Lauden Chapter 4
Lauden Chapter 4
1. What concepts in the chapter are illustrated in this case? What ethical issues are raised by radiation
technology?
Answer:
First identify the concepts in the chapter that are relevant to this case and reasons why.
Concepts:
• Accessibility
• Liability
• Control
It is important to know who exactly is at fault for radiation-related accidents. In most cases the blame
can be easily placed on the medical technicians who failed to notice or report error messages in the
software. A hospital’s IT unit can also be held accountable for not taking appropriate action in updating
the software. The software producers themselves can also be held accountable for not properly testing
and debugging the system.
Next identify the ethical issues raised by radiation technology and explain why.
Ethical issues:
• Reporting error messages on the screens
• Proper training of medical technicians
Error messages on the screens:
• This careless behavior should not have been overlooked and instead should have been reported.
• When dealing with something as serious as radiation therapy, the system should be double-checked to
make sure the correct dosages of radiation are used in the treatment.
Proper training:
• The hospital may not have properly trained the medical technicians to properly handle problems.
• May be due to a lack of budget in this area.
• Some systems are not checked until there is a reason to check them.
• The organization needs to have a reasonable budget towards the training of the medical technicians
and the maintenance of the systems.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
2. What management, organization, and technology factors were responsible for the problems
detailed in this case? Explain the role of each.
Answer:
Identify and list the factors for management, organization, and technology. Then explain how each
factor played a role in its respective area.
Management Factors:
• Staff did not have enough training
• No system to inspect equipment
Role:
• Ms. Kalach tested the equipment after Jerome-Parks’s third treatment. Tests should have been run
before the equipment was used.
• Medical technicians failed to notice errors in the linear accelerator’s software in Jn-Charles’s case.
• The technicians should have been better trained to make sure all errors are seen and properly
handled.
Organization Factors:
• Accountability
• No form of reporting system
Role:
• There is no existence of an agency that collects nationwide data related to radiation incidents.
• Some states do not require such accidents to be reported.
• In states that do require such accidents to be reported, hospitals don’t want to report their accidents.
• Reporting these accidents will frighten future patients and hospitals don’t want to be held accountable
for that.
Technology Factors:
• Errors in software
• Necessary updating of software
• Training someone to use the equipment
Role:
• A computer error caused Scott Jerome-Parks to receive abundant dosages of radiation.
• In Jn-Charles’s case, the linear accelerator wasn’t commanded to insert the wedge. This needed to be
programmed to do so.
• In both cases, the technicians failed to notice errors and continued to give radiation therapy.
• They should have been properly trained to use the equipment only after all possible errors are taken
care of and the correct dosage is given to the patient.
3. Do you feel that any of the groups involved with this issue (hospital administrators, technicians,
medical equipment and software manufacturers) should accept the majority of the blame for these
incidents? Why or why not?
Answer:
First identify the ways in which issues with radiation technology arise. Then explain why each of the
groups involved should or should not take the blame.
Ways in which issues arise:
Lauden Chapter 4 Ethical and Social Issues in Information Systems
4. How would a central reporting agency that gathered data on radiation-related accidents help
reduce the number of radiation therapy errors in the future?
Answer:
First identify the advantages of having a central reporting agency.
Advantages of having a central reporting agency:
• All information is in one place
• Accountability
• Ability to clearly analyze data
Then explain how each advantage can help reduce the number of radiation therapy errors in the future.
All information is in one place:
• Gathered data can be found in one place through the agency.
• This allows data to be gathered from numerous hospitals or clinics.
• Data can be organized into a database so that it is easier to see when a certain piece of equipment was
last inspected.
Accountability:
Lauden Chapter 4 Ethical and Social Issues in Information Systems
• A person or group of persons can be put in charge of the radiation equipment for a certain number of
hospitals.
• This gives accountability to someone in a higher position rather than relying on medical technicians
who may be inexperienced with the equipment.
• Inspections can be done on a bi-weekly basis to ensure that the equipment is performing as expected.
• The person in charge can gather the data, update it in the database, and pass on a report to his
supervisor.
Ability to clearly analyze data:
• If all the data is in one collective place, it is easier to see which pieces of equipment were most
recently inspected.
• A central reporting agency will also be able to see if a certain piece of equipment has a history of
malfunctions.
• The age and history of the equipment can be monitored.
• This makes it easier to pinpoint what areas need to be addressed and whether or not a replacement
machine is necessary for a hospital.
5. If you were in charge of designing electronic software for a linear accelerator, what are some
features you would include? Are there any features you would avoid?
Answer:
Identify and explain the features that should be included. Then do the same for the features that should
be avoided.
Features to include:
• Equipment software should come with a checklist of necessary procedures to perform before the
actual treatment.
• This would make it more user-friendly for the technicians.
• Also, the software should prevent technician from proceeding with the treatment until the checklist is
fully checked off.
• The software should be programmed so that if radiation levels become too high, a flag in the software
is turned on and this would signal the machine to turn off or stall the treatment.
• This flag would be a signal for the technician and serve as a reminder that the linear accelerator needs
to be inspected.
• A feature that sends a report to the software company whenever a crash occurs would help in the
company and hospital coming together to resolve the issue and any future issues.
Features to avoid:
• It wouldn’t be wise to have an accelerator that can’t be stopped once the therapy is finished.
• The equipment should be able to be automatically or manually turned off in case something goes
wrong with the radiation dosages.
• Simple error messages should be avoided.
• If a technician mistakes the error message for something else, they can click out of the error message
and continue with the treatment as if nothing even happened.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
1. What are some of the arguments for and against the use of digital media?
2. How might the brain affected by constant digital media usage?
3. Do you think these arguments outweigh the positives of digital media usage? Why or why not?
4. What additional concerns are there for children using digital media? Should children under 8 use
computers and cellphones? Why or why not?
1. What are some of the arguments for and against the use of digital media?
Answer:
Identify the arguments for and against the use of digital media and explain.
Arguments for digital media:
• Digital media is effective at developing visual processing ability.
• Allows people to multitask, handle numerous activities at once.
• More information can be accessed through digital media.
• Collaboration is easier and more versatile.
• Information is easily accessible through many platforms of technology such as a laptop or smartphone.
Arguments against digital media:
• Research suggests that digital media takes away one’s ability to think deeply and retain information.
• Multitasking decreases one’s awareness level and those identified as multitaskers are poor at
multitasking.
• Some say that the quality of media has diminished.
• The brain adapts in such a way that multitaskers become dependent on the excitement they
experience from multitasking.
While the arguments for digital media show that information access and collaboration is easier, the
arguments against digital media suggest that individuals are becoming more dependent on technology
which causes their cognitive skills to diminish.
• Research suggests that the quality of decision making most likely diminishes as the quantity of digital
information increases.
• This results in the loss of a person’s critical thinking ability because of the remodeling of their brain.
• A person in a high position may become affected by constant digital media usage and make a decision
that harms the company.
• Such harmful decisions can’t be afforded so digital media usage should be limited.
Affects children’s ability to learn:
• Children may be harmed more by constant digital media usage than adults.
• Children’s brains are still in the developing stages so they are more susceptible to prioritizing and
resisting impulses.
• A child whose brain is remodeled will cause him to become more easily distracted in the classroom.
• Distractions in the classroom will decrease the amount of knowledge gained and will result in poor test
results and grades.
3. Do you think these arguments outweigh the positives of digital media usage? Why or why not?
Answer:
Give a list of the arguments for and against digital media usage.
Arguments for digital media:
• Digital media is effective at developing visual processing ability.
• Allows people to multitask, handle numerous activities at once.
• More information can be accessed through digital media.
• Collaboration is easier and more versatile.
• Information is easily accessible through many platforms of technology such as a laptop or smartphone.
Arguments against digital media:
• Research suggests that digital media takes away one’s ability to think deeply and retain information.
• Multitasking decreases one’s awareness level and those identified as multitaskers are poor at
multitasking.
• Some say that the quality of media has diminished.
• The brain adapts in such a way that multitaskers become dependent on the excitement they
experience from multitasking.
Then explain both sides as to whether or not the arguments against digital media usage outweigh the
arguments for it.
Why the negatives outweigh the positives:
• Cognitive skills are very important for an individual to succeed and thrive in today’s world.
• Multitasking with digital media can lead to avoidable accidents especially related to automobiles.
• People are willing to make sacrifices in order have a better quality of media.
• A very small group of multitaskers are actually able to successfully manage many streams of
information at once.
Why the negatives don’t outweigh the positives:
• Better ways can be implemented in order for a person to use digital media and not be negatively
affected by it.
• With proper guidance, multitasking allows for a person to get more work done and become an
efficient employee.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
• Companies can grow more rapidly if more and more work can be done in the same amount of time as
before.
• Adults are responsible for their amount of digital media usage and are able to reduce their usage if
they choose to do so.
4. What additional concerns are there for children using digital media? Should children under 8 use
computers and cellphones? Why or why not?
Answer:
Identify and list other concerns for children using digital media and give reasoning behind the concerns.
Concerns for children using digital media:
• Ease of access to information
• Radiation emissions
While ease of access to information may seem like a positive thing, it can work against a child due to the
increasing amount of explicit material on the Internet.
Radiation emissions from smartphones and other cellular phones can result in brain damage. Since a
child’s brain isn’t fully developed, brain damage for a child would be more harmful compared to an
adult.
Identify and explain ways for why children under 8 should use computers and cellphones and also
identify and explain ways why it wouldn’t be a good idea.
Why it is a good idea:
• Technology is a strong force in the education system.
• Computer usage should be limited for children rather than having it completely banned.
• Some forms of digital media can enhance the knowledge a child gains through interactive lessons on a
computer.
• More projects and assignments today rely on the ability to use word processors and other forms of
digital media such as PowerPoint and e-mail.
Why it isn’t a good idea:
• Cellular phones do not seem necessary for children under 8 rather they would just be an accessory.
• At this stage of a child’s life, there would be no purpose for a cellphone other than for communication
with a parent.
• Not allowing cellphones would ensure that a child’s brain isn’t affected by radiation emissions.
• Children would spend a lot of their time glued to a computer or cellphone rather than playing and
exercising outside.
1. Which of the five moral dimensions of information systems identified in this text is involved in this
case?
Answer:
Information Rights and Obligations
The first of five (5) different pieces of the model that comes up is information rights and obligations.
Note that this one is a little bit tricky to handle because this one is a slippery slope with respect to what
information is private and what can be used when dealing with texting at the wheel.
Note that the information that is needed for a trial or investigation can be difficult to get because it is
noted that there are billions of messages that are sent on a daily basis and over 800 billion just in 2008
alone. Search warrants and affidavits would have to be carried out in order to gain access to the data
and that can be a lengthy process to go through. Additionally, it may not just be texting that would have
to be sought after. It may be keystrokes or conversations that are on the telephone as well.
If one chooses this option, the challenge that they would have here is to apply it to cases where there
was a fatality, injury, or property damage.
Property Rights and Obligations
The second one of five (5) different pieces of the model that comes up is property rights and obligations.
As mentioned in the text, there is/was legislation that is trying to get passed to completely prohibit
having cellular devices (phones included) in vehicles. Note that this is unlikely to pass because persons
feel that the government oversteps their boundaries stating what one can and cannot have in their
private property (this being the vehicle). Additionally, it can be looked at as an invasion of privacy if one
is not careful. Though this one may not be the best one to choose, this is an even harder one to prove
but can be done if the right angle is chosen.
Comment
Accountability, Liability, and Control
Right in the middle of the pieces that make up the pack is the fact that there should be accountability,
liability, and control. With this part of the five (5) moral principles that are presented, this may be one
that would have some traction and grounding because drivers those are texting and fiddling with their
devices surely must be accountable for their actions.
However, this can be expanded further to the cell phone companies that supply the phones, the
companies that are doing the plans, and any accessory makers that have some tie in with the said
device. Liabilities may be on all persons' shoulders including these companies should an accident occur.
For example, a person that is injured may sue the party that caused a wreck but the cell phone company
that provided them the device, the company that made the phone, and so on.
Though not as hard to prove as the first two pieces of the moral dimensions mentioned here, this one
would need to be explained very carefully so that it isn't too confusing to see how this can fit in to the
subject of texting and driving.
The only thing that could be said here is that the phones are not working properly and therefore more
attention is paid to trying to get the phone to 'work' while they are operating a vehicle. Heaven forbid,
when they were getting the phone back into an operable state, the driver caused an accident of some
sort. Outside of something like this, this pan of the moral dimensions model shouldn't be used all that
much.
Quality of Life: Equity, Access, and Boundaries
The final part of the model is one that MUST be part of the answer. Cell phone technologies have surely
changed the way that we live, communicate, work, and conduct our lives. As stated, people are more
dependent on technology than ever before and it has led to reduced response times lack of a balance
between work and home, and other things. Relating this to the problem at hand, it is almost a necessity
to have a cell phone in order to survive today. Though there are a number of people out there that don't
have one, it is very difficult to communicate with one another without it. To help prove this point, one
should mention that the use of cell phones has increased 1,000 percent over the last 15 years (1995 to
2010) to well over 300 million devices. Thus, the majority of people with cell phones have driver's
licenses and are apt to drive while texting or at least talking on the phone. A secondary point that could
be said here is that three-quarters (3/4) of all teenagers have a cellular device of some kind and
regularly text and use it.
