Ethical and Social Issues Ch 5 ALL

Embed Size (px)

Citation preview

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    1/18

    Management Information Systems

    Chapter5The Digital Firm:

    Ethical, Social & Policy

    Issues

    Kenneth C. Laudon & Jane P. Laudon

    9th

    edition PEARSON - Prentice Hall 2006www.prenhall.com/laudon

    " : ( ( "

    " "

    " "

    1

    http://www.prenhall.com/laudonhttp://www.prenhall.com/laudon
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    2/18

    The Digital Firm:

    Ethical,Social andPolitical Issues

    ObjectivesAfter completing this chapter, you will be able to:

    1. Analyze the relationship among ethical, social, and political issues that areraised by information systems.

    2. Identify the main moral dimensions of an information society and specificprinciples for conduct that can be used to guide ethical decisions.

    3. Evaluate the impact of contemporary information systems and the Internet onthe protection of individual privacy and intellectual property.

    4. Assess how information systems have affected everyday life.

    5. Identify the principal management challenges posed by the ethical and socialimpact of information systems and management solutions.

    Discussion Questions:

    1. Write a computer usage policy for your school or workplace incorporating themoral and ethical guidelines discussed in this chapter.

    2. Briefly describe your Internet Service Provider's e-mail usage policy. If you areon campus, your school should have a usage policy.

    3. Describe how your quality of life has improved or declined with thetechnological advances in the last five years.

    4. How do you think our government should handle the political issue of Internetdecency and access limitations?

    5. To what extent should Internet Service Providers be held liable andaccountable for the use of their equipment?

    2

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    3/18

    Ethical and Social Issues in the Digital FirmIt probably goes without saying that the security and ethical issues raised by the InformationAge, and specifically the Internet, are the most explosive to face our society in decades. Itwill be many years and many court battles before socially acceptable policies and practices

    are in place.

    5.1 Understanding Ethical and Social Issues Related toSystems

    Ethic refers to the principles of right and wrong that individuals use to make choices to guidetheir behaviors.

    IT can be used to achieve social progress, but it can also be used to commit crimes andthreaten cherished social values.

    Development of IT will produce benefits for many and costs for others.

    You may love the idea that a gardening Web site or a mail order catalog gives you informationabout what grows best in your backyard (literally your backyard). You might even love theidea that you can sign on to Amazon.com, have the Web site greet you by name, and supplyyou with information about a book or CD by your favorite author or artist. If you're notespecially interested in Stephen King or Frank Sinatra, don't worry; Amazon.com knows thatand won't bother you with products from those artists.

    You are 22 years old, drive a Mazda, like hip-hop music, shop at Macy's at least once a montharound the 15th, wear a size 10 dress, live in a small two-bedroom apartment, have friends orrelatives who live in Texas, like eating at Red Lobster, go on a skiing trip to Colorado every

    Spring Break, missed one semester of school last year due to medical problems, and spendlots of time at the ivillage.com Web site chatting with other females your age. Would itsurprise you to know that this information and more can all be gleaned from variouscomputer records?

    On average, each American is listed in about 60 government and 80 private sector databases.On a typical day, each person's name is passed between computers ten times. A lot ofpersonal information about us has always been available, just not as easily and as readily astoday. Massive databases maintained by commercial companies and governments at all levelsnow allow profiling like that above to be accomplished easier and faster than ever before.

    Even though the Internet is over 30 years old and the World Wide Web is over 10 years old,our society is just beginning to address the ethical issues and dilemmas raised by these

    technological advances. It's difficult to measure one person's ethics against anotherperson's desire to make money or cause chaos that's made much easier by the Internet. TheU.S. government is just beginning to pass laws against cybercrimes but it's difficult to stayone step ahead of the cybercriminals.

    3

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    4/18

    A Model for Thinking about Ethical, Social, and Political Issues

    Many of these issues not only touch our society as a whole, but also raise lots of questions fororganizations, companies, and the workplace in general. We hear arguments for free speech,personal responsibility, and corporate responsibility.

    There are discussions about the government's role in all this. At thebeginning of Chapter 5, Laudon says: "Suddenly individual actors are confronted with newsituations often not covered by the old rules. Social institutions cannot respond overnight tothese ripples... Political institutions also require time before developing new laws and oftenrequire the demonstration of real harm before they act. In the meantime, you may have toact. You may be forced to act in a legal 'gray area.' "

    How you act, individually and as groups, in this gray area may well define the future of oursociety. Though that may sound a bit dramatic, you must understand that you are part of thedevelopment of "acceptable usage" of this new medium and will help define the direction inwhich it goes.

