Ethics and Information Systems: The Corporate Domain

IS-related ethical quandaries are receiving an increasing amount of attention. However, linkages to the normative theories of business ethics, which can be used in resolving these quandaries in the corporate domain, have been lacking. This paper enumerates and explains the three major normative theories. The stockholder theory holds that managers should resolve ethical quandaries by taking actions that increase the long- term profits to the stockholders without violating the law or engaging in fraud or deception. The stakeholder theory claims that managers should resolve ethical quandaries by balancing stakeholder interests without violating the rights of any stakeholder. The social contract theory states that managers should increase social welfare above what it would be in the absence of the existence of corporations without violating the basic canons of justice. The application of these theories to IS-related ethical quandaries is discussed, and a specific quandary dealing with a real-world example -- Blockbuster Video's reported plans to market customer lists -- is explored in depth. The managerial challenges associated with the theories are then explored.

[1]  T. Jones,et al.  An Agent Morality View of Business Policy , 1995 .

[2]  H. J. Smith,et al.  Managing Privacy: Information Technology and Corporate America , 1994 .

[3]  Dan Farrell Exit, Voice, Loyalty, and Neglect as Responses to Job Dissatisfaction: A Multidimensional Scaling Study , 1983 .

[4]  R. Mason Four ethical issues of the information age , 1986 .

[5]  Debra L. Shapiro,et al.  Voice and justification: Their influence on procedural fairness judgments. , 1988 .

[6]  John Kultgen,et al.  Donaldson’s Social Contract for Business , 1986 .

[7]  Thomas Donaldson,et al.  The ethics of international business , 1989 .

[8]  F. McFarlan,et al.  Corporate Information Systems Management: Issues Facing Senior Executives , 1995 .

[9]  E. Kallman,et al.  Ethical Decision Making and Information Technology: An Introduction with Cases , 1996 .

[10]  Thomas M. Jones,et al.  Corporate Social Responsibility Revisited, Redefined , 1980 .

[11]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[12]  Keith W. Miller,et al.  How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.

[13]  Thomas W. Dunfee,et al.  Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory , 1994 .

[14]  Effy Oz,et al.  When professional standards are lax: the CONFIRM failure and its lessons , 1994, CACM.

[15]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[16]  Jeff Smith,et al.  Privacy policies and practices: inside the organizational maze , 1993, CACM.

[17]  Effy Oz,et al.  Ethical Standards for Information Systems Professionals: A Case for a Unified Code , 1992, MIS Q..

[18]  Marcia P. Miceli,et al.  Blowing the whistle : the organizational and legal implications for companies and employees , 1993 .

[19]  L. Preston,et al.  The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .

[20]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[21]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[22]  J Hagel,et al.  The coming battle for customer information. , 1997, Harvard business review.

[23]  I. Kant,et al.  Grounding for the metaphysics of morals , 1981 .

[24]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[25]  Kenneth C. Laudon,et al.  Ethical concepts and information technology , 1995, CACM.

[26]  R. Edward Freeman,et al.  Ethics and Agency Theory: An Introduction , 1992 .

[27]  Florence M. Mason,et al.  Ethics of information management , 1995 .

[28]  Karen D. Loch,et al.  Ethics and computer use , 1995, CACM.

[29]  Deborah G. Johnson,et al.  Computer ethics (2nd ed.) , 1994 .

[30]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[31]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[32]  John Hasnas The Normative Theories of Business Ethics: A Guide for the Perplexed , 1998, Business Ethics Quarterly.

[33]  A Stark,et al.  What's the matter with business ethics? , 1993, Harvard business review.

[34]  A. Branscomb Who Owns Information?: From Privacy To Public Access , 1994 .

[35]  Milton Friedman,et al.  Capitalism and Freedom , 1963 .

[36]  Effy Oz Ethics for the Information Age , 1993 .

[37]  H. J. Smith,et al.  Database Marketing: New Rules for Policy and Practice , 1993 .

[38]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..