Business Ethics and MIS

Embed Size (px)

Citation preview

  • 7/23/2019 Business Ethics and MIS

    1/59

    Can the police search your computer at work withouta warrant but have the blessing of the company?

    Do companies have the right to spy on theiremployees at work?

    Can companies claim copyright on the look and feelof their web sites?

    Is it legal to collect and sell customer data?

    Can Facebook keep your posted images/videos/textseven after you close your account?

    Who has the ownership of the customer data storedby Futureshop on IBMs server?

    If the data is stolen and customer suffers lost, who isresponsible?

    1

  • 7/23/2019 Business Ethics and MIS

    2/59

    Can the police search your private computerwithout a warrant?

    How about your office computer, if they have

    your companys consent? How about the companys IT technician? Do

    companies have the right to search yourcomputer at work without a warrant?

    Source:http://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsor=

    2

    http://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsorhttp://www.canada.com/story_print.html?id=503e559c-1e0c-4baa-9111-298785e1bc62&sponsor
  • 7/23/2019 Business Ethics and MIS

    3/59

    Michael Liu

    University of Waterloo

    3

  • 7/23/2019 Business Ethics and MIS

    4/59

    There are two major sources for these slides:From the textbook written by Laudon, Laudon and

    Brabston (2009). Management Information Systems:Managing the Digital Firm, Fourth Canadian Edition,

    Toronto, Pearson Prentice Hall, 2009 PearsonEducation Canada

    From the lectures developed by Dr. Anne Pidduck

    4

  • 7/23/2019 Business Ethics and MIS

    5/59

    Textbook Chapter 04

    5

  • 7/23/2019 Business Ethics and MIS

    6/59

    Responsibility Accepting the potential costs, duties, and obligations for

    decisions

    Accountability Mechanisms for identifying responsible parties; who is

    responsible?

    Liability Permits individuals to recover damages done to them

    Due process

    Laws are well known and understood, can appeal tohigher authority

    Implications to the use of IS It is not about technology, but how it is used

    6

  • 7/23/2019 Business Ethics and MIS

    7/59

    Ethical: Principles of right and wrong thatindividuals use to make choices to guide theirbehaviors

    Social: affecting people or communication

    Legal/Political: knowing the law and workingwithin its limits

    7Picture source: http://www.bunker8.pwp.blueyonder.co.uk/images/justice2.gif

  • 7/23/2019 Business Ethics and MIS

    8/59

    Ethical and Social Issues

    8

  • 7/23/2019 Business Ethics and MIS

    9/59

    1. Personal information rights andobligations

    2. Digital property rights and

    obligations3. System quality4. Accountability, liability and control5. Quality of life

    Examples of each?

    9Picture source: http://themoderatevoice.com/wordpress-engine/files/2009-april/LeftRightWrong.jpg

  • 7/23/2019 Business Ethics and MIS

    10/59

    Technology Trends

    10Video source: http://www.youtube.com/privacycomm#p/u/1/X7gWEgHeXcAPicture source: http://deonbinneman.files.wordpress.com/2009/12/j0426621.jpg

    What does a friend of a friend of a friend know about you?- By The Office of Privacy Commissioner of Canada

    http://www.youtube.com/privacycommhttp://deonbinneman.files.wordpress.com/2009/12/j0426621.jpghttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20What%20does%20a%20friend%20of%20a%20friend%20of%20a%20friend%20know%20about%20you.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20What%20does%20a%20friend%20of%20a%20friend%20of%20a%20friend%20know%20about%20you.flvhttp://deonbinneman.files.wordpress.com/2009/12/j0426621.jpghttp://www.youtube.com/privacycomm
  • 7/23/2019 Business Ethics and MIS

    11/59

    Relationship Awareness

    11

    Google and

    Privacy

    OnlineSurveillance

    Video source: YouTube

    http://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Google%20and%20Privacy.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Google%20and%20Privacy.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Online%20surveillance%20software%20_%20data%20mining.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Online%20surveillance%20software%20_%20data%20mining.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Online%20surveillance%20software%20_%20data%20mining.flvhttp://c/Users/m47liu-adm/Desktop/CS330/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Google%20and%20Privacy.flv
  • 7/23/2019 Business Ethics and MIS

    12/59

    Article Title: A Cartoon Fan Won a Nobel Price

    During the interview, the professor admits that

    Yes, I do watch cartoons like Pocoyo I try to dothat every chance I get

    Editors comments:

    What would happen to this wonderful world if itsfuture is led by professors interested in childishcartoons?

    12

  • 7/23/2019 Business Ethics and MIS

    13/59

    Article Title: Jean Chretien Praised Steve Harper as a

    Great leader

    Quote from former prime minister John Chretien Yes, I think prime minister Harper is a great leader

  • 7/23/2019 Business Ethics and MIS

    14/59

    Name Gender

    Age

    Birthplace School attended

    Hobby/Interest

    Photo

    Image Source: http://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-a

    Get away frommy daughter,your freak!

    Hollywoodactress GwynethPaltrow namedher daughterApple.

    Hug?

    Your Name: Su Shiyou

    (a famous Chinese general)

    http://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-ahttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.htmlhttp://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.html
  • 7/23/2019 Business Ethics and MIS

    15/59

    How an innocent picture got out of control http://news.6park.com/newspark/index.php?app=

    news&act=view&nid=124575

    15

  • 7/23/2019 Business Ethics and MIS

    16/59

    Source:http://www.escapistmagazine.com/forums/read/7.79407-Student-Teacher-Fired-Loses-College-Degree-for-Drunken-MySpace-Pic

    16

  • 7/23/2019 Business Ethics and MIS

    17/59

    For information posted on the net, you haveno control of How it is used

    In part or in whole

    Prank, ridicule, spam, identify theft How it is interpreted

    Misunderstood, embarrassed, intentional or accidental

    17

  • 7/23/2019 Business Ethics and MIS

    18/59

    What is personal information(PI)? Personally identifiable

    Rights about PI?

    Obligations about PI?

    18Image Source: http://www.abine.com/blog/2012/when-delete-means-delete-the-inside-story-of-our-ftc-complaint-against-beenverified-com/personal-information-collection/

    http://www.priv.gc.ca/leg_c/interpretations_02_e.asphttp://www.priv.gc.ca/leg_c/interpretations_02_e.asp
  • 7/23/2019 Business Ethics and MIS

    19/59

    Personal information defined in Section 2 of ATIPPA. It

    reads: the individual's name, address or telephone number,

    the individual's race, national or ethnic origin, colour, orreligious or political beliefs or associations,

    the individual's age, sex, sexual orientation, marital status orfamily status,

    an identifying number, symbol or other particular assigned tothe individual,

    the individual's fingerprints, blood type or inheritable

    characteristics, information about the individual's health care status or history,

    including a physical or mental disability,

    information about the individual's educational, financial,criminal or employment status or history,

    the opinions of a person about the individual, and the individual's personal views or opinions 19

  • 7/23/2019 Business Ethics and MIS

    20/59

    Privacy: Claim of individuals to be left alone, freefrom surveillance or interference from otherindividuals, organizations, or the state.

    Personal Information Protection and Electronic

    Documents Act (PIPEDA) establishes principlesfor collection, use, and disclosure of personalinformation Needs informed consent to collect and use customer

    data

    Similar rules exist in European Directive on DataProtection

    It is much stricter than US legislation

    Provinces have parallel legislation

    20

  • 7/23/2019 Business Ethics and MIS

    21/59

    When online, what information is PI? Dual ownership

    Too easy for web sites to collect online data Web bugs and spyware can be installed

    surreptitiously Cookies are used to collect information from Web

    site visits Wearable and portal technology like Google Glass,

    smartphone, iWatch etc.

