Implementing and Managing IT
13.
14.
15.
16.
17.
Chapter
17
IT Strategy and Planning
Information Technology Economics
Acquiring IT Applications and Infrastructure
Security
Impacts of IT on Individuals, Organizations, and Society
Impacts of IT on
Individuals, Organizations, and Society
Movie Piracy
Learning Objectives
17.1 Perspectives on IT Impacts
17.2 IT Is Eliminating the Barriers of Time,
After studying this chapter, you will be able to:
Space, and Distance
Understand the changes that take place in the workplace and the lives of individuals when information technology eliminates geographical and spatial barriers.
Describe some of the major impacts of information technology on individuals, organizations, and society.
17.3 Information Is Changing from a Scarce
Resource to an Abundant Resource
Discuss the positive and negative effects associated with the abundance of information made available by IT.
17.4 Machines Are Performing Functions
Identify the issues that arise due to uneven diffusion of information technology across countries and socioeconomic classes.
Previously Performed by Humans
17.5 Information Technology Urges People to
Reexamine Their Value Systems
Understand the complexity of effects of technological progress on labor markets and individual employees.
17.6 Conclusion
17.7 Managerial Issues
Discuss the impacts of information technology on the quality of life and interpersonal relationships.
Recognize the legal, ethical, and moral issues that become particularly critical due to proliferation of information technology.
Minicases:
1. Megachurches
2. RFID for Consumer Products
Integrating IT
ACC
FIN
MKT
POM
HRM
IS
SVC
663
MOVIE PIRACY
The Problem
Generations of moviegoers went to movie theaters to enjoy the latest films. They accepted the idea of paying for their movies. However, movie piracy, which has been greatly accelerated by information technology, is challenging this notion. Now, movie pirates are bringing
References: Australian Fishing Shop, http://ausfish.com.au (accessed July 2003 and May 2004). Balaker, T., “Riding Lap Tops to Work,” LA Daily News, March 23, 2005. Consumerunion.org, “Consumer Reports Finds Personal Privacy Concerns in Planned Uses of Radio Frequency Identification Tags (RFIDs),” May 4, 2006, consumersunion.org/pub/core_product_ safety/ 003431.html (accessed October 2006). Begley, S., “This Robot Can Design, Perform, and Interpret a Genetic Experiment,” Wall Street Journal, January 16, 2004, p Carlson, C., “Experts Fear Weak Data Theft law,” eweek, October 31, 2005. “Corporate Data Sheet,” Trend Micro Incorporated, trendmicro.com (accessed 2004). Defacto, “Joint Efforts to Achieve Spam-Free Internet Access,” November 2005, defacto-cms.com/news/2005/11/joint-efforts-toachieve-span-free-internet-access.html (accessed October 2006). xml (accessed October 2006). Ferguson, W. M., “Now Lectures Anytime, Anywhere,” New York Times, November 6, 2005, Section 4A, p Fisher, D., and C. Carlson, “Data Theft Spurs Lawmakers,” eweek, February 28, 2005. Hinduja, S., “Trends and Patterns Among Online Software Pirates,” Ethics and Information Technology, 5(1), 2003, p Johnson, K., “TV Screen, Not Couch, Is Required for This Session,” New York Times, June 8, 2006. Kenney, B., “ALA Leaders/Staff Meet on CIPA: A Time to Regroup,” Library Journal, 128(15), September 15, 2003, p King, R., “Stores Stocking Up on Self-Help: Modern Checkout Means Shorter Lines,” Times-Picayune, May 2, 2004. Koerner, B., “Texas University Data Breach,” About.com, 2006, idtheft.about.com/od/2006/p/Texas_U.htm (accessed October 2006). Leblang, K. B., “Protecting Employers Against Bloggers,” February 15, 2006, forbes.com/columnists/2006/02/15/blogging-leblangemployment_cx_kl_0215leblang.html (accessed October 2006). Leung, C., “The Film World Takes on Digital,” Canadian Business, February 26, 2006. Logan, D., and F. Buytendijk, “The Sarbanes–Oxley Act Will Impact Your Enterprise,” Gartner Inc., March 20, 2003. Marriott, M., “Digital Divide Closing as Blacks Turn to Internet,” New York Times, March 31, 2006. McCombs School of Business, Data Theft Information Center, 2006, mccombs.utexas.edu/datatheft (accessed October 2006). McNichol, T., “Street Maps in Political Hues,” New York Times, May 20, 2004, p Melymuka, K., “Knowledge Management Helps Cut Errors by Half,” Computerworld, July 8, 2002, computerworld.com/databasetopics/ data/story/0,10801,72513,00.html (accessed July 2003). Moore, E. A., “When iPod Goes Collegiate,” Christian Science Monitor, April 19, 2005, csmonitor.com/2005/0419/p11s01-legn.html (accessed October 2006). National Center for Educational Statistics, “Internet Access in US Public Schools and Classrooms: 1994–2003, March 24, 2005. Privacy Rights Clearing House, “Implementing RFID Responsibly: Calling for a Technology Assessment,” June 21, 2004, privacyrights. org/ar/FTC-RFIDTestimony.htm (accessed October 2006). Ripley, A., “Hollywood Robbery,” Time, 163(4), January 26, 2004, p. 56. “Robots, Start Your Engines,” The Economist, 370(8366), March 13, 2004, p Sabre, Inc., sabre-holdings.com (accessed May 2004). Schiesel, S., “Welcome to the New Dollhouse,” New York Times, May 7, 2006, Section 2, p Schroeder, M., “States’ Efforts to Curb Outsourcing Stymied,” Wall Street Journal, April 16, 2004, p