Top Banner
Chapter 5 Ethical Implications of Ethical Implications of Information Technology Information Technology MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod and George Schell opyright 2001 Prentice-Hall, Inc. 5-1
32
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Topik 5

Chapter 5Ethical Implications of Ethical Implications of

Information TechnologyInformation Technology

MANAGEMENT INFORMATION SYSTEMS 8/ERaymond McLeod and George Schell

Copyright 2001 Prentice-Hall, Inc.5-1

Page 2: Topik 5

Socially Conscionable Socially Conscionable CitizensCitizens

MoralsMorals– Traditions of right and wrongTraditions of right and wrong

EthicsEthics– Suite of guiding beliefs, standards, or ideals that Suite of guiding beliefs, standards, or ideals that

promote an individual or communitypromote an individual or community LawsLaws

– Formal rules of conduct that a sovereign authority Formal rules of conduct that a sovereign authority imposes on its citizensimposes on its citizens

5-2

Page 3: Topik 5

Pirated SoftwarePirated Software

Software that is illegally copied and then used Software that is illegally copied and then used or soldor sold– 35% in U.S.35% in U.S.– 92% in Japan92% in Japan– 99% in Thailand99% in Thailand

Some cultures encourage sharingSome cultures encourage sharing

5-3

Page 4: Topik 5

Laws Lag BehindLaws Lag Behind

First computer crimeFirst computer crime– In 1966, a programmer used computer code to keep In 1966, a programmer used computer code to keep

his checking account from being flagged as his checking account from being flagged as overdrawn. overdrawn.

– When the bank discovered the crime the When the bank discovered the crime the programmer could not be charged with a computer programmer could not be charged with a computer crime because no computer crime law existed. crime because no computer crime law existed.

– He was charged with making false bank records.He was charged with making false bank records.

5-4

Page 5: Topik 5

U.S. Computer LegislationU.S. Computer Legislation

Freedom of Information Act of 1966Freedom of Information Act of 1966– Gave citizens and organizations the right to access Gave citizens and organizations the right to access

data held by the federal governmentdata held by the federal government Fair Credit Reporting Act of 1970Fair Credit Reporting Act of 1970

– Dealt with handling of credit dataDealt with handling of credit data Right to Federal Privacy Act of 1978Right to Federal Privacy Act of 1978

– Limited government’s ability to search bank recordsLimited government’s ability to search bank records

5-5

Page 6: Topik 5

U.S. Computer Legislation U.S. Computer Legislation (cont.)(cont.)

Small Business Computer Security and Education Small Business Computer Security and Education Act (1984) Act (1984) – Advises Congress on matters relating to computer Advises Congress on matters relating to computer

crime against small businessescrime against small businesses Counterfeit Access Device and Computer Fraud Counterfeit Access Device and Computer Fraud

and Abuse Actand Abuse Act– Makes it a crime to gain unauthorized information Makes it a crime to gain unauthorized information

pertaining to national security or foreign relations and pertaining to national security or foreign relations and provides other protectionprovides other protection

5-6

Page 7: Topik 5

U.S. Computer Legislation U.S. Computer Legislation (cont.)(cont.)

In 1986, Electronic Communications Privacy In 1986, Electronic Communications Privacy Act was rewritten to cover digital, data, and Act was rewritten to cover digital, data, and video communicationsvideo communications– Included special section on emailIncluded special section on email

Computer Matching and Privacy Act of 1988 Computer Matching and Privacy Act of 1988 – Restricts government’s right to match computer Restricts government’s right to match computer

files for the purpose of determining eligibility for files for the purpose of determining eligibility for government programs or identifying debtorsgovernment programs or identifying debtors

5-7

Page 8: Topik 5

Imposing an Ethics CultureImposing an Ethics Culture Corporate credoCorporate credo

– Succinct statement of values a firm seeks to upholdSuccinct statement of values a firm seeks to uphold Ethics programsEthics programs

– System of multiple activities designed to provide System of multiple activities designed to provide employees with direction in carrying out corporate employees with direction in carrying out corporate credocredo

Tailored corporate codesTailored corporate codes– Codes of ethics for a particular organization or industryCodes of ethics for a particular organization or industry

5-8

Page 9: Topik 5

2. Establishethics

programs

3. Establish corporate

ethics code

1. Establishcorporate

credo

Top-level Management Imposes the Ethics

Culture In a Top-down Manner

An EthicsCulture

5-9

Page 10: Topik 5

Example of a Corporate Example of a Corporate CredoCredo

Commitment to customer: The first commitment is to provide our customers withquality products and services that are innovative and technologically responsive to their current requirementsat appropriate prices. To perform these tasks with integrityrequires that we maintain confidentiality and protectcustomer privacy, promote customer satisfaction, andserve customer needs. We strive to serve qualifiedcustomers and industries that are socially responsibleaccording to broadly accepted community and companystandards.

5-10

Page 11: Topik 5

Ethics AuditEthics Audit

Internal auditor meets with a manager for the Internal auditor meets with a manager for the purpose of learning how the manager’s unit is purpose of learning how the manager’s unit is carrying out the corporate credocarrying out the corporate credo

5-11

Page 12: Topik 5

Computer EthicsComputer Ethics

Analysis of the nature and social impact of Analysis of the nature and social impact of computer technology as well as corresponding computer technology as well as corresponding formulation and justification of policies for the formulation and justification of policies for the ethical use of such technologyethical use of such technology

5-12

Page 13: Topik 5

Responsibility for Responsibility for Computer EthicsComputer Ethics

CIO holds primary responsibilityCIO holds primary responsibility CIO Must:CIO Must:

– Be aware of how the computer is affecting societyBe aware of how the computer is affecting society– Do something about this by formulating policies to Do something about this by formulating policies to

ensure technology is being used in the right wayensure technology is being used in the right way

5-13

Page 14: Topik 5

Importance of Computer Importance of Computer EthicsEthics

Logical malleabilityLogical malleability– Ability to program computer to do anything you want it to Ability to program computer to do anything you want it to

dodo The transformation factorThe transformation factor

– Computers can change the way things are doneComputers can change the way things are done The invisibility factorThe invisibility factor

– Invisible programmingInvisible programming– Invisible complex calculationsInvisible complex calculations– Invisible abuseInvisible abuse

5-14

Page 15: Topik 5

Rights to the ComputerRights to the Computer

Right to computer accessRight to computer access Right to computer skillsRight to computer skills Right to computer specialistsRight to computer specialists Right to computer decision makingRight to computer decision making

5-15

Page 16: Topik 5

Rights to InformationRights to Information

Right to privacyRight to privacy

Right to accuracyRight to accuracy

Right to propertyRight to property

Right to accessRight to access

5-16

Page 17: Topik 5

Social Contract of ISSocial Contract of IS• The computer will not be used to unduly invade a The computer will not be used to unduly invade a

person’s privacyperson’s privacy• Every measure will be taken to ensure the accuracy Every measure will be taken to ensure the accuracy

of computer processingof computer processing• The sanctity of intellectual property will be The sanctity of intellectual property will be

protectedprotected• The computer will be made accessible to society so The computer will be made accessible to society so

that its members can avoid the indignities of that its members can avoid the indignities of information illiteracy and deprivationinformation illiteracy and deprivation

5-17

Page 18: Topik 5

Ethics and the CIOEthics and the CIO

Perceptions of the CIO’s EthicsPerceptions of the CIO’s Ethics– Do not take advantage of opportunities to act Do not take advantage of opportunities to act

unethicallyunethically– Ethics breeds successEthics breeds success– Firms and managers have social responsibilitiesFirms and managers have social responsibilities– Managers back up their ethics beliefs with actionManagers back up their ethics beliefs with action

5-18

Page 19: Topik 5

The CIO is Influenced by aThe CIO is Influenced by aHierarchy of FactorsHierarchy of Factors

Office of theCIO

LawsLaws

CorporateCorporateethics cultureethics culture

SocialSocialpressurepressure

ProfessionalProfessionalcodes of ethicscodes of ethics

PersonalPersonalpressurespressures

5-19

Page 20: Topik 5

CIOs Usually Do Not Act CIOs Usually Do Not Act UnethicallyUnethically

There are many opportunities for 47.5 37.7 MIS managers in my company to engage in unethical behavior.

MIS managers in my company 19.7 80.3 engage in behaviors that I consider to be unethical.

Question Agree Disagree

5-20

Page 21: Topik 5

Ethics and SuccessEthics and Success

PercentPercent PercentPercent

QuestionQuestion AgreeAgree DisagreeDisagree

Successful MIS managers in my company are Successful MIS managers in my company are

generally more ethical than unsuccessful generally more ethical than unsuccessful

managers. managers. 73.8 13.1 73.8 13.1

In order to succeed in my company it is In order to succeed in my company it is

often necessary to compromise one's ethics. often necessary to compromise one's ethics. 18.0 75.4 18.0 75.4

Successful managers in my company withhold Successful managers in my company withhold

information that is detrimental to their information that is detrimental to their

self-interest. self-interest. 21.3 50.8 21.3 50.8

5-21

Page 22: Topik 5

Ethics (cont.)Ethics (cont.) PercentPercent PercentPercent

QuestionQuestion AgreeAgree DisagreeDisagree

Successful managers in my company make Successful managers in my company make

rivals look bad in the eyes of important rivals look bad in the eyes of important

people in my company. people in my company. 23.0 59.0 23.0 59.0

Successful managers in my company look for Successful managers in my company look for

a scapegoat when they feel they may be a scapegoat when they feel they may be

associated with failure. associated with failure. 23.0 67.2 23.0 67.2

Successful managers in my company take Successful managers in my company take

credit for the ideas and accomplishments credit for the ideas and accomplishments

of others. of others. 16.4 75.416.4 75.45-22

Page 23: Topik 5

Corporate Social Corporate Social ResponsibilityResponsibility

PercentPercent PercentPercent

QuestionQuestion AgreeAgree DisagreeDisagree

The socially responsible manager must The socially responsible manager must

occasionally place the interests of society occasionally place the interests of society

over the interests of the company. over the interests of the company. 68.9 21.3 68.9 21.3

