Tải bản đầy đủ (.pdf) (34 trang)

Lecture Management information systems: Solving business problems with information technology – Chapter 14

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (994.25 KB, 34 trang )

Introduction to MIS
Chapter 14
MIS Impact on Society

Copyright © 1998-2002 by Jerry Post

Introduction to MIS

1


The IT Environment

Education

Government
Strategy

Consumers

Tactics

Culture

Operations

Privacy

Businesses
Employees


Company

 

Introduction to MIS

 

2




Individuals












Loss of jobs
Physical disabilities
Telecommuting







Intellectual property
Balance of power



Education and training
Social interactions





Social group legitimacy
Access to technology
E-mail freedom
Liability and control of data












 

Introduction to MIS

 

Representatives and agencies
Democracy and participation
Voting
Information warfare
Rise of the world state?
Police powers
Privacy
Freedom of speech

Responsibilities and ethics




Outline

Crime







Government

Vendors and Consumers




Privacy
Dehumanization

Jobs






Users
Programmers and developers
Companies
Governments

Cases: Health Care
Appendix: Computer-Related
Laws

3



Privacy

Governments

Employers

Businesses

 

Introduction to MIS

 

4


Government and Privacy
Spying on “ordinary”
people is not an issue.
Spying on business and
political leaders or
journalists can cause
problems.
Collecting data on
targeted individuals such
as dissidents or minorities
can stifle innovation.

Personal

financial data

 

Company
financial data

Introduction to MIS

 

Health
data

Travel
data

Political
negotiations

5


Privacy Problems


TRW--1991













Lost wallet
Impersonator, 2 murders and 2
robberies
NCIC database
Rogan arrested 5 times in 14
months
Sued and won $55,000 from LA

Jeffrey McFadden--1989











26 million monitored

electronically
10 million pay based on
statistics

Introduction to MIS

 

SSN and DoB for William Kalin
from military records
Got fake Kentucky ID
Wrote $6000 in bad checks
Kalin spent 2 days in jail
Sued McFadden, won $10,000

San Francisco Chronicle--1991




Employees


 

Norwich, VT
Listed everyone delinquent on
property taxes

Terry Dean Rogan









Person found 12 others using
her SSN
Someone got 16 credit cards
from another’s SSN, charged
$10,000
Someone discovered
unemployment benefits had
already been collected by 5
others

6


Privacy Laws


Minimal in US


Credit reports











Bork Bill--can’t release video rental data
Educational data--limited availability
1994 limits on selling state/local data

Europe




 

Right to add comments
1994 disputes settled in 30 days
1994 some limits on access to data

France and some other controls
European Union, controls but undecided
1995 EU Privacy Controls

Introduction to MIS

 


7


Job Changes 1995-2002
Home-health
Programmer/analysts
Travel agents
Childcare
Guards
Cooks
Nurses
Gardners
Lawyers
Teachers
Janitors
Bank tellers
Electrical assemblers
Typists/word processors
Machine-tool operators
Textile workers
Switchboard operators
Packaging operators
Telephone & cable TV installers
Directory-assistance operators

 

Introduction to MIS


 

8


Job Changes

Project Job Growth 1998-2006
Database administrators, etc.
Computer
engineers
Computer engineers
Systems analysts
PPersonal
ersonal and
careaides
aides
and home
home care
Home health aides
MMedical
edical assistants
assistants
Teachers, special education
Adjustment
clerks
Adjustment clerks
Teacher aides
Child
workers

Child care
care workers
Social workers
Receptionists and information
clerks
Receptionists
Food service and lodging managers
Nursing aides,
orderlies,
attendants
Nursing
aides,and
orderlies,
etc.
Hand packers
Hand packers and packagers
Guards
Teachers, secondary school
Teachers, secondary
school
Cooks, fast
food
Registered nurses
Food preparation
workers
Clerical supervisors
Food preparation workers
M aintenance repairers,
general
utility

Maintenance
repairers
Cashiers
Truckdrivers,
lightexecutives
and heavy
General
managers
Truck drivers
Food counter, fountain,
andcounter
related workers
workers
Food
Marketing supervisors
M arketing and sales
worker
Waiters
andsupervisors
waitresses
Salespersons, retail
General
clerks
Generaloffice
office clerks

0

20


40

60

80

100

120

140

Percent increase

 

Introduction to MIS

/> 

9


Job Changes 2000-2010
Occupations with Greatest Growth or Loss
673

Food preparation and serving
Customer service
Registered nurses

Retail salespersons
Computer support
Cashiers
Office clerks
Security guards
Software engineers, applications
Waiters and waitresses

631
561
510
490
474
430
391
380
364

Barbers
Procurement clerks
Eligibility interviewers, government programs
Parts salespersons
Wholesale and retail buyers, except farm products
Postal service mail sorters, processors
Telephone operators
Computer operators
Loan interviewers and clerks
Switchboard operators, including answering service
Dishwashers
Sewing machine operators

Word processors and typists
Insurance claims and policy processing clerks
Tellers
Order clerks
Farmers and ranchers

-9
-9
-11
-12
-13
-14
-19
-33
-38
-41
-42
-51
-57
-58
-59
-71
-329
-400

 

Introduction to MIS

-200


0

200

400

 
/>
600

800

10


Job Changes 2000-2010 (growth)
Fastest growing occupations
100%

Software engineers, applications

97%

Computer support

90%

Software engineers, systems


82%

Systems administrators

77%

Network analysts
Desktop publishers

66%

Database administrators

66%
62%

P ersonal and home care aides

60%

Systems analysts

57%

M edical assistants

0%

 


Introduction to MIS

20%

40%

60%

80%

100%

120%

/> 

11


Adaptive Technology

The foot mouse or nohands
mouse uses one pedal to
move the mouse and the
other to click it.

Federal rules now require that all applications sold to
the federal government have the ability to be used with
adaptive technology to enable people with physical
challenges to use the system.

A variety of hardware and software devices exist to
provide alternative input and output.

 

Introduction to MIS

 

12


Telecommuting
Employees
Suburban
work centers

Advantages
Reduced commuting costs.
Flexible schedule.
Disadvantages
Loss of personal contacts.
Distractions.

The Firm
Advantages
Decreased overhead.
Flexibility in part-time workers.
Disadvantages
Harder to evaluate workers.

Harder to manage workers.

 

Introduction to MIS

 

13


Telecommuting

Telecommuting sounds appealing to those who spend hours in traffic
commuting to work. Most knowledge workers can easily purchase the
computer equipment needed to work at home. It is more difficult to
provide the self-motivation and organization to be an effective worker.
On the other hand, there are fewer interruptions from coworkers.

 

Introduction to MIS

 

14


Digital Rights Management (Microsoft)
Selection and

purchase.

Customer money
transfer to store.

Website
Purchase

Customer/Reader
Encrypted book sent to
customer with publisherspecified level of security.

 

E-Commerce
bookstore

Digital Asset
Server (DAS)

Publisher
Introduction to MIS

 

Customer data.
Selection data.
Retail store data.

One copy in ebook format.


Manuscript

Author

Bank and credit
card processor

Wholesale price
charged to retailer.
Commission/fee to
DAS server.
Money to publisher.

15


Pricing and Revenue

Demand
12
10

Elasticity of demand:

P

8

% change in quantity


6
4

% change in price

2
0
0

5

10

15

20

Q

Revenue
60
50
40
30
20
10
0
0


5

10

15

20

Revenue is maximized when
elasticity is -1.
In terms of digital products with a
copyright “monopoly” and no
marginal costs, it means reducing
prices will result in increased total
revenue--up to a point. And
publishers are free to find this point
and charge the most profitable price
for each unit sold.

Q

 

Introduction to MIS

 

16



Education


Can technology change
education?







Do people want more technology
in education?






Teachers
Students
Employers

Lifelong learning




 


Computer-assisted instruction to
provide individual attention
Course management
Distance learning

Professionals
Employers
Military

Introduction to MIS

 

17


Social Group Interactions


Social Group Legitimacy





Access to technology









 

How do you know what is real?
How cynical do you need to be?
Hardware
Software
Internet (access and speed)
Economics and payment mechanism

E-mail access, spam, and harassment
Liability and Control of Data

Introduction to MIS

 

18


How Cynical Can You Be?

ArthritisCure.net
Which of these websites do you believe?
How do you decide?
Does it help if you know the website?


 

Introduction to MIS

 

BBC News

19


International Internet Bandwidth

162 Gbps
0.8 Gbps

0.4 Gbps

1.2 Gbps

14 Gbps
0.07 Gbps

42 Gbps

 

/>Introduction to MIS


 

20


E-Government


Government Representatives and Agencies



Providing Internet access to government data.
Democracy and participation







 

Getting data and information
Providing feedback and participating

Voting—will we ever see electronic or online voting?
Information warfare
Will the Internet consolidate the world?


Introduction to MIS

 

21


Electronic Voting Challenges















 

Prevent fraud by voters (identify voters).
Prevent fraud by counters.
Prevent fraud by application programmers.
Prevent fraud by operating system programmers.
Prevent attacks on servers.

Prevent attacks on clients.
Prevent loss of data.
Provide ability to recount ballots.
Ensure anonymity of votes.
Provide access to all voters.
Prevent denial of service attacks.
Prevent user interface errors.
Identify and let voters correct data entry errors.
Improve on existing 1 in 6,000 to 1 in 10,000 error rates.

Introduction to MIS

 

22


Information Warfare







 

Controlling information and knowledge
Intercepting communications.
Breaking codes.

Providing false information.
Protecting the modern economy.
Winning a war depends on destroying the economic
infrastructure, which today includes computers and
networks.

Introduction to MIS

 

23


Rise of the World-State


Early history: City-States





Modern Era









Laws and enforcement will require international cooperation.

Nations might become insular (e.g., France/Yahoo)


 

European Union
North American Free Trade Area
Mercosur and more

The Internet could remove boundaries




Nation-State
Defense within physical boundaries (oceans and mountains)

International Cooperation




People band together to protect a common region.
Economically and politically could only control limited areas.

Companies might be forced to least-common denominator


Introduction to MIS

 

24


Crime


Real-world/traditional crime






The Internet





Con artists have access to new and more victims.
Harassment (e-mail, cell phones, stalking, etc.)

Police Powers







 

Criminals and terrorists have access to information,
communication, and money.
Encryption and Anonymity

Carnivore
Echelon
“Wire” tapping
Privacy
Freedom of Speech (Digital Millennium Copyright Act)

Introduction to MIS

 

25


×