In: Operations Management
Do you believe that the medical industry embraces the
use of new technology faster or slower than other industries and
why?
Those that work within the information security /
information systems arena have access to a wide array of
confidential and proprietary information. What are some ethical
issues that could be faced while working in this environment and
how should concerns be addressed?
Businesses that develop all types of software
typically have a large base of programmers that work and develop
the software sold. Before the programmers begin work they typically
have to sign an agreement that states the programs develop become
intellectual property of the business. Is this an ethical issue?
Why do businesses require programmers to sign such
agreements?
Broad use of information systems has made identity
theft a common occurrence. What are things that everyone should do
to try and minimize the threat of identity theft? Is there anything
that can provide 100% assurance that ID theft won’t
happen?
Do you believe that the medical industry embraces the use of new technology faster or slower than other industries and why?
1. Many New Technologies Don’t Address The Real Problem
Tech entrepreneurs often take a backward approach to invention. They start by discovering a nifty technology. Later, they figure out how people can use it.
This technique often teaches entrepreneurs a tough lesson: Technology is worth nothing if it doesn't solve an important problem or improve lives.
Alan Cooper, considered by many to be the father of modern user experience design (UXD), said the ideal approach is "goal directed."
All of these serve as barriers that prevent the healthcare industry from fully integrating technology with its business management. Also, let’s not forget another important consideration — compliance. In the United States, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a law that mandates the protection of the confidentiality and security of health records, among other things. Healthcare institutions would have to ensure that any new technologies they adopt can adhere to HIPAA; otherwise, they would be breaking the law.
It’s a big challenge for software companies to provide the healthcare industry with beneficial, usable, and secure technologies that can easily be monetized. But at the same time, doctors — and other medical professionals as well — should also go out of their comfort zone and try their hand at going digital. When the general public from which patients come has already embraced the use of apps and mobile devices, there is no reason for the healthcare industry to lag behind.
However, a successful technological transformation in such a huge industry isn’t possible without the initiative of business leaders and the guidance of good governance. For hospitals and other medical organizations to change, boards themselves should be leading the change. And for this to happen, directors should have the necessary competencies, particularly technology competency.
Equipping boards with technology competency begins with directors who are open to innovation. They don’t have to be IT experts, but they need to be receptive to new technologies in order to steer their organizations in the right direction. The bad news is that not all directors have this mindset. But the good news is that conferences like the Texas Healthcare Trustees’ 2015 Healthcare Governance Conference strive to make directors in the healthcare industry reconsider their stance through proper information dissemination. In fact, one of the key topics of the THT Healthcare Governance Conference is “governance best practices to drive transformation.” Directors seeking guidance on how to transform their organizations through technology while remaining compliant will benefit from attending conferences of this nature.
Those that work within the information security / information systems arena have access to a wide array of confidential and proprietary information. What are some ethical issues that could be faced while working in this environment and how should concerns be addressed?
From large corporations to small businesses, individuals involved in all types of business often face ethical issues. For example, whether an employee can spend work time checking personal email accounts, how a manager deals with claims of harassment and to what extent a manager can "groom" a certain employee for a promotion are all examples of ethical issues regarding employee behavior. A business needs to develop plans for dealing with problems early to help prevent legal issues as the enterprise grows
Employee Behavior and Legal Issues
There are legal consequences for some unethical employee behavior. For example, if a supervisor discriminated against an employee based on her gender, religion or ethnicity when making recommendations for a promotion, legal action could be sought. Small business owners can help to prevent ethical problems stemming from employee behavior by drafting a clear, attorney-reviewed set of standards that dictate behavior policies for employees at all levels.
Employee Working Conditions
In addition to employee behavior, there are a number of ethical issues business people must consider about employee working conditions. For example, employers must be aware of the safety of their work environment and if they have compensated employees for all the time they have worked. The must also consider if they have required an employee to work an unreasonably long period of time or if they have him doing an unusually difficult task. Just like there are legal consequences for some unethical issues regarding employee behavior, there are also legal consequences for unethical working conditions. For example, an employer who requires an employee to work without pay or who creates an unsafe working environment can face legal action.
Supplier/Customer Relations
In addition employees and business owners must consider the ethical issues involved with their relationships between suppliers and customers. Business owners in particular must consider whether it is ethical to do business with suppliers who have unethical practices. When dealing with customers or clients, business people must ensure that they use their information correctly, do not falsely advertise a product or service, and do not intentionally do sub-standard work.
