editorial director: sally yagan art director: steve frim ... · copyright © 2011, 2009, 2007...

37
Credits and acknowledgements borrowed from other sources and reproduced, with permission, in this textbook appear on page C-1. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affil- iated with the Microsoft Corporation. Copyright © 2011, 2009, 2007 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permis- sions Department, One Lake Street, Upper Saddle River, New Jersey 07458. Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Information is Available Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Project Manager: Kelly Loftus Editorial Assistant: Jason Calcano Director of Marketing: Patrice Lumumba Jones Senior Marketing Manager: Anne Fahlgren Marketing Assistant: Melinda Jensen Senior Managing Editor: Judy Leale Senior Production Project Manager: Karalyn Holland Senior Operations Supervisor: Arnold Vila Operations Specialist: Ilene Kahn Senior Art Director: Janet Slowik Art Director: Steve Frim Cover Illustrator and Designer: Bobby Starnes Manager, Visual Research: Beth Brenzel Manager, Rights and Permissions: Shannon Barbe Manager, Cover Visual Research & Permissions: Karen Sanatar Media Editor: Denise Vaughn Media Project Manager: Lisa Rinaldi Full Service Project Management: Azimuth Interactive, Inc. Composition: Azimuth Interactive, Inc. Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagarstown Text Font: 10.5/12.5 Times LT Std, 9.5pt ISBN 10: 0-13-611099-1 ISBN 13: 978-0-13-611099-6 10 9 8 7 6 5 4 3 2 1 Ess9_FM_Student_Edition.qxd 11/17/2009 3:40 PM Page ii

Upload: lelien

Post on 29-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Credits and acknowledgements borrowed from other sources and reproduced, with permission, in this textbook appearon page C-1.Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screenshots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affil-iated with the Microsoft Corporation.

Copyright © 2011, 2009, 2007 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper SaddleRiver, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protectedby Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in aretrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise.To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permis-sions Department, One Lake Street, Upper Saddle River, New Jersey 07458.

Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks. Wherethose designations appear in this book, and the publisher was aware of a trademark claim, the designations havebeen printed in initial caps or all caps.

Library of Congress Cataloging-in-Publication Information is Available

Editorial Director: Sally YaganEditor in Chief: Eric SvendsenExecutive Editor: Bob HoranEditorial Project Manager: Kelly LoftusEditorial Assistant: Jason CalcanoDirector of Marketing: Patrice Lumumba JonesSenior Marketing Manager: Anne FahlgrenMarketing Assistant: Melinda JensenSenior Managing Editor: Judy LealeSenior Production Project Manager: Karalyn HollandSenior Operations Supervisor: Arnold VilaOperations Specialist: Ilene KahnSenior Art Director: Janet Slowik

Art Director: Steve FrimCover Illustrator and Designer: Bobby StarnesManager, Visual Research: Beth BrenzelManager, Rights and Permissions: Shannon BarbeManager, Cover Visual Research & Permissions: Karen SanatarMedia Editor: Denise VaughnMedia Project Manager: Lisa RinaldiFull Service Project Management: Azimuth Interactive, Inc.Composition: Azimuth Interactive, Inc. Printer/Binder: Courier/KendallvilleCover Printer: Lehigh-Phoenix Color/HagarstownText Font: 10.5/12.5 Times LT Std, 9.5pt

ISBN 10: 0-13-611099-1ISBN 13: 978-0-13-611099-6

10 9 8 7 6 5 4 3 2 1

Ess9_FM_Student_Edition.qxd 11/17/2009 3:40 PM Page ii

Page 2: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

S T U D E N T L E A R N I N G O B J E C T I V E S

After completing this chapter, you will be able to answer the following questions:

1. What ethical, social, and political issues are raised byinformation systems?

2. What specific principles for conduct can be used to guideethical decisions?

3. Why do contemporary information systems technology and theInternet pose challenges to the protection of individual privacyand intellectual property?

4. How have information systems affected everyday life?

Ethical and Social Issuesin Information Systems 12C H A P T E R

416

Ess9_Ch_12.qxd 11/18/2009 3:31 PM Page 416

Page 3: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

417

CHAPTER OUTLINE

Chapter-Opening Case: Behavioral Targeting and YourPrivacy: You’re the Target

12.1 Understanding Ethical and Social Issues Relatedto Systems

12.2 Ethics in an Information Society

12.3 The Moral Dimensions of Information Systems

12.4 Hands-on MIS Projects

Business Problem-Solving Case: Google, Microsoft, andIBM: The Health of Your Medical Records’ Privacy

BBEEHHAAVVIIOORRAALL TTAARRGGEETTIINNGG AANNDD YYOOUURR PPRRIIVVAACCYY:: YYOOUU’’RREE TTHHEE TTAARRGGEETT

Ever get the feeling somebody is trailing you on the Web, watching your everyclick? Wonder why you start seeing display ads and pop-ups just after you’ve beenscouring the Web for a car, a dress, or cosmetic product? Well, you’re right: yourbehavior is being tracked, and you are being targeted on the Web so that you areexposed to certain ads and not others. The Web sites you visit track the search enginequeries you enter, pages visited, Web content viewed, ads clicked, videos watched,content shared, and the products you purchase. Google is the largest Web tracker,monitoring thousands of Web sites. As one wag noted, Google knows more about youthan your mother does. In March 2009, Google began displaying ads on thousands ofGoogle-related Web sites based on their previous online activities. To parry a growingpublic resentment of behavioral targeting, Google said it would give users the abilityto see and edit the information that it has compiled about their interests for the pur-poses of behavioral targeting.

Ess9_Ch_12.qxd 11/18/2009 3:31 PM Page 417

Page 4: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

418 Part IV: Building and Managing Systems

Behavioral targeting seeks to increase the efficiency of online ads by using informationthat Web visitors reveal about themselves online, and if possible, combine this with offlineidentity and consumption information gathered by companies such as Acxiom. One of theoriginal promises of the Web has been that it can deliver a marketing message tailored toeach consumer based on this data, and then measure the results in terms of click-throughsand purchases.

Firms are experimenting with more precise targeting methods. Snapple used behavioraltargeting methods (with the help of an online ad firm Tacoda) to identify the types of peopleattracted to Snapple Green Tea. Answer: people who like the arts and literature, travelinternationally, and visit health sites. Microsoft offers MSN advertisers access to personaldata derived from 270 million worldwide Windows Live users.

The growth in the power, reach, and scope of behavioral targeting has drawn theattention of privacy groups and the Federal Trade Commission (FTC). In November 2007,the FTC opened hearings to consider proposals from privacy advocates to develop a “do nottrack list,” to develop visual online cues to alert people to tracking, and to allow people toopt out. In the Senate, hearings on behavioral targeting are ongoing throughout 2009. WhileGoogle, Microsoft, and Yahoo pleaded for legislation to protect them from consumerlawsuits, the FTC refused to consider new legislation to protect the privacy of Internet users.Instead, the FTC proposed industry self-regulation. In 2009, a consortium of advertisingfirms (the Network Advertising Initiative) responded positively to FTC proposed principlesto regulate online behavioral advertising. All of these regulatory efforts emphasize trans-parency, user control over their information, security, and the temporal stability of privacypromises (unannounced and sudden changes in information privacy may not be allowed).

Perhaps the central ethical and moral question is understanding what rights individualshave in their own personally identifiable Internet profiles. Are these “ownership” rights, ormerely an “interest” in an underlying asset? How much privacy are we willing to give up inorder to receive more relevant ads? Surveys suggest that over 70 percent of Americans donot want to receive targeted ads.

Sources: Joseph Turow, et. al. “Americans Reject Tailored Advertising,” Rose Foundation for Communities andDevelopment and The Annenberg School For Communication, September, 2009; Robert Mitchell, “What Google KnowsAbout You,” Computerworld, May 11, 2009; Stephanie Clifford, “Many See Privacy on Web as Big Issue, Survey Says,”The New York Times, March 16, 2009; Miguel Helft, “Google to Offer Ads Based on Interests,” The New York Times,March 11, 2009; and David Hallerman, “Behavioral Targeting: Marketing Trends,” eMarketer, June 2008.

The growing use of behavioral targeting techniques described in the chapter-opening caseshows that technology can be a double-edged sword. It can be the source of many benefits(by showing you ads relevant to your interests) but it can also create new opportunities forinvading your privacy, and enabling the reckless use of that information in a variety of deci-sions about you.

The chapter-opening diagram calls attention to important points raised by this case andthis chapter. Online advertising titans like Google, Microsoft, and Yahoo are all looking forways to monetize their huge collections of online behavioral data. While search enginemarketing is arguably the most effective form of advertising in history, banner display admarketing is highly inefficient because it displays ads to everyone regardless of theirinterests. Hence the search engine marketers cannot charge much for display ad space.However, by tracking the online movements of 200 million U.S. Internet users, they candevelop a very clear picture of who you are, and use that information to show you ads thatmight be of interest to you. This would make the marketing process more efficient, and moreprofitable for all the parties involved.

But this solution also creates an “ethical dilemma,” pitting the monetary interests of theonline advertisers and search engines against the interests of individuals to maintain a senseof control over their personal information, their privacy. Two closely held values are inconflict here. As a manager, you will need to be sensitive to both the negative and positiveimpacts of information systems for your firm, employees, and customers. You will need tolearn how to resolve ethical dilemmas involving information systems.

Ess9_Ch_12.qxd 11/18/2009 3:31 PM Page 418

Page 5: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Chapter 12: Ethical and Social Issues in Information Systems 419

12.1 Understanding Ethical and Social Issues Related toSystems

In the past 10 years, we have witnessed, arguably, one of the most ethically challengingperiods for U.S. and global business. Table 12.1 provides a small sample of recent casesdemonstrating failed ethical judgment by senior and middle managers. These lapses inmanagement ethical and business judgment occurred across a broad spectrum of industries.

In today’s new legal environment, managers who violate the law and are convicted willmost likely spend time in prison. U.S. federal sentencing guidelines adopted in 1987mandate that federal judges impose stiff sentences on business executives based on the

TABLE 12.1

Rcent Examples of Failed Ethical Judgment by Senior Managers

Pfizer, Eli Lilly, and Major pharmaceutical firms paid billions of dollars to settle U.S. federal charges that AstraZeneca (2009) executives fixed clinical trials for antipsychotic and pain-killer drugs, marketed them

inappropriately to children, and claimed unsubstantiated benefits while covering up negativeoutcomes.

Galleon Group (2009) The founder of the Galleon Group was criminally charged with insider trading and paying $250million to Wall Street banks in return for market information that other investors did not get.

Bear Stearns (2009) Two hedge fund managers were indicted for criminal conspiracy, securities fraud, and wirefraud as prosecutors contend that they misled investors about the health of their funds. Theyface as many as 20 years in prison if convicted.

Siemens (2009) The world’s largest engineering firm paid over $4 billion to German and U.S. authorities for adecades-long, worldwide bribery scheme approved by corporate executives to influencepotential customers and governments.

Mabey & Johnson Ltd. Executives of a supplier of steel bridging based in the United Kingdom, were sentenced for(2009) offenses involving overseas bribery (in Ghana and Jamaica between 1993 and 2001) and

breaching UN sanctions against Iraq (in 2001 and 2002).

Ess9_Ch_12.qxd 11/18/2009 3:31 PM Page 419

Page 6: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

420 Part IV: Building and Managing Systems

monetary value of the crime, the presence of a conspiracy to prevent discovery of the crime,the use of structured financial transactions to hide the crime, and failure to cooperate withprosecutors (U.S. Sentencing Commission, 2004).

Although in the past business firms would often pay for the legal defense of their employ-ees enmeshed in civil charges and criminal investigations, now firms are encouraged to coop-erate with prosecutors to reduce charges against the entire firm for obstructing investigations.These developments mean that, more than ever, as a manager or an employee, you will haveto decide for yourself what constitutes proper legal and ethical conduct.

Although these major instances of failed ethical and legal judgment were not master-minded by information systems departments, information systems were instrumental inmany of these frauds. In many cases, the perpetrators of these crimes artfully used financialreporting information systems to bury their decisions from public scrutiny in the vain hopethey would never be caught. We deal with the issue of control in information systems inChapter 7. In this chapter, we talk about the ethical dimensions of these and other actionsbased on the use of information systems.

Ethics refers to the principles of right and wrong that individuals, acting as free moralagents, use to make choices to guide their behaviors. Information systems raise new ethicalquestions for both individuals and societies because they create opportunities for intensesocial change, and thus threaten existing distributions of power, money, rights, and obliga-tions. Like other technologies, such as steam engines, electricity, the telephone, and theradio, information technology can be used to achieve social progress, but it can also be usedto commit crimes and threaten cherished social values. The development of informationtechnology will produce benefits for many and costs for others.

Ethical issues in information systems have been given new urgency by the rise of theInternet and electronic commerce. Internet and digital firm technologies make it easier thanever to assemble, integrate, and distribute information, unleashing new concerns about theappropriate use of customer information, the protection of personal privacy, and the protec-tion of intellectual property.

Other pressing ethical issues raised by information systems include establishing account-ability for the consequences of information systems, setting standards to safeguard systemquality that protects the safety of the individual and society, and preserving values andinstitutions considered essential to the quality of life in an information society. When usinginformation systems, it is essential to ask, “What is the ethical and socially responsible courseof action?”

A MODEL FOR THINKING ABOUT ETHICAL, SOCIAL, ANDPOLITICAL ISSUES

Ethical, social, and political issues are closely linked. The ethical dilemma you may face asa manager of information systems typically is reflected in social and political debate. Oneway to think about these relationships is given in Figure 12-1. Imagine society as a more orless calm pond on a summer day, a delicate ecosystem in partial equilibrium with individu-als and with social and political institutions. Individuals know how to act in this pondbecause social institutions (family, education, organizations) have developed well-honedrules of behavior, and these are supported by laws developed in the political sector thatprescribe behavior and promise sanctions for violations. Now toss a rock into the center ofthe pond. What happens? Ripples, of course.

Imagine instead that the disturbing force is a powerful shock of new informationtechnology and systems hitting a society more or less at rest. Suddenly, individual actors areconfronted with new situations often not covered by the old rules. Social institutions cannotrespond overnight to these ripples—it may take years to develop etiquette, expectations,social responsibility, politically correct attitudes, or approved rules. Political institutionsalso require time before developing new laws and often require the demonstration of realharm before they act. In the meantime, you may have to act. You may be forced to act in alegal gray area.

Ess9_Ch_12.qxd 11/18/2009 3:31 PM Page 420

Page 7: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

We can use this model to illustrate the dynamics that connect ethical, social, and politicalissues. This model is also useful for identifying the main moral dimensions of the informationsociety, which cut across various levels of action—individual, social, and political.

FIVE MORAL DIMENSIONS OF THE INFORMATION AGE

The major ethical, social, and political issues raised by information systems include thefollowing moral dimensions:

• Information rights and obligations. What information rights do individuals andorganizations possess with respect to themselves? What can they protect? What obliga-tions do individuals and organizations have concerning this information?• Property rights and obligations. How will traditional intellectual property rights beprotected in a digital society in which tracing and accounting for ownership are difficultand ignoring such property rights is so easy?• Accountability and control. Who can and will be held accountable and liable for theharm done to individual and collective information and property rights?• System quality. What standards of data and system quality should we demand to protectindividual rights and the safety of society?• Quality of life. What values should be preserved in an information- and knowledge-based society? Which institutions should we protect from violation? Which culturalvalues and practices are supported by the new information technology?

We explore these moral dimensions in detail in Section 12.3.

KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES

Ethical issues long preceded information technology. Nevertheless, information technologyhas heightened ethical concerns, taxed existing social arrangements, and made some lawsobsolete or severely crippled. There are four key technological trends responsible for theseethical stresses and they are summarized in Table 12.2.

The doubling of computing power every 18 months has made it possible for mostorganizations to use information systems for their core production processes. As a result, our

Chapter 12: Ethical and Social Issues in Information Systems 421

Figure 12-1The RelationshipBetween Ethical,Social, and PoliticalIssues in anInformation SocietyThe introduction of newinformation technologyhas a ripple effect,raising new ethical,social, and politicalissues that must be dealtwith on the individual,social, and politicallevels. These issues havefive moral dimensions:information rights andobligations, propertyrights and obligations,system quality, quality oflife, and accountabilityand control.

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 421

Page 8: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

dependence on systems and our vulnerability to system errors and poor data quality haveincreased. Social rules and laws have not yet adjusted to this dependence. Standards forensuring the accuracy and reliability of information systems (see Chapter 7) are not univer-sally accepted or enforced.

Advances in data storage techniques and rapidly declining storage costs have beenresponsible for the multiplying databases on individuals—employees, customers, andpotential customers—maintained by private and public organizations. These advances indata storage have made the routine violation of individual privacy both cheap and effective.Massive data storage systems are inexpensive enough for regional and even local retailingfirms to use in identifying customers.

Advances in data analysis techniques for large pools of data are another technologicaltrend that heightens ethical concerns because companies and government agencies are ableto find out highly detailed personal information about individuals. With contemporary datamanagement tools (see Chapter 5), companies can assemble and combine the myriad piecesof information about you stored on computers much more easily than in the past.

Think of all the ways you generate computer information about yourself—credit cardpurchases, telephone calls, magazine subscriptions, video rentals, mail-order purchases,banking records, local, state, and federal government records (including court and policerecords), and visits to Web sites. Put together and mined properly, this information couldreveal not only your credit information but also your driving habits, your tastes, yourassociations, and your political interests.

Companies with products to sell purchase relevant information from these sources tohelp them more finely target their marketing campaigns. Chapters 3 and 6 describe howcompanies can analyze large pools of data from multiple sources to rapidly identify buyingpatterns of customers and suggest individual responses. The use of computers to combinedata from multiple sources and create electronic dossiers of detailed information on individ-uals is called profiling.

For example, several thousand of the most popular Web sites allow DoubleClick (ownedby Google), an Internet advertising broker, to track the activities of their visitors in exchangefor revenue from advertisements based on visitor information DoubleClick gathers.DoubleClick uses this information to create a profile of each online visitor, adding moredetail to the profile as the visitor accesses an associated DoubleClick site. Over time,DoubleClick can create a detailed dossier of a person’s spending and computing habits onthe Web that is sold to companies to help them target their Web ads more precisely.

ChoicePoint gathers data from police, criminal, and motor vehicle records; credit andemployment histories; current and previous addresses; professional licenses; and insuranceclaims to assemble and maintain electronic dossiers on almost every adult in the UnitedStates. The company sells this personal information to businesses and government agencies.Demand for personal data is so enormous that data broker businesses such as ChoicePointare flourishing.

422 Part IV: Building and Managing Systems

TABLE 12.2

Technology TrendsThat Raise EthicalIssues

Trend Impact

Computing power doubles every More organizations depend on computer systems 18 months for critical operations

Data storage costs rapidly declining Organizations can easily maintain detaileddatabases on individuals

Data analysis advances Companies can analyze vast quantities of datagathered on individuals to develop detailed profilesof individual behavior

Networking advances and the Internet Copying data from one location to another andaccessing personal data from remote locations aremuch easier

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 422

Page 9: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

A new data analysis technology called nonobvious relationship awareness (NORA)has given both the government and the private sector even more powerful profiling capabil-ities. NORA can take information about people from many disparate sources, such asemployment applications, telephone records, customer listings, and “wanted” lists, andcorrelate relationships to find obscure hidden connections that might help identify criminalsor terrorists (see Figure 12-2).

Chapter 12: Ethical and Social Issues in Information Systems 423

Figure 12-2NonobviousRelationshipAwareness (NORA)NORA technology cantake information aboutpeople from disparatesources and findobscure, nonobviousrelationships. It mightdiscover, for example,that an applicant for ajob at a casino shares atelephone number with aknown criminal and issuean alert to the hiringmanager.

Credit card purchasescan make personal infor-mation available to mar-ket researchers, telemar-keters, and direct mailcompanies. Advances ininformation technologyfacilitate the invasion ofprivacy.

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 423

Page 10: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

NORA technology scans data and extracts information as the data are being generated sothat it could, for example, instantly discover a man at an airline ticket counter who shares aphone number with a known terrorist before that person boards an airplane. The technology isconsidered a valuable tool for homeland security but does have privacy implications because itcan provide such a detailed picture of the activities and associations of a single individual.

Finally, advances in networking, including the Internet, promise to greatly reduce thecosts of moving and accessing large quantities of data and open the possibility of mininglarge pools of data remotely using small desktop machines, permitting an invasion ofprivacy on a scale and with a precision heretofore unimaginable.

12.2 Ethics in an Information Society

Ethics is a concern of humans who have freedom of choice. Ethics is about individualchoice: When faced with alternative courses of action, what is the correct moral choice?What are the main features of ethical choice?

BASIC CONCEPTS: RESPONSIBILITY, ACCOUNTABILITY, ANDLIABILITY

Ethical choices are decisions made by individuals who are responsible for theconsequences of their actions. Responsibility is a key element of ethical action.Responsibility means that you accept the potential costs, duties, and obligations for thedecisions you make. Accountability is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, who isresponsible. Systems and institutions in which it is impossible to find out who took whataction are inherently incapable of ethical analysis or ethical action. Liability extends theconcept of responsibility further to the area of laws. Liability is a feature of politicalsystems in which a body of laws is in place that permits individuals to recover thedamages done to them by other actors, systems, or organizations. Due process is arelated feature of law-governed societies and is a process in which laws are known andunderstood and there is an ability to appeal to higher authorities to ensure that the lawsare applied correctly.

These basic concepts form the underpinning of an ethical analysis of informationsystems and those who manage them. First, information technologies are filtered throughsocial institutions, organizations, and individuals. Systems do not have impacts bythemselves. Whatever information system impacts exist are products of institutional, organi-zational, and individual actions and behaviors. Second, responsibility for the consequencesof technology falls clearly on the institutions, organizations, and individual managers whochoose to use the technology. Using information technology in a socially responsible man-ner means that you can and will be held accountable for the consequences of your actions.Third, in an ethical, political society, individuals and others can recover damages done tothem through a set of laws characterized by due process.

ETHICAL ANALYSIS

When confronted with a situation that seems to present ethical issues, how should you ana-lyze it? The following five-step process should help.

1. Identify and describe clearly the facts. Find out who did what to whom, and where,when, and how. In many instances, you will be surprised at the errors in the initiallyreported facts, and often you will find that simply getting the facts straight helps definethe solution. It also helps to get the opposing parties involved in an ethical dilemma toagree on the facts.

2. Define the conflict or dilemma and identify the higher-order values involved. Ethical,social, and political issues always reference higher values. The parties to a dispute all

424 Part IV: Building and Managing Systems

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 424

Page 11: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

claim to be pursuing higher values (e.g., freedom, privacy, protection of property, andthe free enterprise system). Typically, an ethical issue involves a dilemma: two diametri-cally opposed courses of action that support worthwhile values. For example, thechapter-ending case study illustrates two competing values: the need to improve health-care record keeping and the need to protect individual privacy.

3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders:players in the game who have an interest in the outcome, who have invested in thesituation, and usually who have vocal opinions. Find out the identity of these groups andwhat they want. This will be useful later when designing a solution.

4. Identify the options that you can reasonably take. You may find that none of the optionssatisfy all the interests involved, but that some options do a better job than others.Sometimes arriving at a good or ethical solution may not always be a balancing ofconsequences to stakeholders.

5. Identify the potential consequences of your options. Some options may be ethicallycorrect but disastrous from other points of view. Other options may work in one instancebut not in other similar instances. Always ask yourself, “What if I choose this optionconsistently over time?”

CANDIDATE ETHICAL PRINCIPLES

Once your analysis is complete, what ethical principles or rules should you use to make adecision? What higher-order values should inform your judgment? Although you are theonly one who can decide which among many ethical principles you will follow, and howyou will prioritize them, it is helpful to consider some ethical principles with deep roots inmany cultures that have survived throughout recorded history.

1. Do unto others as you would have them do unto you (the Golden Rule). Putting yourselfinto the place of others, and thinking of yourself as the object of the decision, can helpyou think about fairness in decision making.

2. If an action is not right for everyone to take, it is not right for anyone (ImmanuelKant’s Categorical Imperative). Ask yourself, “If everyone did this, could theorganization, or society, survive?”

3. If an action cannot be taken repeatedly, it is not right to take at all (Descartes’ rule ofchange). This is the slippery-slope rule: An action may bring about a small change nowthat is acceptable, but if it is repeated, it would bring unacceptable changes in the longrun. In the vernacular, it might be stated as “once started down a slippery path, you maynot be able to stop.”

4. Take the action that achieves the higher or greater value (Utilitarian Principle). Thisrule assumes you can prioritize values in a rank order and understand the consequencesof various courses of action.

5. Take the action that produces the least harm or the least potential cost (Risk AversionPrinciple). Some actions have extremely high failure costs of very low probability (e.g.,building a nuclear generating facility in an urban area) or extremely high failure costs ofmoderate probability (speeding and automobile accidents). Avoid these high-failure-costactions, paying greater attention to high-failure-cost potential of moderate to highprobability.

6. Assume that virtually all tangible and intangible objects are owned by someone elseunless there is a specific declaration otherwise. (This is the ethical “no free lunch”rule.) If something someone else has created is useful to you, it has value, and youshould assume the creator wants compensation for this work.

Although these ethical rules cannot be guides to action, actions that do not easily passthese rules deserve some very close attention and a great deal of caution. The appearance ofunethical behavior may do as much harm to you and your company as actual unethicalbehavior.

Chapter 12: Ethical and Social Issues in Information Systems 425

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 425

Page 12: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

PROFESSIONAL CODES OF CONDUCT

When groups of people claim to be professionals, they take on special rights and obligationsbecause of their special claims to knowledge, wisdom, and respect. Professional codes ofconduct are promulgated by associations of professionals, such as the American MedicalAssociation (AMA), the American Bar Association (ABA), the Association of InformationTechnology Professionals (AITP), and the Association of Computing Machinery (ACM).These professional groups take responsibility for the partial regulation of their professionsby determining entrance qualifications and competence. Codes of ethics are promises byprofessions to regulate themselves in the general interest of society. For example, avoidingharm to others, honoring property rights (including intellectual property), and respectingprivacy are among the General Moral Imperatives of the ACM’s Code of Ethics andProfessional Conduct.

SOME REAL-WORLD ETHICAL DILEMMAS

Information systems have created new ethical dilemmas in which one set of interests ispitted against another. For example, many of the large telephone companies in the UnitedStates are using information technology to reduce the sizes of their workforces. Voice recog-nition software reduces the need for human operators by enabling computers to recognize acustomer’s responses to a series of computerized questions. Many companies monitor whattheir employees are doing on the Internet to prevent them from wasting company resourceson non-business activities (see the Chapter 7 Interactive Session on Management).

In each instance, you can find competing values at work, with groups lined up on eitherside of a debate. A company may argue, for example, that it has a right to use informationsystems to increase productivity and reduce the size of its workforce to lower costs and stayin business. Employees displaced by information systems may argue that employers havesome responsibility for their welfare. Business owners might feel obligated to monitoremployee e-mail and Internet use to minimize drains on productivity. Employees mightbelieve they should be able to use the Internet for short personal tasks in place of thetelephone. A close analysis of the facts can sometimes produce compromised solutions thatgive each side “half a loaf.” Try to apply some of the principles of ethical analysis describedto each of these cases. What is the right thing to do?

12.3 The Moral Dimensions of Information Systems

In this section, we take a closer look at the five moral dimensions of information systemsfirst described in Figure 12-1. In each dimension we identify the ethical, social, and politicallevels of analysis and use real-world examples to illustrate the values involved, thestakeholders, and the options chosen.

INFORMATION RIGHTS: PRIVACY AND FREEDOM IN THEINTERNET AGE

Privacy is the claim of individuals to be left alone, free from surveillance or interferencefrom other individuals or organizations, including the state. Claims to privacy are alsoinvolved at the workplace: Millions of employees are subject to electronic and other formsof high-tech surveillance (Ball, 2001). Information technology and systems threatenindividual claims to privacy by making the invasion of privacy cheap, profitable, andeffective.

The claim to privacy is protected in the U.S., Canadian, and German constitutions in avariety of different ways and in other countries through various statutes. In the UnitedStates, the claim to privacy is protected primarily by the First Amendment guarantees offreedom of speech and association, the Fourth Amendment protections against unreasonablesearch and seizure of one’s personal documents or home, and the guarantee of due process.

426 Part IV: Building and Managing Systems

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 426

Page 13: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Table 12.3 describes the major U.S. federal statutes that set forth the conditions forhandling information about individuals in such areas as credit reporting, education, financialrecords, newspaper records, and electronic communications. The Privacy Act of 1974 hasbeen the most important of these laws, regulating the federal government’s collection, use,and disclosure of information. At present, most U.S. federal privacy laws apply only to thefederal government and regulate very few areas of the private sector.

Most American and European privacy law is based on a regime called Fair InformationPractices (FIP) first set forth in a report written in 1973 by a federal government advisory com-mittee (U.S. Department of Health, Education, and Welfare, 1973). FIP is a set of principlesgoverning the collection and use of information about individuals. FIP principles are based onthe notion of a mutuality of interest between the record holder and the individual. The individ-ual has an interest in engaging in a transaction, and the record keeper—usually a business orgovernment agency—requires information about the individual to support the transaction. Onceinformation is gathered, the individual maintains an interest in the record, and the record maynot be used to support other activities without the individual’s consent. In 1998, the FTCrestated and extended the original FIP to provide guidelines for protecting online privacy. Table12.4 describes the FTC’s Fair Information Practice principles.

The FTC’s FIP are being used as guidelines to drive changes in privacy legislation. In July 1998, the U.S. Congress passed the Children’s Online Privacy Protection Act(COPPA), requiring Web sites to obtain parental permission before collecting informationon children under the age of 13. (This law is in danger of being overturned.) The FTC hasrecommended additional legislation to protect online consumer privacy in advertisingnetworks that collect records of consumer Web activity to develop detailed profiles, whichare then used by other companies to target online ads. Other proposed Internet privacylegislation focuses on protecting the online use of personal identification numbers, such associal security numbers; protecting personal information collected on the Internet that dealswith individuals not covered by COPPA; and limiting the use of data mining for homelandsecurity.

In February 2009, the FTC began the process of extending its fair information practicesdoctrine to behavioral targeting. The FTC held hearings to discuss its program for voluntaryindustry principles for regulating behavioral targeting. The online advertising trade groupNetwork Advertising Initiative (discussed later in this section), published its own self-

Chapter 12: Ethical and Social Issues in Information Systems 427

TABLE 12.3

Federal Privacy Laws in the United States

General Federal Privacy Laws Privacy Laws Affecting Private Institutionst

Freedom of Information Act of 1966 as Amended (5 USC 552) Fair Credit Reporting Act of 1970

Privacy Act of 1974 as Amended (5 USC 552a) Family Educational Rights and Privacy Act of 1974

Electronic Communications Privacy Act of 1986 Right to Financial Privacy Act of 1978

Computer Matching and Privacy Protection Act of 1988 Privacy Protection Act of 1980

Computer Security Act of 1987 Cable Communications Policy Act of 1984

Federal Managers Financial Integrity Act of 1982 Electronic Communications Privacy Act of 1986

Driver’s Privacy Protection Act of 1994 Video Privacy Protection Act of 1988

E-Government Act of 2002 The Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Children’s Online Privacy Protection Act of 1998 (COPPA)

Financial Modernization Act (Gramm–Leach-Bliley Act) of 999

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 427

Page 14: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

regulatory principles that largely agreed with the FTC. Nevertheless, the government,privacy groups, and the online ad industry are still at loggerheads over two issues. Privacyadvocates want both an opt-in policy at all sites and a national Do Not Track list. Theindustry opposes these moves and continues to insist on an opt-out capability being the onlyway to avoid tracking (Federal Trade Commission, 2009). Nevertheless, there is an emerg-ing consensus among all parties that greater transparency and user control (especiallymaking opt-out of tracking the default option) is required to deal with behavioral tracking.

Privacy protections have also been added to recent laws deregulating financial services andsafeguarding the maintenance and transmission of health information about individuals. TheGramm-Leach-Bliley Act of 1999, which repeals earlier restrictions on affiliations amongbanks, securities firms, and insurance companies, includes some privacy protection for con-sumers of financial services. All financial institutions are required to disclose their policies andpractices for protecting the privacy of nonpublic personal information and to allow customersto opt out of information-sharing arrangements with nonaffiliated third parties.

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), which tookeffect on April 14, 2003, includes privacy protection for medical records. The law givespatients access to their personal medical records maintained by healthcare providers,hospitals, and health insurers and the right to authorize how protected information aboutthemselves can be used or disclosed. Doctors, hospitals, and other healthcare providers mustlimit the disclosure of personal information about patients to the minimum amountnecessary to achieve a given purpose.

The European Directive on Data Protection In Europe, privacy protection is much more stringent than in the United States. Unlike theUnited States, European countries do not allow businesses to use personally identifiableinformation without consumers’ prior consent. On October 25, 1998, the EuropeanCommission’s Directive on Data Protection went into effect, broadening privacy protectionin the European Union (EU) nations. The directive requires companies to inform peoplewhen they collect information about them and disclose how it will be stored and used.Customers must provide their informed consent before any company can legally use dataabout them, and they have the right to access that information, correct it, and request that nofurther data be collected. Informed consent can be defined as consent given withknowledge of all the facts needed to make a rational decision. EU member nations musttranslate these principles into their own laws and cannot transfer personal data to countries,such as the United States, that do not have similar privacy protection regulations.

428 Part IV: Building and Managing Systems

TABLE 12.4

Federal Trade Commission Fair Information Practice Principles

1. Notice/awareness (core principle). Web sites must disclose their information practices before collecting data. Includesidentification of collector; uses of data; other recipients of data; nature of collection (active/inactive); voluntary or requiredstatus; consequences of refusal; and steps taken to protect confidentiality, integrity, and quality of the data.

2. Choice/consent (core principle). There must be a choice regime in place allowing consumers to choose how theirinformation will be used for secondary purposes other than supporting the transaction, including internal use and transferto third parties.

3. Access/participation. Consumers should be able to review and contest the accuracy and completeness of data collectedabout them in a timely, inexpensive process.

4. Security. Data collectors must take responsible steps to assure that consumer information is accurate and secure fromunauthorized use.

5. Enforcement. There must be in place a mechanism to enforce FIP principles. This can involve self-regulation, legislationgiving consumers legal remedies for violations, or federal statutes and regulations.

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 428

Page 15: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Working with the European Commission, the U.S. Department of Commerce developeda safe harbor framework for U.S. firms. A safe harbor is a private, self-regulating policyand enforcement mechanism that meets the objectives of government regulators and legisla-tion but does not involve government regulation or enforcement. U.S. businesses would beallowed to use personal data from EU countries if they develop privacy protection policiesthat meet EU standards. Enforcement would occur in the United States using self-policing,regulation, and government enforcement of fair trade statutes.

Internet Challenges to PrivacyInternet technology has posed new challenges for the protection of individual privacy.Information sent over this vast network of networks may pass through many differentcomputer systems before it reaches its final destination. Each of these systems is capable ofmonitoring, capturing, and storing communications that pass through it.

It is possible to record many online activities, including what searches have beenconducted, which Web sites and Web pages have been visited, the online content a personhas accessed, and what items that person has inspected or purchased over the Web. Much ofthis monitoring and tracking of Web site visitors occurs in the background without thevisitor’s knowledge. It is conducted not just by individual Web sites but by advertisingnetworks such as aQuantive, Yahoo, and DoubleClick that are capable of tracking all brows-ing behavior at thousands of Web sites. Tools to monitor visits to the World Wide Web havebecome popular because they help businesses determine who is visiting their Web sites andhow to better target their offerings. (Some firms also monitor the Internet usage of theiremployees to see how they are using company network resources.) The commercial demandfor this personal information is virtually insatiable.

Web sites can learn the identities of their visitors if the visitors voluntarily register at thesite to purchase a product or service or to obtain a free service, such as information. Web sitescan also capture information about visitors without their knowledge using cookie technology.

Cookies are small text files deposited on a computer hard drive when a user visits Websites. Cookies identify the visitor’s Web browser software and track visits to the Web site.When the visitor returns to a site that has stored a cookie, the Web site software will searchthe visitor’s computer, find the cookie, and know what that person has done in the past. Itmay also update the cookie, depending on the activity during the visit. In this way, the sitecan customize its contents for each visitor’s interests. For example, if you purchase a bookon the Amazon.com Web site and return later from the same browser, the site will welcomeyou by name and recommend other books of interest based on your past purchases.DoubleClick, described earlier in this chapter, uses cookies to build its dossiers with detailsof online purchases and to examine the behavior of Web site visitors. Figure 12-3 illustrateshow cookies work.

Chapter 12: Ethical and Social Issues in Information Systems 429

Figure 12-3How CookiesIdentify WebVisitorsCookies are written by aWeb site on a visitor’shard drive. When the visi-tor returns to that Website, the Web serverrequests the ID numberfrom the cookie and usesit to access the datastored by that server onthat visitor. The Web sitecan then use these datato display personalizedinformation.

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 429

Page 16: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Web sites using cookie technology cannot directly obtain visitors’ names and addresses.However, if a person has registered at a site, that information can be combined with cookiedata to identify the visitor. Web site owners can also combine the data they have gatheredfrom cookies and other Web site monitoring tools with personal data from other sources,such as offline data collected from surveys or paper catalog purchases, to develop verydetailed profiles of their visitors.

There are now even more subtle and surreptitious tools for surveillance of Internet users.Marketers use Web bugs as another tool to monitor online behavior. Web bugs are tinygraphic files embedded in e-mail messages and Web pages that are designed to monitor whois reading the e-mail message or Web page and transmit that information to anothercomputer. Other spyware can secretly install itself on an Internet user’s computer bypiggybacking on larger applications. Once installed, the spyware calls out to Web sites tosend banner ads and other unsolicited material to the user, and it can also report the user’smovements on the Internet to other computers. More information is available about Webbugs, spyware, and other intrusive software in Chapter 7.

Google has started using behavioral targeting to help it display more relevant ads basedon users’ search activities. One of its programs enables advertisers to target ads based on thesearch histories of Google users, along with any other information the user submits toGoogle that Google can obtain, such as age, demographics, region, and other Web activities(such as blogging). An additional program allows Google to help advertisers selectkeywords and design ads for various market segments based on search histories, such ashelping a clothing Web site create and test ads targeted at teenage females.

Google has also been scanning the contents of messages received by users of its free Web-based e-mail service called Gmail. Ads that users see when they read their e-mail are related tothe subjects of these messages. Profiles are developed on individual users based on the contentin their e-mail. Google’s Chrome Web browser, introduced in 2008, has a Suggest feature thatautomatically suggests related queries and Web sites as the user enters a search. Critics pointedout this was a key-logger device that would record every keystroke of users forever. Googlesubsequently announced it would anonymize the data in 24 hours.

The United States has allowed businesses to gather transaction information generated inthe marketplace and then use that information for other marketing purposes withoutobtaining the informed consent of the individual whose information is being used. U.S. e-commerce sites are largely content to publish statements on their Web sites informingvisitors about how their information will be used. Some have added opt-out selection boxesto these information policy statements. An opt-out model of informed consent permits thecollection of personal information until the consumer specifically requests that the data notbe collected. Privacy advocates would like to see wider use of an opt-in model of informedconsent in which a business is prohibited from collecting any personal information unlessthe consumer specifically takes action to approve information collection and use.

The online industry has preferred self-regulation to privacy legislation for protectingconsumers. In 1998, the online industry formed the Online Privacy Alliance to encourageself-regulation to develop a set of privacy guidelines for its members. The group promotesthe use of online seals, such as that of TRUSTe, certifying Web sites adhering to certainprivacy principles. Members of the advertising network industry, including DoubleClick,have created an additional industry association called the Network Advertising Initiative(NAI) to develop its own privacy policies to help consumers opt out of advertising networkprograms and provide consumers redress from abuses.

Individual firms like AOL, Yahoo!, and Google have recently adopted policies on theirown in an effort to address public concern about tracking people online. AOL established anopt-out policy that allows users of its site to not be tracked. Yahoo follows NAI guidelinesand also allows opt-out for tracking and Web beacons (Web bugs). Google has reducedretention time for tracking data.

In general, most Internet businesses do little to protect the privacy of their customers,and consumers do not do as much as they should to protect themselves. Many companieswith Web sites do not have privacy policies. Of the companies that do post privacy polices

430 Part IV: Building and Managing Systems

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 430

Page 17: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

on their Web sites, about half do not monitor their sites to ensure they adhere to thesepolicies. The vast majority of online customers claim they are concerned about online pri-vacy, but less than half read the privacy statements on Web sites (Laudon and Traver, 2009).

In one of the more insightful studies of consumer attitudes towards Internet privacy, agroup of Berkeley students conducted surveys of online users, and of complaints filed withthe Federal Trade Commission involving privacy issues. Here’s some of their results. Userconcerns: people feel they have no control over the information collected about them, andthey don’t know who to complain to. Web site practices: Web sites collect all this informa-tion, but do not let users have access; the policies are unclear; they share data with “affili-ates” but never identify who the affiliates are and how many there are. (MySpace, owned byNewsCorp, has over 1,500 affiliates with whom it shares online information.) Web bugtrackers: they are ubiquitous and we are not informed they are on the pages we visit. Theresults of this study and others suggest that consumers are not saying “take my privacy, Idon’t care, send me the service for free.” They are saying “We want access to the informa-tion, we want some controls on what can be collected, what is done with the information, theability to opt out of the entire tracking enterprise, and some clarity on what the policiesreally are, and we don’t want those policies changed without our participation and permis-sion.” (The full report is available at knowprivacy.org).

Technical SolutionsIn addition to legislation, new technologies are available to protect user privacy duringinteractions with Web sites. Many of these tools are used for encrypting e-mail, for makinge-mail or surfing activities appear anonymous, for preventing client computers fromaccepting cookies, or for detecting and eliminating spyware.

There are now tools to help users determine the kind of personal data that can beextracted by Web sites. The Platform for Privacy Preferences, known as P3P, enablesautomatic communication of privacy policies between an e-commerce site and its visitors.P3P provides a standard for communicating a Web site’s privacy policy to Internet users andfor comparing that policy to the user’s preferences or to other standards, such as the FTC’sFIP guidelines or the European Directive on Data Protection. Users can use P3P to select thelevel of privacy they wish to maintain when interacting with the Web site.

Chapter 12: Ethical and Social Issues in Information Systems 431

Web sites are postingtheir privacy policies forvisitors to review. TheTRUSTe seal designates Websites that have agreed toadhere to TRUSTe’sestablished privacy prin-ciples of disclosure,choice, access, andsecurity.

Ess9_Ch_12.qxd 11/18/2009 3:32 PM Page 431

Page 18: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

The P3P standard allows Web sites to publish privacy policies in a form that computerscan understand. Once it is codified according to P3P rules, the privacy policy becomes partof the software for individual Web pages (see Figure 12-4). Users of Microsoft InternetExplorer Web browsing software can access and read the P3P site’s privacy policy and a listof all cookies coming from the site. Internet Explorer enables users to adjust their comput-ers to screen out all cookies or let in selected cookies based on specific levels of privacy. Forexample, the “Medium” level accepts cookies from first-party host sites that have opt-in oropt-out policies but rejects third-party cookies that use personally identifiable informationwithout an opt-in policy.

However, P3P only works with Web sites of members of the World Wide WebConsortium who have translated their Web site privacy policies into P3P format. Thetechnology will display cookies from Web sites that are not part of the consortium, but userswill not be able to obtain sender information or privacy statements. Many users may alsoneed to be educated about interpreting company privacy statements and P3P levels ofprivacy. Critics point out that only a small percentage of the most popular Web sites use P3P,most users do not understand their browser’s privacy settings, and there is no enforcement ofP3P standards—companies can claim anything about their privacy policies.

PROPERTY RIGHTS: INTELLECTUAL PROPERTY

Contemporary information systems have severely challenged existing laws and socialpractices that protect private intellectual property. Intellectual property is considered to beintangible property created by individuals or corporations. Information technology hasmade it difficult to protect intellectual property because computerized information can be soeasily copied or distributed on networks. Intellectual property is subject to a variety ofprotections under three different legal traditions: trade secrets, copyright, and patent law.

Trade SecretsAny intellectual work product—a formula, device, pattern, or compilation of data—used fora business purpose can be classified as a trade secret, provided it is not based on informa-tion in the public domain. Protections for trade secrets vary from state to state. In general,trade secret laws grant a monopoly on the ideas behind a work product, but it can be a verytenuous monopoly.

Software that contains novel or unique elements, procedures, or compilations can beincluded as a trade secret. Trade secret law protects the actual ideas in a work product, notonly their manifestation. To make this claim, the creator or owner must take care to bind

432 Part IV: Building and Managing Systems

Figure 12-4The P3P StandardP3P enables Web sitesto translate their privacypolicies into a standardformat that can be readby the user’s Webbrowser software. Thebrowser software evalu-ates the Web site’s pri-vacy policy to determinewhether it is compatiblewith the user’s privacypreferences.

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 432

Page 19: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

employees and customers with nondisclosure agreements and to prevent the secret fromfalling into the public domain.

The limitation of trade secret protection is that, although virtually all software programsof any complexity contain unique elements of some sort, it is difficult to prevent the ideas inthe work from falling into the public domain when the software is widely distributed.

CopyrightCopyright is a statutory grant that protects creators of intellectual property from havingtheir work copied by others for any purpose during the life of the author plus an additional70 years after the author’s death. For corporate-owned works, copyright protection lasts for95 years after their initial creation. Congress has extended copyright protection to books,periodicals, lectures, dramas, musical compositions, maps, drawings, artwork of any kind,and motion pictures. The intent behind copyright laws has been to encourage creativity andauthorship by ensuring that creative people receive the financial and other benefits of theirwork. Most industrial nations have their own copyright laws, and there are several interna-tional conventions and bilateral agreements through which nations coordinate and enforcetheir laws.

In the mid-1960s, the Copyright Office began registering software programs, and in1980, Congress passed the Computer Software Copyright Act, which clearly providesprotection for software program code and for copies of the original sold in commerce, andsets forth the rights of the purchaser to use the software while the creator retains legal title.

Copyright protects against copying of entire programs or their parts. Damages and reliefare readily obtained for infringement. The drawback to copyright protection is that theunderlying ideas behind a work are not protected, only their manifestation in a work. A com-petitor can use your software, understand how it works, and build new software that followsthe same concepts without infringing on a copyright.

“Look and feel” copyright infringement lawsuits are precisely about the distinctionbetween an idea and its expression. For instance, in the early 1990s, Apple Computer suedMicrosoft Corporation and Hewlett-Packard for infringement of the expression of Apple’sMacintosh interface, claiming that the defendants copied the expression of overlappingwindows. The defendants countered that the idea of overlapping windows can beexpressed only in a single way and, therefore, was not protectable under the mergerdoctrine of copyright law. When ideas and their expression merge, the expression cannotbe copyrighted.

In general, courts appear to be following the reasoning of a 1989 case—Brown BagSoftware vs. Symantec Corp.—in which the court dissected the elements of software allegedto be infringing. The court found that similar concept, function, general functional features(e.g., drop-down menus), and colors are not protectable by copyright law (Brown BagSoftware vs. Symantec Corp., 1992).

PatentsA patent grants the owner an exclusive monopoly on the ideas behind an invention for 20years. The congressional intent behind patent law was to ensure that inventors of newmachines, devices, or methods receive the full financial and other rewards of their labor andyet make widespread use of the invention possible by providing detailed diagrams for thosewishing to use the idea under license from the patent’s owner. The granting of a patent isdetermined by the United States Patent and Trademark Office and relies on court rulings.

The key concepts in patent law are originality, novelty, and invention. The Patent Officedid not accept applications for software patents routinely until a 1981 Supreme Courtdecision that held that computer programs could be a part of a patentable process. Since thattime, hundreds of patents have been granted and thousands await consideration.

The strength of patent protection is that it grants a monopoly on the underlying conceptsand ideas of software. The difficulty is passing stringent criteria of nonobviousness (e.g., thework must reflect some special understanding and contribution), originality, and novelty, aswell as years of waiting to receive protection.

Chapter 12: Ethical and Social Issues in Information Systems 433

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 433

Page 20: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Challenges to Intellectual Property RightsContemporary information technologies, especially software, pose severe challenges toexisting intellectual property regimes and, therefore, create significant ethical, social, andpolitical issues. Digital media differ from books, periodicals, and other media in terms ofease of replication; ease of transmission; ease of alteration; difficulty in classifying asoftware work as a program, book, or even music; compactness—making theft easy; anddifficulties in establishing uniqueness.

The proliferation of electronic networks, including the Internet, has made it even moredifficult to protect intellectual property. Before widespread use of networks, copies ofsoftware, books, magazine articles, or films had to be stored on physical media, such aspaper, computer disks, or videotape, creating some hurdles to distribution. Using networks,information can be more widely reproduced and distributed. The Fifth Annual GlobalSoftware Piracy Study conducted by the International Data Corporation and the BusinessSoftware Alliance found that 38 percent of the software installed in 2007 on PCs worldwidewas obtained illegally, representing $48 billion in global losses from software piracy.Worldwide, for every two dollars of software purchased legitimately, one dollar’s worth wasobtained illegally (Business Software Alliance, 2008).

The Internet was designed to transmit information freely around the world, includingcopyrighted information. With the World Wide Web in particular, you can easily copy anddistribute virtually anything to thousands and even millions of people around the world,even if they are using different types of computer systems. Information can be illicitlycopied from one place and distributed through other systems and networks even thoughthese parties do not willingly participate in the infringement.

Individuals have been illegally copying and distributing digitized MP3 music files onthe Internet for a number of years. File-sharing services such as Napster, and laterGrokster, Kazaa, and Morpheus, sprung up to help users locate and swap digital musicfiles, including those protected by copyright. Illegal file sharing became so widespread thatit threatened the viability of the music recording industry. The recording industry wonsome legal battles for shutting these services down, but has not been able to halt illegal filesharing entirely. As more and more homes adopt high-speed Internet access, illegal filesharing of videos will pose similar threats to the motion picture industry.

Mechanisms are being developed to sell and distribute books, articles, and otherintellectual property legally on the Internet, and the Digital Millennium Copyright Act(DMCA) of 1998 is providing some copyright protection. The DMCA implemented aWorld Intellectual Property Organization Treaty that makes it illegal to circumvent technol-ogy-based protections of copyrighted materials. Internet service providers (ISPs) arerequired to take down sites of copyright infringers that they are hosting once they arenotified of the problem.

Microsoft and other major software and information content firms are represented by theSoftware and Information Industry Association (SIIA), which lobbies for new laws andenforcement of existing laws to protect intellectual property around the world. The SIIAruns an antipiracy hotline for individuals to report piracy activities, offers educationalprograms to help organizations combat software piracy, and has published guidelines foremployee use of software.

ACCOUNTABILITY, LIABILITY, AND CONTROL

Along with privacy and property laws, new information technologies are challengingexisting liability laws and social practices for holding individuals and institutions account-able. If a person is injured by a machine controlled, in part, by software, who should be heldaccountable and, therefore, held liable? Should a public bulletin board or an electronicservice, such as America Online, permit the transmission of pornographic or offensivematerial (as broadcasters), or should they be held harmless against any liability for whatusers transmit (as is true of common carriers, such as the telephone system)? What about theInternet? If you outsource your information processing, can you hold the external vendor

434 Part IV: Building and Managing Systems

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 434

Page 21: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

liable for injuries done to your customers? Some real-world examples may shed light onthese questions.

Computer-Related Liability ProblemsDuring the last week of September 2009, thousands of customers of TD Bank, one of thelargest banks in North America, scrambled to find their payroll checks, social securitychecks, and savings and checking account balances. The bank’s 6.5 million customers weretemporarily out of funds because of a computer glitch. The problems were caused by a failedeffort to integrate systems of TD Bank and Commerce Bank. A spokesperson for TD Bank,said that “while the overall integration of the systems went well, there have been somespeed-bumps in the final stages, as you might expect with a project of this size andcomplexity.” (Vijayan, 2009). Who is liable for any economic harm caused to individuals orbusinesses that could not access their full account balances in this period?

This case reveals the difficulties faced by information systems executives whoultimately are responsible for any harm done by systems developed by their staffs. Ingeneral, insofar as computer software is part of a machine, and the machine injures someonephysically or economically, the producer of the software and the operator can be held liablefor damages. Insofar as the software acts like a book, storing and displaying information,courts have been reluctant to hold authors, publishers, and booksellers liable for contents(the exception being instances of fraud or defamation), and hence courts have been wary ofholding software authors liable for booklike software.

In general, it is very difficult (if not impossible) to hold software producers liable fortheir software products that are considered to be like books, regardless of the physical oreconomic harm that results. Historically, print publishers, books, and periodicals have notbeen held liable because of fears that liability claims would interfere with First Amendmentrights guaranteeing freedom of expression.

What about software as a service? ATM machines are a service provided to bankcustomers. Should this service fail, customers will be inconvenienced and perhaps harmedeconomically if they cannot access their funds in a timely manner. Should liability protec-tions be extended to software publishers and operators of defective financial, accounting,simulation, or marketing systems?

Software is very different from books. Software users may develop expectations ofinfallibility about software; software is less easily inspected than a book, and it is moredifficult to compare with other software products for quality; software claims actually toperform a task rather than describe a task, as a book does; and people come to depend onservices essentially based on software. Given the centrality of software to everyday life, thechances are excellent that liability law will extend its reach to include software even whenthe software merely provides an information service.

Telephone systems have not been held liable for the messages transmitted becausethey are regulated common carriers. In return for their right to provide telephone service,they must provide access to all, at reasonable rates, and achieve acceptable reliability.But broadcasters and cable television stations are subject to a wide variety of federal andlocal constraints on content and facilities. Organizations can be held liable for offensivecontent on their Web sites, and online services, such as America Online, might be heldliable for postings by their users. Although U.S. courts have increasingly exonerated Websites and ISPs for posting material by third parties, the threat of legal action still has achilling effect on small companies or individuals who cannot afford to take their cases totrial.

SYSTEM QUALITY: DATA QUALITY AND SYSTEM ERRORS

The debate over liability and accountability for unintentional consequences of system useraises a related but independent moral dimension: What is an acceptable, technologicallyfeasible level of system quality? At what point should system managers say, “Stop testing,we’ve done all we can to perfect this software. Ship it!” Individuals and organizations may

Chapter 12: Ethical and Social Issues in Information Systems 435

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 435

Page 22: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

be held responsible for avoidable and foreseeable consequences, which they have a duty toperceive and correct. And the gray area is that some system errors are foreseeable andcorrectable only at very great expense, an expense so great that pursuing this level ofperfection is not feasible economically—no one could afford the product.

For example, although software companies try to debug their products before releasingthem to the marketplace, they knowingly ship buggy products because the time and cost offixing all minor errors would prevent these products from ever being released. What if theproduct was not offered on the marketplace, would social welfare as a whole not advanceand perhaps even decline? Carrying this further, just what is the responsibility of a producerof computer services—should it withdraw the product that can never be perfect, warn theuser, or forget about the risk (let the buyer beware)?

Three principal sources of poor system performance are (1) software bugs and errors, (2)hardware or facility failures caused by natural or other causes, and (3) poor input dataquality. A Chapter 7 Learning Track discusses why zero defects in software code of anycomplexity cannot be achieved and why the seriousness of remaining bugs cannot beestimated. Hence, there is a technological barrier to perfect software, and users must beaware of the potential for catastrophic failure. The software industry has not yet arrived attesting standards for producing software of acceptable but not perfect performance.

Although software bugs and facility catastrophes are likely to be widely reported in thepress, by far the most common source of business system failure is data quality. Fewcompanies routinely measure the quality of their data, but individual organizations reportdata error rates ranging from 0.5 to 30 percent.

QUALITY OF LIFE: EQUITY, ACCESS, AND BOUNDARIES

The negative social costs of introducing information technologies and systems are begin-ning to mount along with the power of the technology. Many of these negative socialconsequences are not violations of individual rights or property crimes. Nevertheless, thesenegative consequences can be extremely harmful to individuals, societies, and politicalinstitutions. Computers and information technologies potentially can destroy valuableelements of our culture and society even while they bring us benefits. If there is a balance ofgood and bad consequences of using information systems, who do we hold responsible forthe bad consequences? Next, we briefly examine some of the negative social consequencesof systems, considering individual, social, and political responses.

Balancing Power: Center Versus PeripheryAn early fear of the computer age was that huge, centralized mainframe computers wouldcentralize power at corporate headquarters and in the nation’s capital, resulting in a BigBrother society, as was suggested in George Orwell’s novel 1984. The shift toward highlydecentralized computing, coupled with an ideology of empowerment of thousands ofworkers, and the decentralization of decision making to lower organizational levels, havereduced the fears of power centralization in institutions. Yet much of the empowermentdescribed in popular business magazines is trivial. Lower-level employees may be empow-ered to make minor decisions, but the key policy decisions may be as centralized as in thepast.

Rapidity of Change: Reduced Response Time to CompetitionInformation systems have helped to create much more efficient national and internationalmarkets. The now-more-efficient global marketplace has reduced the normal social buffersthat permitted businesses many years to adjust to competition. Time-based competition hasan ugly side: The business you work for may not have enough time to respond to globalcompetitors and may be wiped out in a year, along with your job. We stand the risk ofdeveloping a “just-in-time society” with “just-in-time jobs” and “just-in-time” workplaces,families, and vacations.

436 Part IV: Building and Managing Systems

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 436

Page 23: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Maintaining Boundaries: Family, Work, and LeisureParts of this book were produced on trains and planes, as well as on vacations and duringwhat otherwise might have been “family” time. The danger to ubiquitous computing,telecommuting, nomad computing, and the “do anything anywhere” computing environ-ment is that it is actually coming true. The traditional boundaries that separate work fromfamily and just plain leisure have been weakened.

Although authors have traditionally worked just about anywhere (typewriters have beenportable for nearly a century), the advent of information systems, coupled with the growthof knowledge-work occupations, means that more and more people will are working whentraditionally they would have been playing or communicating with family and friends. Thework umbrella now extends far beyond the eight-hour day.

Even leisure time spent on the computer threatens these close social relationships.Extensive Internet use, even for entertainment or recreational purposes, takes people awayfrom their family and friends. Among middle school and teenage children, it can lead toharmful anti-social behavior. The Interactive Session on People explores this topic.

Weakening these institutions poses clear-cut risks. Family and friends historically haveprovided powerful support mechanisms for individuals, and they act as balance points in asociety by preserving private life, providing a place for people to collect their thoughts,allowing people to think in ways contrary to their employer, and dream.

Dependence and VulnerabilityToday, our businesses, governments, schools, and private associations, such as churches, areincredibly dependent on information systems and are, therefore, highly vulnerable if thesesystems fail. With systems now as ubiquitous as the telephone system, it is startling toremember that there are no regulatory or standard-setting forces in place that are similar totelephone, electrical, radio, television, or other public utility technologies. The absence ofstandards and the criticality of some system applications will probably call forth demandsfor national standards and perhaps regulatory oversight.

Computer Crime and AbuseNew technologies, including computers, create new opportunities for committing crime bycreating new valuable items to steal, new ways to steal them, and new ways to harm others.

Chapter 12: Ethical and Social Issues in Information Systems 437

Although some peopleenjoy the convenience ofworking at home, the “doanything anywhere” com-puting environment canblur the traditional bound-aries between work andfamily time.

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 437

Page 24: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

438 Part IV: Building and Managing Systems

INTERACTIVE SESSION: PEOPLE The Perils of Texting: Path to Prison

In February 2009 the British Crown Court sentencedPhillipa Curtis, 21, to 21 months in prison for killingVictoria McBryde after plowing into her car on amodern super highway, killing her instantly. In thehour before the crash, Ms. Curtis had exchanged overtwo dozen text messages with friends concerning herencounter with a celebrity singer. Defense attorneysargued Phillipa was not texting at the moment of thecrash, and had not opened the last text. But the Britishrules say that “reading or composing text over a periodof time is a gross avoidable distraction,” categorizedthe same way as drunken driving. Police and prosecu-tors argued the car she hit was clearly visible from 300yards, the lights were on, and it was a clear night. Theprosecution argued that in light of the long precedingtext conversation, with the ping of an incoming mes-sage, Curtis was distracted from driving. The juryagreed in 50 minutes to a guilty verdict.

Cell phones have become a staple of modernsociety. Everyone has them, and people carry and usethem at all hours of the day. For the most part, this is agood thing: the benefits of staying connected at anytime and at any location are considerable. But if you’relike most Americans, you may regularly talk on thephone or even text while at the wheel of a car. Thisdangerous behavior has resulted in increasing numbersof accidents and fatalities caused by cell phone usage.The trend shows no sign of slowing down, not onlybecause legislation barring the use of mobile deviceswhile driving has been bogged down, but becausemost people don’t fully understand the risks.

In 2003, a federal study of 10,000 drivers by theNational Highway Traffic Safety Administration(NHTSA) set out to determine the effects of using cellphones behind the wheel. The results were conclusive:talking on the phone is equivalent to a 10-point reduc-tion in IQ and a .08 blood alcohol level, which lawenforcement considers intoxicated. Hands-free setswere ineffective in eliminating risk, the study found,because the conversation itself is what distractsdrivers, not holding the phone. Cell phone use caused955 fatalities and 240,000 accidents in 2002. Relatedstudies indicated that drivers who talked on the phonewhile driving increased their crash risk fourfold, anddrivers who texted while driving increased their crashrisk by a whopping 23 times.

But the NHTSA study was not published immedi-ately due to pressure from congressmen who worriedthat legislation banning or restricting phone usage invehicles would be unpopular among voters whoregularly multitask while driving. The NHTSA wasurged to simply gather information, rather than recom-

mend policy changes. The eventually published mate-rials consisted of stripped-down versions of theagency’s original research. Since the study, mobiledevice usage has grown by an order of magnitude,making this already dangerous situation worse. In fact,from 1995 to 2008, the number of wireless subscribersin America increased by 800 percent, to 270 million,and Americans’ usage of wireless minutes increasedby almost 6,000 percent.

This increase in cell phone usage is accompaniedby the increases you would expect in phone-relatedfatalities and accidents: in 2008, it’s estimated that cellphones caused 2,600 fatalities and 330,000 accidents,up considerably from 2002. Studies show that driversknow that using the phone while driving is one of themost dangerous things you can do on the road, butrefuse to admit that it’s dangerous when they them-selves do it. A survey by Vlingo, a developer of voice-driven mobile phone applications, found that 26percent of phone users admitted to texting whiledriving, but 83 percent said that the practice should beillegal, which means at least some portion of peopleare engaging in a practice that they feel should beoutlawed.

Of users that text while driving, the moreyouthful demographic groups, such as the 18–29 agegroup, are by far the most frequent texters. Aboutthree quarters of Americans in this age groupregularly text, compared to just 22 percent of the 35–44 age group. Correspondingly, the majority ofaccidents involving mobile device use behind thewheel involve young adults. Among this age group,texting behind the wheel is just one of a litany ofproblems raised by frequent texting: anxiety, distrac-tion, failing grades, repetitive stress injuries, andsleep deprivation are just some of the other problemsbrought about by excessive use of mobile devices.Teenagers are particularly prone to using cell phonesto text because they want to know what’s happeningto their friends and are anxious about being sociallyisolated.

Seventy-five billion texts were sent in the UnitedStates in June 2009, compared to 7.2 billion in June2005. Texting is clearly here to stay, and in fact hassupplanted phone calls as the most commonly usedmethod of mobile communication. People are unwill-ing to give up their mobile devices because of the pres-sures of staying connected. Neurologists discoveredthat the response to multitasking suggests that peopledevelop addictions to the digital devices they use most,getting quick bursts of adrenaline, without which dri-ving becomes boring.

