Download presentation
Presentation is loading. Please wait.
Published byJoan Perkins Modified over 9 years ago
1
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility controls Network security, encryption, fire walls, physical, biometrics, failure controls Hackers: H2K convention –Procedural controls SOPs, authorization req’s, disaster recovery, people –Auditing Around, through; verifying accuracy of data & software Control logs
2
Ethics in IT: Overview Ethical foundations –Philosophies: egoism, natural law, utilitarianism, respect for people –Values: liberty, peace, human dignity, citizenship, charity –Models: behavioral stages, behavioral models Business ethics –Stockholder theory, social contract theory, stakeholder theory –Information ethics: issues: privacy, accuracy, property, accessibility –IT & employment: Luddites revisited –IT & individuality: dehumanization –IT & working conditions: more interesting/less interesting work, ergonomics
3
Ethics in IT: Privacy Issues Computer monitoring: keystroke recording, GPS Database conglomeration: Post office’s email idea Tracking users on the Internet Email privacy: does your company have a policy? Laws: –Electronic Communications Privacy Act (1986) –Computer Fraud & Abuse Act (1986) Censorship: spam, flaming, pornography, hate sites –www.walmartsucks.comwww.walmartsucks.com –Communications Decency Act (1996 - dead)
4
Ethics in IT: Crime Trespassing: hackers –Good hackers & bad hackers? Money theft Service theft Software theft –Digital Millenium Copyright Act Data theft Computer viruses
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.