You are on page 1of 6

duma 13-Dec-18

MS 311
Management Information
Systems (MIS)
Duma, R.
Ethical, Economic and
Email: radsiffi@yahoo.com Social Issues in
Office: CE 13 – CIVE Administration Building
The University of Dodoma
Information Systems
College of Informatics and Virtual Education
Information System Department
@2018

radsiffi 1 radsiffi 2

Open discussion 1(5 minutes)


• Ethics vs Moral? • A trade secret is a formula, practice, process, design,
• Intellectual Property? instrument, pattern, commercial method, or
compilation of information not generally known or
• Trademark? reasonably ascertainable by others by which a business
• Trade secret? can obtain an economic advantage over competitors or
customers
• Patent? • Copyright (or author's right) is a legal term used to
• Copyright? describe the rights that creators have over their literary
• Privacy? and artistic works. Works covered by copyright range
from books, music, paintings, sculpture, and films, to
• Integrity? computer programs, databases, advertisements, maps,
• Non repudiation? and technical drawings.

radsiffi 3 radsiffi 4

Open discussion 2(2 minutes) Understanding Ethical and Social


Issues Related to Systems
• How IT has challenged some area of ethics, social • Ethics
life, or legal arrangements? • Principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their
behavior
• Information systems and ethics
• Information systems raise new ethical questions
because they create opportunities for:
• Intense social change, threatening existing
distributions of power, money, rights, and obligations
• New kinds of crime

radsiffi 5 radsiffi 6

1
duma 13-Dec-18

Understanding Ethical and Social Technology trends ethical issues


Issues Related to Systems • Four key technology trends that raise ethical
issues
• A model for thinking about ethical, social, and political
• Computing power doubles every 18 months
issues
• Increased reliance on, and vulnerability to, computer systems
• Society as a calm pond
• Data storage costs rapidly declining
• IT as a rock dropped in pond, creating ripples of new
situations not covered by old rules • Multiplying databases on individuals

• Social and political institutions cannot respond • Data analysis advances


overnight to these ripples — it may take years to • Greater ability to find detailed personal information on
develop etiquette, expectations, laws individuals
• Requires understanding of ethics to make choices in • Networking advances and the Internet
legally gray areas • Enables moving and accessing large quantities of personal
data
radsiffi 7 radsiffi 8

Five Moral Dimensions of the The Relationship Between Ethical, Social, and Political
Information Systems Issues in an Information Society
• Information rights and obligations
o about ourselves, organization
• Property rights and obligations
o protection of intellectual property rights
• Accountability and control
o who will be held accountable if harm is done
• System quality
o standards of data and system quality
• Quality of life
o preservation of values, culture
radsiffi 9 radsiffi 10

Ethics and System Quality: Ethics and System Quality:


Data Quality and System Errors
Data Quality and System Errors cont’d
• No software program is perfect, errors will be • No database is without errors.
made, even if the errors have a low probability of
• According to system quality literatures “most
occurring.
consumer and government personal
• Errors in Windows operating systems were information databases have errors ranging
notorious. At what point should software “be from 10-20% of the data records being either
shipped?” What kind of disclaimer statements inaccurate, incomplete, or ambiguous”.
might be appropriate?
• How should decision makers treat this kind of
information in order to be fair to data subjects?
radsiffi 11 radsiffi 12

2
duma 13-Dec-18

IT and Quality of Life Issues: IT and Quality of Life Issues:


Equity, Access, and Boundaries Equity, Access, and Boundaries cont’d
• Balancing Power: Center Versus Periphery: • Maintaining boundaries: Family, work, and
• Is IT centralizing decision-making power in leisure:
the hands of a few, or is it allowing many • “Do anything anywhere” environment blurs the
more people to participate in decisions that boundaries between work, vacation, and
affect their lives? family time
• Rapidity of change: Reduced response time to
• Dependence and vulnerability:
competition:
• There are few regulatory standards to protect
• The business you work for may not be able to
us from the failure of complex electrical,
respond to rapidly changing IT-enabled
market places. There goes your job offshore! communications, and computer networks
radsiffi 13
upon which we all depend
radsiffi 14

IT and Quality of Life Issues: IT and Quality of Life Issues:


Equity, Access, and Boundaries cont’d Equity, Access, and Boundaries cont’d
• Computer crime: • Employment: Trickle-down technology and
• Commission of illegal acts through the use of a reengineering job loss:
computer or against a computer system is on the
increase. Spam is now illegal (a federal and state • The rapid development of the Internet has made it
felony offense), and phishing to defraud people is also possible to offshore hundreds of thousands of jobs
a felony. from high-wage countries to low- wage countries.
• Computer abuse:
• Reengineering existing jobs using IT also results in
• Unethical but not necessarily illegal acts. Adware
few jobs (generally). While this benefits low-wage
programs that alter a person’s browser are not illegal
but most of us would not want this to happen (without countries enormously, the costs are paid by high-
knowing about it) wage country workers
radsiffi 15 radsiffi 16

Property Rights Intellectual Property Basic Concepts


• Intellectual property: Is the product of mind
Responsibility, Accountability, and Liability
• Intangible property of any kind created by
individuals or corporations • Responsibility: Accepting the potential costs,
• Three ways that intellectual property is protected duties, and obligations for decisions
• Trade secret: Intellectual work or product • Accountability: Mechanisms for identifying
belonging to business, not in the public domain responsible parties
• Copyright: Statutory grant protecting • Liability: Permits individuals (and firms) to
intellectual property from being copied for the recover damages done to them
life of the author, plus 70 years • Due process: Laws are well known and
• Patents: Grants creator of invention an understood, with an ability to appeal to
exclusive monopoly on ideas behind invention higher authorities
for 20 years
radsiffi 17 radsiffi 18

