Chapter 4
Chapter 4
Learning Objectives:
4-1 Discuss information privacy and methods for improving the privacy of information.
4-2 Explain the general data protection regulation.
4-3 Explain the privacy issues of e-mail and data collection in a business setting.
4-4 Examine the ethical issues and censorship of information technology.
4-5 Discuss the principles of intellectual property and issues related to the infringement of intel-
lectual property.
4-6 Examine the impact of information technology on society: the digital divide, telecommuting,
and health issues.
4-7 Describe green computing and the ways it can improve the quality of the environment.
Privacy Issues
Information technologies have brought many benefits, but they have also created concerns about
privacy in the workplace. For example, employers now search social networking sites such as Face-
book to find background information on applicants, and this information can influence their hiring
decisions.
Two relatively recent ethical issues related to social media are fake news and deepfakes with serious
political and or financial consequences. Fake news is news, stories, or hoaxes created to intention-
ally misinform or deceive readers. Deepfakes are fake videos or audio recordings that look and
sound just like the real thing.
Several federal laws now regulate the collecting and using of information on people and corpora-
tions, but the laws are narrow in scope and contain loopholes.
There are three important concepts regarding the Web and network privacy:
Source of Information: MIS 10 – Management Information Systems – 10th Edition – Bidgoli - Cengage
1. Acceptable use policies - a set of rules specifying the legal and ethical use of a system
and the consequences of noncompliance.
2. Accountability - refers to issues involving both the user’s and the organization’s respons-
ibilities and liabilities.
3. Nonrepudiation - a method for binding all the parties to a contract.
To guard against possible legal ramifications and the consequences of using the Web and networks,
an organization usually establishes an acceptable use policy, which is a set of rules specifying the
legal and ethical use of a system and the consequences of noncompliance.
Because of concerns about privacy, hardware or software controls should be used to determine
what personal information is provided on the Web.
GDPR covers a series of laws in order to protect European Union (EU) citizens’ personal data includ-
ing genetic data, health, racial or ethnic origin, and religious beliefs. The goal is to create more con-
sistent protection of consumer and personal data across EU nations, and it applies to each member
state of the European Union.
User consent must be given for any type of processing of personal information.
Collected data must be anonymized in order to protect privacy.
Users must be notified regarding any types of data breaches within 72 hours of learning of
the breach.
Data transfer across borders must be safely done.
Certain companies are required to appoint a data protection officer to oversee GDPR compli-
ance.
Although e-mail is widely used, it presents some serious privacy issues. One issue is junk e-mail, also
known as spam—unsolicited e-mail sent for advertising purposes. Usually, spam is sent in bulk using
automated mailing software, and many spammers sell their address lists. Spamming has also created
decency concerns because this e-mail often contains explicit language or nudity and can be opened
by children.
The number of people shopping online is increasing rapidly because of convenience, the array of
choices, and lower prices. Many customers, however, are reluctant to make online purchases be-
cause of concerns about hackers getting access to their credit card numbers and charging merchand-
ise to their accounts. Some Web sites require you to enter your name, address, and employment in-
Source of Information: MIS 10 – Management Information Systems – 10th Edition – Bidgoli - Cengage
formation before you are allowed to use the site. Privacy issues include the concern that this per-
sonal information will be sold to telemarketing firms, and consumers do not want to be bombarded
with spam.
1. Cookies - small text files with unique ID tags that are embedded in a Web browser and saved
on the user’s hard drive.
2. Log Files - generated by Web server software, record a user’s actions on a Web site.
Source of Information: MIS 10 – Management Information Systems – 10th Edition – Bidgoli - Cengage
Virtuous networking—Ensures that all parties will act in good faith by shar-
ing honest goals and participating in legitimate activities.
Censorship
No organization controls the whole Web, so who decides what content should be on it?
Two types of information are available on the Web:
- Public information, posted by an organization or public agency, can be censored for public
policy reasons—such as not allowing military secrets to be published, lest the information
fall into enemy hands.
- Public information can also be censored if the content is deemed offensive to a political, reli-
gious, or cultural group.
Intellectual Property
A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents
for “creations of the mind” developed by people or businesses.
One aspect of intellectual property that has attracted attention recently is cybersquatting, also
known as domain squatting, which is registering, selling, or using a domain name to profit from
someone else’s trademark.
Although information technology has eliminated some clerical jobs, it has created many new jobs
(described in Module 1) for programmers, systems analysts, database and network administrators,
network engineers, Webmasters, Web page developers, e-commerce specialists, chief information
officers, and technicians.
Information technologies have a direct effect on the nature of jobs. Telecommuting, also known as
virtual work, has enabled some people to perform their jobs from home (especially after the COVID-
19 break out).
By handling repetitive and boring tasks, information technologies have made many jobs more inter-
esting, resulting in more worker satisfaction.
Another impact of information technology is the creation of virtual organizations, which are net-
works of independent companies, suppliers, customers, and manufacturers connected via informa-
tion technologies so they can share skills and costs and have access to each other’s markets.5
Green Computing
Green computing involves the design, manufacture, use, and disposal of computers, servers, and
computing devices (such as monitors, printers, storage devices, and networking and communications
equipment) in such a way that there is minimal impact on the environment.
A successful green computing strategy cannot be fully implemented without the cooperation of both
the private and the public sector. Furthermore, both employees and top management must be in-
volved.
Source of Information: MIS 10 – Management Information Systems – 10th Edition – Bidgoli - Cengage