IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 11-1 Chapter 11 Information Systems Ethics.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

How to protect yourself, your computer, and others on the internet
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
CYBER CRIME AND SECURITY TRENDS
1 Information Systems Ethics and Computer Crime J. S. Chou Assistant Professor.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Gordon England, U.S. Air Force “Cyber.
Chapter Managing Information Systems Ethics and Crimes Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Unethical use of Computers and Networks
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
9-1 Chapter 9 Information Systems Ethics and Computer Crime
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Information Systems Today: Managing in the Digital World -Dr. Ali Zolait Chapter Managing Information Systems Ethics and Crimes Worldwide losses.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Computer Skills and Applications Computer Security.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 6/23/ Chapter 11 Managing Information Systems.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Chapter 11 Managing Information Systems Ethics and Crime.
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Fundamentals of Information Systems
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
HOW DO I KEEP MY COMPUTER SAFE?
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Chapter 11 Information Systems Ethics and Computer Crime

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Computer Ethics 11-2 Issues and standards of conduct pertaining to the use of information systems 1986—Richard O. Mason article  Most ethical debates relate to:  Information privacy  Information accuracy  Information property  Information accessibility

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Information Privacy 11-3 What information should an individual should have to reveal to others, especially via the course of employment and other transactions, such as online shopping Information you might want to keep private:  Social security number  Medical history  Family history Needs to avoid identity theft (stealing of another person’s social security no., credit card numbers and other info for the purpose of conducting criminal activities)

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Information Accuracy 11-4 Ensuring of the authenticity and fidelity of information as well as with identifying who is responsible for info errors that harm people High costs of incorrect information  Banks  Hospitals Difficult to track down the person who made the mistake

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Information Property 11-5 Focuses on who owns information about individuals and how can it be sold and exchanged Company maintaining the database with customer information legally owns it. They can sell the info There are limits to data privacy statements: 1) Cannot sell information it agreed not to share; 2) Must insure proper data handling practices

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Spam, Cookies, Spyware, cybersquatting & Digital right management Spam-Unsolicited Cookies- Text file storing Web browsing activity. Can opt for cookies not to be stored. Web sites might not function properly without cookies. Spyware- Software used for data collection without the users’ knowledge Cybersquatting- The practice of registering a domain name and later reselling it Digital Rights Management (DRM)- Technology solution to control digital content (Music, movies, books) 1-6

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Information Accessibility 11-7 Define what information a person or organization has the right to obtain about others and how this information can be accessed and used E.g., capture by Carnivore

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Computer Crime 11-8 Using a computer to commit an illegal act  Targeting a computer – unauthorized access  Using a computer to commit an offense  Using a computer to support a criminal activity Overall trend of computer crime declining. Next are types of computer crime and financial losses. Figures based on a survey of 194 organizations

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Unauthorized Computer Access 11-9 Using computer systems with no authority to gain such access Other examples from the media: 1) Employees steal time on company computers to do personal business, 2) Intruders break into government Web sites and change information displayed, 3) Thieves steal credit card numbers and buy merchandise Types of users accessing computers without authorization: 1) Hackers: Individuals gaining unauthorized access; Motivated by curiosity; No intentions to do harm 2) Crackers: Break into computers with the intention of doing harm 3) Hacktivists: Break into computer systems to promote political or ideological goals

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Types of Computer Criminals No clear profile as to who commits computer crimes Four groups of computer criminals 1) Current or former employees  85-95% of theft from businesses comes from the inside 2) People with technical knowledge committing crimes for personal gain 3) Career criminals using computers to assist them in crimes 4) Outside crackers hoping to find information of value  About 12% of cracker attacks cause damage

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Types of Computer Crimes 11-11

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Types of Computer Crimes (cont’d) 11-12

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Software Piracy Legal activities  Making one backup copy for personal use  Sharing free software (shareware or public domain software) Illegal activities  Making copies of purchased software for others  Offering stolen proprietary software (warez peddling) Software Piracy Terms o Intellectual property (IP)-Creations of the mind(s). Ex: Music, software, etc. o Patents- Process, machine or material of inventions. Ex: Amazon’s “one-click” buying experience o Copyrights- Legal way of protecting IP. Ex: 1980 Computer Software Copyright Act

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Software Piracy Is a Global Business Worldwide losses for 2005 estimated at $34 billion Some factors influencing piracy around the world o Concept of intellectual property differs between countries o Economic reasons for piracy o Lack of public awareness about the issue

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Computer Viruses and Other Destructive Code Malware (malicious software)  1,400 new pieces released in one month. Types of malware include:  Viruses -Reproduce themselves. Usually delete or destroy files. Viruses can spread through attachments  Worm- Does not destroy files. Designed to copy and send itself. Brings computers down by clogging memory  Trojan horse- Does not copy itself. Often remains hidden to the user  Logic bombs and time bombs- Variations of Trojan horse. Do not disrupt computer function until triggering event/operation

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Internet Hoaxes False messages circulated online  New viruses (that don’t exist)  told recipients to erase a file that was actually a part of Windows operating system  Collection of funds for certain group  Cancer causes  Possible consequences  Spammers harvesting addresses from hoaxes

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Cyber Harassment, Stalking, and Bullying Cyber harassment  Crime that broadly refers to the use of a computer to communicate:  Obscene, vulgar, or threatening content Cyber stalking  Making false accusations that damage reputation  Gaining information on a victim by monitoring online activates  Using the Internet to encouraging other to harass a victim  Attacking data and equipment of a victim  Using the Internet to place false goods or orders Cyber bullying  The deliberate cause of emotional distress to a victim Online predator  Typically target vulnerable population for sexual or financial purpose

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Cyber-war: Military’s attempt to disrupt or destroy other country’s information and communication systems Goal is to diminish opponent’s communication capabilities Used in concert with traditional methods Cyber-terrorism: use of computer and network technologies against persons or properties to intimidate or coerce governments, civilians, or any segments of society in order to attain political, religious or ideological goals. Governments not involved Can be launched from anywhere in the world Goal is to cause fear, panic and destruction Cyberterrorism will likely become weapon of choice Cyberwar vs. Cyberterrorism

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Categories of Potential Cyberterrorist Attacks 11-19

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Use of Internet in Terrorist Attacks 11-20

IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/2015 Use of Internet in Terrorist Attacks (cont’d) 11-21