1 Information Systems Ethics and Computer Crime J. S. Chou Assistant Professor.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Lecturer: Fadwa Tlaelan
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Information Systems Ethics, Computer Crime, and Security
Chapter 9 Information Systems Ethics and Computer Crime
Chapter 9: Privacy, Crime, and Security
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
Unit 18 Data Security 1.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Chapter 11 Security and Privacy: Computers and the Internet.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Chapter 11 Information Systems Ethics.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Computer Crimes Career & Technology Education Department.
Information Systems Today: Managing in the Digital World -Dr. Ali Zolait Chapter Managing Information Systems Ethics and Crimes Worldwide losses.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
Fundamentals of Information Systems
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

1 Information Systems Ethics and Computer Crime J. S. Chou Assistant Professor

2 Ages of Progress Agricultural Industrial (Prior to 1890’s) (1890’s to 1960’s) Informational (1960’s to Present)

3 Information Age Terms Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

4 Computer Ethics Concerns

5 Information Privacy and Issues Information Privacy What information an individual must reveal to others in the course of gaining employment or shopping online Information Privacy What information an individual must reveal to others in the course of gaining employment or shopping online Identify Theft The stealing of another person’s private information (SSN, credit card numbers, etc.) for the purpose of using it to gain credit, borrow money, buy merchandise, or otherwise run up debt that are never paid. This is especially problematic because it: is invisible to the victim, they don’t know it is happening is very difficult to correct…credit agencies are involved can cause unrecoverable losses and legal costs

6 Information Privacy - How to Maintain Avoid Having Cookies Left on Your Machine Use settings in your browser to block cookies from being deposited on you machine by primary and third parties Use Caution when Requesting Confirming Use a separate account from normal to protect information from your employer, sellers, and any one using your computer Visit Sites Anonymously Use online privacy services that provide total privacy by blocking all techniques used to identify you online (e.g. Anonymizer) Choose Web sites monitored by independent organizations Use rating sites to identify merchant sites whose privacy policies conform to standards and are monitored (e.g epubliceye.com)

7 Information Accuracy Concerned with assuring the authenticity and fidelity of information, and identifying those responsible for informational errors that harm people Information Accuracy Concerned with assuring the authenticity and fidelity of information, and identifying those responsible for informational errors that harm people Sources of Information Errors Errors in computer output can come from two primary sources. These are: Machine Errors – errors in the computer program logic, communication and/or processing that receives, processes, stores, and presents information Human Errors – errors by the person(s) entering data or information into the computer system

8 Information Property Concerned with who owns information about individuals and how information can be sold and exchanged Information Property Concerned with who owns information about individuals and how information can be sold and exchanged Privacy Statements Are stated policies from the organizations collecting the information and how they intend to use it. These are legally binding statements Internal Use – used within the organization only External Use – can be sold to outside parties Information Ownership The organization storing the information owns it if it is given willingly…even if unknowingly by use of their sites (e.g. online surveys, credit card transactions, etc.)

9 Information Property – Example of a Privacy Statement

10 Information Property – Gathering and Uses Spam (see Chapter 4 for definition) This unsolicited can come from reputable sites selling your information. Possible problems from spam include: Viruses in attachments or links Added to other spam lists by responding Slows systems by taking up resources disk space Spam (see Chapter 4 for definition) This unsolicited can come from reputable sites selling your information. Possible problems from spam include: Viruses in attachments or links Added to other spam lists by responding Slows systems by taking up resources disk space Cookies These files stored on a computer do have legitimate uses but they also can: Store and transmit information about online habits including, sites visited, purchases made, etc. Prevent accessing sites when cookies are refused Collect and combine information with other information to build a personal profile to be sold

11 Information Property – Gathering and Uses Spyware These stealth computer applications are installed and then collect information about individuals without their knowledge. Currently this technology is not illegal Spyware These stealth computer applications are installed and then collect information about individuals without their knowledge. Currently this technology is not illegal Spyware Issues Spyware applications collect and transmit, or use, this information locally in several ways including: Sale of information to online marketers (spammers) Illegal uses such as identity theft Modify user experience to market to the user by presenting ad banners, pop-ups, etc. (Adware) Spyware Issues Spyware applications collect and transmit, or use, this information locally in several ways including: Sale of information to online marketers (spammers) Illegal uses such as identity theft Modify user experience to market to the user by presenting ad banners, pop-ups, etc. (Adware)

12 Information Accessibility Concerned with defining what information a person or organization has the right to obtain about others and how that information is used Information Accessibility Concerned with defining what information a person or organization has the right to obtain about others and how that information is used Who has access? Besides personal access, other parties have the legal right to access and view private information including: Government – using advanced software packages (e.g Carnivore), traffic and all online activity can be monitored in realtime or after the fact Employers – they can legally limit, monitor or access activities on company-owned computers or networks as long as policy has been distributed to employees

13 Information Access – Example of Carnivore

14 The Need of Ethical Behavior Ethical Behavior Illegal versus unethical behavior is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit Ethical Behavior Illegal versus unethical behavior is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit

15 Responsible Computer Use The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output Guidelines In area of ethics, we rely on guidelines to guide behavior. These guidelines can come from many organizations Guidelines In area of ethics, we rely on guidelines to guide behavior. These guidelines can come from many organizations

16 Responsible Computer Use The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in way that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.) The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in way that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.)

