9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc. 2002 Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.

Slides:



Advertisements
Similar presentations
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Advertisements

Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Ethics, Privacy and Security
Presented by Student Name Workplace Issues – Lecture 4.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Issues Raised by ICT.
Chapter 11 Security and Privacy: Computers and the Internet.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Computer Programming I
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Computers: Tools for an Information Age
Chapter 10 Privacy and Security.
Computing Issues that Affect Us All
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter 10 Privacy and Security.
Computing Issues that Affect Us All
10 PRIVACY AND SECURITY CHAPTER
Computing Issues that Affect Us All
Presentation transcript:

9 99 CHAPTER Privacy and Security

9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment

9 © The McGraw-Hill Companies, Inc Privacy Be aware of –Database and network uses –Major privacy laws Ethics –Privacy –Accuracy –Property –Access

9 © The McGraw-Hill Companies, Inc Large Databases Data collected daily Social security numbers key field Information reseller industry

9 © The McGraw-Hill Companies, Inc Information Without Consent Blockbuster Lotus Development and Equifax Employers use medical records

9 © The McGraw-Hill Companies, Inc Inaccurate Information Easy migration Inaccurate data Laws help –correct credit data –information used by government

9 © The McGraw-Hill Companies, Inc Private Networks Employers legally monitor Online services right to censor content

9 © The McGraw-Hill Companies, Inc Internet and Web Concerns about privacy on Web –illusion of anonymity Browser records pages visited Cookies record –Times and pages visited –Other private information

9 © The McGraw-Hill Companies, Inc Privacy Laws Check out Page 241 – review of law, year, and what intended to protect. Last law dated What are current laws? Internet research

9 © The McGraw-Hill Companies, Inc Security Threats include –viruses –electronic break-ins –natural and other hazards Security measures –encryption –restricted access –anticipate disasters –backup copies

9 © The McGraw-Hill Companies, Inc Computer Criminals Employees “Hackers” and “crackers” Organized crime

9 © The McGraw-Hill Companies, Inc Computer Security Viruses –Damage to computers, programs or files Theft –Hardware, data, computer time –Software piracy Manipulation

9 © The McGraw-Hill Companies, Inc Security Measures Protecting Information Encrypting messages Restricting access Anticipating disasters Backing up data

9 © The McGraw-Hill Companies, Inc Security for Microcomputers Avoid extreme conditions Guard computer Guard programs and data

9 © The McGraw-Hill Companies, Inc Ergonomics Physical Health –Eyestrain and headache –Back and neck pain –Electromagnetic fields –Repetitive strain injury

9 © The McGraw-Hill Companies, Inc Ergonomics (cont.) Mental Health –Noise –Excessive monitoring Design

9 © The McGraw-Hill Companies, Inc The Environment Energy Star program with Green PC Conserve, recycle and educate Greatest user of electricity in workplace

9 © The McGraw-Hill Companies, Inc A Look to the Future New legislation needed –Define access to files –Regulate interference Rise in computer-related crime

9 © The McGraw-Hill Companies, Inc. 2002