MIS, 11e

Module 4: Personal, Legal, Ethical, and Organizational Issues

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Module Objectives (1 of 2)

By the end of this module, you should be able to:

4.1 Discuss information privacy and methods for improving the privacy of information.

4.2 Explain the General Data Protection Regulation.

4.3 Explain the privacy issues of e-mail and data collection in a business setting.

4.4 Examine ethical issues and censorship in information technology.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Module Objectives (2 of 2)

By the end of this module, you should be able to (continued):

4.5 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.

4.6 Examine the impact of information technology on society: the digital divide, telecommuting, and health issues.

4.7 Describe green computing and the ways it can improve the quality of the environment.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (1 of 6)

Ethical issues related to social media:

Fake News – a story or hoax to misinform or deceive people.

Cheap fakes

Misinformation

Disinformation

Deepfakes – fake videos or audio recordings that look and sound just like the real thing.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (2 of 6)

Information about people is stored on various databases

Example: Experian, Equifax, TransUnion

Social Security numbers – to link databases

Federal laws regulate the collection and use of information on people and corporations

1970 Fair Credit Reporting Act

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (3 of 6)

Web and network privacy

Acceptable use policy – Set of rules specifying legal and ethical use of a system and consequences of noncompliance

Accountability – Issues involving both the user’s and the organization’s responsibilities and liabilities

Nonrepudiation – Method for binding all the parties to a contract

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (4 of 6)

Guidelines to minimize invasion of privacy

Use Web sites with privacy policies that are easy to find, read, and understand

Limit access to personal information

Ensure data’s reliability and take precautions to prevent misuse of the data

Ensure data collection has a stated purpose

Must consent to use information for other reasons

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (5 of 6)

Guidelines to minimize invasion of privacy (continued)

Must verify data accuracy and only collected what is needed.

Records must be accurate, and users are able to edit or change

Record-keeping systems should not be secret

Must be able to prevent unauthorized access and misuse of data

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Privacy Issues (6 of 6)

Federal data protections

Health Insurance Portability and Accountability Act (HIPAA)

Fair and Accurate Credit Transaction Act (FACTA)

Children’s Online Privacy Protection Act (COPPA)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

General Data Protection Regulation (1 of 3)

Laws that protect European Union (EU) citizens’ personal data

Genetic data

Racial or ethnic origin

Religious beliefs

Goal: Consistent protection of consumer and personal data across EU nations

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

General Data Protection Regulation (2 of 3)

Key components:

User consent

Anonymized data

Data breach notifications within 72 hours

Safe transfer of data across borders

Appointment of a GDPR compliance officer (for certain companies)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

General Data Protection Regulation (3 of 3)

Business benefits:

Improved consumer confidence

Better data security

Reduced maintenance by retiring legacy applications

Better alignment with evolving technology

Better decision making from effective use of customer information

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

E-mail

Privacy Concerns

Spam - unsolicited e-mail sent for advertising purposes

Sent in bulk using automated mailing software

Spammers sell their address lists

Ease of access

Assume others will have access to your messages

Any e-mails sent on company-owned computers are the property of the organization

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Data Collection on the Web (1 of 3)

Online shopping in increasing because of convenience, choices, and lower prices.

Some shoppers avoid online shopping because of

Online hackers

Selling of personal information to telemarketing firms

Users' information can be combined with other information and technologies to produce new information

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Data Collection on the Web (2 of 3)

Cookies - small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive

Used for welcoming new and returning users

Used to remember information for ordering

Helps Web sites customize pages for users

A cookie manager can disable cookies, if needed.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Data Collection on the Web (3 of 3)

Log files – a record of a user’s actions on a Web site

Generated by Web server software

Can help determine cases of identity misrepresentation on Web sites

Data is not always accurate as users can misrepresent themselves

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-1

Which of the following federal regulations protect children's online privacy?

FACTA

HIPAA

COPPA

GDPR

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-1: Answer

Which of the following federal regulations protect children's online privacy?

