Ethical Risks and Responsibilities of IT Innovations

User Generated

Enwevz

Computer Science

Description

Ethical Risks and Responsibilities of IT Innovations. Chapter 14 - Ethical Risks and Responsibilities of IT Innovations.pptx Draft an IT policy to protect the security and privacy of users of websites that collect personal information to make buying recommendations. The policy should be about 3 paragraphs. (A paragraph should have at least 3 sentences: beginning, middle, and end.) Do NOT copy an existing policy, but reference examples of existing policies that helped you craft your own policy.

Unformatted Attachment Preview

Chapter 14 Ethical Risks and Responsibilities of IT Innovations Prepared by Dr. Derek Sedlack, South University Learning Objectives Privacy Paradox, Privacy, and Civil Rights Responsible Conduct Six Technology Trends Transforming Business Technology Addictions and the Emerging Trend of Focus Management Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights • Privacy – Right, or freedom of choice and control to selfdetermine what information about you is made accessible, to whom, when, and for what use or purpose. • Breach of Privacy – Unauthorized disclosure of personal information. • Privacy Paradox – Phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights • Social Recruitment – Use of social media to engage, share knowledge among, and recruit and hire employees. – Often involving information the candidate did not want considered (or is illegal) to use in the hiring process. – Best practice provisions are: 1. Have either a third party or a designated person within the company who does not make hiring decisions do the background check. 2. Use only publicly available information. Do not friend someone to get access to private information. 3. Do not request username or passwords for social media accounts. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights • EEOC (Equal Employment Opportunity Commission) – Enforces federal laws prohibiting discrimination in employment. • Protected classes – Characteristics identified by law that cannot be used in the hiring process. • Discrimination – Biased or prejudicial treatment in recruitment, hiring, or employment based on certain characteristics, such as age, gender, and genetic information, and is illegal in the United States. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights • Corporate Social Media Discrimination – The use of protected class information to weed out candidates. • Civil Rights – Rights protected by federal law, such as freedom of speech, press, and assembly; the right to vote, etc. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights • Completing Legal Concerns – Two competing legal concerns are discrimination & negligent hiring. • Social Media Discrimination – Visiting a person’s social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices. • Negligent Hiring – If a workplace violence incident occurred and the attacker’s public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights • Balancing the Competing Risks of Negligent Hiring and Social Discrimination 1. Ask candidates to sign a disclosure statement • Allow self-disclosure 2. Create a standard process and document it • Consistent well-documented processes 3. Avoid coercive practices • Eliminate recruiter pressure for applicant disclosure 4. Training • Emphasize related compliance Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Privacy Paradox, Privacy, and Civil Rights 1. Describe privacy. 2. What is the phenomenon where social users are concerned about privacy but their behaviors contradict these concerns? 3. What is the use of social media to find, screen, and select job candidates? 4. Rejecting a job candidate because of concerns about the person’s health from information on his or her Facebook page is an example of what? 5. Age, disability, gender, religion, and race are examples of what? 6. Why are the legal concepts of discrimination and negligent hiring competing demands on a business? Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Learning Objectives Privacy Paradox, Privacy, and Civil Rights Responsible Conduct Six Technology Trends Transforming Business Technology Addictions and the Emerging Trend of Focus Management Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct Too Much Data? • Big Data Analytics – It is possible to identify personal habits and identify patterns before self-disclosure, such as pregnancy. – Targeting shoppers early in a cycle may improve sales opportunities. – Legal and social acceptability may be similar, but they may be different. Legal compliance may not translate to acceptable behavior. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct Irresponsible Conduct • Predicting People’s Behavior – Predicting people’s behavior is big business, but companies may face backlash from customers or be subject to investigations or fines (Wi-Spy). • Mobile Apps and Risky Behaviors – 93% top 200 free iOS & Andriod apps exhibited at least one risky behavior. – Apple policy prohibits user information gathering without permission, but countless 3rd party apps are unregulated. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct Irresponsible Conduct • Risky Behaviors 1. Location tracking 2. Accessing the device’s address book or contact list 3. Identifying user or phone unique identifier (UDID) 4. Recording in-app purchases 5. Sharing data with ad networks and analytics companies Twitter, Foursquare, and Instagram routinely gather information from personal address books and other places on your phone. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct Irresponsible Conduct • Wardriving – Driving around sniffing out and mapping the physical location of the world’s Wi-Fi routers (see WiSpy). • Open Wi-Fi Networks – Non-password protected routers that provide access over wireless networks. – The FCC posted, “…collecting information sent over Wi-Fi networks clearly infringes on consumer privacy.” Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct Irresponsible Conduct • FTC vs. Facebook – The only way Facebook’s business works is if they can track what you do and sell that information to advertisers. – Is privacy expected? – Should it be protected? Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct • Competing Responsibilities – Intense competition demands using every tool or technique to gain an edge or nullify a risk. – Personal data collection while in most public spaces allows retailers, through predictive analytics, to better understand customers. – Data collection and monitoring mean better business, but also less privacy, and slow-changing laws means legal limitations. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct • 3D Printing – Depositing tiny layers of material to create computer-assisted design and/or computer-assisted manufacturing blueprints. • Bioprinting – Using DNA to 3D print human body parts using bioprinting technology. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct • 3D Printing Dilemmas and Debated Issues – 3D-bioprinted human organs may be subject to conflicting religious, political, moral, and financial interests. – 3D printers can exert impacts on the environment worse than those of standard manufacturing. – The technology will create new business models and major challenges to intellectual property. – The risks resulting from the ability to 3D print weapons are obvious. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Responsible Conduct 1. By avoiding illegal conduct, do companies also act responsibly? Explain your answer. 2. What types of companies can benefit from predicting people’s behavior? 3. When is predicting people’s behavior a violation of privacy? Give an example. 4. When is predicting people’s behavior not a violation of privacy? Give an example. 5. What are the ethical challenges attached to 3D printing and 3D bioprinting? 6. Research the current debate about 3D printing and bioprinting. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Learning Objectives Privacy Paradox, Privacy, and Civil Rights Responsible Conduct Six Technology Trends Transforming Business Technology Addictions and the Emerging Trend of Focus Management Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Technology Addictions and the Emerging Trend of Focus Management • Cognitive Overload – Interferes with our ability to focus and be productive. – Potential modern causes: • Mobile apps • Wearable technology • Constant updates • Desire to stay connected Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Technology Addictions and the Emerging Trend of Focus Management • Focus Counts – An inability to concentrate for longer periods reduces an ability to distinguish important information from trivia. – Some researchers estimate that distraction costs hundreds of billions of dollars a year in lost productivity. – Heavy online users (media high multitaskers) scored poorly on the cognitive test. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Technology Addictions and the Emerging Trend of Focus Management • Focus Recovery – Lost focus can take about 25 minutes recovery time. – Noradrenaline, a chemical that helps us concentrate, is released by focusing. – The best strategy to improve focus: practice doing it. – There is disagreement if multitaskers are working as well as they could, or they could improve their focus. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Technology Addictions and the Emerging Trend of Focus Management 1. What are several potential causes of cognitive overload? 2. What are the consequences of constant distractions? 3. When a person is distracted, how long does it take to return to the task at hand and get focused again? 4. Why are senior managers interested in focus management? 5. What is the difference between the performance of high and low multitaskers on cognitive tests? 6. How can multitaskers improve their ability to focus? Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Learning Objectives Privacy Paradox, Privacy, and Civil Rights Responsible Conduct Six Technology Trends Transforming Business Technology Addictions and the Emerging Trend of Focus Management Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business • The physical–digital blur signifies a new layer of connected intelligence that augments employees, automates processes, and integrates machines into our lives. • Converging Technologies – The explosion of connected M2M (machine-tomachine) devices and IoT (Internet of Things) – Greater bandwidth – Advanced robotics, including expanding human– robot collaboration in industries beyond manufacturing – Increased use of real time analytics Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business • Crowdsourcing – Access or leverage of talent and/or resource pools located anywhere and everywhere through cloud, social, and collaboration technologies (Wikipedia). • Crowdfunding – Using crowdsourcing to monetize a project or idea (Kickstarter). – Accenture developed initial models that show that crowdsourcing can lead to higher profits for producers. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business • Data Supply Chain – Treating data like a supply chain, flowing easily through the entire organization. – Requires data storage, IT infrastructure, big data platforms, and APIs. • Hyperscale – The supersized, scalable, and resilient data centers pioneered by data-dependent and social media companies. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business • Apps Drive Business? – 54% of the highest performing IT teams deployed enterprise app stores. – Adopting apps create better operational agility. – Apps make life simpler for employees and accelerate business growth. • Isolation – Failure in one component cannot bring down the entire edifice. • Redundancy – every component is backed up by an alternative in case it fails. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business • Next…More Disruptive Disruption – High-performing business leaders now accept that their organizations’ future success is tied to their ability to keep pace with technology. – Technology is more important than ever to their business success. – The flexibility of new technologies and architectures will naturally change how IT makes it easier for organizations to innovate. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Chapter 14 Six Technology Trends Transforming Business 1. What technologies are blurring the boundary between the physical and digital worlds? 2. What are the benefits of crowdsourcing? 3. Referring to trend 3, how should companies treat their data? 4. What is hyperscale? 5. What do business apps improve? 6. Why is resilience necessary? Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: POLICIES TO ENSURE SAFETY AND PRIVACY OF INTERNET USERS

Policies to Ensure Safety and Privacy of Internet Users
Student’s Name
Institutional Affiliation

POLICIES TO ENSURE SAFETY AND PRIVACY OF INTERNET USERS

2

Introduction
In the world of information and technology, use of online communication is inevitable.
Moreover, the business sector has substantially shifted to online trade typically referred to as ecommerce. As a result, many companies or firms are not only selling their goods and services
online but also hiring their workforce online (Livingstone, Haddon, Görzig & Ólafsson, 2011).
However, it should be noted that ethical consideration ought to be put in place to ensure the
safety and private of the intent user, in particular on the candidates. This policy paper focuses on
two of such provisions. These include social media recruitment and balancing social media
discrimination and negligent hiring.
Social Media Recruitment
The recruitment involves the use social media to engage, share knowledge among, and
recruit and hire workers. The process includes the data that the candidates do not regard to be
sued as part of the recruitment process. The ...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags