Fundamentals & Ethics of Information Systems IS 201

Slides:



Advertisements
Similar presentations
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Policies and procedures must be established to avoid computer waste and mistakes
INTERNET and CODE OF CONDUCT
Management Information Systems
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer Waste and Security Privacy Computer Health.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Security, Privacy, and Ethics
Professional Values and Basic Business Legislation.
Unethical use of Computers and Networks
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethics Privacy Employment Health Crime Working
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Ethics.
Topic 5: Basic Security.
Cybercrime What is it, what does it cost, & how is it regulated?
CONTROLLING INFORMATION SYSTEMS
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Welcome to the ICT Department Unit 3_5 Security Policies.
Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers.
Securing Information Systems
Information Technology Acceptable Use An Overview
Viruses & Destructive Programs
Acceptable Use Policy (Draft)
Principles of Information Systems Eighth Edition
Add video notes to lecture
Learn how to protect yourself against common attacks
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Fundamentals of Information Systems, Sixth Edition
Fundamentals of Information Systems
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Fundamentals of Information Systems Fourth Edition
BCT 2.00 Analyze Technology Issues
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Chapter 8 Developing an Effective Ethics Program
Policies and procedures must be established to avoid computer waste and mistakes
The Issues with Technology in education
Principles of Information Systems Eighth Edition
Chapter # 3 COMPUTER AND INTERNET CRIME
G061 - Network Security.
Principles of Information Systems Eighth Edition
Presentation transcript:

Fundamentals & Ethics of Information Systems IS 201 Chapter 7 The Personal and Social Impact of Computers Chapter7 – The Personal and Social Impact of Computers Slide 1

Learning Objectives Identify policies and procedures useful in eliminating waste and mistakes Explain the types and effects of computer crime and how to prevent it Identify specific actions to take to ensure the health and safety of employees Outline criteria for the ethical use of information systems Chapter7 – The Personal and Social Impact of Computers Slide 2

Chapter Overview Why Learn About Ethical Issues in ISs? Computer Waste and Mistakes Preventing Computer-Related Waste and Mistakes Computer Crime The Computer as the Object of Crime Preventing Computer-Related Crime The Work Environment: Health Concerns Ethical Issues in Information Systems Conclusion Chapter7 – The Personal and Social Impact of Computers Slide 3

1. Why Learn About The Personal and Social Impact of Computers Computers are used by almost all people Computers and networks have an impact on individuals, families, groups and society Human Resource employees need to: Prevent computer waste and mistakes Avoid privacy violations Comply with laws about: Collecting customer data Monitoring employees Employees, IS users, and Internet users need to: Avoid crime, fraud, privacy invasion Chapter7 – The Personal and Social Impact of Computers Slide 4

2. Computer Waste and Mistakes Inappropriate use of computer technology and resources Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful Chapter7 – The Personal and Social Impact of Computers Slide 5

Computer Waste Cause: improper management of information systems and resources Discarding old software and even complete computer systems when they still have value Building and maintaining complex systems that are never used to their fullest extent Using corporate time and technology for personal use Spam Chapter7 – The Personal and Social Impact of Computers Slide 6

Computer-Related Mistakes Causes Failure by users to follow proper procedures Unclear expectations and a lack of feedback Program development that contains errors Incorrect data entry by data-entry clerk Chapter7 – The Personal and Social Impact of Computers Slide 7

3. Preventing Computer-Related Waste and Mistakes Preventing waste and mistakes involves: Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures Chapter7 – The Personal and Social Impact of Computers Slide 8

Establishing Policies and Procedures Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices Training programs for individuals and workgroups Manuals and documents on how computer systems are to be maintained and used Approval of certain systems and applications to ensure compatibility and cost-effectiveness Chapter7 – The Personal and Social Impact of Computers Slide 9

Implementing Policies and Procedures Policies often focus on: Implementation of source data automation and the use of data editing to ensure data accuracy and completeness Assignment of clear responsibility for data accuracy within each information system Training is often the key to acceptance and implementation of policies and procedures Chapter7 – The Personal and Social Impact of Computers Slide 10

Reviewing Policies and Procedures During review, people should ask the following questions: Do current policies cover existing practices adequately? Were any problems or opportunities uncovered during monitoring? Does the organization plan any new activities in the future? If so, does it need new policies or procedures on who will handle them and what must be done? Are contingencies and disasters covered? Chapter7 – The Personal and Social Impact of Computers Slide 11

4. Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents is increasing dramatically Computer crime is now global Chapter7 – The Personal and Social Impact of Computers Slide 12

The Computer as a Tool to Commit Crime Criminals need two capabilities to commit most computer crimes Knowing how to gain access to the computer system Knowing how to manipulate the system to produce the desired result Examples Password theft (Social engineering) Go through the garbage (Dumpster diving) Counterfeit and banking fraud using sophisticated desktop publishing programs and high-quality printers Chapter7 – The Personal and Social Impact of Computers Slide 13

5. The Computer as the Object of Crime Crimes fall into several categories such as: Illegal access and use Information and equipment theft Software and Internet piracy Computer-related scams International computer crime Chapter7 – The Personal and Social Impact of Computers Slide 14

5.1. Avoiding Viruses and Worms Tips for avoiding viruses and worms Install antivirus software on your computer and configure it to scan all downloads, e-mail, and disks Update your antivirus software regularly Back up your files regularly Do not open any files attached to an e-mail from an unknown, suspicious, or untrustworthy source Chapter7 – The Personal and Social Impact of Computers Slide 15