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 438

Page 25: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Chapter 12: Ethical and Social Issues in Information Systems 439

Despite the obstacles, lawmakers are increasinglyrecognizing the need for much stronger legislation bar-ring drivers from texting behind the wheel. Thoughmost people aren’t willing to give up their phonesentirely, and many legislators believe that it’s not stateor federal government’s role to prohibit poor decision-making, many states have made inroads with lawsprohibiting texting while operating vehicles. In Utah,drivers crashing while texting can receive 15 years inprison, by far the toughest sentence for texting whiledriving in the nation. Utah’s law assumes that driversunderstand the risks of texting while driving, whereas inother states, prosecutors must prove that the driver knewabout the risks of texting while driving before doing so.

Utah’s tough law was the result of a horrifyingaccident in which a speeding college student, textingat the wheel, rear-ended a car in front. The car lostcontrol, entered the opposite side of the road, and washit head-on by a pickup truck hauling a trailer, killing

the driver instantly. In September 2008, a trainengineer in California was texting within a minuteprior to the most fatal train accident in almost twodecades. Californian authorities responded by banningthe use of cell phones by train workers while on duty.It’s likely that more accidents of this magnitude willhave to occur before Americans are persuaded to giveup texting while driving.

Sources: Elisabeth Rosenthal, “When Texting Kills, Britain Offers Path toPrison,” The New York Times, November 9, 2009; Jennifer Steinhauer and LauraM. Holson, “As Text Messages Fly, Danger Lurks,” The New York Times,September 20, 2008; Katie Hafner, “Texting May be Taking a Toll on Teenagers,”The New York Times, May 26, 2009; Tara Parker-Pope, “Texting Until TheirThumbs Hurt,” The New York Times, May 26, 2009; Tom Regan, “Some SoberingStats on Texting While Driving,” The Christian Science Monitor, May 28, 2009;Matt Richtel, “Drivers and Legislators Dismiss Cellphone Risks,” The New YorkTimes, July 19, 2009; “Matt Richtel, U.S. Withheld Data on Risks of DistractedDriving,” The New York Times, July 21, 2009; Matt Richtel, “In Study, TextingLifts Crash Risk by Large Margin,” The New York Times, July 28, 2009; MattRichtel, “Utah Gets Tough With Texting Drivers,” The New York Times, August29, 2009; Matt Richtel, “Driver Texting Now an Issue in the Back Seat,” The NewYork Times, September 9, 2009.

1. Which of the five moral dimensions of informa-tion systems described in the text is involved inthis case?

2. What are the ethical, social, and political issuesraised by this case?

3. Which of the ethical principles described in thetext are useful for decision making about textingwhile driving?

1. Many people at state and local levels are callingfor a federal law against texting while driving.Use a search engine to explore what steps thefederal government has taken to discouragetexting while driving.

2. Most people are not aware of the widespreadimpact of texting while driving across the UnitedStates. Do a search on “texting while driving.”Examine all the search results for the first twopages. Enter the information into a 2-columntable. In the left-hand column put the locality ofreport and year. In the right-hand column give abrief description of the search result, e.g. accident,report, court judgment, etc. What can youconclude from these search results and table?

CASE STUDY QUESTIONS MIS IN ACTION

Computer crime is the commission of illegal acts through the use of a computer or againsta computer system. Computers or computer systems can be the object of the crime (destroy-ing a company’s computer center or a company’s computer files), as well as the instrumentof a crime (stealing computer lists by illegally gaining access to a computer system using ahome computer). Simply accessing a computer system without authorization or with intentto do harm, even by accident, is now a federal crime.

Computer abuse is the commission of acts involving a computer that may not be illegalbut that are considered unethical. The popularity of the Internet and e-mail has turned oneform of computer abuse—spamming—into a serious problem for both individuals andbusinesses. Spam is junk e-mail sent by an organization or individual to a mass audience ofInternet users who have expressed no interest in the product or service being marketed.Spammers tend to market pornography, fraudulent deals and services, outright scams, andother products not widely approved in most civilized societies. Some countries have passed

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 439

Page 26: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

laws to outlaw spamming or to restrict its use. In the United States, it is still legal if it doesnot involve fraud and the sender and subject of the e-mail are properly identified.

Spamming has mushroomed because it only costs a few cents to send thousands ofmessages advertising wares to Internet users. According to Sophos, a leading vendor ofsecurity software, spam accounted for 97 percent of all e-mail traffic during the first quarterof 2009 (Sophos, 2009). Spam costs for businesses are very high (an estimated at over $50billion per year) because of the computing and network resources consumed by billions ofunwanted e-mail messages and the time required to deal with them.

Internet service providers and individuals can combat spam by using spam filteringsoftware to block suspicious e-mail before it enters a recipient’s e-mail inbox. However,spam filters may block legitimate messages. Spammers know how to skirt around filters bycontinually changing their e-mail accounts, by incorporating spam messages in images, byembedding spam in e-mail attachments and electronic greeting cards, and by using otherpeople’s computers that have been hijacked by botnets (see Chapter 7). Many spammessages are sent from one country while another country hosts the spam Web site.

Spamming is more tightly regulated in Europe than in the United States. On May 30,2002, the European Parliament passed a ban on unsolicited commercial messaging.Electronic marketing can be targeted only to people who have given prior consent.

The U.S. CAN-SPAM Act of 2003, which went into effect on January 1, 2004, does notoutlaw spamming but does ban deceptive e-mail practices by requiring commercial e-mailmessages to display accurate subject lines, identify the true senders, and offer recipients aneasy way to remove their names from e-mail lists. It also prohibits the use of fake returnaddresses. A few people have been prosecuted under the law, but it has had a negligibleimpact on spamming. Although Facebook and MySpace have won judgments againstspammers, most critics argue the law has too many loopholes and is not effectively enforced(Associated Press, 2009).

Employment: Trickle-Down Technology and Reengineering Job LossReengineering work is typically hailed in the information systems community as a majorbenefit of new information technology. It is much less frequently noted that redesigningbusiness processes could potentially cause millions of middle-level managers and clericalworkers to lose their jobs. One economist has raised the possibility that we will create asociety run by a small “high tech elite of corporate professionals . . . in a nation of thepermanently unemployed” (Rifkin, 1993).

Other economists are much more sanguine about the potential job losses. They believerelieving bright, educated workers from reengineered jobs will result in these workersmoving to better jobs in fast-growth industries. Missing from this equation are unskilled,blue-collar workers and older, less well-educated middle managers. It is not clear that thesegroups can be retrained easily for high-quality (high-paying) jobs. Careful planning andsensitivity to employee needs can help companies redesign work to minimize job losses.

The Interactive Session on Organizations explores another consequence of reengineeredjobs. In this case, Wal-Mart’s changes in job scheduling for more efficient use of its employ-ees did not cause employees to lose their jobs directly. But it did impact their personal livesand forced them to accept more irregular part-time work. As you read this case, try toidentify the problem this company is facing, what alternative solutions are available tomanagement, and whether the chosen solution was the best way to address this problem.

Equity and Access: Increasing Racial and Social Class CleavagesDoes everyone have an equal opportunity to participate in the digital age? Will the social, economic, and cultural gaps that exist in the United States and othersocieties be reduced by information systems technology? Or will the cleavages be increased,permitting the better off to become even more better off relative to others?

These questions have not yet been fully answered because the impact of systems technologyon various groups in society has not been thoroughly studied. What is known is that information,knowledge, computers, and access to these resources through educational institutions and public

440 Part IV: Building and Managing Systems

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 440

Page 27: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Chapter 12: Ethical and Social Issues in Information Systems 441

INTERACTIVE SESSION: ORGANIZATIONS Flexible Scheduling Good or Bad for Employees?

With nearly 1.4 million workers domestically, Wal-Mart is the largest private employer in the UnitedStates. Wal-Mart is also the nation’s number oneretailer in terms of sales, registering nearly $379billion in sales revenue for the fiscal year endingJanuary 31, 2008. Wal-Mart achieved its lofty statusthrough a combination of low prices and low opera-tional costs, enabled by a superb continuous inventoryreplenishment system.

Now Wal-Mart is trying to lower costs further bychanging its methods for scheduling the work shiftsof its employees. In early 2007, Wal-Mart revealedthat it was adopting a computerized schedulingsystem, a move that has been roundly criticized byworkers’ rights advocates for the impact it may haveon employees’ lives.

Traditionally, scheduling employee shifts at bigbox stores such as Wal-Mart was the domain of storemanagers who arranged schedules manually.

They based their decisions in part on current storepromotions as well as on weekly sales data from theprevious year. Typically, the process required a fullday of effort for a store manager. Multiply that laborintensity by the number of stores in a chain and youhave an expensive task with results that are margin-ally beneficial to the company.

By using a computerized scheduling system, suchas the system from Kronos that Wal-Mart adopted, aretail enterprise can produce work schedules for everystore in its chain in a matter of hours. Meanwhile,store managers can devote their time to running theirindividual stores more effectively.

The Kronos scheduling system tracks individualstore sales, transactions, units sold, and customertraffic. The system logs these metrics over 15-minuteincrements for seven weeks at a time, and thenmeasures them against the same data from theprevious year. It can also integrate data such as thenumber of in-store customers at certain hours or theaverage time required to sell a television set or unloada truck and predict the number of workers needed atany given hour.

A typical result of this type of scheduling mightcall for a sparse staff early in the day, a significantincrease for the midday rush, scaling back towardthe end of the afternoon, and then fortifying the staffonce again for an evening crowd. However, for achain like Wal-Mart, which operates thousands of24-hour stores and has also run into troublepreviously for its labor practices, the transition to acomputerized scheduling system has resulted incontroversy.

For Wal-Mart, using Kronos translates toimproved productivity and customer satisfaction.Management reported a 12-percent gain in laborproductivity in the quarter ending January 31, 2008.

For Wal-Mart employees, known to the companyas associates, the change may decrease the stability oftheir jobs and, possibly, create financial hardship.

The scheduling generated by Kronos can beunpredictable, requiring associates to be more flexi-ble with their work hours. Stores may ask them to beon call in case of a rush, or to go home during a slowspell. Irregular hours, and inconsistent paychecks,make it more difficult for employees to organize theirlives, from scheduling babysitters to paying bills.Alerts from the system may also enable storemanagers to avoid paying overtime or full-time wagesby cutting back the hours of associates who areapproaching the thresholds that cause extra benefits tokick in. Associates are almost always people whoneed all the work they can get.

According to Paul Blank of the Web siteWakeUpWalMart.com, which is supported by theUnited Food and Commercial Workers union, “Whatthe computer is trying to optimize is the most numberof part-time and least number of full-time workers atlower labor costs, with no regard for the effect that ithas on workers’ lives.” Sarah Clark, speaking onbehalf of Wal-Mart, insists the system’s goal is simplyto improve customer service by shortening checkoutlines and better meeting the needs of shoppers.

To assist in the deployment of its computerizedscheduling system in all of its stores, Wal-Martrequests that its associates submit “personal avail-ability” forms. Language on the form instructsassociates that “Limiting your personal availabilitymay restrict the number of hours you are scheduled.”Anecdotal evidence suggests that some workers haveindeed seen their hours cut and their shifts bouncedaround. Experienced associates with high pay rateshave expressed concern that the system enablesmanagers to pressure them into quitting. If they areunwilling to work nights and weekends, managershave a justification for replacing them with newworkers who will make much less per hour. SarahClark denies that the system is used in this manner.

Critics of the system can cite the Clayton AntitrustAct of 1914, which states, “The labor of a human beingis not a commodity or article of commerce.” Wal-martemployees writing on blogs complain that the flexiblescheduling system does not allow them time to have asecond job because they have to be available for theirWal-mart job. But flexible scheduling when done right

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 441

Page 28: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

442 Part IV: Building and Managing Systems

1. What is the ethical dilemma facing Wal-Mart inthis case? Do Wal-Mart’s associates also face anethical dilemma? If so, what is it?

2. What ethical principles apply to this case? Howdo they apply?

3. What are the potential effects of computerizedscheduling on employee morale? What are theconsequences of these effects for Wal-Mart?

4. For what kinds of workers is flexible scheduling apositive benefit, and why?

by taking into account the outside demands on employ-ees can be very helpful. For instance, flexible schedul-ing can allow two parents to share a job, or allowwomen with young children a schedule that fits in withraising children. No legal battles over computerizedscheduling appear imminent, so interpreting whetherWal-Mart’s strategy equals treating its labor force as acommodity will have to wait.

