Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 13 Security and Ethical Challenges.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
McGraw-Hill/Irwin ©2008,The McGraw-Hill Companies, All Rights Reserved Chapter 11 Security and Ethical Challenges.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
PRELIM TOPICS. IS operations management is concerned with the use of hardware, software, network, and personnel resources in data centers Operational.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Chapter 11 Security and Privacy: Computers and the Internet.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Unethical use of Computers and Networks
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Developing Business/IT Strategies Chapter 11.
Security and Ethical Challenges Chapter 11 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security and Ethical Challenges Ethical issues in the use of Information Technology Security Management Chapter 11 McGraw-Hill/Irwin Copyright © 2007 by.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Security and Ethical Challenges
Security and Ethical Challenges
SECURITY & ETHICAL CHALLENGES
Subject Name: MANAGEMENT INFORMATION SYSTEM Subject Code:10IS72
Security and Ethical Challenges
Security and Ethical Challenges
Security and Ethical Challenges
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
Communication Technology in a Changing World
Presentation transcript:

Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

13-2 Learning Objectives Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology.

13-3 Learning Objectives Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology.

13-4 Corporate Social Responsibility Theories Stockholder Theory –Managers are agents of the stockholders –Only responsible to increase profits without violating the law or fraud Social Contract Theory –Responsible to all of society Stakeholder Theory –Responsible to anyone affected by company

13-5 Principles of Technology Ethics Proportionality –Good must outweigh the harm or risk Informed Consent –Those affected should understand and accept risks Justice –Benefits and burdens distributed fairly Minimized Risk –Avoid all unnecessary risk

13-6 Hacking Obsessive use of computers Unauthorized access and use of networked computer systems Electronic Breaking and Entering –Accessing without stealing nor damaging Cracker (black hat or darkside hacker) –Maintains knowledge of vulnerabilities for private advantage Common Hacking Tactics –Figure 13.7

13-7 Cyber Theft Most involve theft of money “Inside jobs” Unauthorized activity Attacks through the Internet Most companies don’t report

13-8 Cyberterrorism Use IT to attack electronic infrastructure, exchange information or make threats Terror related –More political motivation than criminal Examples –Attempt to disrupt life support at Antarctic research station –Release of untreated sewage in Australia –Shut down of government network and banks in Estonia –Non-deliberate shut down of systems at nuclear reactor

13-9 Software Piracy Unauthorized copying of computer programs Licensing –Purchase – payment for fair use –Site license – allows a certain number of copies –Shareware – allows copies –Public Domain – not copyrighted Software industry losses –⅓ to ½ of revenues –Millions of copies in educational market –90% pirated software in China Sales negligible

13-10 Theft of Intellectual Property Intellectual Property –Copyrighted material –Music, videos, images, articles, books, software Copyright Infringement is Illegal –Easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music –Illegal downloading is declining

13-11 Adware and Spyware Adware –Useful software allows ads without consent Spyware –Type of Adware –Can steal private information –Add advertising links to Web pages –Redirect affiliate payments –Change a users home page and search settings –Make modem call premium-rate numbers –Leave security holes that let Trojans in –Degrade system performance Removal often not completely successful

13-12 Computer Libel and Censorship The opposite side of the privacy debate… –Freedom of information, speech, and press Biggest battlegrounds –Bulletin boards – boxes –Online files of Internet and public networks Weapons used in this battle –Spamming –Flame mail –Libel laws –Censorship

13-13 Health Issues Cumulative Trauma Disorders (CTDs) –Disorders caused by fast-paced repetitive keystroke jobs Carpal Tunnel Syndrome –Painful, crippling ailment of the hand and wrist –Typically requires surgery to cure Ergonomics –Designing healthy work environments

13-14 Societal Solutions Use IT to solve human and social problems –Medical diagnosis –Computer-assisted instruction (CAI) –Computer based training (CBT) –Governmental program planning –Environmental quality control –Law enforcement –Job placement Detrimental effects –Actions without ethical responsibility

13-15 Denial of Service Attacks Depend on three layers of networked computer systems –The victim’s website –The victim’s Internet service provider –Zombie or slave computers commandeered by cybercriminals Defense –At Zombie Machines Set and enforce security policies Scan for vulnerabilities –At the ISP Monitor and block traffic spikes –At the Victim’s Website Create backup servers and network connections