MIS 475 : Chapter 12 : Using Information Ethically
MIS 475 : Chapter 12 : Using Information Ethically MIS 475
Popular in Managing and Using Information System
verified elite notetaker
Popular in Department
This 7 page Class Notes was uploaded by Winn on Tuesday April 12, 2016. The Class Notes belongs to MIS 475 at Marshall University taught by in Spring 2016. Since its upload, it has received 7 views.
Reviews for MIS 475 : Chapter 12 : Using Information Ethically
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 04/12/16
Chapter 12: Using Information Ethically Book : Managing and Using Information systems ( Keri E.Pearlson and Carol S.Saunders ) Fifth Edition. Explaining Important More Important 1) Stockholder theory: stockholders advance capital to corporate managers, who act as agents in furthering their ends. The nature of this contract binds managers to act in the interest of the shareholders. _ First: managers are bound to employ legal, non-fraudulent means. _ Second: managers must take the long-term view of shareholder interest. -> 2) Stakeholder theory holds that managers, although bound by their relation to stockholders, are entrusted also with a responsibility, fiduciary or otherwise, to all those who hold a stake in or a claim on the firm. - Stakeholder: any group that vitally affects the survival and success of the corporation or whose interests the corporation vitally affects. - Stakeholder: diverges most consequentially from stockholder theory in affirming that the interests of parties other than the stockholders also play a legitimate role in the governance and management of the firm. 3) Social contract theory: places social responsibilities on corporate managers to consider the needs of a society. (Social welfare and justice). Corporate social responsibility: Green computing: is concerned with using computing resources efficiently. - Becoming more obvious when considering the amount of power needed to drive the world’s PCs, servers, routers, switches, and data centers. Green programs can have a triple bottom line (TBL): economic, environmental, and social. That is, green programs create economic value while being socially responsible and sustaining the environment. - “3BL” or “People, Planet, Profit” 4) Ethical tensions with governments: Organizations are also facing a dilemma reconciling their corporate policies with regulations in countries where they want to operate. a) PAPA: privacy, accuracy, property, and accessibility. Those who possess the “best” information and know how to use it. Privacy : has long been considered “the right to be left alone”. It is “fundamentally about protections from intrusion and information gathering by others.” - A simple “cookie”, which is a text message given to a Web browser by a Web server, has been ruled to be legal by the U.S courts. - Apple and Google recently came under fire for collecting and storing unencrypted location information from both personal computers and mobile devices. - Social interaction among “digital native” individuals who have grown up in the Internet age, do not know about society without the Web. a) 1974 Privacy Act that regulates the U.S government’s collection and use of personal information and the 1998 Children’s Online Privacy Protection Act that regulates the online collection and use of children’s personal information. b) The Gramm-Leach-Bliley Act of 1999 applies to financial institutions. U.S law somewhat mitigates the sharing of sensitive financial and personal information by allowing customers of financial institutions the limited right to “opt-out” of the information sharing by these institutions with non-affiliated third parties. c) The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is designed to safeguard the electronic exchange privacy and security of information in the health care industry. d) The Fair Credit Reporting act limits the use of consumer reports provided by consumer reporting agencies to “permissible purposes” and grants individuals the right to access their reports and correct errors in them. b) Accuracy : The accuracy, or the correctness, of information assumes real importance for society as computers come to dominate in corporate record-keeping activities. - The European Union Directive on Data Protection requires accurate and up-to-date data and tries to make sure that data is kept no longer than necessary to fulfil its stated purpose. c) Property : or who owns the data. d) Accessibility : or the ability to obtain the data, become increasingly important. - Identity theft : or “the taking of victim’s identity to obtain credit, credit cards from banks and retailers, steal money from the victim’s existing accounts, apply for loans, establish accounts with utility companies , rent an apartment, file bankruptcy or obtain a job using the victim’s name. - Identity theft is categorized in two ways: true name and account takeover. I) True name identity theft means that thief uses personal information to open new accounts. II) The thief might open a new credit card account, establish cellular phone service, or open a new checking account to obtain blank checks. c) Managers’ Role in Ethical Information Control : 1) Create a culture of responsibility 2) Implement Governance Processes for Information control. 3) Avoid Decoupling. d) Security and controls :
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'