Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 18 Indexing Structures for Files.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Consumer Decision Making and Beyond CHAPTER FIFTEEN.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
12-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 12 Pricing, Distributing, and Promoting Products.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 0.
Analyzing International Opportunities 12 Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Part 1 Conditionals and Loops.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 9: Knowledge Management and E-Learning Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
6-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 6 Organizing the Business.
5-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 5 Business Management.
11-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 11 Marketing Processes and Consumer Behavior.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Chapter 9: Knowledge Management and E-Learning Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
Chapter Three The Political and Legal Environments Facing Business International Business Part Two Comparative Environmental Frameworks.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall. Section 1.3 Complex Numbers Quadratic Equations in the Complex Number System.
Globalization and International Business. Factors in Increased Globalization Increase in and expansion of technology Liberalization of cross-border trade.
MIS323 – Business Telecommunications Chapter 10 Security.
Analyzing International Opportunities. © Prentice Hall, 2006International Business 3e Chapter Chapter Preview List each key factor to assess in.
Chapter 1 Achieving Success Through Effective Business Communication Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall 1Chapter 1 -
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall. Section 5.1 Polynomial Functions and Models.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Copyright ©2012 Pearson Education, Inc. publishing as Prentice Hall Chapter 14 Respecting Employee Rights 14-1.
The Inverse Trigonometric Functions (Continued)
Chapter 10: Ethics, Privacy, and Security
Sinusoidal Curve Fitting
Introduction to Information Systems
Section 9.1 Polar Coordinates
Section R.8 nth Roots; Rational Exponents
Building Exponential, Logarithmic, and Logistic Models from Data
The Inverse Sine, Cosine, and Tangent Functions
E-Commerce: Regulatory, Ethical, and Social Environments
Section 2.4 Circles Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Equations Quadratic in Form Absolute Value Equations
Information Technology
Section 8.3 The Law of Cosines
Section 11.8 Linear Programming
Equations Quadratic in Form Absolute Value Equations
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Polynomial and Rational Inequalities
Mathematical Models: Building Functions
Copyright © 2008 Pearson Prentice Hall Inc.
Chapter 12 Analyzing International Opportunities
Copyright © 2008 Pearson Prentice Hall Inc.
Chapter 12 Analyzing International Opportunities
Partial Fraction Decomposition
Sinusoidal Curve Fitting
Systems of Linear Equations: Matrices
Quadratic Equations in the Complex Number System
Partial Fraction Decomposition
Properties of Rational Functions
Information Technology
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
The Inverse Trigonometric Functions (Continued)
The Inverse Sine, Cosine, and Tangent Functions
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Information ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Intellectual property and plagiarism Intellectual property Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Privacy (1:2)

Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Identifying threats

Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Assessing vulnerability

Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Administrative security controls

Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Information security and cloud computing

Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Human element (1:2)

Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethical decision making Sales rep Sixth grader University employee Coworker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter Criteo case

Spamhaus case Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter