+ All Categories
Home > Documents > Privacy & Ethics

Privacy & Ethics

Date post: 30-Dec-2021
Category:
Upload: others
View: 5 times
Download: 3 times
Share this document with a friend
20
Privacy & Ethics Chapter 9
Transcript
Page 1: Privacy & Ethics

Privacy & EthicsChapter 9

Page 2: Privacy & Ethics

Bélanger, Van Slyke, Crossler © Prospect Press 2018 2

Page 3: Privacy & Ethics

What is your

definition of ethics?

Ethics – The principles and standards that guide our behavior toward other people

Page 4: Privacy & Ethics

INFORMATION ETHICS

• Govern the ethical and moral issues arising from the development and use of information technologies,

as well as the creation, collection, duplication, distribution of data

Page 5: Privacy & Ethics

INFORMATION ETHICS

• Business issues related to information ethics

• Intellectual property

• Copyright

• Pirated software

• Counterfeit software

• Digital rights management

Page 6: Privacy & Ethics

INFORMATION ETHICS

• Individual impact:

• Individuals copy, use , and distribute software

• Search organizational databases for sensitive and

personal information

• Individuals create and spread viruses

• Individuals hack into computer systems to steal

information

• Employees destroy and steal information

Page 7: Privacy & Ethics

Information Does Not Have Ethics,

People Do

• Information does not care how it is used, it

will not stop itself from sending spam,

viruses, or highly-sensitive information

• Tools to prevent information misuse

• Information governance

• Information compliance

Page 8: Privacy & Ethics

Ethical Computer Use Policy

•Contains general

principles to guide

computer user

behavior

Page 9: Privacy & Ethics

Acceptable Use Policy

• Acceptable use policy (AUP) – Requires a

user to agree to follow it to be provided access

to corporate email, information systems, and

the Internet

Page 10: Privacy & Ethics

Consequences of Privacy Violations:

Identity Theft

• Using someone else’s personal information for your own personal gain (Javelin Strategy & Research Center)

• 165 million identity theft victims in 2019 in the United States

• Low-tech methods for steHighest Group – 30 to 39 year old

• aling personal information are still popular

9-10

Page 11: Privacy & Ethics

Email Privacy Policy

• Organizations can mitigate the risks of email and

instant messaging communication tools by

implementing and adhering to an email privacy policy

• Email privacy policy – Details the extent to which

email messages may be read by others

Page 12: Privacy & Ethics

WORKPLACE MONITORING

POLICY

• Common monitoring technologies include:

• Key logger or key trapper software

• Hardware key logger

• Cookie

• Adware

• Spyware

• Web log

• Clickstream

Page 13: Privacy & Ethics

Decision Making

Chapter 6

13

Page 14: Privacy & Ethics

Various types of Information

Systems help with decision

making and problem solving

For many business school graduates the

first job will be problem solving jobs and

not necessarily management

Page 15: Privacy & Ethics

MAKING BUSINESS

DECISIONS

• Managerial decision-making challenges

• Analyze large amounts of information

• Apply sophisticated analysis techniques

• Make decisions quickly

Page 16: Privacy & Ethics

Types of DecisionsOperational control Managerial control Strategic planning

Structured Accounting systems

(accounts

payable/receivable),

order processing,

inventory control,

order processing

Human resources

reporting, short-

term forecasting

Investment analysis,

distribution system

analysis

Semi-structured Production planning Budget variance

analysis

Compensation

planning,

Unstructured Cash management,

project management

Budget preparation,

sales planning

New product

planning, social

responsibility

planning

6-16Table 6.1 – Gorry and Scott-Morton’s Information Systems Framework

Page 17: Privacy & Ethics

SUPPORT: ENHANCING

DECISION MAKING WITH MIS

Types of Decision Making MIS Systems

Page 18: Privacy & Ethics

Decision Support System generally

combine internal / external sources

Database

with

TPS

Data

Budget Data

Management

Information

System

External

Databases

Modeling

Techniques

User Input

Dialog

Decision Support System

Goal of DSS:

Solve a problem

Page 19: Privacy & Ethics

Modeling Techniques in DSS

Model Type Description Software

Financial Provide IRR on a project Spreadsheets

Statistical Trend projections Spreadsheets or

SPSS/SAS

Graphical Trends in a visual manner Spreadsheets or

Presentation Software

Project Management Time lines, critical paths MS Project or similar

Page 20: Privacy & Ethics

DSS versus MIS

Factor DSS MIS

Problem Type Unstructured , cannot be

easily programmed,

preparations for a hurricane

Structured Problems

order quantity

Users College grads

Upper management

Operations / front line

College grads

Emphasis Making a decision Information Providing

Development Users are part of the

development

Provided by others


Recommended