Small Business Ethics
Although there are ethical issues like discrimination that apply to all areas of business, each business area has its own ethical concerns. For example, business people who act as consultants must ensure they are giving sound advice. In the area of small business, some major ethical issues result from hiring, firing and dealing with employees. For example, conflicts of interest may cause ethical issues in small businesses, especially if they are family run. When personal family issues interfere with business decisions, this is a conflict of interest and an ethical concern
Businesses that develop all types of software typically have a large base of programmers that work and develop the software sold. Before the programmers begin work they typically have to sign an agreement that states the programs develop become intellectual property of the business. Is this an ethical issue? Why do businesses require programmers to sign such agreements?
The existence of software inevitably raises the question of how decisions about its use should be made. For example, suppose one individual who has a copy of a program meets another who would like a copy. It is possible for them to copy the program; who should decide whether this is done? The individuals involved? Or another party, called the “owner”?
Software developers typically consider these questions on the assumption that the criterion for the answer is to maximize developers' profits. The political power of business has led to the government adoption of both this criterion and the answer proposed by the developers: that the program has an owner, typically a corporation associated with its development.
I would like to consider the same question using a different criterion: the prosperity and freedom of the public in general.
This answer cannot be decided by current law—the law should conform to ethics, not the other way around. Nor does current practice decide this question, although it may suggest possible answers. The only way to judge is to see who is helped and who is hurt by recognizing owners of software, why, and how much. In other words, we should perform a cost-benefit analysis on behalf of society as a whole, taking account of individual freedom as well as production of material goods.
In this essay, I will describe the effects of having owners, and show that the results are detrimental. My conclusion is that programmers have the duty to encourage others to share, redistribute, study, and improve the software we write: in other words, to write “free” software.(1)
Broad use of information systems has made identity theft a common occurrence. What are things that everyone should do to try and minimize the threat of identity theft? Is there anything that can provide 100% assurance that ID theft won’t happen?
Techniques for collecting someone’s personal information have become more elaborate, and thieves are now using advanced strategies such as phishing, skimming, hacking, spyware and viruses to gather profiles of potential victims. By using basic personal information like your name, address and social insurance number, identity thieves can open credit card accounts, lease or buy cars, rent apartments or even engage in criminal activity using your stolen name.
While you may not be able to completely defend yourself from the threat of identity theft, you can certainly minimize your risk.
Here are 5 things you should be doing to help protect yourself and your family from identity theft:
Protect Your Passwords
I know it’s hard to ditch that password you have been using since you started your first Mail account, but you should be using different passwords for all of your accounts. Also, it is a good idea to change your passwords every few months. It also goes without saying; never share your passwords to any account!
Secure Your Personal Computer
Malware, viruses and malicious software are the primary threat to your home or personal computer. A virus can be transmitted to your computer over the internet or through email and can quickly cause a lot of damage to your files. You should be protecting yourself by using a firewall, which will basically only allow traffic to pass through that meets your predetermined set criteria.
Safeguard Your Personal Info
Be smart with your personal information. Keep details such as your birth date, hometown, phone number, etc. off social media and update your privacy settings to ensure your profiles are appropriately protected. When you do make a purchase online, make sure you are only providing your personal information on sites that use encryption (look for https:// in the URL and the lock symbol)
Review Your Statements
It’s an easy thing to forget, but it is important to check your credit card and bank statements when they arrive each month and report any discrepancies immediately. If you are having trouble remembering to check your statements, sign up for e-statements and most banks and credit card companies will even send you an email when your statement is ready!
Check Your Credit Score
You should be checking your credit at least once per year to ensure there are no inaccuracies on your reports; you can obtain a free copy of your report by contacting Equifax or Transunion. Another option offered by both companies is a monthly service that will allow you to check your score at anytime and automatically alert you of any changes.
Did you know?
You can add Identity Theft coverage to your home, condo or tenant
insurance policy? Identity Theft coverage through Buckley Insurance
provides up to $25,000 in the event of a loss to cover the
following:
• Lost wages
• Notary and filing fees
• Cost of obtaining credit bureau reports
• Phone calls, postage and shipping expenses
• New government-issued ID, if stolen
• 12 months of free credit monitoring
• Loan, Grant and other credit instrument re-application fees