Hello class and welcome to the very last week of our Information Systems  introduction course. I'm so glad to have spent this time with you to really go over kind of a broad overview of information systems, what it what it means, and  hopefully, kind of piqued your interest a little bit at this broad level, so that you  can choose what areas you really want to dive into and use to make a difference in your area of influence. So I would love to start with a prayer, Dear heavenly  Father. We ask first of all, thank you. Thank you for allowing us all to persevere  through all the way to the end of this course, of allowing us to really soak in the  new information and be able to go forward and use it in our organizations and  our family, bringing bringing efficiency and organization to to situations that  might have been more chaotic, so that we can be a positive light for others and  and use some of these skills to make life easier for someone and to make make  An organization more successful to help our families, and we were just so  appreciative that you give us the opportunity from from start to finish, to to have  a goal and to see it through and persevere. So we know that we will go where  you call us, and that that you've called us to finish this course. We're just so  appreciative that you've given us that opportunity to be together and to learn,  and in your heavenly name, we pray amen. So last module, we're going to talk  about ethics and information systems and the beyond, about what's coming  next. We talked about the history, for instance, of information systems in the  internet. We stopped around the year 2000 and so now we're going to just talk  about the beyond of now and later. Here we go. Here's some learning  objectives. So upon the successful completion of this chapter this week, we're  going to be able to describe what the term Information Systems ethics means.  We're going to explain what a code of ethics is and describe the advantages and disadvantages of implementing a code. We are going to define the term  intellectual property and explain the protections provided by copyright roles,  patent roles and trademark rules, so making sure that we aren't inadvertently,  you know, doing something that we shouldn't be doing, we're also going to  describe the challenge that information technology brings to individual privacy.  So this is a big, a big part of of the ethical conundrum is somebody's privacy  concerns and how to balance progress with privacy so and then, of course,  another learning objective is just to be able to speak knowledgeably about  what's what's coming. And so none of us know for sure, of course, what the  beyond looks like for information systems, but we can see some trajectories and some patterns that have emerged, and talk about those. Let's get started with  the ethics. Ethics, just by definition, is going to be a set of moral principles,  principles of conduct that really guide an individual or guide a group, as as  Christians in a modern workplace, I feel like there is sometimes a calling for us  to really adhere to these ethical principles. Where you'll you'll notice sometimes  people in your workplace are are not, and sometimes it's it's tricky. Even some  people in leadership positions within your organization might ask you to do 

things that fall outside of these set of moral principles and ethical values. So just being true to yourself when it comes to your organization and your families, and  just knowing what those principles are, and knowing how the new technology  will fit into that. So looking at the new technology, creating new uses in society,  creates environments and situations that people haven't seen before, and when  something's new, sometimes we don't know how to navigate that, so we're going to talk about that today. All right, so technology and ethics first, we're going to  talk about Henry Ford's assembly line. And I am currently in Michigan right now,  so we can, I'm happy to talk to you about Henry Ford's assembly line. So. It  created advantage in the in that cars could be manufactured more quickly, but it  devalued the human work and the skill and the production process when some  of these things were automated on the assembly line, it took out some of that  human work and skill that used to be highly valued in the workplace. So  although we do have that trade off where they're manufactured more quickly,  which then helps people in other ways, certainly we noticed that devalue, the  valuing of the human work the Volkswagen diesel deception. These are sensors  and cars for testing and software programming that allowed VW to cheat on  their emissions testing, which ended up being discovered in the end, but a  Volkswagen is still attempting to recover, but having at an organizational level,  the fact that that This was able to take place and and that it evaded so many  safeguards and so many ethical checkpoints that should have been in place that weren't to have the whole organization on this, this enterprise of cheating the  system for emissions testing. We're going to use that as a case study on what  not to do. So code of ethics is a documented set of acceptable behaviors for  professionals or for social groups, what to do, what not to do. These are typically defined by the group, so whether that is a subset of that group that come  together and make this code of ethics, or whether it's by the group as a whole.  I've worked in as a classroom teacher every year, one of the activities that I  would do as part of our our learning community was to define our own and we  would make our own code of ethics and our code of our rules as an entire  group. Now, I've seen that translate well in certain organizations I've worked for  as well, where they would establish, you know, what are what do we value?  Where are we so, not just the where are we going for the business, you know,  mission and vision, but more so the ethical component of what do we value and  how will we conduct ourselves as professionals and as individuals, they identify  specific actions that are either appropriate or inappropriate. In the supplemental  reading section, you're going to see some sample codes of ethics. And you can  kind of weigh in on what those are, on how they work. There are the Association  for Computing Machinery of ethics, the mouthful, but they have established  these 24 imperatives of personal responsibility. So I'm going to run through  these real quick, not through all 24 imperatives, but this contains issues that  professionals will have to deal with. So the first section is the General Motors 

imperative, so avoiding harm to others, which is always a good idea. The  second section is professional conduct. So this is maintaining professional  competence. Are you up to up to speed on what you need to do your job well,  respecting others by making sure that you're ready to go and that your your  competence is up to par. Section three would be individuals with leadership  roles, and that's going to be creating opportunities for people and taking care of  the people that you work, that work for you and that work with you, but ultimately that report to you that you're going to create opportunities for them and have  their best interest in mind. So part of those 24 imperatives is this section for  individuals, specifically in a leadership role. And then finally, the fourth section of these 24 imperatives are compliance with the ethical code. So how are you  going to promote this ethics? How are you going to ensure compliance, and  what that looks like? All right? So here's some examples of some specific  admonitions for this. And this is no one should enter or use another person's  computer system software or data files without permission. And that seems  pretty straightforward. And again, this is kind of the boilerplate which can be  customized for each individual workplace. But this typically a good idea that I  know that my my computer system or software, my files won't be, I should  assume that those will not be, you know, bothered or molested by anybody  who's not me without my permission, designing or implementing system. That  deliberately or inadvertently demean individuals or groups is ethically  unacceptable, and the important key word here that deliberately or inadvertently  demean individuals. So basically, if you know better, you do better once that is  brought to your attention, regardless of intent, if you are demeaning individuals  or groups, it's not ethically acceptable, and so you need to design or implement  your system in a way that no longer is going to demean those individuals or  groups. And then organizational leaders are responsible for ensuring that  computer systems enhance, not degrade the quality of working life. So again,  going back to that, that conundrum, the paradox, if IT really does enhance  productivity, those organizational leaders are are charged with finding that  balance of what, how much will enhance and how much will degrade the quality  of working life within an organization. Having an ethical code set up for your  organization definitely has some advantages. It's going to add clarity to the  understanding of what's acceptable behavior. It's going to help with  communication. It's going to communicate calming guidelines for everybody to  follow. So everyone's on the same page, and nobody's able to not just able to  say, but able to have the reality be, I didn't know any better, because everyone  has the same guidelines to follow. And then what happens if you don't follow  those organizational ethical codes? And for instance, if you are an attorney and  you work for the State Bar Association, you can have your license revoked,  which would which would effectively end your law degree. If the State Bar  Association revokes your license as an example. So a lot of things to look at 

