Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-1 Introduction to Information Technology.

Slides:



Advertisements
Similar presentations
Chapter 51 Products, Processes, and Quality Chapter 5 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published.
Advertisements

By Edgar K. Browning & Mark A. Zupan John Wiley & Sons, Inc.
Chapter 81 Creating a Production Process Chapter 8 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John.
ACCOUNTING INFORMATION SYSTEMS
POKOK BAHASAN Pertemuan 25 Matakuliah: Sistem Informasi Manajemen Tahun: 2008.
7-1 Impacts of IT Organizations, Individuals, and Society.
Chapter 12: Intelligent Systems in Business
Chapter 101 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 171 Stabilizing the Quality System Chapter 17 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by.
Evaluating and Terminating the Project
Management, 6e Schermerhorn Prepared by Cheryl Wyrick California State Polytechnic University Pomona John Wiley & Sons, Inc.
University of Northern Iowa
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
Introduction to Databases Chapter 1: Introducing Data and Data Management.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
Accounting Principles, Ninth Edition
Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC A Professor G.E. Denzel.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Chapter 2 Information Technology and AISs
Chapter 31 The Value of Implementing Quality Chapter 3 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published.
John Wiley & Sons, Inc. © 2005 Chapter 2 The Recording Process Prepared by Naomi Karolinski Monroe Community College and and Marianne Bradford Bryant.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Chapter 101 The Design Process Chapter 10 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Prepared by Scott M. Shafer, Updated by William E. Matthews and Thomas G. Roberts, William Patterson University Copyright 2007 John Wiley & Sons, Inc.5-1.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
Chapter 111 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
CURRENT LIABILITIES AND CONTINGENCIES
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 8-1 Introduction to Information Technology Chapter.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
John Wiley & Sons, Inc. © 2005 Chapter 1 Accounting in Action Accounting Principles, 7 th Edition Weygandt Kieso Kimmel Prepared by Naomi Karolinski Monroe.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
Information Technology Economics
© 2007 John Wiley & Sons Chapter 15 - Organizational Issues PPT 15-1 Organizational Issues Chapter Fifteen Copyright © 2007 John Wiley & Sons, Inc. All.
INVESTMENTS: Analysis and Management Second Canadian Edition INVESTMENTS: Analysis and Management Second Canadian Edition W. Sean Cleary Charles P. Jones.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Chapter 9: Introduction to Internal Control Systems
Chapter 31 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Copyright 2006 John Wiley & Sons, Inc. Beni Asllani University of Tennessee at Chattanooga Operations Management - 5 th Edition Chapter 10 Supplement Roberta.
Slide 8-1 Chapter 8 Terms Programming Languages Introduction to Information Systems Judith C. Simon.
Chapter 91 The Specification Process Chapter 9 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John.
Chapter 171 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
I- 1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc 2-1 Introduction to Information Technology 2.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
I-1. I-2 I ACCOUNTING FOR SOLE PROPRIETORSHIPS Accounting, Fifth Edition.
H-1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 3-1 Introduction to Information Technology.
Chapter 41 People and Quality Chapter 4 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Dinesh Mirchandani University of Missouri – St. Louis
Systems Analysis and Design Third Edition
Impacts on Individuals, Organizations & Society
The Quality System Chapter 13
liquidation of a partnership.
Transportation and Transshipment Models
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Module 1: Decision Making,
The Production Process
Data Management: Data, Databases and Warehousing
MACROECONOMICS AND THE GLOBAL BUSINESS ENVIRONMENT
Data Management: Data, Databases and Warehousing
Presentation transcript:

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. Implementing IT: Ethics, Impacts, and Security (continue …) Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT and Society  Some will say that IT has improved our quality of life  Improvements for people with disabilities  Improvements in health care system  Improved consumer information  Robots performing in dangerous situations  Improvements in crime fighting  Concern about deepening divide between those with and without IT access  Internet communities provide social contact for people with common interests  Telecommuting adds flexibility for workers and organizations

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Security Concerns  Information systems are subject to many threats  Unintentional threats Human error – in design or use of system Environmental hazards – acts of God and other Computer system failures – faulty products  Intentional threats Systems are subject to a wide variety of hazards from criminal attacks

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Computer Crimes  Computers may be the target of criminal activity or the means by which criminal activity is carried out  Methods of attack:  Data tampering is most common attack on computer systems  Deliberate programming fraud also common Viruses are a highly visible form of programming attack Denial of service attacks target e-commerce web sites

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT  Individuals and organizations must actively establish protection mechanisms  Prevent and deter damage  Detect threats before damage is widespread  Limit loss from threat  Plan for recovery in event of attack  Correct system to prevent recurrence

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued)  General protection strategies:  Physical security of facilities and resources  Control access to system  Protect data from unauthorized access  Application control strategies:  Ensure quality of inputs  Verify quality of processing  Ensure quality and accessibility of outputs

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued)  Network control strategies:  Control access to network resources  Protect data on network with encryption  Monitor and detect intruders  Protect with firewalls  Verifying quality through audits  Regular evaluation of records and procedures  May be performed by internal and external auditors

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued)  Disaster Prevention and Recovery Plans  Organizations need to think through how various disasters will be handled  Key people should know exactly what to do in the event of a disaster  Disaster plans should be tested through practice drills  Critical component is back-up procedures  Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Chapter Summary  Information systems pose a number of ethical challenges for businesses and individuals  Information systems have changed organizations, jobs, individual workers, and society  Information systems are vulnerable to a number of hazards  Individuals and organizations must take steps to protect their systems from threats

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.