Ethics and Social Impact of Information Systems in Our Society: Analysis and Recommendations
Ethics and Social Impact of Information Systems in Our Society: Analysis and Recommendations
Abstract: The evolution of information systems in our society today has grossly affected the way we live our lives. This has invariably
led to the increase in ethical and social impacts that are rising in the society from health related matters to social threats. This study
specifically examines the effects of ethical and social concerns of information systems on the society. The paper revealed the key
technological trends that led to ethical issues and the moral dimensions of information systems on the society. It also analyzed and
recommended ways on how to improve the effectiveness of ethical and social impacts of information systems in the society.
(v) Identify the Potential Consequences of Selected States military uses one of such game as a recruitment
Options device.
Some options may be ethically right but disastrous from
other points of view. Other options may work in one instance Another interesting and undeniable effect is the use of
and not work in another similar instance. But always ask internet in the societies worldwide; in fact, it could be said to
yourself the consequences of any option chosen. connect and eliminate differences between geographically
and culturally separated societies. The effects of the
2.2 Social Impact of Information Systems computer are still developing; nevertheless it is already
obvious that they are sufficiently wide reaching to far
The increase in the application of information systems in our surpass an answer of this length. Ultimately the internet is a
society has changed the face of almost every aspect of our means of communication. One of the results is to make
society and cultures. The most obvious effect of information learning democratic. At the click of a mouse anyone with a
system has been the rise of the internet and its consequences computer, regardless of their wealth, status, or education,
in terms of how we communicate, socialize, learn and do can access a practically limitless supply of knowledge. A
business to mention but few. However, before considering benefit of this is that with the correct internet know-how, one
the implications of the internet, which is basically linked to can find out almost anything in a matter of seconds; it
that of the computer, we shall foremost explore some revolutionizes the way people go about research.
important features of information systems and what they
mean to us. However, the same capacity for multiplying information
which makes the internet great and threatens the whole
Firstly, we must not forget that the computer was primarily organizations as music, films and other forms of
designed as a means of solving arithmetic and logic entertainment and information are released free of charge
problems, and data storage. The development of the onto the web. Inevitably sales of CD's and DVD's have
computer from these modest roots are the complex machines fallen as the use of the internet has grown, and indeed the
of today which allow us to work out more complex problems speed of the web's growth has made it nearly impossible for
in a way that would have otherwise been impossible and media companies to find ways of stemming the problem.
store more information. This affects our society in two ways: Equally, in the same way that the internet gives every single
On an individual basis it means that any person in possession person with a computer a voice with which they can share
of some kind of a computer has the capacity to store every their thoughts and ideas with the world, so too has the
document they will ever need in a single compact machine. number of offensive sites grown with the development of the
This connotes that computer allows people to set up internet, from pornographic sites to the more worrying cases
businesses and work from home on a scale never seen of websites designed for the sharing of pedophilic materials,
before, not to mention taking the human progress a step as well as racism and even terrorism supporting sites. The
beyond that of the printing press by removing the need for technology field has been overtaken with other types of
hand writing for the first time in our history. On a larger behavior that can affect anyone who uses technology such as
scale, it allows scientific progress to accelerate as computer crime.
mathematical problems incomprehensible to humans can be
worked out by simple programmed machines. The effect of Computer crime is another prevalent social impact of
computer storage capacity is to totally change how large information system in our society. The term computer crime
scale businesses function, by assisting inventory as described by Valacich [13] is the act of using a computer
management, by facilitating and expediting the storage of to commit an illegal act, such as targeting a computer while
data important to organizations, for instance: customer committing an offence, using a computer to commit an
preferences or phone numbers. offence, or using computers in the course of a criminal
activity. Computer virus and hacker attacks are intended to
Another effect of information systems is the rise in computer destroy data and software and disrupt computer services. In
games. This has caused serious worries over how they affect the year 2002 alone, more than 7,000 computer viruses were
those who use them, and especially their effects on youth. reported [6]. Phishing attacks frequently target a specific
The debate still rages over whether the large number of group of people and are intended to secure personal
violent computer games available influences those who play information, usually financially related, from innocent and
to imitate such behavior, with a host of scientific research unsuspecting responders [4]. Other types of the crime that
being done on the issue. Yet almost worrying are the are ubiquitous include carding, cloning, data diddling,
statistics which seem to be highly addictive to the quality of phishing, shoulder-surfing, salami slicing and social
such games - most notably internet based ones. In contrast engineering.
many have begun to see the potential computers held as a
means of education, since, unlike other traditional forms of Correspondingly, the increasing recognition of social
teaching tools, computer game based learning has a networking sites is a double-edged sword. On the one hand it
propensity to entertain the student. Businesses and has allowed people to connect and communicate with one
organizations are already using computers as educational another with ease and scale never seen before. At the most
devices and technology development tools, especially in the basic level this began with email, which alone can be seen as
field of virtual reality games and more would still follow. nearly equal to the invention of the telephone in terms of
Whatever one's feelings on the growth of these video games, communication. Some social sites like the
in both recreational and educational formats they are www.facebook.com have more members than the average
becoming ever more of a reality, for instance the United national population. The fact that the internet allows such
Volume 2 Issue 11, November 2013
Paper ID: 02013404 156
www.ijsr.net
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
forms of communication to be free makes it democratic. The (iii) Accounting Liability and Control
potential of such sites to be used for the good of the people Determining who should take responsibility for decisions
can be seen recently in the part played by Face book in and actions. Many of the laws and court decisions and
Middle Eastern uprisings of Egypt, Tunisia, Algeria and actions establishing precedents in the area of accountability,
Libya, when it was used by rebelling citizens as a way of liability and control were firmly in place long before
coordinating strikes and marches. Yet equally there are many information systems were invented.
cases of children being groomed by sex offenders through
these websites. (iv) Quality of System
This has to do with data quality and system errors. As we
3. Emerging Technological Trends That Leads rely more on information systems, data quality issues are
To Ethical Concerns gaining more importance. These issues affect you as a
consumer and as a user.
There are no doubts that ethical concerns have long preceded
information systems. And information systems on the other (v) Quality of Life
hand has increased ethical concerns, created problems and An interesting quality of life issue that affects more and
threats to established societal rules, and new advances have more people personally is the ability to work from home.
made some laws archaic and possible threats to privacy and Before the advent of information systems most people used
ethics. There are four basic technological trends responsible to have a regular day job 8.00 a.m. to 5.00 p.m., five days a
for the ethical concerns, these are stated as follows: week in a typical office setting in our society. But with the
introduction of information systems people can work seven
(a) Increase in Computing Power days a week, all hours of the day, at home and on their ways
The increase in the computing power gives a faster access to especially the management staff in a company. Also, the
the information stored in it; this has invariably increased quality of life issues would be incomplete without
reliance and vulnerability to computer systems by mentioning online love affairs. People also lose their jobs
individuals and many organizations. and ways of life because of information systems. All these
are valid concerns of information systems.
(b) Decline in Data Storage Cost
The storage of data online is one of the factors that led to the 5. Codes of Ethical Conduct in Our Society
decline in the storage cost. Thus, this has made several
organizations to easily maintain and increase detailed According to Woodbury [15], instead of investing in “the
databases of individuals. perfect crime detection tool, a better approach might be to
virtue ethics”, and goes on to suggest that perhaps an
(c) Advance in Data Analysis “honour code” would be a better solution. The essence of
This technological inclination has given organizations creating codes of ethical conduct in our society is to give the
greater ability to analyze detailed personal information of public a sense of trust in a group of professionals. These
individuals from vast quantities of data gathered; and also to professionals make good use of these codes to define the
develop detailed profiles of individual behaviors and non- limits of their activities and to help guide them in their
obvious relationship awareness (NORA). businesses and organizations. The codes of ethics are
promises by professions to control themselves in the general
(d) Advance in Networking and the Internet interest of the society.
This has enabled copying and movement of data from one
location to another and accessing large quantities of personal Most organizations have developed guidelines for the ethical
data from remote locations with ease. use of information system and computers and most
computer-related professional institutes have also published
4. The Moral Dimensions of Information guidelines for their members. Higher institutions of learning
and public schools have developed guidelines for their
Systems students, faculty members and employees about the ethical
use of computers. In addition, they encourage all their
The moral dimensions that can control the major ethical and system users to act responsibly, ethically and legally
social concerns generated by information systems are as whenever they are using computers and to obey accepted
follows: rules of online etiquette. Some of the impacted ethics and
public policy guidelines prohibit the followings:
(i) Information Right and Obligation
What information rights do individuals and organizations 1. To interfere with other people’s computer files
possess with respect to themselves? What can they protect? 2. Spying other peoples files
What obligation do individuals and organization have 3. To harm other people with the use of computers
concerning this information? [8]. 4. Stealing with the use of computers
5. Using computer to bear false witness
(ii) Property Rights and Obligations 6. Copying and using proprietary software without license
How will traditional intellectual property rights be protected 7. Using other peoples computer resources without legal
in a digital society in which tracing and accounting for authority
ownership is difficult and ignoring such property rights is so
easy? [8].
6. Conclusion <http://www.scribd.com/doc/18061081/Ethical-and-
Social-Impact-of-Information-Systems>. Accessed on
The study was carried out with a view of assessing the 30th Sep. 2012.
emerging technological trends that information systems are [2] Anonymous (2012). Social and Ethical Issues. [Online].
posing on the society. New challenges that have not been Available: <http://www.bodine.phila.k12.pa.
dealt with before in the society are beginning to materialize. us/kaufman /ITGSweb/socialethical.htm>. Accessed on
There is no doubt, the society is becoming more aware of the 28th Aug. 2012.
increasing complexity of information security and the ethical [3] Bradford, M. (2005). “Cyber Privacy Rules Challenge
concerns that revolves around the massive amount of Employers.” Business Insurance. Chicago: Nov 28,
possible infringes. Since it’s our world and future, we should 2005. Vol. 39, Iss. 48; pp.11-13.
be concerned and involved in its resolution. In view of this, [4] Gonsalves, A. (2004). “Latest Trojan ‘Phishies’ For
various organizations in the country especially the oil and Personal Data”. [Online]. Available:
gas industries are taking preventive actions through the http://internetweek.cmp.com/showArticle.html?articleID
enactment of codes of ethics and codes of conduct. =17301949. Accessed on 25th June, 2009.
Government agencies have also supported the society with [5] Haag, S., Paige, B. and Amy, P. (2006). Business
legislation for the protection of data integrity and privacy of Driven Technology. McGraw Hill.
individuals. [6] Henry, P. A. (2005). Firewall Consideration for IT
Manager.” Information Systems Security. New York:
Despite the benefits associated with the applications of No/Dec 2005. Vol. 14, Iss. 5; pp. 29-51.
information systems in our society, there are some [7] Laudon, K. C. and Laudon, J. P. (2010). “Management
underlying issues that arose from the main discussions. Information System- Managing the Digital Firm”.11th
Based on these, the following recommendations are ed. New Jersey; Pearson Prentice Hall.
suggested: [8] Laudon, K. C. and J.P. Laudon (2012). Ethical and
Social Issues in Information Systems, [Online].
The society must ensure each person is accountable for Available:www.prenhall.com/.../pdf/laudon%20MIS10_
everything he or she does, no matter how inexplicable his CH-04%20FINAL.pdf. Accessed on 25th Oct. 2012.
or her action may appear. [9] Nowduri S. (2011), Management Information Systems
Since there are growing complexities of ethical and social and Business Decision Making: Review, Analysis and
issues that revolve around multiple breaches, it becomes Recommendations, Journals of Management and
imperative for the educators and computer professional Marketing Research, 2011, pp 1-8.
bodies to develop curriculum on ethical and professional [10] Pearlson, K. E. and Saunders, C. S. (2006). Managing
codes of conduct in the information society and Using Information Systems: A Strategic Approach.
There is need to lay emphases on information systems 3rd ed. JohnWiley & Sons, Inc.
security controls [11] Polack, T. A. (2006), Ethical and Legal Issues for the
The government should develop a comprehensive laws Information Systems Professional, School of Business
and legislations to create a sense or awareness of Administration, 600 Forbes Avenue, Pittsburgh,
compliance requirements that affects information systems Procedings of the 2006 ASCUE Conference, June 11 -
professionals. 15, 2006, Myrtle Beach, South Carolina.
[12] Sovern, J. (2004). “Stopping Identity Theft”. The
Our law enforcement agents should be more sophisticated
Journal of Consumer Affairs. Madison: Winter 2004.
in their computer crime investigation. This can be
Vol. 38, Iss. 2; pg. 233-232.
enhanced with the use of computer forensics, which is a
[13] Valacich, J. and Schneider, C. (2010). “Information
formal investigative technique used in evaluating digital
Systems Today-Managing in the Digital World”. 4th Ed.
information for judicial review.
New Jersey; Pearson.
[14] Whitten J. L., Bentley L. D. and Dittman, K.C. (2001).
7. Future Scope “Systems Analysis and Design Methods”. 5th Ed. New
York: McGraw-Hill, 2001, pp. 8-45.
The introduction of information systems in our society can [15] Woodbury, M. (2002). Computer and Information
be usefully divided into three phases, two of which have Ethics. Champaign, Il: Stipes.
already occurred: the introduction stage and the circulation
stage. We have only recently entered the third and most
important phase which is the control phase; in which many
Author Profile
of the most serious social, political, legal and ethical
Engr. Mosud Y. Olumoye received a bachelor’s
questions involving information systems will present degree in Engineering from Ondo State University,
themselves on a large scale. Some of the discussions in this Ado-Ekiti in 1995, Master degree in Information
paper will give one an insight that the future developments Technology in Ladoke Akintola University of
in information systems will make ethics and social impacts Technology in 2006 and NOUN. He is a lecturer in
more vibrant and more important than ever. Lagos State Polytechnic, SPTSA, Mainland Annex and a consultant
in Fiatcom Nigeria Limited on ICT, Project Management and
Health, Safety and Environment (HSE). He has written many
References textbooks on ICT and research papers in international journals.
[1] Anonymous (2012). Ethical and Social Impact of
Information Systems. [Online]. Available:
Volume 2 Issue 11, November 2013
Paper ID: 02013404 158
www.ijsr.net