here. As part of the advantage is that it might help to have it written out for those that are coming from a different culture, coming from a different country. I spent  quite a bit of time working in Asia, and I would say that there were definitely  some differences in what would have been very obvious, codes of a code of  ethics in the workplace. Without getting into too much detail, there are things  that I that were very assumed in an American workplace, that were not present  in Japan where I was working, and vice versa, things that were, you know,  totally acceptable in the one wouldn't have been acceptable in the other as well.  So having some of these the advantage of having it actually written out for  everyone, so everyone is on the same page with communications very clearly,  you know, communicated to everyone that this is what we value, this is how we  behave, and this is how we don't behave. Now speaking, you know, we're  talking about information systems, so this would be specifically to those IT  standards, but just having a general ethical code for any conduct in the  workplace is probably a good idea. We're talking specifically for digital ethical  code. All right, some disadvantages. So we talked about why we should have a  ethical code in place. There are a couple disadvantages as well. It might not  reflect the ethics of every single person in the group, of every member. And  again, that's kind of a depends on how it's created, if it is, if it's hearing every  voice, or if there's a subset of your population that are creating this code. But  sometimes it isn't enforceable. Either it's a code of conduct, conduct, it's not a  legal document. So although in some organizations like the Bar Association,  when you when you sign, or like, if you're in a university and you sign a code of  conduct there, you know, there are very spelled out, enforceable, you know,  things that will happen if you don't hold up your end of the bargain. And there's  consequences that will naturally occur many times. Though these ethical codes  kind of ambiguous and not exactly enforceable in those gray areas that we're  going to get into. So AUP, those are going to be our guidelines for behavior  when using technology. This acceptable use policies, and chances are, if you  have taken a job somewhere. Anywhere you will have to sign this AUP before  being issued technology, a computer or connecting to the internet. Even if you're if you go to Starbucks and you want to join the Wi Fi, you're going to have to  agree to this acceptable use policies. And basically what it's going to say is, you  know, don't, don't behave like, like a jerk, that you need to be held accountable  for your behavior, what you say and what you do using that technology, you  know, you are held liable and accountable for that behavior. So some of it is the  physical things that you may not you know without access, copy or add or alter  or delete or destroy data that you find on that computer system that does not  belong to you unless you are very specifically authorized to do so that you're not allowed to make changes, for instance, to the network at An organization where  you are one employee of that organization, in terms of a university setting,  students shall be accountable for their own behavior, and let's say that part of 

the course that you're taking is an online discussion board. So that is would fall  under our technological acceptable use policy AUP and so that you are just held  accountable for anything that's inappropriate that's coming out of your unit or  your computer, that includes making sure that your passwords are secure, that  you're up to date in your software, that you that any no security breach Is that  that you are responsible for just by practicing those, those good technological  hygiene practices that we talked about a couple modules ago, so that  acceptable use policy is very standard, and something that you're probably  going to have to agree to before you start work, we're going To get into the IP  This is intellectual property. So property as an idea, an invention, a process that  derives from the work of the mind or intellect. So if you have a really good idea,  something comes to fruition from that idea. If something is invented, something  is created that wasn't there before. That is intellectual property, and that's those  could be a computer program that you offer song lyrics, that you write, a  painting, that you make, a book, that you author a new process to manufacture  something that didn't exist before this could all exist as intellectual property. So  when we look at intellectual property, the problem is, if it's an idea and it's not  something that you physically made in your hands, it's a lot harder to protect that idea. So that's why there are laws that protect IP that result of an idea, this  intellectual property. So advocates of international property, they would argue  that it gives inventors a reason to innovate. We know it's not going to be totally  stolen. Your idea is going to be stolen because everyone has a right to profit  from their own labor and their own ideas, and without that IP that intellectual  property protection, there's less incentive to be innovative and to invent. So IP  laws are different where you go in the globe, and so depending if you're working  on a project with a global team, like we were talking about in the last module of  that globalization, the IP laws might be different in the team that is working with  you. So you might just want to make sure that if you are participating in a project that might result in some of these IP issues that you get on the same page, first,  possibly part of that ethical plan that we talked about so that the IT laws can be  discussed before it would become an issue similar to intellectual property. We're  going to talk about that copyright so anything that has an author, any work with  an author, whether that be books, computer programs, songs, that author owns  the copyright, or the owner of the copyright controls who can make copies of it,  who can make derivative works from the original. If somebody is going to take  what you did and kind of create their own thing with using that as a baseline,  you have control over that. You can control who performs it publicly, who can  display it publicly and who can distribute or profit from your work? That's all part  of copyright controls. So as part of that, it lasts for the entire life of the original  author. Plus 70 years. Pretty random, right? So let's say you you pen the next  great American novel or or, let's say that you write a song that is number one  song in 40 different countries that copyright protection on your your property, 

your IP, your copyright, is going to be your entire lifetime, plus 70 years, if it's not owned by an individual, if it's owned by a publisher, that copyright can last for 95 years. And so an example that's a pretty common example of this copyright  principle is going to be the birthday song, the Happy birthday to you song. It's  rarely in movies and some restaurants have they sing a different tune because  of the copyright that exists for the happy birthday song. That's actually  copyrighted song. So if you're wondering why, when there's a birthday in your  favorite TV show or movie, when they're not singing the actual birthday song?  Because there are copyright rules that go with that, depending on, again, your  geographic area, where you are. This article here the happy birthday song,  copyright is not valid from the LA Times in 2015 I'm going to put that article for  you in the recommended reading for you to kind of get both sides of that  argument and to see where you come down on that, that argument of the Happy Birthday copyright. So how do we get a copyright protection? Let's say you  create something, the act of creation gives you the copyright. So if you write a  book, you don't have to specifically, you know, go and apply and get a patent  lawyer and have a copyright deemed for you. If you created it, it is yours, and  you already have an inherent copyright on what you have created. It says here,  even your doodles, on your notes, those are yours. Those are copyrighted.  Someone can't take that from you. Make 1000 copies and profit from your work.  You don't need an official copyright if it's going to be used commercially, then  you want to go ahead and register for a copyright with the US Copyright Office,  apart from the copyright, then we have fair use. And this is sometimes you can  use a small piece of copyrighted work with permission. And so the guidelines  aren't super well defined for this, it kind of depends on why you're using it,  what's the purpose, what's the nature of the copyrighted work, how much you're  actually going to copy and use, and the effect of the use on the potential market. So this is something that would go in front of the Fair Use principle would go in  front of an attorney or a judge, and they would determine if the purpose and the  nature and the amount of work copied fall under these fair use guidelines, the  Digital Millennium Copyright Act. This is going to be in 1998 this came about to  extend copyright laws to digital technology. So it's not just, you know, the  manuscript you have in a desk drawer or the song you have on a CD  somewhere, or an mp three file. This is going to be digital technologies as well.  So it was deemed in 1998 that it's illegal to circumvent technologies that enforce copyrights. So for instance, games that require you to be connect to the internet, the safe harbor law limits the liability of online service providers. For instance,  YouTube, if somebody posts a video on YouTube that is copyrighted material,  and that video gets posted onto YouTube, YouTube isn't held liable for the fact  that somebody posted that content on there that safe harbor limits them their  liability with intention. So this Digital Millennium Copyright Act, DMCA, it's not,  it's not super popular with everyone. So a lot of users are unhappy with this. The

Electronic Frontier Foundation and others feel like it can really limit free speech  issues. And so these two, these two articles here, we can't let John Deere  destroy the very idea of ownership. And everyone hates the DMCA not really  beating around the bush there. These two articles are going to be available for  you in a supplemental readings. I would suggest that you read those to kind of  get more. Of a flavor of the other side of the DMCA argument, and kind of you  know, just to make sure that Digital Millennium Copyright Act that you really  have a comprehensive understanding on on both sides of that issue, we have  Creative Commons. This offers an alternative copyright licensing. It's not as  restrictive as a traditional copyright, and that would be like the textbook you're  using right now, this textbook, and so this, this means that we can share it for  specific purposes. We're sharing this textbook to further the knowledge, to share the education. We are not, you know, we're not on the fly making copies of a  published textbook. And you know, in emailing these, this is a legit license under this Creative Commons license that allow you to use this textbook free of charge as part of a licensing agreement. Next about patents and the difference here, so  a patent is a protection for somebody who creates a new product, a new  process. It's not necessarily the widget itself, but it could also just be the process that went into making the new widget. So a patent holder has the right to and  here we're going to read it directly here exclude others from making, using, or  offering for sale or selling the invention. So if it's not yours, you can't profit from  it. That's what a patent holder has the right to, say, a US patent lasts 20 years.  