Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Zulfikri Muhammad Ripaldi

13522187

Kelas B

1. What ethical, social, and political issues are raised by information systems?

2. Are there specific principles for conduct that can be used to guide decisions about ethical
dilemmas?

3. Why does contemporary information systems technology pose challenges to the


protection of individual privacy and intellectual property?

4. How have information systems affected everyday life?

5. How can organizations develop corporate policies for ethical conduct?

Answer

1. Information technology has raised new possibilities for behavior for which laws and rules
of acceptable conduct have not yet been developed. The introduction of new information
technology has a ripple effect, raising new ethical, social, and political issues that must be
dealt with on the individual, social, and political levels. Ethical, social, and political
issues are closely related. Ethical issues confront individuals who must choose a course
of action, often in a situation in which two or more ethical principles are in conflict (a
dilemma). Social issues spring from ethical issues as societies develop expectations in
individuals about the correct course of action. Political issues spring from social conflict
and are mainly concerned with using laws that prescribe behavior to create situations in
which individuals behave correctly. In giving examples, students can identify issues
surrounding the five moral dimensions of the information age. These include:
information rights and obligations, property rights and obligations, accountability and
control, system quality, and quality of life.

Differentiate between responsibility, accountability, and liability.


Responsibility is a key element of ethical actions. Responsibility means that you accept
the potential costs, duties, and obligations for the decisions you make.
Accountability is a feature of systems and social institutions. It means that mechanisms
are in place to determine who took responsible, action, who is responsible.
Liability is a feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or
organizations.

2. List and describe the five steps in an ethical analysis.

o The five steps in ethical analysis include:


o Identify and describe clearly the facts.
o Define the conflict or dilemma and identify the higher-order values involved.
o Identify the stakeholders.
o Identify the options that you can reasonably take.
o Identify the potential consequences of your options.

Identify and describe six ethical principles.


Six ethical principles are available to judge conduct. These principles are derived
independently from several cultural, religious, and intellectual traditions and include:
 Golden Rule. Do unto others as you would have them do unto you
 Immanuel Kant’s Categorical Imperative. If an action is not right for everyone to
take, it is not right for anyone
 Descartes’ rule of change. If an action cannot be taken repeatedly, it is not right
to take at all
 Utilitarian Principle. Take the action that achieves the higher or greater value
 Risk Aversion Principle. Take the action that produces the least harm or the least
potential cost
 “No free lunch” rule. Assume that virtually all tangible and intangible objects
are owned by someone else unless there is a specific declaration otherwise.

These principles should be used in conjunction with an ethical analysis to guide decision
making. The ethical analysis involves identifying the facts, values, stakeholders, options,
and consequences of actions. Once completed, you can consider which ethical principle
to apply to a situation to arrive at a judgment.

3. Define privacy and fair information practices.


Privacy is the claim of individuals to be left alone, free from surveillance or interference
from other individuals or organizations, including the state. Claims of privacy are also
involved at the workplace.
Fair information practices are a set of principles governing the collection and use of
information about individuals. FIP principles are based on the notion of a mutuality of
interest between the record holder and the individual.
Explain how the Internet challenges the protection of individual privacy and intellectual
property.
Contemporary information systems technology, including Internet technologies,
challenges traditional regimens for protecting individual privacy and intellectual
property. Data storage and data analysis technology enables companies to easily gather
personal data about individuals from many different sources and analyze these data to
create detailed electronic profiles about individuals and their behaviors. Data flowing
over the Internet can be monitored at many points. The activities of Web site visitors can
be closely tracked using cookies and other Web monitoring tools. Not all Web sites have
strong privacy protection policies, and they do not always allow for informed consent
regarding the use of personal information.

Explain how informed consent, legislation, industry self-regulation, and technology tools
help protect the individual privacy of Internet users.
The online industry prefers self-regulation to the U.S. government tightening privacy
protection legislation.
The moral dimensions of information systems center around information rights and
obligations, property rights and obligations, accountability and control, system quality,
and qualify of life.

4. List and define three different regimes that protect intellectual property rights?
Intellectual property is subject to a variety of protections under three different legal
traditions:
 Trade secrets
 Copyright
 Patent law
Traditional copyright laws are insufficient to protect against software piracy because digital
material can be copied so easily. Internet technology also makes intellectual property even more
difficult to protect because digital material can be copied easily and transmitted to many different
locations simultaneously over the Net. Web pages can be constructed easily using pieces of
content from other Web sites without permission.
Explain why it is so difficult to hold software services liable for failure or injury.
Software is like a book in that it stores and displays information. Courts are wary of holding
software authors liable for booklike software. In general, it is very difficult (if not impossible) to
hold software producers liable for their software products when those products are considered
like books are, regardless of the physical or economic harm that results. However, as people
become more dependent on services essentially based on software the chances are excellent that
liability law will extend its reach to include software when the software merely provides an
information service.
List and describe the principal causes of system quality problems?
Three principle sources of poor system performance are:
 Software bugs and errors
 Hardware or facility failures caused by natural or other causes
 Poor input data quality
Name and describe four quality of life impacts of computers and information systems.

Four quality of life impacts of computers and information systems include:


Jobs can be lost when computers replace workers or tasks become unnecessary in
reengineered business processes
Ability to own and use a computer may be exacerbating socioeconomic disparities among
different racial groups and social classes
Widespread use of computers increases opportunities for computer crime and computer
abuse
Computers can create health problems, such as repetitive stress injury, computer vision
syndrome, and technostress
Define and describe technostress and repetitive stress injury (RSI) and explain their
relationship to information technology.
Technostress is defined as stress induced by computer use; symptoms include aggravation,
hostility toward humans, impatience, and fatigue.

Repetitive stress injury (RSI) is avoidable. Three management actions that could reduce RSI
injuries include:

 Designing workstations for a neutral wrist position, using proper monitor stands, and
footrests all contribute to proper posture and reduced RSI.
 Using ergonomically designed devices such as keyboards and mice are also options.
 Promoting and supporting frequent rest breaks and rotation of employees to different
jobs.

5. It's important that all of the management staff exhibit good moral characteristics from the
very CEO down. They need to consider all of their stakeholders and prioritize company
ethics. It helps if they put it in writing that they aim to be an ethical company. They
should take a proactive stance and donate to/sponsor charities and such.

You might also like