    Figure 5-1 shows the relationship between ethical, social, and political issues in aninformation society. You could change this diagram somewhat to avoid the impression thatthe five dimensions are separate. You'd show significant overlap of each area, and most of thediagram would be in shades of gray. The five dimensions we'll discuss are:

    1. information rights and obligations,

    2. property rights and obligations,

    3. accountability and control,

    4

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    5/18

    4. system quality, and the

    5. quality of life.

    Five Moral Dimensions of the Information Age

    Laudon and Laudon outline five moral dimensions that apply in today's business environment.While these dilemmas have existed in some form or another for years, they are made moreimportant with the technological advances we've seen in the last ten years.

    Key Technology Trends that Raise Ethical Issues

    Information technologies pose problems and threats to established societal rules, andtechnological advances pose new situations and possible threats to privacy and ethics.

    In addition to the technologies described in Table 5-2, you need to understand the mostrecent technological threats to your privacy in cyberspace:

    1. DoubleClick, a major Internet advertising broker, announced in early 2000 that itwould use data gathered from Web sites in conjunction with data collected fromsources other than the Internet to identify people by name. It intended to sell the datato marketers who would be able to target advertising campaigns more efficiently.Public outcry about privacy issues forced DoubleClick to cancel its plans. If it's anyconsolation, DoubleClick went up for sale in late 2004 but there are others waiting totake its place.

    2. The American Civil Liberties Union charges that because the suggested chip for thenew U.S. Passport design would be capable of holding as much information as the firstpersonal computers it will be a significant threat to privacy. The new RFID chip wouldcontain all of the information currently displayed on a passport, including a templatefor an automated facial recognition identification system that has yet to be proven.The information on the chip is not protected by encryption and is reported to be

    readable from up to 30 feet away. (Passport chips raise privacy concerns, CNN Online,January 6, 2005)

    3. New handheld Web appliances will allow businesses to track your physical whereaboutsand offer you discounts and special offers depending on your geographic location. Asyou walk down a city street, you'll be notified that the restaurant two blocks away hasan open table waiting just for you.

    4. A new data category indicates that 60 percent of wiretaps authorized in 2000 were forwireless devices such as cellular phones and pagers. (EPIC Web site, May 2001)

    5

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    6/18

    The last item in the list above came from a Web site maintained by the Electronic PrivacyInformation Center, an organization devoted to privacy issues associated with the use of newtechnologies tied to networks in general, and the Internet specifically. It is one of the premierorganizations dedicated to preserving the privacy of the American citizen. If you haven'tvisited the Web site you should.

    You say to yourself, "Hey I don't really care. Nobody will ever care about what I do or where I

    go on the Internet." Well, you might want to think twice about that. There have beenreported instances of companies accessing databases from various sources as part of thescreening process to determine what chatrooms and Web sites prospective employees havevisited. How can that be, you ask? The technological trends Laudon and Laudon discuss, suchas advances in data storage, give you one clue.

    The scenario at the beginning of this section about profiling is possible through thetechnique called datamining. Add to that the capabilities of nonobvious relationshipawareness (NORA) data analysis technology, as shown in Figure 5-2, and completestrangers might know just as much about you as you do. It can and has been done. So youshould be concerned and you should care.

    6

    http://www.epic.org/http://www.epic.org/http://www.epic.org/http://www.epic.org/
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    7/18

    Bottom Line: Technological trends are posing new situations and questions we

    haven't had to deal with before. As it's your world and your future, you should beconcerned and become involved in their resolution.

    7

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    8/18

    5.2 Ethics in an Information Society

    Did you ever hear the old warning: "Just because you can, doesn't mean you should?"Well, a lot of things are possible on the Internet nowadays, but that doesn't mean you shoulddo them.

    Ethics is easily managed in small groups because the group itself tends to control the

    individual's behavior. It's referred to as "self-policing." The larger the group, the harder itis to manage the actions of individuals. Now stretch that to a huge number of people withmany frames of reference and experiences. Responsibility to the group becomes harder topolice and accountability for an individual's actions is harder to enforce.

    Basic Concepts: Responsibility, Accountability, and Liability

    Every action causes a reaction. When you're using the Internet, computers on campus, oryour employer's computer, you should be aware of the following:

    Responsibility: Accepting potential costs, duties, and obligations for your decisions. Accountability: Determining who should take responsibility for decisions and actions. Liability: Legally placing responsibility with a person or group. Due Process: ensuring the laws are applied fairly and correctly.

    Responsibility, accountability, and liability are all yours when it comes to your actions incyberspace. Every Internet Service Provider has a "usage policy," even the so-calledanonymous e-mailers that hide your real identity. Hotmail is a popular Internet e-mail servicethat allows you to mask your real identity. You could send out all the, shall we say unethical,threatening, nasty, aberrant, e-mail you like. You think: "Hey, no one will really know who Iam. This is cool."

    And then here comes the message from Hotmail to cease and desist. Your free e-mail accountis cancelled because you violated Hotmail's usage policy. Then your local Internet ServiceProvider contacts you and tells you you're terminated, baby! You violated its usage policy byyour actions. By now you're really mad, not to mention embarrassed (at least we hope so).It's true. It happens.

    Just because you think you can, doesn't mean you should. Would youstand in the middle of campus and shout insults? Laudon and Laudon point out, "Usinginformation technology in a socially responsible manner means that you can and will be heldaccountable for the consequences of your actions." Just as you are subject to rules, whetheryou like them or not, on Main Street, USA, in public, you are subject to societal rules incyberspace. Anonymity isn't a license for socially unacceptable behavior.

    Some people seem to absolve themselves of responsibility by putting the responsibility on thecomputer - "Hey, the computer screwed up," or "Since it was an anonymous username Ididn't think I'd get caught." It just doesn't work that way in society face-to-face or on theInternet. No one can hide behind the technology. Humans control the computers, not theother way around.

    And if you have received threatening, aberrant e-mails or flames in chatroom or discussiongroups, and haven't reported them according to the usage policies, you may be as much apart of the problem as the perpetrator!

    8

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    9/18

    Ethical Analysis

    It's safe to say you'll find yourself in situations where your ethics are challenged. What shouldyou do? Try the following:

    Separate fact from fiction. Remember, no matter how thin you slice it, there's always two sides. Determine who's really involved. Compromise; it doesn't always have to be an "either-or" outcome. Anticipate the outcome; it will help you devise better solutions.

    You should study the ethical principles outlined in the text, as we'll be incorporating them intothe discussions throughout the remainder of this chapter.

    In the early days of the Internet, just about anything was acceptable. The phrase "Wild WildWeb" was an appropriate clich. But as the technology becomes more mainstream, the lesswild it becomes.

    The principles listed in the text are deeply rooted in cultures around the world. We seriously

    doubt the authors had the Internet in mind when they developed these guidelines. But, whenyou think about it, they work nicely, even in cyberspace!

    Professional Codes of Conduct

    Most professional organizations have a code of conduct by which they expect their members

    to abide. The Association of Computing Machinery (ACM) has an excellent set ofstandardsthat apply to all of us, whether we belong to ACM or not.

    Some Real-World Ethical Dilemmas

    Individuals, companies, and corporations are being forced to deal with these new ethical andsocial issues in ways never before imagined. Employ the ethical analysis we just discussed tothe real-world situations presented here and in the text.

    No issue has been harder for organizations to deal with than that of e-mail. Should companiesbe allowed to read employees' e-mails, especially if they are personal? Should employees beallowed to send personal e-mails to begin with? Should e-mails be used against a person orcompany in a court of law. If so, how? A recent example of this issue is the Microsoft versusDepartment of Justice antitrust trial. Many e-mails written by Microsoft's executives havebeen used against them. E-mails are not as anonymous as people think "Sending an e-mailmessage is more like sending a postcard than sending a sealed envelope."(CNN HeadlineNews, April 28, 1996)

    So in your opinion, what is right? Is it okay for an employee to download the latest picturefrom Playgirl's Web site and use it as a screensaver? Is it okay to run a personal commercialWeb site from your workplace computer using the company's computer resources? Is it okayto e-mail discriminatory jokes over the company's network that wouldn't be allowed over thewater cooler? Is it okay to send e-mail telling everyone that the boss is a jerk, then get madwhen the company fires you?

    Is it okay for the company to use technology to monitor your computer usage every minuteyou're on the job? Is it okay for the company to use technology to monitor your keystrokes so

    9

    http://www.acm.org/constitution/code.htmlhttp://www.acm.org/constitution/code.html
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    10/18

    they can determine how much work you're doing? Is it okay for you to use the company'scomputers and networks to surf Macy's Web site and order the latest fashions during yourlunch break? Should a company be allowed to remove Solitaire from employee computers?(Oh, that last one would kill me!)

    What if Susie is using her computer to surf gardening Web sites three hours a day while youhave to do her work? What if Joe and Sam play the newest Internet game during their coffee

    break every morning and afternoon, which bogs down the entire company's network?

    What is the best way for companies and employees to handle these situations? What is theright thing to do?

    5.3 The Moral Dimensions of Information Systems

    This section examines the five moral dimensions (information rights; property rights;accountability, liability, and control; system quality; and the quality of life) by asking you toexamine them from a personal standpoint.

    Information Rights: Privacy and Freedom in the Internet Age

    Many of us take our privacy and freedom for granted. You should be aware of howtechnology is changing and challenging our basic assumptions about these issues.

    Video rental records are more protected from misuse and prying than are some of yourfinancial records. We all assume that the Constitution guarantees our personal privacy andfreedom from surveillance. If someone set up a video camera inside your dorm room or onyour front porch to monitor your every movement, what would you do? In some cases, that'ssimilar to what happens when you access some Web sites. So how do we protect our privacyand freedom from surveillance in a high-tech world?

    The text provides some information regarding privacy rights protected by law and establishedpractices. But before you jump up and say, "Hey, the Privacy Act of 1974 says you can't spyon me," remember that law only applies to the federal government's actions. If Macy's orPlayboy or Buy.com wants to collect information about your surfing habits and sell it to othercompanies, there is nothing to stop them.Absolutely nothing!

    This whole issue doesn't bother some people at all. In fact, they don't even think about it. Theissue doesn't bother others until the intrusions are used against them. Think about this: Ifinformation is supposedly collected for one purpose, is it ethical for that information to beused for a totally different purpose without you knowing it? Is it fair to require you to providemedical information that is primarily intended to be used to pay your insurance bills and thenhave that same information used against you when the insurance company deems you tooexpensive and cancels your policy? Is it fair to have that same information used against youin denying you employment because you're too expensive to hire?

    Bottom Line: Ethics in an information society holds each person responsible for his

    or her actions. Each person is accountable for everything he or she does, no matterhow anonymous the action may seem. Each person is liable for the consequences

    his or her actions may inflict on other people and society as a whole.

    10

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    11/18

    The federal government is taking steps to help protect individual privacy in the United Statesby passing laws as you can see in Table 5-3. However, the wheels of government turn slowlyand the first line of defense should be yours.

    The Federal Trade Commission has stepped up their efforts to protect consumers' personalinformation on the Internet. An excerpt from their Web site explains their mission.

    Advances in computer technology have made it possible for detailed information aboutpeople to be compiled and shared more easily and cheaply than ever. That's good forsociety as a whole and individual consumers. For example, it is easier for lawenforcement to track down criminals, for banks to prevent fraud, and for consumers tolearn about new products and services, allowing them to make better-informedpurchasing decisions. At the same time, as personal information becomes moreaccessible, each of us - companies, associations, government agencies, and consumers- must take precautions to protect against the misuse of that information.

    The Federal Trade Commission is educating consumers and businesses about theimportance of personal information privacy. Read more about our efforts, what we'velearned, and what you can do to protect the privacy of your personal information.

    The European Directive on Data Protection

    European countries have much stricter restrictions on gathering data about privateindividuals, on the Internet or elsewhere. European citizens have the right to deny the initialcollection of information. They have the right to know and deny the use of data for purposes

    11

    http://www.ftc.gov/privacy/index.htmlhttp://www.ftc.gov/privacy/index.html
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    12/18

    other than its original intention. They have the right to inspect and correct any data gatheredon them. By way of comparison, Europeans practice opt-in whereas Americans practice opt-out. So far, American citizens have none of these rights. American businesses physicallyoperating in European countries or transacting business with European citizens via theInternet must abide by these laws. You have to ask the question, "If it's good enough for theEuropeans, why isn't it good enough for the Americans?" Here's a Web site dealing with globalprivacy issues sponsored by the Privacy Exchange.

    Internet Challenges to Privacy

    Under pressure from privacy advocates, government agencies, and the general public, manyWeb sites now post privacy policies. Some sites make their policies obvious and others don't.Some sites actually abide by their policies and others don't. You need to be careful about theterminology used. Review Altavista.com's privacy policy and note it distinguishes betweenpersonally identifiable information and anonymous information. Now review DoubleClick'sprivacy policy. It too distinguishes between personally identifiable information and anonymousinformation. However, it does state that it can match the two types of information to furtheridentify you.

    How do these organizations gather the information? By using cookies, a part of everybrowser program. If you have Internet access and have ever visited a Web site, you can betyou have a cookie file on your computer.

    Here's what a typical cookie file will look like:

    Most of the data in the file are unintelligible to you. However, they give information to Websites about how you prefer the Web site to be configured, who you are, which Web site you

    came from, what you do while on a site, and other information pertinent to the Web site. Youcan turn off the cookie option in your browser, but many sites won't let you access their

    features if you do.

    Because the corporate world is demanding better results for the dollars spent on Internetadvertising, some Web sites have developed Web bugs to help track users and determinewhat they do and don't do on the Internet. Web bugs are tiny, indistinguishable filesembedded within a Web page or within an e-mail message. The bug monitors behavior ofthose using the page and combines the information with other data collected to get a morerobust picture of how people are using the Web site and how effective the advertising is.

    Increasingly, Web sites are using spyware in an attempt to gather marketing informationabout visitors and customers. This type of software is installed directly onto your computer

    12

    http://www.privacyexchange.org/http://www.altavista.com/about/privacyhttp://www.doubleclick.com/us/corporate/privacy/http://www.doubleclick.com/us/corporate/privacy/http://www.privacyexchange.org/http://www.altavista.com/about/privacyhttp://www.doubleclick.com/us/corporate/privacy/http://www.doubleclick.com/us/corporate/privacy/
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    13/18

    and sends data to the company about your surfing habits. Unfortunately, this software canalso cause problems with your computer and send information that can be used in identitytheft. If you haven't yet installed spyware detection software on your computer you shouldconsider doing so.

    Most e-commerce merchants are pushing for self-regulation and the practice of requiringindividuals to "opt-out" of data gathering. Opting out allows individuals to tell an organization

    not to share personal information with any third party. The government initially agreed withthat position, but has since realized it isn't working very well for individuals. In mid 2000, theFederal Trade Commission started seeking government regulation of information gatheringand advocates the right of individuals to "opt-in." Opting in requires individuals to expresslygive an organization the right to gather information before any information can be collected.Visit the FTC Web site for the latest information on this subject.

    Technical Solutions

    According to the law you must inform someone if you are taping a telephone conversationwith them. On the other hand, you can legally record that person's Internet transmissionswithout any need to inform them you are doing so. This type of disparity exists because our

    laws have not kept up with emerging technologies. There are some tools that can help youblock someone from tracing your Internet activities as the text discusses. However, if you useyour company's computers for most of your Web-browsing or e-mail activities, you may wantto check with your Information Technology department before you install the tools.

    PGP (Pretty Good Privacy) is one of the most popular encryption software programs for e-mail. It does have its limitations though, because both the sender and recipient must havethe program installed in order for it to work. It's a freeware program you can download fromvarious Internet sites. Network Associates, who owns the program, announced in March 2002that it will no longer support the program because they couldn't make any money from theproduct. "They've come to the conclusion that they're not going to be making any money onit," said Richard Hunter, vice president of security research at GartnerG2, a division ofresearch firm Gartner. "It's not a good sign for secure e-mail demand, despite consumers'concern for online privacy. There's certainly some demand for encryption technology incertain industries such as financial services, but it appears that there's not enough that givingthe product away is an attractive means of selling something else." (BusinessWeek Online,March 11, 2002)

    The World Wide Web consortium has developed standards for how privacy policies can beembedded into Web pages and subsequently be compared to a user's privacy wishes throughthe user's Web browser. The Platform for Privacy Practices (P3P) is included in InternetExplorer version 6.0 and allows the user to determine what sites can collect informationbehind the scenes through the user's cookie files. Because the P3P standards are "machine-readable" the user doesn't have to search each Web site for its privacy policy. The user canlet the computers do the comparison and automatically block any site not conforming to the

    user's wishes.

    Property Rights: Intellectual Property

    Intellectual property issues have been around for hundreds of years. Some of the laws andpolicies in place to settle disputes about copyrights, patents, and trade secrets, have tobe rewritten to apply to the Internet. Intellectual property is a result of someone's effort atcreating a product of value based on their experiences, knowledge, and education. In short,intellectual property is brain power.

    13

    http://www.ftc.gov/privacy/index.htmlhttp://www.ftc.gov/privacy/index.html
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    14/18

    What if you wrote the next great American novel hoping to cash in big time? Maybe you couldretire to the Bahamas and drink lemonade on the beach all day. But then you find out thatsomeone posted your next great American novel to the Internet and everyone is reading itfree of charge. Now you're back in your hometown drinking lemonade at the local mall whileyou decide whether to look for a job at McDonald's or Burger King. The good news iseveryone loves your book!

    Unfortunately, that sort of thing happens too often in the cyberworld. You're pretty excitedto get that free copy of the newest game software, while the poor guy who spent hours of histime and effort writing it is not so excited to realize he's not getting any compensation.

    Everything on the Web is considered to be protected under copyright and intellectualproperty laws unless the Web site specifically states that the content is public domain. TheWeb site doesn't need to carry the copyright symbol in order for it to be protected.President Clinton signed the Digital Millennium Copyright Act (DMCA) in January 1998 makingit a federal offense to violate copyright laws on the Internet, punishable with a fine up to$250,000.

    Copyright laws and intellectual property rights cannot be violated on the Internet any morethan they can in other mediums. While this isn't a law class, you should be aware of the fineline between acceptable and legal usage of materials and the illegal theft of materials. Whenit comes to copyright material, the underlying ideas are not protected, just the publication ofthe material. On the other hand, a patent grants a monopoly on the underlying concepts andideas. Before you use anything, especially any material on the World Wide Web, make sureyou are using it legally and ethically.

    Get past the idea that because everything on the Web is free, easy, and available 24-hours aday, it must therefore be okay to use it however you want. The question you should be askingyourself is, "Is it ethically right and legal?"

    The Business Software Alliance is an organization working to prevent software piracy and theillegal use of copyrighted material around the world. And don't think the problem is limited to

    the 17-year old computer geek locked in his bedroom. This crime can be committed byanyone, as this newsclip shows:

    Seventeen high-tech professionals were indicted on federal charges for participating in

    an Internet piracy ring that hijacked software worth more than $1 million. Thegovernment said 12 of those indicted are members of an underground organization

    while the five others are employees of Intel Corp. The individuals indicted werecharged with conspiracy to infringe on copyrights, which carries a maximum sentence

    of five years in prison, a $250,000 fine, and restitution. (AP Newswire, May 5, 2000)

    Perhaps the most notorious copyright infringement and intellectual property case in 2000 and2001 involved the music industry. MP3, one of the most popular methods of illegally

    downloading music from Web sites, lost a court battle waged by the music industry. MP3 wasforced to pay millions of dollars to the industry for lost revenues. The rock group Metallic suedNapster.com because it was allowing people to trade copyrighted material illegally.Napster.com lost that battle and is now trying to help the music industry devise a method ofcharging for downloaded music. So before you copy your favorite sound clip, rememberyou're actually stealing someone else's property as surely as if you walked into that person'shome and took the CD. The music industry and the film industry are now suing individualswho continually download copies of song and movies from free Web sites.

    14

    http://www.bsa.org/http://www.bsa.org/
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    15/18

    Accountability, Liability, and Control

    Many of our laws and court decisions establishing precedents in the area of accountability,liability, and control, were firmly in place long before computers were invented. Many of themdate back to the early 1900s, and some simply don't make sense in this day and age. That'swhat we were referring to in the opening paragraphs of this lecture when we talked aboutnew questions for organizations, companies, and the workplace in general. No issue makes

    this subject more important than the Internet laws our government has tried, and still tries,to pass.

    One tenet of the Communications Decency Act (struck down by the courts) and the ChildOnline Protection Act (currently in the courts) is that the Internet Service Providers shouldsomehow be liable for content placed on the Internet through their users. Ask yourself thesequestions: "If you receive an obscene phone call, is the telephone company responsible andliable for the problem? If you receive a threatening letter in the mail, is the U.S. Post Officeresponsible for reading every piece of mail on the chance that there might be a problem inone of the letters?" The text gives several examples of recent liability problems and thedifficulties companies face as networks, computers, and data increasingly become commonstrategic tools.

    System Quality: Data Quality and System Errors

    As we rely on information systems more, data quality issues are gaining importance. Theseissues affect you as a consumer and as a user.

    When the credit reporting agencies screw up your credit record and you can't get a car loan,who's fault is it? What if you're driving down the road, the computer chip controlling yourbrake system fails, and you have a rather nasty crash. Who's at fault? You, the car company,or the company that made the computer chip? Who is responsible for system downtime whena popular e-mail program has holes allowing viruses to spread and multiply; the softwaremanufacturer or the company that licenses the software?

    Most of us use software that the manufacturer knows has bugs. They usually are nothingmore than an aggravation and a frustration. But once in a while, they will affect our use of thecomputer. Our natural tendency is to let the marketplace control the balance by letting thecustomer punish or reward the producer. But will that be enough, or will the issue end up inthe courts?

    When a network server crashes and day-traders miss an important trade, who is responsiblefor the lost income? The ISP? The financial service company? No one? As more and morecompanies do business on the Internet, will Internet Service Providers or the companies doingbusiness on the Internet be held accountable for equipment outages that render thosebusinesses unable to process transactions?

    Quality of Life: Equity, Access, and Boundaries

    Invariably, when discussing online technology, some students mention their concern aboutlosing the face-to-face contact with other human beings. We hear stories about children whohaven't developed normal social skills because they spend all their time in front of acomputer. No discussion about the quality of life issues would be complete withoutmentioning the tales of "online love affairs." Of course, many people lose their jobs and theirway of life because of technology. These are all very valid concerns.

    15

  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    16/18

    What, in your opinion, is the impact of all this wired stuff on children? How should we protectthem against the threats, real or perceived? The Communications Decency Act of 1996 wasultimately ruled unconstitutional by the Supreme Court. Did you realize it's back? This timeit's called the Child Online Privacy Protection Act (COPPA) and it went into effect in April 2000.The Electronic Frontier Foundation an organization dedicated to "protecting rights andpreserving freedom in the electronic frontier," has lots of information about protecting freespeech on the Internet.

    One quality of life issue that affects more and more people personally is the ability to workfrom home. Most telecommuters had a "regular day job" 9-5, five days a week, in a typicaloffice setting. If they didn't get their work done today, they would usually wait until they wereback in the office tomorrow or Monday. Now because of technology they can work seven daysa week, all hours of the day, at home. And sometimes they do. The impact on personal andfamily life can be considerable. In many regards, this problem extends not just totelecommuters but to many employees who spend their normal 40-50 hours a week in theoffice and then stay "wired" in the evenings, on weekends, and even during vacations.

    There is an upside to the jobs issue, though. Many parents like telecommuting because theycan stay home with, or at least be nearer, their children. More and more people are leavingthe big cities and moving to small towns for the quality of life, yet they can still keep theirwell-paying jobs. Many small companies are able to expand their customer base because oftechnology, which in turns helps the employees immensely. Completely new businesses areborn because of technology.

    Some people think we've reached the limit when they learn that we can now buy groceriesonline. Hungry Moose Groceries in Big Sky, Montana, offers the service for people coming infor vacation. After all, when you have everything loaded into the car, trying to find your wayaround a strange town, anxious to get on the ski slopes, have three screaming kids in theback seat, and everyone is stressed out from the travel, the last thing you want to do is huntdown a grocery store. Why not e-mail ahead and have your food and treats waiting for youwhen you check into your accommodations? What a terrific idea.

    Computer crime is one area that has been extremely hard for our society and ourgovernments to keep up with the rapid change. Many laws have to be rewritten and manynew laws must be implemented to accommodate the changes. Computer crime and abuseextends to any wrongdoing involving equipment and Internet usage. We spoke earlier aboutanonymity not being a license for socially unacceptable behavior. You should remember thateverything you do on a network or the Internet is recorded and can be tracked. Many peoplecommitting computer crimes and abuse have been caught and prosecuted.

    Spamming (unsolicited e-mail) has been challenged in the courts by Internet ServiceProviders (ISP) as an unfair practice. The ISPs say thousands of these e-mails clog theirsystems, and no one wants them anyway. The spammers argue their right to freedom ofspeech is violated if they can't send e-mails to anyone they want. Congress passed a new law

    in late 2003 to clamp down on spamming. While we may not see an immediate effect byreduced numbers of spam email messages hitting our mailboxes, the law does seem to beproducing some result:

    "Texas attorney gen. sues student spammerBy Brandi Grissom, AssociatedPressAUSTIN, TexasThe state attorney general filed a lawsuit against a 22-year-oldcollege student and his business partner, accusing them of illegally sending hundredsof thousands of unsolicited, misleading e-mails.

    16

    http://www.eff.org/https://hungrymoose.com/home.htmhttp://www.eff.org/https://hungrymoose.com/home.htm
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    17/18

    Ryan Pitylak, a student at the University of Texas at Austin, heads the fourth-largestspamming operation in the world, Attorney General Gregg Abbott said.

    The lawsuit filed Thursday alleges that Pitylak and Mark Trotter, his 40-year-oldbusiness partner from Encinitas, Calif., have been sending the e-mails since at leastSept. 1, 2003.

    "We want to make clear that these defendants we are suing today and any other illegalspammers in the state of Texas can't hide behind a computer screen any longer,"Abbott said in filing the state's first e-mail spamming lawsuit." USAToday Online, Jan14, 2005

    Other issues affecting our society include job losses and career changes caused bytechnology. You can argue the positive or negative effects, but one thing is clear: you'll be apart of the evolution of technology for the rest of your life. You will have to continually updateyour skills and knowledge in order to remain competitive in the job market. As companiescontinue to embrace new technology and new methods of using it, you'll be responsible forensuring your skills and education remain current.

    Our government recognizes the danger of allowing unequal access to technology to fester. Ithas enlisted the help of private individuals and corporations in the effort to install computersand Internet access in public schools and libraries all across the nation and the world. Mostschools are now wired for networks and are learning to incorporate technology into thecurriculum. There's even a Web site dedicated to the digital divide situation.

    The Window on Management: Can the Spamming Monster Be Tamed (see p. 171 oftext) discusses the costs to individuals and business of the estimated two trillion

    spam messages sent in 2003. While some mass emails are legitimate, most are not.User beware.

    As managers, you should be acutely aware of the health issues caused by computer usage,

    especially repetitive stress injury (RSI). Why? Because these health issues cost businesseshuge amounts of money each year in medical treatment claims and lost productivity. Carpaltunnel syndrome (CTS), a subset of RSI, is the most serious health issue plaguingbusinesses. Computer vision syndrome (CVS) is increasing as people continually usecomputer screens and handheld devices that strain eyesight.

    It doesn't take much to avoid the problems associated with computer usage. Ergonomics, thestudy of the relationship between humans and machines, has helped determine that it'scheaper to purchase equipment that reduces the health risks associated with computers, such

    17

    http://www.digitaldivide.org/http://images.google.com/imgres?imgurl=http://www.letteren.leidenuniv.nl/content_images/student/rsi.jpg&imgrefurl=http://www.letteren.leidenuniv.nl/index.php3%3Fc%3D26&h=349&w=400&sz=31&hl=en&start=1&tbnid=JeBdKO_SYfT17M:&tbnh=108&tbnw=124&prev=/images%3Fq%3D%2522RSI%2522%26svnum%3D10%26hl%3Den%26lr%3Dlang_ar%7Clang_en%26rls%3DRNWE,RNWE:2005-09,RNWE:en%26sa%3DNhttp://images.google.com/imgres?imgurl=http://www.naturalpoint.com/smartnav/community/images/rsi-reducedhand1.gif&imgrefurl=http://www.naturalpoint.com/smartnav/community/rsi-faq.html&h=273&w=314&sz=13&hl=en&start=2&tbnid=4ms9sNarGBUSZM:&tbnh=102&tbnw=117&prev=/images%3Fq%3D%2522RSI%2522%26svnum%3D10%26hl%3Den%26lr%3Dlang_ar%7Clang_en%26rls%3DRNWE,RNWE:2005-09,RNWE:en%26sa%3DNhttp://images.google.com/imgres?imgurl=http://www.kaz-type.com/media/rsi-badposture.gif&imgrefurl=http://www.kaz-type.com/KAZrepetitivestraininjury.html&h=200&w=184&sz=4&hl=en&start=13&tbnid=RngyuDOIp7nj8M:&tbnh=104&tbnw=96&prev=/images%3Fq%3D%2522RSI%2522%26svnum%3D10%26hl%3Den%26lr%3Dlang_ar%7Clang_en%26rls%3DRNWE,RNWE:2005-09,RNWE:en%26sa%3DNhttp://www.digitaldivide.org/
  • 8/6/2019 Ethical and Social Issues Ch 5 ALL

    18/18

    as different keyboards, monitors that reduce eye strain, and desks that allow proper bodypositions.

    Too much of a good thing can be bad. You've heard of road rage, the anger people experiencewhen driving. We are now experiencing road rage on the Information Superhighway, and it's

    called technostress. Managers should encourage their employees to take frequent breaksfrom their computers and to recognize and understand the dangers of isolation from humans.

    We may be a wired nation, but we still need the human touch.

    How has all this technology affected you? Think about it. Ultimately, there is a positive and anegative side to everything. How you handle it determines how it affects you.

    Bottom Line: If it sounds too good to be true, it is. If it's illegal or immoral or

    unethical outside the computing arena, it's probably illegal, immoral, and unethicalin the computing arena. If you are aware of a problem or are a victim of unethical,

    illegal actions, and you don't do something about it, you're part of the problem. It'syour new world use it wisely.

    5.4 Management Opportunities, Challenges, and SolutionsManagers have an obligation to ensure policies are in place to help guide their employees inthe ethical and legal use of technology. The challenge is to create policies that are fair andreasonable to both the employer and employee. The material presented in this chapter can bestarting point for deciding new policies or revisions to current policies as new technology isintroduced to the workplace. Rest assured, it will be a continuous requirement for everymanager in every company.

    Solution Guidelines

    Many firms have not established a Code of Ethics or Employee Conduct for Computing in

    today's workplace. Some corporations are confused about what to include and how toapproach this new dilemma. Following Laudon and Laudon's five moral dimensions would be agood start! Businesses and their managers should recognize:

    The information rights to privacy and freedom The property rights to individual ideas and efforts The accountability, liability, and control issues involved in using technology The system quality requirements of businesses and individuals The quality of life impact of technology

    Bottom Line: Companies can no longer ignore the necessity of establishing rules for

    technology usage. The issue won't go away and will only continue to grow. If you

    work for a company that doesn't have a policy, you should encourage it to establishone immediately. If you're a manager in a company, you should get busy andestablish a policy for your employees it's the only fair thing to do.

    Visit WIKIPEDIA, The free Encyclopedia for Repetitive Stress or Strain Injury

    http://en.wikipedia.org/wiki/Repetitive_strain_injury

    18

    http://en.wikipedia.org/wiki/Repetitive_strain_injuryhttp://en.wikipedia.org/wiki/Repetitive_strain_injury