C OMPUTING E SSENTIALS 1999 2000 1999 2000 1999 2000 Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.

Slides:



Advertisements
Similar presentations
Lesson 30 Computer Safety and Ethics
Advertisements

Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Ergonomics & The Environment Derek Franks Comm 165.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Ethics, Privacy and Security
Presented by Student Name Workplace Issues – Lecture 4.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Chapter 11 Security and Privacy: Computers and the Internet.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Ethical Issues in Information Technology First Annual Conference on Ethics and Technology Chicago, 1996 Mary Malliaris.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Module 5.2 Green, health and global e-communication issues
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Unit 1 Introduction to Computing CSC Introduction to Computing.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy, Security and Ethics
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Computers: Tools for an Information Age
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter 10 Privacy and Security.
Ethical Use of Computers
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary

9 9 Privacy, Security, Ergonomics and the Environment CHAPTER

3 Computing Essentials Chapter 9 Competencies After reading this chapter, you should be able to: 1. Discuss the privacy issues raised by the presence of large databases, electronic networks, the Internet and the Web. 2. List the major laws on privacy. 3. Explain the effects of computer crimes, including the spreading of computer viruses.

4 Computing Essentials Chapter 9 Competencies 4. Describe other hazards to the computer. 5. Discuss security measures that may be taken. 6. Describe ergonomics and how it helps avoid physical and mental risks. 7. Describe the four ethical issues: privacy, accuracy, property and access.

5 Computing Essentials Chapter 9 Competencies 8. Discuss what the computer industry is doing to help protect the environment. 9. Discuss what you can do to help protect the environment.

6 Computing Essentials Chapter 9 Overview Information systems do not operate in a vacuum People are important components Result is computer usage for both good and bad purposes What impact does information technology have on individuals and society?

Privacy Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws.

8 Computing Essentials Chapter 9 Ethics Standards of moral conduct Computer ethics: morally acceptable use of computers Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up

9 Computing Essentials Chapter 9 Ethics Four primary issues –Privacy - collection and use of data about individuals –Accuracy - responsibility of data collectors to ensure accuracy –Property - data ownership and software usage rights –Access - responsibility of data collectors to control access

10 Computing Essentials Chapter 9 Large Databases Data collected and stored on citizens every day Collectors include –Government agencies - Federal government has 2,000 databases –Businesses

11 Computing Essentials Chapter 9 Large Databases Social security numbers are often used as key fields in databases related to our employment, tax and credit activities This information has value - rise of the information reseller industry Information resellers provide this gathered data to others for a fee

12 Computing Essentials Chapter 9 Large Databases Spreading information without consent –Blockbuster to sell video rental habits - dropped project –Lotus Development and Equifax - information on 120 million Americans - abandoned project under pressure –Some large companies using medical records as a factor in important personnel decisions

13 Computing Essentials Chapter 9 Large Databases Spreading inaccurate information –Mistakes in one computer file can easily migrate to others –Inaccurate data may linger for years –Laws help individuals with correcting credit data and finding out what personal information is being maintained by government agencies

14 Computing Essentials Chapter 9 Private Networks Currently legal for employers to monitor electronic mail - survey reported 20% do Most online services reserve the right to censor content Contentious issue over property rights versus free speech and privacy

15 Computing Essentials Chapter 9 The Internet and the Web Little concerns about privacy on the Web due to illusion of anonymity Browser records pages visited Web sites often employ programs called cookies to record times and pages visited, and credit card numbers

16 Computing Essentials Chapter 9 Major Laws on Privacy

17 Computing Essentials Chapter 9 Major Laws on Privacy

18 Computing Essentials Chapter 9 Major Laws on Privacy

19 Computing Essentials Chapter 9 Major Laws on Privacy

Security Threats to computer security are computer crimes, including viruses, electronic break-ins and natural and other hazards. Security measures consist of encryption, restricting access, anticipating disasters and making backup copies.

21 Computing Essentials Chapter 9 Threats to Computer Security Computer criminals - those using computer technology to engage in Illegal action, four types –Employees - the largest category –Outside users - customers or suppliers –“Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent –Organized crime - tracking illegal enterprises, forgery, counterfeiting

22 Computing Essentials Chapter 9 Threats to Computer Security Computer crime can take various forms –Damage to computers, programs or files Viruses - migrate through systems attached to files and programs Worms - virus variants that continuously self- replicate –Theft Of hardware, software, data, computer time Software piracy - unauthorized copies of copyrighted material

23 Computing Essentials Chapter 9 Threats to Computer Security - Viruses

24 Computing Essentials Chapter 9 Threats to Computer Security Computer crime can take various forms –Manipulation “Unauthorized entry and “harmless message” still illegal Computer Fraud and Abuse Act of no unauthorized viewing across state lines, of any government or federally insured institution computer Max sentence of 20 years in prison and $100,000

25 Computing Essentials Chapter 9 Threats to Computer Security Other hazards –Natural –Civil strife and terrorism –Technological failures –Human errors

26 Computing Essentials Chapter 9 Measures to Protect Computer Security Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Encrypting messages to frustrate interception, federal government wants standardized scheme to facilitate wire- tap of criminal enterprises

27 Computing Essentials Chapter 9 Measures to Protect Computer Security Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Encrypting messages to frustrate interception, federal government wants standardized scheme to facilitate wire- tap of criminal enterprises

28 Computing Essentials Chapter 9 Measures to Protect Computer Security Restricting access - both access to the hardware locations, and into the system itself Anticipating disasters - disaster recovery plan

29 Computing Essentials Chapter 9 Measures to Protect Computer Security Backing up data Security for microcomputers –Avoid extreme conditions –Guard the computer –Guard programs and data

Ergonomics Ergonomics helps computer users take steps to avoid physical and mental health risks and to increase productivity.

31 Computing Essentials Chapter 9 Physical Health Avoiding eyestrain and headache –Regular breaks every couple of hours –Avoid monitors that flicker –Control ambient light –Insure adequate monitor brightness –Keep all objects being focused on at the same distance

32 Computing Essentials Chapter 9 Physical Health Avoiding back and neck pain –Have adjustable equipment –Adequate back support –Monitor at, or slightly below eye level

33 Computing Essentials Chapter 9 Recommendations for the ideal microcomputer work environment

34 Computing Essentials Chapter 9 Physical Health Avoiding effects of electromagnetic fields (EMF) –Some believe a connection to miscarriages and cancers –No statistical support yet –Exercise caution, particularly if pregnant

35 Computing Essentials Chapter 9 Physical Health Avoiding repetitive strain injury (RSI) –Injuries from fast, repetitive work –Billions of dollars in claims and productivity losses every year –Carpal tunnel syndrome - nerve and tendon damage in hands and wrists; common with computer workers

36 Computing Essentials Chapter 9 Mental Health Avoiding noise Avoiding stress from excessive monitoring –Workers electronically monitored have more health problems –Recently researchers have discovered what a common sense manager already knew: human monitoring yields more productivity than electronic

37 Computing Essentials Chapter 9 Design Capabilities of microprocessor stimulate manufacturers to load on the features Often, the result is a product difficult to use Recent trend toward including fewer features

38 Computing Essentials Chapter 9 Ergonomic keyboard

The Environment The computer industry has responded to the Energy Star program with the Green PC. You can help by conserving, recycling and educating.

40 Computing Essentials Chapter 9 The Environment Microcomputers are the greatest user of electricity in the workplace, forecasted 10% by year 2000 Increased power consumption contributes to pollution and natural resource depletion

41 Computing Essentials Chapter 9 The Green PC Heart of the Energy Star program developed by the Environmental Protection Agency (EPA) –System unit and display - minimize unnecessary energy consumption –Manufacturing - avoiding harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion

42 Computing Essentials Chapter 9 The Green PC

43 Computing Essentials Chapter 9 Personal Responsibility Conserve - turn computers off at end of work day, use screen savers Recycle - most of the paper we use is eligible Educate - know the facts about ecological issues

44 Computing Essentials Chapter 9