Introduction to Information Technology Implementing IT: Ethics, Impacts, and Security 2

advertisement
Introduction to Information Technology
2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Implementing IT: Ethics, Impacts, and
Security
Prepared by:
Roberta M. Roth, Ph.D.
University of Northern Iowa
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-1
Chapter Preview
 In this chapter, we will study:
Types of ethical issues that arise in relation to
information systems
Impacts that information systems have had on
organization, jobs, individuals, and society
Various threats that may damage computer
and information systems
Ways to protect computer and information
systems from hazards and threats
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-2
IT Ethical Issues
 Ethics – branch of philosophy that deals with
what is considered to be right and wrong
 Code of ethics – principles that guide members of
an organization
 Types of ethical issues
 Privacy – what is collected, stored, and shared about
others
 Accuracy – what is done to assure authentic and
accurate data
 Property – who owns intellectual property and how
are they compensated for it
 Accessibility – who can obtain information
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-3
Privacy Issues
 Information privacy – the right to
determine what information about oneself
can be shared with others
 Electronic surveillance – computer users’
actions can be monitored without
knowledge both at work and at home
 Storage of personal information in
databases:
 What is stored? How can be we sure it’s
accurate? Who will it be shared with? How
will it be used?
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-4
Privacy Issues (continued)
 Many organizations are developing and
enforcing privacy policies
 Internationally, countries vary widely regarding
their concerns about privacy. Adds complexity
to global commerce.
 Generally, an organization should…
•Only collect data that can be obtained legally and fairly
•Make sure data is accurate, complete, and kept up to date
•Know why we are collecting data and be sure there is a reason to
have it
•Make sure data is used just for its intended purpose
•Safeguard the data to ensure its quality
•Enable those about whom we store data know what we plan to do
with the data and can verify its accuracy
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-5
Intellectual Property Issues
 Intangible property created by people or
organizations, protected by trade secret, patent,
and copyright laws
 Trade secret – intellectual work - not public
 Patent – exclusive rights to invention granted to
inventor for 20 years
 Copyright – creators of intellectual property granted
ownership for their lives plus 50 years. Owners have
right to collect fees for use. Software is generally
copyrighted.
 What are the negative consequences of illegally
copying software?
 Wide variation in the way different countries protect
intellectual property – globalization issue
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-6
IT and Organizations
 IT has the potential to significantly change
organizations.
 Structures can be flatter, eliminating middle
layers, with broader span of control
 More extensive supervision is possible
electronically, even for those working
remotely
 Power shifts are likely as knowledge is
captured, stored, and shared.
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-7
IT and Jobs
 Some jobs will be eliminated, especially




intermediaries (e.g., travel agents)
BPR will cause many jobs to be redesigned;
more emphasis on computing capabilities
Experience and seniority may become less
important in job advancement
Managers’ approach to decision making
may change
Computer-based communication skills
may be more in demand
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-8
IT and Individuals
 Fears of dehumanization and loss of social
contact
 Increasing workload and demand for
computer skills can be threatening
 Certain aspects of using computers can be
physically damaging
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-9
Download