Thus, as one can see, there is a chance that all five (5) moral dimensions explained in the text can be
argued here as pan of the problem of people driving and texting. However, from the looks of it, two (2)
through four (4) dimensions seem to be the sweet spot here at least from the viewpoint of the solutions
author. Whatever is chosen, the important thing that should be noticeable here is to explain in some
detail how it relates to texting while driving. As long as that is done, this question gets a big thumb up.
2. What are the ethical, social, and political issues raised by this case?
Answer:
Ethical Concerns about the Issues of Texting and Driving
• How much information is too much for the federal, state, and local governments have access to when
it comes to texting and driving?
• While there is a law that is in place, how are public officials like police officers and the like exempt
from it?
o This can be through a casual observation of them texting or talking while at the wheel?
• Related to the article, are teenagers and young people being pursed intentionally for infractions since
they are the most frequent testers?
• Since jurisdictions can subpoena phone records, can that be challenged as an invasion of privacy?
• How can it be enforced when some states make it illegal and others don’t?
Social Concerns about the Issues of Texting and Driving
• One of the biggest concerns that can be mentioned here is that this is an epidemic worse than drugs,
alcohol, murders, and other heinous crimes. Yet, there is little, if anything that is taking place on a
national level which would try to put this concern to some form of peace.
• Does the ability to text while driving lead to other things like lack of attention, in ability to focus,
anxiety, and other related mental impairments or disorders?
Lauden Chapter 4 Ethical and Social Issues in Information Systems
• How much responsibility is out there in the public to combat, rectify, or at least make people aware of
the issue at hand? This is another point that can be made with regards to the social concerns that may
be seen here. Texting and Driving
Political concerns about the issue of Texting and Driving
• One of the most controversial issues that surround this major concern for people on the road is
enforcement. How does one enforce the bans in states that restrict the practice?
• Next on the list is the fact that people feel that the government may be stepping over their bounds
because of legislation that was proposed to make a nationwide ban on texting while driving and/or
prohibiting cell phones in vehicles.
• A final note to mention here is that politicians may skirt the issue during a time of elections because
they want to stay in office and therefore don’t give it is proper due. Though not directly mentioned
here, this is something that has been seen before.
While the answers given were merely from the text and personal experiences, it is recommended that
one come up with a few more original ideas that could be sufficient here. Having at least three (3) for
each concern will not only make one look like a rock star but maybe get a text with a smiley face.
3. Which of the ethical principles described in the text are useful for decision making about texting
while driving?
Answer:
Once this is done, there are six (6) different candidate principals that one could choose from. Shown
below are ones that the solutions author chosen in his opinion and his explanation why:
Golden Rule Principle
This is obviously the one that every student will/should/probably picks here because this is going along
the thought process of common sense more or less. If one is texting while driving, then it is sure to
happen to another person and in truth, this is ‘okay’ to do.
Immanuel Kant’s Categorical Imperative
On the flip side, this principle can be argued that if it is okay for one person to do it, then everyone else
can do it. Rather, if nobody is allowed to do it, such is the same. Pretty much this can be argued as the
premise of the fact that politicians want to ban phones from cars because we could live without them.
Little do they know that it is next to impossible to enforce or control.
Utilitarian Principle
This principle has a lot of traction here because the benefit of banning texting and possibly phones from
driving will lead to lower amounts of traffic deaths, property damage, and the like. It can be assumed
that all would lead to better focus, less depression and anxiety, and so on too.
Ethical ‘No Free Lunch’ Rule
The last one that could fit here quite nicely is one that is definitely anything but odd here because if
someone has created the technologies to text on a phone, he or she would want to get compensated for
it. In this case, this would be police departments countrywide which would want to ‘profit’ from writing
tickets and citations due to texting at the wheel.
While it is true that all six (6) ethical principles mentioned could be applied here, these are ones that the
solutions author thought would be a good fit here. It is up to one to creatively think about the problem
that is at hand here and how it could be tied to the ethical dilemmas that one could face in a situation
like this. As long as that is done, this could be a good problem to present in class.
Review Questions
Lauden Chapter 4 Ethical and Social Issues in Information Systems
1. What ethical, social, and political issues are raised by information systems?
• Explain how ethical, social, and political issues are connected and give some examples.
• List and describe the key technological trends that heighten ethical concerns.
• Differentiate between responsibility, accountability, and liability.
2. What specific principles for conduct can be used to guide ethical decisions?
•List and describe the five steps in an ethical analysis.
• Identify and describe six ethical principles.
3. Why do contemporary information systems technology and the Internet pose challenges to the
protection of individual privacy and intellectual property?
• Define privacy and fair information practices.
• Explain how the Internet challenges the protection of individual privacy and intellectual property.
• Explain how informed consent, legislation, industry self-regulation, and technology tools help protect
the individual privacy of Internet users.
• List and define the three different regimes that protect intellectual property rights.
4. How have information systems affected everyday life?
• Explain why it is so difficult to hold software services liable for failure or injury.
• List and describe the principal causes of system quality problems.
• Name and describe four quality-of-life impacts of computers and information systems.
• Define and describe technostress and RSI and explain their relationship to information technology.
1. What ethical, social, and political issues are raised by information systems?
• Explain how ethical, social, and political issues are connected and give some examples.
• List and describe the key technological trends that heighten ethical concerns.
• Differentiate between responsibility, accountability, and liability.
Answer:
The three concerns just mentioned are closely linked to each other because the authors mention that an
ethical dilemma that one would have is usually closely linked to a political or social issue.
It would take a lot of time for one to develop the social or political side of things, ethical concerns can
develop very quickly.
One example that this could be applied here is the fact that electronic time clocks in most companies
can be manually adjusted to favor an employee which is consistently late. While it is an ethical concern
because this test the lack of integrity the employee putting false time in has, it can sadly be the norm for
the business and the political ramifications makes a whistleblower look like a bad guy and then
potentially get a cold shoulder when a raise or promotion is up for grabs.
The scenarios that can be said here could go on for pages upon pages but the key here is for one to
make sure to tie in the three concerns that were mentioned above in order to get a proper answer.
These are shown for one to see below and a brief impact statement on them:
• Computing power and its capacity doubling every 18 months (part of the concept of Morton's Law of
Technology).
o Impact: This is increasing the dependency of computing technology, information systems, and the like
on businesses and persons alike. This can also raise a lot of ethical concerns as to how much information
is too much.
o Impact: The fear here is that many businesses are now in possession of huge data sources for persons
which can be maintained or used to track a person.
o Impact: Much like mentioned in a case study as part of the previous chapter, social profiling and
individual behaviors can be assumed and developed through the mass amounts of data available to
oneself.
• The technologies of networking continue to evolve at a pace just as fast as technology in itself.
o Impact: The ability to remotely access data is much easier to do both from a personal computer but
mobile technologies as well.
• Responsibility: This is the key element of ethical action. Without someone assuming or taking credit or
blame for something happening, our society would be much farther off when we are now.
• Accountability: This is a feature of an information system and/or social institution because there are
measurable points and items that are in place to track, coach, mentor, or punish a person or group of
people for decisions that are made. These decisions may be ethically based or not depending on the
infraction.
• Liability: These are the consequences that that extend responsibility further into the area of local,
state, and federal law. This permits persons that were wrongfully harm to acquire damages (whether
punitive or civil) through the use of a fair trial and due process.
2. What specific principles for conduct can be used to guide ethical decisions?
• List and describe the five steps in an ethical analysis.
• Identify and describe six ethical principles.
Answer:
Ethical Principles
List and describe in brief the six ethical principles that are mentioned in the text. Note that these can be
used in pan or in portion depending on what the ethical dilemma is. Shown below are there as well as a
brief explanation of them in action:
Lauden Chapter 4 Ethical and Social Issues in Information Systems
o Golden Rule Principle This is obviously the one that every student will/should/probably picks here
because this is going along the thought process of common sense more or less. This states that one
would want to do what they would get back in return.
o Immanuel Kant's Categorical Imperative On the flip side, this principle can be argued that if it is okay
for one person to do it, then everyone else can do it. Rather, if nobody is allowed to do it, such is the
same.
o Descartes' Rule of Change o This principle is a straightforward one because this states that if
something can't be done repeatedly, then it probably isn't the best thing for anyone to do.
o Note that this principle states that if it was still executed, it is still likely to happen but if something
goes wrong, it can go downhill in a hurry.
o Utilitarian Principle This principle has a lot of traction here because the benefit of forgoing something
will result in a greater value to someone or something. o Risk Aversion Principle This is one where one
will be damned if they do and damned if they don't more or less. Here, the goal is to take the path of
least resistance and consequence. o Ethical 'No Free Lunch' Rule o This is when any object that would
related to a specific ethical topic in question is owned by someone else unless there is a declaration that
is mentioned otherwise.
o There is an assumption that there may be compensation required to be given by the creator if
applicable.
3. Why do contemporary information systems technology and the Internet pose challenges to the
protection of individual privacy and intellectual property?
•Define privacy and fair information practices.
• Explain how the Internet challenges the protection of individual privacy and intellectual
property.
• Explain how informed consent, legislation, industry self-regulation, and technology tools
help protect the individual privacy of Internet users.
• List and define the three different regimes that protect intellectual property rights.
Answer
Privacy refers to the claim that individuals can make to heave peace from others, be alone, and free
from the watchful eye (or surveillance) of individuals, companies, or even the government. Shown in the
text are a number of federal privacy laws in the United States that could be used as reference here.
On the other than, a regime called Fair Information Practices (FIP) is a status which was written in the
year 1973 which helps control and govern the use of data and information resources about individuals.
These are guidelines in general which was used for privacy legislation. An extension of this is the
Children's Online Privacy Protection Act (COPPA) which was enacted 25 years later which focuses on the
requirement that parental permission must be in place for websites wanting to collect information for
persons under the age of 13 years old.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
One of the biggest challenges that one can see from the information provided in the text is the ability to
transmit data securely over the Internet from one source to another. As a society, we are more
dependent on the information that is on the internet than ever before and as a result, the chances that
information will get stolen or at least compromised in some way is more likely to happen. This can be
through the use of cookies, web beacons, or worse yet spyware.
A second challenge that individuals more specifically have to face when it comes to one's information
being compromised is the fact that there isn't much in a way of a set plan of attack to try to rectify it.
Though there are laws, rules, and regulations in place, each type of company information could be
comprised from has a different procedure as to how to dispute one's concerns before it is cleared up.
This is especially true for credit card companies, banks, and the like. Having more formal procedures, for
example, could make it easier at an industry level to take care of multiple instances of this happening in
a lot less time and effort.
A final challenge here has to do with the intellectual property. Depending on how severe the case may
be, it may be as simple as an email letting the other person (or firm) to stop using the item without
giving proper credit and//or pay a royalty fee to use it or more complex by filing a lawsuit of a Cease and
Desist Order. Again, there isn't much in the way of a plan of action here which seems to be a common
thread for both this pan of the question and the next one about to be explained.
Informed Consent, Legislation, Industry Self-Regulation, and Technology Tools and Their Application
to Protecting Property Rights
The third pan is an extension of the last where the authors mention four (4) different things with respect
to way that companies (and individuals) can protect the individual privacy of internet users. The best
way to handle this pan of the problem is to define each of the items below and how they can apply to
protecting internet users' privacy. Let's get started with these: -
Informed Consent: This is an agreement that is made by a user and company which all knowledge of the
facts regarding a specific situation (web page use, account sign-up, and the like) are presented and
needed in order for a rational decision to be made.
o Having this in place is done from a legal prospective because this provides limited liability on the part
of the company or companies an internet user partakes in but it also provides them protection as to
what they would get for that specific website or websites. o Usually this is considered an end-user
agreement and is typically pages upon pages long and most people don't take the time and read it
because it may have information in there that they don't realize would be helpful or harmful for them in
a time of distress.
- Legislation: This is a more broad term which refers to the laws, rules, and regulations that are passed
by governing bodies to protect the welfare, safety, and security of its citizens with respect to internet
activities.
o As mentioned in the text, there are a number of different acts, laws, and regulations that protect
consurn er's rights such as the Healthcare Information Portability and Accountability Act (H IPPA) as well
as media company's rights like the Digital Millennium Copyright Act (DM CA).
Lauden Chapter 4 Ethical and Social Issues in Information Systems
- Industry Self-Regulation: This is similar to what was mentioned above with the exception that
companies take it into their own hands to go above and beyond what is required by law to provide
protections to all involved. o Note that this is a result of a lot more media and information being freely
shared on the internet and as of a result, the government can't patrol all traffic on there and it is up to
the companies themselves to pick up the slack. o Note that this is far more informal than legislation but
typically is backed up by it when things get serious and dirty per se.
- Technology Tools: The final pan here is where various tools developed include anti-virus software, Lo-
Jack (a software title which assist with preventing identify theft), spam-blockers, and many other things
to assist with providing a safe browsing environment for all to enjoy.
o Note that the majority of these are paid subscriptions but there are a number that are open source
that are not as strong in most cases as a subscription-based service.
o Other technologies that can be explained here include Websense or Net Nanny which restricts
browsing by category or can be set to a specific time limit. These are common in businesses because the
IT departments want persons to focus on work and not on trivial matters like sports, shopping, or social
media websites.
The authors want one to explain the three (3) regimes of intellectual property rights. These are shown
below with a brief description of them for one to see: -
Trade Secrets: these include any piece of intellectual work (such as a device, process, pattern,
compilation, or the like) that is used for a business purpose and can be deemed confidential or a
competitive advantage over another. These can be considered monopolies over others but is a very
difficult thing to prove.
- Copyrights: This is a statutory grant which protects the creator(s) of intellectual property from having
another copy their work without their written or verbal consent. Usually, this is good for the life of the
copyright holder plus 70 years' time for individuals and 95 years for a corporation. This can be applied to
tangible and intangible items.
- Patents: The final one on the board has to do with patents. These are rights that are granted to an
owner of a process, product, etc. which has an exclusive monopoly on that idea for a period of 20 years.
The goal of this action is to provide the inventor full compensation and benefit of having said idea.
Though very difficult to get approved, it is a process that a number of inventors execute to get their
share of the money pie.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
There is always a chance that a system will be out of order for some time, corn panies shield themselves
through the end-user agreements that they require customers and clients to sign and acknowledge
when using their services. This is a very important point to mention because most people don't pay
attention to these and as of a result, when they attempt to sue for damages, they get hit in the face with
the reality that they can't do such a thing. This can be applied to information systems, technologies, or
other equipment that may have some system-related focus.
Please note that this is much different than libel or any slanderous act that may be committed which will
do intentional harm. The premise of this pan of the question is to gear one towards thinking about the
reasons why a company can't get sued for a minor issue that only causes a temporary inconvenience.
Note that the subject of liability law (a goldmine for lawyers naturally) can also be said here to help
prove one's point.
The three (3) most common principal qualities of poor system performance. These are shown below for
one to see with a brief description of each one shortly thereafter:
• Software Bugs: as if anyone would need more critters running around the office, this one is a primary
quality of systems going down the tubes. Improperly programming a system or not having an awareness
of what a user may need in the future causes more headaches than a store full of customers during the
holidays.
• Hardware and/or Facility Failures Due to Natural Causes: while this isn't as common as a failure as
the first one, it still happens and it is up to the leadership team of an information systems (IS)
department to come up with backup plans and business continuity options to keep the business running
when this would occur. o Note that this would include offsite data backup, generators that could be
used in power failures, Halon suppression systems for data centers in the event of a fire, and much
more.
• Poor Data Input: This is similar to the first one above but this is more programming based and time
wasted for updates, re-coding, and similar actions could cost a company huge amounts of time and
money.
Quality of Life Impacts of Computers and Information Systems The four (4) different quality-of-life
impacts that computers and information systems have resulted in. These are shown below for one to
see with a brief description of each one shortly thereafter:
Lauden Chapter 4 Ethical and Social Issues in Information Systems
• Rapidness of Change: if anything is more noticeable than this, one should question what is? Note that
the speed technologies are changing now than ever before is faster than ever before. With this, it causes
more harm than good sometimes because people and businesses may not have as much time as they
would like to respond to the changing landscape of business and personal wants and needs. Financially,
this can be next to impossible to implement as well all things considering.
• Maintaining Boundaries between Home, Work, and Personal Leisure Activities: This is another point
which deserves some attention because unlike 20 years ago, there is so much fuzziness between home,
work, and play. Nowadays, at least to the solutions author's eyes, it feels like these are all blended in
and we are working more than ever from places one couldn't imagine: the loo, the kitchen table, a park,
etc.
• Dependence and Vulnerabilities: This point is one that should be included every time because as a
society, we are dependent on technology. As much as one would want to argue otherwise, this is a
reality that is in place and can't be helped all that much. Shows that are on the tele more now than ever
highlight the after-effects when technology is suddenly gone. The world would erupt into a chaotic mess
and millions of lives would be lost due to it.
• Computer Crimes and Abuse: while it isn't surprising, the increase in identify theft cases, spam,
phishing, and other internet crimes are a direct result of technologies going global. Span along costs
companies billions of dollars in lost productivity, time, and expense trying to keep it out of their network
email infrastructure. Though this has improved slightly with the U.S. CAN-SPAM act of 2003, it will be a
problem that will be around for a long time to come.
Technostress is one that recently has popped up as a major problem because these are symptoms like
aggravation, hostility towards others, frustration, fatigue, and the like that are the result of technologies
not cooperating. This is somewhat related to repetitive stress injury (RSI) because muscle groups are
required to do the same thing many times a day in a position that may not be comfortable for one to
use. Typing, for example, is one of the most common RSI injuries. How do these relate to information
systems? The best answer that one can give here is that this is the net result of being dependent on
information systems and technologies which require large amounts of input. Since this affects millions of
people worldwide, this is an issue that will only continue to grow as technology weaves into more areas
of our lives in time.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
Discussion Questions
1. Should producers of software-based services, such as ATMs, be held liable for economic injuries
suffered when their systems fail?
2. Should companies be responsible for unemployment caused by their information systems? Why or
why not?
3. Discuss the pros and cons of allowing companies to amass personal data for behavioral targeting.
1. Should producers of software-based services, such as ATMs, be held liable for economic injuries
suffered when their systems fail?
Answer:
The point of the view of the software producer should be examined and reasons should be given both
for why they are and are not liable.
Reasons why software producers are liable:
• If a system fails, it may have been caused by avoidable and foreseeable consequences.
• Correcting these issues might come at a high cost, meaning that it would be pointless to sell the
software because it will be too expensive to purchase.
• Software producers will sell their product in order to achieve a profit which makes this part of the
moral dimension of system quality.
Reasons why software producers are not liable:
• Because a failure in software may result in negative economic outcomes for a company, the producers
of software-based services need to warn their consumers that their product is imperfect.
• There should be a mutual understanding between the producer and the company where certain
strategies for software problems would be implemented in case the system fails. Not all software
systems are flawless so the producers need to find a balance in correcting the problems while making
the system cost-effective. The risk is also in the company for purchasing a product and knowing that
unexpected failures may occur.
2. Should companies be responsible for unemployment caused by their information systems? Why or
why not?
Answer:
Identify and explain why companies are both responsible and not responsible for unemployment caused
by their information systems.
Why companies are responsible:
• Although the employee might be at fault, he is under the company's supervision so the company is
ultimately accountable for the employee's actions.
• The company producing the product should take all necessary procedures to ensure a well running
information system.
• The company's name is on the line whenever something good or bad happens so they should do the
best job in preserving their reputation.
• Companies should hold workshops or tutorials for employees in order to keep up with the rapid
change in technology.
Why companies are not responsible:
• It should be the employee's responsibility to make sure they are up to date with the knowledge
required to maintain a well working information system.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
• Technology will continue to advance on a daily basis so employees should have a sense of self-
accountability and need to take it upon themselves to adapt to the changes.
• The company using the information system should be aware that all technology is flawed. They should
be held accountable when choosing an information system to implement.
3. Discuss the pros and cons of allowing companies to amass personal data for behavioral targeting.
Answer:
First, start by defining behavioral targeting. Then list the pros and cons of allowing companies to amass
personal data for behavioral targeting and give reasons for each.
Behavioral targeting:
• Defined as the tracking of an individual's history of clicking behavior on thousands of Web sites.
• The purpose is to understand their interests and intentions, and exposing them to advertisements that
are based off of these interests and intentions.
Pros:
• Advertisements are narrowed clown
• Increases company production
• Allows companies to be more innovative
• Companies can improve customer relationships
Advertisements are narrowed down:
• Companies can’t have to waste time sending users certain advertisements that may be irrelevant.
• Behavioral targeting allows the company to gather information and send advertisements that are
tailored to the interests of an individual.
Increases company production:
• Behavioral targeting saves time for a company because they are no longer wasting time reaching out
to all customers.
• They can target a specific group of people and focus their time and money towards them
• More work can be done and the quality of the product can be improved.
Allows companies to be more innovative:
• By acquiring information about a user, a company can find out what exactly a customer wants.
• The company will know which products work and which ones Cent
• Also, the company can find out what groups of people are likely to buy their product and target them
specifically.
Companies can improve customer relationships:
• Learning more about a user and his interests gives the company a better idea of who the user is as a
person and as a customer.
• Companies have to think of ways to make their products work for the user.
Comment
Cons:
• Companies can learn too much about their customers
• Not suitable for all clients
• Costly
Companies can learn too much about their customers:
• Privacy concerns are a major issue that comes with behavioral targeting.
Lauden Chapter 4 Ethical and Social Issues in Information Systems
• Users don't know what kind of information and tow much information companies are gaining from
their online activity.
• A customer may not want certain information available to a company.
• Also, the company has to be careful with customer information and make sure that this information is
used in an ethical manner.
Not suitable for all clients:
• Behavioral targeting is cbne through online activity.
• A company that is geared towards an older customer base would not gain an advantage.
• More specifically, elderly customers are less likely to spend time on the Internet, so companies with
this customer base would spend more money than they should on implementing behavioral targeting.
Costly:
• Behavioral targeting costs more to implement than more tracitional advertisements.
• Unless a company has a good business model, the costs to implement behavioral targeting will work
against the company's favor.
Lauden Chapter 4 Ethical and Social Issues in Information Systems