Chat with us, powered by LiveChat Assume that you are a department manager.? Get the AI tool to list and describe at least 4 ways in which you could see might monitor your employees, while - Writeden.com

Assume that you are a department manager.? Get the AI tool to list and describe at least 4 ways in which you could see might monitor your employees, while

I.  After reading the information presented in Module 4 and other sources, please answer the following in the space below after you review the following: 

(1)  Ten Commandments of Computer Ethics, on page 91 (Section 4-2).   

(2)  Brief case on page 84 (Section 4-1):   Employee Monitoring:  Improving Productivity or Invasion of Privacy  

(3)  Case Study 4-1 – Telecommuting with a new Twist on page 104 , at the end of the chapter; and,

(4)  Case Study 4-2 –Privacy and Other Legal Issues at Google.

II.  Answer the following questions in the space below.  Whenever using an AI tool,  please specify the AI tool that you are using for the assignment.   

1-Question:  Is employee monitoring ethical? Using the AI tool, request information indicating two reasons why it is ethical and two reasons when is it not ethical.  Provide the answers provided by the AI tool.  See if the results presented by the AI tool are comparable to what is stated in the Ten Commandments of Computer Ethics and make a statement regarding this. 

1-Answer from AI tool: Provide the question for the AI tool and the AI tool's answer (in quotes) in the space that follows.    

2-Question:   – What are 3 software tools that are used for employee monitoring?  State these tools and ask the AI tool to provide the pros and cons of each.  

2-Answer from AI tool: Provide the question for the AI tool and the AI tool's answer (in quotes) in the space that follows.    

3-Question: Assume that you are a department manager.  Get the AI tool to list and describe at least 4 ways in which you could see might monitor your employees, while they are working and using the employer’s computer resources.  Ask the AI tool to brainstorm about these tools.  

3-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool's answer (in quotes) in the space that follows.    

4-Question: Ask your AI tool to list 3 ways how/why Google Maps’ Street View might create privacy issues and other legal issues.

4-Answer from AI tool:  Provide the question you stated for the AI tool and the AI tool's answer (in quotes) in the space that follows.    

5-Question: Briefly, identify and describe what each of the following acronyms represents: HIPAA, FACTA, COPPA, and GDPR laws.   Ask the AI tool to describe one of the acronyms, that you select, and why it is so important.

5-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool's answer (in quotes) in the space that follows.   

Don't forget to provide a reference for your AI work.  

MIS, 11e

Module 4: Personal, Legal, Ethical, and Organizational Issues

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Module Objectives (1 of 2)

By the end of this module, you should be able to:

4.1 Discuss information privacy and methods for improving the privacy of information.

4.2 Explain the General Data Protection Regulation.

4.3 Explain the privacy issues of e-mail and data collection in a business setting.

4.4 Examine ethical issues and censorship in information technology.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Module Objectives (2 of 2)

By the end of this module, you should be able to (continued):

4.5 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.

4.6 Examine the impact of information technology on society: the digital divide, telecommuting, and health issues.

4.7 Describe green computing and the ways it can improve the quality of the environment.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (1 of 6)

Ethical issues related to social media:

Fake News – a story or hoax to misinform or deceive people.

Cheap fakes

Misinformation

Disinformation

Deepfakes – fake videos or audio recordings that look and sound just like the real thing.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (2 of 6)

Information about people is stored on various databases

Example: Experian, Equifax, TransUnion

Social Security numbers – to link databases

Federal laws regulate the collection and use of information on people and corporations

1970 Fair Credit Reporting Act

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (3 of 6)

Web and network privacy

Acceptable use policy – Set of rules specifying legal and ethical use of a system and consequences of noncompliance

Accountability – Issues involving both the user’s and the organization’s responsibilities and liabilities

Nonrepudiation – Method for binding all the parties to a contract

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (4 of 6)

Guidelines to minimize invasion of privacy

Use Web sites with privacy policies that are easy to find, read, and understand

Limit access to personal information

Ensure data’s reliability and take precautions to prevent misuse of the data

Ensure data collection has a stated purpose

Must consent to use information for other reasons

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (5 of 6)

Guidelines to minimize invasion of privacy (continued)

Must verify data accuracy and only collected what is needed.

Records must be accurate, and users are able to edit or change

Record-keeping systems should not be secret

Must be able to prevent unauthorized access and misuse of data

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (6 of 6)

Federal data protections

Health Insurance Portability and Accountability Act (HIPAA)

Fair and Accurate Credit Transaction Act (FACTA)

Children’s Online Privacy Protection Act (COPPA)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

General Data Protection Regulation (1 of 3)

Laws that protect European Union (EU) citizens’ personal data

Genetic data

Racial or ethnic origin

Religious beliefs

Goal: Consistent protection of consumer and personal data across EU nations

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

General Data Protection Regulation (2 of 3)

Key components:

User consent

Anonymized data

Data breach notifications within 72 hours

Safe transfer of data across borders

Appointment of a GDPR compliance officer (for certain companies)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

General Data Protection Regulation (3 of 3)

Business benefits:

Improved consumer confidence

Better data security

Reduced maintenance by retiring legacy applications

Better alignment with evolving technology

Better decision making from effective use of customer information

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

E-mail

Privacy Concerns

Spam – unsolicited e-mail sent for advertising purposes

Sent in bulk using automated mailing software

Spammers sell their address lists

Ease of access

Assume others will have access to your messages

Any e-mails sent on company-owned computers are the property of the organization

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Data Collection on the Web (1 of 3)

Online shopping in increasing because of convenience, choices, and lower prices.

