THE IMPACT OF INFORMATION SYSTEM ON ETHICAL AND MORAL ISSUES IN E-SOCIETY WITHIN THE LEGAL CONTEXT

1. INTRODUCTION
1.1 Problem Statement
Information systems have been long part of the process of the communication system around the world. Likewise, as any evolving and developing systems merges with the traditional ones people are used to, it will have subsequent effects and reactions from the affected public and its perpetrators.
The proponent of the research attempts to probe on the beginnings of the issues surrounding these continually progressing information systems and its ethical and moral implications on its e-society audience in a lawful milieu.

What impact does information systems have on ethics and morals within e-society- specifically with emphasis on factors of privacy, social, security, utility and e-deviance
How issues arise and how they are tackled within a particular legal framework and legal tradition

1.2 Research Objectives
By seeking to answer the questions stated above, the proponent also aims to fulfill the goals of this study.

To probe the socio-demographic profile of the users of e-society
To relate the current information systems used in South Africa as a contrast to that used in other parts of the world

To examine the perception of the respondents of the study on their moral and ethical concerns on the system versus that of the legal context

To determine the flexibility of the information systems on their operation within the law and vice versa

2. BACKGROUND
The laws passed and executed in South Africa have been touted as one of the most progressive. Its current 1996 constitution is recognized worldwide as one of the most innovative in the liberal point of view (Msimang 2007). The provisions in the amended constitution have scrapped the most retrograding laws that are barriers to the countrys development and are unacceptable to todays society.
With a highly competitive constitution in comparison to other nations, it is also important to look on how it tackles the most progressive part of society today, the electronic medium in every citizens life. Unlike before where communication is as slow as the snail mail goes and information gathering is as manual as possible, information systems have developed to become the most efficient and most pervasive. From computerized data in main offices, it had transported and evolved to cyberspace to cater its e-society audience for a faster and wider reach.

Information systems are used as the perfect mechanism to complement the need to provide a way to serve the e-society audience. Since the powerful system is used worldwide by both private and government institutions, it is important to look at its effects to the affected public.

The proponent of this research seeks to fully substantiate the post-effects of the South African information system on the privacy it incurs to its users, the organization of the system and unwarranted reactions of its users among others as it is covered by the laws of the country. Lastly, by gathering related data on the information system used in South Africa it would be easier to compare it with the systems implored around the world.

3. THEORETICAL FRAMEWORK
The crucial factors in any analysis of the effects of the information system are the reactions elicited from the users and the interpretation of these particular systems in the legal context. To be to analyze these units of study in a uniform matter, the proponent of the research approached the study through the integration of the Social Categories and Strategic Information Systems Theory.

According to the Social Categories, people belonging to a specific category based on their socio-economic status and other similar characteristics are most likely to respond in same ways (De Fleur 1923). This theory invokes the representation of e-society in the study of the effects voiced out by the respondents of the study. Thus, there could be sump in the perception of the use of information systems and it would be easier to point deviant reactions towards it.

The same theory will answer how and why issues towards the information systems arise.

SHAPE   MERGEFORMAT
Figure 1. The Social Categories Theory process

On the other hand, the Strategic Information Systems (IS) Theory tackles the operations and management of the information systems. By knowing how it operates, it would be easier to transcribe it to the legal context. The risks conjured by the system is easily identified to what specific provisions does it disobey or overly follow (Clarke 1994).

Clarkes Strategic IS Theory allows users of the theory to further detail the study by incorporating ideas presented years before by Scott Morton.

Figure 2. Scott Mortons five forces influence of the organizations objective
As this theory discusses the key organizational structure it also shows the governance in the use of the system. Hence, it collaboratively sets detail on how it is flexible towards the legal structure implemented in the area.

Figure 3. Classification of Governance Modes
Incorporating the two hypotheses presented by the theories, the proponent of the research approaches the study with the need to look at the perception of the e-society towards the information system with the basic understanding on how they in turn understand the law.

Figure 4. Integrated Social Categories and Strategic Information Systems Theory

4. RESEARCH METHODOLOGY
In the methodology, the proponent explains the procedures, processes and other components considered and used to gather data for their research. Similarly, the proponent discusses the choice of methodology techniques that aided in describing and exploring the perceptions of the respondents.

4.1 Method of Data Selection
The stratified sampling method is the method of data selection used in the study. Since e-society audience can be further divided to groups representing specific characteristics it would be appropriate to approach the respondents in such a way.

Stratified sampling method also enabled the proponent to achieve statistical significance in the target population to be studied, the e-society. By using the stratified sampling, the proponent had established that there is an e-society that exists in South Africa.

4.2 InstrumentsTechniques to be used
To be able to reach as sufficient data to interpret, the proponent implores several qualitative and quantitative techniques to facilitate the data gathering and analyzing process. These research techniques were survey, textual analysis and case study.

Survey
Survey represented the quantitative data needed for the study. Since the perceptions of the population that makes up the e-society are needed, it would be efficient to have a standardized questionnaire to be answered by the respondents.

The survey is for respondents aged 18 and above, those who are able to make use of these information systems in government offices. Questions for the survey will be limited to 10-20 to full facilitate the exact questions needed to be answered. A screen test was used to filter the necessary respondents needed in the research.

Case Study
The case study technique pictures in detail the whole or several aspects of processes found in a social unit in such a way that the processes are explained in their real social context. By using this technique, it would be easier to limit it to a specific number of cases to study depending on how the cases would be able to exhaust the necessary requirements.
Specific incidents from the actual accounts of the respondents are needed. A case study guide is also provided to direct the proponent of the research on what incidents should be included in the study.  As accordance to the objectives of the study and on situations that may suit the cases, the proponent may use sociological and anthropological tools such as the survey approach and participant observation to gather the necessary data.

Textual Analysis
Textual analysis will be employed to show the legal context (laws, acts, bills, etc.) as the connecting point in the study. The moral and ethical standards of the legal system in South Africa will be based solely on what is written on the laws provided by the country and the international laws issued and followed.

This methodological technique will be aided by a qualified person (lawyer or political scientist) in analyzing the legal text. Legal jargons will be transformed in laymans terms to speed understanding process of the written legal documents.

4.3 Methodological Limitations
The research will be limited to the study of information systems on government systems since these are the most used by everyone in the country regardless of socio-demographic profile. But with the uniformity of the information systems used, it would allow the proponent to collect rich data from different groups.

Since the main target of the study is e-society, it will be limited to the issues surrounding the population targeted by the study in a cross-sectional time manner as information systems usually progress and develop fast.

Survey will be standardized based on the specific questions that are solely looking at the socio-economic demography of the respondents and the reactions from these specific demographic groups and sectors. The number of respondents will be between 100 and 200.
The laws that will be analyzed should be still executed and are applicable to all places in South Africa to look at in a general manner.

4.4 Methodological Significance
The use of survey, case study and textual analysis is very important in the course of data gathering and analysis of the study. It would provide the most effective information necessary on arriving at the conclusions and generalizations of the study.

Surveying and studying cases is very appropriate as the proponent performed the study in a cross-sectional time dimension. By using survey, statistical data can be derived from the respondents on how big and how significant is the population of the e-society and if truly does exist. Case studies, on the other hand, can give the vivid picture on the real facts behind the information system and its relationship with its users.

The textual analysis will give the framework in which the survey and case study will work on further. It will show how their can be a different perceptions between lawmakers and the affected public.  

4.5 Data Analysis Strategy
The prevalence of qualitative data in the study allowed the proponent to strategize using thematic analysis.

4.6 Ethical Issues
With the course of any research study, ethical issues will arise. The proponent of the research listed the ethical issues encountered in the data gathering process through surveying, studying cases and analyzing cases.

Privacy
Tackling issues on privacy and data information handling, means also respecting the privacy of the respondents and the institutions.

Confidential Data
 
There might be instances that confidential data from both the users of these information systems.
4.7 Sources of Information.

0 comments:

Post a Comment