Download presentation
Presentation is loading. Please wait.
Published byLaura Bell Modified over 10 years ago
1
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the Digital World, Leonard Jessup and Joseph Valacich, Pearson Prentice Hall, 2007
2
Worldwide losses due to software piracy in 2008 exceeded $50 billion. Business Software Alliance, 2009 Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006
3
2010: $58.8 billion – almost double the amount in 2003. Emerging economies account for almost half US is the leader at $9.52 billion http://www.businessweek.com/news/2011-05-12/software-piracy-losses-jump-to-59-billion-in-2010-report-says.html 3
4
4
6
Learning Objectives Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility. Define computer crime and list several types of computer crime. Describe and explain the differences between cyberwar and cyberterrorism.
7
Computer Ethics What are “Computer Ethics”? Issues and standards of conduct as they pertain to the use of information systems.
8
Information Privacy What information should you have to reveal? What information you might want to keep private? What is identity theft?
9
Information Privacy
10
Companies seem to know about our every move – how much information do we need to reveal? Amazon.com is famous for personalization What are the costs?
11
How to Maintain Your Privacy Online Review the privacy policy of the company with which you are transacting The policy should indicate: What information is being gathered about you How the seller will use this information Whether and how you can “opt out” of these practices Additional tips: Choose Web sites monitored by independent organizations Avoid having cookies left on your machine Visit sites anonymously Use caution when requesting confirmation email
12
Avoid Getting Conned in Cyberspace
13
Top 10 List of Things Not to Do
14
Information Accuracy Who is responsible for ensuring of the authenticity and fidelity of information?
15
Information Property Who owns information about individuals? How can this information be sold and exchanged?
16
Data Privacy Statements If a company maintaining the database with customer information legally owns it Is free to sell it? Must it ensure proper data handling practices?
17
Spam, Cookies and Spyware What is “Spam”? Unsolicited email What are “Cookies”? Text files storing web activities What is “Spyware”? Software used for data collection without our knowledge
18
Combating Spyware Windows defender Spyware monitoring and removal Others Include: Ad-aware Spybot Search & Destroy
19
Cybersquatting What is “Cybersquatting”? What protection do organizations have against cybersquatting?
20
Information Accessibility Who has the right to monitor the information?
21
What was “Carnivore”?
22
Legal Support for Electronic Communication Privacy What laws protect electronic communications privacy? Provides little support Geared toward protecting voice privacy No other laws for email Some states define their own rules for companies.
23
Need for a Code of Ethical Conduct Many businesses have guidelines for appropriate use Universities endorse guidelines proposed by EduCom Responsible computer use (based on work of the Computer Ethics Institute) prohibits: 1. Using a computer to harm others 2. Interfering with other people’s computer work 3. Snooping in other people’s files
24
Need for a Code of Ethical Conduct Responsible computer use prohibits (continued): 4. Using a computer to steal 5. Copying or using proprietary software without paying for it 6. Using other people’s computer resources without authorization 7. Appropriating other people’s intellectual output
25
No Place to Hide Video What are the major technologies discussed in the video? Who uses the technologies for what purpose? What are the ethical issues (privacy, accuracy, property, and accessibility)? Do you feel that the technology applications are appropriate?
26
Learning Objectives Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility. Define computer crime and list several types of computer crime. Describe and explain the differences between cyberwar and cyberterrorism.
27
Computer Crime What defines a “Computer Crime”?
28
28 Types of Computer Crimes and Financial Losses What do you think happens to a company’s stock price if they report that their systems have been compromised? Would you report it if you didn’t have to?
29
29 Financial Impact of Virus Attacks
30
Unauthorized Computer Access What do we mean by “Unauthorized Computer Access”? Examples? How much goes unreported?
31
31 Unauthorized computer access Why has unauthorized access been on a decline?
32
Federal and State Laws Two main federal laws against computer crime Computer Fraud and Abuse Act of 1986 1996 Amendment Electronic Communications Privacy Act of 1986 USA PATRIOT Act of 2002
33
What is “Computer Forensics”?
34
Hacking and Cracking What is the difference between a “Hacker”, a “Cracker” and a “Hacktivist”?
35
Who Commits Computer Crimes? Can you paint a picture of the typical computer criminal? Four groups of computer criminals 1. Current or former employees 85-95% of theft from business comes from the inside How much time/money do we focus on keeping outsiders out of our systems? 2. People with technical knowledge committing crimes for personal gain 3. Career criminals using computers to assist them in crimes 4. Outside crackers hoping to find information of value
36
Types of Computer Crimes
37
37 Types of Computer Crimes
38
Software Piracy Legal activities Illegal activities Applicable copyright laws
39
Computer Viruses and Other Destructive Code Malware (malicious software) 1,400 new pieces released in one month Viruses Reproduce themselves Usually delete or destroy files Boot sector viruses File infector viruses Viruses can spread through e-mail attachments
40
Computer Viruses
41
41 How a Computer Virus is Spread
42
Worms, Trojan Horses and Other Sinister Programs Worm Trojan horse Logic bombs and time bombs
43
Learning Objectives Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility. Define computer crime and list several types of computer crime. Describe and explain the differences between cyberwar and cyberterrorism.
44
Cyberterrorism
45
Cyberwar Military’s attempt to disrupt or destroy other country’s information and communication systems
46
Cyberterrorism Governments not involved Can be launched from anywhere in the world Goal is to cause fear, panic and destruction Cyberterrorism will likely become weapon of choice
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.