Chapter 5 - Repository UNIKOM

  

Socially Conscionable Citizens

Socially Conscionable Citizens

   Morals

  Morals

  • – Traditions of right and wrong

  Traditions of right and wrong 

  Ethics Ethics

  • – Suite of guiding beliefs, standards, or ideals that

  Suite of guiding beliefs, standards, or ideals that promote an individual or community promote an individual or community

   Laws

  Laws

  • – Formal rules of conduct that a sovereign

  Formal rules of conduct that a sovereign authority imposes on its citizens authority imposes on its citizens

  

Pirated Software

Pirated Software

  

  Software that is illegally copied and then Software that is illegally copied and then used or sold used or sold

  • – 35% in U.S.

  35% in U.S.

  • – 92% in Japan

  92% in Japan

  • – 99% in Thailand

  99% in Thailand

  

  Some cultures encourage sharing Some cultures encourage sharing

  

Laws Lag Behind

Laws Lag Behind

   First computer crime

  First computer crime

  • – In 1966, a programmer used computer code to keep

  In 1966, a programmer used computer code to keep his checking account from being flagged as his checking account from being flagged as overdrawn. overdrawn.

  • – When the bank discovered the crime the

  When the bank discovered the crime the programmer could not be charged with a computer programmer could not be charged with a computer

crime because no computer crime law existed.

crime because no computer crime law existed.

  • – He was charged with making false bank records.

  

He was charged with making false bank records.

  

U.S. Computer Legislation

U.S. Computer Legislation

   Freedom of Information Act of 1966

  Freedom of Information Act of 1966

  • Gave citizens and organizations the right to

  

Gave citizens and organizations the right to

access data held by the federal government

access data held by the federal government

   Fair Credit Reporting Act of 1970

  Fair Credit Reporting Act of 1970

  • – Dealt with handling of credit data

  Dealt with handling of credit data 

  Right to Federal Privacy Act of 1978 Right to Federal Privacy Act of 1978

  • – Limited government’s ability to search bank

  

Limited government’s ability to search bank

records records

  

U.S. Computer Legislation (cont.)

U.S. Computer Legislation (cont.)

   Small Business Computer Security and

  Small Business Computer Security and Education Act (1984)

  Education Act (1984)

  • – Advises Congress on matters relating to computer

  Advises Congress on matters relating to computer crime against small businesses crime against small businesses

   Counterfeit Access Device and Computer Fraud

  Counterfeit Access Device and Computer Fraud and Abuse Act and Abuse Act

  • – Makes it a crime to gain unauthorized information

  Makes it a crime to gain unauthorized information pertaining to national security or foreign relations pertaining to national security or foreign relations and provides other protection and provides other protection

  

U.S. Computer Legislation (cont.)

U.S. Computer Legislation (cont.)

   In 1986, Electronic Communications Privacy

  In 1986, Electronic Communications Privacy

Act was rewritten to cover digital, data, and

  

Act was rewritten to cover digital, data, and

video communications video communications

  • – Included special section on email

  Included special section on email 

  Computer Matching and Privacy Act of 1988 Computer Matching and Privacy Act of 1988

  • – Restricts government’s right to match computer

  Restricts government’s right to match computer files for the purpose of determining eligibility for files for the purpose of determining eligibility for

government programs or identifying debtors

government programs or identifying debtors

  

Imposing an Ethics Culture

Imposing an Ethics Culture

  

  Corporate credo Corporate credo

  • – Succinct statement of values a firm seeks to uphold

  Succinct statement of values a firm seeks to uphold

  Ethics programs Ethics programs

  • System of multiple activities designed to provide

  

System of multiple activities designed to provide

employees with direction in carrying out corporate

employees with direction in carrying out corporate

credo

   credo

  Tailored corporate codes Tailored corporate codes

  • – Codes of ethics for a particular organization or

  Codes of ethics for a particular organization or industry industry

  

Top-level Management

Imposes the Ethics Culture

In a Top-down Manner

  

1 Establish

.

corporate

credo

An Ethics Culture

2. Establish

ethics

programs

  

3. Establish

corporate Example of a Corporate Credo Example of a Corporate Credo

  Commitment to customer: The first commitment is to provide our customers with quality products and services that are innovative and technologically responsive to their current requirements

at appropriate prices. To perform these tasks with integrity

requires that we maintain confidentiality and protect customer privacy, promote customer satisfaction, and serve customer needs. We strive to serve qualified customers and industries that are socially responsible according to broadly accepted community and company standards.

  

Ethics Audit

Ethics Audit

  

  Internal auditor meets with a manager for Internal auditor meets with a manager for the purpose of learning how the manager’s the purpose of learning how the manager’s unit is carrying out the corporate credo unit is carrying out the corporate credo

  

Computer Ethics

Computer Ethics

  

  Analysis of the nature and social impact of Analysis of the nature and social impact of computer technology as well as computer technology as well as corresponding formulation and justification corresponding formulation and justification of policies for the ethical use of such of policies for the ethical use of such technology technology

  

Responsibility for

Responsibility for

  

Computer Ethics

Computer Ethics

  

  CIO holds primary responsibility CIO holds primary responsibility

  

  CIO Must: CIO Must:

  • – Be aware of how the computer is affecting

  Be aware of how the computer is affecting society society

  • – Do something about this by formulating

  Do something about this by formulating policies to ensure technology is being used in policies to ensure technology is being used in the right way the right way

   Logical malleability

  

Importance of Computer Ethics

Importance of Computer Ethics

  Logical malleability

  • – Ability to program computer to do anything you want it

  Ability to program computer to do anything you want it to do

   to do The transformation factor

  The transformation factor

  • – Computers can change the way things are done

  Computers can change the way things are done The invisibility factor

  The invisibility factor

  • – Invisible programming

  Invisible programming

  • – Invisible complex calculations

  Invisible complex calculations

  • – Invisible abuse

  Invisible abuse

  Rights to the Computer Rights to the Computer

  

  Right to computer access Right to computer access

  

  Right to computer skills Right to computer skills

  

  Right to computer specialists Right to computer specialists

  

  Right to computer decision making Right to computer decision making

  Rights to Information Rights to Information

  

  Right to privacy Right to privacy

  

  Right to accuracy Right to accuracy

  

  Right to property Right to property

  

  Right to access Right to access

  

Social Contract of IS

Social Contract of IS

  • The computer will not be used to unduly invade a

  The computer will not be used to unduly invade a person’s privacy person’s privacy

  • Every measure will be taken to ensure the

  Every measure will be taken to ensure the accuracy of computer processing accuracy of computer processing

  • The sanctity of intellectual property will be

  The sanctity of intellectual property will be protected protected

  • The computer will be made accessible to society

  The computer will be made accessible to society so that its members can avoid the indignities of so that its members can avoid the indignities of information illiteracy and deprivation information illiteracy and deprivation

  

Ethics and the CIO

Ethics and the CIO

  

  Perceptions of the CIO’s Ethics Perceptions of the CIO’s Ethics

  • – Do not take advantage of opportunities to act

  Do not take advantage of opportunities to act unethically unethically

  • – Ethics breeds success

  Ethics breeds success

  • – Firms and managers have social responsibilities

  Firms and managers have social responsibilities

  • – Managers back up their ethics beliefs with

  Managers back up their ethics beliefs with action action

  The CIO is Influenced by a The CIO is Influenced by a

  Hierarchy of Factors Hierarchy of Factors

  Laws Laws Corporate Corporate ethics culture ethics culture Professional Professional codes of ethics codes of ethics

  Office of pressure pressure Social Social the pressures pressures Personal Personal CIO CIOs Usually Do Not Act CIOs Usually Do Not Act

  Unethically Unethically

  

Question Agree Disagree

There are many opportunities for 47.5 37.7 MIS managers in my company to engage in unethical behavior.

  MIS managers in my company 19.7 80.3 engage in behaviors that I consider to be unethical.

  Ethics and Success Ethics and Success

  Percent Percent Percent Percent Question Question Agree Agree Disagree Disagree Successful MIS managers in my company are Successful MIS managers in my company are generally more ethical than unsuccessful generally more ethical than unsuccessful managers. managers. 73.8 13.1 73.8 13.1 In order to succeed in my company it is In order to succeed in my company it is often necessary to compromise one's ethics. often necessary to compromise one's ethics. 18.0 75.4 18.0 75.4 Successful managers in my company withhold Successful managers in my company withhold information that is detrimental to their information that is detrimental to their self-interest. self-interest. 21.3 50.8 21.3 50.8

  Ethics (cont.) Ethics (cont.) Percent Percent Percent Percent

  Question Question Agree Agree Disagree Disagree Successful managers in my company make Successful managers in my company make rivals look bad in the eyes of important rivals look bad in the eyes of important people in my company. people in my company. 23.0 59.0 23.0 59.0 Successful managers in my company look for Successful managers in my company look for a scapegoat when they feel they may be a scapegoat when they feel they may be associated with failure. associated with failure. 23.0 67.2 23.0 67.2 Successful managers in my company take Successful managers in my company take credit for the ideas and accomplishments credit for the ideas and accomplishments

  Corporate Social Responsibility Corporate Social Responsibility Percent Percent Percent Percent

  Question Question Agree Agree Disagree Disagree The socially responsible manager must The socially responsible manager must occasionally place the interests of society occasionally place the interests of society over the interests of the company. over the interests of the company.

  68.9 21.3 68.9 21.3 The fact that corporations have great The fact that corporations have great economic power in our society means that they economic power in our society means that they have a social responsibility beyond the have a social responsibility beyond the interests of the shareholders. interests of the shareholders. 96.7 3.3

  96.7 3.3 As long as corporations generate acceptable As long as corporations generate acceptable shareholder returns, managers have a social shareholder returns, managers have a social responsibility beyond the interests of responsibility beyond the interests of Achieving an Ethical Achieving an Ethical

  Computer Operation Computer Operation 1. Formulate a code of conduct.

  1. Formulate a code of conduct.

  2. Establish rules of procedure relating to such

  2. Establish rules of procedure relating to such issues as personal use of computer services and issues as personal use of computer services and proprietary rights to computer programs and data. proprietary rights to computer programs and data.

  3. Make clear the sanctions that will be taken

  3. Make clear the sanctions that will be taken against offenders-such as reprimands, against offenders-such as reprimands, termination, and civil action. termination, and civil action.

  4. Recognize ethical behavior.

  4. Recognize ethical behavior.

  

Achieving an Ethical

Achieving an Ethical

  

Computer Operation (cont.)

Computer Operation (cont.)

  5. Focus attention on ethics by means of such

  5. Focus attention on ethics by means of such programs as training sessions and required reading.

programs as training sessions and required reading.

  6. Promote computer crime laws by keeping

  6. Promote computer crime laws by keeping employees informed. employees informed.

  7. Keep a formal record that establishes accountability

  7. Keep a formal record that establishes accountability

of each information specialist for her or his actions,

of each information specialist for her or his actions,

and also minimizes the temptations for violations and also minimizes the temptations for violations by means of such programs as ethics audits. by means of such programs as ethics audits.

  

Achieving an Ethical

Achieving an Ethical

  

Computer Operation (cont.)

Computer Operation (cont.)

  8. Encourage the use of rehabilitation programs that

  8. Encourage the use of rehabilitation programs that treat ethics violators in the same way that treat ethics violators in the same way that corporations show concern for the recovery of corporations show concern for the recovery of alcoholics or drug offenders. alcoholics or drug offenders.

  9. Encourage participation in professional societies.

  9. Encourage participation in professional societies.

  10. Set an example.

  10. Set an example.

  

Ethics Perspective

Ethics Perspective

  

  Severe social problems exist because Severe social problems exist because government and business organizations government and business organizations have failed to uphold the highest ethical have failed to uphold the highest ethical standards in computer use standards in computer use

  • – Invasion of privacy

  Invasion of privacy

  • – Software piracy

  Software piracy

  

  CIOs can make a difference CIOs can make a difference

  An Information Services An Information Services

  Code of Conduct Code of Conduct

  

  Conduct all activities in a manner that Conduct all activities in a manner that precludes any form of dishonesty precludes any form of dishonesty

  

  Avoid any act that compromises integrity Avoid any act that compromises integrity

  

  Avoid any act that might create a dangerous Avoid any act that might create a dangerous situation situation

  

  Not use alcohol or drugs while at work Not use alcohol or drugs while at work

  An Information Services An Information Services

  Code of Conduct (cont.) Code of Conduct (cont.)

  

  Maintain courteous and professional Maintain courteous and professional relations with users, associates, and relations with users, associates, and supervisors supervisors

  

  Adhere to the no-solicitation rule and any Adhere to the no-solicitation rule and any other employment policy other employment policy

  An Information Services An Information Services

  Code of Conduct (cont.) Code of Conduct (cont.)

  

  Protect confidentiality of sensitive Protect confidentiality of sensitive information about the organization’s information about the organization’s competitive position, trade secrets, or assets competitive position, trade secrets, or assets

  

  Exercise sound business practice in the Exercise sound business practice in the management of such company resources management of such company resources such as personnel, computer use, outside such as personnel, computer use, outside services, travel, and entertainment services, travel, and entertainment

  

Summary

Summary

  

  Morals, laws, and ethics govern behavior Morals, laws, and ethics govern behavior

  

  Early years Early years

  • – No computer laws

  No computer laws

  • – Easy to bypass regulation

  Easy to bypass regulation

  

  Executives impose ethical culture Executives impose ethical culture

  

  Computer ethics require executive to put Computer ethics require executive to put proper policies in place proper policies in place

  

Summary [cont.]

Summary [cont.]

  

  Society places importance on computer Society places importance on computer ethics ethics

  • – Logical malleability

  Logical malleability

  • – Transforming ways of living

  Transforming ways of living

  • – Processes are hidden from view

  Processes are hidden from view

  

  Societal rights in relation to the computer Societal rights in relation to the computer