Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
1 Telstra in Confidence Managing Security for our Mobile Technology.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14 Although information technology has become so valuable most of.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Policies and procedures must be established to avoid computer waste and mistakes
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Management Information Systems
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Securing Information Systems
BUS 311: Fall Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
Computer Waste and Security Privacy Computer Health.
1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Computer Programming I
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Security, Privacy, and Ethics
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Principles of Information Systems, Ninth Edition Chapter 14 The Personal and Social Impact of Computers.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues & Ethics in Education By Maud Mushayamunda.
Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers.
Fundamentals & Ethics of Information Systems IS 201
Principles of Information Systems Eighth Edition
Add video notes to lecture
Fundamentals of Information Systems, Sixth Edition
Chapter 17 Risks, Security and Disaster Recovery
Fundamentals of Information Systems
Fundamentals of Information Systems Fourth Edition
Chapter 13 Security and Ethical Challenges.
Policies and procedures must be established to avoid computer waste and mistakes
Principles of Information Systems Eighth Edition
Principles of Information Systems Eighth Edition
Presentation transcript:

Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14

Principles of Information Systems, Sixth Edition Principles and Learning Objectives Policies and procedures must be established to avoid computer waste and mistakes. –Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions. –Identify policies and procedures useful in eliminating waste and mistakes.

Principles of Information Systems, Sixth Edition Principles and Learning Objectives Computer crime is a serious and rapidly growing area of concern requiring management attention. –Explain the types and effects of computer crime. –Identify specific measures to prevent computer crime. –Discuss the principles and limits of an individual’s right to privacy.

Principles of Information Systems, Sixth Edition Principles and Learning Objectives Jobs, equipment, and working conditions must be designed to avoid negative health effects. –List the important effects of computers on the work environment. –Identify specific actions that must be taken to ensure the health and safety of employees. –Outline criteria for the ethical use of information systems.

Principles of Information Systems, Sixth Edition Social Issues in Information Systems

Principles of Information Systems, Sixth Edition Computer Waste & Mistakes

Principles of Information Systems, Sixth Edition Computer Waste Discard technology Unused systems Personal use of corporate time and technology

Principles of Information Systems, Sixth Edition Preventing Computer Waste and Mistakes Establish Policies and Procedures Implement Policies and Procedures Monitor Policies and Procedures Review Policies and Procedures

Principles of Information Systems, Sixth Edition Preventing Computer-Related Waste and Mistakes

Principles of Information Systems, Sixth Edition Implementing Policies and Procedures

Principles of Information Systems, Sixth Edition Computer Crime

Principles of Information Systems, Sixth Edition Number of Incidents Reported to CERT

Principles of Information Systems, Sixth Edition Computer Crime and Security Survey

Principles of Information Systems, Sixth Edition The Computer as a Tool to Commit Crime Social engineering Dumpster diving Identity theft Cyberterrorism

Principles of Information Systems, Sixth Edition Computers as Objects of Crime Illegal access and use –Hackers vs. crackers –Script bunnies –Insiders

Principles of Information Systems, Sixth Edition Illegal Access and Use

Principles of Information Systems, Sixth Edition Data Alteration and Destruction Virus –Application virus –System virus –Macro virus Worm Logic bomb

Principles of Information Systems, Sixth Edition Data Alteration and Destruction

Principles of Information Systems, Sixth Edition Top Viruses – July 2002

Principles of Information Systems, Sixth Edition Top Viruses – July 2002

Principles of Information Systems, Sixth Edition Computers as Objects of Crime Information and equipment theft Software and Internet piracy Computer-related scams International computer crime

Principles of Information Systems, Sixth Edition Preventing Computer-Related Crime Crime prevention by state and federal agencies Crime prevention by corporations –Public Key Infrastructure (PKI) –Biometrics Antivirus programs

Principles of Information Systems, Sixth Edition Preventing Computer-Related Crime Intrusion Detection Software Managed Security Service Providers (MSSPs) Internet Laws for Libel and Protection of Decency

Principles of Information Systems, Sixth Edition Preventing Crime on the Internet Develop effective Internet and security policies Use a stand-alone firewall with network monitoring capabilities Monitor managers and employees Use Internet security specialists to perform audits

Principles of Information Systems, Sixth Edition Common Methods Used to Commit Computer Crimes

Principles of Information Systems, Sixth Edition How to Protect Your Corporate Data from Hackers

Principles of Information Systems, Sixth Edition Privacy

Principles of Information Systems, Sixth Edition Privacy Issues Privacy and the Federal Government Privacy at work privacy Privacy and the Internet

Principles of Information Systems, Sixth Edition Using Antivirus Programs

Principles of Information Systems, Sixth Edition Fairness and Information Use

Principles of Information Systems, Sixth Edition Federal Privacy Laws and Regulations The Privacy Act of 1979 Gramm-Leach-Bliley Act USA Patriot Act

Principles of Information Systems, Sixth Edition Other Federal Privacy Laws

Principles of Information Systems, Sixth Edition Other Federal Privacy Laws

Principles of Information Systems, Sixth Edition The Work Environment

Principles of Information Systems, Sixth Edition Health Concerns Repetitive stress injury (RSI) Carpal tunnel syndrome (CTS) Ergonomics

Principles of Information Systems, Sixth Edition Avoiding Health and Environment Problems Maintain good posture and positioning. Don’t ignore pain or discomfort. Use stretching and strengthening exercises. Find a good physician who is familiar with RSI and how to treat it.

Principles of Information Systems, Sixth Edition Medical Topics on the Internet

Principles of Information Systems, Sixth Edition Ethical Issues in Information Systems The AITP Code of Ethics –Obligation to management –Obligation to fellow AITP members –Obligation to society The ACM Code of Professional Conduct –Acquire and maintain professional competence

Principles of Information Systems, Sixth Edition AITP Code of Ethics

Principles of Information Systems, Sixth Edition Summary Computer waste - the inappropriate use of computer technology and resources in both the public and private sectors Software and Internet piracy - represent the most common computer crime Ethics - determine generally accepted and discouraged activities within a company