INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl link to proper use of APA...

1 answer below »
Proper presentation and table of contents are always missing. Plagiarism should be less than 5%


INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl link to proper use of APA https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_style_introduction.html Write a 5 page paper (1,200 or more words) in APA format. Below is a recommended outline. 1. Cover page (See APA Sample papers in www.apastyle.org OR https://owl.english.purdue.edu/owl/resource/560/01/) 2. Introduction a. A thesis statement b. Purpose of paper c. Overview of paper 3. Body (Cite sources with in-text citations.) 4. Conclusion – Summary of main points plus Lessons Learned and Recommendations 5. References – List the references you cited in the text of your paper according to APA format. (Note: Do not include references that are not cited in the text of your paper) Support all assertions with proper scholarly research, using at least 5 references (scholarly articles published in peer-reviewed academic journals). Proper APA formatting is expected (cited sources, cover page, reference page, etc.).  Your submission should be presented in the form of a business document.  Presentation counts! Management Information Systems: Managing the Digital Firm, Sixteenth Edition Management Information Systems: Managing the Digital Firm Sixteenth Edition Chapter 4 Ethical and Social Issues in Information Systems Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved If this PowerPoint presentation contains mathematical equations, you may need to check that your computer has the following installed: 1) MathType Plugin 2) Math Player (free versions available) 3) NVDA Reader (free versions available) 1 Learning Objectives 4.1 What ethical, social, and political issues are raised by information systems? 4.2 What specific principles for conduct can be used to guide ethical decisions? 4.3 Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? 4.4 How have information systems affected laws for establishing accountability, liability, and the quality of everyday life? 4.5 How will M I S help my career? Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This chapter examines the ethical, social, and political issues raised by information systems. It can be useful to ask students to help you put together a list of these issues categorized into ethical, social, and political columns. 2 Video Cases Case 1: What Net Neutrality Means for You Case 2: Facebook and Google Privacy: What Privacy? Case 3: United States v. Terrorism: Data Mining for Terrorists and Innocents Instructional Video: Viktor Mayer-Schönberger on the Right to Be Forgotten Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 3 Are Cars Becoming Big Brother on Wheels? (1 of 2) Problem Opportunities from new technology Undeveloped legal environment Solutions Develop big data strategy Develop privacy policies Collect car-generated data Analyze car/driver data Smartphones, event data recorders In-car diagnostics/navigation/entertainment Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 4 Are Cars Becoming Big Brother on Wheels? (2 of 2) Vehicle and driver monitoring systems Demonstrates how technological innovations can be a double-edged sword Illustrates how I T systems create consumer benefits and costs Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 5 What Ethical, Social, and Political Issues are Raised by Information Systems? (1 of 2) Recent cases of failed ethical judgment in business Wells Fargo, Deerfield Management, General Motors, Takata Corporation In many, information systems used to bury decisions from public scrutiny Ethics Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Almost every day there examples of business ethical failures reported in the news media. Ask the class to come up with current examples of ethical lapses in well-known organizations and firms. Put the list on the blackboard or screen. What role do they think information systems played in these ethical failures? Either a positive role by helping to expose ethical lapses, or a negative role by enabling these events. 6 What Ethical, Social, and Political Issues are Raised by Information Systems? (2 of 2) Information systems raise new ethical questions because they create opportunities for: Intense social change, threatening existing distributions of power, money, rights, and obligations New opportunities for crime New kinds of crimes Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Ask students to describe some of the ethical dilemmas that are presented by information systems and new developments in technology. Privacy is an important issue—mention the opening case again and explain that the business models of Google, Facebook, and many other sites depend on getting users to give up their personal information so it can be used to market and sell them products. 7 A Model for Thinking About Ethical, Social, and Political Issues Society as a calm pond I T as rock dropped in pond, creating ripples of new situations not covered by old rules Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws Requires understanding of ethics to make choices in legally gray areas Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Can students provide any examples of how IT has challenged some area of ethics, social life, or legal arrangements? Cell phones, computer games, surveillance cameras come to mind. 8 Figure 4.1 The Relationship Between Ethical, Social, and Political Issues in an Information Society Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Figure 4.1, Page 125. The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control. Explain to students that the graphic displays the five moral dimensions listed in the caption. Consider online P2P bit torrent shared music and films as an example of how a new technology has ethical, social, and eventually political (legal) ramifications. If music can be stolen, why pay any money for it? Why should anyone care about record labels or artist’s income? Full description: A diagram shows the relationship between ethical, social, and political issues in an information society. The diagram shows five concentric circles with the innermost circle labeled as Information Technology and Systems. The next three circles are labeled as follows. Ethical issues Individual, Social issues Society, Political issues Polity. Each of these circles is divided into five segments representing following five moral dimensions. Information Rights and Obligations, Property Rights and Obligations, System Quality, Quality of Life, and Accountability and Control. 9 Five Moral Dimensions of the Information Age Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Give examples of each of the five major issues. For example, an issue dealing with information rights might be: what rights do individuals possess with respect to themselves? What do they have a right to protect? An issue dealing with quality of life might be: what values should be preserved in an information- and knowledge-based society? An issue dealing with system quality might be: what standards of data and system quality should we demand to protect individual rights and the safety of society? 10 Key Technology Trends That Raise Ethical Issues Computing power doubles every 18 months Data storage costs rapidly decline Data analysis advances Networking advances Mobile device growth impact Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Which of these trends do students believe might have the most adverse consequences? Why do they feel this way? Do the positives outweigh the negatives for all four issues? Why or why not? 11 Advances in Data Analysis Techniques Profiling Combining data from multiple sources to create dossiers of detailed information on individuals Nonobvious relationship awareness (N O R A) Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Online profiling is one of the most controversial computer-related ethical, social, and political issues today. Although it is used fairly extensively on the Internet, it is also used by insurance firms, health insurance firms, casinos, and of course national authorities around the globe for finding potential terrorists, as well as domestic opponents. 12 Figure 4.2 Nonobvious Relationship Awareness (N O R A) Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Figure 4.2, Page 128. NORA technology can take information about people from disparate sources and find obscure, nonobvious relationships. It might discover, for example, that an applicant for a job at a casino shares a telephone number with a known criminal and issue an alert to the hiring manager. Explain that NORA is used by both the government and the private sector for its profiling capabilities. Ask students to provide potential examples of NORA (other than the one mentioned in the caption) for both governmental and business purposes. One such example might be an airline identifying potential terrorists attempting to board a plane. Another might be government identifying potential terrorists by monitoring phone calls. Full description: A diagram shows the components of nonobvious relationship awareness. The components shown are as follows. Watch Lists, Incident and Arrest Systems, Customer Transaction Systems, Telephone Records, and Human Resources Systems. All these components together lead to the following categories. Name standardization, Match, and Merge. An arrow from these categories is labeled as N O R A Alerts. 13 Basic Concepts: Responsibility, Accountability, and Liability Responsibility Accepting the potential costs, duties, and obligations for decisions Accountability Mechanisms for identifying responsible parties Liability Permits individuals (and firms) to recover damages done to them Due process Laws are well-known and understood, with an ability to appeal to higher authorities Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Explain that information systems do not exist in a vacuum and that these concepts are instrumental in understanding the impact of systems and measuring their success. Ask students why liability and due process are such important ethical concepts? (A rough answer would be that they provide recourse to individuals negatively effected by mismanagement of information systems, providing incentive to “play by the rules”.) 14 Ethical Analysis Five-step process for ethical analysis Identify and clearly describe the facts. Define the conflict or dilemma and identify the higher-order values involved. Identify the stakeholders. Identify the options that you can reasonably take. Identify the potential consequences of your options. Copyright © 2020, 2018
Answered 24 days AfterApr 02, 2021