5.1. Avoiding Viruses and Worms (Continued) Tips for avoiding viruses and worms (continued): Do not open any files attached to an e-mail unless you know what it is, even if it appears to come from a friend or someone you know Exercise caution when downloading files from the Internet Ensure that the source is legitimate and reputable Chapter7 – The Personal and Social Impact of Computers Slide 16

5.2. Using Antivirus Programs Antivirus program: software that runs in the background to protect your computer from dangers lurking on the Internet and other possible sources of infected files Tips on using antivirus software Run and update antivirus software often Scan all diskettes and CDs before using them Install software only from a sealed package or secure, well-known Web site Follow careful downloading practices If you detect a virus, take immediate action Chapter7 – The Personal and Social Impact of Computers Slide 17

Using Antivirus Programs (continued) Antivirus Software Chapter7 – The Personal and Social Impact of Computers Slide 18

5.3. Information and Equipment Theft Obtaining identification numbers and passwords to steal information or disrupt systems Software theft Computer systems and equipment theft Data on equipment is valuable Chapter7 – The Personal and Social Impact of Computers Slide 19

5.4. Software and Internet Software Piracy Software piracy: act of illegally duplicating software Internet software piracy: illegally downloading software from the Internet Most rapidly expanding type of software piracy Most difficult form to combat Examples: pirate Web sites, auction sites that offer counterfeit software, peer-to-peer networks Penalties can be severe Chapter7 – The Personal and Social Impact of Computers Slide 20

5.5. Computer-Related Scams Examples of Internet scams Get-rich-quick schemes involving bogus real estate deals “Free” vacations with huge hidden costs Bank fraud Fake telephone lotteries Chapter7 – The Personal and Social Impact of Computers Slide 21

5.6. International Computer Crime Computer crime is an international issue Software industry loses about $540 billion in revenue annually to software piracy Terrorists, international drug dealers, and other criminals might use information systems to launder illegally obtained funds Chapter7 – The Personal and Social Impact of Computers Slide 22

6. Preventing Computer-Related Crime Many countries have passed computer crime legislation Some believe that these laws are not effective because: Companies do not always actively detect and pursue computer crime Security is inadequate Convicted criminals are not severely punished Individual and group efforts are being made to limit computer crime, and recent efforts have met with some success Chapter7 – The Personal and Social Impact of Computers Slide 23

6.1. Crime Prevention by Corporations Public key infrastructure (PKI): enables users of an unsecured public network such as the Internet to securely and privately exchange data Uses a public and a private cryptographic key pair that is obtained and shared through a trusted authority Biometrics: measurement of one of a person’s traits, whether physical or behavioral Chapter7 – The Personal and Social Impact of Computers Slide 24

Crime Prevention by Corporations (continued) Common Methods Used to Commit Computer Crimes Chapter7 – The Personal and Social Impact of Computers Slide 25

Crime Prevention by Corporations (continued) Common Methods Used to Commit Computer Crimes (continued) Chapter7 – The Personal and Social Impact of Computers Slide 26

Crime Prevention by Corporations (continued) Companies are joining together to fight crime Software and Information Industry Alliance (SIIA): original antipiracy organization Microsoft financed the formation of a second antipiracy organization, the Business Software Alliance (BSA) Other software companies, including Apple, Adobe, Hewlett-Packard, and IBM, now contribute to the BSA Chapter7 – The Personal and Social Impact of Computers Slide 27

6.2. Using Intrusion Detection Software Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion Suspicious activities: failed login attempts, attempts to download program to server, accessing a system at unusual hours Can provide false alarms E-mail or voice message alerts may be missed Chapter7 – The Personal and Social Impact of Computers Slide 28

6.3. Internet Laws for Libel and Protection of Decency Filtering software helps screen Internet content Also prevents children from sending personal information over e-mail or through chat groups Internet Content Rating Association (ICRA) Rates Web sites based on authors’ responses from questionnaire Children’s Internet Protection Act (CIPA), 2000 Required filters in federally funded libraries Libel is an important legal issue on the Internet Publishing Internet content to the world can subject companies to different countries’ laws Chapter7 – The Personal and Social Impact of Computers Slide 29

6.4. Preventing Crime on the Internet Develop effective Internet usage and security policies for all employees Use a stand-alone firewall (hardware and software) with network monitoring capabilities Deploy intrusion detection systems, monitor them, and follow up on their alarms Chapter7 – The Personal and Social Impact of Computers Slide 30

Preventing Crime on the Internet (continued) Monitor managers and employees to make sure that they are using the Internet for business purposes Use Internet security specialists to perform audits of all Internet and network activities Chapter7 – The Personal and Social Impact of Computers Slide 31

7. The Work Environment: Health Concerns Working with computers can cause occupational stress Training and counseling helps the employee and deter problems and stress Computer use can affect physical health as well Concerns about emissions from improperly maintained and used equipment, display screens, and cell phones Chapter7 – The Personal and Social Impact of Computers Slide 32

Avoiding Health and Environmental Problems Many computer-related health problems are caused by a poorly designed work environment Ergonomics: science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them Chapter7 – The Personal and Social Impact of Computers Slide 33

8. Ethical Issues in Information Systems Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behavior Chapter7 – The Personal and Social Impact of Computers Slide 34

ACM code of ethics and professional conduct Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patents Give proper credit for intellectual property Respect the privacy of others Honor confidentiality Chapter7 – The Personal and Social Impact of Computers Slide 35

9. Summary ACM code of ethics Preventing computer-related waste Computer crime, categories of crimes, cyberterrorism Preventing crimes on the Internet The work environment and health problems ACM code of ethics Chapter7 – The Personal and Social Impact of Computers Slide 36