3
duma 13-Dec-18

IT: Accountability, Liability, and Control Ethical analysis


A five-step process
• IT can challenge our ability to identify who
is responsible for actions involving 1. Identify and clearly describe the facts
systems that injure people. 2. Define the conflict or dilemma and identify
• IT can make it difficult to assign liability the higher-order values involved
and restore injured persons.
3. Identify the stakeholders
• IT raises issues about who should control
information systems that have the potential 4. Identify the options that you can reasonably
for injuring citizens. take
5. Identify the potential consequences of your
radsiffi 19
options radsiffi 20

Some Real-World IT Ethical Dilemmas Ethical principles used to analyze


1. Using systems to increase efficiency, and causing ethical dilemmas
layoffs and personal hardships
2. Using systems to monitor employee e-mail to 1. Golden Rule: Do unto others as you would
protect valuable assets, but decreasing employee have them do unto you
privacy 2. Immanuel Kant’s Categorical Imperative: If
3. Monitoring employee use of the Internet at work, an action is not right for everyone to take,
decreasing employee privacy then it is not right for anyone
4. Using huge databases to aggregate consumer 3. Descartes’ rule of change: If an action
information, reducing the costs of granting credit, cannot be taken repeatedly, then it is not
but increasing the chance of losing personal data to right to be taken at any time
criminals, terrorists, or others
5. Etc…
radsiffi 21 radsiffi 22

Ethical principles used to analyze ethical Professional Codes of Conduct


dilemmas
• Promises by professions to regulate
4. Utilitarian Principle: Take the action that themselves in the general interest of
achieves the greatest value for all concerned society
5. Risk Aversion Principle: Take the action that • Promulgated by associations such as
produces the least harm or incurs the least
cost to all concerned • the American Medical Association (AMA),
6. Ethical “no free lunch” rule: Assume that all • the American Bar Association (ABA) ,
tangible and intangible objects are owned • Association for Computing Machinery
by someone else, unless shown the contrary.
If someone has created something of value (ACM) etc.
to you, that person probably wants • IEEE Code of Ethics
compensation for your use
radsiffi 23 radsiffi 24

4
duma 13-Dec-18

IEEE Code of Ethics


IEEE Code of Ethics cont’d
We, the members of the IEEE, in recognition of the importance of our
technologies in affecting the quality of life throughout the world, and
6. To maintain and improve our technical competence and to
in accepting a personal obligation to our profession, its members and
the communities we serve, do hereby commit ourselves to the undertake technological tasks for others only if qualified by
highest ethical and professional conduct and agree: training or experience, or after full disclosure of pertinent
limitations;
1. To accept responsibility in making decisions consistent with the
safety, health and welfare of the public, and to disclose promptly 7. To seek, accept, and offer honest criticism of technical work, to
factors that might endanger the public or the environment; acknowledge and correct errors, and to credit properly the
2. To avoid real or perceived conflicts of interest whenever possible, contributions of others;
and to disclose them to affected parties when they do exist; 8. To treat fairly all persons regardless of such factors as race,
3. To be honest and realistic in stating claims or estimates based on religion, gender, disability, age, or national origin;
available data; 9. To avoid injuring others, their property, reputation, or
4. To reject bribery in all its forms; employment by false or malicious action;
5. To improve the understanding of technology, its appropriate 10. To assist colleagues and co-workers in their professional
application, and potential consequences; development and to support them in following this code of
radsiffi 25
ethics. radsiffi 26

Data Protection Act Principles Data Protection Act Principles


1. Personal data shall be processed fairly and lawfully cont’d
2. Personal data shall be obtained only for one or more
specified and lawful purposes, and shall not be further 7. Appropriate technical and organisational measures
processed in any manner incompatible with that shall be taken against unauthorised or unlawful
purpose or those purposes. processing of personal data and against accidental
3. Personal data shall be adequate, relevant and not loss or destruction of, or damage to, personal data.
excessive in relation to the purpose or purposes for 8. Personal data shall not be transferred to a country or
which they are processed. territory outside the European Economic Area unless
4. Personal data shall be accurate and, where necessary, that country or territory ensures an adequate level of
kept up to date. protection for the rights and freedoms of data
5. Personal data processed for any purpose or purposes subjects in relation to the processing of personal
shall not be kept for longer than is necessary for that data.
purpose or those purposes.
6. Personal data shall be processed in accordance with
the rights of data subjects under this Act.
radsiffi 27 radsiffi 28

Conditions Relevant to the 1st Exemptions from the Data


Principle Protection Principles
• The data subject (the person whose data is stored) has consented
("given their permission") to the processing; • National Security
• Processing is necessary for 'the performance of a contract (any
processing not directly required to complete a contract would not • Crime, Taxation
be "fair");
• Processing is required under a legal obligation
• Processing is necessary to protect the vital interests of the data
subject's rights;
• Processing is necessary to carry out any public functions;
• Processing is necessary in order to pursue the legitimate interests
of the "data controller" or "third parties" (unless it could
unjustifiably prejudice the interests of the data subject).

radsiffi 29 radsiffi 30

5
duma 13-Dec-18

Thank you for your


attention!

radsiffi 31

You might also like