MANAGEMENT INFORMATION
SYSTEM
Ethical & Social
Issues in MIS
Information systems and ethics
– Information systems raise new ethical
questions because they create
opportunities for:
Intense social change, threatening
existing distributions of power, money,
rights, and obligations
New kinds of crime
Key technology trends that raise
ethical issues
1. Doubling of computer power
– More organizations depend on computer systems for
critical operations
1. Rapidly declining data storage costs
– Organizations can easily maintain detailed databases on
individuals
1. Networking advances and the Internet
– Copying data from one location to another and accessing
personal data from remote locations is much easier
4. Advances in data analysis techniques
– Companies can analyze vast quantities of data
gathered on individuals for:
 Profiling
– Combining data from multiple sources to create
dossiers of detailed information on individuals
 Nonobvious relationship awareness (NORA)
– Combining data from multiple sources to find obscure
hidden connections that might help identify criminals or
terrorists
NORA technology can take information about people from disparate sources
and find obscure, nonobvious relationships. It might discover, for example, that
an applicant for a job shares a telephone number with a known criminal and
issue an alert to the hiring manager.
Where does it cross the line?
 Edward Snowden
 He leaked classified documents
that revealed numerous global
surveillance programs, many run
by the NSA and the Five
Eyes* with the cooperation
of telecommunication
companies and European
governments
* It is an intelligence alliance comprising Australia, Canada, New
Zealand, the United Kingdom, and the United States
Ethics in an Information Society
 Basic concepts for ethical analysis
– Responsibility:
 Accepting the potential costs, duties, and obligations for
decisions
– Accountability:
 Mechanisms for identifying responsible parties
– Liability:
 Permits individuals (and firms) to recover damages done to
them
– Due process:
 Laws are well known and understood, with an ability to appeal
to higher authorities
 Ethical analysis: A five-step process
1. Identify and clearly describe the facts
2. Define the conflict or dilemma and identify the
higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably
take
5. Identify the potential consequences of your
options
 Six Candidate Ethical Principles
1. Golden Rule
 Do unto others as you would have them do unto you
1. Immanuel Kant’s Categorical Imperative
 If an action is not right for everyone to take, it is not right
for anyone
1. Descartes’ Rule of Change
 If an action cannot be taken repeatedly, it is not right to
take at all
 Six Candidate Ethical Principles (cont.)
4. Utilitarian Principle
 Take the action that achieves the higher or greater value
4. Risk Aversion Principle
 Take the action that produces the least harm or least
potential cost
4. Ethical “no free lunch” Rule
 Assume that virtually all tangible and intangible objects are
owned by someone unless there is a specific declaration
otherwise
Five moral dimensions of the
information age
1. Information rights and obligations
2. Property rights and obligations
3. Accountability and control
4. System quality
5. Quality of life
Five moral dimensions graphically
1- Information rights and
obligations
 Privacy:
– Claim of individuals to be left alone, free from
surveillance or interference from other individuals,
organizations, or state. Claim to be able to control
information about yourself
 Do you believe that there are sufficient
protections for privacy in law?
Data protection laws of the world
 http://www.dlapiperdataprotection.com/
Fair Information Practices (FIP)
 Notice/awareness (core principle)
– Web sites must disclose practices before collecting
data
 Choice/consent (core principle)
– Consumers must be able to choose how information
is
 Access/participation
– Consumers must be able to review, contest
accuracy of personal data
Fair Information Practices (FIP)
 Security
– Data collectors must take steps to ensure accuracy,
security of personal data
 Enforcement
– There must be a mechanism to enforce FIP
principles
Internet challenges to privacy
 Cookies
– Tiny files downloaded by Web site to visitor’s hard drive
to help identify visitor’s browser and track visits to site
– Allow Web sites to develop profiles on visitors
 Web beacons/bugs
– Tiny graphics embedded in e-mail and Web pages to
monitor who is reading message
 Spyware
– Surreptitiously installed on user’s computer
– May transmit user’s keystrokes or display unwanted ads
Google’s collection of private data;
behavioral targeting
 What are your thoughts on it?
2 - Property rights and obligations
 Intellectual property: Intangible property of any
kind created by individuals or corporations
 Three main ways that protect intellectual property
1. Trade secret: Intellectual work or product belonging to
business, not in the public domain
2. Copyright: Statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years
3. Patents: Grants creator of invention an exclusive
monopoly on ideas behind invention for 20 years
 Challenges to intellectual property rights
– Digital media different from physical media (e.g.
books)
 Ease of replication
 Ease of transmission (networks, Internet)
 Difficulty in classifying software
 Compactness
 Difficulties in establishing uniqueness
3 - Accountability and control
Computer-related liability problems
– If software fails, who is responsible?
– Eg, Amazon and its clients
4 - Systems quality
 System Quality: Data Quality and System Errors
– What is an acceptable, technologically feasible level of
system quality?
 Flawless software is economically unfeasible
– Three principal sources of poor system performance:
 Software bugs, errors
 Hardware or facility failures
 Poor input data quality (most common source of business
system failure)
5 - Quality of life
 Quality of life: Equity, access, and boundaries
– Negative social consequences of systems
 Balancing power: Although computing power helps
decentralizing, key decision-making remains centralized
 Rapidity of change: Businesses may not have enough time
to respond to global competition
 Maintaining boundaries: Computing, Internet use lengthens
work-day, infringes on family, personal time
 Dependence and vulnerability: Public and private
organizations ever more dependent on computer systems
Health risks:
– Repetitive stress injury (RSI)
Largest source is computer keyboards
Carpal Tunnel Syndrome (CTS)
– Computer vision syndrome (CVS)
– Technostress
– Role of radiation, screen emissions, low-
level electromagnetic fields
 Computer crime and abuse
– Computer crime: Commission of illegal acts through use
of compute or against a computer system – computer
may be object or instrument of crime
– Computer abuse: Unethical acts, not illegal
 Spam: High costs for businesses in dealing with spam
 Employment:
– Reengineering work resulting in lost jobs
 Equity and access – the digital divide:
– Certain ethnic and income groups in the United States
less likely to have computers or Internet access
Questions??

More Related Content

PPT
MIS Support to Management
PPT
Ethical and social issues in management information systems for BBA hons pro...
PDF
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
PPT
Ethical issues of IS
PPT
Information System Plan
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
MIS Support to Management
Ethical and social issues in management information systems for BBA hons pro...
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
Ethical issues of IS
Information System Plan
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)

What's hot (20)

PPTX
Chapter 4 Ethical and Social Issues in Information Systems
PPT
MIS-CH04: Ethical and Social Issues in INformation Systems
PPTX
strategic information system
PPT
Enterprise Systems.ppt
PPT
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
PPTX
Management Information Systems - Chapter 2
PPT
MIS-CH01: Information Systems, Organization, and Strategy
PPT
Strategic use of information systems
PPT
Security & ethical challenges
PPT
PPT
MIS-CH02: Global e-Business and Collaboration
PPT
MIS-CH08: Securing Information Systems
PPT
E commerce security
PPT
Transaction Processing System
PPTX
Accounting information system presentation
PPT
Information Systems, Organizations, Management and Strategy
PPT
Security and ethical challenges in mis
PPT
Information Systems in Global Business Today
PPT
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Chapter 4 Ethical and Social Issues in Information Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
strategic information system
Enterprise Systems.ppt
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
Management Information Systems - Chapter 2
MIS-CH01: Information Systems, Organization, and Strategy
Strategic use of information systems
Security & ethical challenges
MIS-CH02: Global e-Business and Collaboration
MIS-CH08: Securing Information Systems
E commerce security
Transaction Processing System
Accounting information system presentation
Information Systems, Organizations, Management and Strategy
Security and ethical challenges in mis
Information Systems in Global Business Today
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Ad

Similar to Ethical And Social Issues in MIS - Management Information System (20)

PPTX
Ethical_and_Social_Issues_in_Information_Systems.pptx
PPTX
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
PDF
Ch 4.pdf
PPT
Ethics in Information System - Management Information System
PDF
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
PPT
Technological trends
PPTX
PPTX
3-Professional Ethics Issues.pptx
PPT
102 Chapter 4 Pt 2
PPTX
3 - Social Media and Enterprise
PPT
Chapter 4
PPTX
Computer ethics cyber security and technology of it
PPT
Ethical and Social Issues in the Digital Firm .ppt
PPTX
chapter_six_ethics and proffesionalism_new-1.pptx
PPT
Super billing computer ethics, privacy and security
PPTX
Ethical and Social Issues in IT.pptx
PDF
mischapter4-130509184940-phpapp02.pdf
PPTX
chapter 6 Ethics and Professionalism of ET (3).pptx
PPT
MIS Chapter 4
PPT
PPIT Lecture 8
Ethical_and_Social_Issues_in_Information_Systems.pptx
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
Ch 4.pdf
Ethics in Information System - Management Information System
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
Technological trends
3-Professional Ethics Issues.pptx
102 Chapter 4 Pt 2
3 - Social Media and Enterprise
Chapter 4
Computer ethics cyber security and technology of it
Ethical and Social Issues in the Digital Firm .ppt
chapter_six_ethics and proffesionalism_new-1.pptx
Super billing computer ethics, privacy and security
Ethical and Social Issues in IT.pptx
mischapter4-130509184940-phpapp02.pdf
chapter 6 Ethics and Professionalism of ET (3).pptx
MIS Chapter 4
PPIT Lecture 8
Ad

More from FaHaD .H. NooR (20)

PDF
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
PDF
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
PDF
FAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
PDF
FAHAD HASSAN NOOR || UCP Business School
PDF
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
PDF
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
PDF
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
PDF
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
PDF
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
PDF
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
PDF
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
PDF
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
PDF
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
PDF
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
PDF
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
PDF
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
PPTX
Supply Chain Management
PPTX
Creating and Managing Supplier Relationships
PPTX
ETHICAL AND SUSTAINABLE SOURCING
PPTX
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
FAHAD HASSAN NOOR || UCP Business School Data Analytics Head Recommended | MB...
FAHAD HASSAN NOOR || UCP Business School Program Manager Recommended | MBA | ...
FAHAD HASSAN NOOR || UCP Business School Associate Dean Recommended
FAHAD HASSAN NOOR || UCP Business School
Drop Shipping in the Q-Commerce Era, A case study of Daraz. pk | Project by F...
Operations Management A-Z: Business Processes and Systems | Fahad Hassan Noor
Supply Chain Management A-Z: Operations & Logistics Basics | Fahad Hassan Noor
Inventory Management A-Z: Supply Chain & Business Operations | Fahad Hassan N...
Supply Chain Management A-Z: Operations & Logistics Certified - Udemy - Fahad...
Facebook Ads & Facebook Marketing MASTERY | Coursenvy ® - Fahad Hassan Noor -...
Training for Zendesk Administrators MasterClass - Fahad Hassan Noor
TikTok Marketing: Grow Your Account & Master TikTok Ads - Fahad Hassan Noor
Amazon FBA Private Label Course for Beginners | Amazon 2022 - Fahad Hassan Noor
Complete Video Production, Video Marketing, & YouTube Course - Fahad Hassan Noor
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Fahad Hassan Noor | Zendesk Customer Support Portal Certified | Udemy Premium...
Supply Chain Management
Creating and Managing Supplier Relationships
ETHICAL AND SUSTAINABLE SOURCING
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...

Recently uploaded (20)

PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PPTX
Macbeth play - analysis .pptx english lit
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Climate Change and Its Global Impact.pptx
PDF
semiconductor packaging in vlsi design fab
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
MA in English at Shiv Nadar University – Advanced Literature, Language & Rese...
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Macbeth play - analysis .pptx english lit
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
2025 High Blood Pressure Guideline Slide Set.pptx
UNIT_2-__LIPIDS[1].pptx.................
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
M.Tech in Aerospace Engineering | BIT Mesra
plant tissues class 6-7 mcqs chatgpt.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
Climate Change and Its Global Impact.pptx
semiconductor packaging in vlsi design fab
Race Reva University – Shaping Future Leaders in Artificial Intelligence
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
MA in English at Shiv Nadar University – Advanced Literature, Language & Rese...
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
CRP102_SAGALASSOS_Final_Projects_2025.pdf
Journal of Dental Science - UDMY (2021).pdf
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt

Ethical And Social Issues in MIS - Management Information System

  • 2. Information systems and ethics – Information systems raise new ethical questions because they create opportunities for: Intense social change, threatening existing distributions of power, money, rights, and obligations New kinds of crime
  • 3. Key technology trends that raise ethical issues 1. Doubling of computer power – More organizations depend on computer systems for critical operations 1. Rapidly declining data storage costs – Organizations can easily maintain detailed databases on individuals 1. Networking advances and the Internet – Copying data from one location to another and accessing personal data from remote locations is much easier
  • 4. 4. Advances in data analysis techniques – Companies can analyze vast quantities of data gathered on individuals for:  Profiling – Combining data from multiple sources to create dossiers of detailed information on individuals  Nonobvious relationship awareness (NORA) – Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
  • 5. NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job shares a telephone number with a known criminal and issue an alert to the hiring manager.
  • 6. Where does it cross the line?  Edward Snowden  He leaked classified documents that revealed numerous global surveillance programs, many run by the NSA and the Five Eyes* with the cooperation of telecommunication companies and European governments * It is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States
  • 7. Ethics in an Information Society  Basic concepts for ethical analysis – Responsibility:  Accepting the potential costs, duties, and obligations for decisions – Accountability:  Mechanisms for identifying responsible parties – Liability:  Permits individuals (and firms) to recover damages done to them – Due process:  Laws are well known and understood, with an ability to appeal to higher authorities
  • 8.  Ethical analysis: A five-step process 1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher-order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options
  • 9.  Six Candidate Ethical Principles 1. Golden Rule  Do unto others as you would have them do unto you 1. Immanuel Kant’s Categorical Imperative  If an action is not right for everyone to take, it is not right for anyone 1. Descartes’ Rule of Change  If an action cannot be taken repeatedly, it is not right to take at all
  • 10.  Six Candidate Ethical Principles (cont.) 4. Utilitarian Principle  Take the action that achieves the higher or greater value 4. Risk Aversion Principle  Take the action that produces the least harm or least potential cost 4. Ethical “no free lunch” Rule  Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
  • 11. Five moral dimensions of the information age 1. Information rights and obligations 2. Property rights and obligations 3. Accountability and control 4. System quality 5. Quality of life
  • 12. Five moral dimensions graphically
  • 13. 1- Information rights and obligations  Privacy: – Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state. Claim to be able to control information about yourself  Do you believe that there are sufficient protections for privacy in law?
  • 14. Data protection laws of the world  http://www.dlapiperdataprotection.com/
  • 15. Fair Information Practices (FIP)  Notice/awareness (core principle) – Web sites must disclose practices before collecting data  Choice/consent (core principle) – Consumers must be able to choose how information is  Access/participation – Consumers must be able to review, contest accuracy of personal data
  • 16. Fair Information Practices (FIP)  Security – Data collectors must take steps to ensure accuracy, security of personal data  Enforcement – There must be a mechanism to enforce FIP principles
  • 17. Internet challenges to privacy  Cookies – Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site – Allow Web sites to develop profiles on visitors  Web beacons/bugs – Tiny graphics embedded in e-mail and Web pages to monitor who is reading message  Spyware – Surreptitiously installed on user’s computer – May transmit user’s keystrokes or display unwanted ads
  • 18. Google’s collection of private data; behavioral targeting  What are your thoughts on it?
  • 19. 2 - Property rights and obligations  Intellectual property: Intangible property of any kind created by individuals or corporations  Three main ways that protect intellectual property 1. Trade secret: Intellectual work or product belonging to business, not in the public domain 2. Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years 3. Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
  • 20.  Challenges to intellectual property rights – Digital media different from physical media (e.g. books)  Ease of replication  Ease of transmission (networks, Internet)  Difficulty in classifying software  Compactness  Difficulties in establishing uniqueness
  • 21. 3 - Accountability and control Computer-related liability problems – If software fails, who is responsible? – Eg, Amazon and its clients
  • 22. 4 - Systems quality  System Quality: Data Quality and System Errors – What is an acceptable, technologically feasible level of system quality?  Flawless software is economically unfeasible – Three principal sources of poor system performance:  Software bugs, errors  Hardware or facility failures  Poor input data quality (most common source of business system failure)
  • 23. 5 - Quality of life  Quality of life: Equity, access, and boundaries – Negative social consequences of systems  Balancing power: Although computing power helps decentralizing, key decision-making remains centralized  Rapidity of change: Businesses may not have enough time to respond to global competition  Maintaining boundaries: Computing, Internet use lengthens work-day, infringes on family, personal time  Dependence and vulnerability: Public and private organizations ever more dependent on computer systems
  • 24. Health risks: – Repetitive stress injury (RSI) Largest source is computer keyboards Carpal Tunnel Syndrome (CTS) – Computer vision syndrome (CVS) – Technostress – Role of radiation, screen emissions, low- level electromagnetic fields
  • 25.  Computer crime and abuse – Computer crime: Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime – Computer abuse: Unethical acts, not illegal  Spam: High costs for businesses in dealing with spam  Employment: – Reengineering work resulting in lost jobs  Equity and access – the digital divide: – Certain ethnic and income groups in the United States less likely to have computers or Internet access