I want an essay to the below topic in 350 words using Apa format and only academically reviewed articles

Description




Ethics and Information Management





Using University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management.

Please note that Wikipedia articles will not be accepted for this discussion.






1. Write a comparative analysis of the articles noting the similarities and differences.




2. Compare the information in those articles to the materials in Chapter 14 of your textbook. Does the premise of those articles support the overall theme of the materials in Chapter 14 of your textbook? Why or why not?




3. Discuss what you learned from those articles. In your discussion, give example(s) of your organization handles ethic concerns as they relate to information management.







Attached is chapter14 ppt

Chapter 14
Ethical Risks and
Responsibilities of IT
Innovations
Prepared by Dr. Derek Sedlack, South University
Learning Objectives
Privacy
Paradox,
Privacy, and
Civil Rights
Responsible
Conduct
Six Technology
Trends
Transforming
Business
Technology
Addictions
and the
Emerging
Trend of Focus
Management
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
• Privacy
– Right, or freedom of choice and control to selfdetermine what information about you is made
accessible, to whom, when, and for what use or
purpose.
• Breach of Privacy
– Unauthorized disclosure of personal information.
• Privacy Paradox
– Phenomenon where social users are concerned
about privacy but their behaviors contradict these
concerns to an extreme degree.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
• Social Recruitment
– Use of social media to engage, share knowledge among,
and recruit and hire employees.
– Often involving information the candidate did not want
considered (or is illegal) to use in the hiring process.
– Best practice provisions are:
1. Have either a third party or a designated person
within the company who does not make hiring
decisions do the background check.
2. Use only publicly available information. Do not
friend someone to get access to private
information.
3. Do not request username or passwords for social
media accounts.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
• EEOC (Equal Employment Opportunity Commission)
– Enforces federal laws prohibiting discrimination in
employment.
• Protected classes
– Characteristics identified by law that cannot be used
in the hiring process.
• Discrimination
– Biased or prejudicial treatment in recruitment,
hiring, or employment based on certain
characteristics, such as age, gender, and genetic
information, and is illegal in the United States.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
• Corporate Social Media Discrimination
– The use of protected class information to weed out
candidates.
• Civil Rights
– Rights protected by federal
law, such as freedom of speech,
press, and assembly; the right
to vote, etc.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
• Completing Legal Concerns
– Two competing legal concerns are discrimination &
negligent hiring.
• Social Media Discrimination
– Visiting a person’s social media sites, however, clearly
creates the opportunity to view large amounts of
information going against these nondiscriminatory
practices.
• Negligent Hiring
– If a workplace violence incident occurred and the
attacker’s public social networking profile contained
information that could have predicted that behavior, the
employer may be held liable for negligence in not using
readily available information during the hiring decision.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
• Balancing the Competing Risks of Negligent Hiring and
Social Discrimination
1. Ask candidates to sign a disclosure statement
• Allow self-disclosure
2. Create a standard process and document it
• Consistent well-documented processes
3. Avoid coercive practices
• Eliminate recruiter pressure for applicant
disclosure
4. Training
• Emphasize related compliance
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Privacy Paradox, Privacy, and Civil
Rights
1. Describe privacy.
2. What is the phenomenon where social users are
concerned about privacy but their behaviors contradict
these concerns?
3. What is the use of social media to find, screen, and
select job candidates?
4. Rejecting a job candidate because of concerns about
the person’s health from information on his or her
Facebook page is an example of what?
5. Age, disability, gender, religion, and race are examples
of what?
6. Why are the legal concepts of discrimination and
negligent hiring competing demands on a business?
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
Privacy
Paradox,
Privacy, and
Civil Rights
Responsible
Conduct
Six Technology
Trends
Transforming
Business
Technology
Addictions
and the
Emerging
Trend of Focus
Management
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
Too Much Data?
• Big Data Analytics
– It is possible to identify personal habits and identify
patterns before self-disclosure, such as pregnancy.
– Targeting shoppers early in a cycle may improve
sales opportunities.
– Legal and social acceptability may be similar, but
they may be different. Legal compliance may not
translate to acceptable behavior.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
Irresponsible Conduct
• Predicting People’s Behavior
– Predicting people’s behavior is big business, but
companies may face backlash from customers or be
subject to investigations or fines (Wi-Spy).
• Mobile Apps and Risky Behaviors
– 93% top 200 free iOS & Andriod apps exhibited at
least one risky behavior.
– Apple policy prohibits user information gathering
without permission, but countless 3rd party apps are
unregulated.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
Irresponsible Conduct
• Risky Behaviors
1. Location tracking
2. Accessing the device’s address book or contact list
3. Identifying user or phone unique identifier (UDID)
4. Recording in-app purchases
5. Sharing data with ad networks and analytics
companies
Twitter, Foursquare, and Instagram routinely gather
information from personal address books and other
places on your phone.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
Irresponsible Conduct
• Wardriving
– Driving around sniffing out and mapping the
physical location of the world’s Wi-Fi routers (see WiSpy).
• Open Wi-Fi Networks
– Non-password protected routers that provide access
over wireless networks.
– The FCC posted, “…collecting information sent over
Wi-Fi networks clearly infringes on consumer
privacy.”
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
Irresponsible Conduct
• FTC vs. Facebook
– The only way Facebook’s business works is if they
