1 COMPUTERS, COMMUNICATIONS AND CORRUPTION Slides for a seminar discussion © Denis Osborne, 2006.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Ethics, Privacy and Information Security
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.1 Chapter 22 Computers and accounting.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Chapter 17 Controls and Security Measures
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Functional areas Retail Business.
Factors to be taken into account when designing ICT Security Policies
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Year 12 Business Studies Operations REVIEW.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Computer Crime and CyberCrime Why we need Computer Forensics.
Defining Security Issues
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Information management Issues & trends January 1999.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Unethical use of Computers and Networks
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Crime & Malpractice AS Module Heathcote Ch. 10.
Information Systems Security Operational Control for Information Security.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Computer Security Management: Assessment and Forensics Session 8.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
1 THE WORK AND RESPONSIBILITIES OF MANAGERS WHAT DO MANAGERS DO? CHANGING PATTERNS OF WORK AND CHANGING PRIORITIES Slides for a seminar session © Denis.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
By: Asfa Khan and Huda Mukhtar
Chap1: Is there a Security Problem in Computing?.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Foundations of Information Systems in Business
FACTORS AFFECTING THE EFFICIENCY OF DATA PROCESSING SYSTEMS.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Welcome to the ICT Department Unit 3_5 Security Policies.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Technical Implementation: Security Risks
Add video notes to lecture
Transaction processing systems
Lecture 14: Business Information Systems - ICT Security
Five Unethical Uses of Computers
Unit 7 – Organisational Systems Security
Protecting Yourself from Fraud including Identity Theft
Chapter # 3 COMPUTER AND INTERNET CRIME
G061 - Network Security.
Presentation transcript:

1 COMPUTERS, COMMUNICATIONS AND CORRUPTION Slides for a seminar discussion © Denis Osborne, 2006

Denis Osborne, ‘IT’ matters 2 WHY THE INTEREST? INFORMATION TECHNOLOGIES BRING: UNFAMILIAR DEMANDS on managers OPPORTUNITIES to inform or to control RISKS from thieves, ‘hackers’, ‘wreckers’ CONCERNS about ethics – Freedom of information? – Surveillance? False information? – The Poor deprived, having no computer access

Denis Osborne, ‘IT’ matters 3 WHAT’S THE DIFFERENCE? COMPUTERS PROCESS INFORMATION Information and its processing differ in many ways from energy, other physical resources and activities to provide manufactured goods and transport

Denis Osborne, ‘IT’ matters 4 2nd INDUSTRIAL REVOLUTION TRADITIONAL MACHINES GIVE US MORE MUSCLE TO BUILD, MAKE AND MOVE COMPUTERS GIVE US MORE BRAIN TO COMMUNICATE, CALCULATE AND INFORM

Denis Osborne, ‘IT’ matters 5 DIFFERENT CHARACTERISTICS Slides 5 and 6 may be omitted if covered in a session on managers Energy, Manufactures When used, energy and physical products get ‘used up’, lost We want more –more fuel –more food The need is quantity Bigger is cheaper Information When used, information is multiplied but may be distorted We get too much –information overload –finding what we want The need is quality Smaller is faster

Denis Osborne, ‘IT’ matters 6 CONCERNS OF MANAGERS C19 Physical Products High volume sales Secure supplies Focus on inputs, suppliers Big plants near resources Cheap in-house labour Management pyramid workers less educated C21 Information Processes High value added Sales, design, marketing Focus on outputs, customers Small plants near markets Clever team, contractors Management network workers well educated

7 OPPORTUNITIES

Denis Osborne, ‘IT’ matters 8 TO INFORM Communications allow us to inform, – many people, in many places, at low cost And to listen, survey, get feedback, consult The Internet allows state to inform citizens – about laws and policies – about progress with applications, decisions And to introduce direct democracy, if wanted

Denis Osborne, ‘IT’ matters 9 TO CALCULATE Computers give managers tools to analyse costs and spending – make possible cost-accounting, output budgets to monitor unusual events – transfers in bank accounts to handle vast volumes of data – find key words in telephone taps – identify key people on video tape

Denis Osborne, ‘IT’ matters 10 TO HOLD ACCOUNTABLE Computers facilitate accountability – through surveillance (exception reporting) – through routine procedures – through random procedures To line management To customers To the public

Denis Osborne, ‘IT’ matters 11 TO MONITOR Street surveillance Video film as evidence – objections from traditionalists – not in law – objections from technocrats – editing Records of purchases Records of internet access, etc

Denis Osborne, ‘IT’ matters 12 TO CONTROL? EITHER Information gives THEM power to control – Power focused in strong governments and multinationals OR Information leaks; nothing ‘sacred’ or secret – Power lies with small closed groups and terrorists

13 RISKS …

Denis Osborne, ‘IT’ matters 14 ‘IT’ BRINGS RISKS. WHY ? Think About Crime ‘Against’ Computers Remote access; impersonal –criminal feels safe, does not see victim High speed processing –criminal can steal much information in short time Public acceptability –computer crime is clever, fun; unlike theft –the victim feels no threat to their person –individual is beating the organisation

Denis Osborne, ‘IT’ matters 15 ALSO … Detection of ‘computer crime’ is difficult – If I steal information my victim loses nothing! Prosecution is unlikely, Punishment slight –Laws are vague, unenforceable, police lack skills – Penalties less than for theft, mugging Opportunities for crime enormous –Global range, 24-hour access

Denis Osborne, ‘IT’ matters 16 WHO POSES THE THREAT ? People, but with what Motives? Espionage (commercial, political …) –theft of data, –copying data, unknown to victim Personal benefit – distortion of data (such as tax liability) Grievance, Mischief, Revenge (or fun!) –damage to system or data, or both

Denis Osborne, ‘IT’ matters 17 WHAT RISKS? From Theft, Virus, Hacker, Damage, Breakdown Involving the HARDWARE for data storage and processing COMMUNICATIONS Links SOFTWARE Programmes DATA (Information) PEOPLE –irresponsible, stressed …

Denis Osborne, ‘IT’ matters 18 WHAT CONSEQUENCES ? Denial of data to computer user: –access blocked (also from theft of equipment) Distortion of data or programmes: –for example, of balance in bank account Disclosure of data (data stolen): –competitor gains information; –student reads exam papers Destruction of data: –retrieval impossible

19 ACTIONS

Denis Osborne, ‘IT’ matters 20 A RISK ASSESSMENT What are the assets (equipment, information)? What are the threats? What is estimated probability of an ‘attack’? What would be the consequences? What can be done and what would it cost –to detect an attack? –to prevent it, or minimise its effects? –to recover from an attack? –Is prevention worth the cost?

Denis Osborne, ‘IT’ matters 21 PROTECTING OUR SYSTEMS Alert staff to security threats and issues Control physical access to system Control password access to different levels Keep back-up data off site Train staff to back up data regularly Warn about virus risks, use updated checks Enforce penalties for importing software Review and monitor procedures

22 ETHICS

Denis Osborne, ‘IT’ matters 23 PROTECT CITIZENS Citizens should be able to correct information –if records held about them are wrong –requiring enforcement of a ‘Data Protection Act’ Citizens need protection against –‘unfair’ advertising, untrue propaganda –pornography when they do not want it –incitement to race hatred or crime –abuse of power by Government, business … –misuse of data held by Government, others ….

Denis Osborne, ‘IT’ matters 24 PROTECT GOVERNANCE Governments need power to manage well –to keep and use records about citizens –to avoid excess bureaucracy computers can bring –to assess risks from new technologies –to protect the ‘information environment’ Courts need –to use evidence from ‘new’ technology –to be competent in IT and fraud cases, etc