Chapter 9 - Chapter 9 information system ethics 1....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 9 information system ethics 1. Information age Ω Luddites resorted to protesting against the technology; some others even resorted to destroying the technology that they felt threatened their livelihoods Ω information age a period of change Toffler has dubbed the "third wave". 2. Computer literacy and the digital divide Ω computer literacy (information literacy) the difference between being employed and being unemployed open up myriad sources of information to those who have learned how to use the computer as a device to gather, store, organize and otherwise process information because we not only do computers at work, but also used in our personal life therefore Ω computer fluency the ability t independently learn new technology as they emerge and assess their impact on your work and life is what will set you apart in the future Ω digital divide the gap between those individuals in our society who are computer literate and have access to information resources like the Internet and those who do not Ω One Laptop per Child (OLPC) attempting to distribute very low-cost laptop computer to children in developing countries around the world the goal to price these computer at $100 each for governments and charitable organizations to purchase and distribute Ω neo-Luddites fearing negative impacts such as social decay, increased consumerism, or loss of privacy Ω computer ethics used to describe the issues and standards of conduct as they pertain to the use of information system 3. Information privacy Ω concerned with what information an individual should have to reveal to others in the workplace or through other transactions e.g. Online shopping
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Ω identity theft the stealing of another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never paid solutions in the government and private sector, is to change practices used to verify a person's identity personal identification e.g. Biometrics, encryption maintain privacy on line choose web sites that are monitored by independent organizations avoid having "cookies" left on your machine visit sites anonymously use caution when requesting confirmation e-mail 4. Information accuracy Ω concerned with ensuring the authenticity and fidelity of information as well
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/02/2012 for the course INFS 1602 taught by Professor Bradley during the Three '12 term at University of New South Wales.

Page1 / 6

Chapter 9 - Chapter 9 information system ethics 1....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online