Social, Ethical, & Legal Issues in ISs CHAPTER 4 (U PDATED N O V . 26, 2013 ) Ethics 2 Principles of right & wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours* Not the same as legal, but frequently, actions that are unethical are also illegal – and not everything that is illegal is unethical* Digital Law – new, expanding** Chapter 4 MIS 2000 A Metaphor for Thinking about Ethical, Social, & Political Issues 3 • Society as a calm pond • IT as a rock dropped in pond, creating ripples of new situations not covered by old rules • Social & political institutions cannot respond overnight to these ripples — it may take years to develop etiquette, expectations, laws • Requires understanding of ethics to make choices in legally grey areas Chapter 4 MIS 2000 Five Moral Dimensions of the Information Age 4 • Information rights & obligations • Property rights & obligations • Accountability & control • System quality • Quality of life Chapter 4 MIS 2000 The Relationship among Ethical, Social, & Political Issues in an Information Society 5 Chapter 4 MIS 2000 Technology Trends that Raise Ethical Issues 6 Chapter 4 MIS 2000 Nonobvious Relationship Awareness 7 Chapter 4 MIS 2000 Basic Concepts: Responsibility, Accountability, Liability 8 Responsibility: Accepting the potential costs, duties, & obligations for decisions Accountability: Methodology for identifying responsible parties Liability: Permits individuals to recover damages done to them Due process: Laws are well known & understood, with an ability to appeal to higher authorities Chapter 4 MIS 2000 Ethical Analysis 9 1. Identify & clearly describe the facts 2. Define the conflict or dilemma, & identify the higher-order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the consequences of your options Chapter 4 MIS 2000 Candidate Ethical Principles 10 1. Golden Rule: Do unto others as you would have them do unto you. http://en.wikipedia.org/wiki/Golden_Rule 2. 3. Immanuel Kant’s Categorical Imperative: If an action is not right for everyone to take, then it is not right for anyone Descartes’ rule of change: If an action cannot be taken repeatedly, then it is not right to be taken at any time Chapter 4 MIS 2000 Candidate Ethical Principles #2 11 4. 5. 6. Utilitarian Principle: Take the action that achieves the greatest value for all concerned Risk Aversion Principle: Take the action that produces the least harm or incurs the least cost to all concerned Ethical “no free lunch” rule: Assume that all tangible & intangible objects are owned by someone else, unless there is a specific declaration otherwise Chapter 4 MIS 2000 Privacy in the Internet Age 12 Privacy: Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. Ethical (cultural) norms with legal backing. Personal Information Protection & Electronic Documents Act (PIPEDA) establishes principles for collection, use, & disclosure of personal data* Provinces have parallel legislation Chapter 4 MIS 2000 Internet Challenges to Privacy 13 Internet facilitates tracking of online activities (e.g., cookies are used to trace Web site visits)* Web bugs & spyware can install automatically Opt-in versus opt-out models of informed consent (e.g., filling in online profiles in order to get access to some documents or software) Chapter 4 MIS 2000 Cookies 14 Figure 4-3 Chapter 4 MIS 2000 Privacy Policies 15 Figure 4-4 Chapter 4 MIS 2000 How Google Uses the Data It Collects 16 Chapter 4 MIS 2000 Technical Solutions 17 Platform for Privacy Preferences (P3P) Enables automatic communication of privacy policies between an ecommerce site & its visitors Privacy policy can become part of the page’s software Figure 4-4 Chapter 4 MIS 2000 Intellectual Property Rights 18 • Intellectual property is intangible property created by individuals or corporations • Protected by: • • • Chapter 4 Trade secrets Copyright Patents MIS 2000 Trade Secrets 19 Intellectual work or product belonging to a business and not found in the public domain Supreme Court test for breach of trade secrets: 1. Communications must be labelled “confidential” 2. Communicated content must have been misused by the receiver 3. Effects must have been harmful to the complainant Chapter 4 MIS 2000 Copyright 20 Statutory grant protecting intellectual property from being copied for at least 50 years Canadian copyright law protects original literary, musical, artistic, & dramatic works. It also includes software & prohibits copying of entire programs or their parts. NOTE: This week, the US Congress began entertaining a bill to reduce copyright to 50 years from 70. Chapter 4 MIS 2000 Patent 21 A grant to the creator of an invention giving the owner an exclusive monopoly on the ideas behind an invention for between 17 & 20 years Patent law grants a monopoly on underlying concepts & ideas of software Originality, novelty, & invention are key concepts Chapter 4 MIS 2000 Challenges to Intellectual Property Rights 22 Perfect digital copies cost almost nothing Sharing of digital content over the Internet costs almost nothing Sites, software, & services for file trading are not easily regulated A Web page may present data from many sources & may incorporate framing Chapter 4 MIS 2000 Accountability, Liability, & Control 23 • Computer-related liability problems • System quality • Data quality & system errors • No software is perfect, errors will be made, even if the errors have a low probability of occurring • Software developers knowingly ship “buggy” products • At what point should software be shipped? Chapter 4 MIS 2000 Accountability, Liability, & Control 24 Quality of life: Equity, access, & boundaries (continued) • • • Computer crime & abuse (stealing data vs. using work computer for private purposes) Employment: Trickle-down technology & reengineering job loss impact Equity & access: Increasing racial & social class divisions • • AKA The Digital Divide Health risks: RSI, CVS, & technostress Chapter 4 MIS 2000 Mason’s PAPA Model 25 Property: Whose property is it anyway? Do NOT pirate anything! Accuracy: How accurate does it need to be? Think of the Hubble Space Telescope. Privacy: Do you want everything about you to be public knowledge? How can you protect your privacy? (The Globe & Mail test, the Mama test) Access: Who should have access? Equity of access within a business. Do not omit staff from access if they need access. Chapter 4 MIS 2000 Brabston’s Extension to Mason’s PAPA Equity 26 Layoffs: These are people’s lives, not statistics! Access to IT: For an equitable society & one that trains everyone in certain fundamental skills, everyone must have access to appropriate hardware, software, & networks Access to computer literacy: Everyone must understand how to use a computer & the Internet Access to informing literacy: Everyone should understand what information is valid, reliable, consistent, accurate, appropriate, etc. --? Chapter 4 MIS 2000