Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 64

Ethical and Social Issues in

Information Systems

Presented By:
Shri Gunjan Gandhi
Shri Vijay Prasad
Ms. Pratibha rahi
Shri Neeraj Juyal
Shri Devendra Kumar Saini
Learning Objectives

1. Identify ethical and social issues raised by information systems

2. Discuss codes of conduct

3. Identify the influence of information systems on privacy


and intellectual property

2
Information Systems

Information Systems are the means by which people and organizations, utilizing
technologies, gather, process, store, use and disseminate information.

The information system has transformed the way information is being


transmitted and communicated from one place or person to other.

However, the innovation brought by the information system in data collection,


processing, and storage practices have also introduced many social and ethical
concerns which require attention and adequate solutions.
Information Systems and Ethical &
Social Issues
• A model for thinking about ethical and social
Issues
 Think of a society as a calm pond
 IT as rock dropped in pond, creating ripples of
new situations not covered by old rules
 Social (e.g. family, education, etc.) and legal
(political) institutions cannot respond overnight to
these ripples—it may take years to develop
expectations and laws
10
Moral Dimensions
The introduction of
new information
technology has a ripple
effect, raising new
ethical, social, and legal
issues that must be
dealt with on the
individual, social, and
political levels. These
issues have five moral
dimensions:
information rights and
obligations, property
rights and obligations,
system quality, quality
of life, and
accountability and
control.

11
Moral dimensions of issues raised by
Information Systems

 Information Rights and Obligations: What information rights do individuals and


organizations possess with respect to themselves? What can they protect? What
obligations do individuals and organizations have concerning this information?
 
 Property Rights and Obligations: How will traditional intellectual property rights
be protected in a digital society in which tracing and accounting for ownership are
difficult and ignoring such property rights is so easy?
 
 Accountability and Control: Who can and will be held accountable and liable for
the harm done to individual and collective information and property rights?
 System Quality: What standards of data and system quality should we demand to
protect individual rights and the safety of society? Three principal sources of poor
system performance are:
 Software bugs, errors
 Hardware failures
 Poor input data quality

 Quality of Life: What values should be preserved in an information- and knowledge-


based society? Which institutions should we protect from violation? Which cultural
values and practices are supported by the new information technology. Negative social
consequences of systems are:

 Rapidity of change: Information systems have helped to create much more efficient
national and international markets. However, businesses may not have enough time to
respond to global competition
 Maintaining boundaries: Technology impact the balance between Family, Work, and
Leisure
 Dependence and vulnerability: public and private organizations ever more
dependent on computer systems, therefore, they are highly vulnerable if these systems
fail.
 Equity and access—the digital divide:
• Certain income groups less likely to have computers or Internet access. For example:
A digital divide may exists inschools , with schools in high- poverty areas less likely to
have computers, high-quality educational technology programs, or Internet access
availability for their students.

 Health risks:
• Repetitive stress injury (RSI)
• Largest source is computer keyboards
• Carpal tunnel syndrome (CTS)
• Computer vision syndrome (CVS)
• Eyestrain and headaches related to screen use

 Technostress
 Aggravation, impatience, fatigue
Key technological trends responsible for
these ethical and social stresses.
 The doubling of computing power every 18 months has made it possible
for most organizations to use information systems for their core production
processes.
 
 Advances in data storage techniques and rapidly declining storage
costs have been responsible for the multiplying databases on individuals,
employees, customers, and potential customers—maintained by private and
public organizations. These advances in data storage have made the routine
violation of individual privacy both cheap and effective.
 
 Advances in data analysis techniques for large pools of data are another
technological trend that heightens ethical concerns because companies and
government agencies are able to find out much detailed personal information about
individuals.
 Profiling - Combining data from multiple sources to create dossiers of detailed
information on individuals.
 Non Obvious Relationship Awareness (NORA)-Combining data from multiple sources
to find obscure hidden connections that might help identify criminals or terrorists. It
might discover, for example, that an applicant for a job at a casino shares a telephone
number with a known criminal and issue an alert to the hiring manager
 
