Page 634 - Introduction to Business
P. 634

608     PART 6  Managing Business Operations, Management Information Systems, and the Digital Enterprise


             Information Systems Controls

             LEARNING OBJECTIVE 6
             Illustrate what businesses can do to assure the security and accuracy of their information systems.
        information systems controls The  Information systems controls are the policies, procedures, and technical measures
        policies, procedures, and technical  used to protect information systems and to assure the accuracy and reliability of
        measures used to protect information
                                     these systems. Information systems controls consist of system controls, procedural
        systems and to assure the accuracy
        and reliability of these systems  controls, and facility controls. Systems controls monitor the accuracy and security
        systems controls Controls to monitor  of the input, processing, storage, and output activities. Input controls include pass-
        the accuracy and security of the input,  words and other security codes, formatted data entry screens, and audible error
        processing, storage, and output
                                     signals. Processing controls identify errors in arithmetic or logical operations, as
        activities
                                     well as assure that data are not lost and are processed. Output controls ensure that
                                     information products are correct and complete and are available to authorized
                                     users in a timely manner. Access to the online output of computer networks is usu-
                                     ally controlled by security codes that determine which users can receive what infor-
                                     mation. Storage controls protect the data resources of an organization. Typically, a
                                     multilevel password system is used to protect databases. At the first level, the pass-
                                     word allows users to read information from a file in the database; at the second
                                     level, the password allows users to change information in the file; and at the third
        computer monitoring Using computers
                                     level, the password allows users to create or delete files in the database.
        to monitor the productivity of employees
        while they work



           Ethics in Business


                       Computer Monitoring


                       Computer monitoring is the use of      lance, it has also been blamed for causing health
                       computers to monitor the productivity  problems among monitored workers. Finally, com-
           of employees while they work. Supposedly, computer  puter monitoring has been blamed for robbing work-
           monitoring is done so employers can collect produc-  ers of the dignity of their work. In effect, some people
           tivity data about their employees to increase the effi-  say that computer monitoring creates an “electronic
           ciency and quality of service. However, computer   sweatshop,” where workers are forced to work at a
           monitoring has been criticized as unethical because it  hectic pace under poor working conditions.
           monitors individuals, not just work, and is done con-  Political pressure is building to outlaw computer
           tinually, thus violating workers’ privacy and personal  monitoring in the workplace. For example, public
           freedom. For example, in an airline reservations firm,  advocacy groups, labor unions, and many legislators
           the reservations agent may be timed on the number  are pushing for action at the state and federal levels
           of seconds he or she takes per caller to make an air-  in the United States. The proposed laws would regu-
           line reservation, the time between calls, and the num-  late computer monitoring and protect the worker’s
           ber and length of breaks taken. In addition, the reser-  right to know and right to privacy. In the meantime,
           vation agent’s conversation with the customer may  lawsuits by monitored workers against employers are
           be monitored.                                      increasing. So computer monitoring of workers is
              Computer monitoring has been criticized as an   one ethical issue that will not go away.
           invasion of the privacy of employees because, in
                                                              Source: Adapted from James O’Brien, Introduction to Information
           many cases, they do not know that they are being   Systems, 9th Edition, McGraw-Hill/Irwin, 2000. Copyright © 2000 by
           monitored or how the monitored information is being  The McGraw-Hill Companies, Inc. Reprinted with permission.
           used. Critics also say that an employee’s right of due
                                                              Questions
           process may be harmed by the improper use of col-
           lected data to make personnel decisions. Since com-  1. Discuss when computer monitoring may be ethi-
           puter monitoring increases the stress on employees    cal and when it may not.
           who must work under constant electronic surveil-   2. Should computer monitoring be regulated by laws?


                 Copyright 2010 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
   629   630   631   632   633   634   635   636   637   638   639