Answer To: INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl...

Kuldeep answered on Apr 06 2021
145 Votes
Running Head: Privacy
Privacy
Student Name:
Unit Name:
University Name:
Date:
Contents
Introduction    2
A thesis statement    2
Purpose of paper    2
Overview of paper    2
Body    2
Conclusion    5
References    6
Introduction
A thesis statements
The privacy control of Faceb
ook and Google is of great significance to users, because "true transparency, as well as no anonymity", is the better guiding principle for Internet users.
Purpose of paper
The main purpose of this article is to understand the privacy controls that users can use at the application level, which can be used for Facebook and Google users.
Overview of paper
This article is about setting up Facebook privacy control and Google, privacy and what it means to us.
Body
Do people who use Facebook have a legitimate claim to privacy when they are posting data about themselves?
Yes, people do have legal requirements for privacy. Since 2009, Facebook has formulated an innovative policy that users can manage their data, but there are problems with this policy (Dwyer, 2011). 170 privacy options bore users and therefore cannot function effectively, but in the second half of 2012, Facebook must make sure to the FTC that they will give customers a clear or eye-catching notice and ask for it before sharing Their explicit consent is to protect consumer information by maintaining a comprehensive privacy protection program, and to obtain a biennial privacy audit from an independent third party to obtain information beyond the scope of their privacy settings (Esteve, 2017).
Because they are publishing information about themselves, we are willing to share it. If there is a confidentiality dispute over the content, they choose to make public, there is no maintenance. However, as seen in several class action cases, if the privacy dispute is about other things, the claim is legal. Such data about browsing while visiting outside of Facebook is an invasion of confidentiality as Facebook has not asked people if it is okay to do so (Houser and Voss, 2018). On the other way, the application that the link is to be used in concurrence with Facebook will grant them precise permission to view the application you are using.
How can using the sharing privacy controls help preserve your privacy on Facebook? In what ways is the sharing control ineffective?
SPC will help us protect our privacy. By selecting alternatives on the confidentiality settings and then sharing any data on Facebook, it allows us to choose individuals with whom we need to share content and individuals with whom we don't want to share (Jørgensen and Desai, 2017). It has a problem; 170 privacy options attract users before sharing information, so they don't work well....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here