 Mobile device growth and advances in networking, including the Internet, promise
to reduce greatly the costs of moving and accessing large quantities of data and open
the possibility of mining large pools of data remotely using small desktop machines,
permitting an invasion of privacy on a very large  scale and with high precision.
Ethical Issues(PAPA)of Information Age
 Privacy: This concern relates to the questions about what information should be
shared? With whom? What information should be forced to keep to ones’ self
only? Internet challenges to privacy:
 Cookies
 Identify browser and track visits to site
 Super cookies (Flash cookies)
 Web beacons (Web bugs)
 Tiny graphics embedded in e-mails and Web pages
 Monitor who is reading e-mail message or visiting site
 Spyware
 Installed on user’s computer
 May transmit user’s keystrokes or display unwanted ads
 Google services and behavioral targeting

 
 Accuracy: This concern related to the questions that who is going to be
responsible for the authenticity of the information? If the authenticity hurts, who is
going to be set up for the inaccurate information being conveyed and loss
occurred in the result?
 Property: The third ethical issue is the property of the information that who is
conveying the information and at what price? Who own the ways and channels
through which information is being transferred?
 Contemporary information systems have severely challenged existing laws and
social practices that protect private intellectual property(viz. Trade Secrets,
Copy Rights and Patent). 
 Information technology has made it difficult to protect intellectual property
because computerized information can be so easily copied or distributed on
networks.

 Accessibility: This concern relates to the questions that what is right for an
individual or organization access information and what are the conditions under
which this access is obtained?
Social Issues in Information System
 Culture: The issues of education, uneven distribution of wealth,
multiethnic and multigenerational workforce are commonly discussed in
society. The information systems have made it difficult to learn the latest
knowledge for all as this latest education can be possessed by
privileged social class only which is increasing disparity among society.
Therefore, a specific educated class is getting benefit from the
technology in a true sense. Furthermore, the information technology has
realized the generation gap as senior citizens have lack of knowledge
about information systems and new technology.

 Relationships Issues: Unlike past, the development of partnerships are


more diverse with long distant teams working together. The relationship
of buyers, sellers and suppliers have become easy, but it has also
created social issues like lack of trust and low moral values. Many cases
have been reported where people have used personal and business
information for their stake or fraud purpose.
 
 Law and Order Issues: The national and international databases have
information about millions and billions of people for identity purpose. But the
cybercrime practices and hacking of these sensitive websites have laid the
foundation for many law and order situations. Nowadays, it is very easy to
access someone’s information through social networking sites, but the cases
of ATM scamming, using fake sim cards and national identity cards have
made it very difficult for law enforcement agencies to main the peace.

 Cultural Behavior and Identity Issues: The pace of globalization has


become possible due to the introduction of the information system. This
system has enabled the business to grow on a global level due to online
inventory systems and information transfer. This aspect has caused great
impact on human interaction, organizational recruitment systems, networking
and societal presence which are also transforming the cultural behaviors of
people. Furthermore, people being part of the social world are more inclined
towards global identity which is dangerous for traditional norms and cultural
identity reservation.
 Information Usage Issues: The information is created or collected for a
purpose, but inappropriate use of information can cause serious problems. For
example, in the recent controversial scandal of “Blue Whale” game in many
countries, the convicts had an e-mail address and information about the
teenagers and children who installed the game, and it caused them to kill
themselves as it was a trap from the game designers. Therefore, using the
technology and social websites or engines have various risks attached to it.
 
 Health and Safety: The people-oriented organizations have health and safety
concerns faced by the workers in their workplace which require the responsible
regulations and acts to provide them legal cover. The most participants of
information system work on various computer stations at their work, and it is
important to outline their rights and responsibilities of both employers and
employees to maintain occupational health and safety.

 Accountability and Control: The moral obligation related to information systems


demand accountability and control over the information transfer from one point to
the other. This is important to comply with the rule and regulations. For example,
information gathered by the bank about client requires complete secrecy and
Central bank of any country has accountability and monitoring standards for
commercial banks for their evaluation and regulation purpose to avoid fraud and
secure consumer rights.
Some recent examples of ethical and
social issues:
 NSE (2022): Ravi Narain, former MD and CEO of NSE was recently arrested in
connection of illegal tapping of employees’ phones through a company run by former
Mumbai Police Commissioner.

 Volkswagen (2015): Volkswagen agreed to pay 17.7 billion $ to consumers and


agencies in U.S. and replace nearly 500,000 diesel cars with faulty emission software.
It also faced additional fines worldwide.

 General Motors Inc. (2015): General Motors CEO admitted that the firm covered up
faulty ignition switches for more than a decade resulting in the death of at least 114
customers. More than 100 million vehicles worldwide needed to be replaced.

 Citigroup, JPMorgan Chase, Barclays, UBS (2012): Four of the largest money center
banks in the world pleaded guilty to criminal charges that they manipulated the LIBOR
interest rate used to establish loan rate through the world.

 McKinsey and Company (2012): CEO rajat gupta heard on tapes leaking insider
information. He was found guilty and sentenced to 2 years in prison.
Managing Issues and Theoretical Support:
when we think about managing the ethics, there are three theories which are
mostly referred; Utilitarian Theory, Theory of Justice and Theory Based on Rights.

 The utilitarian theory of ethics: while planning for a project, it should be


strategically analyzed, and it must have to yield long-term benefit for a large
number of people in the society. This theory suggests that an action should be
examined while keeping in mind it results so that maximum good for people can
be extracted from that action or plan.

 The theory of justice: focuses upon the solution of problems related to


distributive justice in the society so that each member can enjoy the possible
about of liberty by agreeing on the social contract.

 The theory based on rights: considers that an organization should realize the
basic human rights and value them and they have no right to thwart the basic
rights of people in society.

All these theories have laid the foundation for the manager to manage ethics in
their organizations and social forums so that set up which can be family, business
or a state, survived longer by initializing ethics.
Recommendations for managing Social and
Ethical issues in Information Society
 Identify and describe clearly the facts: Find out who did what to whom, and
where, when, and how.

 Define the conflict or dilemma and identify the higher-order values involved:
The parties to a dispute all claim to be pursuing higher values e.g. the need to
improve healthcare record keeping and the need to protect individual privacy.

 Identify the stakeholders: who have invested in the situation, who have interest in
the outcome and who have vocal opinions.

 Identify the options that one can reasonably take: One may find that none of
the options satisfy all the interests involved, but that some options do a better job
than others.

 Identify the potential consequences of your options: Some options may be


ethically correct but disastrous from other points of view. Other options may work in
one instance but not in other similar instances. Always ask yourself, “What if I
choose this option consistently over time what are the consequences.
THANKS
Ethical and Social Issues

• The Web sites you visit track the search engine queries you
enter, pages visited, Web content viewed, ads clicked,
videos watched, content shared, and the products you
purchase.

• Google is the largest Web tracker, monitoring thousands of


Web sites

3
Ethical and Social Issues

• Technology can be a double-edged sword:


– It can be the source of many benefits (by showing you ads
relevant to your interests)
– but it can also create new opportunities for invading
your privacy, and enabling the reckless use of that
information in a variety of decisions about you

4
Ethical and Social Issues

• Search engine marketing is arguably the most effective


form of advertising in history,
• Banner display ad marketing is highly inefficient because it
displays ads to everyone regardless of their interests.
• Hence the search engine marketers cannot charge much for
display ad space
• Internet users, they can develop a very clear picture of who
you are, and use that information to show you ads that might
be of interest to you. This would make the marketing process
more efficient, and more profitable for all the parties
involved
5
Ethical and Social Issues
• But this solution also creates an ethical dilemma:
– Pitting the monetary interests of the online advertisers
and search engines against the interests of individuals to
maintain a sense of control over their personal
information and their privacy.
• As a manager,
– you will need to be sensitive to both the negative
and positive impacts of information systems for your
firm, employees, and customers.
– You will need to learn how to resolve ethical
dilemmas involving information systems.
6
Ethical and Social Issues

• Ethics
– Principles of right and wrong that individuals,
acting as free moral agents, use to make
choices to guide their behaviors

– Ethics is about individual choice: When faced with


alternative courses of action, what is the correct
moral choice?

7
Information Systems and Ethics
– Information technology can be used to achieve
social progress, but it can also be used to commit
crimes and threaten social values.

