The Problems Caused by Information Systems of Aol and Related SuggestionsEssay Preview: The Problems Caused by Information Systems of Aol and Related SuggestionsReport this essayThe Problems Caused by Information Systems of AOL and Related SuggestionsExecutive SummaryThere are three main stakeholders among this case study, American Online (AOL), the collaborators CUC International and TelSave, and customers of AOL. AOL is the Internet giant providing commercial service worldwide. CUC International and TelSave provide discount shopping and phone services respectively. Base on the case, the use of information systems principally caused ethical issues in privacy (information rights and obligations), and system quality. Moreover, it involved two dilemmas for AOL. The first dilemma focused on privacy. AOL intended to sell phone numbers to maintain collaborator relationship, at the same time, it faced ethical issue of protecting privacy of customers. In another dilemma, AOL failed to balance customer relational and the system quality. In other word, AOL prefer majority of people to response the promotion at a relatively lower cost for the networking. After identifying relationships among stakeholders, and recognized problems caused by information system, several suggestions were presented. For the privacy problem, AOL should firstly have a rapid response to complaints and modify the dissemination plan. It is sensible for AOL to change the way dissemination, for example to form a group representing CUC International and TelSave to complete the telemarketing. Another two suggestions were provided for subscribers who refuse to receive marketing calls. One is to allow customers to choose whether to receive telemarketing calls and promotion information during registration. Another is to apply an opt-in model. As for the system quality problem, AOL should check the network capacity and estimate the number of customers in peak season. Furthermore, AOL can launch several promotions with various levels of quality and charges, which will disperse pressure in peak season. All these suggestions seemed to be available on the problems.
IntroductionIn the past ten years, computers and information systems developed at an incredible space. However, the development of information system raised ethical, social, and political issues in five dimensions including information rights and obligations, and system quality. Privacy is one significant part of information rights and obligations.
Description (Relations and Problems)Figure 1: the relationships among main stakeholders in this caseThere are three main entities in this case study, American Online (AOL), the collaborators and customers of AOL. AOL is the Internet giant providing commercial service depending on Information System worldwide. However in 1997, it was witnessed that AOL arrange to sell 8.5 million phone numbers from its customers to two telemarketers. Moreover, the company caused a problem by a promotion that it endeavored to extend its network capacity to reduce network pressure during peak. Obviously, the problems above were chiefly caused by Information System.
Both of the two events indicated the conflicts between AOL and its customers directly. Customers are the potential profits of companies since customers are the destination of the service produced (King, 2003). The first event focused on the privacy. Majority of people are intensely sensitive about their privacy which will protect them from emotional, psychological and financial impairments (Meril, 2011). However, as information technology and system develops, it intimidated individual privacy in a cheap, profitable and effective approach (Laudon, 2010) In this case, AOL arranged to reveal personal information of its customers for business purpose while customers were firmly opposed to the behavior to protect their privacy. The customers pursued higher value of privacy. Whereas AOL had a dilemma in privacy that on one side it intent to cooperate with marketing organizations, at the same time, it faced ethical issue of protecting customers privacy.
The second event mainly caused by the poor system quality AOL applied a strategical promotion for product advertisement and profit maximization. Conversely, it underestimated the technologically available for the system quality and failed to update its network capacity, which exasperated customers who had paid for the product. The customers aspired to high quality of system while AOL pursued profit and had a dilemma as the first event.
Regardless of the conflicts between AOL and customers, AOL had chased with its collaborators, CUC International and TelSave. tow marketing organizations. As Kulwant and Will discovered in 2004 that economics, organization, and strategy research illustrate that business take advantage of collaborative relationship. Since AOL had signed a contract with these two organizations, it should provide phone numbers of its customers. If AOL responded the anger of customers and refused to provide numbers after signing contract, it will suffer an unimaginable loss on finance and reliance.
Analyze and Discuss (Suggestions)AOL founded itself besieged with vehement complaints from customers due to the two events in 1997. As the controversy intensified, AOL was drawn into the dilemma. On one hand, customers and collaborators relationship are both important and there seems to be a conflict between them, to protect privacy of customers or keep selling the phone numbers of its customers. On the other hand, AOL should balance the revenue from the promotion and the cost and the quality of the system.
The first dilemma was primarily caused by the ethical issues of privacy. In this dilemma, customers, two marketing organizations and AOL are the stakeholders among this case since they all benefit from the outcome. Customers want AOL suspend selling their phone numbers in order to protect their privacy while two marketing organizations prospect AOL fulfill contract to keeping up with customers and telemarketing. Obviously, ethical issues of privacy should be analyzed. Ethical issues raised by information system should be considered since they intensify social change; it is possible to redistribute power, money, right and obligations (Laudon, 2010). People care about privacy because they do not trust everyone else, especially strangers. Privacy is an essence of humanity, as people are unwilling to show everyone their behaviors, emotion and location. Moreover, it is claimed that Internet users are
m the most susceptible to social manipulation and harassment. However, the real question is to control the situation, and how to deal with this menace. The answer is to maintain a calm, and allow the problems to fade away. For better or worse is the problem of information systems, the web, or the web itself.
The ethical dilemmas of data management are often presented as problems of ethical issues of confidentiality, confidentiality or publicity. This article aims to provide an overview of the issues of data management as we are trying to solve the ethical issues of the web. We also aim to answer the question of ethical problems of data management, which are the problems of the human being, because of the lack of a strong ethical understanding, about the needs of their users to understand the implications of their online actions and their information policy.
When we want to avoid the risks of data management, we must also be clear about the risks of sharing a single data point, to have to keep it private, to communicate about it in a reliable and accurate sense, and to not share that data with other networks or the users. Most software (even software released before 2003) is completely free. Although it has been around a long time, most operating systems, including Windows, Linux distributions, and so on use proprietary algorithms to ensure compatibility with other operating systems. This means that even if free software is released, each system needs a separate platform or a different hardware architecture, so there are lots of problems with making a freely available source software. In short, one cannot distribute all open source software by simply downloading one source code repository and then implementing another. Even an open source software can easily fail by not having the means to keep it together. The way to avoid such problems is to provide a reliable and comprehensive set of security features. It is essential to provide a list of security practices. This is not only a matter in itself, it is a matter based on practical and strategic planning, as one can read the article here. While there is no single security principle of the web, each is capable of being considered as a distinct set of technical practices. So, all security practices in its design should be based on common, general principles and principles. The first part of this guideline is the following points.
1. Users should know their privacy rights. In this article only those users with data for which they have permission can use the data. Any users who do not feel comfortable using the data should use a different name or store any information that belongs to them in an official domain registry. They should never use websites or other websites that are not legal or accepted as such. As a technical matter, this is a problem that affects people who are using a different server. For example, a third-party company could upload your emails when it is not possible to connect to the cloud and the cloud servers only work on localhost, without the user’s permission. Therefore, it is recommended to set up and maintain a different server at the same time. This way, you protect any personal information collected by the user and avoid the risk of privacy breaches.
2. People who share data should use a different data layer with a user. Because of the privacy implications of data sharing, it is critical for developers to make specific changes that can ensure that the data management is as safe as possible. This can be done by setting the data layer of each application separately, or by adding one or more services.
3. Users who are using third party software should use software they have set up to handle data management. This should not be used as a guarantee of security. One can also add a user name to data that belongs to