Professional Documents
Culture Documents
Chapter 4:
Ethical & Social Issues in the
Information Systems
SANJAY KUMAR SHARMA
MRIDULA KHANNA
SWATI ROY
RAJ NARAYAN
NIRBHAY
ASHWANI
RAHUL DEV
SUBMITTED TO
PROF. KAMAL PARSAI
ACKNOWLEDGMENT
2
Outline
3
Key Technology Trends that Raise Ethical Issues
4
Non-obvious Relationship Awareness (NORA)
5
The Model
6
The relationship between ethical, social,
and political issues in an information society
System quality
Quality of life
8
Ethics
Principles of right and wrong
9
Candidate Ethical Principles
Golden Rule: Do unto others as you would have them do unto
you
Risk Aversion Principle: Take the action that produces the least
harm or incurs the least cost
Ethical “No Free Lunch” Rule: All tangible and intangible objects
are owned by creator who wants compensation for the work
10
Professional Codes of Conduct
Promises by professions to regulate
themselves in the general interest of society
11
Some Real-World IT Ethical Dilemmas
12
The relationship between ethical, social,
and political issues in an information society
13
Information Rights: Privacy
The right of an individual to protect or disclose any part of
his/her information.
14
Principles of Fair Information Practices
There should be no personal record systems whose existence
is secret.
15
Internet Challenges to Privacy
Cookies
• Tiny files deposited on a hard drive
• Used to identify the visitor and track visits to the Web site
• How it works?
1. User selects a web site to visit
2. User’s computer (client) sends a request to Server
3. The server sends the web page information to client along with a data file (cookie)
which contains user ID, time of visit, what user visited, etc.
4. The user’s computer (client) receives the cookie and saves it on the user’s hard drive
5. Next time, when users wants to visit the same web site, the server uses the cookie
(available on user’s computer) to identify the user.
2 Request
1
User cookie
3 Server
(Client)
4 cookie 5
16
Internet Challenges to Privacy (cont’d)
Web Bugs
• Tiny graphic files embedded in e-mail messages and
Web pages
• Designed to monitor online Internet user behavior
Spyware
• software that comes hidden in free downloadable software
and tracks your online movements, mines the information
stored on your computer, or uses your computer’s
processor and storage for some task you know nothing
about.
• Spyware is also used to call for ads from third-party
servers, or to divert customers from one site to a
preferred site.
17
The relationship between ethical, social,
and political issues in an information society
18
Intellectual Property
Intellectual Property:
• Intangible property created by individuals or corporations
• Subject to protections under trade secret, copyright, and
patent law
19
Trade Secret
Intellectual work or product belonging to
business, not in the public domain
Supreme Court test for breach of confidence:
1. information conveyed must be confidential
2. information must have been communicated in
confidence
3. information must have been misused by the party to
whom it was communicated
Trademark
• A sign that identifies certain goods & services
• Any combination of words, letters, numbers,
drawings, symbols, images, or musical sounds
• Indefinite
20
Patent
Invention
• product or a process that provides a new way of doing
something or offers a new technical solution to a
problem
Patent:
• Legal document granting the owner an exclusive
monopoly on the ideas behind an invention for 17 to 20
years.
• exclusive rights to make, distribute, and sell invention.
21
Challenges to Intellectual Property Rights
Ethical issues
• Should you copy for your own use a piece of software or
other digital content that is protected by copyright, trade
secret or patent?
Social issues
• Current intellectual property laws breaking down
Political issues
• Creation of new property protection measures
22
The relationship between ethical, social,
and political issues in an information society
23
Basic concepts: Responsibility, Accountability, and Liability
24
Who is Liable?
The producer of SW code?
The producer of the machine who should test the
code,?
The organization/facility (e.g. Hospital, Bank) where
the damage was done?
25
Computer-Related Liability
26
Yahoo Case in France
Yahoo case in France in 2000, auctioning Nazi-
related materials
• The court ruled that even the server in the US should stop
auctioning Nazi-related stuff (fine: US 10,000 per day)
• Advocate of freedom of speech, and the rule of the
Internet as an open source media.
27
The relationship between ethical, social,
and political issues in an information society
28
System Quality: Data Quality and System Errors
Three principal sources of poor system performance:
SW bugs and errors (there is no perfect SW, no industry
testing standards for producing SW of acceptable performance)
• HW or facility failures
• Poor quality of input data
Ethical Issues: At what point to release the software/services for
consumption? What are you obliged to know about the quality of
your SW?
29
The relationship between ethical, social,
and political issues in an information society
Rapidity of Change:
• Rapidity of technological change gives businesses less time to respond or adjust to
competition
31
Computer Crime and Abuse
Computer Crime:
• Commission of illegal acts through the use of a computer
or against a computer system
• Example: Hacking, Sniffing
Computer Abuse:
• Commission of acts involving a computer that may not be
illegal but are considered unethical
• Example: Spamming
• Productivity drain at work: use of computer and Internet
access for non-work related purposes
• Question: does employer have the right to monitor
employees email and internet activities?
32
IT and Quality of Life:
Re-Engineering and Job Lost
Workers lose their jobs due to automation, re-engineering
the workforce, and outsourcing
33
CONCLUSION
The presentation was really fruitful to us. After this
report we are now able to analyze the relationship
among ethical, social and political issues that are
raised by IS. During the course of writing this
report we were able to evaluate the impact of
contemporary IS and internet and protection of
individual privacy and intellectual property.
34