– For instance, Information systems raise


new ethical questions because they create
opportunities for:
• Intense social change, threatening existing
distributions of power, money, rights, and
obligations
• New kinds of crime

8
Information Systems and Ethics

– Ethics and the Internet:


• Ethical issues in information systems have been
given new urgency by the rise of the Internet
and electronic commerce.
• Internet and digital firm technologies make it
easier than ever to assemble, integrate, and
distribute information, unleashing new
concerns about the appropriate use of
customer information, the protection of
personal privacy, and the protection of
intellectual property.
9
Moral Dimensions

• Five moral dimensions of the


information age:
– Information rights and obligations
– Property rights and obligations
– Accountability and control
– System quality
– Quality of life
Moral Dimensions

– Information rights and obligations:


• What information rights do individuals possess with
respect to themselves? What can they protect?
– Property rights and obligations
• How will traditional intellectual property rights
be protected in a digital society in which tracing
and accounting for ownership are difficult?
– Accountability and control
• Who can and will be held accountable and liable for
the harm done to individual and collective information
and property rights?
Moral Dimensions

– System quality
• What standards of data and system quality should
we demand to protect individual rights and the
safety of society?
– Quality of life
• What values should be preserved in an information- and
knowledge-based society? Which institutions and values
should we protect from violation?
Technology Trends Affecting
Ethics
• Key technology trends that raise ethical issues
– Doubling of computer power
• More organizations depend on computer systems for
critical operations.
– Rapidly declining data storage costs
• Organizations can easily maintain detailed databases
on individuals.
– Networking advances and the Internet
• Copying data from one location to another and
accessing personal
data from remote locations are much easier.
Technology Trends Affecting
Ethics
– Advances in data analysis techniques
• Profiling
– Combining data from multiple sources to
create
dossiers of detailed information on individuals
• Nonobvious relationship awareness (NORA)
– Combining data from multiple sources to
find obscure hidden connections that might
help identify criminals or terrorists
– Mobile device growth
• Tracking of individual cell phones
Technology Trends Affecting
Ethics
Ethics in an Information Society

Ethics is a concern of humans


who have freedom of choice.

Ethical choices are decisions made by individuals who are


responsible for the consequences of their actions.
Ethics in an Information Society
• Basic concepts for ethical analysis (key elements in ethical action):
– Responsibility: Accepting the potential costs, duties, and
obligations for decisions (accepting the consequences of your decision)
– Accountability: means that mechanisms are in place to
determine who took the action, and who is responsible.
– Liability: Extends the concept of responsibility further to the area of
laws. It means a body of laws is in place that permits individuals to
recover the damages done to them by other actors.
– Due process: a process in which laws are known and
understood, and there is an ability to appeal to higher authorities to
ensure that the laws are applied correctly. Individuals can recover
damages done to them through a set of laws characterized by due
process.
Ethics in an Information Society

• Five-step ethical analysis


1. Identify and clearly describe the facts.
2. Define the conflict or dilemma and identify the
higher-order values involved.
3. Identify the stakeholders.
4. Identify the options that you can reasonably
take.
5. Identify the potential consequences of your
options.
Ethics in an Information Society
• Five-step ethical analysis
1.
Identify and clearly describe the facts: Find out who did what
to whom, and where, when, and how

2.
Define the conflict or dilemma and identify the higher-order
values involved: The parties to a dispute all claim to be
pursuing higher values, e.g. the need to improve health care
record keeping and the need to protect individual privacy

3.
Identify the stakeholders: players in the game who have an
interest in the outcome, who have invested in the situation,
Ethics in an Information Society
• Five-step ethical analysis
4.
Identify the options that you can reasonably take: arriving at
a good or ethical solution may not always be a balancing of
consequences to stakeholders.

5.
Identify the potential consequences of your options: Some
options may be ethically correct but disastrous from other
points of view. Other options may work in one instance but
not in other similar instances
Ethics in an Information Society

Once your analysis is complete, what ethical approaches or


rules should you use to make a decision?