In the meantime, Wal-Mart is once again at theforefront of technology trends in its industry. Ann

Visit the Web site at www.WakeUpWalMart.com andthen answer the following questions:

1. What are this group’s major points of contentionwith Wal-Mart?

2. How well does the Web site serve their cause?Does the site help their cause or hurt it?

3. What other approach could the organization taketo bring about change?

Using Wal-Mart’s Web site and Google for research,answer the following questions:

4. How does Wal-Mart address the issues raised byorganizations such as WakeUpWalMart.com?

5. Are the company’s methods effective?

6. If you were a public relations expert advising Wal-Mart, what suggestions would you make forhandling criticism?

Taylor Stores, Limited Brands, Gap, Williams-Sonoma, and GameStop have all installed similarworkforce scheduling systems.

Sources: Vanessa O’Connell, “Retailers Reprogram Workers in Efficiency Push,”Jennifer Turano, “Two Workers, Wearing One Hat,” The New York Times, October4, 2009; The Wall Street Journal, September 10, 2008; Kris Maher, “Wal-MartSeeks New Flexibility in Worker Shifts,” The Wall Street Journal, January 3,2007; www.kronos.com, accessed July 15, 2008; Bob Evans, “Wal-Mart’s Latest‘Orwellian’ Technology Move: Get Over It,” InformationWeek, April 6, 2007; and“More Opinions on Wal-Mart’s Flexible Scheduling,” InformationWeek, April 17,2007.

CASE STUDY QUESTIONS MIS IN ACTION

libraries are inequitably distributed along ethnic and social class lines, as are many other infor-mation resources. Several studies have found that certain ethnic and income groups in the UnitedStates are less likely to have computers or online Internet access even though computer owner-ship and Internet access have soared in the past five years. Although the gap is narrowing, higher-income families in each ethnic group are still more likely to have home computers and Internetaccess than lower-income families in the same group.

A similar digital divide exists in U.S. schools, with schools in high-poverty areas lesslikely to have computers, high-quality educational technology programs, or Internet accessavailability for their students. Left uncorrected, the digital divide could lead to a society ofinformation haves, computer literate and skilled, versus a large group of information have-nots, computer illiterate and unskilled. Public interest groups want to narrow thisdigital divide by making digital information services—including the Internet—available tovirtually everyone, just as basic telephone service is now.

Health Risks: RSI, CVS, and TechnostressThe most common occupational disease today is repetitive stress injury (RSI). RSI occurswhen muscle groups are forced through repetitive actions often with high-impact loads

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 442

Page 29: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

(such as tennis) or tens of thousands of repetitions under low-impact loads (such as workingat a computer keyboard).

The single largest source of RSI is computer keyboards. The most common kind ofcomputer-related RSI is carpal tunnel syndrome (CTS), in which pressure on the mediannerve through the wrist’s bony structure, called a carpal tunnel, produces pain. The pressureis caused by constant repetition of keystrokes: in a single shift, a word processor mayperform 23,000 keystrokes. Symptoms of carpal tunnel syndrome include numbness, shoot-ing pain, inability to grasp objects, and tingling. Millions of workers have been diagnosedwith carpal tunnel syndrome.

RSI is avoidable. Designing workstations for a neutral wrist position (using a wrist restto support the wrist), proper monitor stands, and footrests all contribute to proper postureand reduced RSI. Ergonomically correct keyboards are also an option. These measuresshould be supported by frequent rest breaks and rotation of employees to different jobs.

RSI is not the only occupational illness computers cause. Back and neck pain, leg stress,and foot pain also result from poor ergonomic designs of workstations. Computer visionsyndrome (CVS) refers to any eyestrain condition related to computer display screen use.Its symptoms, which are usually temporary, include headaches, blurred vision, and dry andirritated eyes.

The newest computer-related malady is technostress, which is stress induced bycomputer use. Its symptoms include aggravation, hostility toward humans, impatience, andfatigue. According to experts, humans working continuously with computers come to expectother humans and human institutions to behave like computers, providing instant responses,attentiveness, and an absence of emotion. Technostress is thought to be related to high levelsof job turnover in the computer industry, high levels of early retirement from computer-intense occupations, and elevated levels of drug and alcohol abuse.

The incidence of technostress is not known but is thought to be in the millions andgrowing rapidly in the United States. Computer-related jobs now top the list of stressfuloccupations based on health statistics in several industrialized countries.

To date, the role of radiation from computer display screens in occupational disease hasnot been proved. Video display terminals (VDTs) emit nonionizing electric and magneticfields at low frequencies. These rays enter the body and have unknown effects on enzymes,molecules, chromosomes, and cell membranes. Long-term studies are investigating low-level electromagnetic fields and birth defects, stress, low birth weight, and other diseases.All manufacturers have reduced display screen emissions since the early 1980s, andEuropean countries, such as Sweden, have adopted stiff radiation emission standards.

Chapter 12: Ethical and Social Issues in Information Systems 443

Repetitive stress injury(RSI) is the leading occu-pational disease today.The single largest causeof RSI is computer key-board work.

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 443

Page 30: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

The computer has become a part of our lives—personally as well as socially, culturally,and politically. It is unlikely that the issues and our choices will become easier as informa-tion technology continues to transform our world. The growth of the Internet and the infor-mation economy suggests that all the ethical and social issues we have described will beheightened further as we move into the first digital century.

12.4 Hands-On MIS Projects

The projects in this section give you hands-on experience in analyzing the privacy implicationsof using online data brokers, developing a corporate policy for employee Web usage, usingblog creation tools to create a simple blog, and using Internet newsgroups for market research.

MANAGEMENT DECISION PROBLEMS

1. USAData’s Web site is linked to massive databases that consolidate personal data onmillions of people. Anyone with a credit card can purchase marketing lists of consumersbroken down by location, age, income level, and interests. If you click on ConsumerLeads to order a consumer mailing list, you can find the names, addresses, andsometimes phone numbers of potential sales leads residing in a specific location andpurchase the list of those names. One could use this capability to obtain a list, forexample, of everyone in Peekskill, New York, making $150,000 or more per year. Dodata brokers such as USAData raise privacy issues? Why or why not? If your name andother personal information were in this database, what limitations on access would youwant in order to preserve your privacy? Consider the following data users: governmentagencies, your employer, private business firms, other individuals.

2. As the head of a small insurance company with six employees, you are concerned abouthow effectively your company is using its networking and human resources. Budgets aretight, and you are struggling to meet payrolls because employees are reporting manyovertime hours. You do not believe that the employees have a sufficiently heavy workload to warrant working longer hours and are looking into the amount of time they spendon the Internet.

444 Part IV: Building and Managing Systems

WEB USAGE REPORT FOR THE WEEK ENDING JANUARY 9, 2009

User Name Minutes Online Web Site Visited

Kelleher, Claire 45 www.doubleclick.net

Kelleher, Claire 107 www.yahoo.com

Kelleher, Claire 96 www.insweb.com

McMahon, Patricia 83 www.itunes.com

McMahon, Patricia 44 www.insweb.com

Milligan, Robert 112 www.youtube.com

Milligan, Robert 43 www.travelocity.com

Olivera, Ernesto 40 www.CNN.com

Talbot, Helen 125 www.etrade.com

Talbot, Helen 27 www.nordstrom.com

Talbot, Helen 35 www.yahoo.com

Talbot, Helen 73 www.ebay.com

Wright, Steven 23 www.facebook.com

Wright, Steven 15 www.autobytel.com

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 444

Page 31: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Each employee uses a computer with Internet access on the job. You requested the pre-ceding weekly report of employee Web usage from your information systems department.

• Calculate the total amount of time each employee spent on the Web for the week and thetotal amount of time that company computers were used for this purpose. Rank theemployees in the order of the amount of time each spent online.

• Do your findings and the contents of the report indicate any ethical problems employeesare creating? Is the company creating an ethical problem by monitoring its employees’use of the Internet?

• Use the guidelines for ethical analysis presented in this chapter to develop a solution tothe problems you have identified.

ACHIEVING OPERATIONAL EXCELLENCE: CREATING A SIMPLEBLOG

Software skills: Blog creationBusiness skills: Blog and Web page design

In this project, you’ll learn how to build a simple blog of your own design using the onlineblog creation software available at Blogger.com. Pick a sport, hobby, or topic of interest as thetheme for your blog. Name the blog, give it a title, and choose a template for the blog. Post atleast four entries to the blog, adding a label for each posting. Edit your posts, if necessary.Upload an image, such as a photo from your hard drive or the Web to your blog. (Google rec-ommends Open Photo, Flickr: Creative Commons, or Creative Commons Search as sourcesfor photos. Be sure to credit the source for your image.) Add capabilities for other registeredusers, such as team members, to comment on your blog. Briefly describe how your blog couldbe useful to a company selling products or services related to the theme of your blog. List thetools available to Blogger (including Gadgets) that would make your blog more useful forbusiness and describe the business uses of each. Save your blog and show it to your instructor.

IMPROVING DECISION MAKING: USING INTERNETNEWSGROUPS FOR ONLINE MARKET RESEARCH

Software Skills: Web browser software and Internet newsgroupsBusiness Skills: Using Internet newsgroups to identify potential customers

This project will help develop your Internet skills in using newsgroups for marketing. It willalso ask you to think about the ethical implications of using information in online discussiongroups for business purposes.

You are producing hiking boots that you sell through a few stores at this time. You thinkyour boots are more comfortable than those of your competition. You believe you can under-sell many of your competitors if you can significantly increase your production and sales.You would like to use Internet discussion groups interested in hiking, climbing, and camp-ing both to sell your boots and to make them well known. Visit groups.google.com, whichstores discussion postings from many thousands of newsgroups. Through this site you canlocate all relevant newsgroups and search them by keyword, author’s name, forum, date, andsubject. Choose a message and examine it carefully, noting all the information you canobtain, including information about the author.

• How could you use these newsgroups to market your boots? • What ethical principles might you be violating if you use these messages to sell your

boots? Do you think there are ethical problems in using newsgroups this way? Explainyour answer.

• Next use Google or Yahoo.com to search the hiking boots industry and locate sites thatwill help you develop other new ideas for contacting potential customers.

• Given what you have learned in this and previous chapters, prepare a plan to usenewsgroups and other alternative methods to begin attracting visitors to your site.

Chapter 12: Ethical and Social Issues in Information Systems 445

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 445

Page 32: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

446 Part IV: Building and Managing Systems

Review Summary

1 What ethical, social, and political issues are raised by information systems?Information technology is introducing changes for which laws and rules of accept-

able conduct have not yet been developed. Increasing computing power, storage, and net-working capabilities—including the Internet—expand the reach of individual and organi-zational actions and magnify their impacts. The ease and anonymity with whichinformation is now communicated, copied, and manipulated in online environments posenew challenges to the protection of privacy and intellectual property. The main ethical,social, and political issues raised by information systems center around information rightsand obligations, property rights and obligations, accountability and control, system qual-ity, and quality of life.

2 What specific principles for conduct can be used to guide ethical decisions? Sixethical principles for judging conduct include the Golden Rule, Immanuel Kant’s

Categorical Imperative, Descartes’ rule of change, the Utilitarian Principle, the RiskAversion Principle, and the ethical “no free lunch” rule. These principles should be used inconjunction with an ethical analysis.

3 Why do contemporary information systems technology and the Internet posechallenges to the protection of individual privacy and intellectual property?

Contemporary data storage and data analysis technology enables companies to easily gatherpersonal data about individuals from many different sources and analyze these data to createdetailed electronic profiles about individuals and their behaviors. Data flowing over theInternet can be monitored at many points. Cookies and other Web monitoring tools closelytrack the activities of Web site visitors. Not all Web sites have strong privacy protection poli-cies, and they do not always allow for informed consent regarding the use of personal infor-mation. Traditional copyright laws are insufficient to protect against software piracy becausedigital material can be copied so easily and transmitted to many different locations simulta-neously over the Internet.

4 How have information systems affected everyday life? Although computer systemshave been sources of efficiency and wealth, they have some negative impacts.

Computer errors can cause serious harm to individuals and organizations. Poor data qualityis also responsible for disruptions and losses for businesses. Jobs can be lost when comput-ers replace workers or tasks become unnecessary in reengineered business processes. Theability to own and use a computer may be exacerbating socioeconomic disparities amongdifferent racial groups and social classes. Widespread use of computers increases opportuni-ties for computer crime and computer abuse. Computers can also create health problems,such as RSI, computer vision syndrome, and technostress.

LEARNING TRACKS

The following Learning Tracks provide content relevant to the topics covered inthis chapter:

1. Developing a Corporate Code of Ethics for Information Systems

2. Creating a Web Page

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 446

Page 33: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Chapter 12: Ethical and Social Issues in Information Systems 447

Review Questions

1. What ethical, social, and political issues are raised by information systems?

• Explain how ethical, social, and political issues are connected and give some examples.• List and describe the key technological trends that heighten ethical concerns.• Differentiate between responsibility, accountability, and liability.

2. What specific principles for conduct can be used to guide ethical decisions?

• List and describe the five steps in an ethical analysis.• Identify and describe six ethical principles.

3. Why do contemporary information systems technology and the Internet pose challengesto the protection of individual privacy and intellectual property?

