Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting People and Information MIS Chapter 8 Jack G. Zheng May 29 th 2008.

Similar presentations

Presentation on theme: "Protecting People and Information MIS Chapter 8 Jack G. Zheng May 29 th 2008."— Presentation transcript:

1 Protecting People and Information MIS Chapter 8 Jack G. Zheng May 29 th 2008

2 2 Intellectual Property Intellectual property 1 –refers to creations of the mind (inventions, literary and artistic works, and symbols, names, images, and designs) used in commerce Two categories 2 –Industrial property inventions (patents), trademarks, industrial designs, and geographic indications of source –Copyright literary and artistic works such as novels, poems and plays, films, musical works, drawings, paintings, photographs and sculptures, and architectural designs. 1, 2 Source: World Intellectual Property Organization,

3 3 Intellectual Property Fair use doctrine –may use copyrighted material in certain situations Pirated software –the unauthorized use, duplication, distribution or sale of copyrighted software Counterfeit software –software that is manufactured to look like the real thing and sold as such

4 4 IP and Open Source Which way (protection vs. open sharing) is best to advance software industry?

5 5 Privacy "… the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. –Dr. Alan Westin, Privacy and Freedom (book), 1967

6 6 Privacy and Web Customer database –Profiles –Behavior patterns (purchasing, searching and navigation) Clickstream Adware –Example: 180 search assistant180 search assistant –Trojan horse –Spyware Cookie –A small text file containing user information on the local computer

7 7 Privacy and usually are not protected and are left open for potential scanning –Gmail scans content of s and puts in related ads 1 July 1 st 2004, Court Limits Privacy Of Messages 2 –A company that provides service has the right to copy and read any message bound for its customers Spam –Unsolicited

8 8 Internet Fraud Identity theft –Forging of identity for the purpose of fraud Phishing (fishing) –Deceptively to get peoples information –Faked website to get user information –Advance Fee Fraud –Nigeria scamsNigeria scams –…

9 9 Privacy and Employees Workplace PC monitoring –Read the handout and discuss Legislation had been approved by the state Senate (California) in May 2004, employers would be required to give written notice explaining what types of electronic activities they monitor, from e- mail to the use of GPS locator devices in company cars and phones

10 Security

11 11 Security Threats In-house security –Employee misconduct Hacking –Unauthorized access to, or use of the computer, information and systems –Hacker Computer virus and worm –Virus is the software with malicious intent to cause damage –Worm is a self-propagating virus DoS (Denial-of-Service Attack) –floods a server with so many requests for service that it slows down or crashes

12 12 Security Management Myth –Security is about technology: software and hardware Truth –Security is also about policy: awareness, alertness and enforcement

13 13 Security Precautions (1) Authentication and authorization –Authentication is the process to identify a person (who) –Authorization is the process to identify privileges (what and how) Authentication methods –What you know: Password –What you have (loosely): ID cards, Certificate –What you have (tightly): Biometrics

14 14 Security Precautions (2) Encryption –Symmetric encryption –Asymmetric (public key) encryption –SSL (secure socket layer) Firewall –Software/hardware that can selectively block computer communications Anti-virus software Intrusion detection

15 15 Good Resources Ethics in computing – Napster on CNN Special – Privacy – Computer virus information –

Download ppt "Protecting People and Information MIS Chapter 8 Jack G. Zheng May 29 th 2008."

Similar presentations

Ads by Google