Preview

INFORMATION TECHNOLOGY

Powerful Essays
Open Document
Open Document
2825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
INFORMATION TECHNOLOGY
Chapter 4

Ethical and Social
Issues in Information
Systems
4.1

© 2010 by Prentice Hall

Management Information Systems
Chapter 4 Ethical and Social Issues in Information Systems

LEARNING OBJECTIVES

• Identify the ethical, social, and political issues that are raised by information systems.
• Identify the principles for conduct that can be used to guide ethical decisions.
• Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
• Assess how information systems have affected everyday life.

4.2

© 2010 by Prentice Hall

1

Management Information Systems
Chapter 4 Ethical and Social Issues in Information Systems

Is Your Student Loan Data on Loan?

• Problem: Insufficient privacy protections for sensitive data related to student loans.
• Solutions: Improve system security and protect student information to restore confidence in the system.
• Revoke over 52,000 user IDs suspected of misusing access to students’ private information.
• Demonstrates IT’s role in providing quick and convenient access to data.
• Illustrates how the very same technology has the potential to threaten privacy and cause more harm than good. 4.3

© 2010 by Prentice Hall

Management Information Systems
Chapter 4 Ethical and Social Issues in Information Systems

Understanding Ethical and Social Issues Related to Systems

• Past five years: One of the most ethically challenged periods in U.S. history
• Lapses in management ethical and business judgment in a broad spectrum of industries
• Enron, WorldCom, Parmalat, etc.
• Sub-prime loans and the failure of risk analysis:
CitiBank and Societe Generale
• Information systems instrumental in many recent frauds
• Stiffer sentencing guidelines, obstruction charges against firms, mean individual managers must take greater responsibility regarding ethical and legal conduct 4.4

© 2010 by Prentice Hall

You May Also Find These Documents Helpful

  • Good Essays

    Info Technology

    • 461 Words
    • 2 Pages

    Today’s families are living in an age where technology plays a major role. One can expect to encounter different options when it comes to choosing a cable provider. In the paragraphs to come, we will discuss the Cable Communications Act of 1984. Fair Credit Reporting Act, 1970 will also be discussed when answering the question what were the advances in information technology that resulted in new ethical issues necessitating the creation of each act.…

    • 461 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Inf 220: Is Principles.

    • 1851 Words
    • 8 Pages

    Information systems have had a great impact on today’s businesses, culture and society. They have changed how people do business, how corporations manage their resources, and among other things, how firms interact and compete with each other. This paper will address several questions concerning information systems, their origin, their future, and their present. This paper will define and describe information systems, and how they impact both employees but also different departments and functions. It will also show how problem solving is involved in developing and implementing information systems.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 4224 Words
    • 17 Pages

    6. If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?…

    • 4224 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Better Essays

    As an IT professional it is part of our job to ensure the wellbeing of others through what is created, as well as abiding by the law simultaneously. Several ideas need to be considered when acting morally and ethically, such as following a certain standard (Code of ethics), and morality, based on some sort of ideology of personal beliefs. A case study will be examined to compare what is morally and ethically correct, as opposed to what really happens in the real world because of uncontrolled variables like resources, power, and knowledge. All of which can either cause harm, or good, based on the intentions of the professional.…

    • 786 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Information Techology

    • 327 Words
    • 2 Pages

    I have chosen Business Planning and Development and Investment Strategy. Before a company can being any project they would have to create a plan and have a strong strategy before any developing a financial plan which is based on the development of a vital investment strategy. The company would have to present a strong financial plan base on the investment strategy to present to any potential investor and making sure they are comfortable with all aspects of the company’s business and financial plan. The IT strategies together or very important for the development of a new economic development plan. I was reading an new article on the federal government conducting an audit on all new IT project budgets and found all over spend their budget by 30 percent which is becoming a great financial issue for control contracted IT projects. I believe these two strategies are a must and complement each other and can not function without having each other existing.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Digital Privacy

    • 2212 Words
    • 9 Pages

    Dillon, R. (2009). Respect for persons, identity, and information technology. Ethics and Information Technology Ethics Inf Technol, 16(1), 17-28. doi:10.1007/s10676-009-9188-8…

    • 2212 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    When pertaining to ethics it is defined as the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. Prentice Hall states, “This is truer today than ever due to the challenges posed by the Internet and electronic commerce to the protection of privacy and intellectual property.” Along with this there are more ethical issues that are raised by the broad use of information systems, which include establishment of accountability pertaining to the consequences of information systems, establishing a thorough defense system which protects individuals, and securing values considered essential to the quality of life in an information society. Any business or large company, should be trained on being able to effectively deal with any issues. Firm technologies have made clear ways to assemble, integrate, and distribute information in the protection of personally identifiable information. Examples of these are; if you work in a career field such as finance or accounting, ensure that the information systems used are protected from computer fraud and abuse. In the field of human resources, developing and enforcing an ethics policy and providing special training to sensitize workers to new ethical issues that pertain to information systems. In the information systems field, the insurance of making management aware of the ethical implications of the technologies used and…

    • 1482 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Ethics, Big Data

    • 1416 Words
    • 6 Pages

    Universities are able to track students not academically, but the places they visit, the relationships they have, and other on campus behaviors. They are able to collect student’s location data from phones that are connected to the public wifi and keep trace their location from their card swipes. Companies like Google do similar things. Google maintains a record of all searches you make, all locations that you visit via your phone’s GPS, and through any services that are connected to your Google account. Google uses this information to target ads that are most appealing to you. This is why it is worrisome to many that institutions could have such data. They fear that if the institution could begin to sell the student’s information. Institutions that intend to software that have these capabilities must make it a top priority to secure this information and make the institutions intentions very clear when referring to the private data. Privacy and anonymity should be top priority for any university that intends to utilize these sort of…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Computer Technology

    • 1055 Words
    • 5 Pages

    Being a kid sitting around with your friends, there was always that one person this said, do you think this will ever happened? When I grow up all I will have to do will say door open to get in my house, everything else will be done for me. now, much to my surprise this day has now arrived. The arrival and utilization of computers in today's world is absolutely unbelievable. Things can be done with computers that could have never been done in the past. we have security systems that don't need keys, cell phones that could go on line, and receptionists are now virtually unknown due to automated voice systems. the question that everyone wants to know is, our we too dependent on computers, and what will happen when they fail us? this is an idea that nobody really likes to discuss.…

    • 1055 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Information Technology

    • 7594 Words
    • 31 Pages

    The objective of the Practical Assessment Task is to allow the teacher to directly and systematically observe and evaluate the applied competence of the learner. The PAT comprises the application of knowledge (content, concepts and skills).…

    • 7594 Words
    • 31 Pages
    Powerful Essays