• Define privacy and fair information practices.• Explain how the Internet challenges the protection of individual privacy and intellectual

property. • Explain how informed consent, legislation, industry self-regulation, and technology

tools help protect the individual privacy of Internet users.• List and define the three different regimes that protect intellectual property rights.

4. How have information systems affected everyday life?

• Explain why it is so difficult to hold software services liable for failure or injury.• List and describe the principal causes of system quality problems.• Name and describe four quality-of-life impacts of computers and information systems.• Define and describe technostress and RSI and explain their relationship to information

technology.

Ethical “no free lunch” rule,425

Ethics, 420

Fair Information Practices(FIP), 427

Golden Rule, 425

Immanuel Kant’s CategoricalImperative, 425

Information rights, 421

Informed consent, 428

Intellectual property, 432

Liability, 424

Nonobvious relationshipawareness (NORA), 423

Opt-in, 430

Opt-out, 430

P3P, 431

Patent, 433

Privacy, 426

Profiling, 422

Repetitive stress injury (RSI),432

Responsibility, 424

Risk Aversion Principle, 425

Safe harbor, 429

Spam, 439

Spyware, 430

Technostress, 443

Trade secret, 432

Utilitarian Principle, 425

Web bugs, 430

Accountability, 424

Carpal tunnel syndrome(CTS), 443

Computer abuse, 439

Computer crime, 439

Computer vision syndrome(CVS), 443

Cookies, 429

Copyright, 433

Descartes’ rule of change,425

Digital divide, 442

Digital MillenniumCopyright Act (DMCA), 434

Due process, 424

Key Terms

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 447

Page 34: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

448 Part IV: Building and Managing Systems

Collaboration and Teamwork

Developing a Corporate Ethics CodeWith three or four of your classmates, develop a corporate ethics code on privacy thataddresses both employee privacy and the privacy of customers and users of the corporateWeb site. Be sure to consider e-mail privacy and employer monitoring of worksites, as wellas corporate use of information about employees concerning their off-the-job behavior (e.g., lifestyle, marital arrangements, and so forth). If possible, use Google Sites to postlinks to Web pages, team communication announcements, and work assignments; to brain-storm; and to work collaboratively on project documents. Try to use Google Docs to developyour solution and presentation for the class.

Video Cases

Video Cases and Instructional Videos illustrating some of the concepts in this chapter areavailable. Contact your instructor to access these videos.

Discussion Questions

1. Should producers of software-based ser-vices, such as ATMs, be held liable for eco-nomic injuries suffered when their systemsfail?

2. Should companies be responsible forunemployment caused by their informationsystems? Why or why not?

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 448

Page 35: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Chapter 12: Ethical and Social Issues in Information Systems 449

BUSINESS PROBLEM-SOLVING CASE

Google, Microsoft, and IBM: The Health of Your Medical Records’ Privacy

tors to be sent automatically to Google Health(Google’s online medical record system) or other per-sonal health records systems online. It’s a broad-reaching software platform that will bring data porta-bility and medical records interoperability in directconflict with a huge industry entrenched in siloeddata.

Estimates are that the Health Information Technologyinitiative will create over 200,000 jobs in MIS andsystems, and the 10-year cost is $75–$100 billion. Theproject should pay for itself with an estimated savings of$175–$200 billion a year. The Health InformationTechnology initiative is arguably the largest manage-ment information systems project in the history of theUnited States since the computerization of the SocialSecurity System records in the 1950s. What’s involved isnot just dropping PCs on doctors’ desktops and operat-ing tables. Instead, a massive investment in organizationand management, cultural change, software, andinterface design is required. In short, the skills you learnin this book will be highly valued!

The bad news is that the health of your personalprivacy will probably decline, significantly. You willmost likely lose control over what private medicalinformation about you is distributed, and you will notbe able to restrict its distribution. Your medical recordswill be a very efficient, instantly accessible, “semipublic” document accessible by millions of health careworkers whom you will never meet or know about.And you won’t ever really know who has access toyour records, or understand how they are or might beused.

The health-care industry is notoriously bad at keep-ing medical records private. Georgia Blue-Cross intro-duced a change in its medical information systemwithout testing, and sent thousands of patient recordsto the wrong fax machine in a neighboring state. Aformer billing clerk at Cedars-Sinai Medical Center inLos Angeles was arrested in November 2008 andcharged with stealing patient records and using theidentities to steal from insurers. In 2009, the KaiserPermanente Bellflower Medical Center in Los Angeleswas hit with a $187,500 fine for failing to preventunauthorized access to confidential patient informa-tion—employees were improperly accessing the med-ical records of Nadya Suleman and her eight children.This is the second penalty against the hospital. EvenBritney Spears has not been spared: UCLA MedicalCenter was embarrassed to disclose that employeeshad sifted through the medical files of more than 30

During a typical trip to the doctor, you will see shelvesfull of folders and papers devoted to the storage of med-ical records. Every time you visit, your records are cre-ated or modified, and often duplicate copies are gener-ated throughout the course of a visit to the doctor or ahospital. Take a look at your doctor’s office and chancesare you’ll see a bevy of clerks bent over desks filled withpaper forms, mostly insurance claim documents. Themajority of medical records are currently paper-based,making effective communication and access to therecords difficult: only 8 percent of the nation’s 5,000hospitals and 17 percent of the nation’s 800,000 doctorsuse computerized health care records of any kind.Americans made well over a billion visits to doctors andhospitals over the past year, with each American makingapproximately four visits on average. As a result, thereare millions of paper medical records lining the corridorsof thousands of local medical practices, and for the mostpart, they cannot be systematically examined, and theyare difficult to share.

Now for some good news: the administrative wastecould be largely eliminated by a massive investment in anationwide health care record system based on standard-ized record formats, and the participation of all elementsin the health care provider industry.

The United States spends about $2 trillion on health-care, and about $700 billion or one-third is “waste,”loosely defined as costs that could be shed if the health-care industry followed best practices. This waste is amajor reason why the United States has the highest-costmedical system per capita in the world. Among the manysources of waste are fraud, duplicate tests, unnecessarycare, medical mistakes, administrative inefficiency,redundant paperwork, and a paper-based health recordssystem. The outdated administrative procedures andrecords situation causes an estimated 25 percent of thetotal “waste,” or about $175 billion a year.

There’s more good news about medical records: thenew Obama administration in February 2009 set aside$19 billion to fund a Health Information Technologyprogram as a part of the American Recovery andReinvestment Act of 2009. The goal: computerize allhealth records by 2014. And the major technologycompanies are banding together and offering up solu-tions, responding to the opportunity of billions of dol-lars of government contracts. IBM, Google, Microsoft,and a consortium of medical device makers and othercompanies have formed an alliance to create a softwareplatform that will allow medical data from at-homedevices like glucose meters and blood pressure moni-

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 449

Page 36: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

450 Part IV: Building and Managing Systems

“health profile” for medications, conditions, andallergies; reminder messages for prescription refills ordoctor visits; directories for nearby doctors; and person-alized health advice. The application will also be able toaccept information from many different record keepingtechnologies currently in use by hospitals and otherinstitutions. The intent of the system is to make patients’records easily accessible and more complete and tostreamline record keeping.

Google has proven that it is very good at what it does.It is, among other things, one of the largest advertisingfirms in the world, and the largest Web tracker ofindividuals in the United States. But what if Googlewere seeking personal information about you? Youmight not feel as good about Google’s quest to organizethe world’s information when you consider that some ofthat information is information you’d prefer remain pri-vate. Google’s development of its Google Health appli-cation illustrates the conflict between its self-avowed mission and the individual’s right to privacy.Would you trust Google with your health records know-ing that a potential employer, or current employer, mightbe able to access those records?

Proponents of electronic health records argue thatcomputer technology, once fully implemented, wouldenhance security rather than threaten it. They alsobelieve that it is more important to first get the systemup and running than to worry about privacy matters.Congressional Representative Joe Barton of Texas, anadvocate of legislation that would speed the develop-ment of such records, said that “privacy is an importantissue, but more important is that we get a healthinformation system in place.” Lawmakers like Bartonfeel that the benefits of systems like Google Healthoutweigh the privacy risks, and that further legislationto impose privacy controls can be added after the fact.Some experts disagree with that stance, saying thatunless an electronic system has sufficient privacycontrols from the outset, it is less likely to becomeuniversally used. Even if the system’s security controlsare sufficient, it is important that consumers are awareof those controls and confident that they can use thesystem without fear of their records being accessed byunauthorized parties. Creating an electronic healthsystem without the proper security controls would notonly be an unacceptable privacy risk, but would bedoomed to failure because potential users would beunwilling to cooperate with the informationrequirements of the system.

Google is not the only company to set its sights ononline medical records. Microsoft and Revolution HealthGroup LLC, founded by AOL co-founder Steve Case,among others, are also launching similar sites whereusers can maintain online health profiles. As of yet it istoo early to tell whether any of these ventures will be

celebrities, including singer Britney Spears, actressFarah Fawcett, and California First Lady MariaShriver. There are occasional horror stories like thoseof Patricia Galvin that reinforce the worries many peo-ple have about the privacy of their medical records.Galvin attempted to acquire disability benefits for herchronic back pain but was turned down on the basis ofher psychologist’s notes, which were supposed to beconfidential. The number of monthly medical privacycomplaints received by the Department of Health andHuman Services has been steadily approaching 750per month over the past several years, up from 150 in2003. People fear that a switch to electronic medicalrecords could be even more vulnerable to securitybreaches and privacy violations.

Privacy advocacy group Privacyrights.org documented248 serious personal data record breaches in 2009, andabout 24 percent of those involved medical serviceproviders—doctors, hospitals, and insurance companies.In October 2009, the New York Times published a tableillustrating 32 different groups who have “legitimate”access to your medical records, a staggering array ofdoctors, business associates, government agencies, anddata miners (including pharmaceutical companies andtheir sales staffs). It is conceivable that over a millionpeople have direct access to medical records throughoutthe United States.

These privacy concerns are far from unfounded.HIPAA—the Health Insurance Portability andAccountability Act of 1996—provides very limitedprotections for personal medical records. HIPAA basi-cally legitimizes rather than constrains the near unlim-ited flow of information between healthcare providers,health insurers, and clearinghouses for payment process-ing. HIPAA makes it all legal and then asks you to signoff on it as a condition of receiving medical treatment!There are no federal privacy protections for patients whoset up personal health records online, say at Google orother Web sites offering medical record services. Evenhospitals and practices that currently use electronicstorage formats report a high incidence of securitybreaches, with a quarter of healthcare technologyprofessionals reporting at least one security breach in thepast year. According to a 2006 Federal TradeCommission study, about 249,000 Americans had theirpersonal information misused for the purpose ofobtaining medical treatment, supplies, or services.

Google has put itself center stage in the health recordsarena. In March 2008, Google announced an applicationthat it hopes will alleviate the inefficiency of the currentmedical record storage system: Google Health. Google Health will allow consumers to enter their basicmedical data into an online repository and invite doctorsto send relevant information to Google electronically.The service is free to users. Features will include a

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 450

Page 37: Editorial Director: Sally Yagan Art Director: Steve Frim ... · Copyright © 2011, 2009, 2007 Pearson Education, Inc., ... by Copyright, and permission ... Upper Saddle River, New

Chapter 12: Ethical and Social Issues in Information Systems 451

successful in the long term. The federal office in chargeof creating a national network of electronic healthrecords, the Office of the Coordinator of HealthInformation Technology, announced in March of 2008that it plans to integrate its system with both Google andMicrosoft’s healthcare databases, among others.

One way or another, private industry and governmentwill likely move forward slowly towards a nationalmedical record information system. The ethical andmoral dilemma posed by this national system involvesan inherent conflict between two closely held values:medical care efficiency and effectiveness versus theprivacy of your personal medical information.

Sources: Amalia R. Miller and Catherine E. Tucker, “Electronic Discovery andElectronic Medical Records: Does the Threat of Litigation Affect Firm Decisions toAdopt Technology?” FTC Seminar, April 27, 2009; Natasha Singer, “When 2+2 EqualsA Privacy Question,” The New York Times, October 18, 2009. David Pogue.“Computerized Health Records,” The New York Times, October 15, 2009; and ReutersNews. “Healthcare In the U.S. Wastes Up to $800 Billion A Year,” The New York Times,October 26, 2009.

Case Study Questions

1. What concepts in the chapter are illustrated in thiscase? Who are the stakeholders in this case?

2. What are the problems with America’s current med-ical record keeping system? How would electronicmedical records alleviate these problems?

3. What management, organization, and technology fac-tors are most critical to the creation and developmentof electronic medical records?

4. What are the pros and cons of electronic patientrecords? Do you think the concerns over digitizingour medical records are valid? Why or why not?

5. Should people entrust Google with their electronicmedical records? Why or why not?

6. If you were in charge of designing an electronic med-ical record keeping system, what are some featuresyou would include? What are features you wouldavoid?

Ess9_Ch_12.qxd 11/18/2009 3:33 PM Page 451