Assignment #ten PDF

Title Assignment #ten
Author kristin akin
Course Management Information Systems
Institution Rowan University
Pages 2
File Size 50.5 KB
File Type PDF
Total Downloads 78
Total Views 151

Summary

Online course ...


Description

1.

List and describe the five moral dimensions of the information age. ! 1. Information rights and obligations; Deals with privacy issues 2. Property rights and obligations; deals with intellectual property issues 3. Accountability and control; Primarily deals with issues of liability for unintentional consequences of system use 4. system quality; deals with issues of data quality and system errors 5. Quality of life; deals with negative social consequences

2.

Describe why each of the following key technology trends raises ethical concerns: doubling of computer power; declining costs of data storage; advances in data analysis techniques; advances in networking; mobile device growth. ! 1. Doubling of computer power; IS are used for most critical operations in organizations. By using these it increases the dependency on the system and increases the vulnerability to the systems errors and data quality. 2. Declining data storage costs;

3.

List the five steps you can follow to analyze a situation that seems to present ethical issues. ! 1. Identify and describe clearly the facts 2. Define the conflict or dilemma and identify the higher-orders involved 3. Identify the stakeholder 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options

4.

Define privacy and fair information practices (FIP). ! 1. Privacy; the claim of individuals to be left alone, free of surveillance or interference from other individuals, organizations, or the state.

2. Fair information practices; set of principals governing the collection and use of information about individuals.

5.

Define the following Internet challenges to privacy: cookies, web beacons, and spyware. ! Cookies; a message given to a web browser by a web server to identify users and possibly prepare customize web pages for the user. Web beacons; transparent graphic image that is used to monitor the behavior of the user visiting a specific website. Spyware; software that enables a user to obtain covert info about another computer activities by transmitting data covertly from their hard drive.

6.

What is intellectual property? List and describe the three different ways to protect intellectual property. Intellectual property; Intangible property created by individuals or corporations that is subjected to protection under trade secret, copyright, and patent law. Trade secrets; a secret device or technique used by a company in manufacturing its products. copyright; exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize other to do the same. Patents; government authority or license conferring a right or title for a set period, especially the sole right to exclude other from making, using, or selling an invention....


Similar Free PDFs