Top Banner

of 32

Chap05 Ethic ImplificationIT

Apr 04, 2018

Download

Documents

imnotactive
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/31/2019 Chap05 Ethic ImplificationIT

    1/32

    Chapter 5Ethical Implications of

    Information Technology

    MANAGEMENT INFORMATION SYSTEMS 8/E

    Raymond McLeod and George Schell

    Copyright 2001 Prentice-Hall, Inc.5-1

  • 7/31/2019 Chap05 Ethic ImplificationIT

    2/32

    Socially Conscionable Citizens

    Morals

    Traditions of right and wrong

    Ethics

    Suite of guiding beliefs, standards, or ideals

    that promote an individual or community

    Laws

    Formal rules of conduct that a sovereignauthority imposes on its citizens

    5-2

  • 7/31/2019 Chap05 Ethic ImplificationIT

    3/32

    Pirated Software

    Software that is illegally copied and then

    used or sold

    35% in U.S.92% in Japan

    99% in Thailand

    Some cultures encourage sharing

    5-3

  • 7/31/2019 Chap05 Ethic ImplificationIT

    4/32

    Laws Lag Behind

    First computer crime

    In 1966, a programmer used computer code to

    keep his checking account from being flagged

    as overdrawn.

    When the bank discovered the crime the

    programmer could not be charged with a

    computer crime because no computer crime lawexisted.

    He was charged with making false bank

    records.

    5-4

  • 7/31/2019 Chap05 Ethic ImplificationIT

    5/32

    U.S. Computer Legislation

    Freedom of Information Act of 1966

    Gave citizens and organizations the right to

    access data held by the federal government Fair Credit Reporting Act of 1970

    Dealt with handling of credit data

    Right to Federal Privacy Act of 1978 Limited governments ability to search bank

    records

    5-5

  • 7/31/2019 Chap05 Ethic ImplificationIT

    6/32

    U.S. Computer Legislation (cont.)

    Small Business Computer Security and

    Education Act (1984)

    Advises Congress on matters relating tocomputer crime against small businesses

    Counterfeit Access Device and Computer

    Fraud and Abuse ActMakes it a crime to gain unauthorized

    information pertaining to national security or

    foreign relations and provides other protection

    5-6

  • 7/31/2019 Chap05 Ethic ImplificationIT

    7/32

    U.S. Computer Legislation (cont.)

    In 1986, Electronic Communications

    Privacy Act was rewritten to cover digital,

    data, and video communicationsIncluded special section on email

    Computer Matching and Privacy Act of

    1988 Restricts governments right to match computer

    files for the purpose of determining eligibility

    for government programs or identifying debtors5-7

  • 7/31/2019 Chap05 Ethic ImplificationIT

    8/32

    Imposing an Ethics Culture

    Corporate credo

    Succinct statement of values a firm seeks to

    uphold

    Ethics programsSystem of multiple activities designed to

    provide employees with direction in carrying

    out corporate credo Tailored corporate codes

    Codes of ethics for a particular organization or

    industry5-8

  • 7/31/2019 Chap05 Ethic ImplificationIT

    9/32

    2. Establish

    ethics

    programs

    3. Establish

    corporate

    ethics code

    1. Establishcorporate

    credo

    Top-level Management

    Imposes the Ethics Culture

    In a Top-down Manner

    An Ethics

    Culture

    5-9

  • 7/31/2019 Chap05 Ethic ImplificationIT

    10/32

    Example of a Corporate Credo

    Commitment to customer:

    The first commitment is to provide our customers with

    quality products and services that are innovative and

    technologically responsive to their current requirementsat appropriate prices. To perform these tasks with integrity

    requires that we maintain confidentiality and protect

    customer privacy, promote customer satisfaction, and

    serve customer needs. We strive to serve qualifiedcustomers and industries that are socially responsible

    according to broadly accepted community and company

    standards.

    5-10

  • 7/31/2019 Chap05 Ethic ImplificationIT

    11/32

    Ethics Audit

    Internal auditor meets with a manager for

    the purpose of learning how the managers

    unit is carrying out the corporate credo

    5-11

  • 7/31/2019 Chap05 Ethic ImplificationIT

    12/32

    Computer Ethics

    Analysis of the nature and social impact of

    computer technology as well as

    corresponding formulation and justificationof policies for the ethical use of such

    technology

    5-12

  • 7/31/2019 Chap05 Ethic ImplificationIT

    13/32

    Responsibility for

    Computer Ethics

    CIO holds primary responsibility

    CIO Must:

    Be aware of how the computer is affectingsociety

    Do something about this by formulating

    policies to ensure technology is being used in

    the right way

    5-13

  • 7/31/2019 Chap05 Ethic ImplificationIT

    14/32

    Importance of Computer Ethics

    Logical malleability

    Ability to program computer to do anything

    you want it to do

    The transformation factorComputers can change the way things are done

    The invisibility factor

    Invisible programming

    Invisible complex calculations

    Invisible abuse

    5-14

  • 7/31/2019 Chap05 Ethic ImplificationIT

    15/32

    Rights to the Computer

    Right to computer access

    Right to computer skills

    Right to computer specialists

    Right to computer decision making

    5-15

  • 7/31/2019 Chap05 Ethic ImplificationIT

    16/32

    Rights to Information

    Right to privacy

    Right to accuracy

    Right to property

    Right to access

    5-16

  • 7/31/2019 Chap05 Ethic ImplificationIT

    17/32

    Social Contract of IS

    The computer will not be used to undulyinvade a persons privacy

    Every measure will be taken to ensure the

    accuracy of computer processing The sanctity of intellectual property will be

    protected

    The computer will be made accessible tosociety so that its members can avoid the

    indignities of information illiteracy and

    deprivation5-17

  • 7/31/2019 Chap05 Ethic ImplificationIT

    18/32

    Ethics and the CIO

    Perceptions of the CIOs Ethics

    Do not take advantage of opportunities to act

    unethicallyEthics breeds success

    Firms and managers have social responsibilities

    Managers back up their ethics beliefs with

    action

    5-18

  • 7/31/2019 Chap05 Ethic ImplificationIT

    19/32

    The CIO is Influenced by a

    Hierarchy of Factors

    Office of

    theCIO

    Laws

    Corporateethics culture

    Socialpressure

    Professionalcodes of ethics

    Personalpressures

    5-19

  • 7/31/2019 Chap05 Ethic ImplificationIT

    20/32

    CIOs Usually Do Not Act

    Unethically

    There are many opportunities for 47.5 37.7

    MIS managers in my company toengage in unethical behavior.

    MIS managers in my company 19.7 80.3

    engage in behaviors that I

    consider to be unethical.

    Question Agree Disagree

    5-20

  • 7/31/2019 Chap05 Ethic ImplificationIT

    21/32

    Ethics and Success

    Percent PercentQuestion Agree DisagreeSuccessful MIS managers in my company are

    generally more ethical than unsuccessful

    managers. 73.8 13.1

    In order to succeed in my company it is

    often necessary to compromise one's ethics. 18.0 75.4

    Successful managers in my company withhold

    information that is detrimental to their

    self-interest. 21.3 50.85-21

  • 7/31/2019 Chap05 Ethic ImplificationIT

    22/32

    Ethics (cont.)Percent Percent

    Question Agree DisagreeSuccessful managers in my company make

    rivals look bad in the eyes of important

    people in my company. 23.0 59.0

    Successful managers in my company look for

    a scapegoat when they feel they may be

    associated with failure. 23.0 67.2

    Successful managers in my company take

    credit for the ideas and accomplishments

    of others. 16.4 75.45-22

  • 7/31/2019 Chap05 Ethic ImplificationIT

    23/32

    Corporate Social ResponsibilityPercent Percent

    Question Agree DisagreeThe socially responsible manager must

    occasionally place the interests of society

    over the interests of the company. 68.9 21.3

    The fact that corporations have great

    economic power in our society means that they

    have a social responsibility beyond the

    interests of the shareholders. 96.7 3.3

    As long as corporations generate acceptable

    shareholder returns, managers have a social

    responsibility beyond the interests of

    shareholders. 70.5 16.4 5-23

  • 7/31/2019 Chap05 Ethic ImplificationIT

    24/32

    Achieving an Ethical

    Computer Operation

    1. Formulate a code of conduct.

    2. Establish rules of procedure relating to such

    issues as personal use of computer services and

    proprietary rights to computer programs and data.

    3. Make clear the sanctions that will be taken against

    offenders-such as reprimands, termination, and

    civil action.4. Recognize ethical behavior.

    5-24Parkers 10-Step Action Plan

    A hi i Ethi l

  • 7/31/2019 Chap05 Ethic ImplificationIT

    25/32

    Achieving an Ethical

    Computer Operation (cont.)

    5. Focus attention on ethics by means of suchprograms as training sessions and required

    reading.

    6. Promote computer crime laws by keepingemployees informed.

    7. Keep a formal record that establishes

    accountability of each information specialist for

    her or his actions, and also minimizes thetemptations for violations by means of such

    programs as ethics audits.

    5-25Parkers 10-Step Action Plan

  • 7/31/2019 Chap05 Ethic ImplificationIT

    26/32

    Achieving an Ethical

    Computer Operation (cont.)

    8. Encourage the use of rehabilitation programs that

    treat ethics violators in the same way that

    corporations show concern for the recovery ofalcoholics or drug offenders.

    9. Encourage participation in professional societies.

    10. Set an example.

    5-26Parkers 10-Step Action Plan

  • 7/31/2019 Chap05 Ethic ImplificationIT

    27/32

    Ethics Perspective

    Severe social problems exist because

    government and business organizations

    have failed to uphold the highest ethicalstandards in computer use

    Invasion of privacy

    Software piracy

    CIOs can make a difference

    5-27

  • 7/31/2019 Chap05 Ethic ImplificationIT

    28/32

    An Information Services

    Code of Conduct

    Conduct all activities in a manner that

    precludes any form of dishonesty

    Avoid any act that compromises integrity

    Avoid any act that might create a dangerous

    situation

    Not use alcohol or drugs while at work

    5-28See Figure 5.4

  • 7/31/2019 Chap05 Ethic ImplificationIT

    29/32

    An Information Services

    Code of Conduct (cont.)

    Maintain courteous and professional

    relations with users, associates, and

    supervisors

    Adhere to the no-solicitation rule and any

    other employment policy

    5-29See Figure 5.4

  • 7/31/2019 Chap05 Ethic ImplificationIT

    30/32

    An Information Services

    Code of Conduct (cont.)

    Protect confidentiality of sensitive

    information about the organizations

    competitive position, trade secrets, or assets

    Exercise sound business practice in the

    management of such company resources

    such as personnel, computer use, outsideservices, travel, and entertainment

    5-30See Figure 5.4

  • 7/31/2019 Chap05 Ethic ImplificationIT

    31/32

    Summary

    Morals, laws, and ethics govern behavior

    Early years

    No computer lawsEasy to bypass regulation

    Executives impose ethical culture

    Computer ethics require executive to putproper policies in place

    5-31

  • 7/31/2019 Chap05 Ethic ImplificationIT

    32/32

    Summary [cont.]

    Society places importance on computer

    ethics

    Logical malleabilityTransforming ways of living

    Processes are hidden from view

    Societal rights in relation to the computer

    5-32