Chat with us, powered by LiveChat IT for Management: On-Demand Strategies for Pe | WriteDen

IT for Management: On-Demand Strategies for Pe

I need professional help to do my discussion paragraphs with two responses as explained in the attached.

If you don't get what is attached, please don't take the job.

The mentioned price is what I am willing to pay.

IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability

Eleventh Edition

Turban, Pollard, Wood

Chapter 14

Ethics, Privacy, and Sustainability

Learning Objectives (1 of 4)

2

Copyright ©2018 John Wiley & Sons, Inc.

IT Ethics

Predicting People’s Behavior

Predicting people’s behavior is big business, but companies may face backlash from customers or be subject to investigations or fines.

Mobile Apps and Risky Behaviors

93% top 200 free iOS & Andriod apps exhibited at least one risky behavior.

Apple policy prohibits user information gathering without permission, but countless 3rd party apps are unregulated.

3

Copyright ©2018 John Wiley & Sons, Inc.

Mobile Apps and Risky Behavior

Risky Behaviors

Location tracking

Accessing the device’s address book or contact list

Identifying user or phone unique identifier (UDID)

Recording in-app purchases

Sharing data with ad networks and analytics companies

Twitter, Foursquare, and Instagram routinely gather information from personal address books and other places on your phone.

4

Copyright ©2018 John Wiley & Sons, Inc.

Google Street View

Risky Behavior

Wardriving

Driving around sniffing out and mapping the physical location of the world’s Wi-Fi routers (see Wi-Spy).

Open Wi-Fi Networks

Non-password protected routers that provide access over wireless networks.

The FCC posted, “…collecting information sent over Wi-Fi networks clearly infringes on consumer privacy.”

5

Copyright ©2018 John Wiley & Sons, Inc.

Additive Manufacturing Dilemmas

3D Printing

Depositing tiny layers of material to create computer-assisted design and/or computer-assisted manufacturing blueprints.

Bioprinting

Using DNA to 3D print human body parts using bioprinting technology.

6

Copyright ©2018 John Wiley & Sons, Inc.

IT Ethics

By avoiding illegal conduct, do companies also act responsibly? Explain your Answer

What types of companies can benefit from predicting people’s behavior?

When is predicting people’s behavior a violation of privacy? Give an example.

When is predicting people’s behavior not a violation of privacy? Give an example.

What are the ethical challenges attached to 3D printing and 3D bioprinting?

Research the current debate about 3D printing and bioprinting.

7

Copyright ©2018 John Wiley & Sons, Inc.

Suggested Answers:

1. No. What is legal is not necessarily ethical or responsible. Laws lag behind what is possible to do because laws change slowly whereas technology changes rapidly.

 

2. Virtually any type. The most benefit is for those at the end of the supply chain (retailers, etc.)

 

3. Answers may vary. Certainly when personal data upon which the prediction relies are collected without consent, as appears with Target, especially for those underage.

 

4. Answers may vary. It depends on the level of intrusiveness, and that can be very subjective. One might argue that Canadian Tire’s credit card business inherently has purchase information and can analyze to determine risk of missed payments.

 

5. Answers may vary. There are many. They range from legal to illegal activities (e.g., theft of intellectual property.) When demand is high, will living and/or nonliving medical organs/devices go to the highest bidder? Who is legally responsible for ensuring the quality of the resulting organs and devices? In some cases, 3D printing may be the only mechanism to produce an item. 3D printing is costly. In cases where non-additive manufacturing can do the same at less cost, which will be used?

 

6. Answers will vary.

7

Learning Objectives (2 of 4)

8

Copyright ©2018 John Wiley & Sons, Inc.

Privacy and Civil Rights

Privacy

Right, or freedom of choice and control to self-determine what information about you is made accessible, to whom, when, and for what use or purpose.

Breach of Privacy

Unauthorized disclosure of personal information.

Privacy Paradox

Phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree.

9

Copyright ©2018 John Wiley & Sons, Inc.

Figure 14.2: Major Data Breaches Reported by 1,040 Adult Americans in 2016 Pew Research Privacy and Security Study

10

Copyright ©2018 John Wiley & Sons, Inc.

Privacy Paradox: Social Recruitment

Social Recruitment

Use of social media to engage, share knowledge among, and recruit and hire employees.