can track what you do and sell that information to
advertisers.
– Is privacy expected?
– Should it be protected?
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
• Competing Responsibilities
– Intense competition demands using every tool or
technique to gain an edge or nullify a risk.
– Personal data collection while in most public spaces
allows retailers, through predictive analytics, to
better understand customers.
– Data collection and monitoring mean better
business, but also less privacy, and slow-changing
laws means legal limitations.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
• 3D Printing
– Depositing tiny layers of material to create
computer-assisted design and/or computer-assisted
manufacturing blueprints.
• Bioprinting
– Using DNA to 3D print human
body parts using bioprinting
technology.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
• 3D Printing Dilemmas and Debated Issues
– 3D-bioprinted human organs may be subject to
conflicting religious, political, moral, and financial
interests.
– 3D printers can exert impacts on the environment
worse than those of standard manufacturing.
– The technology will create new business models and
major challenges to intellectual property.
– The risks resulting from the ability to 3D print
weapons are obvious.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Responsible Conduct
1. By avoiding illegal conduct, do companies also act
responsibly? Explain your answer.
2. What types of companies can benefit from predicting
people’s behavior?
3. When is predicting people’s behavior a violation of
privacy? Give an example.
4. When is predicting people’s behavior not a violation of
privacy? Give an example.
5. What are the ethical challenges attached to 3D
printing and 3D bioprinting?
6. Research the current debate about 3D printing and
bioprinting.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
Privacy
Paradox,
Privacy, and
Civil Rights
Responsible
Conduct
Six Technology
Trends
Transforming
Business
Technology
Addictions
and the
Emerging
Trend of Focus
Management
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Technology Addictions and the
Emerging Trend of Focus Management
• Cognitive Overload
– Interferes with our ability to focus and be
productive.
– Potential modern causes:
• Mobile apps
• Wearable technology
• Constant updates
• Desire to stay connected
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Technology Addictions and the
Emerging Trend of Focus Management
• Focus Counts
– An inability to concentrate for longer periods
reduces an ability to distinguish important
information from trivia.
– Some researchers estimate that distraction costs
hundreds of billions of dollars a year in lost
productivity.
– Heavy online users (media high multitaskers) scored
poorly on the cognitive test.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Technology Addictions and the
Emerging Trend of Focus Management
• Focus Recovery
– Lost focus can take about 25 minutes recovery
time.
– Noradrenaline, a chemical that helps us
concentrate, is released by focusing.
– The best strategy to improve focus: practice doing it.
– There is disagreement if multitaskers are working as
well as they could, or they could improve their focus.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Technology Addictions and the
Emerging Trend of Focus Management
1. What are several potential causes of cognitive
overload?
2. What are the consequences of constant distractions?
3. When a person is distracted, how long does it take to
return to the task at hand and get focused again?
4. Why are senior managers interested in focus
management?
5. What is the difference between the performance of
high and low multitaskers on cognitive tests?
6. How can multitaskers improve their ability to focus?
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
Privacy
Paradox,
Privacy, and
Civil Rights
Responsible
Conduct
Six Technology
Trends
Transforming
Business
Technology
Addictions
and the
Emerging
Trend of Focus
Management
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
• The physical–digital blur signifies a new layer of
connected intelligence that augments employees,
automates processes, and integrates machines into our
lives.
• Converging Technologies
– The explosion of connected M2M (machine-tomachine) devices and IoT (Internet of Things)
– Greater bandwidth
– Advanced robotics, including expanding human–
robot collaboration in industries beyond
manufacturing
– Increased use of real time analytics
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
• Crowdsourcing
– Access or leverage of talent and/or resource pools
located anywhere and everywhere through cloud,
social, and collaboration technologies (Wikipedia).
• Crowdfunding
– Using crowdsourcing to monetize a project or idea
(Kickstarter).
– Accenture developed initial models that show that
crowdsourcing can lead to higher profits for
producers.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
• Data Supply Chain
– Treating data like a supply chain, flowing easily
through the entire organization.
– Requires data storage, IT infrastructure, big data
platforms, and APIs.
• Hyperscale
– The supersized, scalable, and resilient data centers
pioneered by data-dependent and social media
companies.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
• Apps Drive Business?
– 54% of the highest performing IT teams deployed
enterprise app stores.
– Adopting apps create better operational agility.
– Apps make life simpler for employees and
accelerate business growth.
• Isolation
– Failure in one component cannot bring down the
entire edifice.
• Redundancy
– every component is backed up by an alternative in
case it fails.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
• Next…More Disruptive Disruption
– High-performing business leaders now accept that
their organizations’ future success is tied to their
ability to keep pace with technology.
– Technology is more important than ever to their
business success.
– The flexibility of new technologies and architectures
will naturally change how IT makes it easier for
organizations to innovate.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 14
Six Technology Trends Transforming
Business
1. What technologies are blurring the boundary between
the physical and digital worlds?
2. What are the benefits of crowdsourcing?
3. Referring to trend 3, how should companies treat their
data?
4. What is hyperscale?
5. What do business apps improve?
6. Why is resilience necessary?
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Purchase answer to see full
attachment

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.