential conse&uences of your options) Some options may %e ethically correct %ut disastrous from other points of .ie$) Other options may N.or8 in one instance %ut not in other similar instances) Al$ays as8 yourself# A*hat if I choose this option consistently o.er time+A CAN6I6AE E/ICAL 4RINCI4LES Once your analysis is complete# $hat ethical principles or rules should you use to ma8e a decision+ *hat hi"her2order .alues should inform your Jud"ment+ Althou"h you are the only one $ho can decide $hich amon" many ethical principles you $ill follo$# and ho$ you $ill prioritiDe them# it is helpful to consider some ethical principles $ith deep roots in many cultures that ha.e sur.i.ed throu"hout recorded history) () 6o unto others as you $ould ha.e them do unto you =the Golden Rule@) 4uttin" yourself into the place of others# and thin8in" of yourself as the o%Ject of the decision# can help you thin8 a%out fairness in decision ma8in") ,) If an action is not ri"ht for e.eryone to ta8e# it is not ri"ht for anyone =Immanuel 9ant<s Cate"orical Imperati.e@) As8 yourself# AIf e.eryone did this# could the or"aniDation# or society# sur.i.e+A -) If an action cannot %e ta8en repeatedly# it is not ri"ht to ta8e at all =6escartes< rule of chan"e@) his is the slippery2slope rule' An action may %rin" a%out a small chan"e no$ that is accepta%le# %ut if it is repeated# it $ould %rin" unaccepta%le chan"es in the lon" run) In the .ernacular# it mi"ht %e stated as Aonce started do$n a slippery path# you may not %e a%le to stop)A 4) a8e the action that achie.es the hi"her or "reater .alue =5tilitarian 4rinciple@) his rule assumes you can prioritiDe .alues in a ran8 order and understand the conse&uences of .arious courses of action) C) a8e the action that produces the least harm or the least potential cost =Ris8 A.ersion 4rinciple@) Some actions ha.e e1tremely hi"h failure costs of .ery lo$ pro%a%ility =e)")# %uildin" a nuclear "eneratin" facility in an ur%an area@ or e1tremely hi"h failure costs of moderate pro%a%ility =speedin" and automo%ile accidents@) A.oid these hi"h2failure2cost actions# payin" "reater attention to hi"h2failure2cost potential of moderate to hi"h pro%a%ility) ?) Assume that .irtually all tan"i%le and intan"i%le o%Jects are o$ned %y someone else unless there is a specific declaration other$ise) =his is the ethical Ano free lunchA rule)@ If somethin" someone else has created is useful to you# it has .alue# and you should assume the creator $ants compensation for this $or8) Althou"h these ethical rules cannot %e "uides to action# actions that do not easily pass these rules deser.e some .ery close attention and a "reat deal of caution) he appearance of unethical %eha.ior may do as much harm to you and your company as actual unethical %eha.ior) 4RO0ESSIONAL CO6ES O0 CON65C *hen "roups of people claim to %e professionals# they ta8e on special ri"hts and o%li"ations %ecause of their special claims to 8no$led"e# $isdom# and respect) 4rofessional codes of conduct are promul"ated %y associations of Chapter 4 Ethical and Social Issues in Information Systems (CB professionals# such as the American 3edical Association =A3A@# the American Bar Association =ABA@# the Association of Information echnolo"y 4rofessionals =AI4@# and the Association of Computin" 3achinery =AC3@) hese profes2 sional "roups ta8e responsi%ility for the partial re"ulation of their professions %y determinin" entrance &ualifications and competence) Codes of ethics are promises %y professions to re"ulate themsel.es in the "eneral interest of society) 0or e1ample# a.oidin" harm to others# honorin" property ri"hts =includin" intellectual property@# and respectin" pri.acy are amon" the General 3oral Imperati.es of the AC3<s Code of Ethics and 4rofessional Conduct) SO3E REAL2*ORL6 E/ICAL 6ILE33AS Information systems ha.e created ne$ ethical dilemmas in $hich one set of interests is pitted a"ainst another) 0or e1ample# many of the lar"e telephone companies in the 5nited States are usin" information technolo"y to reduce the siDes of their $or8forces) !oice reco"nition soft$are reduces the need for human operators %y ena%lin" computers to reco"niDe a customer<s responses to a series of computeriDed &uestions) 3any companies monitor $hat their employees are doin" on the Internet to pre.ent them from $astin" company resources on non2%usiness acti.ities =see the Chapter K Interacti.e Session on 3ana"ement@) In each instance# you can find competin" .alues at $or8# $ith "roups lined up on either side of a de%ate) A company may ar"ue# for e1ample# that it has a ri"ht to use information systems to increase producti.ity and reduce the siDe of its $or8force to lo$er costs and stay in %usiness) Employees displaced %y information systems may ar"ue that employers ha.e some responsi%ility for their $elfare) Business o$ners mi"ht feel o%li"ated to monitor employee e2mail and Internet use to minimiDe drains on producti.ity) Employees mi"ht %elie.e they should %e a%le to use the Internet for short personal tas8s in place of the telephone) A close analysis of the facts can sometimes produce compromised solutions that "i.e each side Ahalf a loaf)A ry to apply some of the principles of ethical analysis descri%ed to each of these cases) *hat is the ri"ht thin" to do+ /E 3ORAL 6I3ENSIONS O0 IN0OR3AION S7SE3S In this section# $e ta8e a closer loo8 at the fi.e moral dimensions of informa2 tion systems first descri%ed in 0i"ure 42() In each dimension $$re identify the ethical# social# and political le.els of analysis and use real2$orld e1amples to illustrate the .alues in.ol.ed# the sta8eholders# and the options chosen) IN0OR3AION RIG/S' 4RI!AC7 AN6 0REE6O3 IN /E INERNE AGE 4ri.acy is the claim of indi.iduals to %e left alone# free from sur.eillance or interference from other indi.iduals or or"aniDations# includin" the state) Claims to pri.acy are also in.ol.ed at the $or8place' 3illions of employees are su%Ject to electronic and other forms of hi"h2tech sur.eillance =Ball# ,>>(@) Information technolo"y and systems threaten indi.idual claims to pri.acy %y ma8in" the in.asion of pri.acy cheap# profita%le# and effecti.e) (?> 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise he claim to pri.acy is protected in the 5)S)# Canadian# and German constitutions in a .ariety of different $ays and in other countries throu"h .arious statutes) In the 5nited States# the claim to pri.acy is protected primar2 ily %y the 0irst Amendment "uarantees of freedom of speech and association# the 0ourth Amendment protections a"ainst unreasona%le search and seiDure of one<s personal documents or home# and the "uarantee of due process) a%le 42- descri%es the maJor 5)S) federal statutes that set forth the conditions for handlin" information a%out indi.iduals in such areas as credit reportin"# education# financial records# ne$spaper records# and electronic communications) he 4ri.acy Act of (BK4 has %een the most important of these la$s# re"ulatin" the federal "o.ernment<s collection# use# and disclosure of information) At present# most 5)S) federal pri.acy la$s apply only to the federal "o.ernment and re"ulate .ery fe$ areas of the pri.ate sector) 3ost American and European pri.acy la$ is %ased on a re"ime called 0air Information 4ractices =0I4@ first set forth in a report $ritten in (BK- %y a federal "o.ernment ad.isory committee =5)S) 6epartment of /ealth# Education# and *elfare# (BK-@) 0I4 is a set of principles "o.ernin" the collection and use of information a%out indi.iduals) 0I4 principles are %ased on the notion of a mutuality of interest %et$een the record holder and the indi.idual) he indi.idual has an interest in en"a"in" in a transaction# and the record 8eeper2 usually a %usiness or "o.ernment a"ency2re&uires information a%out the indi.idual to support the transaction) Once information is "athered# the indi.idual maintains an interest in the record# and the record may not %e used to support other acti.ities $ithout the indi.idual<s consent) In (BBG# the 0ederal rade Commission =0C@ restated and e1tended the ori"inal 0I4 to pro.ide "uidelines for protectin" online pri.acy) a%le 424 descri%es the 0C<s 0air Information 4ractice principles) he 0C<s 0I4 are %ein" used as "uidelines to dri.e chan"es in pri.acy le"islation) In Jul@# (BBG# the 5)S) Con"ress passed the Children<s Online 4ri.acy 4rotection Act =CO44A@# re&uirin" *e% sites to o%tain parental permis2 sion %efore collectin" information on children under the a"e of (-) =his la$ is in dan"er of %ein" o.erturned)@ he 0C has recommended additional le"isla2 tion to protect online consumer pri.acy in ad.ertisin" net$or8s that collect K 0E6ERAL 4RI!AC7 LA*S IN /E 5NIE6 SAES GENERAL 0E6ERAL 4RI!AC7 LA*S 0reedom of Information Act of (B?? as Amended =C 5SC CC,@ 4ri.acy Act of (BK4 as Amended =C 5SC CC,a@ Electronic Communications 4ri.acy Act of (BG? Computer 3atchin" and 4ri.acy 4rotection Act of (BGG Computer Security Act of (BGK 0ederal 3ana"ers 0inancial Inte"rity Act of (BG, 6ri.er<s 4ri.acy 4rotection Act of (BB4 E2Go.ernment Act of ,>>, 4RI!AC7 LA*S A00ECING 4RI!AE INSI5IONS 0air Credit Reportin" Act of (BK> 0amily Educational Ri"hts and 4ri.acy Act of (BK4 Ri"ht to 0inancial 4ri.acy Act of (BKG 4ri.acy 4rotection Act of (BG> Ca%le Communications 4olicy Act of (BG4 Electronic Communications 4ri.acy Act of (BG? !ideo 4ri.acy 4rotection Act of (BGG he /ealth Insurance 4orta%ility and Accounta%ility Act of (BB? =/ I 4AA@ Children<s Online 4ri.acy 4rotection Act of (BBG =CO44A@ 0inancial 3oderniDation Act =Gramm2Leach2Bliley Act@ of (BBB Chapter 4 Ethical and Social Issues in Information Systems (?( 0E6ERAL RA6E CO33ISSION 0AIR IN0OR3AION 4RACICE 4RINCI4LES () NoticeFa$areness =core principle@) *e% sites must disclose their information practices %efore collectin" data) Includes identification of collector; uses of data; other recipients of data; nature of collection =acti.eFinacti.e@; .oluntary or re&uired status; conse&uences of refusal; and steps ta8en to protect confidentiality# inte"rity# and &uality of the data) ,) ChoiceFconsent =core principle@) here must %e a choice re"ime in place allo$in" consumers to choose ho$ their information $ill %e used for secondary purposes other than supportin" the transaction# includin" internal use and transfer to third parties) -) AccessFparticipation) Consumers should %e a%le to re.ie$ and contest the accuracy and completeness of data collected a%out them in a timely# ine1pensi.e process) 4) Security) 6ata collectors must ta8e responsi%le steps to assure that consumer information is accurate and secure from unauthoriDed use) C) Enforcement) here must %e in place a mechanism to enforce 0I4 principles) his can in.ol.e self2re"ulation# le"islation "i.in" consumers le"al remedies for .iolations# or federal statutes and re"ulations# records of consumer *e% acti.ity to de.elop detailed profiles# $hich are then used %y other companies to tar"et online ads) Other proposed Internet pri.acy le"islation focuses on protectin" the online use of personal identification num%ers# such as Social Security num%ers; protectin" personal information collected on the Internet that deals $ith indi.iduals not co.ered %y the Children<s Online 4ri.acy 4rotection Act of (BBG; and limitin" the use of data minin" for homeland security) 4ri.acy protections ha.e also %een added to recent la$s dere"ulatin" finan2 cial ser.ices and safe"uardin" the maintenance and transmission of health information a%out indi.iduals) he Gramm2Leach2Bliley Act of (BBB# $hich repeals earlier restrictions on affiliations amon" %an8s# securities firms# and insurance companies# includes some pri.acy protection for consumers of finan2 cial ser.ices) All financial institutions are re&uired to disclose their policies and practices for protectin" the pri.acy of nonpu%lic personal information and to allo$ customers to opt out of information2sharin" arran"ements $ith nonaffiliated third parties) he /ealth Insurance 4orta%ility and Accounta%ility Act of (BB? =/I4AA@# $hich too8 effect on April (4# ,>>-# includes pri.acy protection for medical records) he la$ "i.es patients access to their personal medical records maintained %y healthcare pro.iders# hospitals# and health insurers and the ri"ht to authoriDe ho$ protected information a%out themsel.es can %e used or disclosed) 6octors# hospitals# and other healthcare pro.iders must limit the disclosure of personal information a%out patients to the minimum amount necessary to achie.e a "i.en purpose) he European 6irecti.e on 6ata 4rotection In Europe# pri.acy protection is much more strin"ent than in the 5nited States) 5nli8e the 5nited States# European countries do not allo$ %usinesses to use personally identifia%le information $ithout consumers< prior consent) On Octo%er ,C# (BBG# the European Commission<s 6irecti.e on 6ata 4rotection $ent into effect# %roadenin" pri.acy protection in the European 5nion =E5@ nations) he directi.e re&uires companies to inform people $hen they collect information a%out them and disclose ho$ it $ill %e stored and used) Customers must pro.ide their informed consent %efore any company can le"ally use data a%out them# and they ha.e the ri"ht to access that information# correct it# and re&uest that no further data %e collected) Informed consent can %e defined as consent "i.en $ith 8no$led"e of all the facts needed to ma8e a rational decision) E5 mem%er nations must translate these principles into their o$n (?, 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise la$s and cannot transfer personal data to countries# such as the 5nited States# that do not ha.e similar pri.acy protection re"ulations) *or8in" $ith the European Commission# the 5)S) 6epartment of Commerce de.eloped a safe har%or frame$or8 for 5)S) firms) A safe har%or is a pri.ate# self2re"ulatin" policy and enforcement mechanism that meets the o%Jecti.es of "o.ernment re"ulators and le"islation %ut does not in.ol.e "o.ernment re"ula2 tion or enforcement) 5)S) %usinesses $ould %e allo$ed to use personal data from E5 countries if they de.elop pri.acy protection policies that meet E5 standards) Enforcement $ould occur in the 5nited States usin" self2policin"# re"ulation# and "o.ernment enforcement of fair trade statutes) Internet Challen"es to 4ri.acy Internet technolo"y has posed ne$ challen"es for the protection of indi.idual pri.acy) Information sent o.er this .ast net$or8 of net$or8s may pass throu"h many different computer systems %efore it reaches its final destination) Each of these systems is capa%le of monitorin"# capturin"# and storin" communications that pass throu"h it) It is possi%le to record many online acti.ities# includin" $hat searches ha.e %een conducted# $hich *e% sites and *e% pa"es ha.e %een .isited# the online content a person has accessed# and $hat items that person has inspected or purchased o.er the *e%) 3uch of this monitorin" and trac8in" of *e% site .is2 itors occurs in the %ac8"round $ithout the .isitor<s 8no$led"e) It is conducted not Just %y indi.idual *e% sites %ut %y ad.ertisin" net$or8s such as 6ou%leClic8 that are capa%le of trac8in" all %ro$sin" %eha.ior at thousands of *e% sites) ools to monitor .isits to the *orld *ide *e% ha.e %ecome popular %ecause they help %usinesses determine $ho is .isitin" their *e% sites and ho$ to %etter tar"et their offerin"s) =Some firms also monitor the Internet usa"e of their employees to see ho$ they are usin" company net$or8 resources)@ he commercial demand for this personal information is .irtually insatia%le) *e% sites can learn the identities of their .isitors if the .isitors .oluntarily re"ister at the site to purchase a product or ser.ice or to o%tain a free ser.ice# such as information) *e% sites can also capture information a%out .isitors $ithout their 8no$led"e usin" coo8ie technolo"y) Coo8ies are tiny files deposited on a computer hard dri.e $hen a user .isits certain *e% sites) Coo8ies identify the .isitor<s *e% %ro$ser soft$are and trac8 .isits to the *e% site) *hen the .isitor returns to a site that has stored a coo8ie# the *e% site soft$are $ill search the .isitor<s computer# find the coo8ie# and 8no$ $hat that person has done in the past) It may also update the coo8ie# dependin" on the acti.ity durin" the .isit) In this $ay# the site can customiDe its contents for each .isitor<s interests) 0or e1ample# if you purchase a %oo8 on the AmaDon)com *e% site and return later from the same %ro$ser# the site $ill $elcome you %y name and recommend other %oo8s of interest %ased on your past purchases) 6ou%leClic8# descri%ed earlier in this chapter# uses coo8ies to %uild its dossiers $ith details of online purchases and to e1amine the %eha.ior of *e% site .isitors) 0i"ure 42- illustrates ho$ coo8ies $or8) *e% sites usin" coo8ie technolo"y cannot directly o%tain .isitors< names and addresses) /o$e.er# if a person has re"istered at a site# that information can %e com%ined $ith coo8ie data to identify the .isitor) *e% site o$ners can also com%ine the data they ha.e "athered from coo8ies and other *e% site monitor2 in" tools $ith personal data from other sources# such as offline data collected from sur.eys or paper catalo" purchases# to de.elop .ery detailed profiles of their .isitors) 0IG5RE 42P /O* COO9IES I6ENI07 *EB !ISIORS *indo$s L4 > IE Chapter 4 Ethical and Social Issues in Information Systems (?- !ersion K)> Coo8ie B-(>-,B44 4re.ious %uyer *elcome %ac8# Jane 6oeQ > 5ser Ser.er () he *e% ser.er reads the user<s *e% %ro$ser and determines the operatin" system# %ro$ser name# .ersion num%er# Internet address# and other information) ,) he ser.er transmits a tiny te1t file $ith user identification information called a coo8ie# $hich the user<s %ro$ser recei.es and stores on the user<s computer hard dri.e) -) *hen the user returns to the *e% site# the ser.er re&uests the contents of any coo8ie it deposited pre.iously in the user<s computer) 4) he *e% ser.er reads the coo8ie# identifies the .isitor# and calls up data on the user) Coo8ies are $ritten %y a *e% site on a .isitor<s hard dri.e) *hen the .isitor returns to that *e% site# the *e% ser.er re&uests the I6 num%er from the coo8ie and uses it to access the data stored %y that ser.er on that .isitor) he *e% site can then use these data to display personaliDed information) here are no$ e.en more su%tle and surreptitious tools for sur.eillance of Internet users) 3ar8eters use *e% %u"s as another tool to monitor online %eha.ior) *e% %u"s are tiny "raphic files em%edded in e2mail messa"es and *e% pa"es that are desi"ned to monitor $ho is readin" the e2mail messa"e or *e% pa"e and transmit that information to another computer) Other spy$are can secretly install itself on an Internet user<s computer %y pi""y%ac8in" on lar"er applications) Once installed# the spy$.are calls out to *e% sites to send %anner ads and other unsolicited material to the user# and it can also report the user<s mo.ements on the Internet to other computers) 3ore information is a.aila%le a%out *e% %u"s# spy$.are# and other intrusi.e soft$are in Chapter G) Goo"le has started usin" %eha.ioral tar"etin" to help it display more rele.ant ads %ased on users< search acti.ities) One of its pro"rams ena%les ad.ertisers to tar"et ads %ased on the search histories of Goo"le users# alon" $ith any other information the user su%mits to Goo"le or Goo"le can o%tain# such as a"e# demo"raphics# re"ion# and other *e% acti.ities =such as %lo""in"@) An additional pro"ram allo$s Goo"le to help ad.ertisers select 8ey$ords and desi"n ads for .arious mar8et se"ments %ased on search histories# such as helpin" a clothin" *e% site create and test ads tar"eted at teena"e females) Goo"le has also %een scannin" the contents of messa"es recei.ed %y users of its free *e%2%ased e2mail ser.ice called Gnnail) Ads that users see $hen they read their e2mail are related to the su%Jects of these messa"es) 4rofiles are de.eloped on indi.idual users %ased on the content in their e2mail) Goo"le<s Chrome *e% %ro$ser# introduced in ,>>G# has a Su""est feature $hich automat2 ically su""ests related &ueries and *e% sites as the user enters a search) Critics pointed out this $as a 8ey2lo""er de.ice that $ould record e.ery 8eystro8e of users fore.er) Goo"le su%se&uently announced it $ould anonymiDe the data in t$enty2four hours) he 5nited States has allo$ed %usinesses to "ather transaction information "enerated in the mar8etplace and then use that information for other mar8et2 in" purposes $ithout o%tainin" the informed consent of the indi.idual $hose information is %ein" used) 5)S) e2commerce sites are lar"ely content to pu%lish (?4 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise statements on their *e% sites informin" .isitors a%out ho$ their information $ill %e used) Some ha.e added opt2out selection %o1es to these information policy statements) An opt2out model of informed consent permits the collection of personal information until the consumer specifically re&uests that the data not %e collected) 4ri.acy ad.ocates $ould li8e to see $ider use of an opt2in model of informed consent in $hich a %usiness is prohi%ited from collectin" any personal information unless the consumer specifically ta8es action to appro.e information collection and use) he online industry has preferred self2re"ulation to pri.acy le"islation for protectin" consumers) In (BBG# the online industry formed the Online 4ri.acy Alliance to encoura"e self2re"ulation to de.elop a set of pri.acy "uidelines for its mem%ers) he "roup promotes the use of online seals# such as that of R5Se# certifyin" *e% sites adherin" to certain pri.acy principles) 3em%ers of the ad.ertisin" net$or8 industry# includin" 6ou%leClic8# ha.e created an additional industry association called the Net$or8 Ad.ertisin" Initiati.e =NAI@ to de.elop its o$n pri.acy policies to help consumers opt out of ad.ertisin" net$or8 pro"rams and pro.ide consumers redress from a%uses) Indi.idual firms li8e AOL# 7ahooQ# and Goo"le ha.e recently adopted policies on their o$n in an effort to address pu%lic concern a%out trac8in" people online) AOL esta%lished an opt2out policy that allo$s users of its site to not %e trac8ed) 7ahoo follo$s NAI "uidelines and also allo$s opt out for trac8in" and *e% %eacons =*e% %u"s@) Goo"le has reduced retention time for trac8in" data) In "eneral# most Internet %usinesses do little to protect the pri.acy of their customers# and consumers do not do as much as they should to protect themsel.es) 3any companies $ith *e% sites do not ha.e pri.acy policies) Of the companies that do post pri.acy polices on their *e% sites# a%out half do not monitor their sites to ensure they adhere to these policies) he .ast maJority of online customers claim they are concerned a%out online pri.acy# %ut less than half read the pri.acy statements on *e% sites =Laudon and ra.er# ,>>B@) *e% sites are postin" their pri.acy policies for .isitors to re.ie$) he R5Se seal desi"nates *e% sites that ha.e a"reed to adhere to R5Se<s esta%lished pri.acy principles of disclosure# choice# access# and security) 5 InterCont#nental /otels E Resorts I 4ri.acy State ment 2 mommE 0irer %le Rdt AEt e$ho /S INERCONINENAL) /OELS G RESORS 4RI!AC7 SAE3EN I/G truer) ontineutal /otels Group I 4ri.acy and Security 2 ((-( L( R5Se ne p Nosy .4 Cetteiy o( 7.1 personal nfanult.n >o Crory rR et>>( to uB) *e do 3I Share y* per(a* ntam>l#or i# #.sys rrd dTrcC sod n o$ pri.ouy C(Nertrtfi cc $OSooy y>>> eNarced perrNSSm) *e 7et a yar %ust .ery teyty# a3 $it .a8 fo =stied the securty end pr<nacy of any pdsanal nfotmel>>> you pro.iie to us antl roi oe(y use i ai $e ho.e r8trTd n a# c;))) tterCertherta thre<s Oen t is a Etemee or the R5S) 32y 4#o"ram) R5Se a on ndepei18rl# t>n2pott > B>>>>#>>><1# $hose r>>S83 is to /ra/(>C#>4(( (> end >>B>>>>>1>> to estetrtot CC>>> " retatunst">C %ated m reaped icc persmal /ertty and ntUmt-"n %y pomotnB the use of fm ooSee ion practices) lris prpecy st>temed ro.ers >># R5Se tussled /ttartnert" /otel Oro y *e%;tes) o .rT$ a >>>>p #>> >CC of these .a4deted ttercordi$rtd /ord Group sues pease cit8 on the >SO5Se se>) Be.O5Se tlis *h% sue $ads to deeoC#ttrae is oeort t2d to ste usds< pir.ooy# I #ss#"eed to >>;>>>># is intamstion pad81s end ho.e Is pi2>y pec >1s re.ie$od for 2>2s %y R5Se) It Ihere $e "oes%ms >> >>>>>>>)> re"(d<"it>s sttem>A# r) a as8 its= you rust 6ated *)Co tnert>l /ote<s Graty Otto# 4ri.acy Off2 hee Ra.iea Ctr.e >(?ta#C "s ->-4? 4han' (KK>2?>42?-4K 0afc ()KK>V>42C,KC If eetisfaday response a r#so8Am a rnl re.ersed $ti.i a >elsmoedC tine4Em R5Se l- a.aish% >> a >>>=>>>) 4lease see (da)#a nt.oe O > tfillMie !JaQcldya COTrrre 0H2 2 T%ttSle >>><> S5Sro esetie Son $ihihe *e% Ste to resole user C3OWPni) n O !ERI07 J Chapter 4 Ethical and Social Issues in Information Systems (?C echnical Solutions In addition to le"islation# ne$ technolo"ies are a.aila%le to protect user pri.acy durin" interactions $ith *e% sites) 3any of these tools are used for encryptin" e2mail# for ma8in" e2mail or surfin" acti.ities appear anonymous# for pre.entin" client computers from acceptin" coo8ies# or for detectin" and eliminatin" spy $are) here are no$ tools to help users determine the 8ind of personal data that can %e e1tracted %y *e% sites) he 4latform for 4ri.acy 4references# 8no$n as 4-4# ena%les automatic communication of pri.acy policies %et$een an e2commerce site and its .isitors) 4-4 pro.ides a standard for communicatin" a *e% site<s pri.acy policy to Internet users and for comparin" that policy to the user<s preferences or to other standards# such as the 0C<s ne$ 0I4 "uidelines or the European 6irecti.e on 6ata 4rotection) 5sers can use 4-4 to select the le.el of pri.acy they $ish to maintain $hen interactin" $ith the *e% site) he 4-4 standard allo$s *e% sites to pu%lish pri.acy policies in a form that computers can understand) Once it is codified accordin" to 4-4 rules# the pri.acy policy %ecomes part of the soft$are for indi.idual *e% pa"es =see 0i"ure 424@) 5sers of 3icrosoft Internet E1plorer *e% %ro$sin" soft$are can access and read the 4-4 site<s pri.acy policy and a list of all coo8ies comin" from the site) Internet E1plorer ena%les users to adJust their computers to screen out all coo8ies or let in selected coo8ies %ased on specific le.els of pri.acy) 0or e1ample# the AmediumA le.el accepts coo8ies from first2party host sites that ha.e opt2in or opt2out policies %ut reJects third2party coo8ies that use personally identifia%le information $ithout an opt2in policy) /o$e.er# 4-4 only $or8s $ith *e% sites of mem%ers of the *orld *ide *e% Consortium $ho ha.e translated their *e% site pri.acy policies into 4-4 format) he technolo"y $ill display coo8ies from *e% sites that are not part of the consortium# %ut users $ill not %e a%le to o%tain sender information or pri.acy statements) 3any users may also need to %e educated a%out interpret2 in" company pri.acy statements and 4-4 le.els of pri.acy) 0IG5RE 424 /E 4-4 SAN6AR6 Re&uest for *e% pa"e H *e% pa"e H Compact 4-4 policy H 4ointer to full 4-4 policy 5ser Ser.er () he user $ith 4-4 *e% %ro$sin" soft$are re&uests a *e% pa"e) ,) he *e% ser.er returns the *e% pa"e alon" $ith a compact .ersion of the *e% site<s policy and a pointer to the full 4-4 policy) If the *e% site is not 4-4 compliant# no 4-4 data are returned) -) he user<s *e% %ro$sin" soft$are compares the response irrom the *e% site $ith the user<s pri.acy preferences) If the *e% site does not ha.e a 4-4 policy or the policy does not match the pri.acy le.els esta%lished %y the user# it $arns the user or reJects the coo8ies from the *e% site) Other$ise# the *e% pa"e loads normally) 4-4 ena%les *e% sites to translate their pri.acy policies into a standard format that can %e read %y the user<s *e% %ro$ser soft$are) he %ro$ser soft$are e.aluates the *e% site<s pri.acy policy to determine $hether it is compati%le $ith the user<s pri.acy preferences) (?? 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise 4RO4ER7 RIG/S' INELLEC5AL 4RO4ER7 Contemporary information systems ha.e se.erely challen"ed e1istin" la$ and social practices that protect pri.ate intellectual property) Intellectual prop2 erty is considered to %e intan"i%le property created %y indi.iduals or corpora2 tions) Information technolo"y has made it difficult to protect intellectual property %ecause computeriDed information can %e so easily copied or distri%2 uted on net$or8s) Intellectual property is su%Ject to a .ariety of protections under three different le"al traditions' trade secrets# copyri"ht# and patent la$) rade Secrets Any intellectual $or8 product2a formula# de.ice# pattern# or compilation of data2used for a %usiness purpose can %e classified as a trade secret# pro.ided it is not %ased on information in the pu%lic domain) 4rotections for trade secrets .ary from state to state) In "eneral# trade secret la$s "rant a monopoly on the ideas %ehind a $or8 product# %ut it can %e a .ery tenuous monopoly) Soft$are that contains no.el or uni&ue elements# procedures# or compila2 tions can %e included as a trade secret) rade secret la$ protects the actual ideas in a $or8 product# not only their manifestation) o ma8e this claim# the creator or o$ner must ta8e care to %ind employees and customers $ith nondisclosure a"reements and to pre.ent the secret from fallin" into the pu%lic domain) he limitation of trade secret protection is that# althou"h .irtually all soft$are pro"rams of any comple1ity contain uni&ue elements of some sort# it is difficult to pre.ent the ideas in the $or8 from fallin" into the pu%lic domain $hen the soft$are is $idely distri%uted) Copyri"ht Copyri"ht is a statutory "rant that protects creators of intellectual property from ha.in" their $or8 copied %y others for any purpose durin" the life of the author plus an additional K> years after the author<s death) 0or corporate2o$ned $or8s# copyri"ht protection lasts for BC years after their initial creation) Con"ress has e1tended copyri"ht protection to %oo8s# periodicals# lectures# dramas# musical compositions# maps# dra$in"s# art$or8 of any 8ind# and motion pictures) he intent %ehind copyri"ht la$s has %een to encoura"e creati.ity and authorship %y ensurin" that creati.e people recei.e the financial and other %enefits of their $or8) 3ost industrial nations ha.e their o$n copyri"ht la$s# and there are se.eral international con.entions and %ilateral a"reements throu"h $hich nations coordinate and enforce their la$s) In the mid2(B?>s# the Copyri"ht Office %e"an re"isterin" soft$are pro"rams# and in (BG> Con"ress passed the Computer Soft$are Copyri"ht Act# $hich clearly pro.ides protection for soft$are pro"ram code and for copies of the ori"inal sold in commerce# and sets forth the ri"hts of the purchaser to use the soft$are $hile the creator retains le"al title) Copyri"ht protects a"ainst copyin" of entire pro"rams or their parts) 6ama"es and relief are readily o%tained for infrin"ement) he dra$%ac8 to copyri"ht protection is that the underlyin" ideas %ehind a $or8 are not protected# only their manifestation in a $or8) A competitor can use your soft$are# understand ho$ it $or8s# and %uild ne$ soft$are that follo$s the same concepts $ithout infrin"in" on a copyri"ht) ALoo8 and feelA copyri"ht infrin"ement la$suits are precisely a%out the distinction %et$een an idea and its e1pression) 0or instance# in the early (BB>s# Apple Computer sued 3icrosoft Corporation and /e$lett24ac8ard for infrin"e2 Chapter 4 Ethical and Social Issues in ment of the e1pression of Apple<s 3acintosh interface# claimin" that the defen2 dants copied the e1pression of o.erlappin" $indo$s) he defendants countered that the idea of o.erlappin" $indo$s can %e e1pressed only in a sin"le $ay and# therefore# $as not protecta%le under the mer"er doctrine of copyri"ht la$) *hen ideas and their e1pression mer"e# the e1pression cannot %e copyri"hted) In "eneral# courts appear to %e follo$in" the reasonin" of a (BGB case2Bro$n Ba" Soft$are .s) Symantec Corp) 2in $hich the court dissected the elements of soft$are alle"ed to %e infrin"in") he court found that similar concept# function# "eneral functional features =e)")# drop2do$n menus@# and colors are not protecta%le %y copyri"ht la$ =Bro$n Ba" Soft$are .s) Symantec Co@p)# (BB,@) 4atents A patent "rants the o$ner an e1clusi.e monopoly on the ideas %ehind an in.ention for ,> years) he con"ressional intent %ehind patent la$ $as to ensure that in.entors of ne$ machines# de.ices# or methods recei.e the full financial and other re$ards of their la%or and yet ma8e $idespread use of the in.ention possi%le %y pro.idin" detailed dia"rams for those $ishin" to use the idea under license from the patent<s o$ner) he "rantin" of a patent is determined %y the 5nited States 4atent and rademar8 Office and relies on court rulin"s) he 8ey concepts in patent la$ are ori"inality# no.elty# and in.ention) he 4atent Office did not accept applications for soft$are patents routinely until a (BG( Supreme Court decision that held that computer pro"rams could %e a part of a patenta%le process) Since that time# hundreds of patents ha.e %een "ranted and thousands a$ait consideration) he stren"th of patent protection is that it "rants a monopoly on the under2 lyin" concepts and ideas of soft$are) he difficulty is passin" strin"ent criteria of nono%.iousness =e)")# the $or8 must reflect some special understandin" and contri%ution@# ori"inality# and no.elty# as $ell as years of $aitin" to recei.e protection) Challen"es to Intellectual 4roperty Ri"hts Contemporary information technolo"ies# especially soft$are# pose se.ere challen"es to e1istin" intellectual property re"imes and# therefore# create si"nificant ethical# social# and political issues) 6i"ital media differ from %oo8s# periodicals# and other media in terms of ease of replication; ease of transmis2 sion; ease of alteration; difficulty in classifyin" a soft$are $or8 as a pro"ram# %oo8# or e.en music; compactness2ma8in" theft easy; and difficulties in esta%lishin" uni&ueness) he proliferation of electronic net$or8s# includin" the Internet# has made it e.en more difficult to protect intellectual property) Before $idespread use of net$or8s# copies of soft$are# %oo8s# ma"aDine articles# or films had to %e stored on physical media# such as paper# computer dis8s# or .ideotape# creatin" some hurdles to distri%ution) 5sin" net$or8s# information can %e more $idely reproduced and distri%uted) he 0ifth Annual Glo%al Soft$are 4iracy Study conducted %y the International 6ata Corporation and the Business Soft$are Alliance found that -G percent of the soft$are installed in ,>>K on 4Cs $orld$ide $as o%tained ille"ally# representin" M4G %illion in "lo%al losses from soft$are piracy) *orld$ide# for e.ery t$o dollars of soft$are purchased le"itimately# one dollar<s $orth $as o%tained ille"ally =Business Soft$are Alliance# ,>>G@) he Internet $as desi"ned to transmit information freely around the $orld# includin" copyri"hted information) *ith the *orld *ide *e% in particular# you can easily copy and distri%ute .irtually anythin" to thousands and e.en Information Systems (?K (?G 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise millions of people around the $orld# e.en if they are usin" different types of computer systems) Information can %e illicitly copied from one place and distri%uted throu"h other systems and net$or8s e.en thou"h these parties do not $illin"ly participate in the infrin"ement) Indi.iduals ha.e %een ille"ally copyin" and distri%utin" di"itiDed 34- music files on the Internet for a num%er of years) 0ile sharin" ser.ices such as Napster# and later Gro8ster# 9aDaa# and 3orpheus# sprun" up to help users locate and s$ap di"ital music files# includin" those protected %y copyri"ht) Ille"al file2sharin" %ecame so $idespread that it threatened the .ia%ility of the music recordin" industry) he recordin" industry $on some le"al %attles for shuttin" these ser.ices do$n# %ut has not %een a%le to halt ille"al file sharin" entirely) As more and more homes adopt hi"h2speed Internet access# ille"al file sharin" of .ideos $ill pose similar threats to the motion picture industry =see the case study concludin" Chapter -@) 3echanisms are %ein" de.eloped to sell and distri%ute %oo8s# articles# and other intellectual property le"ally on the Internet# and the 6i"ital 3illennium Copyri"ht Act =63CA@ of (BBG is pro.idin" some copyri"ht protection) he 63CA implemented a *orld Intellectual 4roperty Or"aniDation reaty that ma8es it ille"al to circum.ent technolo"y2%ased protections of copyri"hted materials) Internet ser.ice pro.iders =IS4s@ are re&uired to ta8e do$n sites of copyri"ht infrin"ers that they are hostin" once they are notified of the pro%lem) 3icrosoft and other maJor soft$are and information content firms are represented %y the Soft$are and Information Industry Association =SIIA@# $hich lo%%ies for ne$ la$s and enforcement of e1istin" la$s to protect intellectual property around the $orld) he SIIA runs an antipiracy hotline for indi.iduals to report piracy acti.ities and educational pro"rams to help or"aniDations com%at soft$are piracy and has pu%lished "uidelines for employee use of soft$are) ACCO5NABILI7# LIABILI7# AN6 CONROL Alon" $ith pri.acy and property la$s# ne$ information technolo"ies are challen"in" e1istin" lia%ility la$ and social practices for holdin" indi.iduals and institutions accounta%le) If a person is inJured %y a machine controlled# in part# %y soft$are# $ho should %e held accounta%le and# therefore# held lia%le+ Should a pu%lic %ulletin %oard or an electronic ser.ice# such as America Online# permit the transmission of porno"raphic or offensi.e material =as %roadcasters@# or should they %e held harmless a"ainst any lia%ility for $hat users transmit =as is true of common carriers# such as the telephone system@+ *hat a%out the Internet+ If you outsource your information processin"# can you hold the e1ternal .endor lia%le for inJuries done to your customers+ Some real2$orld e1amples may shed li"ht on these &uestions) Computer2Related Lia%ility 4ro%lems 6urin" the $ee8end of 3arch (C# ,>>,# tens of thousands of Ban8 of America customers in California# AriDona# and Ne.ada $ere una%le to use their paychec8s and Social Security payments that had Just %een deposited electroni2 cally) Chec8s %ounced) *ithdra$als $ere %loc8ed %ecause of insufficient funds) Because of an operatin" error at the %an8<s computer center in Ne.ada# a %atch of direct deposit transactions $as not processed) he %an8 lost trac8 of money that should ha.e %een credited to customers< accounts# and it too8 days to rectify the pro%lem =Carr and Galla"her# ,>>,@) *ho is lia%le for any economic harm Chapter 4 Ethical and Social Issues caused to indi.iduals or %usinesses that could not access their full account %alances in this period+ his case re.eals the difficulties faced %y information systems e1ecuti.es $ho ultimately are responsi%le for any harm done %y systems de.eloped %y their staffs) In "eneral# insofar as computer soft$are is part of a machine# and the machine inJures someone physically or economically# the producer of the soft$are and the operator can %e held lia%le for dama"es) Insofar as the soft$are acts li8e a %oo8# storin" and displayin" information# courts ha.e %een reluctant to hold authors# pu%lishers# and %oo8sellers lia%le for contents =the e1ception %ein" instances of fraud or defamation@# and hence courts ha.e %een $ary of holdin" soft$are authors lia%le for %oo8li8e soft$are) In "eneral# it is .ery difficult =if not impossi%le@ to hold soft$are producers lia%le for their soft$are products that are considered to %e li8e %oo8s# re"ardless of the physical or economic harm that results) /istorically# print pu%lishers# %oo8s# and periodicals ha.e not %een held lia%le %ecause of fears that lia%ility claims $ould interfere $ith 0irst Amendment ri"hts "uaranteein" freedom of e1pression) *hat a%out soft$are as a ser.ice+ A3 machines are a ser.ice pro.ided to %an8 customers) Should this ser.ice fail# customers $ill %e incon.enienced and perhaps harmed economically if they cannot access their funds in a timely manner) Should lia%ility protections %e e1tended to soft$are pu%lishers and operators of defecti.e financial# accountin"# simulation# or mar8etin" systems+ Soft$are is .ery different from %oo8s) Soft$are users may de.elop e1pecta2 tions of infalli%ility a%out soft$are; soft$are is less easily inspected than a %oo8# and it is more difficult to compare $ith other soft$are products for &uality; soft$are claims actually to perform a tas8 rather than descri%e a tas8# as a %oo8 does; and people come to depend on ser.ices essentially %ased on soft$are) Gi.en the centrality of soft$are to e.eryday life# the chances are e1cellent that lia%ility la$ $ill e1tend its reach to include soft$are e.en $hen the soft$are merely pro.ides an information ser.ice) elephone systems ha.e not %een held lia%le for the messa"es transmitted %ecause they are re"ulated common carriers) In return for their ri"ht to pro.ide telephone ser.ice# they must pro.ide access to all# at reasona%le rates# and achie.e accepta%le relia%ility) But %roadcasters and ca%le tele.ision systems are su%Ject to a $ide .ariety of federal and local constraints on content and facilities) Or"aniDations can %e held lia%le for offensi.e content on their *e% sites; and online ser.ices# such as America Online# mi"ht %e held lia%le for postin"s %y their users) Althou"h 5)S) courts ha.e increasin"ly e1onerated *e% sites and IS4s for postin" material %y third parties# the threat of le"al action still has a chillin" effect on small companies or indi.iduals $ho cannot afford to ta8e their cases to trial) S7SE3 :5ALI7' 6AA :5ALI7 AN6 S7SE3 ERRORS he de%ate o.er lia%ility and accounta%ility for unintentional conse&uences of system use raises a related %ut independent moral dimension' *hat is an accepta%le# technolo"ically feasi%le le.el of system &uality+ At $hat point should system mana"ers say# AStop testin"# $e<.e done all $e can to perfect this soft$are) Ship itQA Indi.iduals and or"aniDations may %e held responsi%le for a.oida%le and foreseea%le conse&uences# $hich they ha.e a duty to percei.e and correct) And the "ray area is that some system errors are foreseea%le and in Information Systems (?B (K> 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise correcta%le only at .ery "reat e1pense# an e1pense so "reat that pursuin" this le.el of perfection is not feasi%le economically2no one could afford the product) 0or e1ample# althou"h soft$are companies try to de%u" their products %efore releasin" them to the mar8etplace# they 8no$in"ly ship %u""y products %ecause the time and cost of fi1in" all minor errors $ould pre.ent these products from e.er %ein" released) *hat if the product $as not offered on the mar8etplace# $ould social $elfare as a $hole not ad.ance and perhaps e.en decline+ Carryin" this further# Just $hat is the responsi%ility of a producer of computer ser.ices2should it $ithdra$ the product that can ne.er %e perfect# $arn the user# or for"et a%out the ris8 =let the %uyer %e$are@+ hree principal sources of poor system performance are =(@ soft$are %u"s and errors# =,@ hard$are or facility failures caused %y natural or other causes# and =-@ poor input data &uality) A Chapter G Learnin" rac8 discusses $hy Dero defects in soft$are code of any comple1ity cannot %e achie.ed and $hy the seriousness of remainin" %u"s cannot %e estimated) /ence# there is a techno2 lo"ical %arrier to perfect soft$are# and users must %e a$are of the potential for catastrophic failure) he soft$are industry has not yet arri.ed at testin" stan2 dards for producin" soft$are of accepta%le %ut not perfect performance) Althou"h soft$are %u"s and facility catastrophes are li8ely to %e $idely reported in the press# %y far the most common source of %usiness system failure is data &uality) 0e$ companies routinely measure the &uality of their data# %ut indi.idual or"aniDations report data error rates ran"in" from >)C to -> percent) :5ALI7 O0 LI0E' E:5I7# ACCESS# AN6 BO5N6ARIES he ne"ati.e social costs of introducin" information technolo"ies and systems are %e"innin" to mount alon" $ith the po$er of the technolo"y) 3any of these ne"ati.e social conse&uences are not .iolations of indi.idual ri"hts or property crimes) Ne.ertheless# these ne"ati.e conse&uences can %e e1tremely harmful to indi.iduals# societies# and political institutions) Computers and information technolo"ies potentially can destroy .alua%le elements of our culture and society e.en $hile they %rin" us %enefits) If there is a %alance of "ood and %ad conse&uences of usin" information systems# $ho do $e hold responsi%le for the %ad conse&uences+ Ne1t# $e %riefly e1amine some of the ne"ati.e social conse2 &uences of systems# considerin" indi.idual# social# and political responses) Balancin" 4o$er' Center !ersus 4eriphery An early fear of the computer a"e $as that hu"e# centraliDed mainframe computers $ould centraliDe po$er at corporate head&uarters and in the nation<s capital# resultin" in a Bi" Brother society# as $as su""ested in Geor"e Or2$ell<s no.el (BG4) he shift to$ard hi"hly decentraliDed computin"# coupled $ith an ideolo"y of empo$erment of thousands of $or8ers# and the decentral2 iDation of decision ma8in" to lo$er or"aniDational le.els ha.e reduced the fears of po$er centraliDation in institutions) 7et much of the empo$erment descri%ed in popular %usiness ma"aDines is tri.ial) Lo$er2le.el employees may %e empo$ered to ma8e minor decisions# %ut the 8ey policy decisions may %e as centraliDed as in the past) Rapidity of Chan"e' Reduced Response ime to Competition Information systems ha.e helped to create much more efficient national and international mar8ets) he no$2more2efficient "lo%al mar8etplace has reduced Chapter 4 Ethical and Social Issues in Information Systems (K( the normal social %uffers that permitted %usinesses many years to adJust to competition) ime2%ased competition has an u"ly side' he %usiness you $or8 for may not ha.e enou"h time to respond to "lo%al competitors and may %e $iped out in a year# alon" $ith your Jo%) *e stand the ris8 of de.elopin" a AJust2in2time SocietyA $ith < J5St2m2time Jo%sA and AJust2in2timeA $or8places# families# and .acations) 3aintainin" Boundaries' 0amily# *or8# and Leisure 4arts of this %oo8 $ere produced on trains and planes# as $ell as on .acations and durin" $hat other$ise mi"ht ha.e %een AfamilyA time) he dan"er to u%i&2 uitous computin"# telecommutin"# nomad computin"# and the Ado anythin" any$hereA computin" en.ironment is that it mi"ht actually come true) If so# the traditional %oundaries that separate $or8 from family and Just plain leisure $ill %e $ea8ened) Althou"h authors ha.e traditionally $or8ed Just a%out any$here =type$riters ha.e %een porta%le for nearly a century@# the ad.ent of information systems# coupled $ith the "ro$th of 8no$led"e2$or8 occupations# means that more and more people $ill %e $or8in" $hen traditionally they $ould ha.e %een playin" or communicatin" $ith family and friends) he $or8 um%rella no$ e1tends far %eyond the ei"ht2hour day) E.en leisure time spent on the computer threatens these close social relationships) E1tensi.e Internet use# e.en for entertainment or recreational purposes# ta8es people a$ay from their family and friends) Amon" middle school and teena"e children# it can lead to harmful anti2social %eha.ior) *ea8enin" these institutions poses clear2cut ris8s) 0amily and friends historically ha.e pro.ided po$erful support mechanisms for indi.iduals# and they act as %alance points in a society %y preser.in" pri.ate life# pro.idin" a place for people to collect their thou"hts# allo$in" people to thin8 in $ays contrary to their employer# and dream) Althou"h some people enJoy the con.enience of $or8in" at home# the Ado anythin" any$hereA computin" en.ironment can %lur the traditional %oundaries %et$een $or8 and family time) (K, 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise INERACI!E SESSION' 3ANAGE3EN GREEN I)) A *I4RO *ipro echnolo"ies =*ipro@# a di.ision of *ipro Limited# pro.ides inte"rated %usiness# technolo"y and process solutions) In the Indian mar8et# *ipro is a leader in pro.idin" I solutions and ser.ices for the corporate se"ment in India# offerin" system inte2 "ration# soft$are solutions and I ser.ices) It is a "lo%al 5)S) M (> %illion company that has $on numerous a$ards for its leadership# social responsi2 %ility# and customer care) *ipro started its "reen Journey $ith consolidation and .irtualiDation to scale do$n the ener"y con2 sunmption in its o$n datacenter) he e1ponential "ro$th of *ipro<s ser.er use $as %ecomin" a maJor pro%lem and created an impact on ener"y costs) he I team decided to tac8le the pro%lem $ith %lade ser.ers and .irtualiDation) Commentin" on the deci2 sion# CIO La1man Badi"a said# A))) he amount of space $e used in the datacenter $as optimiDed %y consolidatin" our ser.ers for different applications) his helped open space and optimiDe our coolin" needs)A he mo.e to con.ert a non2"reen datacenter into a "reen one# ho$e.er# $as not easy) here $as a lot of financial strain associated $ith the mo.e) 0or e1ample# the initial in.estment to .irtualiDe the infrastructure $as Rs) ? million# $hich needed to %e au"mented %y C to (> percent $ith the increase in %usiness needs) 0urthermore# the entire datacenter %lueprint 2 $hich maintained data li8e ho$ the or"a2 niDation laid out its rac8s# ho$ much coolin" and po$er $ere needed per rac8 2 had to under"o re.ie$; and the po$er and coolin" re&uirements had to %e re2architected for the ne$ datacenter) Commentin" on the challen"es# Jethin Chandran G32I 4lannin"# said# ARetrofittin" can create a lot of impact) hen there are challen"es in do$ntime)A In Au"ust ,>>C# the company em%ar8ed on tac82 lin" the e2$aste pro%lem %y "ettin" its manufactur2 in" facility certified under ISO (4>>() A year later# the company announced an e2$aste disposal pro2 "ram for its customers# $here%y it collected dis2 carded systems from customers and sent them to .endors certified %y the 4ollution Control Board to dispose of the parts) he e2$aste mana"ement initia2 ti.e du%%ed 2 Green Computin" 2 ena%led end2to2end e2$aste mana"ement in its product lifecycle# span2 nin" desi"nin"# manufacturin" and up to the final disposal of the product) In June ,>>K# *ipro %ecame the first Indian com2 pany to introduce an eco2friendly ran"e of des8tops and laptops aimed at reducin" e2$aste in the en.i2 ronment) he ne$ ran"es of products# named Green*are# $ere compliant $ith the European Restriction of /aDardous Su%stances =Ro/S@ direc2 ti.e) he Ro/S directi.e# adopted in ,>>- %y the European 5nion# restricts the use of si1 haDardous materials in the manufacture of .arious types of electronic and electrical e&uipment) he ne$ 4Cs $ould %e free of haDardous materials such as %romi2 nated flame retardants =B0R@# 4oly.inyl chloride =4!C@ and hea.y metals li8e lead# cadmium and mercury that had %een re"ularly used in the manu2 facture of computers) In June ,>>G# *ipro Joined the Green Grid# a "lo%al consortium dedicated to ad.ancin" ener"y efficiency in datacenters and %usiness computin" ecosystems) In the same month# *ipro commenced the EcoEye initiati.e# a comprehensi.e pro"ram for increasin" ecolo"ical sustaina%ility in all its opera2 tions and en"a"in" its shareholders) Commentin" on this initiati.e# Chandran said# A))) It is a colla%orati.e effort %et$een our customers# suppliers and employees) *e are also $or8in" on esta%lishin" supply chain social en.ironment responsi%ility "uidelines and $or8 $ith suppliers to identify materials that $ill reduce the en.ironmen2 tal impact of their products)A All this $ould not ha.e %een possi%le $ithout the commitment from the top) ADim 4rernJi# chairman and CEO# made it his personal mission to dri.e the chan"e) /e had %een closely in.ol.ed *ith EcoEye from its inception and monitored its pro"ress on a re"ular %asis) he "o.ernin" council comprised the senior most leaders includin" the CIO# C0O# CO# /ead of /R# and Chief Strate"y Officer) At the lo$er le.el# %usiness units $ere responsi%le for dri.in" "reen ini2 tiati.es to the BC#>>> plus *ipro employees) All pro2 Jects $ere loo8ed at from an ecolo"ical# as $ell as i f nancial# perspecti.e and $ere si"ned off %y the "o.ernin" council) As a result of adoptin" "reen I practices# *ipro reduced its ser.ers from 4>> to (>> and sa.ed a%out I million 9*h of po$er annually) he po$er con2 sumption reduced %y ,? percent as a result of rollin" out po$er mana"ement tools) *ith .irtualiDation and consolidation# the company is tar"etin" a reduc2 tion in its ser.er footprint %y - percent) CASE S567 :5ESIONS () *hat $ere the .arious "reen initiati.es under2 ta8en %y *ipro+ ,) *hat $ere some of the challen"es faced %y *ipro+ *hat %enefits did *ipro reap from "reen computin"+ -) *hat lessons can other or"aniDations learn from *ipro<s e1perience+ 4) Should "reen2computin" %e dri.en %y I .endors# or should it %e dri.en %y corporate customers+ 6iscuss) Chapter 4 Ethical and Social Issues in Information Systems (K- Sources' John Ri%eriro# A*ipro Goes Green as India<s E2*aste 3ounts#A $$$)cio)com# June ,>>K; AE1pandin" Green I#A $$$)cio)in# No.em%er ,>>G; A*ipro Launches EcoEye Initiati.e#A $XmarX#)thehindu%usinessline)conr# June ,>>G; im Gray# A*ipro Joins the Green Gnd#A "reen)trncnetconr# June ,>>G) 3IS IN ACION !isit the *e% site at $$$)$ipro)com and also search the Internet to ans$er the follo$in" &ues2 tions' () /o$ is I contri%utin" to increased car%on emissions+ *hat are some estimates of the e1tent of the pro%lem+ *hich I practices are some of the %i""est culprits+ ,) *hat is *ipro<s car%on accountin" tool+ /o$ can it help companies+ -) *hat are car%on credits+ /o$ can they %e used %y *ipro+ 4) *hat are the "reen initiati.es underta8en %y other maJor I .endors# specifically IB3# 3icrosoft# and /4+ H Case contri%uted %y NeerJa Sethi and !iJay Sethi# Nanyan" echnolo"ical 5ni.ersity 6ependence and !ulnera%ility oday# our %usinesses# "o.ernments# schools# and pri.ate associations# such as churches# are incredi%ly dependent on information systems and are# therefore# hi"hly .ulnera%le if these systems fail) *ith systems no$ as u%i&uitous as the telephone system# it is startlin" to remem%er that there are no re"ulatory or standard2settin" forces in place that are similar to telephone# electrical# radio# tele.ision# or other pu%lic utility technolo"ies) he a%sence of standards and the criticality of some system applications $ill pro%a%ly call forth demands for national standards and perhaps re"ulatory o.ersi"ht) (K4 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise Computer Crime and A%use Ne$ technolo"ies# includin" computers# create ne$ opportunities for commit2 tin" crime %y creatin" ne$ .alua%le items to steal# ne$ $ays to steal them# and ne$ $ays to harm others) Computer crime is the commission of ille"al acts throu"h the use of a computer or a"ainst a computer system) Computers or computer systems can %e the o%Ject of the crime =destroyin" a company<s computer center or a company<s computer files@# as $ell as the instrument of a crime =stealin" computer lists %y ille"ally "ainin" access to a computer system usin" a home computer@) Simply accessin" a computer system $ithout autho2 riDation or $ith intent to do harm# e.en %y accident# is no$ a federal crime) Computer a%use is the commission of acts in.ol.in" a computer that may not %e ille"al %ut that are considered unethical) he popularity of the Internet and e2mail has turned one form of computer a%use2spammin"2into a serious pro%lem for %oth indi.iduals and %usinesses) Spam is Jun8 e2mail sent %y an or"aniDation or indi.idual to a mass audience of Internet users $ho ha.e e1pressed no interest in the product or ser.ice %ein" mar8eted) Spammers tend to mar8et porno"raphy# fraudulent deals and ser.ices# outri"ht scams# and other products not $idely appro.ed in most ci.iliDed societies) Some countries ha.e passed la$s to outla$ spammin" or to restrict its use) In the 5nited States# it is still le"al if it does not in.ol.e fraud and the sender and su%Ject of the e2mail are properly identified) Spammin" has mushroomed %ecause it only costs a fe$ cents to send thousands of messa"es ad.ertisin" $ares to Internet users) Accordin" to Sophos# a leadin" .endor of security soft$are# spam accounted for B,)- percent of all e2mail traffic durin" the first &uarter of ,>>G =Sophos# ,>>G@) Spam costs for %usinesses are .ery hi"h =an estimated MC> %illion per year@ %ecause of the computin" and net$or8 resources consumed %y %illions of un$anted e2mail messa"es and the time re&uired to deal $ith them) Internet ser.ice pro.iders and indi.iduals can com%at spam %y usin" spam filterin" soft$are to %loc8 suspicious e2mail %efore it enters a recipient<s e2mail in%o1) /o$e.er# spam filters may %loc8 le"itimate messa"es) Spammers 8no$ ho$ to s8irt around filters %y continually chan"in" their e2mail accounts# %y incorporatin" spam messa"es in ima"es# %y em%eddin" spam in e2mail attach2 ments and electronic "reetin" cards# and %y usin" other people<s computers that ha.e %een hiJac8ed %y %otnets =see Chapter G@) 3any spam messa"es are sent from one country $hile another country hosts the spam *e% site) Spammin" is more ti"htly re"ulated in Europe than in the 5nited States) On 3ay -># ,>>,# the European 4arliament passed a %an on unsolicited commercial messa"in") Electronic mar8etin" can %e tar"eted only to people $ho ha.e "i.en prior consent) he 5)S) CAN2S4A3 Act of ,>>-# $hich $ent into effect on January (# ,>>4# does not outla$ spannin" %ut does %an decepti.e e2mail practices %y re&uirin" commercial e2mail messa"es to display accurate su%Ject lines# identify the true senders# and offer recipients an easy $ay to remo.e their names from e2mail lists) It also prohi%its the use of fa8e return addresses) A fe$ people ha.e %een prosecuted under the la$# %ut it has had a ne"li"i%le impact on spammin") Employment' ric8le26o$n echnolo"y and Reen"ineerin" Jo% Loss Reen"ineerin" $or8 is typically hailed in the information systems community as a maJor %enefit of ne$ information technolo"y) It is much less fre&uently noted that redesi"nin" %usiness processes could potentially cause millions of middle2le.el mana"ers and clerical $or8ers to lose their Jo%s) One economist Chapter 4 Ethical and Social Issues in Information Systems (KC has raised the possi%ility that *e $ill create a society run %y a small Ahi"h tech elite of corporate professionals ))) in a nation of the permanently unemployedA =Rif8in# (BB-@) Other economists are much more san"uine a%out the potential Jo% losses) hey %elie.e relie.in" %ri"ht# educated $or8ers from reen"ineered Jo%s *ill result in these $or8ers mo.in" to %etter Jo%s in fast2"ro$th industries) 3issin" from this e&uation are uns8illed# %lue2collar *or8ers and older# less $ell2educated middle mana"ers) It is not clear that these "roups can %e retrained easily for hi"h2&uality =hi"h2payin"@ Jo%s) Careful plannin" and sensiti.ity to employee needs can help companies redesi"n *or8 to minimiDe Jo% losses) he Interacti.e Session on 3ana"ement e1plores another conse&uence of reen"ineered Jo%s) In this case# *al23art<s chan"es in Jo% schedulin" for more efficient use of its employees did not cause employees to lose their Jo%s directly) But it did impact their personal li.es and forced them to accept more irre"ular part2time $or8) As you read this case# try to identify the pro%lem this company is facin"# $hat alternati.e solutions are a.aila%le to mana"ement# and $hether the chosen solution *as the %est $ay to address this pro%lem) E&uity and Access' Increasin" Racial and Social Class Clea.a"es 6oes e.eryone ha.e an e&ual opportunity to participate in the di"ital a"e+ *ill the social# economic# and cultural "aps that e1ist in the 5nited States and other societies %e reduced %y information systems technolo"y+ Or *ill the clea.a"es %e increased# permittin" the %etter off to %ecome e.en more %etter off relati.e to others+ hese &uestions ha.e not yet %een fully ans$ered %ecause the impact of systems technolo"y on .arious "roups in society has not %een thorou"hly studied) *hat is 8no$n is that information# 8no$led"e# computers# and access to these resources throu"h educational institutions and pu%lic li%raries are ine&uita%ly distri%uted alon" ethnic and social class lines# as are many other information resources) Se.eral studies ha.e found that certain ethnic and income "roups in the 5nited States are less li8ely to ha.e com2 puters or online Internet access e.en thou"h computer o$nership and Internet access ha.e soared in the past fi.e years) Althou"h the "ap is nar2 ro$in"# hi"her2income families in each ethnic "roup are still more li8ely to ha.e home computers and Internet access than lo$er2income families in the same "roup) A similar di"ital di.ide e1ists in 5)S) schools# *ith schools in hi"h2po.erty areas less li8ely to ha.e computers# hi"h2&uality educational technolo"y pro"rams# or Internet access a.aila%ility for their students) Left uncorrected# the di"ital di.ide could lead to a society of information ha.es# computer literate and s8illed# .ersus a lar"e "roup of information ha.e2nots# computer illiterate and uns8illed) 4u%lic interest "roups $ant to narro$ this di"ital di.ide %y ma8in" di"ital information ser.ices2includin" the Internet2 a.aila%le to .irtually e.eryone# Just as %asic telephone ser.ice is no$) /ealth Ris8s' RSI# C!S# and echnostress he most common occupational disease today is repetiti.e stress inJury =RSI@) RSI occurs *hen muscle "roups are forced throu"h repetiti.e actions often $ith hi"h2impact loads =such as tennis@ or tens of thousands of repetitions under lo$2impact loads =such as *or8in" at a computer 8ey%oard@) (K? 