Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fundamentals & Ethics of Information Systems IS 201

Similar presentations


Presentation on theme: "Fundamentals & Ethics of Information Systems IS 201"— Presentation transcript:

1 Fundamentals & Ethics of Information Systems IS 201
Chapter 7 The Personal and Social Impact of Computers Chapter7 – The Personal and Social Impact of Computers Slide 1

2 Learning Objectives Identify policies and procedures useful in eliminating waste and mistakes Explain the types and effects of computer crime and how to prevent it Identify specific actions to take to ensure the health and safety of employees Outline criteria for the ethical use of information systems Chapter7 – The Personal and Social Impact of Computers Slide 2

3 Chapter Overview Why Learn About Ethical Issues in ISs?
Computer Waste and Mistakes Preventing Computer-Related Waste and Mistakes Computer Crime The Computer as the Object of Crime Preventing Computer-Related Crime The Work Environment: Health Concerns Ethical Issues in Information Systems Conclusion Chapter7 – The Personal and Social Impact of Computers Slide 3

4 1. Why Learn About The Personal and Social Impact of Computers
Computers are used by almost all people Computers and networks have an impact on individuals, families, groups and society Human Resource employees need to: Prevent computer waste and mistakes Avoid privacy violations Comply with laws about: Collecting customer data Monitoring employees Employees, IS users, and Internet users need to: Avoid crime, fraud, privacy invasion Chapter7 – The Personal and Social Impact of Computers Slide 4

5 2. Computer Waste and Mistakes
Inappropriate use of computer technology and resources Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful Chapter7 – The Personal and Social Impact of Computers Slide 5

6 Computer Waste Cause: improper management of information systems and resources Discarding old software and even complete computer systems when they still have value Building and maintaining complex systems that are never used to their fullest extent Using corporate time and technology for personal use Spam Chapter7 – The Personal and Social Impact of Computers Slide 6

7 Computer-Related Mistakes
Causes Failure by users to follow proper procedures Unclear expectations and a lack of feedback Program development that contains errors Incorrect data entry by data-entry clerk Chapter7 – The Personal and Social Impact of Computers Slide 7

8 3. Preventing Computer-Related Waste and Mistakes
Preventing waste and mistakes involves: Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures Chapter7 – The Personal and Social Impact of Computers Slide 8

9 Establishing Policies and Procedures
Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices Training programs for individuals and workgroups Manuals and documents on how computer systems are to be maintained and used Approval of certain systems and applications to ensure compatibility and cost-effectiveness Chapter7 – The Personal and Social Impact of Computers Slide 9

10 Implementing Policies and Procedures
Policies often focus on: Implementation of source data automation and the use of data editing to ensure data accuracy and completeness Assignment of clear responsibility for data accuracy within each information system Training is often the key to acceptance and implementation of policies and procedures Chapter7 – The Personal and Social Impact of Computers Slide 10

11 Reviewing Policies and Procedures
During review, people should ask the following questions: Do current policies cover existing practices adequately? Were any problems or opportunities uncovered during monitoring? Does the organization plan any new activities in the future? If so, does it need new policies or procedures on who will handle them and what must be done? Are contingencies and disasters covered? Chapter7 – The Personal and Social Impact of Computers Slide 11

12 4. Computer Crime Often defies detection
Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents is increasing dramatically Computer crime is now global Chapter7 – The Personal and Social Impact of Computers Slide 12

13 The Computer as a Tool to Commit Crime
Criminals need two capabilities to commit most computer crimes Knowing how to gain access to the computer system Knowing how to manipulate the system to produce the desired result Examples Password theft (Social engineering) Go through the garbage (Dumpster diving) Counterfeit and banking fraud using sophisticated desktop publishing programs and high-quality printers Chapter7 – The Personal and Social Impact of Computers Slide 13

14 5. The Computer as the Object of Crime
Crimes fall into several categories such as: Illegal access and use Information and equipment theft Software and Internet piracy Computer-related scams International computer crime Chapter7 – The Personal and Social Impact of Computers Slide 14

15 5.1. Avoiding Viruses and Worms
Tips for avoiding viruses and worms Install antivirus software on your computer and configure it to scan all downloads, , and disks Update your antivirus software regularly Back up your files regularly Do not open any files attached to an from an unknown, suspicious, or untrustworthy source Chapter7 – The Personal and Social Impact of Computers Slide 15

16 5.1. Avoiding Viruses and Worms (Continued)
Tips for avoiding viruses and worms (continued): Do not open any files attached to an unless you know what it is, even if it appears to come from a friend or someone you know Exercise caution when downloading files from the Internet Ensure that the source is legitimate and reputable Chapter7 – The Personal and Social Impact of Computers Slide 16

17 5.2. Using Antivirus Programs
Antivirus program: software that runs in the background to protect your computer from dangers lurking on the Internet and other possible sources of infected files Tips on using antivirus software Run and update antivirus software often Scan all diskettes and CDs before using them Install software only from a sealed package or secure, well-known Web site Follow careful downloading practices If you detect a virus, take immediate action Chapter7 – The Personal and Social Impact of Computers Slide 17

18 Using Antivirus Programs (continued)
Antivirus Software Chapter7 – The Personal and Social Impact of Computers Slide 18

19 5.3. Information and Equipment Theft
Obtaining identification numbers and passwords to steal information or disrupt systems Software theft Computer systems and equipment theft Data on equipment is valuable Chapter7 – The Personal and Social Impact of Computers Slide 19

20 5.4. Software and Internet Software Piracy
Software piracy: act of illegally duplicating software Internet software piracy: illegally downloading software from the Internet Most rapidly expanding type of software piracy Most difficult form to combat Examples: pirate Web sites, auction sites that offer counterfeit software, peer-to-peer networks Penalties can be severe Chapter7 – The Personal and Social Impact of Computers Slide 20

21 5.5. Computer-Related Scams
Examples of Internet scams Get-rich-quick schemes involving bogus real estate deals “Free” vacations with huge hidden costs Bank fraud Fake telephone lotteries Chapter7 – The Personal and Social Impact of Computers Slide 21

22 5.6. International Computer Crime
Computer crime is an international issue Software industry loses about $540 billion in revenue annually to software piracy Terrorists, international drug dealers, and other criminals might use information systems to launder illegally obtained funds Chapter7 – The Personal and Social Impact of Computers Slide 22

23 6. Preventing Computer-Related Crime
Many countries have passed computer crime legislation Some believe that these laws are not effective because: Companies do not always actively detect and pursue computer crime Security is inadequate Convicted criminals are not severely punished Individual and group efforts are being made to limit computer crime, and recent efforts have met with some success Chapter7 – The Personal and Social Impact of Computers Slide 23

24 6.1. Crime Prevention by Corporations
Public key infrastructure (PKI): enables users of an unsecured public network such as the Internet to securely and privately exchange data Uses a public and a private cryptographic key pair that is obtained and shared through a trusted authority Biometrics: measurement of one of a person’s traits, whether physical or behavioral Chapter7 – The Personal and Social Impact of Computers Slide 24

25 Crime Prevention by Corporations (continued)
Common Methods Used to Commit Computer Crimes Chapter7 – The Personal and Social Impact of Computers Slide 25

26 Crime Prevention by Corporations (continued)
Common Methods Used to Commit Computer Crimes (continued) Chapter7 – The Personal and Social Impact of Computers Slide 26

27 Crime Prevention by Corporations (continued)
Companies are joining together to fight crime Software and Information Industry Alliance (SIIA): original antipiracy organization Microsoft financed the formation of a second antipiracy organization, the Business Software Alliance (BSA) Other software companies, including Apple, Adobe, Hewlett-Packard, and IBM, now contribute to the BSA Chapter7 – The Personal and Social Impact of Computers Slide 27

28 6.2. Using Intrusion Detection Software
Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion Suspicious activities: failed login attempts, attempts to download program to server, accessing a system at unusual hours Can provide false alarms or voice message alerts may be missed Chapter7 – The Personal and Social Impact of Computers Slide 28

29 6.3. Internet Laws for Libel and Protection of Decency
Filtering software helps screen Internet content Also prevents children from sending personal information over or through chat groups Internet Content Rating Association (ICRA) Rates Web sites based on authors’ responses from questionnaire Children’s Internet Protection Act (CIPA), 2000 Required filters in federally funded libraries Libel is an important legal issue on the Internet Publishing Internet content to the world can subject companies to different countries’ laws Chapter7 – The Personal and Social Impact of Computers Slide 29

30 6.4. Preventing Crime on the Internet
Develop effective Internet usage and security policies for all employees Use a stand-alone firewall (hardware and software) with network monitoring capabilities Deploy intrusion detection systems, monitor them, and follow up on their alarms Chapter7 – The Personal and Social Impact of Computers Slide 30

31 Preventing Crime on the Internet (continued)
Monitor managers and employees to make sure that they are using the Internet for business purposes Use Internet security specialists to perform audits of all Internet and network activities Chapter7 – The Personal and Social Impact of Computers Slide 31

32 7. The Work Environment: Health Concerns
Working with computers can cause occupational stress Training and counseling helps the employee and deter problems and stress Computer use can affect physical health as well Concerns about emissions from improperly maintained and used equipment, display screens, and cell phones Chapter7 – The Personal and Social Impact of Computers Slide 32

33 Avoiding Health and Environmental Problems
Many computer-related health problems are caused by a poorly designed work environment Ergonomics: science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them Chapter7 – The Personal and Social Impact of Computers Slide 33

34 8. Ethical Issues in Information Systems
Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behavior Chapter7 – The Personal and Social Impact of Computers Slide 34

35 ACM code of ethics and professional conduct
Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patents Give proper credit for intellectual property Respect the privacy of others Honor confidentiality Chapter7 – The Personal and Social Impact of Computers Slide 35

36 9. Summary ACM code of ethics Preventing computer-related waste
Computer crime, categories of crimes, cyberterrorism Preventing crimes on the Internet The work environment and health problems ACM code of ethics Chapter7 – The Personal and Social Impact of Computers Slide 36


Download ppt "Fundamentals & Ethics of Information Systems IS 201"

Similar presentations


Ads by Google