Some shoppers avoid online shopping because of

Online hackers

Selling of personal information to telemarketing firms

Users' information can be combined with other information and technologies to produce new information

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Data Collection on the Web (2 of 3)

Cookies – small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive

Used for welcoming new and returning users

Used to remember information for ordering

Helps Web sites customize pages for users

A cookie manager can disable cookies, if needed.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Data Collection on the Web (3 of 3)

Log files – a record of a user’s actions on a Web site

Generated by Web server software

Can help determine cases of identity misrepresentation on Web sites

Data is not always accurate as users can misrepresent themselves

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-1

Which of the following federal regulations protect children's online privacy?

FACTA

HIPAA

COPPA

GDPR

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-1: Answer

Which of the following federal regulations protect children's online privacy?

Answer: COPPA

Children’s Online Privacy Protection Act (COPPA)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Ethical Issues of Information Technologies

Information technology offers opportunities for unethical behavior because its easy to collect and disseminate information

Increase in cybercrime, cyber fraud, identity theft, and intellectual property theft

Nearly 15 million U.S. residents’ identities stolen every year

One identity stolen every two seconds; average loss of $3,500.26

Business identity theft: financial fraud, tax fraud, Web site defacement, and trademark ransom.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discussion Activity 1-1

You make two copies of a software package you just bought and sell one to a friend.

A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.

Review the following situation to determine where they fall within the ethical vs legal grid.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discussion Activity 1-1 Debrief

You make two copies of a software package you just bought and sell one to a friend.

Answer: Quadrant IV

Explanation: It is illegal and unethical.

A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.

Answer: Quadrant I

Explanation: It is legal and ethical.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Computer Network Ethics (1 of 3)

Social media networking ethics – open and fair access to all users

Authenticity – members are trustworthy and sincere

Transparency – members are honest and open with no hidden agenda

Communication – members are open to knowing other members and communicate openly.

Business network ethics – open and fair access to all users

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Computer Network Ethics (2 of 3)

Business media networking ethics – open and fair access to all users that includes the following types of networks:

Utilitarian networking – is a true utility, truthful, and is not wasting its users’ time.

Emotional networking – able to empathize with being ethical in all situations; emotion has no role

Virtuous networking – all parties will act in good faith

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Computer Network Ethics (3 of 3)

Digital citizenship – using information technology safely, ethically, and responsibly.

7 principles to good digital citizenship:

Online etiquette

Privacy protection

Know how to stay safe online

“Dos and don’ts” of information technology

Protecting and respecting intellectual property

Understanding one’s digital footprint

• Healthy usage patterns

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Censorship (1 of 2)

Two types of information on the Web:

Public information – posted by an organization or public agency

Censored for public policy reasons (i.e., military secrets)

Censored if offensive to a political, religious, or cultural group

Private information – posted by a person

Not censored because of constitutional freedom of expression

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Censorship (2 of 2)

Restricting access to the Web

Countries like China, Myanmar (Burma), and Singapore restrict or forbid their citizens’ access to the Web

Parents may restrict Web access for children using software

Examples: CyberPatrol, CYBERSitter, Net Nanny, and SafeSurf

Some Web browsers have built-in features to protect children

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (1 of 5)

Intellectual Property – a legal umbrella covering two categories of protections:

Industrial Property: inventions, copyrights, trademarks, logos, industrial designs, etc.

Copyright material: literary and artistic works

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (2 of 5)

Copyrights – protects tangible material and

Online materials (web pages and HTML code)

Computer graphics (printed or saved on a storage device)

Trademarks – protects product names and identifying marks (i.e., logos)

Trade secrets – protects ideas, information, and innovations

Patents – protects new processes

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (3 of 5)

Patent Benefits

Generates revenue through licensing

Attracts funding for further research and development

Keeps competitors from entering certain market segments

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (4 of 5)

1980 revisions to the Copyright Act of 1976

Liability for unauthorized duplication and use of copyrighted programs

Laws covering legal issues related to information technologies in the U.S.

Telecommunications Act of 1996

Communications Decency Act (CDA)

Laws against spamming

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (5 of 5)

Cybersquatting (aka domain squatting)

Registering, selling, or using a domain name to profit from someone else’s trademark

Typosquatting (aka URL hijacking)

Relies on typographical errors made by Web users

Typing goggle.com instead of google.com

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Social Divisions and the Digital Divide

Digital divide: information-rich vs the information-poor

Many people still cannot afford computers

“Red-lining” – companies prioritize fiber-optic high-speed Internet within high-income communities.

Schools help with loaner programs providing portable computers to students

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-2

Which of the following is an example of a patent?

Online video promotion

Nike brand

McDonald’s logo

Bluetooth

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-2: Answer

Which of the following is an example of a patent?

Answer: Bluetooth

Patents protect new processes like an invention. Bluetooth was invented in 1994 by Jaap Haartsen. Bluetooth technology connects nearby electronic devices using low-power, ultra-high-frequency waves.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

The Impact of Information Technology in the Workplace (1 of 2)

Increased consumers’ purchasing power

Results in a stronger economy by reducing production costs

Information technologies directly affect the nature of jobs

Telecommuting (or virtual work) allows people to work from home

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered straight to your email.

Place Order Now