Although you are the only one who can decide which among
many ethical principles you will follow, and how you will
prioritize them, it is helpful to consider some ethical
approaches with deep roots in many cultures that have
survived throughout recorded history, next slide
Ethics in an Information Society
• Candidate ethical approaches
– Golden Rule
• Do unto others as you would have them do unto
you, Putting yourself into the place of others
– Categorical Imperative
• If an action is not right for everyone to take, it is
not right for anyone. Ask yourself, “If everyone did
this, could the organization, or society, survive?
– Rule of Change
• If an action cannot be taken repeatedly, it is not right
to take at all. An action may bring about a small change
now that is acceptable, but if it is repeated, it would
bring unacceptable changes in the long run.
Ethics in an Information Society
• Candidate ethical principles (cont.)
– Utilitarian Principle
• Take the action that achieves the higher or greater value.
This rule assumes you can prioritize values in a rank order
and understand the consequences of various courses of
action
– Risk Aversion Principle
• Take the action that produces the least harm or potential
cost. Some actions have extremely high failure costs of
very low probability (e.g. building a nuclear generator)
– Ethical “No Free Lunch” Rule
• Assume that virtually all tangible and intangible objects
are owned by someone unless there is a specific
Ethics in an Information Society
• Professional codes of conduct
– Proclaimed by associations of professionals
• Examples: American Medical Association (AMA)
– Promises by professions to regulate themselves in the general
interest of society (e.g. avoiding harm to others)
– These professional groups take responsibility for the partial
regulation of their professions by determining entrance
qualifications and competence (put rules to be qualified).
• Real-world ethical dilemmas
– One set of interests pitted against another
• Example: right of company to maximize productivity of
workers versus workers right to use Internet for short
personal tasks, replacing people for technology,
reducing the size of workforce, etc.
Moral Dimensions –
Information Rights
• Information rights: privacy and freedom in the
Internet age
– Privacy:
• Claim of individuals to be left alone, free from surveillance
or interference from other individuals, organizations, or
state; claim to be able to control information about
yourself
• Information technology and systems threaten individual
claims to privacy

– In the United States, privacy protected by:


• First Amendment (freedom of speech)
• Fourth Amendment (unreasonable search and seizure)
• Additional federal statues (e.g., Privacy Act of 1974)
Moral Dimensions –
Information Rights
• Fair information practices (FIP):
– Set of principles governing the collection and use of information
• Basis of most U.S. and European privacy laws
• Based on mutuality of interest between record holder and
individual, once information is gathered by record holder, the
individual maintains an interest in the record, and the record may
not be used to support other activities without the individual’s
consent.
• Restated and extended by FTC (Federal Trade
Commission) in 1998 to provide guidelines for protecting
online privacy
– Used to drive changes in privacy legislation
• COPPA, Gramm-Leach-Bliley Act, HIPAA, Do-Not-Track Online Act
of 2011
Moral Dimensions –
Information Rights
• FTC FIP principles:
– Notice/awareness (core principle)
• Web sites must disclose practices before collecting data, e.g.
uses
of data; other recipients of data, etc.
– Choice/consent (core principle)
• Consumers must be able to choose how information is used
for secondary purposes.
– Access/participation
• Consumers must be able to review and contest accuracy
of personal data.
– Security
• Data collectors must take steps to ensure accuracy, security
of personal data.
– Enforcement
Moral Dimensions –
Information Rights
• European Directive on Data Protection:
– Companies must inform people that information is
collected and disclose how it is stored and used.
– Requires informed consent of customer.
– EU member nations cannot transfer personal data to
countries without similar privacy protection (e.g.,
the United States).
Moral Dimensions –
Information Rights
Moral Dimensions

Cookies are written by a Web site on a visitor’s hard drive. When the visitor
returns to that Web site, the Web server requests the ID number from the cookie
and uses it to access the data stored by that server on that visitor. The Web site
can then use these data to display personalized information.
Moral Dimensions –
Information Rights
>> Google has been using behavioral targeting to help it
display more relevant ads based on users’ search
activities.

>> One of its programs enables advertisers to target ads based on


the search histories of Google users, along with any other
information the user submits to Google that Google can obtain,
such as age, demographics, region, and other Web activities

>> Google has also been scanning the contents of messages


received by users of its free Web-based e-mail service called
Gmail. Ads that users see when they read their e-mail are related
to the subjects of these messages.
Moral Dimensions –
Information Rights
>> An opt-out model permits the collection of personal information until
the consumer specifically requests that the data not be collected.

