Privacy and ethics in the age of the smartphone

Smartphones are fundamentally transforming almost all aspects of modern life. This case study examines moral and ethical issues surrounding the use of powerful smartphones that can be used to discreetly capture the activities of unsuspecting people. This case shows how a standard iPhone, coupled with widely available apps, can be used in a malicious manner to capture sensitive information. Furthermore, this case encourages students to consider issues surrounding privacy, ethics, ambition as well as corporate governance. This case is intended to be used at both the undergraduate and graduate levels. This case complements the model curriculum objectives in IS 2010.1, IS 2010.7 Case Summary: InBin, Inc., which was founded by an entrepreneurial-minded MIS major, evolved out of a business school project and into a successful technology company built around the iOS operating environment. The founder is a charismatic and visionary young man who built a company that was admired by many in the tech industry, including the leadership at Apple. However, the operating environment that gave rise to his company’s success also introduced risks that shook the company to its core.

[1]  Marc J. Epstein,et al.  The Drivers of Success in Post-Merger Integration , 2004 .

[2]  Z. Ács,et al.  Innovation, Market Structure, and Firm Size , 1987 .

[3]  Lawrence B. Mohr,et al.  Determinants of Innovation in Organizations , 1969, American Political Science Review.

[4]  Yasmin Merali,et al.  The strategic positioning of information systems in post-acquisition management , 1993, J. Strateg. Inf. Syst..

[5]  Gary D. Ellis,et al.  Measuring Flow Experiences in Daily Life: An Examination of the Items Used to Measure Challenge and Skill , 1998 .

[6]  Teresa M. Amabile,et al.  How to kill creativity. , 1998, Harvard business review.

[7]  K. Corts,et al.  Conduct parameters and the measurement of market power , 1999 .

[8]  Sebastiano Bavetta,et al.  Constraints and the Measurement of Freedom of Choice , 2001 .

[9]  David Simpson,et al.  Disaster preparedness measures: a test case development and application , 2008 .

[10]  Tadao Sumi,et al.  Ramp new enterprise information systems in a merger & acquisition environment: a case study , 2002 .

[11]  William L. Simon,et al.  The Art of Intrusion , 2005 .

[12]  Frederic M. Scherer,et al.  Size of Firm, Oligopoly, and Research: A Comment , 1965 .

[13]  Christopher Hadnagy,et al.  Social Engineering: The Art of Human Hacking , 2010 .

[14]  Edwin Mansfield,et al.  The Speed of Response of Firms to New Techniques , 1963 .

[15]  Morton I. Kamien,et al.  Market Structure and Innovation: A Survey , 1975 .

[16]  Antonis C. Stylianou,et al.  Post-merger systems integration: the impact on IS capabilities , 1999, Inf. Manag..

[17]  R. Kaplan,et al.  Linking the Balanced Scorecard to Strategy , 1996 .

[18]  J. Hage,et al.  Program Change and Organizational Properties a Comparative Analysis , 1967, American Journal of Sociology.

[19]  S. Eisenstadt The Political Systems of Empires , 1993 .

[20]  Markus Grünwald,et al.  Business Intelligence , 2009, Informatik-Spektrum.

[21]  James D. Blocher,et al.  Measurement of Firm Diversification: Is It Robust? , 1992 .

[22]  Y. Merali,et al.  Integrating information systems after a merger , 1995 .

[23]  Wil Allsopp Unauthorised Access: Physical Penetration Testing For IT Security Teams , 2009 .

[24]  R. Chandy,et al.  Radical Innovation in Firms Across Nations , 2008 .

[25]  Antonis C. Stylianou,et al.  Corporate mergers and the problems of IS integration , 1996, Inf. Manag..

[26]  Thomas D. Kuczmarski What is innovation? The art of welcoming risk , 1996 .

[27]  William L. Simon,et al.  The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .

[28]  U. Steger,et al.  The Roles of Supervisory Support Behaviors and Environmental Policy in Employee “Ecoinitiatives” at Leading-Edge European Companies. , 2000 .

[29]  Byeongju Jeong,et al.  Measurement of human capital input across countries: a method based on the laborer's income , 2002 .

[30]  P WillcocksLeslie,et al.  An empirical investigation of information technology sourcing practices , 1998 .

[31]  Ton Spil,et al.  Post-merger IT integration strategies: An IT alignment perspective , 2006, J. Strateg. Inf. Syst..