Selasa, 03 Juni 2014

Laudon Management Information System Chapter Review : ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

This is the result of my group review about ethical and social issues in information system, the material are taken from Laudon Management Information System book, chapter 4.
If you need a Ms.Word file you can download it from here,
Also if you need  the power point file you can download it from here.

CHAPTER 4 REVIEW
“ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS”

To fulfill Management Information System assignment
 




Compiled By :

Arina Nurjanah                    C1L012022
Fatima Zakiya Razani          C1L012045
Nur Dina Safitri                   C1L012046




FACULTY OF ECONOMIC AND BUSINESS
JENDERAL SOEDIRMAN UNIVERSITY
2014





4.1 Understanding Ethical and Social Issues Related to System
Major instances of failed ethical and legal judgment were not masterminded by information systems departments, information systems were instrumental in many of these frauds. In many cases, the perpetrators of these crimes artfully used financial reporting information systems to bury their decisions from public scrutiny in the vain hope they would never be caught.
Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. Internet and digital firm technologies make it easier than ever to assemble, integrate, and distribute information, unleashing new concerns about the appropriate use of customer information, the protection of personal privacy, and the protection of intellectual property. Other pressing ethical issues raised by information systems include establishing accountability for the consequences of information systems, setting standards to safeguard system quality that protects the safety of the individual and society, and preserving values and institutions considered essential to the quality of life in an information society. When using information systems, it is essential to ask, What the ethical and socially responsible course of action is.


A.    A Model For Thinking About Ethical, Social and Political Issues
Ethical, social, and political issues are closely linked. The ethical dilemma you may face as a manager of information systems typically is reflected in social and political debate.
Imagine instead that the disturbing force is a powerful shock of new information technology and systems hitting a society more or less at rest. Suddenly, individual actors are confronted with new situations often not covered by the old rules. Social institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, social responsibility, politically correct attitudes, or approved rules. Political institutions also require time before developing new laws and often require the demonstration of real harm before they act. In the meantime, you may have to act. You may be forced to act in a legal gray area.
Follow is model to illustrate the dynamics that connect ethical, social, and political issues. This model is also useful for identifying the main moral dimensions of the information society, which cut across various levels of action—individual, social, and political.


B.     Five Moral Dimensions Of The Information Age
The major ethical, social, and political issues raised by information systems include the following moral dimensions :
a.       Information rights and obligation
In this dimension the moral is about what information rights do individuals and organization possess with respect to themselves and what can they protect.
b.      Property rights and obligations.
In this dimension the moral is about how will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy.
c.       Accountability and control.
In this dimension the moral is about who can and will be held accountable and liable for the harm done to individual and collective information and property rights.
d.      System quality.
In this dimension the moral is about what standards of data and system quality should we demand to protect individual rights and the safety of society.
e.       Quality of life.
In this dimension the moral is about what values should be preserved in an information and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices are supported by the new information technology.
C.    Key Technology Trends That Raise Ethical Issue
Ethical issues long preceded information technology. Nevertheless, information technology has heightened ethical concerns, taxed existing social arrangements, and made some laws obsolete or severely crippled. Followed is a table of four key technological trends responsible for these ethical stresses, and the impact that raise from this trends which raising the ethical issues.

1.      Computing power doubles every 18 months.
This doubling of computing power every 18 months has made it possible for most organizations to use information systems for their core production processes. As a result, our dependence on systems and our vulnerability to system errors and poor data quality have increased. Social rules and laws have not yet adjusted to this dependence. Standards for ensuring the accuracy and reliability of information systems are not universally accepted or enforced.
2.      Data storage costs rapidly declining
Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals—employees, customers, and potential customers—maintained by private and public organizations. These advances in data storage have made the routine violation of individual privacy both cheap and effective. Massive data storage systems are inexpensive enough for regional and even local retailing firms to use in identifying customers.
3.      Data analysis advances
Advances in data analysis techniques for large pools of data are another technological trend that heightens ethical concerns because companies and government agencies are able to find out highly detailed personal information about individuals. With contemporary data management tools companies can assemble and combine the myriad pieces of information about you stored on computers much more easily than in the past.
New data analysis technology called nonobvious relationship awareness (NORA) has given both the government and the private sector even more powerful profiling capabilities. NORA can take information about people from many disparate sources, such as employment applications, telephone records, customer listings, and “wanted” lists, and correlate relationships to find obscure hidden connections that might help identify criminals or terrorists.

NORA technology scans data and extracts information as the data are being generated so that it could, for example, instantly discover a man at an airline ticket counter who shares a phone number with a known terrorist before that person boards an airplane. The technology is considered a valuable tool for homeland security but does have privacy implications because it can provide such a detailed picture of the activities and associations of a single individual.
The impact of this advance data analysis is that companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behavior.
4.      Networking advances
Advances in networking, including the Internet, promise to greatly reduce the costs of moving and accessing large quantities of data and open the possibility of mining large pools of data remotely using small desktop machines, permitting an invasion of privacy on a scale and with a precision heretofore unimaginable.

4.2    Ethics In An Information Society

A.    Basic Concepts: Responsibility, Accountability, And Liability
Responsibility is a key element of ethical action. Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. Accountability is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, and who is responsible. Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. Due process is a related feature of law-governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.

These basic concepts form the underpinning of an ethical analysis of information systems :
1.      Information technologies are filtered through social institutions, organizations, and individuals.
2.      Responsibility for the consequences of technology falls clearly on the institutions, organizations, and individual managers who choose to use the technology.
3.      An ethical, political society, individuals and others can recover damages done to them through a set of laws characterized by due process.

B.     Ethical Analysis

The following five-step process should help:

1.      Identify and describe clearly the facts.
Find out who did what to whom, and where, when, and how. In many instances, you will be surprised at the errors in the initially reported facts, and often you will find that simply getting the facts straight helps define the solution. It also helps to get the opposing parties involved in an ethical dilemma to agree on the facts.

2.      Define the conflict or dilemma and identify the higher-order values involved.
Ethical, social, and political issues always reference higher values. The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, and the free enterprise system). Typically, an ethical issue involves a dilemma: two diametrically opposed courses of action that support worthwhile values.

3.      Identify the stakeholders
Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution

4.      Identify the options that you can reasonably take.
You may find that none of the options satisfy all the interests involved, but that some options do a better job than others. Sometimes arriving at a good or ethical solution may not always be a balancing of consequences to stakeholders.

5.      Identify the potential consequences of your options.
Some options may be ethically correct but disastrous from other points of view. Other options may work in one instance but not in other similar instances.


C.    Candidate Ethical Principles

Although you are the only one who can decide which among many ethical principles you will follow, and how you will prioritize them, it is helpful to consider some ethical principles with deep roots in many cultures that have survived throughout recorded history:

1.      Do unto others as you would have them do unto you (the Golden Rule).Putting yourself into the place of others, and thinking of yourself as the object of the decision, can help you think about fairness in decision making.

2.       If an action is not right for everyone to take, it is not right for anyone (Immanuel Kant’s Categorical Imperative). Ask yourself, “If everyone did this, could the organization, or society, survive?”

3.      If an action cannot be taken repeatedly, it is not right to take at all (Descartes’ rule of change). This is the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.”

4.      Take the action that achieves the higher or greater value (Utilitarian Principle). This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action.

5.       Take the action that produces the least harm or the least potential cost (Risk Aversion Principle). Some actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area) or extremely high failure costs of moderate probability (speeding and automobile accidents). Avoid these high-failure-cost actions, paying greater attention to high-failure-cost potential of moderate to high probability.

6.      Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical “no free lunch” rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

D.    Professional Codes Of Conduct

When groups of people claim to be professionals, they take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. Professional codes of conduct are promulgated by associations of professionals, such as the American Medical Association (AMA), the American Bar Association (ABA), the Association of Information Technology Professionals (AITP), and the Association for Computing Machinery (ACM).

