Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Information ethics Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Intellectual property and plagiarism Intellectual property rights Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Privacy (1:2) Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Identifying threats Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Assessing vulnerability Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Administrative security controls Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Information security and cloud computing Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Human element (1:2) Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Ethical decision making Sales rep Sixth grader University employee Co-worker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Criteo case Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Spamhaus Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter