Documente Academic
Documente Profesional
Documente Cultură
Week 5
Chapter 4
ETHICAL AND SOCIAL
ISSUES IN INFORMATION
SYSTEMS
Learning Objectives
Ethics
Principles of right and wrong that
individuals, acting as free moral agents,
use to make choices to guide their
behaviors
10
FIGURE 4-1
11
5. Quality of life
What values should be preserved in an
information and knowledge-based society? Which
institutions should we protect from violation?
Which cultural values and practices are
supported by the new information technology?
13
Profiling
Combining data from multiple sources to create
dossiers of detailed information on individuals e.g.
credit card purchases, telephone calls, magazine
subscriptions, video rentals, banking records and
visits to Web sites etc.
This information could reveal not only your credit
information but also your driving habits, your tastes,
your associations, and your political interests.
16
FIGURE 4-2
18
Accountability:
Liability:
Due process:
19
4. Utilitarian Principle
Take the action that achieves the higher or greater value.
This rule assumes you can prioritize values in a rank
order and understand the consequences of various
courses of action.
5. Risk Aversion Principle
Take the action that produces the least harm or least
potential cost (e.g., building a nuclear generating facility
in an urban area have extremely high failure cost)
6. Ethical no free lunch Rule
Assume that virtually all tangible and intangible objects
are owned by someone unless there is a specific
declaration otherwise. If something someone else has
created is useful to you, it has value, and you should
assume the creator wants compensation for this work.
23
Privacy:
Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself
Web beacons/bugs
Spyware
31
Cookies are written by a Web site on a visitors hard drive. When the visitor returns to that Web site, the Web server requests the ID number from
the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized
information.
FIGURE 4-3
32
Technical solutions
The Platform for Privacy Preferences Project
(P3P)
It is a protocol that automatically allows Web sites
to communicate privacy policies to visitors Web
browser user
User specifies privacy levels desired in browser
settings
E.g. medium level accepts cookies from firstparty host sites that have opt-in or opt-out policies
but rejects third-party cookies that use personally
identifiable information without an opt-in policy
34
FIGURE 4-4
35
P3P enables Web sites to translate their privacy policies into a standard format that can be
read by the users Web browser software. The browser software evaluates the Web sites
privacy policy to determine whether it is compatible with the users privacy preferences.
Ease of replication
Ease of transmission (networks, Internet)
Difficulty in classifying software
Compactness and Difficulties in establishing uniqueness
39
40
Employment:
41
Health risks:
Repetitive stress injury (RSI)
Largest source is computer keyboards (repetitive
actions)
Carpal Tunnel Syndrome (CTS) pressure on the
median nerve through the wrists bony structure
Computer vision syndrome (CVS) eye strain
Technostress stress - Induced by computer use.
Symptoms include aggravation, hostility toward
humans, impatience, and fatigue.
Role of radiation, screen emissions, low-level
electromagnetic fields and have unknown effects
on enzymes, molecules, chromosomes, and cell
membranes.
42