Copyright ©2016 Cengage Learning. All Rights Reserved

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
1 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER.
Copyright ©2016 Cengage Learning. All Rights Reserved
INTERNET and CODE OF CONDUCT
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Programming I
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Class Discussion Notes MKT April 10, 2001.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Internet Safety Internet Safety LPM
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI.
CONTROLLING INFORMATION SYSTEMS
Privacy, Security and Ethics
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Managing Windows Security
Copyright ©2016 Cengage Learning. All Rights Reserved
Add video notes to lecture
DIGITAL CITIZENSHIP What You Should Know!.
Fundamentals of business law, 10e
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Ethical, Social, and Political Issues in E-commerce
Physical Safety Issues
Handout 2: Data Protection and Copyright
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Ethics & Social Responsibility
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
E-Commerce: Regulatory, Ethical, and Social Environments
Learning Area 1 Information And Communication Technology and Society
BCT 2.00 Analyze Technology Issues
Network and Internet Security and Privacy
Computer Programming I
LEGAL TERMS IN DIGITAL MEDIA
Security of Data  
Essentials of the legal environment today, 5e
Presentation transcript:

Copyright ©2016 Cengage Learning. All Rights Reserved Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discuss information privacy and methods for improving the privacy of information Explain the privacy of e-mail, data collection issues, and censorship Discuss the ethical issues related to information technology Discuss the principles of intellectual property and issues related to the infringement of intellectual property

Discuss information system issues that affect organizations, including the digital divide, electronic publishing, and the connection between the workplace and employees’ health Describe green computing and the ways it can improve the quality of the environment

Computer Crime and Fraud Computer fraud Unauthorized use of computer data for personal gain Social networking sites Used for committing computer crime Examples Denial-of-service attacks Identity theft Software piracy Distributing child pornography E-mail spamming In addition to phishing, computer crimes include the following: • Denial- of- service attacks, which inundate a Web site or network with e- mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic • Identity theft, such as stealing Social Security • Software piracy and other infringements of intellectual • Distributing child pornography. • E- mail spamming. • Writing or spreading viruses, worms, Trojan programs, and other malicious code. • Stealing files for industrial espionage. • Changing computer records illegally. • Virus hoaxes, in which individuals intentionally spread false statements or information through the

Computer Crime and Fraud (cont’d.) Writing or spreading viruses, worms, Trojan programs, and other malicious code Stealing files Changing computer records Virus hoaxes Sabotage • Writing or spreading viruses, worms, Trojan programs, and other malicious code • Stealing files for industrial espionage • Changing computer records illegally • Virus hoaxes, that are false statements or information spread through the Internet and are presented in such a way that the readers believe that they are true. The individual who generates virus hoaxes intention-ally attempts to mislead the readers. Sony Hack

Computer Crime – Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME! Internet Fraud Cost $ 559 Million in 20091 Losses from cybercrime more than doubled in 2009, jump-ing from $ 265 million in 2008 to $ 559.7 million, according to a report by the Internet Crime Complaint Center, which is a partnership between the FBI and the National White Collar Crime Center. The number of online complaints about cybercrimes also rose dramatically, according to the report. In 2009, 336,655 complaints were received, a jump of more than 20 percent over 2008. Keep in mind that these fi gures are only the reported complaints; the actual number of cybercrimes could be much higher. Most of the complaints were about e- mail scams and the nondelivery of merchandise or payments. To guard against cybercrime, Internet users should install the most current versions of antivirus and antispyware software on their computers and be very careful when they receive suspicious e- mails, particularly those with attachments. 82% come from inside the organization (employees)

Privacy Issues Employers search social networking sites for background information on applicants Monitoring systems are adopted by employers to check employee performance Information technology has aided in the easy availability of personal information Information in databases can be used for direct marketing and for credit checks on potential borrowers or renters

Concepts of the Web and Network Privacy Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance Acceptable use policy Issues involving both the user’s and the organization’s responsibilities and liabilities Accountability Method for binding all the parties to a contract Nonrepudiation

Guidelines to Minimize the Invasion of Privacy Conduct business only with websites having privacy policies Limit access to personal information to those with authorization Ensure data’s reliability and take precautions to prevent misuse of the data Data collection must have a stated purpose Identify ways to prevent personal information gathered being disclosed without consent

Guidelines to Minimize the Invasion of Privacy Organizations should use verification procedures to ensure data accuracy Organizations must correct or delete incorrect data Prevent unauthorized access to data and misuse of data Users should review their records and correct any inaccuracies Transparency in record-keeping systems storing personal data

Privacy Issues Presented by E-mail Spam: Unsolicited e-mail sent for advertising purposes Sent in bulk using automated mailing software Ease of access Individuals should assume that others have access to their messages Any e-mails sent on company-owned computers are the property of the organization

Data Collection on the Web Due to the increase in online shopping, personal details of individuals are prone to misuse Issue of personal information being sold to telemarketing firms resulting in spam Information provided on the Web can be combined with other information and technologies to produce new information

Technologies Used for Data Collection Cookies: Small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive Help websites customize pages for users Considered an invasion of privacy when users’ information is used without prior consent Installing a cookie manager helps users disable cookies Log files: Generated by Web server software, record a user’s actions on a website

Ethical Issues of Information Technologies Information technology offers opportunities for unethical behavior due to ease of collecting and disseminating information Increase of cybercrime, cyberfraud, identity theft, and intellectual property theft Organizations can reduce unethical behavior of employees by developing and enforcing codes of ethics

Censorship of Types of Information on the Web Public information Posted by an organization or public agency Censored for public policy reasons Censored if the content is deemed offensive to a political, religious, or cultural group Private information Posted by a person Uncensored because of constitutional freedom of expression

Restricting access to the Web Censorship Restricting access to the Web Countries like Burma, China, and Singapore, restrict or forbid their citizens’ access to the Web Internet neutrality: Internet service providers (ISPs) and government agencies should treat all data on the Internet equally Parents use programs like CyberPatrol, CyberSitter, Net Nanny, and SafeSurf to prevent children’s access to certain websites

Intellectual Property Legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents developed by people or businesses

Categories in Intellectual Property Industrial property Inventions, trademarks, logos, and industrial designs Copyrighted material Literary and artistic works Covers online materials like Web pages, HTML code, and computer graphics Fair Use Doctrine: Exception to the Copyright law which allows the use of copyrighted material for certain purposes

Intellectual Property Protections Trademark: Protects product names and identifying marks Patent: Protects new processes Advantages to organizations Generates revenue by licensing the patent Attracts funding for research and development Keeps competitors from entering certain market segments

Laws Covering Software Piracy 1980 revisions to the Copyright Act of 1976 include computer programs Laws covering legal issues related to information technologies in the United States Telecommunications Act of 1996 Communications Decency Act (CDA) Laws against spamming

Cybersquatting Registering, selling, or using a domain name to profit from someone else’s trademark Typosquatting: Relies on typographical errors made by Web users when typing a website address into a Web browser Variation of cybersquatting Called URL hijacking

Information technology and the Internet that is not accessible for all Digital Divide Information technology and the Internet that is not accessible for all Increasing funding for computers at schools, public places, helps offset the divide

Impact of Information Technology in the Workplace Creation of technical jobs, requiring extensive training Increased consumers’ purchasing power Results in a stronger economy by reducing production costs Direct effect on the nature of jobs Telecommuting enables work from home option Organizations can use the best and most cost-effective human resources in a large geographical region

Impact of Information Technology in the Workplace Job deskilling: Occurs when skilled labor is eliminated due to high technology Virtual organizations: Companies, suppliers, customers, and manufacturers connected via information technologies To share skills and cost To have access to each other’s markets

4.1 Potential Benefits and Drawbacks of Telecommuting

Information Technology and Health Issues Increasing popularity of touchscreens result in stress related injuries of the users’ hands, arms, back, and eyes Related health problems associated with computer equipment Vision issues Musculoskeletal issues Skin issues Reproductive system issues Stress issues

Requires cooperation of both private and public sectors Green Computing Promotes a sustainable environment and consumes the least amount of energy Involves the design, manufacture, use, and disposal of computers, servers, and computing devices with minimal impact on the environment Requires cooperation of both private and public sectors

Ways to Achieve Green Computing Design products that last longer and are modular in design Parts can be upgraded without replacing the entire system Design search engines and computing routines that are faster and consume less energy Replace underutilized smaller servers with one large server using a virtualization technique

Ways to Achieve Green Computing Use computing devices that consume less energy and are biodegradable Allow certain employees to work from their homes to reduce carbon foot prints Conduct meetings over computer networks to reduce business travel Encourage carpool and nonmotorized transportation for employees Turn off idle PCs and recycle computer-related materials

Acceptable use policy Accountability Cookies Cybersquatting Digital divide Green computing

Intellectual property Log files Nonrepudiation Spam Virtual organizations

Employers search social networking sites, such as Facebook or MySpace, to find background information on applicants e-mail is distributed through the Web or a company network; people should assume that others have access to their messages Public information, posted by an organization or public agency, can be censored for public policy reasons

Children, in particular, are victims of the digital divide Information technology has created many new jobs Green computing is one of the methods for combating global warming