© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-1 Business and Society POST, LAWRENCE, WEBER Managing Technological.

Slides:



Advertisements
Similar presentations
1 Experian Data Breach Resolution 101 Confidential & Proprietary Experian Data Breach Solution.
Advertisements

Controlling. Copyright © 2005 Prentice Hall, Inc. All rights reserved. 18–2 L E A R N I N G O U T L I N E Follow this Learning Outline as you read and.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
© The McGraw-Hill Companies, Inc., 2008 McGraw-Hill/Irwin Merchandising Activities Chapter 6.
Transactions that Effect Assets, Liabilities, and Owner’s Equity Chapter 4.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 11-1 Business and Society POST, LAWRENCE, WEBER Managing Environmental.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Project Analysis and Evaluation Chapter Eleven.
Chapter 10 Privacy and Security McGraw-Hill
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Credit and Inventory Management Chapter Twenty-One.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Working with Financial Statements Chapter Three.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Financial Leverage and Capital Structure Policy Chapter Seventeen.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Raising Capital Chapter Sixteen.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Options and Corporate Finance Chapter Fourteen.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Introduction to Valuation: The Time Value of Money Chapter Five.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Net Present Value and Other Investment Criteria Chapter Nine.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Short-Term Finance and Planning Chapter Nineteen.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Discounted Cash Flow Valuation Chapter Six.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Determining the Target Cash Balance Chapter Twenty A.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Long-Term Financial Planning and Growth Chapter Four.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Interest Rates and Bond Valuation Chapter Seven.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Risk Management: An Introduction to Financial Engineering Chapter Twenty- Three.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Option Valuation Chapter Twenty- Four.
Managing Technological Challenges Businesses Protecting Privacy The Management of Information Security Internet Pornography Protecting Intellectual Property.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Return, Risk, and the Security Market Line Chapter Thirteen.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 8-1 Business and Society POST, LAWRENCE, WEBER Managing Business Government.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. Slide 1 The World as a Village The World As a Village © 2009 The McGraw-Hill Companies, Inc.
Chapter 12 Supply Law and Ethics McGraw-Hill/Irwin Purchasing and Supply Management, 13/e © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved.
 Cash Management Principles of Corporate Finance Brealey and Myers Sixth Edition Slides by Matthew Will Chapter 31 © The McGraw-Hill Companies, Inc.,
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
© Paradigm Publishing, Inc.1 Chapter 7 Accounting for a Merchandising Business: Purchases and Cash Payments.
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Reporting and Interpreting Sales Revenue, Receivables, and Cash Chapter 6.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 19-1 Business and Society POST, LAWRENCE, WEBER Business and the Media.
McGraw-Hill/Irwin Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. 6-1 Chapter Six: Merchandising Activities.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Chapter 15, Stephen P. Robbins, Mary Coulter, and Nancy Langton, Management, Ninth Canadian Edition Copyright © 2009 Pearson Education Canada Contemporary.
0 Glencoe Accounting Unit 4 Chapter 16 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 16 Special Journals: Sales and Cash.
CHAPTER NINETEEN THE ACCOUNTS RECEIVABLE LEDGER.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 5-1 Business and Society POST, LAWRENCE, WEBER Ethical Dilemmas in Business.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 6-1 Business and Society POST, LAWRENCE, WEBER Ethical Reasoning and Corporate.
Essentials Of Business Law Chapter 2 Ethics And The Law McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 1-1 Business and Society POST, LAWRENCE, WEBER The Corporation and Its.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publically accessible website, in whole or in part.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 8 Cash and Cash Controls.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 18-1 Business and Society POST, LAWRENCE, WEBER Managing a Diverse Workforce.
Finance and Performance Scrutiny Committee – 20 October 2011 Modernisation of Payments Lambpit Street Cash Office Closure.
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
Chapter 21 International Financial Management. McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc., All Rights Reserved. PPT 21-1 FIGURE euro.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Part Chapter © 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Information Technology in Business 1 Chapter 11.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. Example 1-Ad A.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Economic-Social Force
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
The Sales Journal Main Idea You Will Learn
HIPAA & PHI TRAINING & AWARENESS
© 2012 Elsevier, Inc. All rights reserved.
Chapter 6.
© 2012 Elsevier, Inc. All rights reserved.
Chapter 01.
Chapter 15.
Chapter 3.
Presentation transcript:

© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-1 Business and Society POST, LAWRENCE, WEBER Managing Technological Challenges Chapter 13

© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-2 Figure 13-1 Workers keeping in touch The daily number of messages sent and received daily by an average American office worker: Telephone 51Post-it messages13 37Telephone message slips 9 Voice mail 22Pager 8 Postal mail 19Cell phone 5 Interoffice mail 18Overnight couriers 3 Fax 14Express mail 2 Total = 201 Source: Adapted from Don Clark, “Managing the Mountain,” Wall Street Journal, June 21, 1999, p. R4

© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-3 Figure 13-2 Types of security breaches 44%Computer frauds involving theft of money 18%Illegal trespasses, theft of services 16%Damage to software 12%Alterations to data 10%Theft of information Source: Patrick Casabona and Songmei Yu, “Computer Fraud: Financial and Ethical Implications,” Review of Business, Fall 1998, pp

© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-4 Figure 13-3 Software piracy around the world Source: Data from Business Software Alliance, Annual loss of sales in U.S. dollars Billions of dollars

© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-5 Exhibit 13-A Amazon.com privacy notice Types of information Amazon.com gathers: Information given by customer Automatic information Updated delivery information from shippers Information about customers is shared only with the subsidiaries under control of Amazon.com and as described below: Affiliated businesses they do not control Agents Release of account and personal information when release is believed to be appropriate to comply with the law With customer’s consent Source:

© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 13-6 Exhibit 13-B Where religions stand on human cloning The religious groups most strenuously opposed to human cloning were Roman Catholics and the Southern Baptists. The Catholic church saw cloning as an affront to human dignity. The Southern Baptists condemned cloning on the grounds that it was an assault on the family. Islamic religion opposed cloning children from women, since Islam was concerned with the paternal lineage of the child. Protestant faiths and most Jews were moderately opposed to cloning, although cloning is condoned under certain circumstances. Hindus and Buddhists generally approve of cloning, since they believed in reincarnation. Source: Hanna Rosin, “Though Shalt Not Clone?” Pittsburgh Post Gazette, July 26, 2000, p. A3.