Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Ch.5 It Security, Crime, Compliance, and Continuity
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
Consumer Decision Making and Beyond CHAPTER FIFTEEN.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 0.
Analyzing International Opportunities 12 Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Part 1 Conditionals and Loops.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Chapter 9: Knowledge Management and E-Learning Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
6-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 6 Organizing the Business.
5-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 5 Business Management.
11-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 11 Marketing Processes and Consumer Behavior.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
Chapter Three The Political and Legal Environments Facing Business International Business Part Two Comparative Environmental Frameworks.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall. Section 1.3 Complex Numbers Quadratic Equations in the Complex Number System.
Globalization and International Business. Factors in Increased Globalization Increase in and expansion of technology Liberalization of cross-border trade.
Chapter 1 Achieving Success Through Effective Business Communication Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall 1Chapter 1 -
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall. Section 5.1 Polynomial Functions and Models.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Copyright ©2012 Pearson Education, Inc. publishing as Prentice Hall Chapter 14 Respecting Employee Rights 14-1.
The Inverse Trigonometric Functions (Continued)
Chapter 10: Ethics, Privacy, and Security
Sinusoidal Curve Fitting
Introduction to Information Systems
Section 9.1 Polar Coordinates
Section R.8 nth Roots; Rational Exponents
Building Exponential, Logarithmic, and Logistic Models from Data
The Inverse Sine, Cosine, and Tangent Functions
E-Commerce: Regulatory, Ethical, and Social Environments
Section 2.4 Circles Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Equations Quadratic in Form Absolute Value Equations
Section 8.3 The Law of Cosines
Section 11.8 Linear Programming
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Mathematical Models: Building Functions
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Networking for Home and Small Businesses – Chapter 8
Partial Fraction Decomposition
Sinusoidal Curve Fitting
Systems of Linear Equations: Matrices
Quadratic Equations in the Complex Number System
Partial Fraction Decomposition
Properties of Rational Functions
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Information Technology
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
The Inverse Trigonometric Functions (Continued)
The Inverse Sine, Cosine, and Tangent Functions
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Information ethics Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Intellectual property and plagiarism Intellectual property rights Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Privacy (1:2) Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Identifying threats Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Assessing vulnerability Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Administrative security controls Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Information security and cloud computing Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Human element (1:2) Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Ethical decision making Sales rep Sixth grader University employee Co-worker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Criteo case Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Spamhaus Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter