ch04 New 2023
ch04 New 2023
Chapter 4
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objectives
4.1 What ethical and social issues are raised by IS?
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Ethical and Social Issues
• Web sites and invasive softwares track our search queries, the pages we
visit, the ads we click on, the videos we watch, the content we share, the
products we purchase, etc.
– It can generate many benefits (by showing you ads relevant to your
interests)
• IS allow the collection and analyzis of data on a much larger scale than
ever before and using what we have learned about people in ways that
may be harmful to them. The following are some examples:
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Ethical and Social Issues
• Some Auto insurance companies collect and analyze data about people
driving habits. Lower insurance rates are then given to those who don’t
drive late at night and don’t spend much time in their cars, thus
discriminating against poorer people who are more likely to work a late
shift and to have longer commutes to work.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Information systems and ethics
• IS can be used to achieve social progress, but also to commit crimes and
threaten social values.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
A Model for Thinking About Ethical,
Social, and Political Issues
• Society as a calm pond
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Figure 4.1 The Relationship Between
Ethical, Social, and Political Issues in an
Information Society
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
The Moral Dimensions of the Information Age
3. Accountability and control: Who can and will be held accountable and
liable for the harm done to individual and collective information and property
rights?
• Big data: The collection and analysis of large amounts of data that can be
used to manipulate and influence people. For example, companies can
use data analytics to target vulnerable populations for advertising or
political propaganda.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Technology trends affecting ethics
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Figure 4.2 Nonobvious Relationship
Awareness (NOR A)
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Responsibility, Accountability, and Liability
• Responsibility
a process in which laws are known and understood, and there is an ability
to appeal to higher authorities to ensure that the laws are applied correctly.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Ethical Analysis
• Ethical analysis is the process of examining and evaluating an ethical
issue or dilemma in a structured and systematic way. It is five-steps
process:
1. Identify and clearly describe the facts: Find out who did what to
whom, and where, when, and how
• Although you are the only one who can decide which among many ethical
principles you will follow, and how you will prioritize them, it is helpful to
consider some ethical approaches .
• Golden Rule: Do unto others as you would have them do unto you
– Take the action that produces the least harm or cost, even if it may
not have the highest potential for benefit or gain.
– Assume that virtually all tangible and intangible objects are owned by
someone unless there is a specific declaration otherwise. This means
that if someone creates or acquires an object, they have legal
ownership over it, and others are not allowed to use or dispose of it
without their permission.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Real-World Ethical Dilemmas
• One set of interests pitted against another
• Examples
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
How IS affected Information Rights ?
• Privacy: Claim of individuals to be left alone, free from surveillance or
intrusion from individuals or organizations, including the state. Claim to be
able to control information about yourself .
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Internet challenges to privacy: tools for tracking
online behavior
• Cookies: small text files stored on visitor’s hard drive by a website. They
contain information about user's browsing history and preferences, and
can be used to memorize user login information, track user behavior, and
deliver targeted advertising.
• Web beacons: small, invisible images that are embedded in web pages or
emails. When a user opens the page or email, the web beacon sends
information back to the server, allowing the sender to track user behavior,
such as whether the email was opened or a specific link was clicked.
1. The Web server reads the user's Web browser and determines the operating system,
browser name, version number, Internet address, and other information.
2. The server transmits a tiny text file with user identification information called a cookie,
which the user's browser receives and stores on the user's computer.
3. When the user returns to the Web site, the server requests the contents of any cookie
it deposited previously in the user's computer.
4. The Web server reads the cookie, identifies the visitor, and calls up data on the user.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Technical solutions to protect privacy
• Besides legislations, technical solutions to protect privacy include:
– Anti-spyware tools
• Even after selecting the Do Not Track option, websites are not legally
obligated to honor their visitors’ requests not to be tracked.
• Overall, technical solutions have failed to protect users from being tracked
from one site to another
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
How IS affected Property Rights ?
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
How IS affected Property Rights ?
• New technologies and digitalization brought new challenges to existing
laws that protect intellectual property. Before internet, copies of software,
books, or films had to be stored on physical media (paper, computer disk,
videotape), creating some hurdles to distribution. With internet, information
can be more widely reproduced and distributed.
– Ease of replication
– Ease of alteration
– Compactness
• IS and new technologies has also enabled the creation of new types of
businesses, such as those based on the sharing economy,
crytptoccurency and online marketplaces. These new business models
have raised questions about liability and responsibility for the actions of
users on their platforms.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
How IS affected laws for establishing
accountability and liability?
• When a software is part of a machine, and the machine hurts someone
physically or economically. Who is liable the producer of the software or
the manufacturer of the machine ? Should Facebook or Twitter be held
liable and accountable for the posting of pornographic material or racial
insults, or should they be held harmless against any liability for what
users post ?
• The gray area is that some system errors are foreseeable and correctable
only at very great expense, an expense so great that pursuing this level of
perfection is not feasible economically. So in gray areas, what should
organizations do?.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved