Managing Information Technology

(Frankie) #1

592 Part IV • The Information Management System


Discussion Questions

1.Suppose you are the victim of an identity thief who continues
to use your identity and to ruin your credit rating after you
have discovered the problem. What problems do you have in
clearing your name? How could the laws be changed to help
you in this process?
2.Some people believe that “access to computers should be un-
limited and total” and that “all information should be free.”
Do you agree with these statements? Why or why not?
3.Spam on the Internet is a growing problem. Why is spam so
attractive to some marketers? To what degree can spam be
controlled by laws? Are there other ways that spam might be
controlled? How?
4.What do we mean by “intellectual property”? What are the
differences between intellectual property and real property?
Should someone be able to own intellectual property? Why
or why not?
5.The U.S. Patent Office is granting patents on computer
processes such as Amazon’s “one-click ordering.” Should
patents be granted on such computer-supported business
processes? Why or why not?

6.In your opinion, what is the most important social issue
raised by the pervasiveness of IT? Why? How can society
best deal with this issue?
7.The RIAA asserts that downloading copyrighted music on
the Internet without paying for it is stealing, but lots of peo-
ple are doing it. Is this ethical? Why or why not? If this is not
ethical, why are so many people doing it?
8.In the United States, information that a company collects
about the customer is legally the company’s property. In the
European Union, this information is the individual’s property.
Explain why there is this difference in the legal treatment of
this information.
9.In order to protect against terrorists, the U.S. government is
collecting more and more data on individuals into comprehen-
sive databases. Have you any concerns about this? Why or why
not?
10.Although this practice might invade individual privacy, many
companies use IT to measure the quality and quantity of an
employee’s work. Discuss the ethical implications of this
practice.

Bibliography

Anderson, Ronald E. 1992. “ACM code of ethics and profession-
al conduct.” Communications of the ACM 35 (May): 94–99.
Web site, doi.acm.org/10.1145/129875.129885
Associated Press. 1997. “Survey: Bosses watching workers.” The
Bloomington Herald-Times 120 (May 5): A3.
Baase, Sara. 1997. A Gift of Fire—Social, Legal, and Ethical
Issues in Computing. Upper Saddle River, NJ: Prentice Hall.
Baron, David P. 2000. “DoubleClick and Internet privacy.” Case
Number P-32, Graduate School of Business, Stanford
University.
Berman, Dennis K. 2003. “Online laundry: Government posts
Enron’s e-mail.” The Wall Street Journal(October 6).
Berry, Jonathan, John Verity, Kathleen Kerwin, and Gail
DeGeorge. 1994. “Database marketing.” BusinessWeek
(September 5): 56–62.
Business Software Alliance and International Data Corporation.



  1. “Seventh annual BSA and IDC global software piracy
    study.” Business Software Alliance Web site,
    portal.bsa.org/globalpiracy2009/index.html(May).
    CBS News. 2005. “An identity theft nightmare: Victim still
    battling his creditors four years later.” CBS News Web site,
    http://www.cbsnews.com/stories/2005/02/25/eveningnews/
    consumer/main676597.shtml. Hartford, CT (February 25).
    DeBell, Matthew, and Chris Chapman. 2006. “Computer and
    Internet use by students in 2003.” National Center for
    Education Statistics Web site, nces.ed.gov/pubsearch/
    pubsinfo.asp?pubid=2006065(September).
    DeGeorge, Richard T. 2005. Business Ethics, 6th ed. Upper
    Saddle River, NJ: Pearson Prentice Hall.


Fellows, Deborah. 2007. “Spam 2007.” Pew Internet & American
Life Project Web site, http://www.pewinternet.org/topics/Email.
aspx(May 23).
Gotterbarn, Don, Keith Miller, and Simon Rogerson. 1999.
“Software engineering code of ethics is approved.”
Communications of the ACM42 (October): 102–107. Web
site,doi.acm.org/10.1145/317665.317682
Grossman, Lev. 2003. “It’s all FREE!” Time(May 5): 61.
Grupe, Fritz H., William Kuechler, and Scot Sweeney. 2003.
“Dealing with data privacy protection: An issue for the twenty-
first century,” in Carol V. Brown and Heikki Topi (eds.) IS
Management Handbook. Boca Raton, FL: Auerbach, 697–713.
Hamm, Steve, Jay Greene, Cliff Edwards, and Jim Kerstetter.


  1. “Epidemic.” BusinessWeek(September 8): 28.
    Hibberd, James. 2007. “Top fall pilots leaked online.” TV Week
    Web site, http://www.tvweek.com/news/2007/07/top_fallpilots
    leaked_online.php(July 29).
    Horrigan, John. 2009. “Wireless Internet use.” Pew Internet &
    American Life Project Web site, http://www.pewinternet.org/
    Reports/2009/12-Wireless-Internet-Use.aspx(July 22).
    IFPI. 2003. “The recording industry commercial piracy report
    2003.” International Federation of the Phonographic Industry
    Web site, http://www.ifpi.org/content/library/piracy2003.pdf.
    IFPI. 2009. “IFPI publishes digital music report 2009.” International
    Federation of the Phonographic Industry Web site, http://www.ifpi.org/
    content/section_resources/dmr2009.html(January 16).
    Internet World Stats. 2010. “Internet usage statistics—the big picture.”
    Internet World Stats Web site, http://www.internetworldstats.com/
    stats.htm(March).

Free download pdf