Upload
ertugrul-bilgin
View
216
Download
0
Embed Size (px)
Citation preview
7/23/2019 Business Ethics and MIS
1/59
Can the police search your computer at work withouta warrant but have the blessing of the company?
Do companies have the right to spy on theiremployees at work?
Can companies claim copyright on the look and feelof their web sites?
Is it legal to collect and sell customer data?
Can Facebook keep your posted images/videos/textseven after you close your account?
Who has the ownership of the customer data storedby Futureshop on IBMs server?
If the data is stolen and customer suffers lost, who isresponsible?
1
7/23/2019 Business Ethics and MIS
2/59
Can the police search your private computerwithout a warrant?
How about your office computer, if they have
your companys consent? How about the companys IT technician? Do
companies have the right to search yourcomputer at work without a warrant?
Source:http://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsor=
2
http://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsor7/23/2019 Business Ethics and MIS
3/59
Michael Liu
University of Waterloo
3
7/23/2019 Business Ethics and MIS
4/59
There are two major sources for these slides:From the textbook written by Laudon, Laudon and
Brabston (2009). Management Information Systems:Managing the Digital Firm, Fourth Canadian Edition,
Toronto, Pearson Prentice Hall, 2009 PearsonEducation Canada
From the lectures developed by Dr. Anne Pidduck
4
7/23/2019 Business Ethics and MIS
5/59
Textbook Chapter 04
5
7/23/2019 Business Ethics and MIS
6/59
Responsibility Accepting the potential costs, duties, and obligations for
decisions
Accountability Mechanisms for identifying responsible parties; who is
responsible?
Liability Permits individuals to recover damages done to them
Due process
Laws are well known and understood, can appeal tohigher authority
Implications to the use of IS It is not about technology, but how it is used
6
7/23/2019 Business Ethics and MIS
7/59
Ethical: Principles of right and wrong thatindividuals use to make choices to guide theirbehaviors
Social: affecting people or communication
Legal/Political: knowing the law and workingwithin its limits
7Picture source: http://www.bunker8.pwp.blueyonder.co.uk/images/justice2.gif
7/23/2019 Business Ethics and MIS
8/59
Ethical and Social Issues
8
7/23/2019 Business Ethics and MIS
9/59
1. Personal information rights andobligations
2. Digital property rights and
obligations3. System quality4. Accountability, liability and control5. Quality of life
Examples of each?
9Picture source: http://themoderatevoice.com/wordpress-engine/files/2009-april/LeftRightWrong.jpg
7/23/2019 Business Ethics and MIS
10/59
Technology Trends
10Video source: http://www.youtube.com/privacycomm#p/u/1/X7gWEgHeXcAPicture source: http://deonbinneman.files.wordpress.com/2009/12/j0426621.jpg
What does a friend of a friend of a friend know about you?- By The Office of Privacy Commissioner of Canada
http://www.youtube.com/privacycommhttp://deonbinneman.files.wordpress.com/2009/12/j0426621.jpghttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20What%20does%20a%20friend%20of%20a%20friend%20of%20a%20friend%20know%20about%20you.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20What%20does%20a%20friend%20of%20a%20friend%20of%20a%20friend%20know%20about%20you.flvhttp://deonbinneman.files.wordpress.com/2009/12/j0426621.jpghttp://www.youtube.com/privacycomm7/23/2019 Business Ethics and MIS
11/59
Relationship Awareness
11
Google and
Privacy
OnlineSurveillance
Video source: YouTube
http://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Google%20and%20Privacy.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Google%20and%20Privacy.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Online%20surveillance%20software%20_%20data%20mining.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Online%20surveillance%20software%20_%20data%20mining.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Online%20surveillance%20software%20_%20data%20mining.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Google%20and%20Privacy.flv7/23/2019 Business Ethics and MIS
12/59
Article Title: A Cartoon Fan Won a Nobel Price
During the interview, the professor admits that
Yes, I do watch cartoons like Pocoyo I try to dothat every chance I get
Editors comments:
What would happen to this wonderful world if itsfuture is led by professors interested in childishcartoons?
