50
Dr. Chen, Information Systems 1 Chapter 9 Using Information Ethically Jason C. H. Chen, Ph.D. Professor of MIS School of Business Administration Gonzaga University Spokane, WA 99258 [email protected]

Dr. Chen, Information Systems 1 Chapter 9 Using Information Ethically Jason C. H. Chen, Ph.D. Professor of MIS School of Business Administration Gonzaga

Embed Size (px)

Citation preview

Dr. Chen, Information Systems 1

Chapter 9Using Information

Ethically

Jason C. H. Chen, Ph.D.Professor of MIS

School of Business AdministrationGonzaga UniversitySpokane, WA 99258

[email protected]

Dr. Chen, Information Systems

Why Learning Ethics/IS Ethics?

• Protecting yourself• Protecting your organization• Ultimately, help to build a respectful and

safe society/community.

• What/How to prepare yourself while you are– at school now and – at work in the future.

Dr. Chen, Information Systems

Outlines of the Topic• Understand how ethics should be framed in the context

of business practices and the challenges surrounding these issues.

• Define and describe the three normative theories of business ethics.

• List and define PAPA and why it is important. • Understand security issues of organizations and how

organizations are bolstering security.• Describe how security can be best enacted.• Define the Sarbanes-Oxley Act and the COBIT

framework.

Dr. Chen, Information Systems

Real World Example

• TJX Companies Inc. (a Delaware corporation), the parent company of T.J. Maxx and Marshall stores, disclosed in January 2007 that its systems were hacked, exposing at least 45.7 million (later updated to 94 million) credit and debit cards to possible fraud.

• On January 17, 2007 TJX publically announced that it had experienced a massive data breach affecting credit card transaction information for thousands of consumers who had shopped at TJ Maxx, HomeGoods, A.J. Wright and Marshalls stores.

Dr. Chen, Information Systems

Real World Example (cont.)

• TJX Co. discovered the largest security breach of its computer system in the history of retailing, it faced a serious ethical dilemma not faced by many companies.

• As many as 94 million customers were affected.• Given the extent of the breach, multiple state, federal, and

foreign jurisdictions dictated how and when it must inform affected customers and what corrective steps it must take.

• Most jurisdictions allowed 45 days for it to act following the determination of the breach. Any extension beyond 45 days would incur heavy fines.

• On the ethical side it became an even more pressing issue.

Dr. Chen, Information Systems

Issues for Concern

• Two actions for TJX to decide:–1) notifying their customers immediately, or –2) waiting the 45 days allowed by the

jurisdictions. • Which action would you suggest?

Dr. Chen, Information Systems

Issues for Concern: Discussions1. If TJX Co. notifies their customers immediately?

a) customers might lose customer confidence as they might start taking preventive steps to protect themselves from the identity theft and avoid any resulting financial and psychological losses.

b) More hackers would learn about it and may exploit the weakness in its IT infrastructure and might further “threaten” their computer system.

c) TJX will face punishment from Wall Street

i. Financial markets would lose confidence in the company and severely punish shareholders.

ii. Loss of image would also affect its ability to attract and retain high-quality employees in the long run.

Dr. Chen, Information Systems

Issues for Concern: Discussions2. If TJX Co. waits the 45 days allowed by the

jurisdictions?

a) Financial stability of many customers would be further compromised through misuse of their credit card and other private records.

b) This could result in a major class-action litigation, which might permanent affect the company

Dr. Chen, Information Systems

Lessons Learned

• What lessons have you learned from the TJX case?

Dr. Chen, Information Systems

Lessons Learn from TJX case

• 1. As in the case of TJX, information collected in the course of business is important for the conduct of business and can even create valuable competitive advantage.

• 2. Ethical questions concerning just how that information will be used and by whom, whether they arise inside or outside the organization, can have powerful effects on the company’s ability to carry out its plans.

Dr. Chen, Information Systems

Lessons Learn from TJX case

• 3. As computer networks and their products come to touch every aspect of people’s lives, and as the power, speed, and capabilities of computers increase, managers are increasingly challenged to govern their use in an ethical manner.

• 4. No longer can managers afford to view information systems (IS) as discrete entities within the corporate structure. In many cases, IS are coming to comprise much of the corporate itself.

Dr. Chen, Information Systems 13

NORMATIVE THEORIES OF BUSINESS ETHICS

Dr. Chen, Information Systems

Why Normative Theories of Business Ethics Matter

• Managers must assess initiatives from an ethical view.

• Most managers are not trained in ethics, philosophy, and moral reasoning.– Difficult to determine or discuss social norms.

• Managers in the information age need to translate their current ethical norms into terms meaningful for the new electronic corporation.

• Therefore, to suggest a workable framework for this process, three theories of ethical behavior in the corporate environment that managers can develop and apply to the particular challenges they face.

Dr. Chen, Information Systems

Normative Theories of Business Ethics

• Three theories of business ethics are examined to develop and apply to particular challenges that they face (see Figure 1):– Stockholder theory– Stakeholder theory– Social contract theory

• These three theories are “normative” in that they attempt to derive what might be called “intermediate-level” ethical principles: principles expressed in language accessible to the ordinary businessperson, which can be applied to the concrete moral quandaries of the business domain.

Dr. Chen, Information Systems

Stockholder Theory

• Stockholders advance capital to corporate managers who act as agents in advancing their ends.

• Managers are bound to the interests of the shareholders (maximize shareholder value).

• Manager’s duties:– Bound to employ legal, non-fraudulent means.– Must take long view of shareholder interest.

Dr. Chen, Information Systems

What are the implications of “Stockholder” Theory to TJX case?

• The stipulation under stockholder theory that the pursuit of profits must be legal and non-fraudulent – the delay allowed by law might also have a positive

impact on TJX’s stock price.– a recent survey has shown that customers are reluctant

to shop in stores once data breaches have been announced, so delaying may be important for maintaining a steady stream of revenues for as long as possible.

– certainly, disgruntled customers would definitely stop shopping at its stores if TJX waited too long.

Dr. Chen, Information Systems

Stakeholder Theory• Managers are entrusted with a responsibility to all

those who hold a stake in or a claim on the firm.• Stakeholders are:

– Any group that vitally affects the corporation survival and success. It normally include:stockholders, customers, employees, suppliers, and the

local community.• Management must enact and follow policies that

balance the rights of all stakeholders without impinging upon the rights of any one particular stakeholder.

Dr. Chen, Information Systems

What are the implications of “Stakeholder” Theory to TJX case?

• Stakeholder theory diverges most consequentially from stockholder theory in affirming that the interests of parties other than the stockholders also play a legitimate role in the governance and management of the firm.

• TJX’s shareholders stand to gain in the short term, but what would be the effects on other stakeholders?

• One stakeholder group, the customers, definitely could benefit from knowing about the breach as soon as possible because they could take steps to protect themselves.

Dr. Chen, Information Systems

What are the implications of “Stakeholder” Theory to TJX case? (cont.)

• Customers could be informed of the severity of the breach and protective actions that they could take through a special Web page, toll-free service and compensate those who are injured.

• TJX could also offer them free credit-monitoring service and compensate those who are injured.

• Research has shown that customers who receive adequate compensation after making a complaint are actually more loyal than those without complaints.

• On the other hand, if the breach were not announced, fewer hackers might attempt to break into the systems.

• In general, the costs to customers outweighted the benefits within the larger stakeholder group.

Dr. Chen, Information Systems

Social Contract Theory

• Derives the social responsibilities of corporate managers by considering the needs of a society with no corporations or other complex business arrangements.

• Corporations are expected to create more value to society that it consumes.

• Social contract comprises two distinct components:– 1. Social welfare – corporations must produce greater

benefits than their associated costs, or society would not allow their creation.

– 2. Justice – corporations must pursue profits legally, without fraud or deception, and avoid actions that harm society.

Dr. Chen, Information Systems

What are the implications of “Social Contract” Theory to TJX case?

• Applied to the TJX case, social contract theory would demand that the manager ask whether the delay in notifying customers about the security breach could compromise fundamental tenets of fairness or social justice.

• If the customers were not apprised of the delay as soon as possible, TJX’s actions could be seen as unethical because if would not seem fair to delay notifying them.

• If, on the other hand, the time prior to notification were used to take corrective action with the consequence of limiting not only hackers from stealing confidential customer information but also of forestalling future attacks that would impact society as a whole, the delay conceivably could be considered ethical.

Dr. Chen, Information Systems

Figure 1 Three normative theories of business ethics.

Theory Definition Metrics

Stockholder Will this action maximize stockholder value? Can goals be accomplished without compromising company standards and without breaking laws?

Stakeholder Does the proposed action maximize collective benefits to the company? Does this action treat one of the corporate stakeholders unfairly?

Social contract

Does this action create a “net” benefit for society? Does the proposed action discriminate against any group in particular, and is its implementation socially just?

Maximize stockholder wealth, in legal and non-fraudulent manners.

Maximize benefits to all stakeholders while weighing costs to competing interests.

Create value for society in a manner that is just and nondiscriminatory.

Dr. Chen, Information Systems

Relationship among these three Theories

Social Contract

Stakeholder

• Although these three normative theories of business ethics possess distinct characteristics, they are not completely incompatible.

• They provide managers with an independent standard by which to judge the ethical nature of superiors’ order as well as their firms’ policies and codes of conduct.

Stockholder

Dr. Chen, Information Systems

Actions from TJX• What ultimately, did TJX do? TJX disclosed the breach in

January 2007, but, didn’t release a comprehensive executive summary of the attack until March 2007, when it made a regulatory filing.

• TJX had actually noticed suspicious software the preceding December, at which point it hired IBM and General Dynamics to investigate. Both companies believed the intrusion may have taken place in July 2005.

• That means that it took TJX 17 months (July 2006 – January 2007) to find out that their computer systems had been breached on numerous occasions on a colossal scale.

• It was over a year later, on February 29, 2008, when the President and CEO, Carol Meyrowitz, wrote a letter to “valued customers” about the breach that had been announced on January 17, 2007.

Dr. Chen, Information Systems

Actions from TJX (cont.)

• The TJX retail chain agreed to pay $24 and $41 million in restitution to MasterCard and Visa respectively.

• TJX brokered a separate agreement with a coalition of Masschusetts-based banks who had sued it.

• The only settlement to date to actual cardholders by TJX has been an offer of free credit monitoring for cardholders and a $30 store voucher.

Q: What “theory” was the TJX case based on?1.“Stockholder”2.“Stakeholder”3.“Social Contract”

Dr. Chen, Information Systems

What “theory” was TJX case based on?

• Answer: • “Stockholder” Theory.• Why?

• Given by the information stated above. We can surmise that TJX’s overriding approach was more consistent with the stockholder theory than other theories.

• Because at least one stakeholder group, the customers, were not well served.

Dr. Chen, Information Systems

CONTROL OF INFORMATION:

Issues of PAPA:

Privacy,

Accuracy,

Property,

Accessibility

Dr. Chen, Information Systems

Privacy

• Those who possess the “best” information and know how to use it, win.

• However, keeping this information safe and secure is a high priority (see Figure 2).

• Privacy – “the right to be left alone”.• Managers must be aware of regulations that are in

place regarding the authorized collection, disclosure and use of personal information.– COBIT framework of 1996.

Dr. Chen, Information Systems

Accuracy

• Managers must establish controls to insure that information is accurate.

• Data entry errors must be controlled and managed carefully.

• Data must also be kept up to date.• Keeping data as long as it is necessary or

legally mandated is a challenge.

Dr. Chen, Information Systems

Property

• Mass quantities of data are now stored on clients (how about on the “cloud” computing platform?).

• Who owns this data and has rights to it is are questions that a manager must answer.

• Managers must understand the legal rights and duties accorded to proper ownership.

Dr. Chen, Information Systems

Accessibility

• Access to information systems and the data that they hold is paramount.

• Users must be able to access this data from any location (if it can be properly secured and does not violate any laws or regulations).

• Major issue facing managers is how to create and maintain access to information for society at large.– This access needs to be controlled to those who

have a right to see and use it (identity theft).– Also, adequate security measures must be in place

on their partners end.

Dr. Chen, Information Systems

Area Critical Questions

Privacy

Accuracy

Property

Accessibility

Figure 2 Mason’s areas of managerial concern with PAPA.

What information must a person reveal about one’s self to others?

What information should others be able to access about you – with or without your permission? What safeguards exist for your protection?

Who is responsible for the reliability and accuracy of information? Who will be accountable for errors?

Who owns information? Who owns the channels of distribution, and how should they be regulated?

What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Dr. Chen, Information Systems

PAPA and Managers

• Managers must work hard to implement controls over information highlighted by PAPA.

• Limit access to data – avoid identify theft, and respect customer’s privacy.

• Federal Trade Commission (FTC) requires more disclosure of how companies use customer data.– Gramm-Leach-Bliley Act (1999)

• Information privacy guidelines must come from above: CEO, CFO, etc.

Dr. Chen, Information Systems

Security and Controls• PAPA principles work hand-in-hand with security and

controls.• Executives reported that hardware/software failures,

and major viruses, had resulted in unexpected or unscheduled outages of their critical business systems (Ernst & Young).

• Technologies have been devised to manage the security and control problems.

• RFID is being used to control access and manage assets.

• Employees require proper training and education.

Dr. Chen, Information Systems

Sarbanes-Oxley (SoX) Act of 2002

WHATWHYWHO

Dr. Chen, Information Systems

Sarbanes-Oxley Act of 2002:WHAT

• What the term 'Sarbanes-Oxley' stands for– Senator Paul Sarbanes and Representative Michael Oxley,

who drafted the Sarbanes-Oxley Act of 2002.

• Also known as “Public Company Accounting Reform and Investor Protection Act”

Dr. Chen, Information Systems

Sarbanes-Oxley Act of 2002:WHY

• The bill was enacted as a reaction to a number of major corporate and accounting scandals including those affecting Enron, Tyco International, Adelphia, and WorldCom. – These scandals, which cost investors billions of dollars when

the share prices of affected companies collapsed, shook public confidence in the nation's securities markets.

• The intent of the Sarbanes-Oxley Act– To protect investors by improving the accuracy and

reliability of corporate disclosures made pursuant to the securities laws, and for other purposes.

Dr. Chen, Information Systems

Sarbanes-Oxley Act of 2002:WHO

• Who the Act applies to– SOX applies to all public companies in the U.S. and

international companies that have registered equity or debt securities with the Securities and Exchange Commission (SEC) and the accounting firms that provide auditing services to them.

Dr. Chen, Information Systems

Sarbanes-Oxley Act of 2002 (cont.)

• What the Act is about– The Sarbanes-Oxley Act created new standards

for corporate accountability as well as new penalties for acts of wrongdoing.

– It changes how corporate boards and executives must interact with each other and with corporate auditors. It removes the defense of "I wasn't aware of financial issues" from CEOs and CFOs, holding them accountable for the accuracy of financial statements.

Dr. Chen, Information Systems

Sarbanes-Oxley Act of 2002 (cont.)

• If a company isn’t in compliance...– Non compliance penalties range from the loss of

exchange listing, loss of D&O (Directors and Officers) insurance to multimillion dollar fines and imprisonment. It can result in a lack of investor confidence.

– A CEO or CFO who submits a wrong certification is subject to a fine up to $1 million and imprisonment for up to ten years. If the wrong certification was submitted "willfully", the fine can be increased up to $5 million and the prison term can be increased up to twenty years.

Dr. Chen, Information Systems

Sarbanes-Oxley Act of 2002 Summary

• The Sarbanes-Oxley (SoX) Act of 2002 was enacted to increase regulatory visibility and accountability of public companies and their financial health.– CEO’s and CFO’s must personally certify and be

accountable for their firm’s financial records and accounting (stiff penalties).

– CIO works with auditors, CFO, and CEO.• CIO must tread carefully

– Firms must provide real-time disclosures of any events that may affect a firm’s stock price or financial performance.

– IT departments realized that they played a major role in ensuring the accuracy of financial data.

Dr. Chen, Information Systems

Frameworks for Implementing SoX -

COBIT

Dr. Chen, Information Systems

2009 ISACA All Rights reserved. 44

A Closer Look at

Dr. Chen, Information Systems

Frameworks for Implementing SoX - COBIT

• COBIT, initially an acronym for 'Control OBjectives for Information and related Technology' defines 34 generic processes to manage IT. Each process is defined together with process inputs and outputs, key process activities, process objectives, performance measures and an elementary maturity model.

• The framework supports governance of IT by defining and aligning business goals with IT goals and IT processes.

Dr. Chen, Information Systems

2009 ISACA All Rights reserved. 46

Harmonizing the Elements of IT Governance

IT Governance

ResourceManagement

Strate

gic

Alignm

ent ValueDelivery

Perfo

rmance

Measu

rem

ent

Ris

kM

anagem

ent

Dr. Chen, Information Systems

2009 ISACA All Rights reserved. 47

COBIT® Answers Key Business Questions

Is my information technologyorganization doing the right things?

Are we doing them the right way?

Are we getting them done well?

Are we getting the benefits? *

* Based on the “Four Ares” as described by John Thorp in his book The Information Paradox, written jointly with Fujitsu, first published in 1998 and

revised in 2003

Dr. Chen, Information Systems

Frameworks for Implementing SoX –

COBIT (cont.)

• The framework provides good practices across a domain and process framework.

• The process focus of COBIT is illustrated by a process model that subdivides IT into four domains (Plan and Organize, Acquire and Implement, Deliver and Support and Monitor and Evaluate) and 34 processes in line with the responsibility areas of plan, build, run and monitor.

Dr. Chen, Information Systems

2009 ISACA All Rights reserved. 49

The COBIT® Framework

[4]

[1]

[2]

[3]

Dr. Chen, Information Systems

Summary• Ethics - decisive action rooted in principles that express what is

right and important and about action that is publicly defensible and personally supportable.

• Three important normative theories describing business ethics are: Stockholder Theory, Stakeholder Theory and Social Contract Theory.

• PAPA is an acronym for the four areas in which control of information is crucial: privacy, accuracy, property, and accessibility.

• Issues related to the ethical governance of information systems are emerging in terms of the outward transactions of business that may impinge on the privacy of customers.

• Security looms as a major threat to Internet growth.• Sarbanes-Oxley Act (2002) - enacted to improve internal controls