17 Computer Crimes Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions) Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions)

18 Computer Crimes and the Impact on Organizations

19 Computer Crime – Unauthorized Access Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME! Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME!

20 Computer Crime – Unauthorized Access Trends

21 Computer Crimes – Who Commits Them? Unauthorized Access 1998 Survey of 1600 companies by PricewaterhouseCoopers 82% come from inside the organization (employees)

22 Computer Crimes – Who Commits Them? Unauthorized Access 2004 Survey by Computer Security Institute Unauthorized Access 2004 Survey by Computer Security Institute

23 Computer Crime – Various Types 1 st Half

24 Computer Crime – Various Types 2 nd Half

25 Computer Crimes - Hacking and Cracking Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This was created because of protests by true hackers Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This was created because of protests by true hackers

26 Computer Crimes – Cracker (Humorous)

27 Computer Crime – Software Piracy Software Piracy This practice of buying one copy and making multiple copies for personal and commercial use, or for resale is illegal in most countries while others offer weak or nonexistent protections. This has become and international problem as shown below

28 Destructive Code that Replicates Viruses These programs disrupt the normal function of a computer system though harmless pranks or by destroying files on the infected computer. They come in several types: Boot Sector – attaches to the section of a hard disk or floppy disk that boots a computer. File Infector – attach themselves to certain file types such as.doc,.exe, etc. Combination – viruses can change types between boot sector and file infector to fool antivirus programs Attachment – released from an when an attachment is launched. Can also send themselves address book Viruses These programs disrupt the normal function of a computer system though harmless pranks or by destroying files on the infected computer. They come in several types: Boot Sector – attaches to the section of a hard disk or floppy disk that boots a computer. File Infector – attach themselves to certain file types such as.doc,.exe, etc. Combination – viruses can change types between boot sector and file infector to fool antivirus programs Attachment – released from an when an attachment is launched. Can also send themselves address book Worms This destructive code also replicates and spreads through networked computers but does damage by clogging up memory to slow the computer versus destroying files Worms This destructive code also replicates and spreads through networked computers but does damage by clogging up memory to slow the computer versus destroying files

29 Computer Crimes – Destructive Code

30 Destructive Code that Doesn’t Replicates Trojan Horses These programs do not replicate but can do damage as they run hidden programs on the infected computer that appears to be running normally (i.e. a game program that creates an account on the unsuspecting user’s computer for unauthorized access) Trojan Horses These programs do not replicate but can do damage as they run hidden programs on the infected computer that appears to be running normally (i.e. a game program that creates an account on the unsuspecting user’s computer for unauthorized access) Logic or Time Bombs A variation of a Trojan Horse that also do not replicate and are hidden but they are designed to lie in wait for a triggering operation. (i.e. a disgruntled employee that sets a program to go off after they leavethe company) Time Bombs – are set off by dates (e.g. a birthday) Logic Bombs – are set off by certain operations (e.g. a certain password) Logic or Time Bombs A variation of a Trojan Horse that also do not replicate and are hidden but they are designed to lie in wait for a triggering operation. (i.e. a disgruntled employee that sets a program to go off after they leavethe company) Time Bombs – are set off by dates (e.g. a birthday) Logic Bombs – are set off by certain operations (e.g. a certain password)

31 Cyberwar and Cyberterrorism Cyberwar An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country. Common targets include: Command and control systems Intelligence collection and distribution systems Information processing and distribution systems Tactical communication systems Troop and weapon positioning systems Friend-or-Foe identification systems Smart weapons systems Cyberwar An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country. Common targets include: Command and control systems Intelligence collection and distribution systems Information processing and distribution systems Tactical communication systems Troop and weapon positioning systems Friend-or-Foe identification systems Smart weapons systems

32 Cyberwar and Cyberterrorism Cyberterrorism The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals Cyberterrorism The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals Responses to the Threat At greatest risk are those that depend highly on computers and networking infrastructure (i.e. governments, utilities, transportation providers, etc.) Responses include: Improved intelligence gathering techniques Improved cross-government cooperation Providing incentives for industry security investment Responses to the Threat At greatest risk are those that depend highly on computers and networking infrastructure (i.e. governments, utilities, transportation providers, etc.) Responses include: Improved intelligence gathering techniques Improved cross-government cooperation Providing incentives for industry security investment