MIS, 11e
Module 4: Personal, Legal, Ethical, and Organizational Issues
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives (1 of 2)
By the end of this module, you should be able to:
4.1 Discuss information privacy and methods for improving the privacy of information.
4.2 Explain the General Data Protection Regulation.
4.3 Explain the privacy issues of e-mail and data collection in a business setting.
4.4 Examine ethical issues and censorship in information technology.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives (2 of 2)
By the end of this module, you should be able to (continued):
4.5 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.
4.6 Examine the impact of information technology on society: the digital divide, telecommuting, and health issues.
4.7 Describe green computing and the ways it can improve the quality of the environment.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (1 of 6)
Ethical issues related to social media:
Fake News – a story or hoax to misinform or deceive people.
Cheap fakes
Misinformation
Disinformation
Deepfakes – fake videos or audio recordings that look and sound just like the real thing.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (2 of 6)
Information about people is stored on various databases
Example: Experian, Equifax, TransUnion
Social Security numbers – to link databases
Federal laws regulate the collection and use of information on people and corporations
1970 Fair Credit Reporting Act
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (3 of 6)
Web and network privacy
Acceptable use policy – Set of rules specifying legal and ethical use of a system and consequences of noncompliance
Accountability – Issues involving both the user’s and the organization’s responsibilities and liabilities
Nonrepudiation – Method for binding all the parties to a contract
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (4 of 6)
Guidelines to minimize invasion of privacy
Use Web sites with privacy policies that are easy to find, read, and understand
Limit access to personal information
Ensure data’s reliability and take precautions to prevent misuse of the data
Ensure data collection has a stated purpose
Must consent to use information for other reasons
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (5 of 6)
Guidelines to minimize invasion of privacy (continued)
Must verify data accuracy and only collected what is needed.
Records must be accurate, and users are able to edit or change
Record-keeping systems should not be secret
Must be able to prevent unauthorized access and misuse of data
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Issues (6 of 6)
Federal data protections
Health Insurance Portability and Accountability Act (HIPAA)
Fair and Accurate Credit Transaction Act (FACTA)
Children’s Online Privacy Protection Act (COPPA)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
General Data Protection Regulation (1 of 3)
Laws that protect European Union (EU) citizens’ personal data
Genetic data
Racial or ethnic origin
Religious beliefs
Goal: Consistent protection of consumer and personal data across EU nations
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
General Data Protection Regulation (2 of 3)
Key components:
User consent
Anonymized data
Data breach notifications within 72 hours
Safe transfer of data across borders
Appointment of a GDPR compliance officer (for certain companies)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
General Data Protection Regulation (3 of 3)
Business benefits:
Improved consumer confidence
Better data security
Reduced maintenance by retiring legacy applications
Better alignment with evolving technology
Better decision making from effective use of customer information
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Privacy Concerns
Spam - unsolicited e-mail sent for advertising purposes
Sent in bulk using automated mailing software
Spammers sell their address lists
Ease of access
Assume others will have access to your messages
Any e-mails sent on company-owned computers are the property of the organization
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Collection on the Web (1 of 3)
Online shopping in increasing because of convenience, choices, and lower prices.
Some shoppers avoid online shopping because of
Online hackers
Selling of personal information to telemarketing firms
Users' information can be combined with other information and technologies to produce new information
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Collection on the Web (2 of 3)
Cookies - small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive
Used for welcoming new and returning users
Used to remember information for ordering
Helps Web sites customize pages for users
A cookie manager can disable cookies, if needed.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Data Collection on the Web (3 of 3)
Log files – a record of a user’s actions on a Web site
Generated by Web server software
Can help determine cases of identity misrepresentation on Web sites
Data is not always accurate as users can misrepresent themselves
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-1
Which of the following federal regulations protect children's online privacy?
FACTA
HIPAA
COPPA
GDPR
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-1: Answer
Which of the following federal regulations protect children's online privacy?
Answer: COPPA
Children’s Online Privacy Protection Act (COPPA)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Ethical Issues of Information Technologies
Information technology offers opportunities for unethical behavior because its easy to collect and disseminate information
Increase in cybercrime, cyber fraud, identity theft, and intellectual property theft
Nearly 15 million U.S. residents’ identities stolen every year
One identity stolen every two seconds; average loss of $3,500.26
Business identity theft: financial fraud, tax fraud, Web site defacement, and trademark ransom.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discussion Activity 1-1
You make two copies of a software package you just bought and sell one to a friend.
A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.
Review the following situation to determine where they fall within the ethical vs legal grid.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discussion Activity 1-1 Debrief
You make two copies of a software package you just bought and sell one to a friend.
Answer: Quadrant IV
Explanation: It is illegal and unethical.
A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.
Answer: Quadrant I
Explanation: It is legal and ethical.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Network Ethics (1 of 3)
Social media networking ethics - open and fair access to all users
Authenticity – members are trustworthy and sincere
Transparency – members are honest and open with no hidden agenda
Communication – members are open to knowing other members and communicate openly.
Business network ethics – open and fair access to all users
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Network Ethics (2 of 3)
Business media networking ethics - open and fair access to all users that includes the following types of networks:
Utilitarian networking – is a true utility, truthful, and is not wasting its users’ time.
Emotional networking – able to empathize with being ethical in all situations; emotion has no role
Virtuous networking – all parties will act in good faith
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Network Ethics (3 of 3)
Digital citizenship – using information technology safely, ethically, and responsibly.
7 principles to good digital citizenship:
Online etiquette
Privacy protection
Know how to stay safe online
“Dos and don’ts” of information technology
Protecting and respecting intellectual property
Understanding one’s digital footprint
• Healthy usage patterns
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Censorship (1 of 2)
Two types of information on the Web:
Public information - posted by an organization or public agency
Censored for public policy reasons (i.e., military secrets)
Censored if offensive to a political, religious, or cultural group
Private information - posted by a person
Not censored because of constitutional freedom of expression
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Censorship (2 of 2)
Restricting access to the Web
Countries like China, Myanmar (Burma), and Singapore restrict or forbid their citizens’ access to the Web
Parents may restrict Web access for children using software
Examples: CyberPatrol, CYBERSitter, Net Nanny, and SafeSurf
Some Web browsers have built-in features to protect children
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (1 of 5)
Intellectual Property – a legal umbrella covering two categories of protections:
Industrial Property: inventions, copyrights, trademarks, logos, industrial designs, etc.
Copyright material: literary and artistic works
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (2 of 5)
Copyrights – protects tangible material and
Online materials (web pages and HTML code)
Computer graphics (printed or saved on a storage device)
Trademarks – protects product names and identifying marks (i.e., logos)
Trade secrets – protects ideas, information, and innovations
Patents – protects new processes
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (3 of 5)
Patent Benefits
Generates revenue through licensing
Attracts funding for further research and development
Keeps competitors from entering certain market segments
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (4 of 5)
1980 revisions to the Copyright Act of 1976
Liability for unauthorized duplication and use of copyrighted programs
Laws covering legal issues related to information technologies in the U.S.
Telecommunications Act of 1996
Communications Decency Act (CDA)
Laws against spamming
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Intellectual Property (5 of 5)
Cybersquatting (aka domain squatting)
Registering, selling, or using a domain name to profit from someone else’s trademark
Typosquatting (aka URL hijacking)
Relies on typographical errors made by Web users
Typing goggle.com instead of google.com
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Social Divisions and the Digital Divide
Digital divide: information-rich vs the information-poor
Many people still cannot afford computers
“Red-lining” – companies prioritize fiber-optic high-speed Internet within high-income communities.
Schools help with loaner programs providing portable computers to students
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-2
Which of the following is an example of a patent?
Online video promotion
Nike brand
McDonald’s logo
Bluetooth
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 4-2: Answer
Which of the following is an example of a patent?
Answer: Bluetooth
Patents protect new processes like an invention. Bluetooth was invented in 1994 by Jaap Haartsen. Bluetooth technology connects nearby electronic devices using low-power, ultra-high-frequency waves.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Impact of Information Technology in the Workplace (1 of 2)
Increased consumers’ purchasing power
Results in a stronger economy by reducing production costs
Information technologies directly affect the nature of jobs
Telecommuting (or virtual work) allows people to work from home
“Job deskilling” – skilled labor is eliminated with high technology
“Job upgrading” – i.e., clerical work use word processing software
One skilled person can now do multiple jobs
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Impact of Information Technology in the Workplace (2 of 2)
Virtual organizations: networks of independent companies, suppliers, customers, and manufacturers
Share skills and cost
Have access to each other’s markets
Benefits:
Focus on what each company does best
Companies can respond faster and efficiently
Reduced product development
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Information Technology and Health Issues (1 of 5)
Increasing popularity of touchscreens
May result in stress-related injuries of the hands, arms, back, and eyes
Text neck: neck pain and damage caused from looking down frequently
Major negative impacts:
Teen tendinitis
Stress
Sleep loss
Accidents
Increased anxiety
Cyberbullying
Risk of cancer
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Information Technology and Health Issues (2 of 5)
Major negative impacts:
Teen tendinitis
Stress
Sleep loss
Accidents
Increased anxiety
Cyberbullying
Risk of cancer
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Information Technology and Health Issues (3 of 5)
Health problems related to computer equipment
Vision problems
Musculoskeletal problems
Skin problems
Reproductive problems
Stress-related problems (headaches, depression)
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Information Technology and Health Issues (4 of 5)
Health/emotional well-being of children
Feel “hidden sadness” when parents spend too much time on smartphones
Children do not receive time or attention
Five types of Internet addiction:
Cybersexual -Gaming
Web compulsions -Information seeking
Cyber-relationships
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Information Technology and Health Issues (5 of 5)
Distracted walking - walking while using a smartphone
11,000 injuries a year in U.S. alone
259 selfie deaths in a six-year period
Recommendations to overcoming these technology addictions:
Admit there is a problem
Limit / schedule your usage
Socialize more
Change communication patterns
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Green Computing (1 of 3)
Green Computing – involves the design, manufacture, use, and disposal of information technology devices
Promotes a sustainable environment; help to combat global warming
Requires the cooperation of private and public sectors
Implementation approaches:
-Green design -Green use
-Green manufacturing -Green disposal
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Green Computing (2 of 3)
Ways to achieve green computing:
Design products that last longer and are modular in design
Design search engines and computing routines that are fast and energy-efficient
Replace underutilized small servers with one large server; virtualization
Use devices that consume less energy and are biodegradable
Allow certain employees to work from home
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Green Computing (3 of 3)
Ways to achieve green computing (continued):
Conduct meetings over computer networks
Use video conferencing and electronic meeting systems.
Use a virtual world
Use cloud computing
Turn off idle PCs; recycle computer materials
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Self Assessment
How much personal information do you feel is publicly available as a result of your Internet presence? Is it good or bad?
In what ways can you help improve your personal health as you use or work with information technology ?
How can you personally contribute to the effort of green computing in your everyday life?
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (1 of 2)
Now that the lesson has ended, you should be able to:
4.1 Discuss information privacy and methods for improving the privacy of information.
4.2 Explain the General Data Protection Regulation.
4.3 Explain the privacy issues of e-mail and data collection in a business setting.
4.4 Examine ethical issues and censorship in information technology.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (2 of 2)
Now that the lesson has ended, you should be able to (continued):
4.5 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.
4.6 Examine the impact of information technology on society: the digital divide, telecommuting, and health issues.
4.7 Describe green computing and the ways it can improve the quality of the environment.
Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
‹#›
©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
image3.png
image5.png
image6.jpg
image7.png

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com