Laudon Mis17e LN 04

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 20

Management Information Systems, 17E

Laudon & Laudon

Lecture Files

Chapter 4 Ethical and Social Issues in Information Systems

It probably goes without saying that the security and ethical issues raised by the Information Age, and
specifically the Internet, are the most explosive to face our society in decades. It will be many years and many
court battles before socially acceptable policies and practices are in place.

You say to yourself, “Hey, I don’t really care about my online privacy. Nobody will ever care about what I do
or where I go on the Internet.” Well, you might want to think twice about that. The article below explains how
online personal information can directly affect you:

“If you're looking for a job, you might want to think twice about posting that suggestive photo of
you double-fisting margaritas on a booze cruise. More than half of employers (57 percent) that
check job candidates' social media say they've seen content that has caused them to eliminate a
person as a job contender, according to new research from CareerBuilder.
The top three turnoffs are provocative or inappropriate content (40 percent), posts about drinking
or using drugs (36 percent), and discriminatory comments (31 percent).
In 2006, when CareerBuilder first began tracking whether employers were making social media
checks, just 12 percent of companies were using them as a screening tool. By 2010, that figure
had grown to 25 percent and now stands at 70 percent. And based on the survey, the scrutiny
continues after you're hired: 48 percent of respondents say they monitor current employees'
social media activity.” (“Employers check your social media before hiring. Many then find
reasons not to offer you a job,” CNBC.com, O’Brien, Sarah, Aug 10, 2018)

Ethical, social, and privacy issues are important to everyone.

4.1 What ethical, social, and political issues are raised by information systems?

You may love the idea that a gardening website or a mail order catalog gives you information about what grows
best in your backyard (literally your backyard). You might even love the idea that you can sign on to
Amazon.com, have the website greet you by name, and supply you with information about a book or CD by
your favorite author or artist. If you’re not especially interested in Stephen King or Frank Sinatra, don’t worry;
Amazon.com knows that and won’t bother you with products from those artists.

You are 22 years old, drive a Mazda, like hip-hop music, shop at Macy’s at least once a month around the 15th,
wear a size 10 dress, live in a small two-bedroom apartment, have friends or relatives who live in Texas, like
eating at Red Lobster, go on a skiing trip to Colorado every Spring Break, missed one semester of school last
year due to medical problems, and spend lots of time on your Facebook page. Would it surprise you to know
that this information and more can all be gleaned from various computer records?

4-1
Copyright © 2022 Pearson Education, Inc.
A lot of personal information about us has always been available, just not as easily and as readily as today.
Massive databases maintained by commercial companies and governments at all levels now allow profiling like
the above to be accomplished easier and faster than ever before.

Even though the Internet is about 50 years old and the World Wide Web is 30 years old, our society is just
beginning to address the ethical issues and dilemmas raised by these technological advances. It’s difficult to
measure one person’s ethics against another person’s desire to make money or wreak the type of havoc made
much easier by the Internet. Even though the U.S. government has passed some laws to control criminal
behavior and ethical issues associated with the Internet, it’s difficult to stay one step ahead of the ever-changing
technology.

A Model for Thinking About Ethical, Social, and Political Issues

Many of these issues not only touch our society as a whole, but also raise lots of questions for organizations,
companies, and the workplace in general. We hear arguments for free speech, personal responsibility, and
corporate responsibility. There are discussions about the government’s role in all this. At the beginning of
Chapter 4, Laudon says: “Suddenly individual actors are confronted with new situations often not covered by
the old rules. Social institutions cannot respond overnight to these ripples.... Political institutions also require
time before developing new laws and often require the demonstration of real harm before they act. In the
meantime, you may have to act. You may be forced to act in a legal ‘gray area.’”

How you act, individually and as groups, in this gray area may well define the future of our society. Though
that may sound a bit dramatic, you must understand that you are part of the development of “acceptable usage”
of this new medium and will help define the direction in which it goes.

Figure 4.1: The Relationship between Ethical, Social, and Political Issues in an Information Society

Figure 4.1 shows the relationship between ethical, social, and political issues in an information society. You
could change this diagram somewhat to avoid the impression that the five dimensions are separate. You’d show
significant overlap of each area, and most of the diagram would be in shades of gray.
4-2
Copyright © 2022 Pearson Education, Inc.
Five Moral Dimensions of the Information Age

The five dimensions we’ll discuss are: information rights and obligations, property rights and obligations,
accountability and control, system quality, and the quality of life. They all apply in today’s business
environment. Although these dimensions have existed in some form or another for years, they are made more
important with the technological advances we’ve seen in the last ten years.

Key Technology Trends that Raise Ethical Issues

Information technologies pose problems and threats to established societal rules, and technological advances
pose new situations and possible threats to privacy and ethics.

In addition to the technologies described in Table 4.2, you need to understand the most recent technological
threats to your privacy in cyberspace as explained by the Electronic Privacy Information Center
(www.epic.org).
EPIC is an organization devoted to privacy issues associated with the use of new technologies tied to networks
in general, and the Internet specifically. It is one of the premier organizations dedicated to preserving the
privacy of the American citizen. If you haven’t visited the website, you should.
 

1. Following reports that Google installed secret listening devices in the homes security product Nest,
EPIC asked the Federal Trade Commission to require Google to spin-off Nest and to disgorge the
data obtained from Nest users. It is a federal crime to intercept private communications or to plant a
listening device in a private residence. In 2014, EPIC filed a complaint with the Commission
regarding a related merger review and noted specifically that the "Commission clearly failed to
address the significant privacy concerns presented in the Google acquisition of Nest." EPIC also said
at the time that the "early termination" approval of the Google/Nest merger was surprising given the
Commission's extensive consideration of the Google acquisition of DoubleClick. Both the Senate
Commerce Committee and the House Energy and Commerce Committee have expressed interest in
merger review in the tech industry. (Feb. 20, 2019)

4-3
Copyright © 2022 Pearson Education, Inc.
2. A New York Times investigation revealed that Facebook had deals with companies giving them
access to personal data without meaningful user consent. These companies include Amazon, Sony,
Microsoft, Yahoo, Spotify, and Netflix, as well as two companies considered security threats to the
U.S.: Chinese smartphone manufacturer Huawei and Russian search engine Yandex. The deals
Facebook made gave companies broad access to user data, including the ability to read users’ private
messages and access friend lists. EPIC and several consumer privacy organizations helped establish
the 2011 consent order against Facebook, following a public campaign, and extensive complaints in
2009 and 2010. In March 2018, the FTC said it would reopen the Facebook investigation, but there
is still no report, no findings, and no fine. In response to EPIC's Freedom of Information Act
lawsuit, the FTC has released agency emails about the 2011 Facebook Consent Order. Several
related EPIC complaints regarding Facebook are also pending at the FTC, including facial
recognition. (Dec. 20, 2018)

3. In October 2018, the Federal Trade Commission finalized a settlement with Uber after the company
failed to implement reasonable security measures and allowed employees to access customers'
personal information. Because of Uber's lax security practice, the company was breached twice,
exposing vast amounts of sensitive information. The settlement follows on the heels of Uber's
settlement with the attorney generals of all fifty states and the District of Columbia for failing to
notify users of Uber's second breach in 2016. EPIC has previously pursued successful FTC
complaints concerning Google, Facebook, WhatsApp, and Snapchat. EPIC recently filed an FTC
complaint to stop Google from tracking in-store purchases. (Oct. 2018)

4. Following a report that Google tracks user location even when users opt-out, EPIC wrote to the FTC
that Google violated the 2011 consent order. EPIC said "Google's subsequent changes to its policy,
after it has already obtained location data on Internet users, fails to comply with the 2011 order."
EPIC also told the FTC that "The Commission's inactions have made the Internet less safe and less
secure for users and consumers." The 2011 settlement with Google followed a detailed complaint
brought by EPIC and a coalition of consumer organizations. The groups charged that Google had
engaged in unfair and deceptive trade practices when it changed the privacy settings of Gmail users
and opted them into Google Buzz. The FTC agreed with the consumer groups, Google entered into a
settlement and Buzz was shuttered. FTC chairman John Liebowitz said at the time, "When
companies make privacy pledges, they need to honor them. This is a tough settlement that ensures
that Google will honor its commitments to consumers and build strong privacy protections into all of
its operations." (Aug. 17, 2018)

The scenario at the beginning of this section about profiling is possible through the technique called data
mining. Add to that the capabilities of nonobvious relationship awareness (NORA) data analysis technology,
as shown in Figure 4.2, and complete strangers might know just as much about you as you do. It can and has
been done. So, you should be concerned and you should care.

4-4
Copyright © 2022 Pearson Education, Inc.
Figure 4.2: Nonobvious Relationship Awareness (NORA)

According to Louis Wheeler who writes for 888casino.com blog, nonobvious relationship awareness software is
even used as one of the main tools for casino security systems. The software is used to help identify cheaters by
doing “background checks on anyone that looks suspicious. NORA is usually used to identify relationships
between known cheaters and possible accomplices, but it can also be used to determine if any guest has a
criminal record.”

The data-gathering activities of the U.S. government, Internet Service Providers, and other technology
companies were splashed across front page headlines in June 2013 when Edward Snowden revealed
details about the National Security Agency (NSA) PRISM program. Regardless of whether Snowden
ultimately is declared a traitor or a hero, one thing is for sure: your data are gathered wherever you go
and whatever you do online and on the telephone.

Since the Guardian and The Washington Post revealed the existence of the NSA’s PRISM
program last week, there’s been a confusing debate about what exactly the program is and how it
works. While the Obama administration has tacitly acknowledged the program’s existence, tech
companies have angrily denied that they had given the NSA “direct” or “unfettered” access to
their servers.

We know that PRISM is a system the NSA uses to gain access to the private communications of
users of nine popular Internet services. We know that access is governed by Section 702 of the
Foreign Intelligence Surveillance Act, which was enacted in 2008. Director of National
Intelligence James Clapper tacitly admitted PRISM’s existence in a blog post last Thursday. A
classified PowerPoint presentation leaked by Edward Snowden states that PRISM enables
“collection directly from the servers” of Microsoft, Yahoo, Google, Facebook and other online
companies.

What do the Internet companies who allegedly participate in this program have to say
about it?

4-5
Copyright © 2022 Pearson Education, Inc.
In a Friday post titled “What the …?” Google CEO Larry Page stated that “any suggestion that
Google is disclosing information about our users’ Internet activity on such a scale is completely
false.”

In a weekend follow-up, Google chief architect Yonatan Zunger wrote that “the only way in
which Google reveals information about users are when we receive lawful, specific orders about
individuals.” He said that “it would have been challenging—not impossible, but definitely a
major surprise—if something like this could have been done without my ever hearing of it.” He
said that even if he couldn’t talk about such a program publicly, he would have quit Google
rather than participate. “We didn’t fight the Cold War just so we could rebuild the Stasi
ourselves,” he concluded.

“The notion that Yahoo! gives any federal agency vast or unfettered access to our users’ records
is categorically false,” wrote Yahoo’s Ron Bell on Saturday. “Of the hundreds of millions of
users we serve, an infinitesimal percentage will ever be the subject of a government data
collection directive.”

The Times says that major tech companies have systems that “involve access to data under
individual FISA requests. And in some cases, the data is transmitted to the government
electronically, using a company’s servers.” (Washington Post.com, “Here’s everything we know
about PRISM to date,” Timothy B. Lee,
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/12/heres-everything-we-know-
about-prism-to-date/, June 12, 2013.)

Bottom Line: Technological trends are posing new situations and questions we haven’t had to deal with
before. As it’s your world and your future, you should be concerned and become involved in their
resolution.

4.2 What specific principles for conduct can be used to guide ethical decisions?

Did you ever hear the old warning: “Just because you can, doesn’t mean you should”? Well, a lot of things are
possible on the Internet nowadays, but that doesn’t mean you should do them.

Ethics is easily managed in small groups because the group itself tends to control the individual’s behavior. It’s
referred to as “self-policing.” The larger the group, the harder it is to manage the actions of individuals. Now
stretch that to a huge number of people with many frames of reference and experiences. Responsibility to the
group becomes harder to police and accountability for an individual’s actions is harder to enforce.

Basic Concepts: Responsibility, Accountability, and Liability

Every action causes a reaction. When you’re using the Internet, computers on campus, or your employer’s
computer, you should be aware of the following:
 Responsibility: Accepting potential costs, duties, and obligations for your decisions.
 Accountability: Determining who should take responsibility for decisions and actions.
 Liability: Legally placing responsibility with a person or group.
 Due Process: Ensuring the laws are applied fairly and correctly.
4-6
Copyright © 2022 Pearson Education, Inc.
Responsibility, accountability, and liability are all yours when it comes to your actions in cyberspace. Every
Internet Service Provider has a “usage policy,” even the so-called anonymous emailers that hide your real
identity. Gmail is a popular Internet email service that allows you to mask your real identity. You could send
out all the, shall we say unethical, threatening, nasty, aberrant, email you like. You think: “Hey, no one will
really know who I am. This is cool.”

And then here comes the message from Gmail to cease and desist. Your free email account is cancelled because
you violated Gmail’s usage policy. Then your local Internet Service Provider contacts you and tells you you’re
terminated. You violated its usage policy by your actions. By now you’re really mad, not to mention
embarrassed (at least we hope so). It’s true. It happens.

Just because you think you can, doesn’t mean you should. Would you stand in the middle of campus and shout
insults? Laudon and Laudon point out, “Using information technology in a socially responsible manner means
that you can and will be held accountable for the consequences of your actions.” Just as you are subject to rules,
whether you like them or not, on Main Street, USA, in public, you are subject to societal rules in cyberspace.
Anonymity isn’t a license for socially unacceptable behavior. Nor is anonymity a license for intentionally or
unintentionally hurting someone else, physically or emotionally.

Some people seem to absolve themselves of responsibility by putting the onus on the computer—“Hey, the
computer screwed up” or “Because it was an anonymous username, I didn’t think I’d get caught.” It just
doesn’t work that way in society—face-to-face or on the Internet. No one can hide behind the technology.
Humans control the computers, not the other way around.

And if you have received threatening, aberrant emails or flames in chatroom or discussion groups, and haven’t
reported them according to the usage policies, you may be as much a part of the problem as the perpetrator!

Ethical Analysis

It’s safe to say you’ll find yourself in situations where your ethics are continually challenged online and offline.
What should you do? Try the following:
 Separate fact from fiction.
 Remember, no matter how thin you slice it, there’s always two sides.
 Determine who’s really involved.
 Compromise; it doesn’t always have to be an “either-or” outcome.
 Anticipate the outcome; it will help you devise better solutions.

You should study the ethical principles outlined in the text, as we’ll be incorporating them into the discussions
throughout the remainder of this chapter.

Candidate Ethical Principles

In the early days of the Internet, just about anything was acceptable. The phrase “Wild Wild Web” was an
appropriate cliché. But as the technology has become more mainstream, the less wild the web has become.

4-7
Copyright © 2022 Pearson Education, Inc.
The principles listed in the text are deeply rooted in cultures around the world. We seriously doubt the authors
of these guidelines had the Internet in mind when they developed them. But, when you think about it, they
work nicely, even in cyberspace!

1. Do unto others as you would have them do unto you.


2. If an action is not right for everyone, perhaps it’s not right for anyone.
3. If an action cannot be taken repeatedly, it is not right to take at all.
4. Take the action that achieves the higher or greater value.
5. Take the action that produces the least harm or the least potential cost.
6. Assume that virtually all tangible and intangible objects are owned by someone else unless there is a
specific declaration otherwise.

Professional Codes of Conduct

Most professional organizations have a code of conduct by which they expect their members to abide. The
Association of Computing Machinery (www.acm.org) has an excellent set of standards that apply to all of us,
whether we belong to ACM or not.

Some Real-World Ethical Dilemmas

Individuals, companies, and corporations are being forced to deal with these new ethical and social issues in
ways never before imagined. Employ the ethical analysis we just discussed to the real-world situations
presented here and in the text.

No issue has been harder for organizations to deal with than that of email. Should companies be allowed to read
employees’ emails, especially if they are personal? Should employees be allowed to send personal emails to
begin with? Should emails be used against a person or company in a court of law. If so, how? An example of
this issue is the Microsoft vs Department of Justice antitrust trial that occurred in the mid-2000s. Many
emails written by Microsoft’s executives were used against them during the trial. Emails are not as anonymous
as people think..

In your opinion, what is right?

Is it okay for an employee to download the latest picture from Playboy’s website and use it as a screensaver? Is
it okay to run a personal commercial website from your workplace computer using the company’s computer
resources? Is it okay to email discriminatory jokes over the company’s network that wouldn’t be allowed over
the water cooler? Is it okay to send email telling everyone that the boss is a jerk, then get mad when the
company fires you?

Is it okay for the company to use technology to monitor your computer usage every minute you’re on the job?
Is it okay for the company to use technology to monitor your keystrokes so they can determine how much work
you’re doing?

What if Susie is using her computer to surf gardening websites three hours a day while you have to do her
work? What if Joe and Sam play the newest Internet game during their coffee break every morning and
afternoon, which bogs down the entire company’s network?

4-8
Copyright © 2022 Pearson Education, Inc.
What is the best way for companies and employees to handle these situations? What is the right thing to do?

Bottom Line: Ethics in an information society holds each person responsible for his or her actions. Each
person is accountable for everything he or she does, no matter how anonymous the action may seem.
Each person is liable for the consequences his or her actions may inflict on other people and society as a
whole.

4.3 Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?

This section examines the five moral dimensions (information rights; property rights; accountability, liability,
and control; system quality; and the quality of life) by asking you to examine them from a personal standpoint.

Information Rights: Privacy and Freedom in the Internet Age

Many of us take our privacy and freedom for granted. You should be aware of how technology is changing and
challenging our basic assumptions about these issues.

Video rental records are more protected from misuse and prying than are some of your financial records. We all
assume that the Constitution guarantees our personal privacy and freedom from surveillance. If someone set up
a video camera inside your dorm room or on your front porch to monitor your every movement, what would
you do? In some cases, that’s similar to what happens when you access some websites. So how do we protect
our privacy and freedom from surveillance in a high-tech world?

The text provides some information regarding privacy rights protected by law and established practices. But
before you jump up and say, “Hey, the Privacy Act of 1974 says you can’t spy on me,” remember that law
applies only to the federal government’s actions. If Macy’s or Playboy or Buy.com wants to collect information
about your surfing habits and sell it to other companies, there is nothing to stop them. Absolutely nothing!

This whole issue doesn’t bother some people at all. In fact, they don’t even think about it. The issue doesn’t
bother others until the intrusions are used against them. Think about this: If information is supposedly collected
for one purpose, is it ethical for that information to be used for a totally different purpose without you knowing
it? Is it fair to require you to provide medical information that is primarily intended to be used to pay your
insurance bills and then have that same information used against you when the insurance company deems you
too expensive and cancels your policy? Is it fair to have that same information used against you in denying you
employment because you’re too expensive to hire?

Information about people’s moment-to-moment thoughts and actions, as revealed by their online
activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com,
information detailing a web surfer’s activity there is likely to be auctioned on the data exchange
run by Oracle’s BlueKai.

Each day, BlueKai sells millions of pieces of information like this about specific individuals’
browsing habits, for as little as a tenth of a cent apiece. The auctions can happen instantly, as a
website is visited.

4-9
Copyright © 2022 Pearson Education, Inc.
Targeted ads can get personal. Julia Preston, a 32-year-old education-software designer in
Austin, Texas, researched uterine disorders online. Soon after, she started noticing fertility ads
on sites she visited. She now knows she doesn’t have a disorder, but still gets the ads. It’s
“unnerving,” she says.

Consumer tracking is the foundation of an online advertising economy that racked up $23 billion
in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and
Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular
sites, up from 40% of those sites in 2005.

The Journal found tracking files that collect sensitive health and financial data. On Encyclopedia
Britannica Inc.’s dictionary website Merriam-Webster.com, one tracking file from Healthline
Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it
sees there. So, for example, a person looking up depression-related words could see Healthline
ads for depression treatments on that page—and on subsequent pages viewed on other sites.
(“The Web’s New Gold Mine: Your Secrets,” Wall Street Journal, Angwin, Julia, July 30, 2010)

The federal government is taking steps to help protect individual privacy in the United States by passing laws
based on Fair Information Practices (FIP) as you can see in Table 4.3. However, the wheels of government
turn slowly, and the first line of defense should be yours.

The Federal Trade Commission has stepped up their efforts to protect consumers’ personal information on the
Internet. An excerpt from their website explains their mission.
Privacy is a central element of the FTC’s consumer protection mission. In recent years, advances
in computer technology have made it possible for detailed information about people to be
compiled and shared more easily and cheaply than ever. That has produced many benefits for
society as a whole and individual consumers. For example, it is easier for law enforcement to
track down criminals, for banks to prevent fraud, and for consumers to learn about new products
and services, allowing them to make better-informed purchasing decisions. At the same time, as
personal information becomes more accessible, each of us—companies, associations,
4-10
Copyright © 2022 Pearson Education, Inc.
government agencies, and consumers— must take precautions to protect against the misuse of
our information. (www.ftc.gov/privacy)
The FTC added three practices to its framework for privacy that firms should follow:
 Adopt “privacy by design”
 Increase transparency of their data practices
 Require consumer consent and provide opt-out options from data collection schemes

The FTC also extended its FIP doctrine to behavioral targeting practices used by advertisers and
marketers. Privacy advocates want all data gathering to be at the discretion of users with opt-in policies.
Not surprisingly advertisers oppose that idea, preferring to set only opt-out requirements.

The European Directive on Data Protection

European countries have much stricter restrictions on gathering data about private individuals, on the Internet
or elsewhere. European citizens have the right to deny the initial collection of information through informed
consent principles. They have the right to know and deny the use of data for purposes other than its original
intention. They have the right to inspect and correct any data gathered on them. By way of comparison,
Europeans practice opt-in whereas Americans practice opt-out. So far, American citizens have none of these
rights. American businesses physically operating in European countries or transacting business with European
citizens via the Internet must abide by these laws. The U.S. Department of Commerce is helping make it easier
by establishing safe harbor mechanisms rather than passing laws. You have to ask the question, “If it’s good
enough for the Europeans, why isn’t it good enough for the Americans?”.

In addition to the restrictions already in place throughout the European Union, it introduced the General Data
Protection Regulation (GDPR) that requires unambiguous consent to use personal data for purposes of
tracking individuals across the web and limits the use of data for purposes other than those for which it was
collected. Major companies like Facebook, Google, and Microsoft are required to reengineer some of their
standard practices for collecting data to comply with the new law.

Internet Challenges to Privacy

Under pressure from privacy advocates, government agencies, and the general public, many websites now post
privacy policies. Some sites make their policies obvious and others don’t. Some sites actually abide by their
policies and others don’t.

How do these organizations gather the information? By using cookies, a part of every browser program. If you
have Internet access and have ever visited a website, you can bet you have a cookie file on your computer. The
website www.w3techs.com reported in March 2019 that 46.1% of all websites use cookies to track user
activities. Of those websites who use cookies, 91.3% are non-secure cookies.

Most of the data in cookie files are unintelligible to you. However, they give information to websites about how
you prefer the website to be configured, who you are, which website you came from, what you do while on a

4-11
Copyright © 2022 Pearson Education, Inc.
site, and other information pertinent to the website. You can turn off the cookie option in your browser, but
many sites won’t let you access special features if you do.

Because the corporate world is demanding better results for the dollars spent on Internet advertising, some
websites have developed web beacons to help track users and determine what they do and don’t do on the
Internet. Web beacons are tiny, indistinguishable files embedded within a web page or within an email
message. The beacon monitors your behavior as you use the page and combines the information with other data
collected about you to get a more robust picture of how you are using the web site and how effective the
advertising is.

Cookies are typically used by tracking companies to build lists of pages visited from a specific
computer. A newer type of technology, beacons, can watch even more activity. Beacons, also
known as “web bugs” and “pixels,” are small pieces of software that run on a web page. They
can track what a user is doing on the page, including what is being typed or where the mouse is
moving.
The majority of sites examined by the Journal placed at least seven beacons from outside
companies. Dictionary.com had the most, 41, including several from companies that track health
conditions and one that says it can target consumers by dozens of factors, including zip code and
race. Dictionary.com president Shravan Goli attributed the presence of so many tracking tools to
the fact that the site was working with a large number of ad networks, each of which places its
own cookies and beacons. After the Journal contacted the company, it cut the number of
networks it uses and beefed up its privacy policy to more fully disclose its practices.

The widespread use of Adobe Systems Inc.’s Flash software to play videos online offers another
opportunity to track people. Flash cookies originally were meant to remember users’
preferences, such as volume settings for online videos. But Flash cookies can also be used by
data collectors to re-install regular cookies that a user has deleted. This can circumvent a user’s
attempt to avoid being tracked online. Adobe condemns the practice. (“The Web’s New Gold
Mine: Your Secrets,” Wall Street Journal, Angwin, Julia, July 30, 2010)

Increasingly, websites are using spyware in an attempt to gather marketing information about visitors and
customers. This type of software is installed directly onto your computer and sends data to the company about
your surfing habits. Unfortunately, this software can also cause problems with your computer and send
information that can be used in identity theft. If you haven’t yet installed spyware detection software on your
computer, you should consider doing so.

Most e-commerce merchants are pushing for self-regulation and the practice of requiring individuals to “opt-
out” of data gathering. Opting out allows individuals to tell an organization not to share personal information
with any third party. The government initially agreed with that position but has since realized it isn’t working
very well for individuals. In mid-2000, the Federal Trade Commission started seeking government regulation of
information gathering and advocates the right of individuals to “opt-in.” Opting in requires individuals to
expressly give an organization the right to gather information before any information can be collected. Visit the
FTC website (www.ftc.gov/privacy/index.html) for the latest information on this subject.

As the textbook points out, very few companies actively protect their users’ privacy. It’s usually not in the
company’s best interest to do so. And very few users seem to care. Although most users express a desire to

4-12
Copyright © 2022 Pearson Education, Inc.
have their privacy protected, they do not actively ensure that it is. Less than half of website users polled had
read the privacy policies posted on most websites. To which group do you belong?

Technical Solutions

According to the law you must inform someone if you are taping a telephone conversation with them. On the
other hand, you can legally record that person’s Internet transmissions without any need to inform them you are
doing so. This type of disparity exists because our laws have not kept up with emerging technologies. There are
some tools that can help you block someone from tracing your Internet activities as the text discusses.
However, if you use your company’s computers for most of your web-browsing or email activities, you may
want to check with your information technology department before you install the tools.

The World Wide Web consortium has developed standards for how privacy policies can be embedded into web
pages and subsequently be compared to a user’s privacy wishes through the user’s web browser

Property Rights: Intellectual Property

Intellectual property issues have been around for hundreds of years. Some of the laws and policies in place to
settle disputes about copyrights, patents, and trade secrets have to be rewritten to apply to the Internet.
Intellectual property is a result of someone’s effort at creating a product of value based on their experiences,
knowledge, and education. In short, intellectual property is brain power.

What if you wrote the next great American novel hoping to cash in big time? Maybe you could retire to the
Bahamas and drink lemonade on the beach all day. But then you find out that someone posted your next great
American novel to the Internet and everyone is reading it free of charge. Now you’re back in your hometown
drinking lemonade at the local mall while you decide whether to look for a job at McDonald’s or Burger King.
The good news is everyone loves your book!

Unfortunately, that sort of thing happens too often in the cyberworld. You’re pretty excited to get that free copy
of the newest game software, while the poor guy who spent hours of his time and effort writing it is not so
excited to realize he’s not getting any compensation.

Everything on the web is considered to be protected under copyright and intellectual property laws unless the
website specifically states that the content is public domain. The website doesn’t need to carry the copyright
symbol © in order for it to be protected. President Clinton signed the Digital Millennium Copyright Act
(DMCA) in January 1998 making it a federal offense to violate copyright laws on the Internet, punishable with
a fine up to $250,000.

Copyright laws and intellectual property rights cannot be violated on the Internet any more than they can in
other mediums. Although this isn’t a law class, you should be aware of the fine line between acceptable and
legal usage of materials and the illegal theft of materials. When it comes to copyright material, the underlying
ideas are not protected, just the publication of the material. On the other hand, a patent grants a monopoly on
the underlying concepts and ideas. Before you use anything, especially any material on the World Wide Web,
make sure you are using it legally and ethically.

4-13
Copyright © 2022 Pearson Education, Inc.
Get past the idea that because everything on the web is free, easy to access, and available 24 hours a day, it
must therefore be okay to use it however you want. The question you should be asking yourself is, “Is it
ethically right and legal?”

The Business Software Alliance (www.bsa.org) is an organization working to prevent software piracy and the
illegal use of copyrighted material around the world. And don’t think the problem is limited to the 17-year-old
computer geek locked in his bedroom. This crime can be committed by anyone, as the news-clip below shows.
Even though the article is 20 years old, it shows how long the problem has existed.
Seventeen high-tech professionals were indicted on federal charges for participating in an
Internet piracy ring that hijacked software worth more than $1 million. The government said 12
of those indicted are members of an underground organization while the five others are
employees of Intel Corp. The individuals indicted were charged with conspiracy to infringe on
copyrights, which carries a maximum sentence of five years in prison, a $250,000 fine, and
restitution. (AP Newswire, May 5, 2000)

Perhaps the most notorious copyright infringement and intellectual property case in 2000 and 2001
involved the music industry. MP3, one of the most popular methods of illegally downloading music
from websites, lost a court battle waged by the music industry. MP3 was forced to pay millions of
dollars to the industry for lost revenues. The rock group Metallica sued Napster.com because it allowed
people to trade copyrighted material illegally. Napster.com lost the battle and went on to devise methods
for legally downloading music. So, before you copy your favorite sound clip, remember you’re actually
stealing someone else’s property as surely as if you walked into a retail store and took the CD without
paying for it. The music industry and the film industry are now suing individuals who continually
download copies of songs and movies from free websites.

Bottom Line: If it sounds too good to be true, it is. If it’s illegal or immoral or unethical outside the
computing arena, it’s probably illegal, immoral, and unethical in the computing arena. If you are aware
of a problem or are a victim of unethical, illegal actions, and you don’t do something about it, you’re
part of the problem. It’s your new world—use it wisely.

4.4 How have information systems affected laws for establishing accountability
and liability and the quality of everyday life?

Many of our laws and court decisions establishing precedents in the area of accountability, liability, and
control, were firmly in place long before computers were invented. Many of them date back to the early 1900s,
and some simply don’t make sense in this day and age. That’s what we were referring to in the opening
paragraphs of this lecture when we talked about new questions for organizations, companies, and the workplace
in general. No issue makes this subject more important than the Internet laws our government has tried, and still
tries, to pass.

Some argue that Internet Service Providers should somehow be liable for content placed on the Internet through
their users. Ask yourself these questions: If you receive an obscene phone call, is the telephone company
responsible and liable for the problem? If you receive a threatening letter in the mail, is the U.S. Post Office
responsible for reading every piece of mail on the chance that there might be a problem in one of the letters?

4-14
Copyright © 2022 Pearson Education, Inc.
The text gives several examples of recent liability problems and the difficulties companies face as networks,
computers, and data increasingly become common strategic tools.

Computer-Related Liability Problems

The important questions that are plaguing more and more companies are these: Who is liable for any economic,
social, or personal harm caused to individuals or businesses when information systems don’t work as they
should? Who is responsible when databases are hacked and information is stolen such as the December 2013
Target Department Stores breach? How do companies and retailers regain customer trust when they fail to
prevent computer-related liability problems?

Interactive Session: Management: The Boeing 737 Max Crashes: What Happened and Why? (see
page 141 of the text) discusses the pros and cons of our ever-burgeoning dependence on
computers. While some believe automation has made the world better, others believe our reflexes
have become dulled and our expertise has eroded. Experts say the problem is not mass
unemployment as a result of automation but rather it’s the difficulty of transitioning people from
one job to another. The Boeing case shows the impact of poorly designed software and systems
and flawed management thinking.

System Quality: Data Quality and System Errors

As we rely on information systems more, data quality issues are gaining importance. These issues affect you as
a consumer and as a business user.

As our reliance on technology continues to grow, we’re bound to run into problems caused by poor system
quality more often and in unexpected ways.

Facebook users around the world reported issues logging into and posting on the site as well as
on Instagram and WhatsApp throughout the day on Wednesday. The outages lasted about a full
day, and was Facebook's longest downtime ever.
In a statement Thursday, the company blamed a "server configuration change that triggered a
cascading series of issues" for the outages. The company said its services were coming back
online.
It later confirmed the problem was not the result of a DDoS attack, which refers to a Distributed
Denial-of-Service attack in which a hacker overwhelms a site by flooding it with fake traffic.
Users reported a variety of problems, from being unable to load the site at all to not being able to
post comments. Facebook users posted screenshots on Twitter showing error messages when
they tried to load the app. When loading the site, some users' got a message on the screen saying
"Account Temporarily Unavailable." (“Facebook blames ‘server configuration change’ for its
longest outage ever” CNBC.com, Feiner, Lauren, March 13, 2019)

When the credit reporting agencies screw up your credit record and you can’t get a car loan, whose fault is it?
What if you’re driving down the road, the computer chip controlling your brake system fails, and you have a
rather nasty crash. Who’s at fault? You, the car company, or the company that made the computer chip? Who is

4-15
Copyright © 2022 Pearson Education, Inc.
responsible for system downtime when a popular email program has holes allowing viruses to spread and
multiply; the software manufacturer or the company that licenses the software?

Most of us use software that a manufacturer knows contains bugs. They usually are nothing more than an
aggravation and a frustration. But once in a while, they will affect our use of the computer. Our natural
tendency is to let the marketplace control the balance by letting the customer punish or reward the producer.
But will that be enough, or will the issue end up in the courts?

When a network server crashes and day-traders miss an important trade, who is responsible for the lost income?
The ISP? The financial service company? No one? As more and more companies do business on the Internet,
will Internet Service Providers or the companies doing business on the Internet be held accountable for
equipment outages that render those businesses unable to process transactions?

Three principal sources of poor system performance are:


1. Software bugs and errors
2. Hardware or facility failures
3. Poor input data quality

Quality of Life: Equity, Access, and Boundaries

Invariably, when discussing online technology, some students mention their concern about losing face-to-face
contact with other human beings. We hear stories about children who haven’t developed normal social skills
because they spend all their time in front of a computer. No discussion about the quality of life issues would be
complete without mentioning the tales of “online love affairs.” Of course, many people lose their jobs and their
way of life because of technology. These are all very valid concerns.

What, in your opinion, is the impact of all this wired stuff on children? How should we protect them against the
threats, real or perceived? The Child Online Privacy Protection Act (COPPA) that went into effect in April
2000 has helped prosecute online predators and others using networks to commit crimes against children.
However, it seems the more we try to protect children’s use of the Internet, the more ways people find to harm
them.

The Electronic Frontier Foundation (www.eff.org), an organization dedicated to “protecting rights and
preserving freedom in the electronic frontier,” has lots of information about protecting free speech on the
Internet.

One quality of life issue that affects more and more people personally is the ability to work from home. Most
telecommuters had a “regular day job” 9 to 5, five days a week, in a typical office setting. If they didn’t get
their work done today, they would usually wait until they were back in the office tomorrow or Monday. Now
because of technology they can work seven days a week, all hours of the day, at home. And sometimes they do.
The impact on personal and family life can be considerable. In many regards, this problem extends not just to
telecommuters but to many employees who spend their normal 40 to 50 hours a week in the office and then stay
“wired” in the evenings, on weekends, and even during vacations.

There is an upside to the jobs issue, though. Many parents like telecommuting because they can stay home with,
or at least be nearer to, their children. More and more people are leaving the big cities and moving to small

4-16
Copyright © 2022 Pearson Education, Inc.
towns for the quality of life, yet they can still keep their well-paying jobs. Many small companies are able to
expand their customer base because of technology, which in turns helps the employees immensely. Completely
new businesses are born because of technology.

Computer crime has been extremely hard for our society and our governments to keep up with in the rapidly
changing technology landscape. Many laws have to be rewritten and many new laws must be implemented to
accommodate the changes. Computer crime and abuse extends to any wrongdoing involving equipment and
Internet usage. We spoke earlier about anonymity not being a license for socially unacceptable behavior. You
should remember that everything you do on a network or the Internet is recorded and can be tracked. Many
people committing computer crimes and abuse have been caught and prosecuted.

Spamming (unsolicited email) has been challenged in the courts by Internet Service Providers (ISP) as an
unfair practice. The ISPs say thousands of these emails clog their systems, and no one wants them anyway. The
spammers argue their right to freedom of speech is violated if they can’t send emails to anyone they want.
Congress passed a new law in late 2003 to clamp down on spamming. Unfortunately, the law doesn’t seem to
be producing very many positive results.

Other issues affecting our society include job losses and career changes caused by technology. You can argue
the positive or negative effects, but one thing is clear: you’ll be a part of the evolution of technology for the rest
of your life. You will have to continually update your skills and knowledge in order to remain competitive in
the job market. As companies continue to embrace new technology and new methods of using it, you’ll be
responsible for ensuring your skills and education remain current.

Our government recognizes the danger of allowing unequal access to technology to fester. It has enlisted the
help of private individuals and corporations in the effort to install computers and Internet access in public
schools and libraries all across the nation and the world. Most schools are now wired for networks and are
learning to incorporate technology into the curriculum. There’s even a website (www.digitaldivide.org)
dedicated to addressing the digital divide.

As managers, you should be acutely aware of the health issues caused by computer usage, especially repetitive
stress injury (RSI). Why? Because these health issues cost businesses huge amounts of money each year in
medical treatment claims and lost productivity. Carpal tunnel syndrome, a subset of RSI, is the most serious
health issue plaguing businesses. Computer vision syndrome is increasing as people continually use computer
screens and handheld devices that strain eyesight.

Interactive Session: Technology: Do Smartphones Harm Children? Maybe, Maybe Not (see page
149 of the text) discusses the impact of smartphones on our daily lives. While the use of
smartphones is extremely convenient and useful, they also have a great deal of influence on our
attention, thinking, and behavior. Some research suggests that the intellect weakens as the brain
grows dependent on technology, and that extensive smartphone use is especially harmful to
children and teenagers, but other research has emerged to challenge these findings.

It doesn’t take much to avoid the problems associated with computer usage. Ergonomics, the study of the
relationship between humans and machines, has helped determine that it’s cheaper to purchase equipment that
4-17
Copyright © 2022 Pearson Education, Inc.
reduces the health risks associated with computers, such as different keyboards, monitors that reduce eye strain,
and desks that allow proper body positions.

Too much of a good thing can be bad. You’ve heard of road rage, the anger people experience when driving.
We are now experiencing road rage on the Information Superhighway, and it’s called technostress. Managers
should encourage their employees to take frequent breaks from their computers and to recognize and
understand the dangers of isolation from humans. We may be a wired nation, but we still need the human touch.

As the use of laptops continues to grow, you should be cognizant of the difficulties you may encounter by using
one.

“Laptop computers are wonderful pieces of technology. They allow you to take immense
computing power with you wherever you go. Unfortunately, certain ergonomic features are
compromised for the sake of portability. Posture, keyboard spacing, screen size and positioning,
and pointing devices usually take the biggest ergonomic hit.
Even though laptops are designed for portability, many people use them as a desktop computer.
Despite the poor ergonomics inherent in most laptops, certain steps can be taken to create a
sound ergonomic laptop setup as a desktop. Whether it's the main computer or a temporary
setup, you can improve your ergonomics.
Run through a quick task analysis to determine what the main thing you will be doing is. If it is
reading, then set the laptop up in a proper ergonomic monitor position. If it is typing, then set
the laptop up in a proper ergonomic keyboard position. If it is a mix, then set the laptop up in a
proper ergonomic keyboard setup. The large muscles of the back and neck can take more stress
than the arms and wrists so the bending of the neck to read the screen is the lesser of two
ergonomic evils.
If you have to place the laptop on a desktop, and thereby be higher than a good keyboard height,
try changing planes. Elevate the rear of the laptop so that the keyboard is inclined. Then lean
back in your chair so that your arms are now in line with the keyboard.” (“How to ergonomically
set up your laptop as a desktop,” www.thoughtco.com, Adams, Chris, July 17, 2018)

For the most part, the same precautions you take with regular computers will help you combat difficulties
arising from too much laptop use.

How has all this technology affected you? Think about it. Ultimately, there is a positive and a negative side to
everything. How you handle it determines how it affects you.

Bottom Line: Poor data quality and system errors continue to plague information system users and will
for years to come. The quality of life you lead and share with others around you is your responsibility.
You can limit the amount of time you spend on the Internet and maximize the quality of your
experiences for the good. Many people are ready and willing to take advantage of your lapses in
accountability, liability, and control. Don’t let them.

4.5 How will MIS help my career?

4-18
Copyright © 2022 Pearson Education, Inc.
The chapter’s elements and information can help in securing a good job as an entry-level junior privacy analyst
in a human resources office. This position will assist with employee recordkeeping and help ensure compliance
with all federal and state privacy regulations. These types of jobs are becoming more popular as information
technology becomes more important in the workplace.

Discussion Questions:
1. Discuss the personal and professional implications of so much individual data being gathered, stored, and
sold. Should businesses be allowed to gather as much as they want? Should individuals have more control
over their data that are gathered?

2. Briefly describe your Internet Service Provider’s email usage policy. If you are on campus, your school
should have a usage policy.

3. Describe how your quality of life has improved or declined with the technological advances in the last five
years.

4. How do you think our government should handle the political issue of Internet decency and access
limitations?

5. To what extent should Internet Service Providers be held liable and accountable for the use of their
equipment?

Answers to Discussion Questions


1. Answers will vary but should include references to the ethical uses and responsibilities that businesses have
in regard to individual privacy. Some students will argue that it doesn’t matter—there is no privacy
anymore. Other students may favor stricter rules in favor of individual control over the data.

2. Answers will vary according to the ISP and the educational institution.

3. Answers will vary, but improvements should include ease of communication (email, cell phones); ease of
access to information (Internet search); making daily tasks easier (banking online, shopping online).
Declines in quality of life: ability to work anytime, anywhere blurs the boundary between work and family
life; cell phones everywhere can be intrusive and annoying; email can mean too much time spent combing
through messages to determine what is important and requires answering.

4. Answers will vary but might include: The federal government should be involved in monitoring the
Internet, should pass federal laws to regulate access, but stay out of decency issues because of the First
Amendment; or government should stay away and let the Internet monitor itself.

5. Answers will vary but might include holding those who choose to use a technology responsible for the
consequences of that technology, not the providers of the technology; or holding that ISPs responsible for
the harm that follows because of a breakdown of their equipment, on which businesses and individuals

4-19
Copyright © 2022 Pearson Education, Inc.
depend; that ISPs should monitor the email sent over their equipment. This is a hard one, because an ISP
provides a service, like the phone company, and the phone company is not responsible for the phone calls
people make unless people use the phone to engage in criminal activities like harassment.

4-20
Copyright © 2022 Pearson Education, Inc.

You might also like