12
7/23/2019 Business Ethics and MIS
13/59
Article Title: Jean Chretien Praised Steve Harper as a
Great leader
Quote from former prime minister John Chretien Yes, I think prime minister Harper is a great leader
7/23/2019 Business Ethics and MIS
14/59
Name Gender
Age
Birthplace School attended
Hobby/Interest
Photo
Image Source: http://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-a
Get away frommy daughter,your freak!
Hollywoodactress GwynethPaltrow namedher daughterApple.
Hug?
Your Name: Su Shiyou
(a famous Chinese general)
http://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.html7/23/2019 Business Ethics and MIS
15/59
How an innocent picture got out of control http://news.6park.com/newspark/index.php?app=
news&act=view&nid=124575
15
7/23/2019 Business Ethics and MIS
16/59
Source:http://www.escapistmagazine.com/forums/read/7.79407-Student-Teacher-Fired-Loses-College-Degree-for-Drunken-MySpace-Pic
16
7/23/2019 Business Ethics and MIS
17/59
For information posted on the net, you haveno control of How it is used
In part or in whole
Prank, ridicule, spam, identify theft How it is interpreted
Misunderstood, embarrassed, intentional or accidental
17
7/23/2019 Business Ethics and MIS
18/59
What is personal information(PI)? Personally identifiable
Rights about PI?
Obligations about PI?
18Image Source: http://www.abine.com/blog/2012/when-delete-means-delete-the-inside-story-of-our-ftc-complaint-against-beenverified-com/personal-information-collection/
http://www.priv.gc.ca/leg_c/interpretations_02_e.asphttp://www.priv.gc.ca/leg_c/interpretations_02_e.asp7/23/2019 Business Ethics and MIS
19/59
Personal information defined in Section 2 of ATIPPA. It
reads: the individual's name, address or telephone number,
the individual's race, national or ethnic origin, colour, orreligious or political beliefs or associations,
the individual's age, sex, sexual orientation, marital status orfamily status,
an identifying number, symbol or other particular assigned tothe individual,
the individual's fingerprints, blood type or inheritable
characteristics, information about the individual's health care status or history,
including a physical or mental disability,
information about the individual's educational, financial,criminal or employment status or history,
the opinions of a person about the individual, and the individual's personal views or opinions 19
7/23/2019 Business Ethics and MIS
20/59
Privacy: Claim of individuals to be left alone, freefrom surveillance or interference from otherindividuals, organizations, or the state.
Personal Information Protection and Electronic
Documents Act (PIPEDA) establishes principlesfor collection, use, and disclosure of personalinformation Needs informed consent to collect and use customer
data
Similar rules exist in European Directive on DataProtection
It is much stricter than US legislation
Provinces have parallel legislation
20
7/23/2019 Business Ethics and MIS
21/59
When online, what information is PI? Dual ownership
Too easy for web sites to collect online data Web bugs and spyware can be installed
surreptitiously Cookies are used to collect information from Web
site visits Wearable and portal technology like Google Glass,
smartphone, iWatch etc.
The evil of data broker The rumor of the US Prism Project The Point: Online Privacy is Dead
21
Dual
Cookie
Broker
Glass
Bug
http://c/Users/m47liu-adm/Desktop/CS330/Materials%20in%20Use/Chapter%2007%20Hobby%20Search%20NEWS%20%20Hobby%20Magazine%20%20vol.267%20%20%20Jun.%20272013%20.msghttp://c/Users/m47liu-adm/Desktop/CS330/Materials%20in%20Use/Chapter%2007%20Hobby%20Search%20NEWS%20%20Hobby%20Magazine%20%20vol.267%20%20%20Jun.%20272013%20.msg7/23/2019 Business Ethics and MIS
22/59
You make a purchase on Futureshop.ca. whoowns the following data? The fact that you visited Futureshop.ca
Who visited my site (Futureshop.ca)
What pages you visit What pages being visited
How long you stay on the home page
How long the home page is being viewed
What you buy What is sold
22Image Source:http://www.someecards.com/usercards/viewcard/MjAxMi1 N FkOTE M E4ND 4Yz 2
7/23/2019 Business Ethics and MIS
23/59
Web sites can store and use your data forwhatever they want and forever they want
Video: Facebook changes its Terms of Service
The latest one is even worst!http://asmp.org/fb-tos#.UnplOjXNjfI
23Challenges
Image Source: http://www.theadminzone.com/forums/showthread.php?p=672116
http://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Facebook%20Biggest%20Spy%20on%20YOU%20!%20Collecting%20Your%20Private%20Information.webmhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Facebook%20Biggest%20Spy%20on%20YOU%20!%20Collecting%20Your%20Private%20Information.webm7/23/2019 Business Ethics and MIS
24/59
Cookies identify Web Visitors
Figure 4-4 24
http://www.macloo.com/examples/javascripts/cookiepage.htmhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://support.free-conversant.com/examples/cookies/index
What does it mean:4c812db292272995e5416a323e79bd37?
The users favorite movies include "The PrincessBride," "50 First Dates" and "10 Things I Hate AboutYou." It knows she enjoys the "Sex and the City"series. It knows the user browses entertainment
news and likes to take quizzes.
http://www.macloo.com/examples/javascripts/cookiepage.htmhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://support.free-conversant.com/examples/cookies/indexhttp://c/Users/m47liu-adm/Desktop/CS330/Materials%20in%20Use/Chapter%2007%20Cookie%20Example%20m47liu-adm@amazon[1].txthttp://support.free-conversant.com/examples/cookies/indexhttp://support.free-conversant.com/examples/cookies/indexhttp://support.free-conversant.com/examples/cookies/indexhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://www.macloo.com/examples/javascripts/cookiepage.htm7/23/2019 Business Ethics and MIS
25/59
The first time a site is visited, it installs atracking file, which assigns the computer aunique ID number. Later, when the user visitsanother site affiliated with the same trackingcompany, it can take note of where that user wasbefore, and where he is now. A tracking file on MSN.com: It had a prediction of a
surfer's age, ZIP Code and gender, plus a codecontaining estimates of income, marital status, presenceof children and home ownership,
Microsoft said that they didnt know how the file gotthere and added that it contained no personallyidentifiable information.
25
7/23/2019 Business Ethics and MIS
26/59
What does it mean: 4c812db292272995e5416a323e79bd37? The users favorite movies include "The Princess Bride," "50 First
Dates" and "10 Things I Hate About You." It knows she enjoys the "Sexand the City" series. It knows the user browses entertainment newsand likes to take quizzes.
The study found that the nation's 50 top websites on average
installed 64 pieces of tracking technology onto the computers ofvisitors, usually with no warning. Two third are by companies inthe business of tracking users Winner: dictionary.com with 234 cookies, 223 of which were from
data brokers!
Source:
http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html
A study done by AT&T in fall 2009 found tracking technologieson 80% of the top 1000 popular sites
26Challenges
http://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.html7/23/2019 Business Ethics and MIS
27/59
http://www.usadata.com/ http://www.charitybase.net/ Selling and buying data is a multibillion dollar
business, largely unregulated
Choicepoint is one of the largest data broker inthe world IRS signed a five-year $200M contract to access its
data Data source: public filing, financial records, loan
applications provided by police department, schooldistrict, department of motor vehicles, local courts.
27
http://www.usadata.com/http://www.charitybase.net/http://www.charitybase.net/http://www.usadata.com/7/23/2019 Business Ethics and MIS
28/59
What are the problems caused by theproliferation of data brokers?
What do they collect?
If your name and other personal informationwere in this database, what limitations onaccess would you want? (a) government agencies
(b) your employer
(c) other business firms
(d) other individuals
28Challenges
http://www.usadata.com/canadian-consumer-data-selects.htmlhttp://www.usadata.com/canadian-consumer-data-selects.html7/23/2019 Business Ethics and MIS
29/59
Writing on CreativeGood.com, Mark Hurst istrying to alert people to just how frighteningGoogle Glass might be. As he puts it: "Fromnow on, starting today, anywhere you go
within range of a Google Glass device,everything you do could be recorded anduploaded to Google's cloud, and stored therefor the rest of your life. You won't know if
you're being recorded or not; and even if youdo, you'll have no way to stop it."
29Source: http://www.techradar.com/news/mobile-computing/google-glass-say-goodbye-to-your-privacy-1134796
7/23/2019 Business Ethics and MIS
30/59
Every time we talk about a new social media network or
online marketing move, privacy is an issue. But according to anew survey conducted by the USC Annenberg Center for theDigital Future and Bovitz Inc., its going to be less of aconcern in the near future. Why? Not because were workingon ways to make the internet more secure, but because
Millennials arent as concerned as their elders.
30Source: http://www.marketingpilgrim.com/2013/04/online-privacy-is-dead-says-study-and-millennials-are-okay-with-that.html
7/23/2019 Business Ethics and MIS
31/59
Better productand service
Invasion ofprivacy
31
7/23/2019 Business Ethics and MIS
32/59
Information is the new sugar. Big data, Big sugar. Get candy, get candy, getcandy. Because big data is like big sugar. The more ubiquitous, abundant, pleasurable,
efficient, and profitable it is, the more we want it. And, sometimes, the more we want it,the more blinded we are by its consequences.
The first concerns privacys default settings. In his appearance, ProfessorGeist generously referred to my work titled, The Devil is in the Defaults. In short, the architecture of every technology includes a number of design choices. Some
design choices create default positions. For example, a cars default position is stop.When we enter a car and turn it on, the car is in park. For safetys sake, its design
requires that we consciously put it in gear in order to go. Although it would be possible todesign things the other way around, we recognize the danger of a car that defaults to gorather than stop. And we have regulated against it.
The biggest threat to privacy is not social networks, or surveillance cameras,or wireless mobile, or databases, or GPS tracking devices. It is the standardform contract. Under current law, almost all of the privacy safeguards built into privacy legislation can be
easily circumvented by anyone who provides goods or services by way of standard form
agreements. By requiring users click I agree to their terms on a take-it-or-leave-it basis,companies can use contract law to sidestep privacy obligations. In short, this is based on amistaken approach to the issue of consent.
Source: http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/#more-1541
32
http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/7/23/2019 Business Ethics and MIS
33/59
Intellectual property (IP) is intangible propertycreated by individuals or corporations
Protected by: Trade secret
Copyright
Patent
33
7/23/2019 Business Ethics and MIS
34/59
Trade Secret
Intellectual work or product belonging tobusiness, provided it is not in the publicdomain
Supreme Court test for breach of confidence:1. Information conveyed must be confidential2. Information must have been
communicated in confidence
3. Information must have been misused bythe party to whom it was communicated
34
7/23/2019 Business Ethics and MIS
35/59
Statutory grant protecting intellectual propertyfrom being copied for at least 50 years
Canadian copyright law protects original literary,musical, artistic, and dramatic works. It alsoincludes software, and prohibits copying of entireprograms or their parts.
Issues Look and feel
Unsettled issue
Apple vs. Microsoft Apple vs. Samsung
Reverse engineering
35
http://en.wikipedia.org/wiki/Apple_v._Microsofthttp://fosspatents.blogspot.com/2011/08/apple-vs-samsung-list-of-all-19.htmlhttp://fosspatents.blogspot.com/2011/08/apple-vs-samsung-list-of-all-19.htmlhttp://en.wikipedia.org/wiki/Apple_v._Microsoft7/23/2019 Business Ethics and MIS
36/59
A grant to the creator of an invention, grantingthe owner an exclusive monopoly on the ideasbehind an invention for between 17 and 20 years Patents are intended to promote innovation by
encouraging the timely disclosure of how to make anduse inventions and by protecting investments made tocommercialize inventions.
Originality, novelty, and invention are keyconcepts Canadian Patent Office does not accept applications for
software patent. It is protected under copyright law.
Possible as a conjunction of a system that is traditionallypatentable US is a bit more relaxed
36
http://users.trytel.com/~pbkerr/computer.htmlhttp://users.trytel.com/~pbkerr/computer.htmlhttp://users.trytel.com/~pbkerr/computer.htmlhttp://users.trytel.com/~pbkerr/computer.html7/23/2019 Business Ethics and MIS
37/59
Perfect digital copies cost almost nothing Sharing of digital content over the Internet
costs almost nothing
A web page may present data from manysources and incorporate framing
Sites, software, and services for file tradingare not easily regulated
Question: should software be protected bywhich law?
37
7/23/2019 Business Ethics and MIS
38/59
http://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJ
http://en.wikipedia.org/wiki/Copyright_Alert
_System
38
TheCenter for Copyright Information employs the services ofMarkMonitor (often doing business as DtecNet) to detect and monitorsuspected copyright infringement activity. The system of alerts is asfollows: The first and second alerts will notify ISP subscribers that their
Internet account has allegedly been used for copyright infringement
via the use of bittorrentand provide an explanation of how to avoidfuture offenses, as well as direct users to lawful media contentsite.[14]
If the users behavior persists, a third and fourth alert will be sent.These alerts will ask the subscriber to acknowledge receipt of themessages by clicking a notice.
After a fifth alert, ISPs will be allowed to take "mitigation measures"to prevent future infringement.
If the ISP did not institute a mitigation measure following the fifthalert, it must enact one after the sixth alert.
http://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Bittorrenthttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Bittorrenthttp://en.wikipedia.org/wiki/Bittorrenthttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJ7/23/2019 Business Ethics and MIS
39/59
No software program is perfect, errors will bemade, even with a low probability
Software manufacturers knowingly shipbuggy products Cost to delay or not ship software
At what point should software be shipped?
39
7/23/2019 Business Ethics and MIS
40/59
Intel is temporarily halting shipments of its newSandy Bridge chip platform due to a design flawthat may cause 5% of chips to fail over the nextthree to five years. It's estimated the move will
cost the company $1 billion, which includeshaving to fix nearly half a million Sandy Bridge-toting desktop and laptops already out there.(New York Times)
http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/
40
http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/7/23/2019 Business Ethics and MIS
41/59
Nasdaq failed on Friday, May 18, 2011 (first dayof Facebooks IPO) to return order confirmationsto some investors for hours and delayed the startof trading by 30 minutes because of problems
with its systems. Nasdaq's liabilities for customer losses are
capped at $3 million per month because of legaland regulatory protections.
Source:http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522
41
http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J201205227/23/2019 Business Ethics and MIS
42/59
Accountability: Mechanisms for identifyingresponsible parties
Liability: Permits individuals to recoverdamages done to them
Computer-related liability problems Difficult to pinpoint who is at fault.
Programs as machine controllers, as books(information provider), as a service provider
42
7/23/2019 Business Ethics and MIS
43/59
Decentralized control structure Empower the employees
Flatten the organization
Rapidity of change: Reduced response time to
competition means some jobs lost andcompanies out of business A just-in-time society
Maintaining boundaries: Family, work, and
leisure
43Video Source: http://www.youtube.com/watch?v=yrRn7rSif2Q&feature=related
http://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flv7/23/2019 Business Ethics and MIS
44/59
Job loss due to new technologies or revisedbusiness processes Creative destruction Outsourcing
Health risks: RSI, CVS, radiation, and
Technostress Ergonomic design
Equity and access: Increasing racial and socialclass cleavages Digital divide
Computer crime/cyber-vandalism: illegal(stealing data) Computer abuse: unethical (spam)
44
http://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Digital%20Divide.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Digital%20Divide.flv7/23/2019 Business Ethics and MIS
45/59
The Spam Problem FYI)
Figure 4-8
45
7/23/2019 Business Ethics and MIS
46/59
Spam Filtering Software FYI)
Figure 4-746
7/23/2019 Business Ethics and MIS
47/59
Identify and clearly describe the facts Define the conflict or dilemma, and identify
the higher-order values involved
Identify the stakeholders
Identify the options that you can reasonablytake
Identify the consequences of your options
47
7/23/2019 Business Ethics and MIS
48/59
Golden Rule: Do unto others as you wouldhave them do unto you
Immanuel Kants Categorical Imperative: If anaction is not right for everyone to take, then
it is not right for anyone Descartes rule of change: If an action cannot
be taken repeatedly, then it is not right to betaken at any time
48Picture source: http://4uc.org/secure/496/7550088/download/images/be3.jpg
7/23/2019 Business Ethics and MIS
49/59
Ethical no free lunch rule: Assume that alltangible and intangible objects are owned bysomeone else, unless there is a specificdeclaration otherwise
Utilitarian Principle: Take the action thatachieves the greatest value for all concerned
Risk Aversion Principle: Take the action thatproduces the least harm or incurs the leastcost to all concerned
49Picture source: http://4uc.org/secure/496/7550088/download/images/be3.jpg
7/23/2019 Business Ethics and MIS
50/59
Promises by professionals to regulatethemselves in the general interest of society
Promulgated by associations such as theCanadian Medical Association (CMA), the
Canadian Bar Association (CBA), and theCanadian Information Processing Society(CIPS) etc.
50
Picture source:
http://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.cba.org/nb/Images/logo_main.gifhttp://www.cips.ca/
http://www.cba.org/nb/Images/logo_main.gifhttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.cba.org/nb/Images/logo_main.gifhttp://www.cips.ca/http://www.cips.ca/http://www.cba.org/nb/Images/logo_main.gifhttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpg7/23/2019 Business Ethics and MIS
51/59
http://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billion
51
http://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billion7/23/2019 Business Ethics and MIS
52/59
Case Study: Ethnical Analysis
-Employee Monitoring Software
Figure 4-3 52
SurfControl Monitoring Software
http://www.key-spy.com/keyloggers/spyagentstealth-keylogger.html7/23/2019 Business Ethics and MIS
53/59
a worker's right to privacy is technically protected understate law, but there's a catch. "All states have a right to privacy based on a 'reasonable
expectation of privacy,'" Overly said. "But the courts have saidthat if there is a written policy notifying employees ofmonitoring, there is no expectation of privacy."
"By constantly monitoring, what kind of an environment are you
creating there? Companies need to weigh that in their equation,"she said. "It boils down to human dignity. People just don't wantto be watched all the time, and happy workers are productiveworkers," she said.
Corporations are really in a bind, Atkins said. They can be suedeither for violating an employee's privacy by exercising too muchcontrol over electronic communication or Internet use, but alsofor not exercising enough control and allowing workers to besubjected to harassment.
Source:http://www.wired.com/techbiz/media/news/2001/03/42029
53
http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/420297/23/2019 Business Ethics and MIS
54/59
Opt-inversus opt-outmodels of informedconsent Opt-in: a company can collect customer data only
when the customer explicitly says yes.
Opt-out: a company can collect customer dataunless the customer explicitly says no.
What if a customer says nothing about his/herpreference?
US allows Opt-out But PIPEDA (Canada) requires opt-in, same
for European countries
54
7/23/2019 Business Ethics and MIS
55/59
Industrial Solution
- Privacy Seal
55
IBM
MS
AC
FB
http://www.ibm.com/privacy/us/en/?lnk=fthttp://privacy.microsoft.com/en-us/default.mspxhttp://www.aircanada.com/en/about/legal/privacy/policy.htmlhttps://www.facebook.com/legal/termshttps://www.facebook.com/legal/termshttp://www.aircanada.com/en/about/legal/privacy/policy.htmlhttp://privacy.microsoft.com/en-us/default.mspxhttp://www.ibm.com/privacy/us/en/?lnk=fthttp://www.truste.com/trusted_sites/index.html7/23/2019 Business Ethics and MIS
56/59
Encryption, enable/disable cookies Private browsing, manually delete history, temp
files and cookies.
Platform for Privacy Preferences (P3P) Enables automatic communication of privacy
policies between an e-commerce site and itsvisitors (browsers)
Partially supported by IE and Firefox
Privacy policy can become part of the pagessoftware
56
https://encrypted.google.com/https://encrypted.google.com/7/23/2019 Business Ethics and MIS
57/59
57
7/23/2019 Business Ethics and MIS
58/59
P3P Standard
58
Figure 4-6
7/23/2019 Business Ethics and MIS
59/59
Can the police search your computer at work withouta warrant but have the blessing from the company?
Do companies have the right to spy on theiremployees at work?
Can companies claim copyright on the look and feel
of their web sites? Is it legal to collect and sell customer data?
Who has the ownership of the customer data storedby Futureshop on IBMs server?
If the data is stolen and customer suffers lost, who isresponsible?
Can Facebook keep your posted images/videos/textseven after you close your account?