Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.

Similar presentations


Presentation on theme: "Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME."— Presentation transcript:

1 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

2 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-2 Information Age Terms Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Computer Literacy Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Digital Divide The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility Computer Ethics The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

3 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-3 Information Privacy and Issues *X Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government. Claim to privacy is protected by the Canadian Charter of Rights and Freedoms In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA) However, privacy can be challenged by the Internet: cookies, spyware Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government. Claim to privacy is protected by the Canadian Charter of Rights and Freedoms In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA) However, privacy can be challenged by the Internet: cookies, spyware

4 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-4 Other Privacy Concerns *X Intellectual property rights –Plagiarism from Internet Publishing slanderous information about a person on a website Etc…

5 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-5 The Need for Ethical Behaviour *MC Ethical Behaviour Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit Ethical Behaviour Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as: Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality Unauthorized use of computers – at work or at school, “stealing time” for personal business or use Information collection – by companies compiling information to sell for profit

6 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-6 Responsible Computer Use *MC The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors: Using a computer to harm others Interfering with other people’s computer work Snooping in other people’s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people’s computer resources without authorization or compensation Appropriating other people’s intellectual output Guidelines In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations Guidelines In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

7 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-7 Responsible Computer Use *X The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.) The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers: Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware) Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.)

8 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-8 Computer Crimes *MC Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions) Computer Crime The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following: Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains) Using a computer to commit and offense (e.g. stealing credit card numbers from a company database) Using computers to support criminal activity (e.g. drug dealer using computers to store records of illegal transactions)

9 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-9 Computer Crime – Unauthorized Access Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME! Unauthorized Access A person gaining entry to a computer system for which they have no authority to use such access THIS IS A COMPUTER CRIME!

10 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-10 Computer Crimes – Who Commits Them? *X Unauthorized Access 1998 Survey of 1600 companies by PricewaterhouseCoopers 82% come from inside the organization (employees)

11 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-11 Computer Crimes - Hacking and Cracking *MC Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Hackers A term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers Crackers A term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers

12 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-12 Computer Crimes – Cracker (Humorous)

13 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-13 Computer Crime – Software Piracy *X Software Piracy This practice of buying one copy and making multiple copies for personal and commercial use, or for resale is illegal in most countries while others offer weak or nonexistent protections. This has become and international problem as shown below

14 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-14 Computer Crimes – Destructive Code *X

15 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-15 APPLIED COMPUTER SCIENCE DEPARTMENT *X Implementing an “Information Systems” pattern, and also “Health Informatics” pattern –Less technically and programming oriented than traditional applied cs –Courses: 1805 Introduction to Programming 1809 Website Design and Development 1903 Programming Fundamentals 1803 Intro to Information Systems 2814 Applications of Database Systems

16 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-16 IS Pattern More courses: 2909 Introduction to Internet Programming 2913 Software Requirements Analysis and Design 2916 Business Application Systems 3801 Principles in Information Systems 3816 User Interfaces in Information Systems 3811 Telecommunications 3907 eCommerce 3923 Technical Writing

17 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-17 Health Informatics Pattern Information systems as applied to: –Administration –Delivery of health care

18 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-18 Bus & Admin Students Can take a selected number of IS courses to add to resume –e.g. major area of concentration: Accounting (or Marketing) – courses taken: –Secondary area of concentration: Information Systems – courses taken: Introduction to Information Systems (A+),

19 Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-19 FINALLY The End of ACS 1803 Good Luck on Exams and in Future!!!


Download ppt "Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME."

Similar presentations


Ads by Google