    The evil of data broker The rumor of the US Prism Project The Point: Online Privacy is Dead

    21

    Dual

    Cookie

    Broker

    Glass

    Bug

    http://c/Users/m47liu-adm/Desktop/CS330/Materials%20in%20Use/Chapter%2007%20Hobby%20Search%20NEWS%20%20Hobby%20Magazine%20%20vol.267%20%20%20Jun.%20272013%20.msghttp://c/Users/m47liu-adm/Desktop/CS330/Materials%20in%20Use/Chapter%2007%20Hobby%20Search%20NEWS%20%20Hobby%20Magazine%20%20vol.267%20%20%20Jun.%20272013%20.msg
  • 7/23/2019 Business Ethics and MIS

    22/59

    You make a purchase on Futureshop.ca. whoowns the following data? The fact that you visited Futureshop.ca

    Who visited my site (Futureshop.ca)

    What pages you visit What pages being visited

    How long you stay on the home page

    How long the home page is being viewed

    What you buy What is sold

    22Image Source:http://www.someecards.com/usercards/viewcard/MjAxMi1 N FkOTE M E4ND 4Yz 2

  • 7/23/2019 Business Ethics and MIS

    23/59

    Web sites can store and use your data forwhatever they want and forever they want

    Video: Facebook changes its Terms of Service

    The latest one is even worst!http://asmp.org/fb-tos#.UnplOjXNjfI

    23Challenges

    Image Source: http://www.theadminzone.com/forums/showthread.php?p=672116

    http://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Facebook%20Biggest%20Spy%20on%20YOU%20!%20Collecting%20Your%20Private%20Information.webmhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://asmp.org/fb-tos.UnplOjXNjfIhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Facebook%20Biggest%20Spy%20on%20YOU%20!%20Collecting%20Your%20Private%20Information.webm
  • 7/23/2019 Business Ethics and MIS

    24/59

    Cookies identify Web Visitors

    Figure 4-4 24

    http://www.macloo.com/examples/javascripts/cookiepage.htmhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://support.free-conversant.com/examples/cookies/index

    What does it mean:4c812db292272995e5416a323e79bd37?

    The users favorite movies include "The PrincessBride," "50 First Dates" and "10 Things I Hate AboutYou." It knows she enjoys the "Sex and the City"series. It knows the user browses entertainment

    news and likes to take quizzes.

    http://www.macloo.com/examples/javascripts/cookiepage.htmhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://support.free-conversant.com/examples/cookies/indexhttp://c/Users/m47liu-adm/Desktop/CS330/Materials%20in%20Use/Chapter%2007%20Cookie%20Example%20m47liu-adm@amazon[1].txthttp://support.free-conversant.com/examples/cookies/indexhttp://support.free-conversant.com/examples/cookies/indexhttp://support.free-conversant.com/examples/cookies/indexhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://www.barelyfitz.com/projects/tabber/example-cookies.htmlhttp://www.macloo.com/examples/javascripts/cookiepage.htm
  • 7/23/2019 Business Ethics and MIS

    25/59

    The first time a site is visited, it installs atracking file, which assigns the computer aunique ID number. Later, when the user visitsanother site affiliated with the same trackingcompany, it can take note of where that user wasbefore, and where he is now. A tracking file on MSN.com: It had a prediction of a

    surfer's age, ZIP Code and gender, plus a codecontaining estimates of income, marital status, presenceof children and home ownership,

    Microsoft said that they didnt know how the file gotthere and added that it contained no personallyidentifiable information.

    25

  • 7/23/2019 Business Ethics and MIS

    26/59

    What does it mean: 4c812db292272995e5416a323e79bd37? The users favorite movies include "The Princess Bride," "50 First

    Dates" and "10 Things I Hate About You." It knows she enjoys the "Sexand the City" series. It knows the user browses entertainment newsand likes to take quizzes.

    The study found that the nation's 50 top websites on average

    installed 64 pieces of tracking technology onto the computers ofvisitors, usually with no warning. Two third are by companies inthe business of tracking users Winner: dictionary.com with 234 cookies, 223 of which were from

    data brokers!

    Source:

    http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html

    A study done by AT&T in fall 2009 found tracking technologieson 80% of the top 1000 popular sites

    26Challenges

    http://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.htmlhttp://online.wsj.com/article/SB10001424052748703940904575395073512989404.html
  • 7/23/2019 Business Ethics and MIS

    27/59

    http://www.usadata.com/ http://www.charitybase.net/ Selling and buying data is a multibillion dollar

    business, largely unregulated

    Choicepoint is one of the largest data broker inthe world IRS signed a five-year $200M contract to access its

    data Data source: public filing, financial records, loan

    applications provided by police department, schooldistrict, department of motor vehicles, local courts.

    27

    http://www.usadata.com/http://www.charitybase.net/http://www.charitybase.net/http://www.usadata.com/
  • 7/23/2019 Business Ethics and MIS

    28/59

    What are the problems caused by theproliferation of data brokers?

    What do they collect?

    If your name and other personal informationwere in this database, what limitations onaccess would you want? (a) government agencies

    (b) your employer

    (c) other business firms

    (d) other individuals

    28Challenges

    http://www.usadata.com/canadian-consumer-data-selects.htmlhttp://www.usadata.com/canadian-consumer-data-selects.html
  • 7/23/2019 Business Ethics and MIS

    29/59

    Writing on CreativeGood.com, Mark Hurst istrying to alert people to just how frighteningGoogle Glass might be. As he puts it: "Fromnow on, starting today, anywhere you go

    within range of a Google Glass device,everything you do could be recorded anduploaded to Google's cloud, and stored therefor the rest of your life. You won't know if

    you're being recorded or not; and even if youdo, you'll have no way to stop it."

    29Source: http://www.techradar.com/news/mobile-computing/google-glass-say-goodbye-to-your-privacy-1134796

  • 7/23/2019 Business Ethics and MIS

    30/59

    Every time we talk about a new social media network or

    online marketing move, privacy is an issue. But according to anew survey conducted by the USC Annenberg Center for theDigital Future and Bovitz Inc., its going to be less of aconcern in the near future. Why? Not because were workingon ways to make the internet more secure, but because

    Millennials arent as concerned as their elders.

    30Source: http://www.marketingpilgrim.com/2013/04/online-privacy-is-dead-says-study-and-millennials-are-okay-with-that.html

  • 7/23/2019 Business Ethics and MIS

    31/59

    Better productand service

    Invasion ofprivacy

    31

  • 7/23/2019 Business Ethics and MIS

    32/59

    Information is the new sugar. Big data, Big sugar. Get candy, get candy, getcandy. Because big data is like big sugar. The more ubiquitous, abundant, pleasurable,

    efficient, and profitable it is, the more we want it. And, sometimes, the more we want it,the more blinded we are by its consequences.

    The first concerns privacys default settings. In his appearance, ProfessorGeist generously referred to my work titled, The Devil is in the Defaults. In short, the architecture of every technology includes a number of design choices. Some

    design choices create default positions. For example, a cars default position is stop.When we enter a car and turn it on, the car is in park. For safetys sake, its design

    requires that we consciously put it in gear in order to go. Although it would be possible todesign things the other way around, we recognize the danger of a car that defaults to gorather than stop. And we have regulated against it.

    The biggest threat to privacy is not social networks, or surveillance cameras,or wireless mobile, or databases, or GPS tracking devices. It is the standardform contract. Under current law, almost all of the privacy safeguards built into privacy legislation can be

    easily circumvented by anyone who provides goods or services by way of standard form

    agreements. By requiring users click I agree to their terms on a take-it-or-leave-it basis,companies can use contract law to sidestep privacy obligations. In short, this is based on amistaken approach to the issue of consent.

    Source: http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/#more-1541

    32

    http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/http://iankerr.ca/content/2012/06/18/my-appearance-before-ethi/
  • 7/23/2019 Business Ethics and MIS

    33/59

    Intellectual property (IP) is intangible propertycreated by individuals or corporations

    Protected by: Trade secret

    Copyright

    Patent

    33

  • 7/23/2019 Business Ethics and MIS

    34/59

    Trade Secret

    Intellectual work or product belonging tobusiness, provided it is not in the publicdomain

    Supreme Court test for breach of confidence:1. Information conveyed must be confidential2. Information must have been

    communicated in confidence

    3. Information must have been misused bythe party to whom it was communicated

    34

  • 7/23/2019 Business Ethics and MIS

    35/59

    Statutory grant protecting intellectual propertyfrom being copied for at least 50 years

    Canadian copyright law protects original literary,musical, artistic, and dramatic works. It alsoincludes software, and prohibits copying of entireprograms or their parts.

    Issues Look and feel

    Unsettled issue

    Apple vs. Microsoft Apple vs. Samsung

    Reverse engineering

    35

    http://en.wikipedia.org/wiki/Apple_v._Microsofthttp://fosspatents.blogspot.com/2011/08/apple-vs-samsung-list-of-all-19.htmlhttp://fosspatents.blogspot.com/2011/08/apple-vs-samsung-list-of-all-19.htmlhttp://en.wikipedia.org/wiki/Apple_v._Microsoft
  • 7/23/2019 Business Ethics and MIS

    36/59

    A grant to the creator of an invention, grantingthe owner an exclusive monopoly on the ideasbehind an invention for between 17 and 20 years Patents are intended to promote innovation by

    encouraging the timely disclosure of how to make anduse inventions and by protecting investments made tocommercialize inventions.

    Originality, novelty, and invention are keyconcepts Canadian Patent Office does not accept applications for

    software patent. It is protected under copyright law.

    Possible as a conjunction of a system that is traditionallypatentable US is a bit more relaxed

    36

    http://users.trytel.com/~pbkerr/computer.htmlhttp://users.trytel.com/~pbkerr/computer.htmlhttp://users.trytel.com/~pbkerr/computer.htmlhttp://users.trytel.com/~pbkerr/computer.html
  • 7/23/2019 Business Ethics and MIS

    37/59

    Perfect digital copies cost almost nothing Sharing of digital content over the Internet

    costs almost nothing

    A web page may present data from manysources and incorporate framing

    Sites, software, and services for file tradingare not easily regulated

    Question: should software be protected bywhich law?

    37

  • 7/23/2019 Business Ethics and MIS

    38/59

    http://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJ

    http://en.wikipedia.org/wiki/Copyright_Alert

    _System

    38

    TheCenter for Copyright Information employs the services ofMarkMonitor (often doing business as DtecNet) to detect and monitorsuspected copyright infringement activity. The system of alerts is asfollows: The first and second alerts will notify ISP subscribers that their

    Internet account has allegedly been used for copyright infringement

    via the use of bittorrentand provide an explanation of how to avoidfuture offenses, as well as direct users to lawful media contentsite.[14]

    If the users behavior persists, a third and fourth alert will be sent.These alerts will ask the subscriber to acknowledge receipt of themessages by clicking a notice.

    After a fifth alert, ISPs will be allowed to take "mitigation measures"to prevent future infringement.

    If the ISP did not institute a mitigation measure following the fifthalert, it must enact one after the sixth alert.

    http://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Bittorrenthttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Bittorrenthttp://en.wikipedia.org/wiki/Bittorrenthttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://en.wikipedia.org/wiki/Copyright_Alert_Systemhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJhttp://readwrite.com/2013/03/12/isp-six-strikes-anti-piracy-system-infographic#awesm=~o8EpVsljnJ0UCJ
  • 7/23/2019 Business Ethics and MIS

    39/59

    No software program is perfect, errors will bemade, even with a low probability

    Software manufacturers knowingly shipbuggy products Cost to delay or not ship software

    At what point should software be shipped?

    39

  • 7/23/2019 Business Ethics and MIS

    40/59

    Intel is temporarily halting shipments of its newSandy Bridge chip platform due to a design flawthat may cause 5% of chips to fail over the nextthree to five years. It's estimated the move will

    cost the company $1 billion, which includeshaving to fix nearly half a million Sandy Bridge-toting desktop and laptops already out there.(New York Times)

    http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/

    40

    http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/http://tech.fortune.cnn.com/2011/02/01/today-in-tech-facebooks-new-comment-system/
  • 7/23/2019 Business Ethics and MIS

    41/59

    Nasdaq failed on Friday, May 18, 2011 (first dayof Facebooks IPO) to return order confirmationsto some investors for hours and delayed the startof trading by 30 minutes because of problems

    with its systems. Nasdaq's liabilities for customer losses are

    capped at $3 million per month because of legaland regulatory protections.

    Source:http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522

    41

    http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522http://www.reuters.com/article/2012/05/22/us-nasdaq-idUSBRE84L06J20120522
  • 7/23/2019 Business Ethics and MIS

    42/59

    Accountability: Mechanisms for identifyingresponsible parties

    Liability: Permits individuals to recoverdamages done to them

    Computer-related liability problems Difficult to pinpoint who is at fault.

    Programs as machine controllers, as books(information provider), as a service provider

    42

  • 7/23/2019 Business Ethics and MIS

    43/59

    Decentralized control structure Empower the employees

    Flatten the organization

    Rapidity of change: Reduced response time to

    competition means some jobs lost andcompanies out of business A just-in-time society

    Maintaining boundaries: Family, work, and

    leisure

    43Video Source: http://www.youtube.com/watch?v=yrRn7rSif2Q&feature=related

    http://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used/Chapter%2004%20Did%20You%20Know%203.0%20(Officially%20updated%20for%202012)%20HD.flv
  • 7/23/2019 Business Ethics and MIS

    44/59

    Job loss due to new technologies or revisedbusiness processes Creative destruction Outsourcing

    Health risks: RSI, CVS, radiation, and

    Technostress Ergonomic design

    Equity and access: Increasing racial and socialclass cleavages Digital divide

    Computer crime/cyber-vandalism: illegal(stealing data) Computer abuse: unethical (spam)

    44

    http://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Digital%20Divide.flvhttp://localhost/var/www/apps/conversion/tmp/scratch_4/Video%20Library/Good%20and%20Used%20after%20W13/Chapter%2007%20Digital%20Divide.flv
  • 7/23/2019 Business Ethics and MIS

    45/59

    The Spam Problem FYI)

    Figure 4-8

    45

  • 7/23/2019 Business Ethics and MIS

    46/59

    Spam Filtering Software FYI)

    Figure 4-746

  • 7/23/2019 Business Ethics and MIS

    47/59

    Identify and clearly describe the facts Define the conflict or dilemma, and identify

    the higher-order values involved

    Identify the stakeholders

    Identify the options that you can reasonablytake

    Identify the consequences of your options

    47

  • 7/23/2019 Business Ethics and MIS

    48/59

    Golden Rule: Do unto others as you wouldhave them do unto you

    Immanuel Kants Categorical Imperative: If anaction is not right for everyone to take, then

    it is not right for anyone Descartes rule of change: If an action cannot

    be taken repeatedly, then it is not right to betaken at any time

    48Picture source: http://4uc.org/secure/496/7550088/download/images/be3.jpg

  • 7/23/2019 Business Ethics and MIS

    49/59

    Ethical no free lunch rule: Assume that alltangible and intangible objects are owned bysomeone else, unless there is a specificdeclaration otherwise

    Utilitarian Principle: Take the action thatachieves the greatest value for all concerned

    Risk Aversion Principle: Take the action thatproduces the least harm or incurs the leastcost to all concerned

    49Picture source: http://4uc.org/secure/496/7550088/download/images/be3.jpg

  • 7/23/2019 Business Ethics and MIS

    50/59

    Promises by professionals to regulatethemselves in the general interest of society

    Promulgated by associations such as theCanadian Medical Association (CMA), the

    Canadian Bar Association (CBA), and theCanadian Information Processing Society(CIPS) etc.

    50

    Picture source:

    http://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.cba.org/nb/Images/logo_main.gifhttp://www.cips.ca/

    http://www.cba.org/nb/Images/logo_main.gifhttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.cba.org/nb/Images/logo_main.gifhttp://www.cips.ca/http://www.cips.ca/http://www.cba.org/nb/Images/logo_main.gifhttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpghttp://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpg
  • 7/23/2019 Business Ethics and MIS

    51/59

    http://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billion

    51

    http://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billionhttp://www.thestar.com/business/article/1054396--playing-angry-birds-at-work-costs-employers-1-5-billion
  • 7/23/2019 Business Ethics and MIS

    52/59

    Case Study: Ethnical Analysis

    -Employee Monitoring Software

    Figure 4-3 52

    SurfControl Monitoring Software

    http://www.key-spy.com/keyloggers/spyagentstealth-keylogger.html
  • 7/23/2019 Business Ethics and MIS

    53/59

    a worker's right to privacy is technically protected understate law, but there's a catch. "All states have a right to privacy based on a 'reasonable

    expectation of privacy,'" Overly said. "But the courts have saidthat if there is a written policy notifying employees ofmonitoring, there is no expectation of privacy."

    "By constantly monitoring, what kind of an environment are you

    creating there? Companies need to weigh that in their equation,"she said. "It boils down to human dignity. People just don't wantto be watched all the time, and happy workers are productiveworkers," she said.

    Corporations are really in a bind, Atkins said. They can be suedeither for violating an employee's privacy by exercising too muchcontrol over electronic communication or Internet use, but alsofor not exercising enough control and allowing workers to besubjected to harassment.

    Source:http://www.wired.com/techbiz/media/news/2001/03/42029

    53

    http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029http://www.wired.com/techbiz/media/news/2001/03/42029
  • 7/23/2019 Business Ethics and MIS

    54/59

    Opt-inversus opt-outmodels of informedconsent Opt-in: a company can collect customer data only

    when the customer explicitly says yes.

    Opt-out: a company can collect customer dataunless the customer explicitly says no.

    What if a customer says nothing about his/herpreference?

    US allows Opt-out But PIPEDA (Canada) requires opt-in, same

    for European countries

    54

  • 7/23/2019 Business Ethics and MIS

    55/59

    Industrial Solution

    - Privacy Seal

    55

    IBM

    MS

    AC

    FB

    http://www.ibm.com/privacy/us/en/?lnk=fthttp://privacy.microsoft.com/en-us/default.mspxhttp://www.aircanada.com/en/about/legal/privacy/policy.htmlhttps://www.facebook.com/legal/termshttps://www.facebook.com/legal/termshttp://www.aircanada.com/en/about/legal/privacy/policy.htmlhttp://privacy.microsoft.com/en-us/default.mspxhttp://www.ibm.com/privacy/us/en/?lnk=fthttp://www.truste.com/trusted_sites/index.html
  • 7/23/2019 Business Ethics and MIS

    56/59

    Encryption, enable/disable cookies Private browsing, manually delete history, temp

    files and cookies.

    Platform for Privacy Preferences (P3P) Enables automatic communication of privacy

    policies between an e-commerce site and itsvisitors (browsers)

    Partially supported by IE and Firefox

    Privacy policy can become part of the pagessoftware

    56

    https://encrypted.google.com/https://encrypted.google.com/
  • 7/23/2019 Business Ethics and MIS

    57/59

    57

  • 7/23/2019 Business Ethics and MIS

    58/59

    P3P Standard

    58

    Figure 4-6

  • 7/23/2019 Business Ethics and MIS

    59/59

    Can the police search your computer at work withouta warrant but have the blessing from the company?

    Do companies have the right to spy on theiremployees at work?

    Can companies claim copyright on the look and feel

    of their web sites? Is it legal to collect and sell customer data?

    Who has the ownership of the customer data storedby Futureshop on IBMs server?

    If the data is stolen and customer suffers lost, who isresponsible?

    Can Facebook keep your posted images/videos/textseven after you close your account?