Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.

Slides:



Advertisements
Similar presentations
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security Issues and Ethics in Education
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Protecting People and Information: Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
BUSINESS B1 Information Security.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
CONTROLLING INFORMATION SYSTEMS
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
UNIT V Security Management of Information Technology.
Add video notes to lecture
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 13 Security and Ethical Challenges.
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Issues Information Systems and Management

Issues Privacy Ethics Health Computer Crime Security

Privacy  The right to be left alone when you want to be, to have control over your personal possessions and not to be observed without your consent  The power of IT to store and retrieve information can have a negative affect on the “right of privacy” of every individual Monitor Collect data from website visits

Privacy and the Internet There are few rules about what is private and what you can store Censorship: Freedom of Information/Speech/The Press Spamming: mass unsolicited Flaming: critical, derogatory, vulgar

Privacy and Employees Monitoring technology scans both incoming and outgoing Eastman Kodak has a monitoring policy Computer matching –Mistaken identity –Stolen identity Terrorists use UNSENT as a virtual drop box

Privacy and Consumers Consumers want businesses to know who they are, provide them with what they want, and tell them about their products – BUT leave them alone. Cookies Spyware

Privacy and Government Canadians have the right to see all data held by the Federal Government about them –There is a database on who has made a request –Soviet Union 1974

Privacy and International Trade Which countries’ laws apply? –Buy –Ship –Destination

Ethics  The principles and standards that guide our behaviours toward other people. Technology has created many new ethical dilemmas Intellectual property: intangible Copyright: songs Fair use Doctrine: can legally use copyright material for education Pirated Software: unauthorized duplication or sale of copyright software Counterfeit Software: software manufactured to look real.

Developing Information Management Policies Ethical Computer Use Information Privacy Acceptable Use Privacy Internet Use Anti-Spam

Health Issues Repetitive Stress Injury (RSI) Carpal Tunnel Syndrome (CTS) Computer Vision Syndrome (CVS) Techno-stress Response: Ergonomics »Human factors engineering

You and Ethical Responsibility As a managerial end user, you have a responsibility to do something about some of the abuses of information and technology in the workplace. As IS Professionals there should be a code of ethics to follow –One that is generally accepted like other professions

Computer Crime The commission of illegal acts through the use of a computer or against a computer system

Computer Crime Money theft Service theft Software theft Data alteration or theft Computer Viruses Malicious Access – Hacking Crimes against the computer SWP Internal Audit Seminar,

Outside the Organization Viruses: destructive software written with the intent to cause annoyance or damage Benign Viruses Malignant Viruses Macro Viruses Worm Denial-of-service (single or distributed) Combinations Hoaxes Stand-alone Viruses Trojan Horse Viruses

The Players Hackers White-hat hackers Black-hat hackers Crackers Social Engineering Hactivists Cyber-terrorists Script Kiddies

Inside the Company Be careful who you hire and how you investigate potential problems

Computer Forensics The gathering, authentication, examination, and analysis of electronic information stored on any type of computer media, such as hard drives, floppy disks, or CD’s.

Recovery and Interpretation Places to look for stray information –Deleted files and slack space –Unused space Ways of hiding information –Rename the file –Make the information invisible –Use Windows to hide files –Protect the file with a password –Encrypt the file –Use Steganography –Compress the file

Information Security The protection of information from accidental or intentional misuse by persons inside or outside an organization The First Line of Defence –People –Develop and enforce policies –Ontario Hydro – “Can I help you?”

Social Engineering Using one’s social skills to trick people into revealing access credentials or other information valuable to the attackers.

The Second Line of Defence - Technology Authentication –Confirm user’s identity ID and password Smart card Fingerprint or voice signature Prevention and Resistance Firewalls Encryption Content filters Detection and Response Anti-virus software

Risk Management Identify Threats Assess Consequences Select Countermeasures Prepare contingency plans Monitor and review

Effective Controls Provide Quality Assurance Keep the information system free from errors and fraud Data Accuracy System Integrity Scan on data integrity within a database

Information System Controls 1.Input Controls 2.Processing Controls 3.Output Controls 4.Storage Controls

Information Systems Controls Input Controls –Control totals: record count, batch total, hash total –Ensure a valid transaction Processing Controls –Hardware controls: special checks built into the hardware to verify the accuracy of computer processing Parity Re-calculation –Software controls: check internal file labels, check points, audit trails; edits in application programs

Information Systems Controls Output Controls –Ensure that information products are correct and complete and are transmitted to authorized users in a timely manner Storage Controls –Program and database library –File back-up and retention

Facility Controls 1.Network Security 2.Physical Protection Controls 3.Biometric Controls 4.Computer Failure Controls

Facility Controls Network Security –Monitor the use of networks –Protect networks from unauthorized use –Give authorized users access through ID and passwords –Encryption Physical Protection –Security doors –ID badges –Alarms –Closed-circuit TV

Facility Controls Biometric Controls –Measure unique physical traits of individuals Signature, retinal scanning Computer Failure Controls –Fault tolerant: multiple CPU, peripherals and system software –Fail Safe: capability to operate at the same level –Fail Soft: capability to operate at a reduced but acceptable level

Procedural Controls Methods that specify how the information services organization should be operated for maximum security to facilitate the accuracy and integrity of computer operation and system development activities.

Procedural Controls Separation of Duties Standard Operating Procedures Authorization Requirements Disaster Recovery Auditing Information Systems

Procedural Controls Disaster Recovery (Business Continuity Planning) –Specifies duties of employees, what hardware, software, and facilities will be used, and the priority of applications that will be processed.

Procedural Controls Auditing Information Systems –Auditing around the computer: verify accuracy of output given specific input –Auditing through the computer: detailed verification of the logic of computer programs –Audit trail The presence of documentation that allows a transaction to be traced through all the stages of its information processing RCMP Auditor

Issues Information Systems and Management