Introduction to MIS - Chapter 14: MIS Impact on Society

Individuals Privacy Dehumanization Jobs Loss of jobs Physical disabilities Telecommuting Vendors and Consumers Intellectual property Balance of power Education and training Social interactions Social group legitimacy Access to technology E-mail freedom Liability and control of data Government Representatives and agencies Democracy and participation Voting Information warfare Rise of the world state? Crime Police powers Privacy Freedom of speech Responsibilities and ethics Users Programmers and developers Companies Governments Cases: Health Care Appendix: Computer-Related Laws

ppt34 trang | Chia sẻ: candy98 | Lượt xem: 488 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Introduction to MIS - Chapter 14: MIS Impact on Society, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Introduction to MISChapter 14MIS Impact on SocietyOperationsTacticsStrategyGovernmentConsumersEmployeesCultureBusinessesPrivacyEducationCompanyThe IT EnvironmentOutlineIndividualsPrivacyDehumanizationJobsLoss of jobsPhysical disabilitiesTelecommutingVendors and ConsumersIntellectual propertyBalance of powerEducation and trainingSocial interactionsSocial group legitimacyAccess to technologyE-mail freedomLiability and control of dataGovernmentRepresentatives and agenciesDemocracy and participationVotingInformation warfareRise of the world state?CrimePolice powersPrivacyFreedom of speechResponsibilities and ethicsUsersProgrammers and developersCompaniesGovernmentsCases: Health CareAppendix: Computer-Related LawsPrivacyGovernmentsEmployersBusinessesGovernment and PrivacyPersonal financial dataCompany financial dataPolitical negotiationsHealth dataTravel dataSpying on “ordinary” people is not an issue.Spying on business and political leaders or journalists can cause problems.Collecting data on targeted individuals such as dissidents or minorities can stifle innovation.Privacy ProblemsTRW--1991Norwich, VTListed everyone delinquent on property taxesTerry Dean RoganLost walletImpersonator, 2 murders and 2 robberiesNCIC databaseRogan arrested 5 times in 14 monthsSued and won $55,000 from LAEmployees26 million monitored electronically10 million pay based on statisticsJeffrey McFadden--1989SSN and DoB for William Kalin from military recordsGot fake Kentucky IDWrote $6000 in bad checksKalin spent 2 days in jailSued McFadden, won $10,000San Francisco Chronicle--1991Person found 12 others using her SSNSomeone got 16 credit cards from another’s SSN, charged $10,000Someone discovered unemployment benefits had already been collected by 5 othersPrivacy LawsMinimal in USCredit reportsRight to add comments1994 disputes settled in 30 days1994 some limits on access to dataBork Bill--can’t release video rental dataEducational data--limited availability1994 limits on selling state/local dataEuropeFrance and some other controlsEuropean Union, controls but undecided1995 EU Privacy ControlsHome-healthProgrammer/analystsTravel agentsChildcareGuardsCooksNursesGardnersLawyersTeachersJanitorsBank tellersElectrical assemblersTypists/word processorsMachine-tool operatorsTextile workersSwitchboard operatorsPackaging operatorsTelephone & cable TV installersDirectory-assistance operatorsJob Changes 1995-2002Job ChangesDatabase administrators, etc.Computer engineersSystems analystsPersonal and home care aidesHome health aidesMedical assistantsTeachers, special educationAdjustment clerksTeacher aidesChild care workersSocial workersReceptionistsFood service and lodging managersNursing aides, orderlies, etc.Hand packersGuardsTeachers, secondary schoolCooks, fast foodRegistered nursesClerical supervisorsFood preparation workersMaintenance repairersCashiersGeneral managers executivesTruck driversFood counter workersMarketing supervisorsWaiters and waitressesSalespersons, retailGeneral office clerks Changes 2000-2010 clerksEligibility interviewers, government programsParts salespersonsWholesale and retail buyers, except farm productsPostal service mail sorters, processorsTelephone operatorsComputer operatorsLoan interviewers and clerksSwitchboard operators, including answering serviceDishwashersSewing machine operatorsWord processors and typistsInsurance claims and policy processing clerksTellersOrder clerksFarmers and ranchersFood preparation and servingCustomer serviceRegistered nursesRetail salespersonsComputer supportCashiersOffice clerksSecurity guardsSoftware engineers, applicationsWaiters and waitressesJob Changes 2000-2010 (growth) Technology rules now require that all applications sold to the federal government have the ability to be used with adaptive technology to enable people with physical challenges to use the system.A variety of hardware and software devices exist to provide alternative input and output.The foot mouse or nohands mouse uses one pedal to move the mouse and the other to click it.AdvantagesDecreased overhead.Flexibility in part-time workers.DisadvantagesHarder to evaluate workers.Harder to manage workers.The FirmAdvantagesReduced commuting costs.Flexible schedule.DisadvantagesLoss of personal contacts.Distractions.EmployeesSuburbanwork centersTelecommutingTelecommuting sounds appealing to those who spend hours in traffic commuting to work. Most knowledge workers can easily purchase the computer equipment needed to work at home. It is more difficult to provide the self-motivation and organization to be an effective worker. On the other hand, there are fewer interruptions from coworkers.TelecommutingDigital Rights Management (Microsoft)E-Commerce bookstoreDigital Asset Server (DAS)Customer/ReaderWebsitePurchaseBank and creditcard processorSelection and purchase.Customer money transfer to store.Customer data.Selection data.Retail store data.Wholesale price charged to retailer.Commission/fee to DAS server.Money to publisher.Encrypted book sent to customer with publisher-specified level of security.AuthorPublisherOne copy in e-book format.ManuscriptPricing and RevenueElasticity of demand: % change in quantity % change in priceRevenue is maximized when elasticity is -1.In terms of digital products with a copyright “monopoly” and no marginal costs, it means reducing prices will result in increased total revenue--up to a point. And publishers are free to find this point and charge the most profitable price for each unit sold.EducationCan technology change education?Computer-assisted instruction to provide individual attentionCourse managementDistance learningDo people want more technology in education?TeachersStudentsEmployersLifelong learningProfessionalsEmployers MilitarySocial Group InteractionsSocial Group LegitimacyHow do you know what is real?How cynical do you need to be?Access to technologyHardwareSoftwareInternet (access and speed)Economics and payment mechanismE-mail access, spam, and harassmentLiability and Control of DataHow Cynical Can You Be?Which of these websites do you believe?How do you decide?Does it help if you know the website?BBC NewsArthritisCure.netInternational Internet Bandwidth162 Gbps14 Gbps0.8 Gbps0.4 Gbps1.2 Gbps42 Gbps0.07 Gbps Representatives and AgenciesProviding Internet access to government data.Democracy and participationGetting data and informationProviding feedback and participatingVoting—will we ever see electronic or online voting?Information warfareWill the Internet consolidate the world?Electronic Voting ChallengesPrevent fraud by voters (identify voters).Prevent fraud by counters.Prevent fraud by application programmers.Prevent fraud by operating system programmers.Prevent attacks on servers.Prevent attacks on clients.Prevent loss of data.Provide ability to recount ballots.Ensure anonymity of votes.Provide access to all voters.Prevent denial of service attacks.Prevent user interface errors.Identify and let voters correct data entry errors.Improve on existing 1 in 6,000 to 1 in 10,000 error rates.Information WarfareControlling information and knowledgeIntercepting communications.Breaking codes.Providing false information.Protecting the modern economy.Winning a war depends on destroying the economic infrastructure, which today includes computers and networks.Rise of the World-StateEarly history: City-StatesPeople band together to protect a common region.Economically and politically could only control limited areas.Modern EraNation-StateDefense within physical boundaries (oceans and mountains)International CooperationEuropean UnionNorth American Free Trade AreaMercosur and moreThe Internet could remove boundariesLaws and enforcement will require international cooperation.Nations might become insular (e.g., France/Yahoo)Companies might be forced to least-common denominatorCrimeReal-world/traditional crimeCriminals and terrorists have access to information, communication, and money.Encryption and AnonymityThe InternetCon artists have access to new and more victims.Harassment (e-mail, cell phones, stalking, etc.)Police PowersCarnivoreEchelon“Wire” tappingPrivacyFreedom of Speech (Digital Millennium Copyright Act)Responsibility and EthicsUsersCopyright LawsConfidentialityProgrammers and DevelopersSecure CodeConfidentiality and PrivacyKnow your LimitationsCompaniesProvide the tools to enable employees to do their jobs efficiently and legally.Training, compliance, security, backup.Partnerships and non-disclosure agreements.GovernmentsInfrastructureLawsPrivacyCases: HealthcareWhat is the company’s current status?What is the Internet strategy?How does the company use information technology?What are the prospects for the industry?www.lilly.comwww.owens-minor.comCases: Eli Lilly Owens & Minor, Inc.Appendix: Legal EnvironmentProperty Rights (ownership)PrivacyCrime (destruction)Property RightsCopyrightRight to sellRight to make copiesRight to make derivative worksRegistration is not required, but increases the amount of money you can receive in a lawsuitIn force for “life” + 50 years (corporate is 75 years total)Cannot copyright raw dataPatentMore expensive to obtain ($10,000 +)Prohibits similar works, even if created independently.20-year limitation (from date of filing)Useful and innovativeDigital Millennium Copyright Act (DMCA) of 1998Made it a federal crime to distribute devices that circumvent protection(Probably) made it a federal crime to discuss ways to circumventTrademarkPrevents use of a name or logoTrade SecretNon-disclosure agreement (NDA)Minimal legal protection, but establishes contractPrivacyFreedom of Information ActGives public access to most government filesFamily Educational Rights and Privacy ActLimits use of educational recordsFair Credit Reporting ActGives public access to their credit dataPrivacy Act of 1974Limits collection of government data—Most provisions are superceded and eroded by later legislation.Electronic Communications Privacy Act of 1986Extended wiretap protections to cell phones and e-mail.Video Privacy Act of 1988Limits access to video and library rental lists (Bork Bill).Driver’s Privacy Protection Act of 1994Limits access to drivers’ license records to large companies (e.g., insurance).Graham-Leach-Bliley Act of 1999Added some minor financial privacy clauses into financial deregulation. Institutions must notify customers of the ability to remove their names from marketing lists.U.S. Patriot Act (antiterrorism) of 2001Pretty much lets police agencies do anything they want for a given period of time as long as they claim it is related to terrorism.PrivacyGovernment expansion/intrusionWelfare laws require identification because of fraud--some states use fingerprintsIdentification databases: fingerprints nationwide, DNA proposal“Deadbeat dads” 1999 act requires SSN to receive any license (driver’s, fishing, building, etc.)CrimeComputer Fraud and Abuse Act of 1986 outlaws access to computers without authorizationdamage to computers, networks, data, and so onactions that lead to denial of serviceinterference with medical careEnforcement by U.S. Secret ServiceEnforcement has been difficult, but some successesLaw Web referencesfedlaw.gsa.gov Basic linkslaw.house.gov U.S. Code and C.F.R.www.lawcircle.com/observer Commentarylcweb.loc.gov/copyright U.S. copyright officewww.uspto.gov U.S. patent officewww.copyright.com Copyright clearancewww.eff.org Electronic frontier found.www.epic.org Privacy information centerwww.uspto.gov/web/offices/com/doc/ipnii IITF white paper,/com/doc/ipnii proposed copyright changeswww.wired.com Issue 4(1): Analysis of IITF