SlideShare ist ein Scribd-Unternehmen logo
1 von 1
The Moral Dimensions of
Information Systems
 Information Rights: Privacy and
Freedom in the Internet Age
 Property Rights: Intellectual
Property
 Accountability, Liability, and Control
 System Quality: Data Quality and
System Errors
 Quality of Life: Equity, Access, and
Boundaries
Copyright © Albrecht & Jones 2013

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategySukanya Ben
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)Nirajan Silwal
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 
dimensions of information system
dimensions of information systemdimensions of information system
dimensions of information systemAZEEM M
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)Jaisha Jaikishan
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information systemOnline
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Information system
Information systemInformation system
Information systemhiddensoul
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systemsProf. Othman Alsalloum
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 

Was ist angesagt? (20)

Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
5 enterprise applications
5 enterprise applications5 enterprise applications
5 enterprise applications
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and Strategy
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
It Policies
It PoliciesIt Policies
It Policies
 
dimensions of information system
dimensions of information systemdimensions of information system
dimensions of information system
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information system
 
Information management
Information managementInformation management
Information management
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Information system
Information systemInformation system
Information system
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 

Mehr von Albrecht Jones

Building an E-Commerce Presence
Building an E-Commerce PresenceBuilding an E-Commerce Presence
Building an E-Commerce PresenceAlbrecht Jones
 
E-Commerce: Business and Technology
E-Commerce: Business and TechnologyE-Commerce: Business and Technology
E-Commerce: Business and TechnologyAlbrecht Jones
 
E- Commerce and the Internet
E- Commerce and the InternetE- Commerce and the Internet
E- Commerce and the InternetAlbrecht Jones
 
Enterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and ChallengesEnterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and ChallengesAlbrecht Jones
 
Enterprise Wide Systems
Enterprise Wide SystemsEnterprise Wide Systems
Enterprise Wide SystemsAlbrecht Jones
 
Establishing a Framework for Security and Control
Establishing a Framework for Security and ControlEstablishing a Framework for Security and Control
Establishing a Framework for Security and ControlAlbrecht Jones
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlAlbrecht Jones
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and AbuseAlbrecht Jones
 
An Information Systems Security Primer for Managers
An Information Systems Security Primer for ManagersAn Information Systems Security Primer for Managers
An Information Systems Security Primer for ManagersAlbrecht Jones
 
The Wireless Revolution
The Wireless RevolutionThe Wireless Revolution
The Wireless RevolutionAlbrecht Jones
 
Communications Networks
Communications NetworksCommunications Networks
Communications NetworksAlbrecht Jones
 
A Telecommunications Primer for Managers
A Telecommunications Primer for ManagersA Telecommunications Primer for Managers
A Telecommunications Primer for ManagersAlbrecht Jones
 
Managing Data Resources
Managing Data ResourcesManaging Data Resources
Managing Data ResourcesAlbrecht Jones
 
The Database Approach to Data Management
The Database Approach to Data ManagementThe Database Approach to Data Management
The Database Approach to Data ManagementAlbrecht Jones
 
Organizing Data in a Traditional File Environment
Organizing Data in a Traditional File EnvironmentOrganizing Data in a Traditional File Environment
Organizing Data in a Traditional File EnvironmentAlbrecht Jones
 
A Data Management Primer for Managers
A Data Management Primer for ManagersA Data Management Primer for Managers
A Data Management Primer for ManagersAlbrecht Jones
 

Mehr von Albrecht Jones (20)

Building an E-Commerce Presence
Building an E-Commerce PresenceBuilding an E-Commerce Presence
Building an E-Commerce Presence
 
E-Commerce: Business and Technology
E-Commerce: Business and TechnologyE-Commerce: Business and Technology
E-Commerce: Business and Technology
 
E- Commerce and the Internet
E- Commerce and the InternetE- Commerce and the Internet
E- Commerce and the Internet
 
E-Commerce Systems
E-Commerce SystemsE-Commerce Systems
E-Commerce Systems
 
Enterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and ChallengesEnterprise Applications: New Opportunities and Challenges
Enterprise Applications: New Opportunities and Challenges
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
Enterprise Wide Systems
Enterprise Wide SystemsEnterprise Wide Systems
Enterprise Wide Systems
 
Establishing a Framework for Security and Control
Establishing a Framework for Security and ControlEstablishing a Framework for Security and Control
Establishing a Framework for Security and Control
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
An Information Systems Security Primer for Managers
An Information Systems Security Primer for ManagersAn Information Systems Security Primer for Managers
An Information Systems Security Primer for Managers
 
The Wireless Revolution
The Wireless RevolutionThe Wireless Revolution
The Wireless Revolution
 
The Global Internet
The Global InternetThe Global Internet
The Global Internet
 
Communications Networks
Communications NetworksCommunications Networks
Communications Networks
 
A Telecommunications Primer for Managers
A Telecommunications Primer for ManagersA Telecommunications Primer for Managers
A Telecommunications Primer for Managers
 
Managing Data Resources
Managing Data ResourcesManaging Data Resources
Managing Data Resources
 
The Database Approach to Data Management
The Database Approach to Data ManagementThe Database Approach to Data Management
The Database Approach to Data Management
 
Organizing Data in a Traditional File Environment
Organizing Data in a Traditional File EnvironmentOrganizing Data in a Traditional File Environment
Organizing Data in a Traditional File Environment
 
A Data Management Primer for Managers
A Data Management Primer for ManagersA Data Management Primer for Managers
A Data Management Primer for Managers
 
Management Issues
Management IssuesManagement Issues
Management Issues
 

The Moral Dimensions of Information Systems

  • 1. The Moral Dimensions of Information Systems  Information Rights: Privacy and Freedom in the Internet Age  Property Rights: Intellectual Property  Accountability, Liability, and Control  System Quality: Data Quality and System Errors  Quality of Life: Equity, Access, and Boundaries Copyright © Albrecht & Jones 2013