Fundamentals of Information Systems, Sixth Edition

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

The Internet.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Policies and procedures must be established to avoid computer waste and mistakes
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Internet Safety Dr. Steve Broskoske Misericordia University.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Principles of Information Systems, Ninth Edition Chapter 14 The Personal and Social Impact of Computers.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Society & Computers PowerPoint
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Principles of Information Systems, Tenth Edition Chapter 14 The Personal and Social Impact of Computers 1.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Fundamentals & Ethics of Information Systems IS 201
Chapter 1 Introduction to Computer User Support
Digital Citizenship Grades 4-6
Privacy and the Law.
Principles of Information Systems Eighth Edition
Add video notes to lecture
Learn how to protect yourself against common attacks
Protection of CONSUMER information
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Fundamentals of Information Systems
Principles of Information Systems, Ninth Edition
Securing Information Systems
Lesson 2- Protecting Yourself Online
Chapter 3: IRS and FTC Data Security Rules
Principles of Information Systems, Tenth Edition
Fundamentals of Information Systems Fourth Edition
Societal Issues in Computing (COMP466)
Fundamentals of Information Systems, Ninth Edition
Information Systems, Ninth Edition
Protecting Your Information Assets
CompTIA Security+ Study Guide (SY0-401)
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Fundamentals of Information Systems, Seventh Edition
Protecting Yourself from Fraud including Identity Theft
Ethics and Social Responsibility
Policies and procedures must be established to avoid computer waste and mistakes
Protecting Yourself from Fraud including Identity Theft
The Issues with Technology in education
Principles of Information Systems Eighth Edition
A Gift of Fire Third edition Sara Baase
The Office Procedures and Technology
Protecting Yourself from Fraud including Identity Theft
Principles of Information Systems Eighth Edition
Presentation transcript:

Fundamentals of Information Systems, Sixth Edition Chapter 9 The Personal and Social Impact of Computers 1

Crime Prevention by Corporations (continued) Using Intrusion Detection Software: Intrusion detection system (IDS): Monitors system and network resources Notifies network security personnel when it senses a possible intrusion Can provide false alarms Fundamentals of Information Systems, Sixth Edition Fundamentals of Information Systems, Sixth Edition 2

Crime Prevention by Corporations (continued) Security Dashboard Provides comprehensive display on a single computer screen of: All the vital data related to an organization’s security defenses, including threats, exposures, policy compliance, and incident alerts Fundamentals of Information Systems, Sixth Edition

Crime Prevention by Corporations (continued) Using managed security service providers (MSSPs): Many are outsourcing their network security operations to: Managed security service providers (MSSPs) such as Counterpane, Guardent, IBM, Riptech, and Symantec Guarding against theft of equipment and data: Organizations need to take strong measures to guard against the theft of computer hardware and the data stored on it Fundamentals of Information Systems, Sixth Edition Fundamentals of Information Systems, Sixth Edition 4

Crime Prevention for Individuals and Employees Identity theft: To protect yourself, regularly check credit reports with major credit bureaus Malware attacks: Antivirus programs run in the background to protect your computer Many e-mail services and ISP providers offer free antivirus protection Fundamentals of Information Systems, Sixth Edition

Crime Prevention for Individuals and Employees (continued) Computer scams: Tips to help you avoid becoming a victim: Don’t agree to anything in a high-pressure meeting or seminar Don’t judge a company based on appearances Avoid any plan that pays commissions simply for recruiting additional distributors Beware of shills Beware of a company’s claim that it can set you up in a profitable home-based business Fundamentals of Information Systems, Sixth Edition

Privacy and the Federal Government Has implemented a number of laws addressing personal privacy European Union: Has data-protection directive that requires firms transporting data across national boundaries to have certain privacy procedures in place Fundamentals of Information Systems, Sixth Edition

Privacy at Work Organizations: Workers claim: Monitor employees’ e-mail More than half retain and review messages Workers claim: Their right to privacy trumps their companies’ rights to monitor employee use of IS resources Fundamentals of Information Systems, Sixth Edition

E-Mail Privacy Federal law: Permits employers to monitor e-mail sent and received by employees E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits Use of e-mail among public officials might violate “open meeting” laws Fundamentals of Information Systems, Sixth Edition

Instant Messaging Privacy To protect your privacy and your employer’s property: Choose a nonrevealing, nongender-specific, unprovocative IM screen name Don’t send messages you would be embarrassed to have your family members, colleagues, or friends read Do not open files or click links in messages from people you do not know Never send sensitive personal data such as credit card numbers via IM Fundamentals of Information Systems, Sixth Edition

Privacy and Personal Sensing Devices RFID tags: Microchips with antenna Embedded in many of the products we buy: Medicine containers, clothing, computer printers, car keys, library books, tires Generate radio transmissions that, if appropriate measures are not taken, can lead to potential privacy concerns Fundamentals of Information Systems, Sixth Edition

Privacy and the Internet Huge potential for privacy invasion on the Internet: E-mail messages Visiting a Web site Buying products over the Internet Platform for Privacy Preferences (P3P): Screening technology Social network services: Parents should discuss potential dangers, check their children’s profiles, and monitor their activities Fundamentals of Information Systems, Sixth Edition

Internet Libel Concerns Publishing an intentionally false written statement that is damaging to a person’s or organization’s reputation Individuals: Can post information to the Internet using anonymous e-mail accounts or screen names Must be careful what they post on the Internet to avoid libel charges Fundamentals of Information Systems, Sixth Edition

Filtering and Classifying Internet Content Filtering software: Helps screen Internet content Internet Content Rating Association (ICRA): Goals are to protect children from potentially harmful material while also safeguarding free speech on the Internet Fundamentals of Information Systems, Sixth Edition

Fairness in Information Use The Privacy Act of 1974: Provides privacy protection from federal agencies Applies to all federal agencies except the CIA and law enforcement agencies Requires training for all federal employees who interact with a “system of records” under the act Fundamentals of Information Systems, Sixth Edition Fundamentals of Information Systems, Sixth Edition 15

Electronic Communications Privacy Act Gramm-Leach-Bliley Act: Requires financial institutions to protect customers’ nonpublic data USA Patriot Act: Internet service providers and telephone companies must turn over customer information Corporate privacy policies: Should address a customer’s knowledge, control, notice, and consent over the storage and use of information Fundamentals of Information Systems, Sixth Edition

Individual Efforts to Protect Privacy To protect personal privacy: Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy Take extra care when purchasing anything from a Web site Fundamentals of Information Systems, Sixth Edition

The Work Environment Use of computer-based information systems has changed the workforce: Jobs that require IS literacy have increased Less-skilled positions have decreased Enhanced telecommunications: Has been the impetus for new types of business Has created global markets in industries once limited to domestic markets Fundamentals of Information Systems, Sixth Edition

Health Concerns Occupational stress Seated immobility thromboembolism (SIT) Carpal tunnel syndrome (CTS) Video display terminal (VDT) bill: Employees who spend at least four hours a day working with computer screens should be given 15-minute breaks every two hours Fundamentals of Information Systems, Sixth Edition

Avoiding Health and Environment Problems Work stressors: Hazardous activities associated with unfavorable conditions of a poorly designed work environment Ergonomics: Science of designing machines, products, and systems to maximize safety, comfort, and efficiency of people who use them Fundamentals of Information Systems, Sixth Edition

Ethical Issues in Information Systems Code of ethics: States the principles and core values essential to a set of people and, therefore, governs their behavior Can become a reference point for weighing what is legal and what is ethical Fundamentals of Information Systems, Sixth Edition

Summary Computer waste: Preventing waste and mistakes involves: The inappropriate use of computer technology and resources in both the public and private sectors Preventing waste and mistakes involves: Establishing, implementing, monitoring, and reviewing effective policies and procedures Some crimes use computers as tools Cyberterrorist: Intimidates or coerces a government or organization to advance his or her political or social objectives Fundamentals of Information Systems, Sixth Edition

Summary (continued) To detect and prevent computer crime, use: Antivirus software Intrusion detection systems (IDSs) Privacy issues: A concern with government agencies, e-mail use, corporations, and the Internet Businesses: Should develop a clear and thorough policy about privacy rights for customers, including database access Fundamentals of Information Systems, Sixth Edition

Summary (continued) Computer-related scams: Ergonomics: Have cost people and companies thousands of dollars Ergonomics: The study of designing and positioning computer equipment Code of ethics: States the principles and core values that are essential to the members of a profession or organization Fundamentals of Information Systems, Sixth Edition