Introduction to Information Technology 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. Implementing IT: Ethics, Impacts, and Security Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-1 Chapter Preview In this chapter, we will study: Types of ethical issues that arise in relation to information systems Impacts that information systems have had on organization, jobs, individuals, and society Various threats that may damage computer and information systems Ways to protect computer and information systems from hazards and threats Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-2 IT Ethical Issues Ethics – branch of philosophy that deals with what is considered to be right and wrong Code of ethics – principles that guide members of an organization Types of ethical issues Privacy – what is collected, stored, and shared about others Accuracy – what is done to assure authentic and accurate data Property – who owns intellectual property and how are they compensated for it Accessibility – who can obtain information Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-3 Privacy Issues Information privacy – the right to determine what information about oneself can be shared with others Electronic surveillance – computer users’ actions can be monitored without knowledge both at work and at home Storage of personal information in databases: What is stored? How can be we sure it’s accurate? Who will it be shared with? How will it be used? Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-4 Privacy Issues (continued) Many organizations are developing and enforcing privacy policies Internationally, countries vary widely regarding their concerns about privacy. Adds complexity to global commerce. Generally, an organization should… •Only collect data that can be obtained legally and fairly •Make sure data is accurate, complete, and kept up to date •Know why we are collecting data and be sure there is a reason to have it •Make sure data is used just for its intended purpose •Safeguard the data to ensure its quality •Enable those about whom we store data know what we plan to do with the data and can verify its accuracy Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-5 Intellectual Property Issues Intangible property created by people or organizations, protected by trade secret, patent, and copyright laws Trade secret – intellectual work - not public Patent – exclusive rights to invention granted to inventor for 20 years Copyright – creators of intellectual property granted ownership for their lives plus 50 years. Owners have right to collect fees for use. Software is generally copyrighted. What are the negative consequences of illegally copying software? Wide variation in the way different countries protect intellectual property – globalization issue Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-6 IT and Organizations IT has the potential to significantly change organizations. Structures can be flatter, eliminating middle layers, with broader span of control More extensive supervision is possible electronically, even for those working remotely Power shifts are likely as knowledge is captured, stored, and shared. Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-7 IT and Jobs Some jobs will be eliminated, especially intermediaries (e.g., travel agents) BPR will cause many jobs to be redesigned; more emphasis on computing capabilities Experience and seniority may become less important in job advancement Managers’ approach to decision making may change Computer-based communication skills may be more in demand Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-8 IT and Individuals Fears of dehumanization and loss of social contact Increasing workload and demand for computer skills can be threatening Certain aspects of using computers can be physically damaging Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-9