>> Opt-in model of informed consent in which a business is prohibited


from collecting any personal information unless the consumer specifically
takes action to approve information collection and use.
Moral Dimensions –
Information Rights
• Besides legislations, there are
Technical
solutions to protect a user privacy:
– E-mail encryption
– Anti-spyware tools
– Browser features
• “Private” browsing
• “Do not track” options
– Overall, few technical solutions
Moral Dimensions –
Property Rights
• Property rights: Intellectual property
– Intellectual property: intangible property of any
kind created by individuals or corporations
– Information technology has made it difficult to
protect intellectual property because
computerized information can be so easily copied
or distributed on networks.
Moral Dimensions –
Property Rights
– Three main ways that intellectual property is
protected:
• Trade secret : intellectual work or
product belonging to business(e.g. formula for
Coke)
• Copyright : statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years (copyright of a photo, book)
• Patents : grants the owner an exclusive monopoly on
the ideas behind an invention for 20 years (Amazon’s
One Click shopping).
Moral Dimensions –
Property Rights
• Challenges to intellectual property rights
– Digital media different from physical media (e.g., books)
• Digital media differ from books, periodicals, and other media in terms
of ease of replication; ease of transmission; ease of alteration;
difficulty in classifying a software work as a program, book, or even
music; compactness—making theft easy; and difficulties in
establishing uniqueness.
• Mechanisms are being developed to sell and distribute
books, articles, and other intellectual property legally on
the Internet, and the Digital Millennium Copyright Act
(DMCA) of 1998 is providing some copyright protection.
Internet service providers (ISPs) are required to take down
sites of copyright infringers that they are hosting once they
are notified of the problem
Moral Dimensions –
Accountability, Liability, Control
• Accountability, liability, control
– Computer-related liability problems
• If software fails, who is responsible?
– If a person is injured by a machine controlled, in
part, by software, who should be held accountable
and, therefore, held liable?
– Uploading offensive material, responsibility of
website developers (e.g. youtube) or
broadcasters?
– In conclusion, it is difficult to ascribe liability to
software developers for the same reason that it is
difficult to ascribe a publisher liability for the
effects of a book.
Moral Dimensions –
System Quality
• System quality: Data quality and system errors
– Liability and accountability for unintentional
consequences lead the other moral dimension – System
Quality
– What is an acceptable, technologically feasible level
of system quality?
– Individuals and organizations may be held responsible for
avoidable and foreseeable consequences, which they have
a duty to perceive and correct. And the gray area is that
some system errors are foreseeable and correctable only
at very great expense, an expense so great that pursuing
this level of perfection is not feasible economically—no
one could afford the product (so in gray areas, what
should organizations do?).
Moral Dimensions –
System Quality
– Three principal sources of poor system
performance:
• Software bugs, errors
• Hardware failures
• Poor input data quality
Moral Dimensions –
Quality of Life
• Quality of life: Equity, access, boundaries-

Computers and information technologies


potentially can destroy valuable elements of
our culture and society even while they bring us
benefits.
Moral Dimensions –
Quality of Life
• Quality of life: Equity, access, boundaries-

Negative social consequences of systems

– Balancing power: centralized mainframe computers would


centralize power at corporate headquarters and in the nation’s
capital. However, the shift toward highly decentralized
computing, coupled with an ideology of empowerment of
thousands of workers, and the decentralization of decision making
to lower organizational levels, have reduced the fears of power
centralization in institutions.
Moral Dimensions –
Quality of Life
Negative social consequences of systems (cont.)

- Rapidity of change: Information systems have helped to


create much more efficient national and international
markets. However, businesses may not have enough time
to respond to global competition

- Maintaining boundaries: Technology impact the balance


between Family, Work, and Leisure

- Dependence and vulnerability: public and private


organizations ever more dependent on computer
systems, therefore, they are highly vulnerable if these
systems fail.
Moral Dimensions –
Quality of Life
Negative social consequences of systems (cont.)

- Computer crime and abuse


- Computer crime: illegal acts through use of computer or
against a computer system—computer may be object
or instrument of crime
- Computer abuse: unethical acts, not illegal
• Spam: high costs for businesses in dealing with
spam
• Spam is junk e-mail sent by an organization or individual to
a mass audience of Internet users who have expressed no
interest in the product or service being marketed
Moral Dimensions –
Quality of Life
Negative social consequences of systems (cont.)

- Employment:
• Reengineering work resulting in lost jobs

- Equity and access—the digital divide:


• Certain ethnic and income groups in the United States less
likely to have computers or Internet access. For
example: A similar digital divide exists in U.S. schools, with
schools in high- poverty areas less likely to have computers,
high-quality educational technology programs, or Internet
access availability for their students.
Moral Dimensions –
Quality of Life
Negative social consequences of systems (cont.)

- Health risks:
• Repetitive stress injury (RSI)
– Largest source is computer keyboards
– Carpal tunnel syndrome (CTS)
• Computer vision syndrome (CVS)
– Eyestrain and headaches related to screen use
• Technostress
– Aggravation, impatience, fatigue
Source:

>> Management Information Systems,


Managing the Digital Firm, 13 Edition (2014),
Laudon and Laudon.

48

You might also like