It's not the same in every country. In some countries, there are no patents. It's a  free, open marketplace. So in the United States, if you apply for a patent for  your product or the process that was needed to create that product. It's going to  last you for 20 years. You have to apply for this. It's going to go through, and a  decision will be made by a judge. A patent attorney will argue your case in front  of a judge, and it must be something that's original, not an obvious thing, and  useful, and if it meets those three areas of criteria, original, useful, not obvious,  it would be in the running to receive a patent. Similar to patents, we have  trademarks, and that's going to be a word, a phrase, a logo, a shape or a sound  that identifies the source of goods or services. So this is going to be more at the  organizational level. I would imagine, in the graphic up on your screen, you  would recognize a vast majority of those trademarked images if we were to play  some sounds for you, I bet you could have a very you'd probably get most of  those sounds that are trademarked, sounds that would identify which  organization we're talking about, continuing that trademarks, that common  trademark is TM, or we That's a common law trademark. The registered  trademark is the symbol that you see there, the R in the circle. So if we see the  difference with the LinkedIn using the R in the circle with the registered  trademark for LinkedIn, we see that Google has a common law trademark and  that has that's indicated by the TM there, all right for privacy. The Privacy is 

going to be the ability to control information about yourself, how much of your  personal information is out there. So information systems have eroded some of  those personal privacy in the United States, a lot of these great advances in  technology that we're talking about, and a lot of the personal computing, the  cloud computing, the mobile technologies, some of these mash ups that are  used with layers of technology on each other to help make life easier, to get you  from one place to another easily, with GPS And to layer on traffic and to layer on weather into a map, those kind of things, they come at a price, and a lot of  times, that price is the balance between your protection and the commerce. So  that's not the case in the United States, but in Europe, the EU considers privacy  as a fundamental right that outweighs commerce. That is not necessarily always the case. If you are in the United States, kind of just depends. It's a case by  case basis on it's not as easy as outweighing. Commerce, and look at Nora, N,  O, R, A, and that's the process of collecting large quantities of information and  combining it to create profiles of individuals. And this is something where it's not  necessarily about you personally, but it could be all of your information that you  have. So even if it's not identifiable to you, it's still collecting information about  you. So what I mean by that is the individual profiles that you see in the middle  here are made up of all of these different types of data points your click stream  on what you're searching for, the order of clicks that you make in your personal  computing, security cameras and facial recognition certainly is a bit more  obtrusive the social networks that you visit and what you're searching for in  those networks, commercial transactions, what are you buying? What websites  are you visiting? How long are you staying on those websites, your telephone  records, your credit reports, mobile phone data, incident and arrest systems, all  of these things that could be public could be private. It's all collecting that  information. And so because that's happening, there needed to be some  legislation in place. So here we have privacy legislation, COPPA, the Children's  Online Privacy Protection Act, and this means that organizations need to make  an effort to find out how old you are before you are accessing a website. If  there's something with a sense of nature, if there's something that requires adult access that there is a safeguard in place to at least attempt to detect  somebody's age prior to accessing that area the internet. There's FERPA, the  Family Educational Rights and Privacy Act. This prevents this protects records in a school setting. And then we've got the HIPAA, which is the Health Insurance  Portability and Accountability Act. This protects your records just like FERPA  does, but in medical your patient records in a medical facility, so that you can  rest assured that your information is kept private and the hospital or the doctor's  office or your university isn't going to sell or share your information. It is, it is  protected as private, according to the legislation. So we're going to shift gears  just a little bit and talk about, wrap it up with what's trending now. We talked  about some of those ethics issues and and now we're going to talk about what's 

trending for the future of information systems. So what's trending right now is  definitely social. When we talk about social media personal, having things  customized and branded and having an experience that is personal to you when you're online, of not having a cookie cutter experience. That's not the  expectation anymore of having our technology be mobile. We need. We want  exactly what we want, wherever we want it. So we want anything that's available on our desktop to be available also in the palm of our hand, on the top of a  mountain. Should we choose our technology is wearable, and that's certainly  trending with all kinds of wearable technologies and and those are advancing as we as we go, printable, findable and autonomous. These are some of the things  trending. And then as we go into IoT, which you may have heard of, IoT. You  might not be too familiar with the Internet of Things. It's going to be embed  embedded sensors that collect data and they send it to a cloud host, and they  tell us something. What do we mean by that? It means that so something like  the like a baby monitor that is worn around the foot. So those little owl socks that are constantly taking a baby's vital signs and reporting it back to mom and dad's phone, these things that are constantly embedded sensors collecting data is a  trend that we see in the IoT air quality egg so an army of people monitoring air  quality worldwide in this interconnected way is definitely another trend of things  that are happening in IoT. Finally, we have big data. We're coming back to big  data as one of our very last we saw that it has been a trend, and will continue to  be a trend moving forward with as part of our analytics and big data and what  we're what we're getting, so we can collect a ton of data for not a lot of money,  and we can create new and different purposes for this information and keep  innovating and building, and then we're going to find out, how do we monetize  this information? So these vast amounts of information and data points that are  being collected, once we have that data as we know in context, it turned into  information, that information is turned into knowledge. And of course, knowledge is then turned into wisdom. How do we monetize this wisdom, or the lower  levels, and is it? Is it worth it? Is it possible? Is it ethical to do so? I guess it  depends on how that information was gleaned through what through what  measures. But regardless how to monetize that information, is a trend going into the next era of computing 3.0 so we need to talk about who needs big data to  solve problems and what privacy issues arise from that. What new careers will  be created by this by this data revolution. So all of these trending topics will  certainly be on the horizon. So we're going to end here. We're going to wrap up,  I would say, our module, but we're actually going to be wrapping up our course  with the summary of, what does Information Systems ethics mean? What is a  code of ethics, and what are the advantages and disadvantages having one of  those code of ethics in your organization. Are you able to define that intellectual  property, what it is, what it means, and then all the different layers of that  intellectual property, copyrights, patents, trademarks, all those things that can be

used to protect us and our privacy, and then finally, describing the challenge that IT brings to individual privacy like we just talked about, the vast amounts of data  that are that are collected each and every day, how it's being used, and what is  our expectation to that right of privacy depends on where you are  geographically, sadly, on what that that expectation to privacy should be. But it's  definitely some food for thought. So I, I so appreciate you hanging with me for  12 full modules, or 12 full weeks as we went from learning the big overview on  what components make up an information system, all the way through those  components to some bigger, bigger ideas, and just allowed ourselves to really  think bigger on what could be possible with these information systems, I hope it  has piqued Your interest. I hope we did talk about several career paths that  would be made possible with a deeper study into some of these fields of  information systems, if you whether that's a systems analyst, or whether it's an  IT project manager, or the dozens of career the careers that we discussed over  these last 12 weeks. And I wish, I wish we were in a classroom together, and  you were sitting across the table from me, and we could chat about it, on what  your goals are and how we can help you get there. But I hope you enjoyed  learning a little bit about information systems and wrapping up with, of course,  the ethics and what's to come moving forward. So I'm just so grateful that you've joined me and congratulations for completing all 12 weeks of this course. And I  hope to, I hope to see you again for another one. So congratulations and thanks again. 



最后修改: 2025年02月3日 星期一 09:02