ch04 PPT
ch04 PPT
ch04 PPT
Chapter 4
Ethical and Social Issues in
Information Systems
Wheels? (1 of 2)
~
• Problem
– Opportunities from new technology
weak
– Undeveloped legal environment
• Solutions
locaticn
– Develop big data strategy
– Develop privacy policies
– Collect car-generated data
– Analyze car/driver data
– Smartphones, event data recorders
– In-car diagnostics/navigation/entertainment
-
Locaticn PB
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
-
IoT
Your Mobile phane :
Wheels? (2 of 2)
~
Mobilelocation
traclang
• Vehicle and driver monitoring systems
• Demonstrates how technological innovations can be a
ChatGpT copilote gan vame 수도 , 돈잃을도
double-edged sword ,
로 할
ropp
auro its
– Wells Fargo,
Facebork Deerfield
shoe data to 3 rd Management,
party r General
i Motors,
Takata Corporation
∞
p e
– In many, information oapraeosystems used to bury decisions
from public scrutiny
• Ethics
– Principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their
behaviors
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
What Ethical, Social, and Political
Issues are Raised by Information
Systems? (2 of 2)
• Information systems raise new ethical questions because
they create opportunities for:
– Intense social change, threatening existing distributions
of power, money, rights, and obligations
• New opportunities for crime
• New kinds of crimes
Mdi 로 정동 mBlead 하게 할 수도
to bettermatch dimensiong
5
• Quality of life
linked al police
trarisactdatavaonlne
phmecall reurdd
inrestigatien
• Golden Rule
– Do unto others as you would have them do unto you
• Immanuel Kant’s Categorical Imperative
– If an action is not right for everyone to take, it is not
right for anyone
• Slippery Slope Rule 한번까진 허용 그후엔 ,
나
• Utilitarian Principle
– Take the action that achieves the higher or greater
Mac Boole Pro
value
• Risk Aversion Principle
– Take the action that produces the least harm or
potential cost
• Ethical “No Free Lunch” Rule
– Assume that virtually all tangible and intangible objects
are owned by someone unless there is a specific
declaration otherwise
Xs
• FTC FIP principles
– Notice/awareness (core principle)
– Choice/consent (core principle)
– Access/participation
– Security
– Enforcement
one
마스티카드 버자카드
, .
1. The Web server reads the user's Web browser and determines the operating system,
browser name, version number, Internet address, and other information.
2. The server transmits a tiny text file with user identification information called a cookie,
which the user's browser receives and stores on the user's computer.
3. When the user returns to the Web site, the server requests the contents of any cookie
it deposited previously in the user's computer.
4. The Web server reads the cookie, identifies the visitor, and calls up data on the user.
Copyright © 2020 Pearson Education, Ltd. All Rights Reserved
Technical Solutions
devdop anline
fracking .
• Solutions include:
– Email encryption
– Anonymity tools
– Anti-spyware tools
• Overall, technical solutions have failed to protect users
from being tracked from one site to another
– Browser features to shutdo their tracking senice
m
“Private” browsing
“Do not track” options
• Health risks
– Repetitive stress injury (RSI)
– Carpal tunnel syndrome (CTS)
– Computer vision syndrome (CVS)
– Technostress