PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Controlling. Copyright © 2005 Prentice Hall, Inc. All rights reserved. 18–2 L E A R N I N G O U T L I N E Follow this Learning Outline as you read and.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Netiquette Rules.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
PowerPoint Presentation by Charlie Cook The University of West Alabama SECTION 2 Jobs and Labor © 2011 Cengage Learning. All rights reserved. May not be.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
© 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible Web site, in whole or in part.6–1.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Higher Administration
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 15 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Chapter 5 © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
© 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Performance management and appraisal Chapter 8 © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 12 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
To Accompany “Economics: Private and Public Choice 13th ed.” James Gwartney, Richard Stroup, Russell Sobel, & David Macpherson Slides authored and animated.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
©2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publically accessible website, in whole or in part.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
© 2013 South-Western, a part of Cengage Learning. All rights reserved. Chapter 14 | Slide 1 Chapter 14: Understanding Information and e-Business.
Monitoring Employees on Networks: Unethical or Good Business?
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Chapter 18 Digital Communication: , Instant Messages, Blogs, and Wikis Strategies for Technical Communication in the Workplace Laura J. Gurak John.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
© 2010 South-Western/Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Describe the potential of IT to improve internal and external communications By Jim Green.
Monitoring Employees on Networks
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2012 Cengage Learning. All Rights Reserved. Objective 2.04 Understand applications and issues of technology SLIDE 1 Objective 2.00 Understand the nature.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
CHAPTER FOUR OVERVIEW SECTION ETHICS
To spy or not to spy; that is the question
CHAPTER 1 FOUNDATIONS OF IS Subject Name: MANGEMENT INFORMATION SYSTEM
Chapter 8 Ethics and Technology
Communicating Through the Internet and Other Technologies
Computer Security.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Technological, Legal, and Ethical Considerations
Understand the nature of business.
Chapter # 3 COMPUTER AND INTERNET CRIME
Topic 12: Virtual Private Networks
Presentation transcript:

PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Harnessing the Power of Information Technology and the Internet

1.Discuss technology tools and information systems. 2.Describe potential risks associated with information systems and list steps a supervisor can take to protect employee and customer data. 3.Describe technology’s impact on productivity. 4.Discuss computer monitoring and surveillance programs organizations are using to track employees. 5.Discuss common Internet resources, the impact they have on individuals and companies, and steps to get started using them. 6.Identify strategies to leverage technology, information systems, and the Internet for positive results. 1.Discuss technology tools and information systems. 2.Describe potential risks associated with information systems and list steps a supervisor can take to protect employee and customer data. 3.Describe technology’s impact on productivity. 4.Discuss computer monitoring and surveillance programs organizations are using to track employees. 5.Discuss common Internet resources, the impact they have on individuals and companies, and steps to get started using them. 6.Identify strategies to leverage technology, information systems, and the Internet for positive results. Learning Objectives © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–2

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–3 Technology and Information Systems at Work TechnologyTechnology  All the tools and ideas available for extending the natural physical and mental reach of humankind.  Electronics, robots, imaging, and communication. Computer Information SystemsComputer Information Systems  Are the combination of data input, processing, and output for end users inside and outside the organization.  Must validated to assure that input, processing, and output components are working properly.

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–4 1.How can computer information systems be used by supervisors to increase efficiency and effectiveness? 2.What are the potential risks to the organization by introducing these?

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–5 Protecting Information Systems Computer CrimeComputer Crime  Is using computer technology to steal or cause harm to another person or company. Computer Viruses Hardware Theft Internal Theft of Data External Hacking Potential Risks to Information Systems

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–6 Protecting Information Systems (cont’d) How to Reduce the Risks Require the use of strong passwords Limit employee access to information Practice safe computing when opening and surfing the web Establish and follow information security policies and procedures Require employees to log out Encrypt critical and confidential data Training, Training, Training

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–7 Information Technology’s Impact on Productivity IT’s Positive Impact on ProductivityIT’s Positive Impact on Productivity  Reduction in inventory expenses  Improved customer service  Greater access to information  Use of robots on routine, remote, or risky jobs IT’s Negative Impact on ProductivityIT’s Negative Impact on Productivity  Distractions and risks of electronic messaging  Stress of constant connection to the job  Questionable quality of internet-sourced information  Rapid obsolescence and the learning curve

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–8 1.What can you do to minimize the negative impact e- mail has on your personal productivity and the productivity of others? 2.Brainstorm with your classmates—what do you think will be the next revolutionary technology to impact personal productivity in the workplace?

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–9 Monitoring Employees Issues in Employee MonitoringIssues in Employee Monitoring  Invasion of employee privacy  Corporate spying  Violation of civil liberties Employer Surveillance PracticesEmployer Surveillance Practices  Monitoring website connection and surfing  Review of employee  Video surveillance  Monitoring keystrokes and time on computer  Use of GPS to track location of employees

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–10 1.Do you think this an infringement of employee privacy rights? Explain. 2.In your view, what are the general boundaries for a fair and reasonable company Internet use policy? eTelemetry, which provides tech departments with network monitoring services, came out with a new version of hardware that some might consider creepy. It gives managers desktop access to details about the online activities of the people they supervise—data previously reserved for IT. The hardware lets managers set up s to alert them when a worker has been surfing excessively, view which sites employees have visited that day, and compare individuals’ bandwidth use.

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–11 The Impact of the Internet Private and Company Blogs Reference and Search Sites Social and Business Networking Sites Video Sharing Sites Internet Resources and Activities That Affect How Supervisors Work

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–12 1.How can you use blogging, social networking, and/or video sharing to be a more effective supervisor? 2.What are some of the drawbacks to using these tools in the workplace?

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–13 Leveraging Information Technology for Positive Results Performance Evaluation Software Telecommuting Technology IT Tools for Supervisors Company Intranets

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–14 1.What are a few examples of ways you can use your company intranet to communicate more effectively with your employees? 2.How else can you use the Internet, a company intranet, or blogs to have a positive impact on team building?

© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–15 TERMS TO UNDERSTAND blog computer crime computer information systems computer virus employee data theft encryption external hacking intranet reference sites social network sites technology