SlideShare uma empresa Scribd logo
1 de 40
1
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
PERSONAL, LEGAL, ETHICAL,
AND ORGANIZATIONAL
ISSUES OF INFORMATION
SYSTEMS
CHAPTER 4
Hossein BIDGOLI
MIS
2
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
LO1 Describe information technologies that could be
used in computer crimes.
LO2 Review privacy issues and methods for improving
privacy of information.
LO3 Explain the effects of e-mail, data collection, and
censorship on privacy.
LO4 Discuss ethical issues of information technology.
LO5 Describe intellectual property principles and
infringement issues.
l e a r n i n g o u t c o m e s
3
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
LO6 Explain information system issues affecting
organizations, including the digital divide, electronic
publishing, and effects on the workplace and
employees’ health.
LO7 Discuss green computing and ways that it could help
improve the quality of the environment
l e a r n i n g o u t c o m e s (cont’d.)
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
4
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Risks Associated with Information Technologies
• Misuses of information technology
– Invade users’ privacy
– Commit computer crimes
• Minimize or prevent by:
– Installing operating system updates regularly
– Using antivirus software
– Using e-mail security features
5
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Cookies
• Cookies
– Small text files with a unique ID tag
– Embedded in a Web browser
– Saved on the user’s hard drive
• Can be useful or intrusive
• Many users disable cookies
– By installing a cookie manager
– Or using Web browser options
6
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Spyware and Adware
• Spyware
– Software that secretly gathers information about
users while they browse the Web
– Can be used maliciously
• Install antivirus or antispyware software
• Adware
– Form of spyware
– Collects information about the user to display
advertisements in the Web browser
7
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Phishing
• Phishing
– Sending fraudulent e-mails that seem to come from
legitimate sources
• Direct e-mail recipients to false Web sites
– To capture private information
8
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Keyloggers
• Keyloggers
– Monitor and record keystrokes
– Can be software or hardware devices
– Sometimes used by companies to track employees’
use of e-mail and the Internet
– Can be used for malicious purposes
• Some antivirus and antispyware programs
protect against software keyloggers
9
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Sniffing and Spoofing
• Sniffing
– Capturing and recording network traffic
– Often used by hackers to intercept information
• Spoofing
– Attempt to gain access to a network by posing as an
authorized user to find sensitive information
10
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Computer Crime and Fraud
• Computer fraud
– Unauthorized use of computer data for personal gain
• Social networking sites
– Used for committing computer crime
• Examples
– Denial-of-service attacks
– Identity theft
– Software piracy
– Distributing child pornography
– E-mail spamming
11
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Computer Crime and Fraud (cont’d.)
– Writing or spreading viruses, worms, Trojan
programs, and other malicious code
– Stealing file
– Changing computer records
– Virus hoaxes
– Sabotage
• Company insiders commit most computer crimes
12
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Internet Fraud Cost $559 Million in 2009
• Losses from cybercrime more than doubled in
2009
• They jumped from $265 million in 2008 to
$559.7 million
• Most of the complaints were about e-mail scams
and the non-delivery of merchandise or
payments
13
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Privacy Issues
• Concerns about privacy in the workplace
– Employers search social networking sites
– Employee monitoring systems
• Misuse and abuse of information gathered by:
– Healthcare organizations
– Financial institutions
– Legal firms
• Defining privacy is difficult
– Information technologies have increased ease of
access to information
14
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Social Networking Sites and Privacy Issues
• Stacy Snyder
– Former student at Millersville University of
Pennsylvania
– Posted a photo of herself on MySpace, wearing a
pirate’s hat and drinking
• Millersville administrators
– Considered the image unprofessional
– Refused to grant her an education degree and
teaching certificate
15
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Privacy Issues (cont’d.)
• Number of databases is increasing rapidly
• Enforcement of federal laws has been lax
• Index and link databases using Social Security
numbers
– Direct marketing companies are major users of this
information
• U.S. government began linking large databases
to find information
16
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Privacy Issues (cont’d.)
• Federal laws now regulate collecting and using
information on people and corporations
– 1970 Fair Credit Reporting Act
• Acceptable use policies
• Accountability
• Nonrepudiation
• Hardware or software controls
– Determine what personal information is provided on
the Web
17
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
E-mail
• Presents some serious privacy issues
• Spamming
– Unsolicited e-mail sent for advertising purpose
– Sent in bulk by using automated mailing software
• Ease of access
– People should assume that others could have access
to their messages
– Any e-mails sent on company-owned computers are
the property of the organization
18
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Statistics for E-mail and Spam in 2009
• 90 trillion – number of e-mails sent on the Internet
• 247 billion – average number of e-mail messages per
day
• 1.4 billion – number of e-mail users worldwide
• 100 million – new e-mail users from the year before
• 81% – percentage of e-mails that were spam
• 92% – peak spam levels late in the year
• 24% – increase in spam over previous year
19
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Data Collection on the Internet
• Number of people shopping online is increasing
• Some customers are reluctant to make online
purchases
– Concerns about hackers getting access to their credit
card numbers
– Many credit card companies reimburse fraudulent
charges
• Other electronic payment systems are being
developed
20
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Data Collection on the Internet (cont’d.)
• Concerned about computers’ contents being
searched while they’re connected to the Internet
• Information users provide on the Web
– Combined with other information and technologies to
produce new information
• Log files
– Generated by Web server software
– Record a user’s actions on a Web site
• Data collected on the Internet must be used and
interpreted with caution
21
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Ethical Issues of Information Technologies
• Ethics and ethical decision making
– Moral guidelines people or organizations follow in
dealing with others
– More difficult to determine than legal versus illegal
22
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Ethical Issues of Information Technologies (cont’d.)
• Information technology offers many
opportunities for unethical behavior
– Cybercrime, cyberfraud, identity theft, and intellectual
property theft
• Many associations promote ethically responsible
use of information systems and technologies
– Codes of ethics
• Quick ethics test
23
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Censorship
• Who decides what should be on the Internet?
• Types of information
– Public
– Private
• Whether or not something can be censored
depends in part on who is doing the censoring
• Restricted access to the Internet
– Burma, China, Singapore
• U.S. citizens don’t want the government
controlling Internet access
24
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Censorship (cont’d.)
• Parents are concerned about what their children
are exposed to
– Pornography, violence, and adult language
• Mistaken or mistyped URLs
• Search terms
• Guidelines to teach their children to use good
judgment while on the Internet
• Programs such as CyberPatrol, CyberSitter, Net
Nanny, and SafeSurf
25
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Intellectual Property
• Intellectual property
– Protections that involve copyrights, trademarks, trade
secrets, and patents for “creations of the mind”
developed by people or businesses
• Industrial property
– Inventions, trademarks, logos, industrial designs
• Copyrighted material
– Literary and artistic works
– May apply to online materials
– Exceptions under Fair Use Doctrine
26
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Intellectual Property (cont’d.)
• Trademark
– Protects product names and identifying marks
• Patent
– Protects new processes
– Advantages of patents
• Software piracy
• Laws
– Telecommunications Act of 1996
– Communications Decency Act (CDA)
– Laws against spamming
27
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Intellectual Property (cont’d.)
• Internet use policy
– Guard against legal issues and avoid the risks
• Cybersquatting
– Registering, selling, or using a domain name to profit
from someone else’s trademark
28
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Verizon’s Cybersquatting Suit
• Verizon sued OnlineNic
• OnlineNic registered domain names containing
Verizon trademarks
– myverizonwireless.com
– iphoneverizonplans.com
– verizon-cellular. com
• Verizon won this suit
29
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Social Divisions and the Digital Divide
• Digital divide
– Computers still aren’t affordable for many people
– Haves and have-nots
– Companies installing cables for Internet connections
might subject their communities to a type of
economic “red-lining”
• Children are often victims of this divide
– Funding for computers at schools and libraries
– Loaner programs
30
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
The Impact of Information Technology in the
Workplace
• New jobs for:
– Programmers
– Systems analysts
– Database and network administrators
– Network engineers
– Webmasters
– Web page developers
– e-commerce specialists
– Chief information officers (CIOs)
– Technicians
31
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
The Impact of Information Technology in the
Workplace (cont’d.)
• Web designers
• Java programmers
• Web troubleshooters
• Telecommuting and virtual work
• Job deskilling
– Skilled labor eliminated by introducing high
technology
– Job downgraded from a skilled to a semiskilled or
unskilled position
32
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Advantages and Disadvantages of Telecommuting
33
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
The Impact of Information Technology in the
Workplace (cont’d.)
• Job upgrading
– Clerical workers who now use computers
• One skilled worker might be capable of doing
the job of several workers
• Virtual organizations
– Networks of independent companies, suppliers,
customers, and manufacturers
– Connected via information technologies
– Share skills and costs
– Have access to each other’s market
34
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Information Technology and Health Issues
• Reports of health-related issues caused by video
display terminals (VDTs)
– No conclusive study
– Health problems associated with the environment in
which computers are used
35
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Information Technology and Health Issues (cont’d.)
• Other reports of health problems
– Vision
– Musculoskeletal
– Skin
– Reproductive
– Stress-related
• Amount of time some people spend on the Web
36
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Green Computing
• Green computing is computing that promotes a
sustainable environment and consumes the least
amount of energy
• Green computing involves the design,
manufacture, utilization, and disposal of
computers, servers, and computing devices
(such as monitors, printers, storage devices, and
networking and communications equipment) in
such a way that there is minimal impact on the
environment
37
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Ways to Pursue a Green Computing Strategy
• Designing products that last longer and are
modular in design so that certain parts can be
upgraded without replacing the entire system
• Designing search engines and other computing
routines that are faster and consume less
energy
• Replacing several underutilized smaller servers
with one large server using a virtualization
technique
38
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Ways to Pursue a Green Computing Strategy (cont’d.)
• Using computing devices that consume less
energy and are biodegradable
• Allowing certain employees to work from their
homes, resulting in fewer cars on the roads
• Replacing actual face-to-face meetings with
meetings over computer networks
• Using video conferencing, electronic meeting
systems, and groupware
39
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Ways to Pursue a Green Computing Strategy (cont’d.)
• Using a virtual world
• Using cloud computing
• Turning off idle PCs, recycling computer-related
materials, and encouraging car-pool and non-
motorized transportation for employees
40
MIS, Chapter 4
©2011 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
Summary
• Information technologies
– Affect privacy
– Can be used for computer crimes
– Privacy issues
– E-mail
– Censorship
• Organizational issues
– Digital divide
– Workplace impacts
– Health impact
– Green computing

Mais conteúdo relacionado

Semelhante a 9781111533960_PPT_ch04.ppt

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfAliMurat5
 
Chapter 4
Chapter 4 Chapter 4
Chapter 4 uabir
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docxtamicawaysmith
 
Chapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsChapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsVan Chau
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptRogerPrimo2
 
Ethical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptEthical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptAfricaRealInformatic
 

Semelhante a 9781111533960_PPT_ch04.ppt (20)

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
mischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdfmischapter4-130509184940-phpapp02.pdf
mischapter4-130509184940-phpapp02.pdf
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
Chapter 4
Chapter 4 Chapter 4
Chapter 4
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
 
Chapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systemsChapter 4 ethical and social issues in information systems
Chapter 4 ethical and social issues in information systems
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
MISch04
MISch04MISch04
MISch04
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Ethical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .pptEthical and Social Issues in the Digital Firm .ppt
Ethical and Social Issues in the Digital Firm .ppt
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
E commerce
E commerce E commerce
E commerce
 

Mais de KundanKumar17747 (6)

ppt4.pptx
ppt4.pptxppt4.pptx
ppt4.pptx
 
ppt3.pptx
ppt3.pptxppt3.pptx
ppt3.pptx
 
ppt1.pptx
ppt1.pptxppt1.pptx
ppt1.pptx
 
Bi analysis
Bi analysisBi analysis
Bi analysis
 
Theories.pptx
Theories.pptxTheories.pptx
Theories.pptx
 
Analysis.pptx
Analysis.pptxAnalysis.pptx
Analysis.pptx
 

Último

Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Hedda Bird
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...Pooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxSaqib Mansoor Ahmed
 

Último (20)

Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 

9781111533960_PPT_ch04.ppt

  • 1. 1 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI MIS
  • 2. 2 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems LO1 Describe information technologies that could be used in computer crimes. LO2 Review privacy issues and methods for improving privacy of information. LO3 Explain the effects of e-mail, data collection, and censorship on privacy. LO4 Discuss ethical issues of information technology. LO5 Describe intellectual property principles and infringement issues. l e a r n i n g o u t c o m e s
  • 3. 3 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning LO6 Explain information system issues affecting organizations, including the digital divide, electronic publishing, and effects on the workplace and employees’ health. LO7 Discuss green computing and ways that it could help improve the quality of the environment l e a r n i n g o u t c o m e s (cont’d.) Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
  • 4. 4 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Risks Associated with Information Technologies • Misuses of information technology – Invade users’ privacy – Commit computer crimes • Minimize or prevent by: – Installing operating system updates regularly – Using antivirus software – Using e-mail security features
  • 5. 5 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Cookies • Cookies – Small text files with a unique ID tag – Embedded in a Web browser – Saved on the user’s hard drive • Can be useful or intrusive • Many users disable cookies – By installing a cookie manager – Or using Web browser options
  • 6. 6 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Spyware and Adware • Spyware – Software that secretly gathers information about users while they browse the Web – Can be used maliciously • Install antivirus or antispyware software • Adware – Form of spyware – Collects information about the user to display advertisements in the Web browser
  • 7. 7 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Phishing • Phishing – Sending fraudulent e-mails that seem to come from legitimate sources • Direct e-mail recipients to false Web sites – To capture private information
  • 8. 8 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Keyloggers • Keyloggers – Monitor and record keystrokes – Can be software or hardware devices – Sometimes used by companies to track employees’ use of e-mail and the Internet – Can be used for malicious purposes • Some antivirus and antispyware programs protect against software keyloggers
  • 9. 9 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Sniffing and Spoofing • Sniffing – Capturing and recording network traffic – Often used by hackers to intercept information • Spoofing – Attempt to gain access to a network by posing as an authorized user to find sensitive information
  • 10. 10 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Computer Crime and Fraud • Computer fraud – Unauthorized use of computer data for personal gain • Social networking sites – Used for committing computer crime • Examples – Denial-of-service attacks – Identity theft – Software piracy – Distributing child pornography – E-mail spamming
  • 11. 11 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Computer Crime and Fraud (cont’d.) – Writing or spreading viruses, worms, Trojan programs, and other malicious code – Stealing file – Changing computer records – Virus hoaxes – Sabotage • Company insiders commit most computer crimes
  • 12. 12 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Internet Fraud Cost $559 Million in 2009 • Losses from cybercrime more than doubled in 2009 • They jumped from $265 million in 2008 to $559.7 million • Most of the complaints were about e-mail scams and the non-delivery of merchandise or payments
  • 13. 13 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Privacy Issues • Concerns about privacy in the workplace – Employers search social networking sites – Employee monitoring systems • Misuse and abuse of information gathered by: – Healthcare organizations – Financial institutions – Legal firms • Defining privacy is difficult – Information technologies have increased ease of access to information
  • 14. 14 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Social Networking Sites and Privacy Issues • Stacy Snyder – Former student at Millersville University of Pennsylvania – Posted a photo of herself on MySpace, wearing a pirate’s hat and drinking • Millersville administrators – Considered the image unprofessional – Refused to grant her an education degree and teaching certificate
  • 15. 15 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Privacy Issues (cont’d.) • Number of databases is increasing rapidly • Enforcement of federal laws has been lax • Index and link databases using Social Security numbers – Direct marketing companies are major users of this information • U.S. government began linking large databases to find information
  • 16. 16 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Privacy Issues (cont’d.) • Federal laws now regulate collecting and using information on people and corporations – 1970 Fair Credit Reporting Act • Acceptable use policies • Accountability • Nonrepudiation • Hardware or software controls – Determine what personal information is provided on the Web
  • 17. 17 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems E-mail • Presents some serious privacy issues • Spamming – Unsolicited e-mail sent for advertising purpose – Sent in bulk by using automated mailing software • Ease of access – People should assume that others could have access to their messages – Any e-mails sent on company-owned computers are the property of the organization
  • 18. 18 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Statistics for E-mail and Spam in 2009 • 90 trillion – number of e-mails sent on the Internet • 247 billion – average number of e-mail messages per day • 1.4 billion – number of e-mail users worldwide • 100 million – new e-mail users from the year before • 81% – percentage of e-mails that were spam • 92% – peak spam levels late in the year • 24% – increase in spam over previous year
  • 19. 19 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Data Collection on the Internet • Number of people shopping online is increasing • Some customers are reluctant to make online purchases – Concerns about hackers getting access to their credit card numbers – Many credit card companies reimburse fraudulent charges • Other electronic payment systems are being developed
  • 20. 20 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Data Collection on the Internet (cont’d.) • Concerned about computers’ contents being searched while they’re connected to the Internet • Information users provide on the Web – Combined with other information and technologies to produce new information • Log files – Generated by Web server software – Record a user’s actions on a Web site • Data collected on the Internet must be used and interpreted with caution
  • 21. 21 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Ethical Issues of Information Technologies • Ethics and ethical decision making – Moral guidelines people or organizations follow in dealing with others – More difficult to determine than legal versus illegal
  • 22. 22 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Ethical Issues of Information Technologies (cont’d.) • Information technology offers many opportunities for unethical behavior – Cybercrime, cyberfraud, identity theft, and intellectual property theft • Many associations promote ethically responsible use of information systems and technologies – Codes of ethics • Quick ethics test
  • 23. 23 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Censorship • Who decides what should be on the Internet? • Types of information – Public – Private • Whether or not something can be censored depends in part on who is doing the censoring • Restricted access to the Internet – Burma, China, Singapore • U.S. citizens don’t want the government controlling Internet access
  • 24. 24 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Censorship (cont’d.) • Parents are concerned about what their children are exposed to – Pornography, violence, and adult language • Mistaken or mistyped URLs • Search terms • Guidelines to teach their children to use good judgment while on the Internet • Programs such as CyberPatrol, CyberSitter, Net Nanny, and SafeSurf
  • 25. 25 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Intellectual Property • Intellectual property – Protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses • Industrial property – Inventions, trademarks, logos, industrial designs • Copyrighted material – Literary and artistic works – May apply to online materials – Exceptions under Fair Use Doctrine
  • 26. 26 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Intellectual Property (cont’d.) • Trademark – Protects product names and identifying marks • Patent – Protects new processes – Advantages of patents • Software piracy • Laws – Telecommunications Act of 1996 – Communications Decency Act (CDA) – Laws against spamming
  • 27. 27 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Intellectual Property (cont’d.) • Internet use policy – Guard against legal issues and avoid the risks • Cybersquatting – Registering, selling, or using a domain name to profit from someone else’s trademark
  • 28. 28 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Verizon’s Cybersquatting Suit • Verizon sued OnlineNic • OnlineNic registered domain names containing Verizon trademarks – myverizonwireless.com – iphoneverizonplans.com – verizon-cellular. com • Verizon won this suit
  • 29. 29 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Social Divisions and the Digital Divide • Digital divide – Computers still aren’t affordable for many people – Haves and have-nots – Companies installing cables for Internet connections might subject their communities to a type of economic “red-lining” • Children are often victims of this divide – Funding for computers at schools and libraries – Loaner programs
  • 30. 30 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems The Impact of Information Technology in the Workplace • New jobs for: – Programmers – Systems analysts – Database and network administrators – Network engineers – Webmasters – Web page developers – e-commerce specialists – Chief information officers (CIOs) – Technicians
  • 31. 31 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems The Impact of Information Technology in the Workplace (cont’d.) • Web designers • Java programmers • Web troubleshooters • Telecommuting and virtual work • Job deskilling – Skilled labor eliminated by introducing high technology – Job downgraded from a skilled to a semiskilled or unskilled position
  • 32. 32 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Advantages and Disadvantages of Telecommuting
  • 33. 33 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems The Impact of Information Technology in the Workplace (cont’d.) • Job upgrading – Clerical workers who now use computers • One skilled worker might be capable of doing the job of several workers • Virtual organizations – Networks of independent companies, suppliers, customers, and manufacturers – Connected via information technologies – Share skills and costs – Have access to each other’s market
  • 34. 34 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Information Technology and Health Issues • Reports of health-related issues caused by video display terminals (VDTs) – No conclusive study – Health problems associated with the environment in which computers are used
  • 35. 35 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Information Technology and Health Issues (cont’d.) • Other reports of health problems – Vision – Musculoskeletal – Skin – Reproductive – Stress-related • Amount of time some people spend on the Web
  • 36. 36 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Green Computing • Green computing is computing that promotes a sustainable environment and consumes the least amount of energy • Green computing involves the design, manufacture, utilization, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment
  • 37. 37 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Ways to Pursue a Green Computing Strategy • Designing products that last longer and are modular in design so that certain parts can be upgraded without replacing the entire system • Designing search engines and other computing routines that are faster and consume less energy • Replacing several underutilized smaller servers with one large server using a virtualization technique
  • 38. 38 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Ways to Pursue a Green Computing Strategy (cont’d.) • Using computing devices that consume less energy and are biodegradable • Allowing certain employees to work from their homes, resulting in fewer cars on the roads • Replacing actual face-to-face meetings with meetings over computer networks • Using video conferencing, electronic meeting systems, and groupware
  • 39. 39 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Ways to Pursue a Green Computing Strategy (cont’d.) • Using a virtual world • Using cloud computing • Turning off idle PCs, recycling computer-related materials, and encouraging car-pool and non- motorized transportation for employees
  • 40. 40 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Summary • Information technologies – Affect privacy – Can be used for computer crimes – Privacy issues – E-mail – Censorship • Organizational issues – Digital divide – Workplace impacts – Health impact – Green computing