Implementing and Managing IT
IT Strategy and Planning
Information Technology Economics
Acquiring IT Applications and Infrastructure
Impacts of IT on Individuals, Organizations, and Society
Impacts of IT on
17.1 Perspectives on IT Impacts
17.2 IT Is Eliminating the Barriers of Time,
After studying this chapter, you will be able to:
Space, and Distance
Understand the changes that take place in the
workplace and the lives of individuals when information
technology eliminates geographical and spatial barriers.
Describe some of the major impacts of information
technology on individuals, organizations, and society.
17.3 Information Is Changing from a Scarce
Resource to an Abundant Resource
Discuss the positive and negative effects associated
with the abundance of information made available by IT.
17.4 Machines Are Performing Functions
Identify the issues that arise due to uneven diffusion
of information technology across countries and socioeconomic classes.
Previously Performed by Humans
17.5 Information Technology Urges People to
Reexamine Their Value Systems
Understand the complexity of effects of technological
progress on labor markets and individual employees.
17.7 Managerial Issues
Discuss the impacts of information technology on the
quality of life and interpersonal relationships.
Recognize the legal, ethical, and moral issues that
become particularly critical due to proliferation of
2. RFID for Consumer Products
Generations of moviegoers went to movie theaters to
enjoy the latest films. They accepted the idea of paying
for their movies. However, movie piracy, which has been
greatly accelerated by information technology, is challenging this notion. Now, movie pirates are bringing the latest motion picture releases to an Internet-connected
computer near you.
For years, movie studios suffered minor losses due
to high-tech piracy (theft of digital content) that was carried out by people duplicating videotapes and DVDs. The need to produce and distribute physical media
presented a number of technical and logistical difficulties for movie pirates, which limited the scope of their operations. Thus, picture studios largely ignored these
activities. When Napster.com and other sites began to
use the Web and peer-to-peer technologies to share
pirated music, movie producers felt reasonably immune
to this trend. After all, it would take more than a week
to download a 5-gigabyte DVD-quality movie using a
Some individuals argue that piracy does not hurt
film studios but, rather, makes movies available to those
people who would not be able to enjoy them otherwise.
Information technology that enables movie piracy raises
a number of significant issues, such as intellectual property rights, fair use, and the role of government in regulating these issues. Furthermore, information technology makes it easier than ever to cross national borders,
adding international implications to the issue of movie
To deal with movie piracy, picture studio executives
attacked several aspects of the problem simultaneously.
First, media companies tried to shape public opinion in a
way that would discourage movie piracy. For instance, to
raise public awareness of the issue, filmmakers launched
an advertising campaign with the slogan “Movies. They’re worth it.”
Second, the movie industry performed a number of
activities that made it more difficult to copy and distribute pirated movies without being noticed. For instance,
enhanced physical security at movie theaters, which
may include the use of...
References: Australian Fishing Shop, http://ausfish.com.au (accessed July 2003 and
Balaker, T., “Riding Lap Tops to Work,” LA Daily News, March 23, 2005.
Consumerunion.org, “Consumer Reports Finds Personal Privacy Concerns in Planned Uses of Radio Frequency Identification Tags
(RFIDs),” May 4, 2006, consumersunion.org/pub/core_product_ safety/
003431.html (accessed October 2006).
Begley, S., “This Robot Can Design, Perform, and Interpret a Genetic
Experiment,” Wall Street Journal, January 16, 2004, p
Carlson, C., “Experts Fear Weak Data Theft law,” eweek, October 31,
“Corporate Data Sheet,” Trend Micro Incorporated, trendmicro.com
Defacto, “Joint Efforts to Achieve Spam-Free Internet Access,”
November 2005, defacto-cms.com/news/2005/11/joint-efforts-toachieve-span-free-internet-access.html (accessed October 2006).
xml (accessed October 2006).
Ferguson, W. M., “Now Lectures Anytime, Anywhere,” New York Times,
November 6, 2005, Section 4A, p
Fisher, D., and C. Carlson, “Data Theft Spurs Lawmakers,” eweek,
February 28, 2005.
Hinduja, S., “Trends and Patterns Among Online Software Pirates,”
Ethics and Information Technology, 5(1), 2003, p
Johnson, K., “TV Screen, Not Couch, Is Required for This Session,”
New York Times, June 8, 2006.
Kenney, B., “ALA Leaders/Staff Meet on CIPA: A Time to Regroup,”
Library Journal, 128(15), September 15, 2003, p
King, R., “Stores Stocking Up on Self-Help: Modern Checkout Means
Shorter Lines,” Times-Picayune, May 2, 2004.
Koerner, B., “Texas University Data Breach,” About.com, 2006,
idtheft.about.com/od/2006/p/Texas_U.htm (accessed October 2006).
Leblang, K. B., “Protecting Employers Against Bloggers,” February
15, 2006, forbes.com/columnists/2006/02/15/blogging-leblangemployment_cx_kl_0215leblang.html (accessed October 2006).
Leung, C., “The Film World Takes on Digital,” Canadian Business, February 26, 2006.
Logan, D., and F. Buytendijk, “The Sarbanes–Oxley Act Will Impact
Your Enterprise,” Gartner Inc., March 20, 2003.
Marriott, M., “Digital Divide Closing as Blacks Turn to Internet,” New
York Times, March 31, 2006.
McCombs School of Business, Data Theft Information Center, 2006,
mccombs.utexas.edu/datatheft (accessed October 2006).
McNichol, T., “Street Maps in Political Hues,” New York Times, May 20,
Melymuka, K., “Knowledge Management Helps Cut Errors by Half,”
Computerworld, July 8, 2002, computerworld.com/databasetopics/
data/story/0,10801,72513,00.html (accessed July 2003).
Moore, E. A., “When iPod Goes Collegiate,” Christian Science Monitor,
April 19, 2005, csmonitor.com/2005/0419/p11s01-legn.html (accessed
National Center for Educational Statistics, “Internet Access in US Public Schools and Classrooms: 1994–2003, March 24, 2005.
Privacy Rights Clearing House, “Implementing RFID Responsibly:
Calling for a Technology Assessment,” June 21, 2004, privacyrights.
org/ar/FTC-RFIDTestimony.htm (accessed October 2006).
Ripley, A., “Hollywood Robbery,” Time, 163(4), January 26, 2004, p. 56.
“Robots, Start Your Engines,” The Economist, 370(8366), March 13,
Sabre, Inc., sabre-holdings.com (accessed May 2004).
Schiesel, S., “Welcome to the New Dollhouse,” New York Times, May 7,
2006, Section 2, p
Schroeder, M., “States’ Efforts to Curb Outsourcing Stymied,” Wall
Street Journal, April 16, 2004, p
Please join StudyMode to read the full document