{"id":11258,"date":"2018-05-29T23:30:19","date_gmt":"2018-05-29T23:30:19","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/?post_type=chapter&#038;p=11258"},"modified":"2018-05-29T23:30:19","modified_gmt":"2018-05-29T23:30:19","slug":"outcome-ethical-and-social-issues-in-it","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/chapter\/outcome-ethical-and-social-issues-in-it\/","title":{"raw":"Outcome: Ethical and Social Issues in IT","rendered":"Outcome: Ethical and Social Issues in IT"},"content":{"raw":"<h2>What you\u2019ll learn to do:&nbsp;identify the ethical and social issues associated with network security, privacy, and data collection that businesses must address<\/h2>\r\n<p>As you'll recall,&nbsp;the industrial revolution of the nineteenth century gave rise to a number of unforeseen&nbsp;ethical and social issues\u2014for instance, concerns about workplace safety, wages, discrimination, and child labor\u2014which led&nbsp;to&nbsp;real changes in worker protections, labor practices, and law. Similarly, the technology revolution of the twentieth century\u2014starting with the&nbsp;widespread use of the Internet and home computers\u2014has spawned a new set of ethical and social&nbsp;concerns that people a hundred years ago couldn't have imagined: for example, how should personal information and online privacy be protected? Who gets to own the information about our habits and \"likes\"? Before the advent&nbsp;of the Internet, people thought about and controlled their personal information in very different ways. Today, many of us lead complex online lives, and we may not even realize how&nbsp;our personal information is being collected and used. Companies like Caesars can collect data on the&nbsp;purchasing patterns, personal preferences, and professional\/social affiliations of their customers without their&nbsp;even knowing about it. In this section we'll explore some of the ethical and social issues related to network security, privacy, and data collection that businesses must address.<\/p>\r\n\r\nThe specific things you\u2019ll learn in this section include:\r\n<ul>\r\n \t<li>Discuss ethical issues in information technology<\/li>\r\n<\/ul>\r\n\r\n\r\n","rendered":"<h2>What you\u2019ll learn to do:&nbsp;identify the ethical and social issues associated with network security, privacy, and data collection that businesses must address<\/h2>\n<p>As you&#8217;ll recall,&nbsp;the industrial revolution of the nineteenth century gave rise to a number of unforeseen&nbsp;ethical and social issues\u2014for instance, concerns about workplace safety, wages, discrimination, and child labor\u2014which led&nbsp;to&nbsp;real changes in worker protections, labor practices, and law. Similarly, the technology revolution of the twentieth century\u2014starting with the&nbsp;widespread use of the Internet and home computers\u2014has spawned a new set of ethical and social&nbsp;concerns that people a hundred years ago couldn&#8217;t have imagined: for example, how should personal information and online privacy be protected? Who gets to own the information about our habits and &#8220;likes&#8221;? Before the advent&nbsp;of the Internet, people thought about and controlled their personal information in very different ways. Today, many of us lead complex online lives, and we may not even realize how&nbsp;our personal information is being collected and used. Companies like Caesars can collect data on the&nbsp;purchasing patterns, personal preferences, and professional\/social affiliations of their customers without their&nbsp;even knowing about it. In this section we&#8217;ll explore some of the ethical and social issues related to network security, privacy, and data collection that businesses must address.<\/p>\n<p>The specific things you\u2019ll learn in this section include:<\/p>\n<ul>\n<li>Discuss ethical issues in information technology<\/li>\n<\/ul>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-11258\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li><strong>Authored by<\/strong>: Linda Williams and Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":163,"menu_order":8,"template":"","meta":{"_candela_citation":"[{\"type\":\"original\",\"description\":\"\",\"author\":\"Linda Williams and Lumen Learning\",\"organization\":\"\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"fa604cbe-adfd-483f-b948-7d785b59ea74","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-11258","chapter","type-chapter","status-publish","hentry"],"part":11240,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/chapters\/11258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/wp\/v2\/users\/163"}],"version-history":[{"count":2,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/chapters\/11258\/revisions"}],"predecessor-version":[{"id":11289,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/chapters\/11258\/revisions\/11289"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/parts\/11240"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/chapters\/11258\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/wp\/v2\/media?parent=11258"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=11258"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/wp\/v2\/contributor?post=11258"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/wp-json\/wp\/v2\/license?post=11258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}