Chapter 14 Social and Legal Issues. Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Ch.5 It Security, Crime, Compliance, and Continuity
Ethics.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 17 Controls and Security Measures
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
9/4/20151 Computer Security Social Legal and Ethical issues.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Anonymity, Security, Privacy and Civil Liberties
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Mr. Sellers Freshmen Studies.  Divide class into 9 groups and have each cover one of the 9 elements of digital citizenship, as defined by the book “Digital.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Topics Communication Technology Internet Data Security Information Misuse Information Systems Technological Trends Impact of IT.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 9 Enhancing Information/Computer Security.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Chapter 1 Overview of Electronic Commerce. Learning Objectives 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and.
CONTROLLING INFORMATION SYSTEMS
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Security and Ethics Safeguards and Codes of Conduct.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Digital Citizenship By: Ali Al-Thani 6B. Digital citizenship Digital citizenship is an idea which enables teachers and parents to understand what students,
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Securing Information Systems
Privacy and the Law.
Legal and ethical issues
Securing Information Systems
Prepared By : Binay Tiwari
INFORMATION SYSTEMS SECURITY and CONTROL
Lecture 27 Social & Legal Issues (S&G, ch. 14)
Lecture 28 Social & Legal Issues (S&G, ch. 14)
Computer Security Social Legal and Ethical issues
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Chapter 14 Social and Legal Issues

Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The Computer said so The Computer said so Computer crime Computer crime Constitutional and civil liberties issues Constitutional and civil liberties issues Communication issues: encryption and wiretapping Communication issues: encryption and wiretapping

A Gift of Fire Computer technology, most people agree, is the most significant new technology since the beginning of the Industrial Revolution. Computer technology, most people agree, is the most significant new technology since the beginning of the Industrial Revolution. Can do many goods. Can do many goods. But like fire, the power of computers has introduced serious problems: million-dollar thefts, potential loss of privacy, breakdowns of large, complex systems such as communication networks and banking systems. But like fire, the power of computers has introduced serious problems: million-dollar thefts, potential loss of privacy, breakdowns of large, complex systems such as communication networks and banking systems.

Level 6 Examine relationships between the use of computers and law, work, public policy, ethics, responsibility, science, freedom of action, and quality of life. Examine relationships between the use of computers and law, work, public policy, ethics, responsibility, science, freedom of action, and quality of life.

Benefits Information services Information services Consumer services Consumer services Communications Communications Education Education Entertainment Entertainment Medical equipment and research … Medical equipment and research … Bring changes … Bring changes …

Privacy Government databases Government databases Unauthorized use by insidersUnauthorized use by insiders Inadvertent leakage of information through negligence or carelessnessInadvertent leakage of information through negligence or carelessness Propagation of errors and the harm caused by themPropagation of errors and the harm caused by them Intentional uses that some people find objectionable.Intentional uses that some people find objectionable. Big Brother ’ s Files Big Brother ’ s Files Fifty little brothers Fifty little brothers

How to Protect Privacy Using trusted 3 rd party Using trusted 3 rd party Audit trail Audit trail Encryption Encryption Informed consent Informed consent Issues Issues RegulationRegulation Ownership of dataOwnership of data ContractsContracts

The Computer Said So Many people still think the computer is always right. Many people still think the computer is always right. Major failures do occur. Major failures do occur. How much should we rely on computers? Consider risks and benefits How much should we rely on computers? Consider risks and benefits Case study on evaluating computer models: crashing cars and global warming Case study on evaluating computer models: crashing cars and global warming

Computer Crime Fraud, embezzlement, and theft Fraud, embezzlement, and theft Stealing data Stealing data Hacking or cracking Hacking or cracking Viruses and worms Viruses and worms

Constitutional and civil liberties issues Censorship versus Freedom of speech: Communications Decency ACT (CDA), 1996 Censorship versus Freedom of speech: Communications Decency ACT (CDA), 1996 Search and seizure and freedom of the electronic “ press ” Search and seizure and freedom of the electronic “ press ” More freedom-of-speech issues on the Internet More freedom-of-speech issues on the Internet

Communication Issues Use of encryption Use of encryption The wiretapping law The wiretapping law