E.     Some Real-World Ethical Dilemmas

Information systems have created new ethical dilemmas in which one set of interests is pitted against another. For example, many of the large telephone companies in the United States are using information technology to reduce the sizes of their workforces. Voice recognition software reduces the need for human operators by enabling computers to recognize a customer’s responses to a series of computerized questions. Many companies monitor what their employees are doing on the Internet to prevent them from wasting company resources on non-business activities.

4.3  The Moral Dimensions Of Information Systems

A.    Information Rights : Privacy And Freedom In The Internet Age

Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. The claim to privacy is protected in the U.S., Canadian, and German constitutions in a variety of different ways and in other countries through various statutes.

The European Directive on Data Protection
In Europe, privacy protection is much more stringent than in the United States. Unlike the United States, European countries do not allow businesses to use personally identifiable information without consumers’ prior consent. The directive requires companies to inform people when they collect information about them and disclose how it will be stored and used. Customers must provide their informed consent before any company can legally use data about them, and they have the right to access that information, correct it, and request that no further data be collected.
Informed consent can be defined as consent given with knowledge of all the facts needed to make a rational decision. EU member nations must translate these principles into their own laws and cannot transfer personal data to countries, such as the United States, that do not have similar privacy protection regulations. Working with the European Commission, the U.S. Department of Commerce developed a safe harbor framework for U.S. firms. A safe harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.

Internet Challenges to Privacy

Internet technology has posed new challenges for the protection of individual privacy. Information sent over this vast network of networks may pass through many different computer systems before it reaches its final destination. Each of these systems is capable of monitoring, capturing, and storing communications that pass through it. It is possible to record many online activities, including what searches have been conducted, which Web sites and Web pages have been visited, the online content a person has accessed, and what items that person has inspected or purchased over the Web.

Website can tracking history through this :
a.    Cookies
Is small text files deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the Web site. When the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s computer, find the cookie, and  know what that person has done in the past.
Web sites using cookie technology cannot directly obtain visitors’ names and addresses. However, if a person has registered at a site, that information can be combined with cookie data to identify the visitor.


b.    Web beacons
Which also called Web bugs, are tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending e-mail. The Web beacon captures and transmits information such as the IP address of the user’s computer, the time a Web page was viewed and for how long, the type of Web browser that retrieved the beacon, and previously set cookie values.

c.    Spyware
Is secretly install itself on an Internet user’s computer by piggybacking on larger applications. Once installed, the spyware calls out to Web sites to send banner ads and other unsolicited material to the user, and it can also report the user’s movements on the Internet to other computers.

Techinical Solution :  The P3P Standard

There are now tools to help users determine the kind of personal data that can be extracted by Web sites. The Platform for Privacy Preferences, known as P3P, enables automatic communication of privacy policies between an e-commerce site and its visitors. P3P provides a standard for communicating a Web site’s privacy policy to Internet users and for comparing that policy to the user’s preferences or to other standards, such as the FTC’s FIP guidelines or the European Directive on Data Protection. Users can use P3P to select the level of privacy they wish to maintain when interacting with the Web site.


B.     Property Rights: Intellectual Property

Intellectual property is considered to be intangible property created by individuals or corporations. Intellectual property is subject to a variety of protections under three different legal traditions:

·         Trade Secrets
Any intellectual work product—a formula, device, pattern, or compilation of data—used for a business purpose can be classified as a trade secret, provided it is not based on information in the public domain.
·         Copyright
Copyright is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author’s death.
·         Patent Law
A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. The congressional intent behind patent law was to ensure that inventors of new machines, devices, or methods receive the full financial and other rewards of their labor and yet make widespread use of the invention possible by providing detailed diagrams for those wishing to use the idea under license from the patent’s owner.

Challenges to Intellectual Property Rights
Contemporary information technologies, especially software, pose severe challenges to existing intellectual property regimes and, therefore, create significant ethical, social, and political issues. The proliferation of electronic networks, including the Internet, has made it even more difficult to protect intellectual property. Using networks, information can be more widely reproduced and distributed. The Internet was designed to transmit information freely around the world, including copyrighted information. With the World Wide Web in particular, you can easily copy and distribute virtually anything to thousands and even millions of people around the world, even if they are using different types of computer systems.
Mechanisms are being developed to sell and distribute books, articles, and other intellectual property legally on the Internet, and the Digital Millennium Copyright Act (DMCA) of 1998 is providing some copyright protection. The DMCA implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials.

C.    Accountability, Liability, And Control

Along with privacy and property laws, new information technologies are challenging existing liability laws and social practices for holding individuals and institutions accountable.

D.    System Quality: Data Quality And System Errors

Three principal sources of poor system performance are:
1)      software bugs and errors,
2)      hardware or facility failures caused by natural or other causes, and
3)      poor input data quality.
Hence, there is a technological barrier to perfect software, and users must be aware of the potential for catastrophic failure. Although software bugs and facility catastrophes are likely to be widely reported in the press, by far the most common source of business system failure is data quality.

E.     Quality Of Life: Equity, Access, And Boundaries
Many of these negative social consequences are not violations of individual rights or property crimes. Computers and information technologies potentially can destroy valuable elements of our culture and society even while they bring us benefits. Next, we briefly examine some of the negative social consequences of systems, considering individual, social, and political responses.

·         Balancing Power: Center Versus Periphery
An early fear of the computer age was that huge, centralized mainframe computers would centralize power at corporate headquarters and in the nation’s capital.
·         Rapidity of Change: Reduced Response Time to Competition
Information systems have helped to create much more efficient national and international markets. The now-more-efficient global marketplace has reduced the normal social buffers that permitted businesses many years to adjust to competition.
·         Maintaining Boundaries: Family, Work, and Leisure
Parts of this book were produced on trains and planes, as well as on vacations and during what otherwise might have been “family” time. The traditional boundaries that separate work from family and just plain leisure have been weakened.
·         Dependence and Vulnerability
Today, our businesses, governments, schools, and private associations, such as churches, are incredibly dependent on information systems and are, therefore, highly vulnerable if these systems fail.
·         Computer Crime and Abuse
New technologies, including computers, create new opportunities for committing crime by creating new valuable items to steal, new ways to steal them, and new ways to harm others. Computer crime is the commission of illegal acts through the use of a computer or against a computer system. Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical.
·         Employment: Trickle-Down Technology and Reengineering Job Loss
Reengineering work is typically hailed in the information systems community as a major benefit of new information technology. It is much less frequently noted that redesigning business processes could potentially cause millions of mid-level managers and clerical workers to lose their jobs.
·         Equity and Access: Increasing Racial and Social Class Cleavages
The impact of systems technology on various groups in society has not been thoroughly studied. Several studies have found that certain ethnic and income groups in the United States are less likely to have computers or online Internet access even though computer ownership and Internet access have soared in the past five years. Although the gap is narrowing, higher-income families in each ethnic group are still more likely to have home computers and Internet access than lower-income families in the same group.
·         Health Risks: RSI, CVS, and Technostress
The most common occupational disease today is repetitive stress injury (RSI). RSI occurs when muscle groups are forced through repetitive actions often with high impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard).
The single largest source of RSI is computer keyboards. The most common kind of computer-related RSI is carpal tunnel syndrome (CTS), in which pressure on the median nerve through the wrist’s bony structure, called a carpal tunnel, produces pain.
Computer vision syndrome (CVS) refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smartphones, and hand-held video games. Its symptoms, which are usually temporary, include headaches, blurred vision, and dry and irritated eyes.
The newest computer-related malady is technostress, which is stress induced by computer use. Its symptoms include aggravation, hostility toward humans, impatience, and fatigue.

0 komentar:

Posting Komentar