Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9 Information Systems Ethics and Computer Crime
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Information Systems Ethics and Computer Crime J. S. Chou Assistant Professor.
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
Possible WebQuest type links  
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Chapter 11 Information Systems Ethics.
Computer Programming I
Computer Ethics for Computer Users
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
Unit 3- Introduction to Computer Ethics
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
CHAPTER 5 ETHICS & PRIVACY.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Professional Ethics and Responsibilities Part-II
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
The Legal System and Ethics in Information Security
Ethical Use of Computers
Presentation transcript:

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-2 Information Age Terms Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-3 Information Privacy and Issues *X Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government. Claim to privacy is protected by the Canadian Charter of Rights and Freedoms In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA) However, privacy can be challenged by the Internet: cookies, spyware Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government. Claim to privacy is protected by the Canadian Charter of Rights and Freedoms In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA) However, privacy can be challenged by the Internet: cookies, spyware

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-4 Other Privacy Concerns *X Intellectual property rights –Plagiarism from Internet Publishing slanderous information about a person on a website Etc…

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-5 The Need for Ethical Behaviour *MC Ethical Behaviour Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit Ethical Behaviour Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-6 Responsible Computer Use *MC The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output Guidelines In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations Guidelines In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-7 Responsible Computer Use *X The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.) The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-8 Computer Crimes *MC Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions) Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-9 Computer Crime – Unauthorized Access Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME! Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME!

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-10 Computer Crimes – Who Commits Them? *X Unauthorized Access 1998 Survey of 1600 companies by PricewaterhouseCoopers 82% come from inside the organization (employees)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-11 Computer Crimes - Hacking and Cracking *MC Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-12 Computer Crimes – Cracker (Humorous)

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-13 Computer Crime – Software Piracy *X Software Piracy This practice of buying one copy and making multiple copies for personal and commercial use, or for resale is illegal in most countries while others offer weak or nonexistent protections. This has become and international problem as shown below

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-14 Computer Crimes – Destructive Code *X

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-15 APPLIED COMPUTER SCIENCE DEPARTMENT *X Implementing an “Information Systems” pattern, and also “Health Informatics” pattern –Less technically and programming oriented than traditional applied cs –Courses: 1805 Introduction to Programming 1809 Website Design and Development 1903 Programming Fundamentals 1803 Intro to Information Systems 2814 Applications of Database Systems

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-16 IS Pattern More courses: 2909 Introduction to Internet Programming 2913 Software Requirements Analysis and Design 2916 Business Application Systems 3801 Principles in Information Systems 3816 User Interfaces in Information Systems 3811 Telecommunications 3907 eCommerce 3923 Technical Writing

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-17 Health Informatics Pattern Information systems as applied to: –Administration –Delivery of health care

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-18 Bus & Admin Students Can take a selected number of IS courses to add to resume –e.g. major area of concentration: Accounting (or Marketing) – courses taken: –Secondary area of concentration: Information Systems – courses taken: Introduction to Information Systems (A+),

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-19 FINALLY The End of ACS 1803 Good Luck on Exams and in Future!!!