19 Oct Assume that you are a department manager.? Get the AI tool to list and describe at least 4 ways in which you could see might monitor your employees, while
I. After reading the information presented in Module 4 and other sources, please answer the following in the space below after you review the following:
(1) Ten Commandments of Computer Ethics, on page 91 (Section 4-2).
(2) Brief case on page 84 (Section 4-1): Employee Monitoring: Improving Productivity or Invasion of Privacy
(3) Case Study 4-1 – Telecommuting with a new Twist on page 104 , at the end of the chapter; and,
(4) Case Study 4-2 –Privacy and Other Legal Issues at Google.
II. Answer the following questions in the space below. Whenever using an AI tool, please specify the AI tool that you are using for the assignment.
1-Question: Is employee monitoring ethical? Using the AI tool, request information indicating two reasons why it is ethical and two reasons when is it not ethical. Provide the answers provided by the AI tool. See if the results presented by the AI tool are comparable to what is stated in the Ten Commandments of Computer Ethics and make a statement regarding this.
1-Answer from AI tool: Provide the question for the AI tool and the AI tool's answer (in quotes) in the space that follows.
2-Question: – What are 3 software tools that are used for employee monitoring? State these tools and ask the AI tool to provide the pros and cons of each.
2-Answer from AI tool: Provide the question for the AI tool and the AI tool's answer (in quotes) in the space that follows.
3-Question: Assume that you are a department manager. Get the AI tool to list and describe at least 4 ways in which you could see might monitor your employees, while they are working and using the employer’s computer resources. Ask the AI tool to brainstorm about these tools.
3-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool's answer (in quotes) in the space that follows.
4-Question: Ask your AI tool to list 3 ways how/why Google Maps’ Street View might create privacy issues and other legal issues.
4-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool's answer (in quotes) in the space that follows.
5-Question: Briefly, identify and describe what each of the following acronyms represents: HIPAA, FACTA, COPPA, and GDPR laws. Ask the AI tool to describe one of the acronyms, that you select, and why it is so important.
5-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool's answer (in quotes) in the space that follows.
Don't forget to provide a reference for your AI work.
MIS, 11e
Module 4: Personal, Legal, Ethical, and Organizational Issues
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives (1 of 2)
By the end of this module, you should be able to:
4.1 Discuss information privacy and methods for improving the privacy of information.
4.2 Explain the General Data Protection Regulation.
4.3 Explain the privacy issues of e-mail and data collection in a business setting.
4.4 Examine ethical issues and censorship in information technology.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives (2 of 2)
By the end of this module, you should be able to (continued):
4.5 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.
4.6 Examine the impact of information technology on society: the digital divide, telecommuting, and health issues.
4.7 Describe green computing and the ways it can improve the quality of the environment.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (1 of 6)
Ethical issues related to social media:
Fake News – a story or hoax to misinform or deceive people.
Cheap fakes
Misinformation
Disinformation
Deepfakes – fake videos or audio recordings that look and sound just like the real thing.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (2 of 6)
Information about people is stored on various databases
Example: Experian, Equifax, TransUnion
Social Security numbers – to link databases
Federal laws regulate the collection and use of information on people and corporations
1970 Fair Credit Reporting Act
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (3 of 6)
Web and network privacy
Acceptable use policy – Set of rules specifying legal and ethical use of a system and consequences of noncompliance
Accountability – Issues involving both the user’s and the organization’s responsibilities and liabilities
Nonrepudiation – Method for binding all the parties to a contract
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (4 of 6)
Guidelines to minimize invasion of privacy
Use Web sites with privacy policies that are easy to find, read, and understand
Limit access to personal information
Ensure data’s reliability and take precautions to prevent misuse of the data
Ensure data collection has a stated purpose
Must consent to use information for other reasons
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (5 of 6)
Guidelines to minimize invasion of privacy (continued)
Must verify data accuracy and only collected what is needed.
Records must be accurate, and users are able to edit or change
Record-keeping systems should not be secret
Must be able to prevent unauthorized access and misuse of data
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (6 of 6)
Federal data protections
Health Insurance Portability and Accountability Act (HIPAA)
Fair and Accurate Credit Transaction Act (FACTA)
Children’s Online Privacy Protection Act (COPPA)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
General Data Protection Regulation (1 of 3)
Laws that protect European Union (EU) citizens’ personal data
Genetic data
Racial or ethnic origin
Religious beliefs
Goal: Consistent protection of consumer and personal data across EU nations
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
General Data Protection Regulation (2 of 3)
Key components:
User consent
Anonymized data
Data breach notifications within 72 hours
Safe transfer of data across borders
Appointment of a GDPR compliance officer (for certain companies)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
General Data Protection Regulation (3 of 3)
Business benefits:
Improved consumer confidence
Better data security
Reduced maintenance by retiring legacy applications
Better alignment with evolving technology
Better decision making from effective use of customer information
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Concerns
Spam – unsolicited e-mail sent for advertising purposes
Sent in bulk using automated mailing software
Spammers sell their address lists
Ease of access
Assume others will have access to your messages
Any e-mails sent on company-owned computers are the property of the organization
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Collection on the Web (1 of 3)
Online shopping in increasing because of convenience, choices, and lower prices.
Some shoppers avoid online shopping because of
Online hackers
Selling of personal information to telemarketing firms
Users' information can be combined with other information and technologies to produce new information
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Collection on the Web (2 of 3)
Cookies – small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive
Used for welcoming new and returning users
Used to remember information for ordering
Helps Web sites customize pages for users
A cookie manager can disable cookies, if needed.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Collection on the Web (3 of 3)
Log files – a record of a user’s actions on a Web site
Generated by Web server software
Can help determine cases of identity misrepresentation on Web sites
Data is not always accurate as users can misrepresent themselves
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-1
Which of the following federal regulations protect children's online privacy?
FACTA
HIPAA
COPPA
GDPR
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-1: Answer
Which of the following federal regulations protect children's online privacy?
Answer: COPPA
Children’s Online Privacy Protection Act (COPPA)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Ethical Issues of Information Technologies
Information technology offers opportunities for unethical behavior because its easy to collect and disseminate information
Increase in cybercrime, cyber fraud, identity theft, and intellectual property theft
Nearly 15 million U.S. residents’ identities stolen every year
One identity stolen every two seconds; average loss of $3,500.26
Business identity theft: financial fraud, tax fraud, Web site defacement, and trademark ransom.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discussion Activity 1-1
You make two copies of a software package you just bought and sell one to a friend.
A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.
Review the following situation to determine where they fall within the ethical vs legal grid.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discussion Activity 1-1 Debrief
You make two copies of a software package you just bought and sell one to a friend.
Answer: Quadrant IV
Explanation: It is illegal and unethical.
A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.
Answer: Quadrant I
Explanation: It is legal and ethical.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Network Ethics (1 of 3)
Social media networking ethics – open and fair access to all users
Authenticity – members are trustworthy and sincere
Transparency – members are honest and open with no hidden agenda
Communication – members are open to knowing other members and communicate openly.
Business network ethics – open and fair access to all users
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Network Ethics (2 of 3)
Business media networking ethics – open and fair access to all users that includes the following types of networks:
Utilitarian networking – is a true utility, truthful, and is not wasting its users’ time.
Emotional networking – able to empathize with being ethical in all situations; emotion has no role
Virtuous networking – all parties will act in good faith
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Network Ethics (3 of 3)
Digital citizenship – using information technology safely, ethically, and responsibly.
7 principles to good digital citizenship:
Online etiquette
Privacy protection
Know how to stay safe online
“Dos and don’ts” of information technology
Protecting and respecting intellectual property
Understanding one’s digital footprint
• Healthy usage patterns
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Censorship (1 of 2)
Two types of information on the Web:
Public information – posted by an organization or public agency
Censored for public policy reasons (i.e., military secrets)
Censored if offensive to a political, religious, or cultural group
Private information – posted by a person
Not censored because of constitutional freedom of expression
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Censorship (2 of 2)
Restricting access to the Web
Countries like China, Myanmar (Burma), and Singapore restrict or forbid their citizens’ access to the Web
Parents may restrict Web access for children using software
Examples: CyberPatrol, CYBERSitter, Net Nanny, and SafeSurf
Some Web browsers have built-in features to protect children
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (1 of 5)
Intellectual Property – a legal umbrella covering two categories of protections:
Industrial Property: inventions, copyrights, trademarks, logos, industrial designs, etc.
Copyright material: literary and artistic works
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (2 of 5)
Copyrights – protects tangible material and
Online materials (web pages and HTML code)
Computer graphics (printed or saved on a storage device)
Trademarks – protects product names and identifying marks (i.e., logos)
Trade secrets – protects ideas, information, and innovations
Patents – protects new processes
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (3 of 5)
Patent Benefits
Generates revenue through licensing
Attracts funding for further research and development
Keeps competitors from entering certain market segments
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (4 of 5)
1980 revisions to the Copyright Act of 1976
Liability for unauthorized duplication and use of copyrighted programs
Laws covering legal issues related to information technologies in the U.S.
Telecommunications Act of 1996
Communications Decency Act (CDA)
Laws against spamming
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (5 of 5)
Cybersquatting (aka domain squatting)
Registering, selling, or using a domain name to profit from someone else’s trademark
Typosquatting (aka URL hijacking)
Relies on typographical errors made by Web users
Typing goggle.com instead of google.com
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Divisions and the Digital Divide
Digital divide: information-rich vs the information-poor
Many people still cannot afford computers
“Red-lining” – companies prioritize fiber-optic high-speed Internet within high-income communities.
Schools help with loaner programs providing portable computers to students
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-2
Which of the following is an example of a patent?
Online video promotion
Nike brand
McDonald’s logo
Bluetooth
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-2: Answer
Which of the following is an example of a patent?
Answer: Bluetooth
Patents protect new processes like an invention. Bluetooth was invented in 1994 by Jaap Haartsen. Bluetooth technology connects nearby electronic devices using low-power, ultra-high-frequency waves.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Impact of Information Technology in the Workplace (1 of 2)
Increased consumers’ purchasing power
Results in a stronger economy by reducing production costs
Information technologies directly affect the nature of jobs
Telecommuting (or virtual work) allows people to work from home
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.