Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. Implementing IT: Ethics, Impacts, and Security (continue …) Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT and Society Some will say that IT has improved our quality of life Improvements for people with disabilities Improvements in health care system Improved consumer information Robots performing in dangerous situations Improvements in crime fighting Concern about deepening divide between those with and without IT access Internet communities provide social contact for people with common interests Telecommuting adds flexibility for workers and organizations
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Security Concerns Information systems are subject to many threats Unintentional threats Human error – in design or use of system Environmental hazards – acts of God and other Computer system failures – faulty products Intentional threats Systems are subject to a wide variety of hazards from criminal attacks
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Computer Crimes Computers may be the target of criminal activity or the means by which criminal activity is carried out Methods of attack: Data tampering is most common attack on computer systems Deliberate programming fraud also common Viruses are a highly visible form of programming attack Denial of service attacks target e-commerce web sites
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT Individuals and organizations must actively establish protection mechanisms Prevent and deter damage Detect threats before damage is widespread Limit loss from threat Plan for recovery in event of attack Correct system to prevent recurrence
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued) General protection strategies: Physical security of facilities and resources Control access to system Protect data from unauthorized access Application control strategies: Ensure quality of inputs Verify quality of processing Ensure quality and accessibility of outputs
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued) Network control strategies: Control access to network resources Protect data on network with encryption Monitor and detect intruders Protect with firewalls Verifying quality through audits Regular evaluation of records and procedures May be performed by internal and external auditors
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued) Disaster Prevention and Recovery Plans Organizations need to think through how various disasters will be handled Key people should know exactly what to do in the event of a disaster Disaster plans should be tested through practice drills Critical component is back-up procedures Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Chapter Summary Information systems pose a number of ethical challenges for businesses and individuals Information systems have changed organizations, jobs, individual workers, and society Information systems are vulnerable to a number of hazards Individuals and organizations must take steps to protect their systems from threats
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.