Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

Slides:



Advertisements
Similar presentations
Lesson 30 Computer Safety and Ethics
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Ergonomics & The Environment Derek Franks Comm 165.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Presented by Student Name Workplace Issues – Lecture 4.
Security Issues and Ethics in Education
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Chapter 11 Security and Privacy: Computers and the Internet.
The Office Procedures and Technology
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
1 Pertemuan 11 Understanding Computers Privacy & Health Concerns Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
in Information Systems and the Internet
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy, Security and Ethics
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues & Ethics in Education By Maud Mushayamunda.
10 PRIVACY AND SECURITY CHAPTER
Network and Internet Security and Privacy
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Network and Internet Security and Privacy
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS

2 Competencies Negative effects Privacy Security Ergonomics Environment computing ESSENTIALS

3 Negative Effects Effective implementation of technology Maximize positive effects Minimize negative effects Significant concerns Privacy Security Ergonomics Environment computing ESSENTIALS

4 Privacy Laws often do not keep up with technology Ethics Standards of moral conduct Computer ethics Guidelines for morally acceptable computer use Property Access Privacy Accuracy computing ESSENTIALS

5 Large Databases Information on citizens and consumers compiled daily Banks, utilities, grocery stores Hospitals, doctor’s offices Government Social Security Number Used for ID number on forms Information resellers Contact data is valuable computing ESSENTIALS

6 Information Without Consent Information collected and used without the person’s knowledge Shopping habits, video rentals Medical records Banking transactions Federal government Know Your Customer Total Information Awareness project computing ESSENTIALS

7 Inaccurate Information Inaccurate data can be circulated Data propagation can spread mistakes to other databases Laws can help Correct credit data Freedom of Information Act computing ESSENTIALS

8 Private Networks Employers legally monitor Snoopware used in 75% of businesses Online services right to censor content computing ESSENTIALS

9 Internet and Web Concerns about privacy on Web Illusion of anonymity Browser records pages visited Cookies monitor Times and pages visited Other private information computing ESSENTIALS

10 Cookies Programs that monitor Web activity Traditional cookies Monitor activity at one site Dormant other times Ad network cookies Spyware programs that record all Internet activity Web bugs Cookie-cutter programs computing ESSENTIALS

11 Privacy Laws Mostly cover government usage, but not private organizations Some current laws Fair Credit Reporting Act (1970) Freedom of Information Act (1970) Right to Financial Privacy Act (1974) Computer Abuse Amendments Act (1994) No Electronic Theft (NET) Act (1997) computing ESSENTIALS

12 Code of Fair Information Practice Response to information privacy concerns Not law, but adopted by many information collecting businesses No secret databases Right of individual access Right of consent Right to correct Assurance of reliability and proper use computing ESSENTIALS

13 Security Threats to computer systems include Viruses Electronic break-ins Natural and other hazards Terrorist activity computing ESSENTIALS

14 Computer Criminals Employees Outside users “Hackers” and “crackers” Organized crime Terrorists computing ESSENTIALS

15 Computer Crime Damage to computers, programs or files Viruses and worms Denial of Service attack Theft Hardware, data, computer time Software piracy Manipulation computing ESSENTIALS

16 Other Hazards Other hazards to computer systems besides criminal misuse Natural hazards Earthquake, fire, floods, hurricanes Civil strife War, riots Technological failures Voltage surge, brownouts Human error Data-entry, programming errors computing ESSENTIALS

17 Security Measures Protecting information, hardware, software Principle methods Encrypting messages Pretty Good Privacy Restricting access Passwords, firewalls Anticipating disasters Disaster recovery plan Backing up data In case other measures fail computing ESSENTIALS

18 Security for Microcomputers Individuals should also implement security Some basic procedures Avoid extreme conditions Clean and protect equipment Avoid viruses Virus protection software Guard computer Cable locks, marking equipment Guard programs and data Store media securely computing ESSENTIALS

19 Ergonomics Study of human factors related to things people use Fitting the job to the worker Improve productivity Health issues Physical health Mental health computing ESSENTIALS

20 Physical Health Sitting in awkward position for long periods Eyestrain and headache Back and neck pain Repetitive strain injury (RSI) Carpal Tunnel Syndrome computing ESSENTIALS

21 Ideal Microcomputer Work Environment computing ESSENTIALS

22 Mental Health Technology can be counterproductive Noise Voice input/output Printers Cooling fans, equipment vibration Excessive monitoring Time of customer service calls Number of keystrokes Less is more computing ESSENTIALS

23 Ergonomic Design Devices made with less features Simpler to use, setup Fewer buttons and lights Plug and Play Adjustable equipment Chairs, footrests, lighting Ergonomic devices Keyboards, mouse, glare screens computing ESSENTIALS

24 The Environment Greatest user of electricity in workplace Energy Star program with Green PC System Unit Display Manufacturing computing ESSENTIALS

25 A Look to the Future Presence Technology Currently used with Instant Messaging software May spread to other devices Television Automobile PDAs, cell phones Potential loss of privacy Abused by advertisers Abused by government computing ESSENTIALS

26 computing ESSENTIALS