Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14 Although information technology has become so valuable most of.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Policies and procedures must be established to avoid computer waste and mistakes
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Chapter 11 Security and Privacy: Computers and the Internet.
BUS 311: Fall Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Computer Waste and Security Privacy Computer Health.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
in Information Systems and the Internet
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Security, Privacy, and Ethics
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
history, hardware, software, safety, and computer ethics
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
CONTROLLING INFORMATION SYSTEMS
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
Fundamentals & Ethics of Information Systems IS 201
Add video notes to lecture
Fundamentals of Information Systems
Chapter 13 Security and Ethical Challenges.
Computers: Tools for an Information Age
Policies and procedures must be established to avoid computer waste and mistakes
Presentation transcript:

Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet

Chapter 14IS for Management2 Social Issues in Information Systems 4 Access/collection/distribution of information 4 Privacy 4 Computer waste & mistakes 4 Health concerns 4 Computer crime 4 Ethical issues

Chapter 14IS for Management3 Computer Waste Mismanagement of IS & resources  Computer games on company time  Unimportant &/or personal (spam)  Internet overuse/surfing  Other non-work related activities

Chapter 14IS for Management4 Computer-Related Mistakes 4 Data-entry or capture errors 4 Errors in computer programs 4 Errors in handling files 4 Mishandling of computer output 4 Inadequate planning for & control of equipment malfunctions 4 Inadequate planning for & control of environmental difficulties

Chapter 14IS for Management5 Preventing Computer-Related Waste & Mistakes 4 All changes tightly controlled 4 User manuals available to cover operations 4 Reports indicate general content & time period/date 4 Controls to prevent invalid/unreasonable data entry 4 Controls to ensure data input is valid, applicable, & posted in the right time period 4 Proper procedures to ensure correct input data

Chapter 14IS for Management6 Computer Crime 4 The computer the tool to commit crime: gaining access to information 4 The computer as the object of crime –Illegal access & use –Data alteration & destruction –Information & equipment theft –Software & Internet piracy –Computer scams –International computer crime

Chapter 14IS for Management7 Computer Criminals Hacker: A person who enjoys computer technology & spends time learning & using computer systems Criminal Hacker (Cracker): A computer-savvy person who attempts to gain unauthorized or illegal access to computer systems

Chapter 14IS for Management8 Computer Crimes 4 Data Alteration 4 Virus –System Virus –Application Virus –Macro 4 Worm 4 Logic bomb 4 Password sniffer 4 Antivirus innoculation

Chapter 14IS for Management9 Piracy 4 Software: The act of illegally duplicating software 4 Internet: The act of illegally gaining access to & using the Internet

Chapter 14IS for Management10 4 Provincial & federal agencies 4 Corporations Biometrics: The measurement of a living trait, physical or behavioral, for the purpose of protecting important data & information systems (fingerprints, eyeprints, etc.) Computer Crime Prevention

Chapter 14IS for Management11 Preventing Viruses 4 Antivirus Programs –Program(s) that prevents viruses or helps to recover from them if they infect a computer –Only useful if kept up to date

Chapter 14IS for Management12 Preventing Internet Crime 4 Support legislation to provide severe penalties for those who commit Internet crime 4 Develop effective Internet security policies 4 Use a stand-alone firewall (hardware & software) with network monitoring capabilities 4 Monitor managers & employees to ensure they only use the Internet for business 4 Hire Internet security specialists to perform audits of all Internet and network activities

Chapter 14IS for Management13 Privacy 4 Privacy & the Feds 4 Privacy at work 4 privacy 4 Privacy & the Internet

Chapter 14IS for Management14 Health Work 4 Ergonomics: The study of designing & positioning equipment/furniture to reduce health problems 4 Repetitive Motion Disorder: Condition caused by working with keyboards & other equipment 4 Repetitive Stress Injury (RSI): Conditions such as tendinitis or tennis elbow, characterized by inability to hold objects & sharp pain in the fingers 4 Carpal Tunnel Syndrome (CTS): Condition resulting from aggravation of pathway (tunnel) for nerves that go through the wrist

Chapter 14IS for Management15 Ethical Issues in IS: The PAPA Model Mason (1986) proposed that all ethical issues involving information fall into four categories: Property Accuracy Privacy Access

Chapter 14IS for Management16 Property Whose property is the data anyway? Who owns the data? Who owns the programs/applications? Who controls what is done with the data/programs? Who holds the copyright? Has this been pirated?

Chapter 14IS for Management17 Accuracy How accurate does it have to be? Does the level of accuracy affect everyone equally? Who is responsible/liable for accuracy?

Chapter 14IS for Management18 Privacy Do others know things about us that we wish they didn’t? Who says how information about us is distributed/ sold for purposes other than those for which we gave out this information? Can information/data about us be combined in ways that might not reflect reality?

Chapter 14IS for Management19 Access 4 Security & Control –Who has access? –Are people treated equally who need access? –How is access authorization authorized/communicated? –What penalties are there for illegal/unethical access? 4 Equality –Do some groups of people have more access than others? –Why? –Should something be done to equalize access?

Chapter 14IS for Management20 Brabston’s Extension to the PAPA Model Equity How is automation handled in terms of replacing people with machines? How are people “laid off”, reskilled, relocated when automation puts them out of a job? What can companies do to ethically lay people off? Are these situations & solutions handled equitably?

Chapter 14IS for Management21 Ethical Issues in Information Systems Organizations That Promote Ethical Issues –The Association of Information Technology Professionals (AITP) (formerly DPMA) –The Association of Computing Machinery (ACM) –The Institute of Electrical & Electronics Engineers (IEEE) –Computer Professionals for Social Responsibility (CPSR) –Canadian Information Processing Society (CIPS)

Chapter 14IS for Management22 Case AOL security, page 662