Answer: COPPA

Children’s Online Privacy Protection Act (COPPA)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Ethical Issues of Information Technologies

Information technology offers opportunities for unethical behavior because its easy to collect and disseminate information

Increase in cybercrime, cyber fraud, identity theft, and intellectual property theft

Nearly 15 million U.S. residents’ identities stolen every year

One identity stolen every two seconds; average loss of $3,500.26

Business identity theft: financial fraud, tax fraud, Web site defacement, and trademark ransom.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discussion Activity 1-1

You make two copies of a software package you just bought and sell one to a friend.

A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.

Review the following situation to determine where they fall within the ethical vs legal grid.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discussion Activity 1-1 Debrief

You make two copies of a software package you just bought and sell one to a friend.

Answer: Quadrant IV

Explanation: It is illegal and unethical.

A supervisor fires a programmer who has intentionally spread viruses to the organization’s network.

Answer: Quadrant I

Explanation: It is legal and ethical.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Computer Network Ethics (1 of 3)

Social media networking ethics - open and fair access to all users

Authenticity – members are trustworthy and sincere

Transparency – members are honest and open with no hidden agenda

Communication – members are open to knowing other members and communicate openly.

Business network ethics – open and fair access to all users

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Computer Network Ethics (2 of 3)

Business media networking ethics - open and fair access to all users that includes the following types of networks:

Utilitarian networking – is a true utility, truthful, and is not wasting its users’ time.

Emotional networking – able to empathize with being ethical in all situations; emotion has no role

Virtuous networking – all parties will act in good faith

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Computer Network Ethics (3 of 3)

Digital citizenship – using information technology safely, ethically, and responsibly.

7 principles to good digital citizenship:

Online etiquette

Privacy protection

Know how to stay safe online

“Dos and don’ts” of information technology

Protecting and respecting intellectual property

Understanding one’s digital footprint

• Healthy usage patterns

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Censorship (1 of 2)

Two types of information on the Web:

Public information - posted by an organization or public agency

Censored for public policy reasons (i.e., military secrets)

Censored if offensive to a political, religious, or cultural group

Private information - posted by a person

Not censored because of constitutional freedom of expression

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Censorship (2 of 2)

Restricting access to the Web

Countries like China, Myanmar (Burma), and Singapore restrict or forbid their citizens’ access to the Web

Parents may restrict Web access for children using software

Examples: CyberPatrol, CYBERSitter, Net Nanny, and SafeSurf

Some Web browsers have built-in features to protect children

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (1 of 5)

Intellectual Property – a legal umbrella covering two categories of protections:

Industrial Property: inventions, copyrights, trademarks, logos, industrial designs, etc.

Copyright material: literary and artistic works

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (2 of 5)

Copyrights – protects tangible material and

Online materials (web pages and HTML code)

Computer graphics (printed or saved on a storage device)

Trademarks – protects product names and identifying marks (i.e., logos)

Trade secrets – protects ideas, information, and innovations

Patents – protects new processes

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (3 of 5)

Patent Benefits

Generates revenue through licensing

Attracts funding for further research and development

Keeps competitors from entering certain market segments

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (4 of 5)

1980 revisions to the Copyright Act of 1976

Liability for unauthorized duplication and use of copyrighted programs

Laws covering legal issues related to information technologies in the U.S.

Telecommunications Act of 1996

Communications Decency Act (CDA)

Laws against spamming

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Intellectual Property (5 of 5)

Cybersquatting (aka domain squatting)

Registering, selling, or using a domain name to profit from someone else’s trademark

Typosquatting (aka URL hijacking)

Relies on typographical errors made by Web users

Typing goggle.com instead of google.com

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Social Divisions and the Digital Divide

Digital divide: information-rich vs the information-poor

Many people still cannot afford computers

“Red-lining” – companies prioritize fiber-optic high-speed Internet within high-income communities.

Schools help with loaner programs providing portable computers to students

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-2

Which of the following is an example of a patent?

Online video promotion

Nike brand

McDonald’s logo

Bluetooth

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Knowledge Check Activity 4-2: Answer

Which of the following is an example of a patent?

Answer: Bluetooth

Patents protect new processes like an invention. Bluetooth was invented in 1994 by Jaap Haartsen. Bluetooth technology connects nearby electronic devices using low-power, ultra-high-frequency waves.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

The Impact of Information Technology in the Workplace (1 of 2)

Increased consumers’ purchasing power

Results in a stronger economy by reducing production costs

Information technologies directly affect the nature of jobs

Telecommuting (or virtual work) allows people to work from home

“Job deskilling” – skilled labor is eliminated with high technology

“Job upgrading” – i.e., clerical work use word processing software

One skilled person can now do multiple jobs

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

The Impact of Information Technology in the Workplace (2 of 2)

Virtual organizations: networks of independent companies, suppliers, customers, and manufacturers

Share skills and cost

Have access to each other’s markets

Benefits:

Focus on what each company does best

Companies can respond faster and efficiently

Reduced product development

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Information Technology and Health Issues (1 of 5)

Increasing popularity of touchscreens

May result in stress-related injuries of the hands, arms, back, and eyes

Text neck: neck pain and damage caused from looking down frequently

Major negative impacts:

Teen tendinitis

Stress

Sleep loss

Accidents

Increased anxiety

Cyberbullying

Risk of cancer

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Information Technology and Health Issues (2 of 5)

Major negative impacts:

Teen tendinitis

Stress

Sleep loss

Accidents

Increased anxiety

Cyberbullying

Risk of cancer

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Information Technology and Health Issues (3 of 5)

Health problems related to computer equipment

Vision problems

Musculoskeletal problems

Skin problems

Reproductive problems

Stress-related problems (headaches, depression)

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Information Technology and Health Issues (4 of 5)

Health/emotional well-being of children

Feel “hidden sadness” when parents spend too much time on smartphones

Children do not receive time or attention

Five types of Internet addiction:

Cybersexual -Gaming

Web compulsions -Information seeking

Cyber-relationships

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Information Technology and Health Issues (5 of 5)

Distracted walking - walking while using a smartphone

11,000 injuries a year in U.S. alone

259 selfie deaths in a six-year period

Recommendations to overcoming these technology addictions:

Admit there is a problem

Limit / schedule your usage

Socialize more

Change communication patterns

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Green Computing (1 of 3)

Green Computing – involves the design, manufacture, use, and disposal of information technology devices

Promotes a sustainable environment; help to combat global warming

Requires the cooperation of private and public sectors

Implementation approaches:

-Green design -Green use

-Green manufacturing -Green disposal

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Green Computing (2 of 3)

Ways to achieve green computing:

Design products that last longer and are modular in design

Design search engines and computing routines that are fast and energy-efficient

Replace underutilized small servers with one large server; virtualization

Use devices that consume less energy and are biodegradable

Allow certain employees to work from home

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Green Computing (3 of 3)

Ways to achieve green computing (continued):

Conduct meetings over computer networks

Use video conferencing and electronic meeting systems.

Use a virtual world

Use cloud computing

Turn off idle PCs; recycle computer materials

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Self Assessment

How much personal information do you feel is publicly available as a result of your Internet presence? Is it good or bad?

In what ways can you help improve your personal health as you use or work with information technology ?

How can you personally contribute to the effort of green computing in your everyday life?

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Summary (1 of 2)

Now that the lesson has ended, you should be able to:

4.1 Discuss information privacy and methods for improving the privacy of information.

4.2 Explain the General Data Protection Regulation.

4.3 Explain the privacy issues of e-mail and data collection in a business setting.

4.4 Examine ethical issues and censorship in information technology.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Summary (2 of 2)

Now that the lesson has ended, you should be able to (continued):

4.5 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.

4.6 Examine the impact of information technology on society: the digital divide, telecommuting, and health issues.

4.7 Describe green computing and the ways it can improve the quality of the environment.

Bidgoli, MIS, 11th Edition. © 2024 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

‹#›

©2019 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

image3.png

image5.png

image6.jpg

image7.png

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com