Often involving information the candidate did not want considered (or is illegal) to use in the hiring process.

Typical recruitment includes all job levels:

11

Copyright ©2018 John Wiley & Sons, Inc.

Social Recruitment: Best Practices

Best practice provisions for recruiters:

Have either a third party or a designated person within the company who does not make hiring decisions do the background check.

Use only publicly available information. Do not friend someone to get access to private information.

Do not request username or passwords for social media accounts.

Recruiters are also social stalkers!

12

Copyright ©2018 John Wiley & Sons, Inc.

Civil Rights: Protected Classes

Civil Rights

Rights protected by federal law, such as freedom of speech, press, and assembly; the right to vote, etc.

EEOC (Equal Employment Opportunity Commission)

Enforces federal laws prohibiting discrimination in employment.

Protected classes

Characteristics identified by law that cannot be used in the hiring process.

13

Copyright ©2018 John Wiley & Sons, Inc.

Civil Rights: Discrimination

Discrimination

Biased or prejudicial treatment in recruitment, hiring, or employment based on certain characteristics, such as age, gender, and genetic information, and is illegal in the United States.

Corporate Social Media Discrimination

The use of protected class information to weed out candidates.

Social Media Discrimination

Visiting a person’s social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices.

14

Copyright ©2018 John Wiley & Sons, Inc.

Civil Rights: Negligent Hiring

Competing Legal Concerns

Two competing legal concerns are discrimination & negligent hiring.

Negligent Hiring

If a workplace violence incident occurred and the attacker’s public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision.

15

Copyright ©2018 John Wiley & Sons, Inc.

Reducing Risk of Negligent Hiring

Ask candidates to sign a disclosure statement

Allow self-disclosure

Create a standard process and document it

Consistent well-documented processes

Avoid coercive practices

Eliminate recruiter pressure for applicant disclosure

Training

Emphasize related compliance

16

Copyright ©2018 John Wiley & Sons, Inc.

16

Privacy Paradox, Privacy, and Civil Rights

Describe privacy.

What is the phenomenon where social users are concerned about privacy but their behaviors contradict these concerns?

What is the use of social media to find, screen, and select job candidates?

Rejecting a job candidate because of concerns about the person’s health from information on his or her Facebook page is an example of what?

Age, disability, gender, religion, and race are examples of what?

Why are the legal concepts of discrimination and negligent hiring competing demands on a business?

17

Copyright ©2018 John Wiley & Sons, Inc.

Suggested Answers:

1. Privacy is the right to self-determine what information about you is made accessible, to whom, when, and for what use or purpose. Privacy means we have freedom of choice and control over our personal information, including what we do not want shared with or used by others.

 

2. The privacy paradox refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree. Users of social sites often claim that they are concerned about their privacy. At the same time, they disclose their highly personal lives, even content that is incriminating or illegal, in their profiles or posts.

 

3. Social recruitment refers to use of social media to find, screen, and select job candidates. Often it involves searching information the job candidate did not want considered or that is illegal to use in the hiring process.

 

4. This is an example of corporate social media discrimination.

 

5. Protected classes.

 

6. Two competing legal concerns are discrimination and negligent hiring. These put pressure on prospective employers to find out what they can about a potential employee, to avoid negligence in hiring, yet not cross the line into discrimination.

Discrimination. Most employers have stringent employment policies that prevent their recruiters and hiring managers from learning potentially discriminatory information about candidates. Visiting a person’s social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices.

Negligent hiring. Employers must consider the potential risk of a negligent hiring or negligent retention lawsuit related to social networking profile information. It is possible that if a workplace violence incident occurred and the attacker’s public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision.

17

Learning Objectives (3 of 4)

18

Copyright ©2018 John Wiley & Sons, Inc.

Technology Addictions: Cognitive Overload

Cognitive Overload

Interferes with our ability to focus and be productive.

Potential modern causes:

Mobile apps

Wearable technology

Constant updates

Desire to stay connected

50% of American teens suffer from Fear Of Missing Out (FOMO)

19

Copyright ©2018 John Wiley & Sons, Inc.

Focus Management

Being Able to Focus Counts

An inability to concentrate for longer periods reduces an ability to distinguish important information from trivia.

Some researchers estimate that distraction costs hundreds of billions of dollars a year in lost productivity.

Heavy online users (media high multitaskers) scored poorly on cognitive tests.

20

Copyright ©2018 John Wiley & Sons, Inc.

Focus Recovery

Lost focus can take about 25 minutes recovery time.

Noradrenaline, a chemical that helps us concentrate, is released by focusing.

The best strategy to improve focus: practice doing it.

There is disagreement if multitaskers are working as well as they could, or they could improve their focus.

21

Copyright ©2018 John Wiley & Sons, Inc.

Technology Addictions and Focus Management

What are several potential causes of cognitive overload?

What are the consequences of constant distractions?

When a person is distracted, how long does it take to return to the task at hand and get focused again?

Why are senior managers interested in focus management?

What is the difference between the performance of high and low multitaskers on cognitive tests?

How can multitaskers improve their ability to focus?

22

Copyright ©2018 John Wiley & Sons, Inc.

Suggested Answers:

1. Tweets, texts, e-mail, social media, and annoying electronic static are potential causes.

 

2. Distractions cause a loss of focus and a loss of productivity.

 

3. Gloria Mark, a professor of informatics at the University of California, Irvine, says a worker distracted by a Web search that goes rogue or a new text or tweet can take about 25 minutes to return to the task at hand and get focused again (Dumaine, 2014).

 

4. To improve creativity and productivity. If your mind is free of distraction, your mind is better able to absorb data, interactions, and trends and synthesize the new information with what you already know. As a result, you are more likely to come up with innovative ideas.

 

5. In contrast to widely held assumptions, subjects who were Media (high) multitaskers scored poorly on cognitive tests.

 

6. The best strategy to improve focus is to practice doing it.

22

Learning Objectives (4 of 4)

23

Copyright ©2018 John Wiley & Sons, Inc.

23

ICT and Sustainable Development

Being profit-motivated without concern for damage to the environment is unacceptable.

Companies should conduct themselves in an ethical, socially responsible, and environmentally sustainable manner.

The IT industry sector is called the Information and Communications Technology, or ICT, in emissions reports.

24

Copyright ©2018 John Wiley & Sons, Inc.

Figure 14.1: The 4 R’s of environmental sustainability

24

IT and Global Warming

Global warming refers to the upward trend in Global Mean Temperature (GMT).

This is driven by the greenhouse effect, which is the holding of heat within the earth’s atmosphere.

Carbon emissions directly contribute to the greenhouse effect.

25

Copyright ©2018 John Wiley & Sons, Inc.

Figure 14.1: The 4 R’s of environmental sustainability

25

Global Warming IT Sector Actions

McKinsey & Company conclude the following:

IT sector’s own footprint of 2 percent of global emissions could double by 2020 because of increased use of tablets, smartphones, apps, and services.

IT sector must continue to reduce emissions from data centers, telecom networks, and the manufacture and use of its products.

IT has the unique ability to monitor and maximize energy efficiency both within and outside of its own industry sector to cut CO2 emissions by up to 5 times this amount.

26

Copyright ©2018 John Wiley & Sons, Inc.

Sustainability Through Climate Change Mitigation

Every IT user, enterprise, and nation plays a role in climate change mitigation.

Wired and mobile networks enable limitless data creation and consumption

Energy used to power data centers, cell towers, base stations, and recharge devices is damaging the environment and depleting natural resources.

Innovative sustainability initiatives hold the key to curbing these emissions and carbon footprint, thereby reducing environmental impact.

27

Copyright ©2018 John Wiley & Sons, Inc.

Technology to Transform Business and Society

People hold the power to shape and apply technology to create positive change, improve lives and transform business and society.

Accenture’s Technology Vision 2017 is an analysis of key IT trends that are expected to disrupt business and society over the next three years.

According to Vision 2017, taking a people first approach by empowering people with more human technology will allow organizations to improve performance by redefining their relationship with customers and employees from provider to partner.

28

Copyright ©2018 John Wiley & Sons, Inc.

