Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-1 Introduction to Information Technology.

Similar presentations


Presentation on theme: "Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-1 Introduction to Information Technology."— Presentation transcript:

1 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-1 Introduction to Information Technology 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. Implementing IT: Ethics, Impacts, and Security (continue …) Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa

2 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-2 IT and Society  Some will say that IT has improved our quality of life  Improvements for people with disabilities  Improvements in health care system  Improved consumer information  Robots performing in dangerous situations  Improvements in crime fighting  Concern about deepening divide between those with and without IT access  Internet communities provide social contact for people with common interests  Telecommuting adds flexibility for workers and organizations

3 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-3 Security Concerns  Information systems are subject to many threats  Unintentional threats Human error – in design or use of system Environmental hazards – acts of God and other Computer system failures – faulty products  Intentional threats Systems are subject to a wide variety of hazards from criminal attacks

4 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-4 Computer Crimes  Computers may be the target of criminal activity or the means by which criminal activity is carried out  Methods of attack:  Data tampering is most common attack on computer systems  Deliberate programming fraud also common Viruses are a highly visible form of programming attack Denial of service attacks target e-commerce web sites

5 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-5 Protecting IT  Individuals and organizations must actively establish protection mechanisms  Prevent and deter damage  Detect threats before damage is widespread  Limit loss from threat  Plan for recovery in event of attack  Correct system to prevent recurrence

6 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-6 Protecting IT (continued)  General protection strategies:  Physical security of facilities and resources  Control access to system  Protect data from unauthorized access  Application control strategies:  Ensure quality of inputs  Verify quality of processing  Ensure quality and accessibility of outputs

7 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-7 Protecting IT (continued)  Network control strategies:  Control access to network resources  Protect data on network with encryption  Monitor and detect intruders  Protect with firewalls  Verifying quality through audits  Regular evaluation of records and procedures  May be performed by internal and external auditors

8 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-8 Protecting IT (continued)  Disaster Prevention and Recovery Plans  Organizations need to think through how various disasters will be handled  Key people should know exactly what to do in the event of a disaster  Disaster plans should be tested through practice drills  Critical component is back-up procedures  Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)

9 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-9 Chapter Summary  Information systems pose a number of ethical challenges for businesses and individuals  Information systems have changed organizations, jobs, individual workers, and society  Information systems are vulnerable to a number of hazards  Individuals and organizations must take steps to protect their systems from threats

10 Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-10 Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.


Download ppt "Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 15-1 Introduction to Information Technology."

Similar presentations


Ads by Google