The fact that corporations have great The fact that corporations have great

economic power in our society means that they economic power in our society means that they

have a social responsibility beyond the have a social responsibility beyond the

interests of the shareholders. interests of the shareholders. 96.7 3.3 96.7 3.3

As long as corporations generate acceptable As long as corporations generate acceptable

shareholder returns, managers have a social shareholder returns, managers have a social

responsibility beyond the interests of responsibility beyond the interests of

shareholders. shareholders. 70.5 16.470.5 16.4 5-23

Page 24: Topik 5

Achieving an Ethical Achieving an Ethical Computer OperationComputer Operation

1. 1. Formulate a code of conduct.Formulate a code of conduct.

2. 2. Establish rules of procedure relating to such issues as Establish rules of procedure relating to such issues as personal use of computer services and proprietary personal use of computer services and proprietary rights to computer programs and data.rights to computer programs and data.

3. 3. Make clear the sanctions that will be taken against Make clear the sanctions that will be taken against offenders-such as reprimands, termination, and civil offenders-such as reprimands, termination, and civil action.action.

4. 4. Recognize ethical behavior.Recognize ethical behavior.

5-24Parker’s 10-Step Action Plan

Page 25: Topik 5

Achieving an Ethical Achieving an Ethical Computer Operation (cont.)Computer Operation (cont.)

5. 5. Focus attention on ethics by means of such programs Focus attention on ethics by means of such programs as training sessions and required reading.as training sessions and required reading.

6. 6. Promote computer crime laws by keeping employees Promote computer crime laws by keeping employees informed.informed.

7. 7. Keep a formal record that establishes accountability Keep a formal record that establishes accountability of each information specialist for her or his actions, of each information specialist for her or his actions, and also minimizes the temptations for violations by and also minimizes the temptations for violations by means of such programs as ethics audits.means of such programs as ethics audits.

5-25Parker’s 10-Step Action Plan

Page 26: Topik 5

Achieving an Ethical Achieving an Ethical Computer Operation (cont.)Computer Operation (cont.)

8. 8. Encourage the use of rehabilitation programs that treat Encourage the use of rehabilitation programs that treat ethics violators in the same way that corporations show ethics violators in the same way that corporations show concern for the recovery of alcoholics or drug offenders.concern for the recovery of alcoholics or drug offenders.

9. 9. Encourage participation in professional societies.Encourage participation in professional societies.

10. 10. Set an example.Set an example.

5-26Parker’s 10-Step Action Plan

Page 27: Topik 5

Ethics PerspectiveEthics Perspective

Severe social problems exist because Severe social problems exist because government and business organizations have government and business organizations have failed to uphold the highest ethical standards in failed to uphold the highest ethical standards in computer usecomputer use– Invasion of privacyInvasion of privacy– Software piracySoftware piracy

CIOs can make a differenceCIOs can make a difference

5-27

Page 28: Topik 5

An Information Services An Information Services Code of ConductCode of Conduct

Conduct all activities in a manner that precludes Conduct all activities in a manner that precludes any form of dishonestyany form of dishonesty

Avoid any act that compromises integrityAvoid any act that compromises integrity Avoid any act that might create a dangerous Avoid any act that might create a dangerous

situationsituation Not use alcohol or drugs while at workNot use alcohol or drugs while at work

5-28See Figure 5.4

Page 29: Topik 5

An Information Services An Information Services Code of Conduct (cont.)Code of Conduct (cont.)

Maintain courteous and professional relations Maintain courteous and professional relations with users, associates, and supervisorswith users, associates, and supervisors

Adhere to the no-solicitation rule and any other Adhere to the no-solicitation rule and any other employment policyemployment policy

5-29See Figure 5.4

Page 30: Topik 5

An Information Services An Information Services Code of Conduct (cont.)Code of Conduct (cont.)

Protect confidentiality of sensitive information Protect confidentiality of sensitive information about the organization’s competitive position, about the organization’s competitive position, trade secrets, or assetstrade secrets, or assets

Exercise sound business practice in the Exercise sound business practice in the management of such company resources such management of such company resources such as personnel, computer use, outside services, as personnel, computer use, outside services, travel, and entertainmenttravel, and entertainment

5-30See Figure 5.4

Page 31: Topik 5

SummarySummary

Morals, laws, and ethics govern behaviorMorals, laws, and ethics govern behavior Early yearsEarly years

– No computer lawsNo computer laws– Easy to bypass regulationEasy to bypass regulation

Executives impose ethical cultureExecutives impose ethical culture Computer ethics require executive to put proper Computer ethics require executive to put proper

policies in placepolicies in place

5-31

Page 32: Topik 5

Summary [cont.]Summary [cont.]

Society places importance on computer ethicsSociety places importance on computer ethics– Logical malleabilityLogical malleability– Transforming ways of livingTransforming ways of living– Processes are hidden from viewProcesses are hidden from view

Societal rights in relation to the computerSocietal rights in relation to the computer

5-32