0% found this document useful (0 votes)
18 views20 pages

Explorers Presentation 01-2

The document discusses ethical and social issues in information systems, outlining five moral dimensions including information rights and accountability. It highlights the impact of technology trends on privacy and intellectual property, emphasizing the importance of ethical principles in decision-making. The conclusion stresses the need for careful use of technology due to its significant influence on daily life.

Uploaded by

lipavi2202
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views20 pages

Explorers Presentation 01-2

The document discusses ethical and social issues in information systems, outlining five moral dimensions including information rights and accountability. It highlights the impact of technology trends on privacy and intellectual property, emphasizing the importance of ethical principles in decision-making. The conclusion stresses the need for careful use of technology due to its significant influence on daily life.

Uploaded by

lipavi2202
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Ethical and Social

Issues in
Information System
Team:
The Explorers
Team Members

Afsan Uddin Afroja Nahida Rakibul Siraj


23304031 Akter Akter Islam Ullah
23304058 23304069 23304088 2330411
9
What is Ethics
It refers to the principles of right
and wrong that individuals, acting
as free moral agents, use to make
choices to guide their behavior.
A model for thinking about ethical, social, and
political issues
Five Moral Dimensions of the
Informational Age
The major ethical, social, and political issues that
information systems raise include the following moral
dimensions.
1)Information rights and obligations

2)Property rights and obligations

3)Accountability and control

4)System quality

5)Quality of life
Key Technology Trends that Raise
Ethical Issues
TRENDS

1) Computing power doubles every 18 months

2) Data storage cost rapidly decline

3) Data analysis advances

4) Networking Advances

5) Mobile device growth impact


What is Profiling

Profiling refers to the use of computers to combine data from multiple


sources and create digital dossiers of detailed information on individuals.
EXAMPLES OF PROFILING:

1)Several thousand of the most popular websites allow Google


Marketing Platform (k) Double-click, an Internet advertising broker, to
track the activities of their visitors in exchange for revenue from
advertisements based on visitor information Google Marketing
Platform gathers.

2)LexisNexis Risk Solutions (formerly ChoicePoint) gather data from


Police, criminal, and motor vehicle records, credit and employment
histories, current and Previous addresses, professional licenses, and
claims to assemble and maintain dossiers on almost every adult in
the United States.
Non-Obvious Relationship Awareness(NORA)

NORA stands for a data analysis technology has given


both the government and the private sector even more
powerful profiling capabilities. NORA can take information
about people from many disparate sources, such as
employment applications, telephone records, customer
listings, and wanted list, and correlate relationships to find
obscure connections that might help identify criminals or
terrorists.
What Specific Principles for conduct can be used
to guide ethical decision?

Basic Concept

• Responsibility: It means that you accept the potential cost, duties and obligations for
the decision you make.

• Accountability: It means that mechanisms are in place to determine who took action
and who is responsible.

• Liability: It extends the concept of responsibility further to the area of laws. It is also a feature of
political system.
Five-Step Ethical Analysis
• Identify and describes the facts clearly.

• Define the conflict or dilemma and identify the higher-order values


involved.

• Identify the stakeholders.

• Identify the options that you can reasonably take.

• Identify the potential consequences of your options.


Candidate Ethical principle
• Do unto others as you would have them to do unto you(The Golden Rule).

• If an action is not right for everyone to take it, it is not right for anyone(Immanuel Kant’s Categorical
imperative).

• If an action cannot be taken repeatedly, it is not right to take at all. This is the Slippery slope Rule.

• Take the action that achieve the higher or greater value (Utilitarian Principle).

• Take the action that produces the least harm (Risk Aversion Principle).

• Assume that virtually all tangible and Intangible objects are owned by someone else unless there is
a specific declaration otherwise. (The Ethical no-free-lunch rule).
Why do contemporary
information systems
technology and the Internet
pose challenges to the
protection of individual privacy
and intellectual property?
Information Rights: Privacy and Freedom in the
Internet Age

Privacy is the claim of individuals to be left alone ,free from surveillance or


interference from other individuals or organizations, including the state. Claims to
privacy are also involved at the workplace.
There are also some federal trade commission fair information
practices principles:

I. Fair Information practices principles or FIP Principles

II. Notice/awareness principles

III. Choice or consent(core principle)

IV. Access or participation

V. Security

VI.Enforcement
Internet Challenges to Privacy
 Cookies
• Identify browser and track visits to site
• Super cookies (Flash Cookies)

 web Beacons (Web bugs)


• Tiny graphics embedded in e-mails and web pages
• Monitor who is reading e-mail message or visiting site

 Spyware
• Surreptitiously installed on user's computer
• May transmit user’s keystrokes or display unwanted ads
Property Rights: Intellectual
property
 Intellectual Property is defined ass tangible and intangible products of the mind created by
individuals or corporation.

 Copyright is a statutory grant that protects creators of intellectual property from having their work copied
by others for any purpose during the life of the author plus an additional 70 years after the author’s death.

 Patents is a legal document giving the author exclusive intellectual property rights over a specific
invention.

 Trademarks are the marks, symbol, and images to used distinguish products in the marketplace.
Trademarks laws protect the investment that firms have made to bring products to market, and also protect
consumer by ensuring they receive what they paid for.

 Trade Secrets can be classified as any intellectual property or work product-a formula, device, pattern,
methods of manufacture, or compilation of data-used for a business purpose.
How have information systems affected laws
for establishing accountability and liability
and the quality of everyday life?
 Computer-Related liability problem

 System Quality: data Quality and system Errors

 Quality of Life: Equity, Access, and Boundaries

 Big Tech: Concentrating Economic and Potential power

 Rapidity of change: Reduced Response time to Compensation

 Maintaining Boundaries: Family, Work, and leisure

 Dependence and Vulnerability

 Computer Crime And Abuse


Conclusion
• Technology has both the pros and cons. As today is the day of technology, we can’t
think of our life excluding Technology and information system. So, we should be
careful while using technology & information system.
Do you have any
Thank you Question?

You might also like