IT - The Organization and the Individual. Learning Objectives Recognize the difficulties in managing information resources. Recognize the difficulties.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

1 Housekeeping Power Point Demo?? – Thur or April 13 Today – Chap 12 Today – Chap 12 Thur – Share about chap 12 homework Thur – Share about chap 12 homework.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Acquiring Information Systems and Applications
Security, Privacy, and Ethics Online Computer Crimes.
1 IMS INFORMATION TECHNOLOGY IN ORGANISATIONS Week 9 Control, audit and security.
Chapter 14 Assessing the Value of IT. Traditional Financial Approaches  ROI – Return on Investments Each area is considered an investment center ROI.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
1 Average: 85%, Median: 90%…Good Work!. 2 Chapter 15 Managing Information Resources & Security.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
1 Chapter 15 Managing Information Resources & Security.
IT Planning.
E-Commerce: The Second Wave Fifth Annual Edition Chapter 12: Planning for Electronic Commerce.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
Ethics in Information Technology, Second Edition
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Economic Aspects of Information Systems Updated 2015 MIS 2000 Information Systems for Management Instructor: Bob Travica.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
ORGANIZATIONAL STRUCTURE
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Strategic Information Systems Planning
13-1 Information Technology Economics Information Technology: Economic and Financial Trends Internal IT versus outsourcing Expanding power / declining.
The Purchasing Function
Economics of Information Technology
Computer Crime and Information Technology Security
Information Systems Planning
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Models for Estimating Risk and Optimizing the Return on Security Investment.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Business Computing 550 Lesson 1. Fundamentals of Information Systems, Fifth Edition An Introduction to Information Systems in Organizations.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Alter – Information Systems © 2002 Prentice Hall 1 The Process of Information System Planning.
MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Security and Ethics Privacy Employment Health Crime Working
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
CHAPTER 13 Acquiring Information Systems and Applications.
Internet2: The History Greg Wood Director of Communications.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
1.less than 3 million. 2.less than 10 million. 3.over 23 million. 4.over 100 million. 5.Not sure In the U.S., the number of managers that rely on Information.
Introduction to Information Security
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
1 Financial management for water, sewer, and storm water systems Most financial management of water, sewer, and storm water systems takes place in a government.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Information Systems Security
Comprehensive Security and Compliance at an Affordable Price.
Securing Information Systems
Forensic and Investigative Accounting
Cybersecurity Threat Assessment
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

IT - The Organization and the Individual

Learning Objectives Recognize the difficulties in managing information resources. Recognize the difficulties in managing information resources. Recognize information systems ’ vulnerability and manage risk. Recognize information systems ’ vulnerability and manage risk. Discuss the security issues of the Web and electronic commerce. Discuss the security issues of the Web and electronic commerce. Identify the major aspects of the economics of information technology. Identify the major aspects of the economics of information technology. Demonstrate how to define and measure tangible information technology benefits. Demonstrate how to define and measure tangible information technology benefits. Show how to evaluate intangible information technology benefits. Show how to evaluate intangible information technology benefits.

God is on the Small Stuff and it all matters “Leadership is an Art” Bruce Bickel & Stan Jantz

….In the Small Stuff Empowering is more than delegating Empowering is more than delegating Have the courage to hold people accountable Have the courage to hold people accountable Associate with leaders as often as you can Associate with leaders as often as you can Being a good example is better than giving good advice Being a good example is better than giving good advice There are born leaders and there are leaders who are made. And then there arte those who become leaders out of necessity There are born leaders and there are leaders who are made. And then there arte those who become leaders out of necessity

Small Stuff (cont.) An exceptional leader is one who gets average people to do superior work An exceptional leader is one who gets average people to do superior work If you want to lead, read If you want to lead, read Use your influence sparingly. It will last longer Use your influence sparingly. It will last longer When you find a leader, follow When you find a leader, follow When you identify a follower, lead When you identify a follower, lead Be available to take someone’s place in an emergency Be available to take someone’s place in an emergency Power begins to corrupt the moment you begin to seek it Power begins to corrupt the moment you begin to seek it

Small Stuff (cont.) A signpost like a peer, only warns you about the road ahead. But a map, like a mentor can show you hoe to get where you want to go A signpost like a peer, only warns you about the road ahead. But a map, like a mentor can show you hoe to get where you want to go Find a mentor Find a mentor Managing people begins with caring for them Managing people begins with caring for them One of the sobering characteristics of leadership is that leaders are judged to a greater than followers. One of the sobering characteristics of leadership is that leaders are judged to a greater than followers.

Evaluating Trends

Technology & Organizations Impact of new technologies on organizations: Impact of new technologies on organizations: First, most organizations will perform existing functions at decreasing costs over time and thus become more efficient.First, most organizations will perform existing functions at decreasing costs over time and thus become more efficient. Second, creative organizations will find new uses for information technology—based on the improving price- to-performance ratio—and thus become more effective.Second, creative organizations will find new uses for information technology—based on the improving price- to-performance ratio—and thus become more effective. New and enhanced products and services will provide competitive advantage to organizations that have the creativity to exploit the increasing power of information technology.New and enhanced products and services will provide competitive advantage to organizations that have the creativity to exploit the increasing power of information technology.

Trend -- Information -> Collaboration Today’s Internet focuses on access to and delivery of information Today’s Internet focuses on access to and delivery of information Tomorrow’s Internet will support human collaboration in an information-rich environment Tomorrow’s Internet will support human collaboration in an information-rich environment The Internet is global, and is creating a global capability to build knowledge-based communities The Internet is global, and is creating a global capability to build knowledge-based communities

Examples of reading

Technological & Financial Trends Moore’s Law Moore’s Law Moore suggested in 1965 that the number of transistors, and thus the power, of an integrated circuit (computer chip) would double every year while the cost remained the same.Moore suggested in 1965 that the number of transistors, and thus the power, of an integrated circuit (computer chip) would double every year while the cost remained the same. He later revised this estimate to a slightly less rapid pace: doubling every 18 months.He later revised this estimate to a slightly less rapid pace: doubling every 18 months. Price-to-performance ratio Price-to-performance ratio Organizations will have the opportunity to buy, for the same price, twice the processing power in 1½ years, four times the power in 3 years, eight times the power in 4½ years, etc.Organizations will have the opportunity to buy, for the same price, twice the processing power in 1½ years, four times the power in 3 years, eight times the power in 4½ years, etc.

Moore’s Law

Nolan’s Stages Theory of IT Adoption and Org. Learning (Pg ) Initiation Initiation Expansion Expansion Control Control Integration Integration Data administration Data administration Maturity Maturity

Research and Development Commercialization Partnerships Privatization NSFNET Internet2, Abilene, vBNS Advanced US Govt Networks ARPAnet gigabit testbeds Active Nets wireless WDM SprintLink InternetMCI US Govt Networks ANS Interoperable High Performance Research &Education Networks 21st Century Networking Quality of Service (QoS)

The Productivity Paradox Over the last 50 years, organizations have invested trillions of dollars in information technology. Over the last 50 years, organizations have invested trillions of dollars in information technology. Total worldwide annual spending on IT in 2000 was two trillion dollars, and is expected to be over three trillion dollars by 2004.Total worldwide annual spending on IT in 2000 was two trillion dollars, and is expected to be over three trillion dollars by Yet it is very hard to demonstrate that IT investments really have increased outputs or wages. Yet it is very hard to demonstrate that IT investments really have increased outputs or wages. The discrepancy between measures of investment in information technology and measures of output at the national level is described as the Productivity Paradox. The discrepancy between measures of investment in information technology and measures of output at the national level is described as the Productivity Paradox.

Productivity Economists define productivity as outputs divided by inputs. Economists define productivity as outputs divided by inputs. Outputs are calculated by multiplying units produced, for example, number of automobiles, by their average value.Outputs are calculated by multiplying units produced, for example, number of automobiles, by their average value. If inputs are measured simply as hours of work, the resulting ratio of outputs to inputs is labor productivity. If inputs are measured simply as hours of work, the resulting ratio of outputs to inputs is labor productivity. If other inputs—investments and materials—are included, the ratio is known as multifactor productivity. If other inputs—investments and materials—are included, the ratio is known as multifactor productivity.

Risk Management

Value of Information to Decision Making The value of information to decision making is the difference between the net benefits—benefits adjusted for costs—of decisions made using the information and decisions without the information. The value of information to decision making is the difference between the net benefits—benefits adjusted for costs—of decisions made using the information and decisions without the information. Value of Information = Net benefits with information – Net benefits without information

Total Cost of Ownership An interesting approach for evaluating the value of IT is the total cost of ownership (TCO). An interesting approach for evaluating the value of IT is the total cost of ownership (TCO). TCO is a formula for calculating the cost of owning and operating a PC.TCO is a formula for calculating the cost of owning and operating a PC. The cost includes hardware, technical support, maintenance, software upgrades, and help-desk and peer support.The cost includes hardware, technical support, maintenance, software upgrades, and help-desk and peer support. By identifying such costs, organizations get more accurate cost-benefit analyses and also reduce the TCO.By identifying such costs, organizations get more accurate cost-benefit analyses and also reduce the TCO. It is possible to reduce TCO of workstations in networked environments by as much as 26 percent by adopting best practices in workstation management (Kirwin et al., 1997).It is possible to reduce TCO of workstations in networked environments by as much as 26 percent by adopting best practices in workstation management (Kirwin et al., 1997).

Assessing Intangible Benefits There are 4 main methodologies of assessing intangible benefits: Value analysis allows users to evaluate intangible benefits on a low-cost, trial basis before deciding whether to commit to a larger investment. Value analysis allows users to evaluate intangible benefits on a low-cost, trial basis before deciding whether to commit to a larger investment. Information economics focuses on the application of IT in areas where its intangible benefits contribute to performance on key aspects of organizational strategies and activities. Information economics focuses on the application of IT in areas where its intangible benefits contribute to performance on key aspects of organizational strategies and activities. Management by maxim provides a means of rationalizing IT infrastructure investments. Management by maxim provides a means of rationalizing IT infrastructure investments. Option valuation takes into account potential future benefits that current IT investments could produce. Option valuation takes into account potential future benefits that current IT investments could produce.

Disaster Recovery Plan  A disaster recovery plan is essential to any security system.  Here are some key thoughts about disaster recovery by Knoll (1986): The purpose of a recovery plan is to keep the business running after a disaster occurs.The purpose of a recovery plan is to keep the business running after a disaster occurs. Recovery planning is part of asset protection.Recovery planning is part of asset protection. Planning should focus first on recovery from a total loss of all capabilities.Planning should focus first on recovery from a total loss of all capabilities. Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current.Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current. All critical applications must be identified and their recovery procedures addressed in the plan.All critical applications must be identified and their recovery procedures addressed in the plan.

Ethics Where does work end and private life begin?

Change Portfolio Career – Handy Portfolio Career – Handy Telecommuting Telecommuting Smart Work – 80% cerebral/20%manual Smart Work – 80% cerebral/20%manual Virtual Corporations Virtual Corporations Intellectual Capital Intellectual Capital

Video

Ethics Privacy Privacy Intellectual Property Intellectual Property CopyrightCopyright Trade SecretsTrade Secrets PatentPatent Quality of Life Quality of Life Social Responsibility Social Responsibility

Case: Cyber Crime On Feb. 6, the biggest EC sites were hit by cyber crime. On Feb. 6, the biggest EC sites were hit by cyber crime. Yahoo!, eBay, Amazon.com, E*TradeYahoo!, eBay, Amazon.com, E*Trade The attacker(s) used a method called denial of service (DOS). The attacker(s) used a method called denial of service (DOS). Clog a system by hammering a Web site ’ s equipment with too many requests for informationClog a system by hammering a Web site ’ s equipment with too many requests for information The total damage worldwide was estimated at $5- 10 billion (U.S.). The total damage worldwide was estimated at $5- 10 billion (U.S.). The alleged attacker, from the Philippines, was not prosecuted because he did not break any law in the Philippines.The alleged attacker, from the Philippines, was not prosecuted because he did not break any law in the Philippines.

Lessons Learned from the Case Information resources that include computers, networks, programs, and data are vulnerable to unforeseen attacks. Information resources that include computers, networks, programs, and data are vulnerable to unforeseen attacks. Many countries do not have sufficient laws to deal with computer criminals. Many countries do not have sufficient laws to deal with computer criminals. Protection of networked systems can be a complex issue. Protection of networked systems can be a complex issue. Attackers can zero on a single company, or can attack many companies, without discrimination. Attackers can zero on a single company, or can attack many companies, without discrimination. Attackers use different attack methods. Attackers use different attack methods. Although variations of the attack methods are known, the defence against them is difficult and/or expensive. Although variations of the attack methods are known, the defence against them is difficult and/or expensive.

U.S. Federal Statutes According to the FBI, an average white-collar crime involves $23,000; but an average computer crime involves about $600,000. According to the FBI, an average white-collar crime involves $23,000; but an average computer crime involves about $600,000. The following U.S. federal statutes deal with computer crime; The following U.S. federal statutes deal with computer crime; Counterfeit Access Device and Computer Fraud Act of 1984Counterfeit Access Device and Computer Fraud Act of 1984 Computer Fraud and Abuse Act of 1986Computer Fraud and Abuse Act of 1986 Computer Abuse Amendment Act of 1994 (prohibits transmission of viruses)Computer Abuse Amendment Act of 1994 (prohibits transmission of viruses) Computer Security Act of 1987Computer Security Act of 1987 Electronic Communications Privacy Act of 1986Electronic Communications Privacy Act of 1986 Electronic Funds Transfer Act of 1980Electronic Funds Transfer Act of 1980 Video privacy protection act of 1988Video privacy protection act of 1988

IT Security in the 21 st Century Increasing the Reliability of Systems. Increasing the Reliability of Systems. The objective relating to reliability is to use fault tolerance to keep the information systems working, even if some parts fail. Intelligent Systems for Early Detection. Intelligent Systems for Early Detection. Detecting intrusion in its beginning is extremely important, especially for classified information and financial data. Intelligent Systems in Auditing. Intelligent Systems in Auditing. Intelligent systems are used to enhance the task of IS auditing.

IT Security in the 21 st Century (cont.) Artificial Intelligence in Biometrics. Artificial Intelligence in Biometrics. Expert systems, neural computing, voice recognition, and fuzzy logic can be used to enhance the capabilities of several biometric systems. Expert Systems for Diagnosis, Prognosis, and Disaster Planning. Expert systems can be used to diagnose troubles in computer systems and to suggest solutions. Expert Systems for Diagnosis, Prognosis, and Disaster Planning. Expert systems can be used to diagnose troubles in computer systems and to suggest solutions. Smart Cards. Smart card technology can be used to protect PCs on LANs. Smart Cards. Smart card technology can be used to protect PCs on LANs. Fighting Hackers. Several new products are available for fighting hackers. Fighting Hackers. Several new products are available for fighting hackers.

National Security Loss of individual privacy Loss of individual privacy Wiretaps Wiretaps Library Example Library Example Right’s at Work Right’s at Work

Merry Christmas!! See you January 6 th, 2003