Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.

Slides:



Advertisements
Similar presentations
Protection of Information Assets I. Joko Dewanto 1.
Advertisements

Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Module 2.2 Security, legal and ethical issues Theme: Finding solutions.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Ethics in Information Technology, Second Edition
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Securing Information Systems
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Computer Programming I
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
LESSON 2: Internet, Computer Ethics and Security
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Scott Charney Cybercrime and Risk Management PwC.
Chap1: Is there a Security Problem in Computing?.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Securing Information Systems
Privacy and the Law.
Add video notes to lecture
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
CMIT100 Chapter 15 - Information.
Introduction to Computer Forensics
Fundamentals of Information Systems
Securing Information Systems
Cyber Security in New Jersey State Government
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
INFORMATION SYSTEMS SECURITY and CONTROL
Networking for Home and Small Businesses – Chapter 8
Computer and Internet Crime Privacy
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach

What is Ethics? Definition The importance of Integrity Ethics in the business world

Ethics for IT processionals and IT users IT professionals –Professional Codes of Ethics –Professional Organizations –Certification –Government Licensing IT users –Common Ethical Issues for IT Users –Supporting the Ethical Practice of IT Users

Computer and Internet Crime IT security incidents: A worsening problem –Increasing complexity increases Vulnerability –Higher computer user expectations –Expanding and changing systems introduce new risks –Increasing reliance on commercial software with know vulnerabilities

Reducing Vulnerabilities Risk assessment Establishing a security policy Educating employees, contractors and Part-time workers Prevention Detection Response

Privacy Protection and the Law The right of privacy Recent history of privacy protection

Key Privacy and Anonymity Issues Governmental electronic surveillance Data encryption Identity theft Consumer profiling Treating consumer data responsibly Workplace monitoring Spamming Advanced surveillance technology

Case Study 1 RFID Elicits Fears of “Big Brother” Technology

Case Study II UK Government Comes under Trojan Horse Attack

Case Study III Computer Associates Is Forced to Clean up Its Act