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise INERACI!E SESSION' 3ANAGE3EN 0LELIBLE SC/E65LING A *AL23AR' GOO6 OR BA6 0OR E34LO7EES+ *ith nearly ()4 million $or8ers domestically# *al23art is the lar"est pri.ate employer in the 5nited States) *al23art is also the nation<s num%er one retailer in terms of sales# re"isterin" nearly M-KB %illion in sales re.enue for the fiscal year endin" January -(# ,>>G) *al23art achie.ed its lofty status throu"h a com%ination of lo$2$O prices and lo$ operational costs# ena%led %y a super% continuous in.entory replenishment system) No$ *al23art is tryin" to lo$er costs further %y chan"in" its methods for schedulin" the $or8 shifts of its employees) In early ,>>K# *al23art re.ealed that it $as adoptin" a computeriDed schedulin" system# a mo.e that has %een roundly criticiDed %y $or8ers< ri"hts ad.ocates for the impact it may ha.e on employees< li.es) raditionally# schedulin" employee shifts at %i" %o1 stores such as *al23art $as the domain of store mana"ers $ho arran"ed schedules manually) hey %ased their decisions in part on current store promotions as $ell as on $ee8ly sales data from the pre.ious year) ypically# the process re&uired a full day of effort for a store mana"er) 3ultiply that la%or intensity %y the num%er of stores in a chain and you ha.e an e1pensi.e tas8 $ith results that are mar"inally %eneficial to the company) By usin" a computeriDed schedulin" system# such as the system from 9ronos that *al23art adopted# a retail enterprise can produce $or8 schedules for e.ery store in its chain in a matter of hours) 3ean$hile# store mana"ers can de.ote their time to runnin" their indi.idual stores more effecti.ely) he 9ronos schedulin" systenK trac8s indi.idual store sales# transactions# units sold# and customer traffic) he system lo"s these metrics o.er (C2minute increments for se.en $ee8s at a time# and then measures them a"ainst the same data from the pre.ious year) It can also inte"rate data such as the num%er of in2store customers at certain hours or the a.era"e time re&uired to sell a tele.ision set or unload a truc8 and predict the num%er of $or8ers needed at any "i.en hour) A typical result of this type of schedulin" mi"ht call for a sparse staff early in the day# a si"nificant increase for the midday rush# scalin" %ac8 to$ard the end of the afternoon# and then fortifyin" the staff once a"ain for an e.enin" cro$d) /o$e.er# for a chain li8e *al23art# $hich operates thousands of ,42 hour stores and has also run into trou%le pre.iously for its la%or practices# the transition to a computer2 iDed schedulin" system has resulted in contro.ersy) 0or *al23art# usin" I ronos translates to impro.ed producti.ity and customer satisfaction) 3ana"ement reported a (,2percent "ain in la%or producti.ity in the &uarter endin" January -(# ,>>G) 0or *al23art employees# 8no$n to the company as associates# the chan"e may decrease the sta%ility of their Jo%s and# possi%ly# create financial hardship) he schedulin" "enerated %y 9ronos can %e unpre2 dicta%le# re&uirin" associates to %e more fle1i%le $ith their $or8 hours) Stores may as8 them to %e on call in case of a rush# or to "o home durin" a sloeO spell) Irre"ular hours# and inconsistent paychec8s# ma8e it more difficult for employees to or"aniDe their li.es# from schedulin" %a%ysitters to payin" %ills) Alerts from the system may also ena%le store mana"ers to a.oid payin" o.ertime or full2time $a"es %y cuttin" %ac8 the hours of associates $ho are approachin" the thresholds that cause e1tra %enefits to 8ic8 in) Associates are almost al$ays people $ho need all the $or8 they can "et) Accordin" to 4aul Blan8 of the *e% site *a8e5p*al3art)com# $hich is supported %y the 5nited 0ood and Commercial *or8ers union# A*hat the computer is tryin" to optimiDe is the most num%er of part2time and least num%er of full2time $or8ers at lo$er la%or costs# $ith no re"ard for the effect that it has on $or8ers< li.es)A Sarah Clar8# spea8in" on %ehalf of Aral23art# insists the system<s "oal is simply to impro.e customer ser.ice %y shortenin" chec8out lines and %etter meetin" the needs of shoppers) o assist in the deployment of its computeriDed schedulin" system in all of its stores# *al23art re&uests that its associates su%mit Apersonal a.aila%il2 ityA forms) Lan"ua"e on the form instructs associates that ALimitin" your personal a.aila%ility may restrict the num%er of hours you are scheduled)A Anecdotal e.idence su""ests that some $or8ers ha.e indeed seen their hours cut and their shifts %ounced around) E1perienced associates $ith hi"h pay rates ha.e e1pressed concern that the system ena%les mana"ers to pressure them into &uittin") If they are un$illin" to $or8 ni"hts and $ee8ends# mana"ers ha.e a Justification for replacin" them $ith ne$ $or8ers $ho $ill ma8e much less per hour) Sarah Clar8 denies that the system is used in this manner) Critics of the system can cite the Clayton Antitrust Act of (B(4# $hich states# he la%or of a human %ein" is not a commodity or article of commerce)A No le"al %attles o.er computeriDed schedulin" appear imminent# so interpretin" $hether <Aral23art<s strate"y e&uals treatin" its la%or force as a commod2 ity $ill ha.e to $ait) CASE S567 :5ESIONS () *hat is the ethical dilemma facin" *al23art in this case+ 6o *al23art<s associates also face an ethical dilemma+ If so# $hat is it+ ,) *hat ethical principles apply to this case+ /o$ do they apply+ -) *hat are the potential effects of computeriDed schedulin" on employee morale+ *hat are the conse&uences of these effects for *al23art+ Chapter 4 Ethical and Social Issues in Information Systems (KK In the meantime# *al23art is once a"ain at the forefront of technolo"y trends in its industry) Ann aylor Stores# Limited Brands# Gap# *illiams2 Sonoma# and GameStop ha.e all installed similar $or8force schedulin" systems) Sources' !anessa O<Connell# ARetailers Repro"ram *or8ers in Efficiency 4ush#A he *all Street Journal# Septem%er (># ,>>G; *as 3aher# A*al23art See8s Ne$ 0le1i%ility in *or8er Shifts#A he *all Sheet Journal# January -# ,>>K; $ $$)8ronos)corn# accessed July (C# ,>>G; Bo% E.ans# A*al23art<s Latest <Or$ellian< echnolo"y 3o.e' Get O.er It#A Infonnation*ee8# April ?# ,>>K and A3ore opinions on *al23art<s 0le1i%le Schedulin"#A Infonnntion*ee8# April (K# ,>>K) 3IS IN ACION !isit the *e% site at $nI .$$$)*a8e5p*al3art)com and then ans$er the follo$in" &uestions' () *hat are this "roup<s maJor points of contention $ith *al23art+ ,) /o$ $ell does the *e% site ser.e their cause+ 6oes the site help their cause or hurt it+ -) *hat other approach could the or"aniDation ta8e to %rin" a%out chan"e+ 5sin" *al23art<s *e% site and Goo"le for research# ans$er the follo$Oin" &uestions' 4) /o$ does *al23art address the issues raised %y or"aniDations such as *a8e5p*al3art)com+ C) Are the company<s methods effecti.e+ ?) If you $ere a pu%lic relations e1pert ad.isin" *al23art# $hat su""estions $ould you ma8e for handlin" criticism+ Repetiti.e stress inJury =RSI@ is the leadin" occupa2 tional disease today) he sin"le lar"est cause of RSI is computer 8ey%oard $or8) ( (KG 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise he sin"le lar"est source of RSI is computer 8ey%oards) he most common 8ind of computer2related RSI is carpal tunnel syndrome =CS@# in $hich pressure on the median ner.e throu"h the $rist<s %ony structure# called a carpal tunnel# produces pain) he pressure is caused %y constant repetition of 8eystro8es' In a sin"le shift# a $ord processor may perform ,-#>>> 8eystro8es) Symptoms of carpal tunnel syndrome include num%ness# shootin" pain# ina%il2 ity to "rasp o%Jects# and tin"lin") 3illions of $or8ers ha.e %een dia"nosed $ith carpal tunnel syndrome) RSI is a.oida%le) 6esi"nin" $or8stations for a neutral $rist position =usin" a $rist rest to support the $rist@# proper monitor stands# and footrests all contri%ute to proper posture and reduced RSI) Ne$# er"onomically correct 8ey%oards are also an option) hese measures should %e supported %y fre&uent rest %rea8s and rotation of employees to different Jo%s) RSI is not the only occupational illness computers cause) Bac8 and nec8 pain# le" stress# and foot pain also result from poor er"onomic desi"ns of $or8stations) Computer .ision syndrome =C!S@ refers to any eyestrain condition related to computer display screen use) Its symptoms# $hich are usually temporary# include headaches# %lurred .ision# and dry and irritated eyes) he ne$est computer2related malady is technostress# $hich is stress induced %y computer use) Its symptoms include a""ra.ation# hostility to$ard humans# impatience# and fati"ue) Accordin" to e1perts# humans $or8in" continuously $ith computers come to e1pect other humans and human institu2 tions to %eha.e li8e computers# pro.idin" instant responses# attenti.eness# and an a%sence of emotion) echnostress is thou"ht to %e related to hi"h le.els of Jo% turno.er in the computer industry# hi"h le.els of early retirement from computer2intense occupations# and ele.ated le.els of dru" and alcohol a%use) he incidence of technostress is not 8no$n %ut is thou"ht to %e in the millions and "ro$in" rapidly in the 5nited States) Computer2related Jo%s no$ top the list of stressful occupations %ased on health statistics in se.eral industri2 aliDed countries) o date# the role of radiation from computer display screens in occupational disease has not %een pro.ed) !ideo display terminals =!6s@ emit nonioniDin" electric and ma"netic fields at lo$ fre&uencies) hese rays enter the %ody and ha.e un8no$n effects on enDymes# molecules# chromosomes# and cell mem%ranes) Lon"2term studies are in.esti"atin" lo$2le.el electroma"netic f i elds and %irth defects# stress# lo$ %irth $ei"ht# and other diseases) All manu2 facturers ha.e reduced display screen emissions since the early (BG>s# and European countries# such as S$eden# ha.e adopted stiff radiation emission standards) he computer has %ecome a part of our li.es2personally as $ell as socially# culturally# and politically) It is unli8ely that the issues and our choices $ill %ecome easier as information technolo"y continues to transform our $orld) he "ro$th of the Internet and the information economy su""ests that all the ethical and social issues $e ha.e descri%ed $ill %e hei"htened further as $e mo.e into the first di"ital century) Chapter 4 Ethical and Social Issues in Information Systems (KB /AN6S2ON 3IS 4ROJECS he proJects in this section "i.e you hands2on e1perience in analyDin" the pri.acy implications of usin" online data %ro8ers# de.elopin" a corporate policy for employee *e% usa"e# usin" %lo" creation tools to create a simple %lo"# and usin" Internet ne$s"roups for mar8et research) 3ana"ement 6ecision 4ro%lems () 5SA6ata<s *e% site is lin8ed to massi.e data%ases that consolidate personal data on millions of people) Anyone $ith a credit card can purchase mar8etin" lists of consumers %ro8en do$n %y location# a"e# income le.el# and interests) If you clic8 on Consumer Leads to order a consumer mailin" list# you can find the names# addresses# and sometimes phone num%ers of potential sales leads residin" in a specific location and purchase the list of those names) One could use this capa%ility to o%tain a list# for e1ample# of e.eryone in 4ee8s8ill# Ne$ 7or8# ma8in" M(C>#>>> or more per year) 6o data %ro8ers such as 5SA6ata raise pri.acy issues+ *hy or $hy not+ If your name and other personal information $ere in this data%ase# $hat limitations on access $ould you $ant in order to preser.e your pri.acy+ Consider the follo$in" data users' "o.ern2 ment a"encies# your employer# pri.ate %usiness firms# other indi.iduals) ,) As the head of a small insurance company $ith si1 employees# you are concerned a%out ho$ effecti.ely your company is usin" its net$or8in" and human resources) Bud"ets are ti"ht# and you are stru""lin" to meet payrolls %ecause employees are reportin" many o.ertime hours) 7ou do not %elie.e that the employees ha.e a sufficiently hea.y $or8 load to $arrant $or8in" lon"er hours and are loo8in" into the amount of time they spend on the Internet) Each employee uses a computer $ith Internet access on the Jo%) 7ou re&uested the follo$in" $ee8ly report of employee *e% usa"e from your information systems department) *EB 5SAGE RE4OR 0OR /E *EE9 EN6ING JAN5AR7 B# ,>>B' 5SER NA3E 3IN5ES ONLINE *EB SIE !ISIE6 9elleher# Claire 4C $$$)dou%leclic8)net 9elleher# Claire (>K $$$)yahoo)com 9elleher# Claire B? $$$)ins$e%)com 3c3ahon# 4atricia G- $$$)itunes)com 3c3ahon# 4atricia 44 $$$)ins$e%)com 3illi"an# Ro%ert ((, $$$)youtu%e)com 3illi"an# Ro%ert 4- $$$)tra.elocity)com Oli.era# Ernesto 4> $$$)CNN)com al%ot# /elen (,C $$$)etrade)com al%ot# /elen ,K $$$)nordstrom)com al%ot# /elen -C $$$)yahoo)com al%ot# /elen K- $$$)e%ay)com *ri"ht# Ste.en ,- $$$)face%oo8)com *ri"ht# Ste.en (C $$$)auto%ytel)com (G> 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise H Calculate the total amount of time each employee spent on the *e% for the $ee8 and the total amount of time that company computers $ere used for this purpose) Ran8 the employees in the order of the amount of time each spent on2line) H 6o your findin"s and the contents of the report indicate any ethical pro%lems employees are creatin"+ Is the company creatin" an ethical pro%lem %y monitorin" its employees< use of the Internet+ H 5se the "uidelines for ethical analysis presented in this chapter to de.elop a solution to the pro%lems you ha.e identified) Achie.in" Operational E1cellence' Creatin" a Simple Blo" Soft$are s8ills' Blo" creation Business s8ills' Blo" and *e% pa"e desi"n In this proJect# you<ll learn ho$ to %uild a simple %lo" of your o$n desi"n usin" the online %lo" creation soft$are a.aila%le at Blo""er)com) 4ic8 a sport# ho%%y# or topic of interest as the theme for your %lo") Name the %lo"# "i.e it a title# and choose a template for the %lo") 4ost at least four entries to the %lo"# addin" a la%el for each postin") Edit your posts# if necessary) 5pload an ima"e# such as a photo from your hard dri.e or the *e% to your %lo") =Goo"le recommends Open 4hoto# 0lic8r' Creati.e Commons# or Creati.e Commons Search as sources for photos) Be sure to credit the source for your ima"e)@ Add capa%ilities for other re"istered users# such as team mem%ers# to comment on your %lo") Briefly descri%e ho$ your %lo" could %e useful to a company sellin" products or ser.ices related to the theme of your %lo") List the tools a.aila%le to Blo""er =includin" Gad"ets@ that $ould ma8e your %lo" more useful for %usiness and descri%e the %usiness uses of each) Sa.e your %lo" and sho$ it to your instructor) Impro.in" 6ecision 3a8in"' 5sin" Internet Ne$s"roups for Online 3ar8et Research Soft$are S8ills' *e% %ro$ser soft$are and Internet ne$s"roups Business S8ills' 5sin" Internet ne$s"roups to identify potential customers his proJect $ill help de.elop your Internet s8ills in usin" ne$s"roups for mar8etin") It $ill also as8 you to thin8 a%out the ethical implications of usin" information in online discussion "roups for %usiness purposes) 7ou are producin" hi8in" %oots that you sell throu"h a fe$ stores at this time) 7ou thin8 your %oots are more comforta%le than those of your competition) 7ou %elie.e you can undersell many of your competitors if you can si"nificantly increase your production and sales) 7ou $ould li8e to use Internet discussion "roups interested in hi8in"# clim%in"# and campin" %oth to sell your %oots and to ma8e them $ell 8no$n) !isit "roups) "o o"le)com# $hich stores discussion postin"s from many thousands of ne$s"roups) hrou"h this site you can locate all rele.ant ne$s"roups and search them %y 8ey$ord# author<s name# forum# date# and su%Ject) Choose a messa"e and e1amine it carefully# notin" all the information you can o%tain# includin" information a%out the author) H /o$ could you use these ne$s"roups to mar8et your %oots+ H *hat ethical principles mi"ht you %e .iolatin" if you use these messa"es to sell your %oots+ 6o you thin8 there are ethical pro%lems in usin" ne$s"roups this $ay+ E1plain your ans$er) Chapter 4 Ethical and Social Issues in Information Systems (G( Ne1t use Goo"le or 7ahoo)com to search the hi8in" %oots industry and locate sites that $ill help you de.elop other ne$ ideas for contactin" potential cus2 tomers) Gi.en $hat you ha.e learned in this and pre.ious chapters# prepare a plan to use ne$s"roups and other alternati.e methods to %e"in attractin" .isitors to your site) LEARNING RAC9 3O65LES he follo$in" Learnin" rac8s pro.ide content rele.ant to the topics co.ered in this chapter' () 6e.elopin" a Corporate Code of Ethics for Information Systems ,) Creatin" a *e% 4a"e Re.ie$ Summary () *hat ethical# social# and political issues are raised %y information systems+ Information technolo"y is introducin" chan"es for $hich la$s and rules of accepta%le conduct ha.e not yet %een de.eloped) Increasin" computin" po$er# stora"e# and net$or8in" capa%ilitiesincludin" the Internet2e1pand the reach of indi.idual and or"aniDational actions and ma"nify their impacts) he ease and anonymity $ith $hich information is no$ communicated# copied# and manipulated in online en.ironments pose ne$ challen"es to the protection of pri.acy and intellectual property) he main ethical# social# and political issues raised %y information systems center around information ri"hts and o%li"ations# property ri"hts and o%li"ations# accounta%ility and control# system &uality# and &uality of life) ,) *hat specific principles for conduct can %e used to "uide ethical decisions+ Si1 ethical principles for Jud"in" conduct include the Golden Rule# Immanuel 9ant<s Cate"orical Imperati.e# 6escartes< rule of chan"e# the 5tilitarian 4rinciple# the Ris8 A.ersion 4rinciple# and the ethical Ano free lunchA rule) hese principles should %e used in conJunction $ith an ethical analysis) -) *hy do contemporary information systems technolo"y and the Internet pose challen"es to the protection of indi.idual pri.acy and intellectual property+ Contemporary data stora"e and data analysis technolo"y ena%les companies to easily "ather personal data a%out indi.iduals from many different sources and analyDe these data to create detailed electronic profiles a%out indi.iduals and their %eha.iors) 6ata flo$in" o.er the Internet can %e monitored at many points) Coo8ies and other *e% monitorin" tools closely trac8 the acti.ities of *e% site .isitors) Not all *e% sites ha.e stron" pri.acy protection policies# and they do not al$ays allo$ for informed consent re"ardin" the use of personal information) raditional copyri"ht la$s are insufficient to protect a"ainst soft$are piracy %ecause di"ital material can %e copied so easily and transmitted to many different locations simultaneously o.er the Internet) 4) /o$ ha.e information systems affected e.eryday life+ Althou"h computer systems ha.e %een sources of efficiency and $ealth# they ha.e some ne"ati.e impacts) Computer errors can cause serious harm to indi.iduals and or"aniDations) 4oor data &uality is also responsi%le for disruptions and losses for %usinesses) Jo%s can %e lost $hen computers replace $or8ers or tas8s %ecome unnecessary in reen"ineered %usiness processes) he a%ility to o$n and use a computer may %e e1acer%atin" socioeconomic disparities amon" different racial "roups and social classes) *idespread use of computers increases opportunities for computer crime and computer a%use) Computers can also create health pro%lems# such as RSI# computer .ision syndrome# and technostress) (G, 4art One Or"aniDations# 3ana"ement# and the Net$or8ed I=ey erms AccoDnDta%ility# (CK Carpal tunnel syndrome =CS@# (KG Computer a%use# (K4 Computer crime# (K4 Computer .ision syndrome =C!S@# (KG Coo8ies# (?, Copyri"ht# (?? 6escartes< rule of chan"e# (CG 6i"ital di.ide# (KC 6i"ital 3illennium Copyri"ht Act =663CA@# (?G 6ue process# (CK Ethical Ano free lunchA rule# (CG Ethics# (C( 0air Information 4ractices =0I4@# (?> Golden Rule# (CG Immanuel 9ant<s Cate"orical Imperati.e# (CG Information ri"hts# (C, Informed consent# (?( Intellectual property# (?? Re.ie$ :uestions () *hat ethical# social# and political issues are raised %y information systems+ H E1plain ho$ ethical# social# and political issues are connected and "i.e some e1am2 ples) H List and descri%e the 8ey technolo"ical trends that hei"hten ethical concerns) H 6ifferentiate %et$een responsi%ility# accounta%ility# and lia%ility+ ,) *hat specific principles for conduct can %e used to "uide ethical decisions+ H List and descri%e the fi.e steps in an ethical analysis) H Identify and descri%e si1 ethical principles) -) *hy do contemporary information systems technolo"y and the Internet pose challen"es to the protection of indi.idual pri.acy and intellec2 tual property+ H 6efine pri.acy and fair information practices) Enterprise Lia%ility# (CK Norto%.ious relationship a$areness =NORA@# (CC Opt2in# (?4 Opt2out# (?4 4-4# (?C 4atent# (?K 4ri.acy# (CB 4rofilin"# (C4 Repetiti.e stress inJury =RSI@# (KC Responsi%ility# (CK Ris8 A.ersion 4rinciple# (CG Safe har%or# (?, Spain# (K4 Spyi.are# (?- echnostress# (KG rade secret# (?? 5tilitarian 4rinciple# (CG *e% %u"s# (?- H E1plain ho$ the Internet challen"es the protection of indi.idual pri.acy and intellec2 tual property) H E1plain ho$ informed consent# le"islation# industry self2re"ulation# and technolo"y tools help protect the indi.idual pri.acy of Internet users) H List and define are the three different re"imes that protect intellectual property ri"hts) 4) /o$ ha.e information systems ha.e affected e.eryday life+ H E1plain $hy it is so difficult to hold soft$are ser.ices lia%le for failure or inJury) H List and descri%e the principal causes of system &uality pro%lems) H Name and descri%e four &uality of life impacts of computers and information systems) H 6efine and descri%e technostress and RSI and e1plain their relationship to information technolo"y) 6iscussion :uestions () Should producers of soft$are2%ased ser.ices# such as A3s# %e held lia%le for economic inJuries suffered $hen their systems fail+ ,) Should companies %e responsi%le for unemploy2 ment caused %y their information systems+ *hy or $hy not+ Chapter 4 Ethical and Social Issues in Information Systems (G- !ideo Cases 7ou $ill find .ideo cases illustratin" some of the concepts in this chapter on the Laudon *e% site alon" $ith &uestions to help you analyDe the cases) Colla%oration and eam$or8' 6e.elopin" a Corporate Ethics Code *ith three or four of your classmates# de.elop a cor2 porate ethics code on pri.acy that addresses %oth employee pri.acy and the pri.acy of customers and users of the corporate *e% site) Be sure to consider e2mail pri.acy and employer monitorin" of $or82 sites# as $ell as corporate use of information a%out employees concernin" their off2the2Jo% %eha.ior =e)")# lifestyle# marital arran"ements# and so forth@) If possi%le# use Goo"le Sites to post lin8s to *e% pa"es# team communication announcements# and $or8 assi"nments; to %rainstorm; and to $or8 colla%orati.ely on proJect documents) ry to use Goo"le 6oes to de.elop your solution and presenta2 tion for the class) A (G4 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise Should Goo"le Or"aniDe 7our 3edical Records+ CASE S567 $rin" a typical trip to the doctor# you $ill self2a.o$ed mission and the indi.idual<s ri"ht to see shel.es full of folders and papers pri.acy) As $ith similar cases such as "o.ernment 6 de.oted to the stora"e of medical records) E.ery time you .isit# your records are created or modified# and often duplicate copies are "enerated throu"hout the course of a .isit to the doctor or a hospital) he maJority of medical records are currently paper2%ased# ma8in" effecti.e communica2 tion and access to the records difficult) Americans made $ell o.er a %illion .isits to doctors and hospitals o.er the past year# $ith each American ma8in" appro1imately four .isits on a.era"e) As a result# there are millions of paper medical records linin" the corri2 dors of thousands of local medical practices# and for the most part# they cannot %e systematically e1am2 ined# and they are difficult to share) hou"h the chal2 len"e of updatin" this anti&uated system is enormous# companies such as Goo"le appear to %e ta8in" up the tas8) In 3arch ,>>G# Goo"le announced an application that it hopes $ill alle.iate the inefficiency of the current medical record stora"e system' Goo"le /ealth) Goo"le /ealth $ill allo$ consumers to enter their %asic medical data into an online respository and in.ite doctors to send rele.ant information to Goo"le electronically) he ser.ice is free to users) 0eatures $ill include a <health profile< for medica2 tions# conditions# and aller"ies# reminder messa"es for prescription refills or doctor .isits# directories for near%y doctors# and personaliDed health ad.ice) he application $ill also %e a%le to accept informa2 tion from many different record8eepin" technolo"ies currently in use %y hospitals and other institutions) he intent of the system is to ma8e patients< records easily accessi%le and more complete and to stream2 line record8eepin") Goo"le<s mission is Ato or"aniDe the $orld<s information and ma8e it uni.ersally accessi%le and useful)A It<s hard to disa"ree $ith the $orthiness of this "oal# and as the undisputed leader in *e% search# Goo"le has pro.en that it is .ery "ood at $hat it does) But $hat if Goo"le $ere see8in" personal information a%out you+ 7ou mi"ht not feel as "ood a%out Goo"le<s &uest to or"aniDe the $orld<s information $hen you consider that some of that information is information that you<d prefer remain pri.ate) Goo"le<s de.elopment of its Goo"le /ealth application illustrates the conflict %et$een its sur.eillance and data a""re"ation# the &uestion is $hether or not the pri.acy ris8s posed %y informa2 tion systems are si"nificant enou"h to a%andon or curtail the collection of useful information) If infor2 mation "atherin" should %e curtailed2%ut not eliminated2ho$ $ill this %e decided and $ho should decide+ Goo"le is no stran"er to this conflict of .alues; this is merely one e1ample of many $here Goo"le has clashed $ith pri.acy ad.ocates re"ardin" its information collection practices and handlin" of that information) *ith the launch of Goo"le /ealth# Goo"le aims to %e the catalyst for the process of di"itiDin" and standardiDin" the nation<s medical records in an easy2to2use format) Currently only a small fraction# under (CX# of American medical practices 8eep their medical records online# ma8in" it difficult for patients and other doctors to &uic8ly and easily access them) *hen a patient chan"es doctors# %e"ins seein" a ne$ doctor# or mo.es# the a%sence of online medical records can %e a source of needless hassle and effort on the part of %oth patient and practice) Sometimes# access to medical records can e.en %e a life or death matter in the rare cases $hen po$er failure pre.ents access to local data stora"e systems) But the added con.enience of easily accessi%le medical records is Just one potential %enefit of "oin" electronic) As the healthcare industry continues to face %ud"et pressures from 3edicare cut%ac8s and reductions in mana"ed2care fees# di"itiDin" patient records has %ecome increasin"ly attracti.e as a cost2cuttin" measure) Althou"h many practices consider the costs of implementin" ne$ soft$are to %e prohi%iti.e# the potential %enefits for the industry as a $hole are si"nificant) One sur.ey found that ,? percent of healthcare technolo"y professionals cited lac8 of financial support as the most important factor pre.entin" them from di"itiDin" their record8eepin") But once practices ma8e the initial in.estment in ne$ technolo"y# the increase in efficiency is li8ely to reduce future costs %y an estimated MG> to M,4> %illion dollars# more than enou"h to ma8e the s$itch $orth$hile) Goo"le /ealth and other efforts to con.ert to electronic health records stand to pro.ide much2 needed or"aniDation and efficiency to the healthcare industry# the sin"le lar"est se"ment of America<s "ross domestic product =G64@) But concerned indi.iduals and pri.acy ad.ocates ar"ue that electronic health records $ill %e stored in such a $ay that increases the li8elihood of pri.acy in.asions) Some potential users of the system are concerned that Goo"le $ill ma8e their medical information accessi%le to ad.ertisers in a manner similar to the tar"eted ad.ertisements Gmail users currently see %ased on the content of their e2mail) hese pri.acy concerns are far from unfounded) /I4AA2the /ealth insurance 4orta%ility and Accounta%ility Act of (BB?2pro.ides .ery limited protections for personal medical records) =It primarily co.ers information flo$in" %et$een healthcare pro.iders# health insurers# and clearin"2 houses for payment processin")@ here are currently no federal pri.acy protections for patients $ho set up personal health records online) E.en hospitals and practices that currently use electronic stora"e formats report a hi"h incidence of security %reaches# $ith a &uarter of healthcare technolo"y professionals reportin" at least one security %reach in the past year) Accordin" to a ,>>? 0ederal rade Commission study# a%out ,4B#>>> Americans had their personal information misused for the purpose of o%tainin" medical treatment# supplies# or ser.ices) But %reaches and other forms of medical identity theft are not the %i""est concern surroundin" electronic health records) 3ost people are more $orried that sensiti.e infor2 mation le"itimately accessi%le .ia electronic health records mi"ht lead to their losin" health insurance or Jo% opportunities) 0or instance# if employers 8ne$ that you had a chronic heart condition# $ould they $ant to hire you+ hou"h the healthcare industry ar"ues that these pri.acy concerns are for the most part misplaced# there is e.idence that these fears are Justified) /orror stories li8e those of 4atricia Gal.in reinforce the $orries many people ha.e a%out the pri.acy of their medical records) Gal.in<s attempts to ac&uire disa%ility %enefits for her chronic %ac8 pain $ere turned do$n on the %asis of her psycholo"ist<s notes# $hich $ere supposed to %e confidential) he num%er of monthly medical2 pri.acy complaints recei.ed %y the 6epartment of /ealth and /uman Ser.ices has %een steadily approachin" KC> per month o.er the past se.eral years# up from (C> in ,>>-) 4eople fear that a s$itch to electronic medical records could %e e.en more .ulnera%le to security %reaches and pri.acy .iolations) Chapter 4 Ethical and Social Issues in Information Systems (GC 4roponents of electronic health records ar"ue that computer technolo"y# once fully implemented# $ould enhance security rather than threaten it) hey also %elie.e that it is more important to first "et the system up and runnin" than to $orry a%out pri.acy matters) Con"ressional Representati.e Joe Barton of e1as# an ad.ocate of le"islation that $ould speed the de.elopment of such records# said that A=p@ri.acy is an important issue# %ut more important is that $e "et a health information system in place)A La$ma8ers li8e Barton feel that the %enefits of systems li8e Goo"le /ealth out$ei"h the pri.acy ris8s# and that further le"islation to impose pri.acy controls can %e added after the fact) Some e1perts disa"ree $ith that stance# sayin" that unless an electronic system has sufficient pri.acy controls from the outset# it is less li8ely to %ecome uni.ersally used) E.en if the system<s security controls are sufficient# it is important that consumers are a$are of those controls and confident that they can use the system $ithout fear of their records %ein" accessed %y unauthoriDed parties) Creatin" an electronic health system $ithout the proper security controls $ould not only %e an unaccepta%le pri.acy ris8# %ut $ould %e doomed to failure %ecause potential users $ould %e un$illin" to cooperate $ith the information re&uirements of the system) Goo"le has tried to reassure the pu%lic that its security is iron2ti"ht and that %usinesses and indi.id2 uals should ha.e confidence in its a%ility to store and protect their data) Accordin" to Goo"le senior security mana"er Eran 0ei"en%aum# A*e<.e ta8en an in2depth approach to security# $ith lots of different layers that %uild on each other)A /o$e.er# Goo"le has not pro.ided much detail a%out its security practices2$here its computer centers are located# ho$ many people it employs in its security depart2 ment# and ho$ it protects its army of ser.ers a"ainst attac82for fear of openin" itself up to attac8s) ABusinesses are hopin" Goo"le $ill pic8 the ri"ht tools to secure the infrastructure# %ut they ha.e no assurances and no say in $hat it $ill pic8#A notes Randall Gam%y# security analyst for Burton Group# a 3id.ale# 5tah# research and ad.isory firm) 0ei"en%aum adds that Goo"le relies on its o$n security system and applications for its day2to2day %usiness operations# and that should %e proof that its security $or8s) Goo"le is not the only company to set its si"hts on online medical records) 3icrosoft and Re.olution /ealth Group LLC# founded %y AOL co2founder Ste.e Case# amon" others# are also launchin" similar sites (G? 4art One Or"aniDations# 3ana"ement# and the Net$or8ed Enterprise $here users can maintain online health profiles) As of yet it is too early to tell $hether any of these .entures $ill %e successful in the lon" term# %ut Re.olution /ealth Group $as forced to fire a &uarter of its employees in the face of lo$er2than2e1pected earnin"s in ,>>K) 3icrosoft<s .enture# /ealth!ault# is still in its infancy alon" $ith Goo"le /ealth) he federal office in char"e of creatin" a national net$or8 of electronic health records# the office of the Coordinator of /ealth Information echnolo"y# announced in 3arch of ,>>G that it plans to inte"rate its system $ith %oth Goo"le and 3icrosoft<s healthcare data%ases# amon" others) he office did not pro.ide details or a timeta%le on ho$ the inte"ration $ould occur) 4ri.acy concerns are not li8ely to halt the shift to$ards di"itiDin" our records entirely# %ut $ill CASE S567 :5ESIONS () *hat concepts in the chapter are illustrated in this case+ *ho are the sta8eholders in this case+ ,) *hat are the pro%lems $ith America<s current medical record8eepin" system+ /o$ $ould electronic medical records alle.iate these pro%lems+ -) *hat mana"ement# or"aniDation# and technolo"y factors are most critical to the creation and de.elopment of electronic medical records+ continue to %e ar"ua%ly the most si"nificant o%stacle for these .entures as they $or8 to$ards creatin" a standardiDed# di"ital system for medical record8eepin") Sources' Eric8a Chic8o$as8i# Are Goo"le<s Security 4ractices 5p to Snuff+A Baselinema")com# 3ay ,-# ,>>G; Chris Gonsal.es# AGoo"le# 3icrosoft a8e /ealth Care I 4ulse#A Baselinema")com# 3arch -(# ,>>G and ASecurin"# 6i"itiDin" 3edical Records Remain 4riorities in /ealthcare I#A Baselinema")com# 0e%ruary ,?# ,>>G; Bo% Bre$in# ANational /ealth Records Net$or8 to /oo8 5p *ith Goo"le# 3icrosoft#A "o.e1ec)com# 3arch ,K# ,>>G; 9risten Gerencher# AAs 3ore of Our /ealth Records 3o.e Online# 4ri.acy Concerns Gro$#A 0o1Business)com# 3arch ,?# ,>>G; A4reyin" on 4atients#A 3ar8et *atch# June (B# ,>>G; and Ao <ust or Not to rust 4ersonal /ealth Records+A 3ar8et*atch# 3arch ,?# ,>>G; Christopher La$ton and Ben *orthen# AGoo"le to Offer /ealth Records On he *e%#A he *all Sheet Jomiial# 0e%ruary ,G# ,>>G; and Lissa /arris# AGoo"le /ealth /eads to the /ospital#A rGchnolo"y Re.ie$# 3ay ,G# ,>>G) 4) *hat are the pros and cons of electronic patient records+ 6o you thin8 the concerns o.er di"itiDin" our medical records are .alid+ *hy or $hy not+ C) Should people entrust Goo"le $ith their electronic medical records+ *hy or $hy not+ ?) If you $ere in char"e of desi"nin" an electronic medical record8eepin" system# $hat are some features you $ould include+ *hat are features you $ould a.oid+ IL