Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9 Information Systems Ethics and Computer Crime
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
3 Ethics and Privacy.
1 Information Systems Ethics and Computer Crime J. S. Chou Assistant Professor.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer ethics.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Chapter 11 Information Systems Ethics.
Ethical Issues in Information Technology First Annual Conference on Ethics and Technology Chicago, 1996 Mary Malliaris.
Computer Programming I
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computer Ethics for Computer Users
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
COMPUTER ETHICS Do you know the difference between right and wrong?
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Business Ethics Why should business ethics concern you?
Computer Crimes Career & Technology Education Department.
Information Systems Today: Managing in the Digital World -Dr. Ali Zolait Chapter Managing Information Systems Ethics and Crimes Worldwide losses.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
CHAPTER 5 ETHICS & PRIVACY.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
COMPUTER ETHICS AND LEGAL ISSUES
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Add video notes to lecture
The Legal System and Ethics in Information Security
Fundamentals of Information Systems
Five Unethical Uses of Computers
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Programming I
Presentation transcript:

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-2 Information Age Terms Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-3 Information Privacy and Issues *X Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government. Claim to privacy is protected by the Canadian Charter of Rights and Freedoms In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA) However, privacy can be challenged by the Internet: cookies, spyware Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government. Claim to privacy is protected by the Canadian Charter of Rights and Freedoms In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA) However, privacy can be challenged by the Internet: cookies, spyware

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-4 Other Privacy Concerns *X Intellectual property rights –Plagiarism from Internet Publishing slanderous information about a person on a website Etc…

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-5 Information Accuracy *MC Information Accuracy Concerned with assuring the authenticity and fidelity of information, and identifying those responsible for information errors that harm people Information Accuracy Concerned with assuring the authenticity and fidelity of information, and identifying those responsible for information errors that harm people Sources of information error Errors in computer output can come from two primary sources. These are: Machine Errors – errors in the computer program logic, communication and/or processing that receives, processes, stores, and presents information Human Errors – errors by the person(s) entering data or information into the computer system

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-6 Information Accessibility *X Information Accessibility Concerned with defining what information a person or organization has the right to obtain about others and how that information is used Information Accessibility Concerned with defining what information a person or organization has the right to obtain about others and how that information is used Who has access? Besides personal access, other parties have the legal right to access and view private information including: Government – using advanced software packages (e.g Carnivore), traffic and all online activity can be monitored in real-time or after the fact Employers – they can legally limit, monitor or access activities on company-owned computers or networks as long as policy has been distributed to employees

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-7 The Need for Ethical Behaviour *MC Ethical Behaviour Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit Ethical Behaviour Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-8 Responsible Computer Use *MC The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output Guidelines In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations Guidelines In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-9 Responsible Computer Use *X The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.) The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-10 Computer Crimes *MC Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions) Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-11 Computer Crime – Unauthorized Access Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME! Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME!

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-12 Computer Crimes – Who Commits Them? *X Unauthorized Access 1998 Survey of 1600 companies by PricewaterhouseCoopers 82% come from inside the organization (employees)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-13 Computer Crimes - Hacking and Cracking *MC Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-14 Computer Crimes – Cracker (Humorous)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-15 Computer Crime – Software Piracy *X Software Piracy This practice of buying one copy and making multiple copies for personal and commercial use, or for resale is illegal in most countries while others offer weak or nonexistent protections. This has become and international problem as shown below

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-16 Computer Crimes – Destructive Code *X

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-17 Cyberwar and Cyberterrorism *X Cyberwar An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country. Common targets include: Command and control systems Intelligence collection and distribution systems Information processing and distribution systems Tactical communication systems Troop and weapon positioning systems Friend-or-Foe identification systems Smart weapons systems Cyberwar An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country. Common targets include: Command and control systems Intelligence collection and distribution systems Information processing and distribution systems Tactical communication systems Troop and weapon positioning systems Friend-or-Foe identification systems Smart weapons systems

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-18 Cyberwar and Cyberterrorism *X Cyberterrorism The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals Cyberterrorism The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals Responses to the Threat At greatest risk are those that depend highly on computers and networking infrastructure (i.e. governments, utilities, transportation providers, etc.) Responses include: Improved intelligence gathering techniques Improved cross-government cooperation Providing incentives for industry security investment Responses to the Threat At greatest risk are those that depend highly on computers and networking infrastructure (i.e. governments, utilities, transportation providers, etc.) Responses include: Improved intelligence gathering techniques Improved cross-government cooperation Providing incentives for industry security investment

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-19 APPLIED COMPUTER SCIENCE DEPARTMENT *X Implementing an “Information Systems” pattern, and also “Health Informatics” pattern –Less technically and programming oriented than traditional applied cs –Courses: 1805 Introduction to Programming 1809 Website Design and Development 1903 Programming Fundamentals 1803 Intro to Information Systems 2814 Applications of Database Systems

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-20 IS Pattern More courses: 2909 Introduction to Internet Programming 2913 Software Requirements Analysis and Design 2916 Business Application Systems 3801 Principles in Information Systems 3816 User Interfaces in Information Systems 3811 Telecommunications 3907 eCommerce 3923 Technical Writing

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-21 Health Informatics Pattern Information systems as applied to: –Administration –Delivery of health care

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-22 Bus & Admin Students Can take a selected number of IS courses to add to resume –e.g. major area of concentration: Accounting (or Marketing) – courses taken: –Secondary area of concentration: Information Systems – courses taken: Introduction to Information Systems (A+),

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-23 FINALLY The End of ACS 1803 Good Luck on Exams and in Future!!!