click below
click below
Normal Size Small Size show me how
ChapterFour
Ethical and Social Issues in Information Systems
Question | Answer |
---|---|
Accountability | is a feature of systems and social institutions |
Carpal tunnel syndrome | The most common kind of computer-related Repetitive stress injury |
Computer abuse | is the commission of acts involving a computer that may not be illegal but are considered unethical |
Computer crime | is the commission of illegal acts by using a computer or against a computer system. |
Computer vision syndrome | refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers,smartphones, and handheld video games. |
Cookies | are small text files deposited on a computer hard drive when a user visits websites |
Copyright | is a statutory grant that protect creator of intellectual property from having their work copied by other for any purpose during the life of the author plus an additional 70 years after authors death. |
Digital divide | could lead to a society of information haves, computer literate and skilled versus a large group of information have-nots, computer illiterate and unskilled. |
Digital Millennium Copyright act | of 1998 also provides some copyright protection. |
Due Process | is a related feature of law governed societies and is process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws are applied correctly |
Ethical no-free-lunch rule | assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise |
Ethics | refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. |
Fair Information Practices | Is a set of principles governing the collection and use of information about individuals |
Golden Rule | do unto others as you would have them unto you |
Immanuel Kant categorical imperative | if an action is not right for everyone to take, it is not right for anyone. |
Information rights | Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management |
informed consent | Customers must provide their informed consent before any company can legally use data about them |
intellectual property | is considered to be tangible and intangible products of the mind created by individuals or corporations |
Liability | extends the concepts of responsibility further to the area of laws |
non-obvious relationship awareness | a data analysis technology that has given both the government and the private sector even more powerful profiling capabilities |
Opt-in | model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. |
Opt-out | model of informed consent permits the collection of personal information until the consumer specifically requests the date not to be collected |
Patent | grants the owner an exclusive monopoly on the ideas behind an invention for 20 years |
Privacy | is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state |
Profiling | the use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called profiling. |
Repetitive stress injury | occurs when muscle groups are forced through repetitive action often with high impact loads or tens of thousand of repetitions under low impact loads. |
Responsibility | is a key element of ethical action |
Risk aversion principle | take the action that produces the least harm or the least potential cost |
Safe Harbor | is a private, self-regulating policy and enforcement mechanism that meets the objectives of government and regulators and legislation but does not involve government regulation or enforcement. |
Spam | was junk email an organization or individual sent to a mas audience of internet users who have expressed no interest in the product or service being marketed. |
Spyware | can secretly install itself on an internet user computer by pig-gybacking on larger applications. |
Trade Secret | any intellectual work product can be classified as a trade secret, provided it is not based on information in the public domain. |
Utilitarian Principle | take the action that achieves the higher or greater value |
Web beacons | also called web bugs, are tiny software programs that keep a record of users online clickstreams. |
Trademark | are the marks, symbols and images used to distinguish products in the marketplace |
Slippery Slope rule | if ab action cannot be taken repeatedly, it is not right to take at all. |
Five moral dimensions of information age? | 1. Information rights and obligations. 2. Property rights and obligations. 3. Accountability and control. 4. System Quality. 5. Quality of life. |
What specific principles for conduct can be used to guide ethical decisions? | 1. Responsibility, Accountability, and liability. 2. Ethical analysis. 3. Candidate ethical principles. 4. Professional codes of conducts. 5. Some real world ethical dilemmas |
Ethical Analysis? | 1. Identify and describe the facts 2. Define the conflict 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options |
Candidate Ethical Principles? | 1. Golden Rule 2. Immanuel Kant's categorical imperative 3. Slippery Slope 4. Utilitarian principle 5. Risk Aversion principle 6. Ethical "no free lunch" rule |
Property Rights: Intellectual property? | 1. Trade secrets 2. Copyright 3. Patents |
Non-Obvious Relationship Awareness (NORA) | 1. Watch Lists 2. Incident and Arrest Systems 3. Customer Transaction Systems 4. Telephone Records 5. Human Resource Systems |