Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Information ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Intellectual property and plagiarism Intellectual property Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Privacy (1:2)
Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Identifying threats
Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Assessing vulnerability
Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Administrative security controls
Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Information security and cloud computing
Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Human element (1:2)
Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethical decision making Sales rep Sixth grader University employee Coworker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Criteo case
Spamhaus case Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter