MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing Email that bites Paying for Privacy Pirates.
Published byModified over 5 years ago
Presentation on theme: "MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing Email that bites Paying for Privacy Pirates."— Presentation transcript:
1 MISPERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMSCHAPTER 4Hossein BIDGOLIPhishingthat bitesPaying for PrivacyPirates
2 Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems l e a r n i n g o u t c o m e sLO1 Describe information technologies that could be used in computer crimes.LO2 Review privacy issues and methods for improving privacy of information.LO3 Explain the effects of , data collection, and censorship on privacy.LO4 Discuss ethical issues of information technology.LO5 Describe intellectual property principles and infringement issues.
3 l e a r n i n g o u t c o m e s (cont’d.) Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systemsl e a r n i n g o u t c o m e s (cont’d.)LO6 Explain information system issues affecting organizations, including the digital divide, electronic publishing, and effects on the workplace and employees’ health.
4 Risks Associated with Information Technologies Misuses of information technologyInvade users’ privacyCommit computer crimesMinimize or prevent by:Installing operating system updates regularlyUsing antivirus softwareUsing security features
5 Cookies Cookies Can be useful or intrusive Many users disable cookies Small text files with a unique ID tagEmbedded in a Web browserSaved on the user’s hard driveCan be useful or intrusiveMany users disable cookiesBy installing a cookie managerOr using Web browser options
6 Spyware and Adware Spyware Install antivirus or antispyware software Software that secretly gathers information about users while they browse the WebCan be used maliciouslyInstall antivirus or antispyware softwareAdwareForm of spywareCollects information about the user to display advertisements in the Web browser
7 Phishing _______________ Direct e-mail recipients to false Web sites Sending fraudulent s that seem to come from legitimate sourcesDirect recipients to false Web sitesTo capture private information
8 Keyloggers, Sniffing and Spoofing Some antivirus and antispyware programs protect against software keyloggers__________________Capturing and recording network trafficOften used by hackers to intercept informationSpoofingAttempt to gain access to a network by posing as an authorized user to find sensitive informationKeyloggersMonitor and record keystrokesCan be software or hardware devicesSometimes used by companies to track employees’ use of and the InternetCan be used for malicious purposesSome antivirus and antispyware programs protect against software keyloggersSniffingCapturing and recording network trafficOften used by hackers to intercept informationSpoofingAttempt to gain access to a network by posing as an authorized user to find sensitive information
9 Computer Crime and Fraud Computer fraudUnauthorized use of computer data for personal gainSocial networking sitesUsed for committing computer crimeExamplesDenial-of-service attacksIdentity theftSoftware piracyDistributing child pornographyspamming
10 Computer Crime and Fraud (cont’d.) Writing or spreading viruses, worms, Trojan programs, and other malicious codeStealing filesChanging computer recordsVirus hoaxesSabotageCompany insiders commit most computer crimes
11 Computer Crime – Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such accessTHIS IS A COMPUTER CRIME!82% come frominside theorganization(employees)
12 Privacy Issues Concerns about privacy in the workplace Paying for PrivacyPrivacy IssuesConcerns about privacy in the workplaceMisuse and abuse of information gathered by: ….Defining privacy is difficultNumber of databases increasing rapidlyDirect marketing companies major user of this informationU.S. government began linking large databases to find informationAcceptable use policies
13 E-mail Presents some serious privacy issues _____________________ that bitesPresents some serious privacy issues_____________________Unsolicited sent for advertising purposeSent in bulk by using automated mailing softwareEase of accessPeople should assume that others could have access to their messagesAny s sent on company-owned computers are the property of the organization
15 Ethical Issues of Information Technologies Ethics and ethical decision makingMoral guidelines people or organizations follow in dealing with othersMore difficult to determine than legal cersus illegal
16 ____________________ Who decides what should be on the Internet?Whether or not something can be censored depends in part on who is doing the censoringParents are concerned about what their children are exposed toPornography, violence, and adult languageMistaken or mistyped URLsSearch terms
17 Intellectual Property PiratesIntellectual PropertyIntellectual propertyProtections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businessesIndustrial propertyInventions, trademarks, logos, industrial designsCopyrighted material____________________Registering, selling, or using a domain name to profit from someone else’s trademark
18 The Impact of Information Technology in the Workplace New jobsTelecommuting and virtual workJob deskillingJob upgradingOne skilled worker might be capable doing the job of several workersVirtual organizationsGreen Computingpromotes a sustainable environment and consumes the least amount of energy