Top Five Disruptive Technologies 2015-2017

Vision 2015 Vision 2016 Vision 2017
Internet of Me Intelligent Automation Artificial Intelligence as the new User Interface
Outcome Economy Liquid Workforce Design for Humans
Platform Evoluation Platform Economy Ecosystems as Macrocosms
Intelligent Enterprise Predictable Disruption Workforce Marketplace
Workplace Reimagined Digital Trust The Uncharted

29

Copyright ©2018 John Wiley & Sons, Inc.

Top Five Disruptive Technologies (1 of 2)

AI is the new UI

AI is becoming the new user interface (UI), underpinning the way we transact and interact with systems.

AI will revolutionize the way businesses gain information from and interact with customers.

Design for Humans

Technology design decisions are being made by humans, for humans.

Organizations need to understand not only where people are today, but also where they want to be.

30

Copyright ©2018 John Wiley & Sons, Inc.

Top Five Disruptive Technologies (2 of 2)

Ecosystems as Macrocosms.

Digital ecosystems are transforming the way organizations deliver value.

Workforce Marketplace.

Companies are dissolving traditional hierarchies and replacing them with talent marketplaces of independent freelance workers.

The Uncharted.

Businesses must delve into uncharted territory, seizing opportunities to establish rules and standards for entirely new industries.

31

Copyright ©2018 John Wiley & Sons, Inc.

The Next Wave of Disruption

Next…More Disruptive Disruption

High-performing business leaders now accept that their organizations’ future success is tied to their ability to keep pace with technology.

Technology is more important than ever to their business success.

Biggest IT innovations will not be in the technology tools themselves, but in how they are designed with people in mind.

A people first approach is the key to any organization’s digital success.

32

Copyright ©2018 John Wiley & Sons, Inc.

ICT and Sustainable Development

Why do some experts warn that carbon emission reductions between 50 percent and 85 percent are necessary by 2050?

What contributes to the rise of global mean temperature?

What is the greenhouse effect?

How does the use of mobile devices contribute to the level of greenhouse gases?

What is ICT’s role in global warming?

Why is global warming hotly debated?

What is the role of IT in sustainable development?

Why is it important for organizations to take a people first approach to IT?

33

Copyright ©2018 John Wiley & Sons, Inc.

Suggested Answers:

Carbon emission reductions between 50 percent and 85 percent are necessary by 2050 to prevent the global temperature from rising too much too fast because of the greenhouse effect.

Increases in CO2 resulting from human activities that generate carbon emissions have thrown the earth’s natural carbon cycle off balance, increasing global temperatures and changing the planet’s climate. Climatologists estimated that countries must keep the global mean temperature (GMT) from rising by more than 2°C (3.6°F) above the preindustrial GMT in order to avoid profound damage to life on the earth. Damage includes water and food scarcity, rising sea levels, and greater incidence and severity of disease.

The greenhouse effect is the holding of heat within the earth’s atmosphere. CO2 and other greenhouse gases (GHGs) trap the sun’s heat with-in the earth’s atmosphere, warming it and keeping it at habitable temperatures.

The surge in energy used to power data centers, cell towers, base stations, and recharge devices, all of which support mobile devices, is damaging the environment and depleting natural resources.

ICT plays a key role in reducing global warming. Transforming the way people and businesses use IT could reduce annual human-generated global emissions by 15 percent by 2020 and deliver energy efficiency savings to global businesses of over 500 billion euros, or $800 billion U.S. And using social media, for example, to inform consumers of the grams (g) of carbon emissions associated with the products they buy could change buyer behavior and ultimately have a positive eco-effect.

Many scientists and experts are extremely alarmed by global warming and climate change, but other experts outright deny that they are occurring.

Every IT user, enterprise, and nation plays a role in climate change mitigation. Climate change mitigation is any action to limit the magnitude of long-term cli-mate change. Examples of mitigation include switching to low-carbon renewable energy sources and reducing the amount of energy consumed by power stations by increasing their efficiency.

According to Accenture’s Vision 2017, taking a people first approach by empowering people with more human technology will allow organizations to improve performance by redefining their relationship with customers and employees from provider to partner. This will require organizations to change the way they develop their business models and provide technology that support them to promote social responsibility.

33

Copyright

Copyright © 2018 John Wiley & Sons, Inc.

All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

34

Copyright ©2018 John Wiley & Sons, Inc.

34

,

This Request will consist of three Important part that should be understanded before starting this Business:

1. The Paper should be paragraphed (one up to one and half page) introduction, body in details, conclusion.

1. One response to one pair that include one different reference of the actual paper and on the same subject (two up to three lines).

1. One response to one pair that include one different reference of the actual paper and on the same subject (two up to three lines).

Module 14: IT Ethics, Privacy, and Sustainability:

 

Ethical behavior is paramount to an organization’s short- and long-term success. For your final Discussion Board reply, read this source about common unethical IT behavior. Then, select an organization that has experienced one of the behaviors noted in the article (https://sites.google.com/site/cyberethics01/home/common-unethical-behavior-of-students-and-teachers).

Discuss the following organization-specific information in your response:

1. What unethical IT behavior was demonstrated by the selected organization or its employees?

2. What are the potential consequences for both the organization and the individuals involved?

3. How can the organization prevent such behavior occurring in the future?

4. Actively monitoring the behavior of employees who are using the various IT systems in the corporation would be one such approach. Would you be happy with your company adopting that approach? Explain your reasoning. but that could create new problems. Explain?

Support your initial discussion post with at least two scholarly references.

You are required to reply to at least two peer discussion question ‘’ Need to provide this Part from your Side through providing two to three lines of information of the subject with their reference of each peer respond’’. post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post's answer. Normal course dialogue does not fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.

Embed course material concepts, principles, and theories (including supporting citations) along with at least two current, scholarly, peer-reviewed journal articles.

Keep in mind that current scholarly references can be found in the Saudi Digital Library by conducting an advanced search. Current research means published in the last five years.

· The reference Should be in Apa7th and add in-citation Text. And up to 3 or more references.

· Discussion Should include Introduction, body or analysis, conclusion.

· It should be paragraphed of one to one & half page.

· Need to provide this Part from your Side through providing two up to three lines of information of the subject with their separated reference of each peer respond

· ‘’ need two peer responds – with different refrances’’

· I would like to see more depth for the question

· Plagiarism All work must be free of any form of plagiarism.

· Written answers into your own words. Do not simply cut and paste your answers from the Internet and do not copy your answers from the textbook

Required: 

Chapter 14 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability

Ocak, S., Köseoglu, M. A., & Yildiz, M. (2020). Business ethics research in healthcare management: A systematic reviewInternational Journal of Healthcare Management, 13(2), 170–176.

Wenhong, C., & Wuan-Haase, A. (2020). Big data ethics and politics: Toward new understandingsSocial Science Computer Review, 38(1), 3–9.

Recommended:

Chapter 14 PowerPoint slides

,

Information Technology for Management

On-Demand Strategies for Performance, Growth and Sustainability

Eleventh Edition

Eleventh Edition

Information Technology for Management

On-Demand Strategies for Performance, Growth and Sustainability

E F R A I M T U R B A N

C A R O L P O L L A R D Appalachian State University

G R E G O R Y W O O D Canisius College

VP AND EDITORIAL DIRECTOR Mike McDonald EXECUTIVE EDITOR Lise Johnson EDITORIAL ASSISTANT Ethan Lipson EDITORIAL MANAGER Judy Howarth CONTENT MANAGEMENT DIRECTOR Lisa Wojcik CONTENT MANAGER Nichole Urban SENIOR CONTENT SPECIALIST Nicole Repasky PRODUCTION EDITOR Loganathan Kandan PHOTO RESEARCHER Billy Ray COVER PHOTO CREDIT © Ditty_about_summer/Shutterstock

This book was set in 9.5/12.5 pt Source Sans Pro by SPi Global and printed and bound by Strategic Content Imaging.

Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspira- tions. Our company is built on a foundation of principles that include responsibility to the communi- ties we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procure- ment, ethical conduct within our business and among our vendors, and community and charitable support. For more information, please visit our website: www.wiley.com/go/citizenship.

Copyright © 2018, 2015, 2013, 2011, 2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as per- mitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923 (Web site: www. copyright.com). Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street

HOW OUR WEBSITE WORKS

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of 
HIGH QUALITY & PLAGIARISM FREE.

Step 1

To make an Order you only need to click ORDER NOW and we will direct you to our Order Page at WriteDen. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
 Deadline range from 6 hours to 30 days.

Step 2

Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

Discounts

Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.