The Boom Of Management Information Systems Case Study

Improved Essays
The boom of Management Information Systems (MIS) has resulted in major social, financial, and economic advancements in the twenty-first century. But like any major milestone in the advancement of the human race, the development of MIS has come with issues of moral and ethical dilemmas. Both business and private uses of MIS have the potential to cause financial, economic, and in extreme cases physical and mental harm to parties that use these modernized services. In 2013, the Internet Crime Complaint Center (IC3) – a division for the Federal Bureau of Investigation (FBI), - “received 262,813 consumer complaints with an adjusted dollar loss of $781,841,611” (IC3.gov, 2014). Grave statistics such as this have led governing bodies on the federal, …show more content…
The internet is widely used as a distribution channel for proprietors to market their goods. Through the same avenue, individuals are also able to “share” digitalized products with each other. Unfortunately the owners or creators of these digitalized works stand to suffer financial detriment if an individual can share the products with others either freely or for profit. Before the passing of NET, the Copyright Act of 1976 was enacted to pose civil action against individuals who were illegally distributing the copyrighted work of another, but no criminal charges were allowable. NET resulted from a test case brought by the Department of Justice before the federal court in the District of Massachusetts - United States vs. LaMacchia. “The indictment sought criminal penalties under the general conspiracy and wire fraud statutes for the alleged conduct of the defendant, David LaMacchia” (Grosso, 2000, P. 23). Although the case was initially struck down, the government responded by enacting the NET act. The act has been inherently scrutinized by some who believe that private entities in the world of software and digital media creation influenced the decision to instate a criminally punishable act. According to Andrew Grosso, an attorney in Washington D.C. who serves as Chair of the ACM Committee on Law and Computer Technology, “it appears the …show more content…
This act was originally passed to protect citizens’ right to privacy in oral and telephone communications. A secondary foundation or ECPA was the Foreign Intelligence Surveillance Act of 1978 (FISA). ECPA governs the procedures under which law enforcement and government agencies must follow in order to intercept individuals’ private communication for uses in a criminal investigation. The law mandates that requirement of a subpoena or warrant by the law enforcement agency. ECPA does however allow for the electronic communication to be intercepted if one of the parties is consensual or if the communication takes place in a workplace setting during the course of a business transaction. With the internet and information systems in general being at a young age during the inception of ECPA, several amendments have had to be made. The increased use “smartphones and cloud computing introduced new problems as personal electronic communications and documents were increasingly stored in remote servers, rather than on home computers, which are fully protected by the Fourth Amendment provisions regarding search and seizure” (Codington-Lacerte, 2013 p. 2). ECPA continues to face the challenges of protecting the rights of individuals and the need to obtain information in the name of national and public

Related Documents

  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In The United States of America the National Security Agency has been working for ages to assure that the country is safe, but recently it has become a rising concern that they have overstepped their boundaries of American citizen’s privacy by operating surveillance technology all around the country and storing data form every phone call of citizens. With the American Citizens’ privacy at stake, each branch of government took its stand against the matter. The Judicial Branch has to come up with a legal compromise; the Legislative Branch and Congress are working to make surveillance laws that would better please its citizens, and the Executive Branch and the president have agreed to come up with an alternative to Section 215 of The Patriot Act. The Supreme Court has to establish a legal compromise to the surveillance of the American citizens considering it was said that what the National Security Agency/Central Security was doing went against Section 215 of the Patriot Act.…

    • 702 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fisa Pros And Cons

    • 531 Words
    • 3 Pages

    FISA is also mandated with collection of foreign intelligence which keeps the authorities up to date and on the lookout for external threats against the US. The coordinated efforts by DOJ and FBI have seen the war against terror minimize and has led to effective foreign intelligence gathering of information. Electronic surveillance allows the US to obtain intelligence surveillance on foreign powers such as spies or agents with a connection to international terrorism groups. The Act significantly maintained top secrets for national security matters at the same time providing essential oversight of the judiciary and congress.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Blown To Bits Analysis

    • 893 Words
    • 4 Pages

    Blown to Bits Chapter 6: Balance Toppled Summary: Chapter 6 of Blown to Bits is a very interesting chapter. Chapter six dives into the often undefined world of copyright rights in computing. Copyright laws allow people to have full rights over their creative works and ideas, but this concept does not translate very well into the world of technology. Because information can be transferred with unparalleled ease in the computing age, intentional and unintentional copyright violations have become common.…

    • 893 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    There are many challenges that law enforcement agencies faces when it comes to enforcing public safety at the same time protect the rights of individuals. Balancing civil liberties and fighting terrorism is a delicate task that is affecting the Department of Homeland Security (DHS). The focus is the of involvement relationship between public safety and individual rights. The first topic is the statutory authority and responsibilities of government officials, security personnel, and private citizens. The next topic involves the practices or laws relating to search, seizures, and surveillance by police, corrections, private citizens, and security personnel.…

    • 1705 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Resolved: The United States federal government should substantially curtail its domestic surveillance. Plan: The government will curtail its surveillance by only viewing collected data by means of a warrant. Intro-After the NSA reported their first transparency avowal, the publisher Omicron Technology Limited stated, “The report said 19,212 "national security letters"—administrative subpoenas that allow the FBI to collect information without a warrant—were issued last year, containing 38,832 requests for information.” These unwarranted leaks are why this problem needs to be solved. That is why we stand resolved that “The United States federal government should substantially curtain its domestic surveillance.…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    However, despite all of are major accomplishments in the past forty years, we’re facing a major problem with our privacy. As a result of almost 90% of Americans using the internet on a day to day basis, the Senate of the United States has just passed a resolution that removes our very right to privacy. As of matter of fact, the resolution known as “SJ Resolution 34” has been passed as a law and will remain a law until a supreme court justice deems it unconstitutional or the legislation repeals it. Presently, as of May…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Because online activities are treated like any other communications, the rules of privacy should apply. When people engage in online activities they have a legitimate expectation of privacy and this privacy is violated when the government accesses online activities without a warrant. The government should therefore not be allowed to access your online activities without a warrant. Moreover, there are situations where the government does not need a warrant but a court order to access this information. Despite the lesser evidence required for court orders, they nevertheless involve some adjudication on whether it is proper to infringe on the individual’s right to privacy.…

    • 1234 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    4th Amendment Essay

    • 790 Words
    • 4 Pages

    I. INTRODUCTION - Protection against unreasonable search and seizure is a cornerstone of the American Constitution. Violations of the Fourth Amendment are very controversial and may take years to resolve. In this case the Gotham City Transit Authority is attempting to initiate a policy which would allow random searches and x-ray scans of passengers and baggage entering a subway. The Olympus Civil Liberties Union is challenging the random searches, citing it would a violation of the Fourth Amendment. Despite their objections, random searches at airports are legal would also be legal at subways.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As Daniel Zwerdling states in his article, that “you can't claim that information is private" (NPR) If it has been shared with companies that hold the e such as phone companies, electric companies, etc. The government justifies the examination and seizure of personal records with this argument. As a result, with this view of the Fourth Amendment, the U.S. government has been able to conduct multiple investigations, including some that are relevant to terrorism and others that are…

    • 1215 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Being A Patriot Act Essay

    • 518 Words
    • 3 Pages

    3. The U.S.A. Patriot Act is an antiterrorism policy set forth immediately following the attacks of 9/11, in which various federal agencies are given increased power in determining the reach of domestic surveillance, interagency data sharing, law enforcement, immigration, individual privacy, civil liberties, and overall authority. The consequences of such an extensive act include endangerment of privacy, discouragement of free speech, potential abuses of civil liberties, an imbalanced and unchecked government authority, and increases in discrimination and profiling against Muslims, Arabs, and people who appear related to those two previous labels. Guantanamo Bay is an off shore military prison that holds people whom the U.S. consider to be suspected terrorists. Technically prisoners of the Bay are supposed to be guaranteed “humane treatment, free exercise of religion and medical treatment”(Civil Liberties).…

    • 518 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    4th Amendment Essay

    • 565 Words
    • 3 Pages

    Espionage requires doing things in an illegal manner; however, it should not violate the First Amendment in the United States’ Bill of Rights. The First Amendment stresses the people’s right of freedom of speech. Espionage and freedom of speech were always in conflict with each other as seen in the Supreme Court case Schenck v. United States. During that case, Schenck was convicted of breaking the Espionage Act of 1917 by telling people not to enlist in the army so the American government saw him as a threat. He was only expressing his opinion and not forcing anymore to join so he should have been protected by the First Amendment.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Fourth Amendment is comprehensive and highly valued by American citizens and reflects the framers belief that the government should not be allowed to interfere in some aspects of a citizen’s life. The Fourth Amendment clearly protects a person’s home and personal property, but their electronic communications are less defined and protected under current law. When the Constitution was written, paper records were all that existed and these were protected; electronic records should qualify equally and be considered the same as “papers and effects.”…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    H.L Mencken (1880 - 1956), an American essayist and social critic once wrote, “The average man does not want to be free. He simply wants to be safe.” In other words, Mencken claimed that humans prioritize safety over freedom. That means a man will gladly give up anything, including his rights and liberties, to acquire the protection he desires. This quote contradicts with the belief that America had been built upon.…

    • 526 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Electronic Communications Privacy Act, which updated the Federal Wiretap Act of 1968, expanded it to include provisions for interception of computer and other electronic communications. (DHS/Office for Civil Rights and Civil Liberties and DHS/Privacy Office) 3. The Foreign Intelligence Surveillance Act, enacted in 1978, a very effective method for monitoring the activities of foreign powers and agents of said powers while they operate within the United States. It was augmented even more with the enactment of the PATRIOT Act, which enhanced the federal government’s capacity to share intelligence, strengthened criminal laws against terrorism, removed obstacles to investigating terrorism, and updated the law to reflect new technology. (James G. McAdams)…

    • 1195 Words
    • 5 Pages
    Improved Essays