Presentation is loading. Please wait.

Presentation is loading. Please wait.

Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.

Similar presentations


Presentation on theme: "Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the."— Presentation transcript:

1 Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the Digital World, Leonard Jessup and Joseph Valacich, Pearson Prentice Hall, 2007

2 Worldwide losses due to software piracy in 2008 exceeded $50 billion. Business Software Alliance, 2009 Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006

3 2010: $58.8 billion – almost double the amount in 2003. Emerging economies account for almost half US is the leader at $9.52 billion http://www.businessweek.com/news/2011-05-12/software-piracy-losses-jump-to-59-billion-in-2010-report-says.html 3

4 4

5

6 Learning Objectives Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility. Define computer crime and list several types of computer crime. Describe and explain the differences between cyberwar and cyberterrorism.

7 Computer Ethics What are “Computer Ethics”? Issues and standards of conduct as they pertain to the use of information systems.

8 Information Privacy What information should you have to reveal? What information you might want to keep private? What is identity theft?

9 Information Privacy

10 Companies seem to know about our every move – how much information do we need to reveal? Amazon.com is famous for personalization What are the costs?

11 How to Maintain Your Privacy Online Review the privacy policy of the company with which you are transacting The policy should indicate: What information is being gathered about you How the seller will use this information Whether and how you can “opt out” of these practices Additional tips: Choose Web sites monitored by independent organizations Avoid having cookies left on your machine Visit sites anonymously Use caution when requesting confirmation email

12 Avoid Getting Conned in Cyberspace

13 Top 10 List of Things Not to Do

14 Information Accuracy Who is responsible for ensuring of the authenticity and fidelity of information?

15 Information Property Who owns information about individuals? How can this information be sold and exchanged?

16 Data Privacy Statements If a company maintaining the database with customer information legally owns it Is free to sell it? Must it ensure proper data handling practices?

17 Spam, Cookies and Spyware What is “Spam”? Unsolicited email What are “Cookies”? Text files storing web activities What is “Spyware”? Software used for data collection without our knowledge

18 Combating Spyware Windows defender Spyware monitoring and removal Others Include: Ad-aware Spybot Search & Destroy

19 Cybersquatting What is “Cybersquatting”? What protection do organizations have against cybersquatting?

20 Information Accessibility Who has the right to monitor the information?

21 What was “Carnivore”?

22 Legal Support for Electronic Communication Privacy What laws protect electronic communications privacy? Provides little support Geared toward protecting voice privacy No other laws for email Some states define their own rules for companies.

23 Need for a Code of Ethical Conduct Many businesses have guidelines for appropriate use Universities endorse guidelines proposed by EduCom Responsible computer use (based on work of the Computer Ethics Institute) prohibits: 1. Using a computer to harm others 2. Interfering with other people’s computer work 3. Snooping in other people’s files

24 Need for a Code of Ethical Conduct Responsible computer use prohibits (continued): 4. Using a computer to steal 5. Copying or using proprietary software without paying for it 6. Using other people’s computer resources without authorization 7. Appropriating other people’s intellectual output

25 No Place to Hide Video What are the major technologies discussed in the video? Who uses the technologies for what purpose? What are the ethical issues (privacy, accuracy, property, and accessibility)? Do you feel that the technology applications are appropriate?

26 Learning Objectives Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility. Define computer crime and list several types of computer crime. Describe and explain the differences between cyberwar and cyberterrorism.

27 Computer Crime What defines a “Computer Crime”?

28 28 Types of Computer Crimes and Financial Losses What do you think happens to a company’s stock price if they report that their systems have been compromised? Would you report it if you didn’t have to?

29 29 Financial Impact of Virus Attacks

30 Unauthorized Computer Access What do we mean by “Unauthorized Computer Access”? Examples? How much goes unreported?

31 31 Unauthorized computer access Why has unauthorized access been on a decline?

32 Federal and State Laws Two main federal laws against computer crime Computer Fraud and Abuse Act of 1986 1996 Amendment Electronic Communications Privacy Act of 1986 USA PATRIOT Act of 2002

33 What is “Computer Forensics”?

34 Hacking and Cracking What is the difference between a “Hacker”, a “Cracker” and a “Hacktivist”?

35 Who Commits Computer Crimes? Can you paint a picture of the typical computer criminal? Four groups of computer criminals 1. Current or former employees 85-95% of theft from business comes from the inside How much time/money do we focus on keeping outsiders out of our systems? 2. People with technical knowledge committing crimes for personal gain 3. Career criminals using computers to assist them in crimes 4. Outside crackers hoping to find information of value

36 Types of Computer Crimes

37 37 Types of Computer Crimes

38 Software Piracy Legal activities Illegal activities Applicable copyright laws

39 Computer Viruses and Other Destructive Code Malware (malicious software) 1,400 new pieces released in one month Viruses Reproduce themselves Usually delete or destroy files Boot sector viruses File infector viruses Viruses can spread through e-mail attachments

40 Computer Viruses

41 41 How a Computer Virus is Spread

42 Worms, Trojan Horses and Other Sinister Programs Worm Trojan horse Logic bombs and time bombs

43 Learning Objectives Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility. Define computer crime and list several types of computer crime. Describe and explain the differences between cyberwar and cyberterrorism.

44 Cyberterrorism

45 Cyberwar Military’s attempt to disrupt or destroy other country’s information and communication systems

46 Cyberterrorism Governments not involved Can be launched from anywhere in the world Goal is to cause fear, panic and destruction Cyberterrorism will likely become weapon of choice


Download ppt "Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the."

Similar presentations


Ads by Google