Presentation is loading. Please wait.

Presentation is loading. Please wait.

Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.

Similar presentations


Presentation on theme: "Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14."— Presentation transcript:

1 Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14

2 Principles of Information Systems, Sixth Edition Principles and Learning Objectives Policies and procedures must be established to avoid computer waste and mistakes. –Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions. –Identify policies and procedures useful in eliminating waste and mistakes.

3 Principles of Information Systems, Sixth Edition Principles and Learning Objectives Computer crime is a serious and rapidly growing area of concern requiring management attention. –Explain the types and effects of computer crime. –Identify specific measures to prevent computer crime. –Discuss the principles and limits of an individual’s right to privacy.

4 Principles of Information Systems, Sixth Edition Principles and Learning Objectives Jobs, equipment, and working conditions must be designed to avoid negative health effects. –List the important effects of computers on the work environment. –Identify specific actions that must be taken to ensure the health and safety of employees. –Outline criteria for the ethical use of information systems.

5 Principles of Information Systems, Sixth Edition Social Issues in Information Systems

6 Principles of Information Systems, Sixth Edition Computer Waste & Mistakes

7 Principles of Information Systems, Sixth Edition Computer Waste Discard technology Unused systems Personal use of corporate time and technology

8 Principles of Information Systems, Sixth Edition Preventing Computer Waste and Mistakes Establish Policies and Procedures Implement Policies and Procedures Monitor Policies and Procedures Review Policies and Procedures

9 Principles of Information Systems, Sixth Edition Preventing Computer-Related Waste and Mistakes

10 Principles of Information Systems, Sixth Edition Implementing Policies and Procedures

11 Principles of Information Systems, Sixth Edition Computer Crime

12 Principles of Information Systems, Sixth Edition Number of Incidents Reported to CERT

13 Principles of Information Systems, Sixth Edition Computer Crime and Security Survey

14 Principles of Information Systems, Sixth Edition The Computer as a Tool to Commit Crime Social engineering Dumpster diving Identity theft Cyberterrorism

15 Principles of Information Systems, Sixth Edition Computers as Objects of Crime Illegal access and use –Hackers vs. crackers –Script bunnies –Insiders

16 Principles of Information Systems, Sixth Edition Illegal Access and Use

17 Principles of Information Systems, Sixth Edition Data Alteration and Destruction Virus –Application virus –System virus –Macro virus Worm Logic bomb

18 Principles of Information Systems, Sixth Edition Data Alteration and Destruction

19 Principles of Information Systems, Sixth Edition Top Viruses – July 2002

20 Principles of Information Systems, Sixth Edition Top Viruses – July 2002

21 Principles of Information Systems, Sixth Edition Computers as Objects of Crime Information and equipment theft Software and Internet piracy Computer-related scams International computer crime

22 Principles of Information Systems, Sixth Edition Preventing Computer-Related Crime Crime prevention by state and federal agencies Crime prevention by corporations –Public Key Infrastructure (PKI) –Biometrics Antivirus programs

23 Principles of Information Systems, Sixth Edition Preventing Computer-Related Crime Intrusion Detection Software Managed Security Service Providers (MSSPs) Internet Laws for Libel and Protection of Decency

24 Principles of Information Systems, Sixth Edition Preventing Crime on the Internet Develop effective Internet and security policies Use a stand-alone firewall with network monitoring capabilities Monitor managers and employees Use Internet security specialists to perform audits

25 Principles of Information Systems, Sixth Edition Common Methods Used to Commit Computer Crimes

26 Principles of Information Systems, Sixth Edition How to Protect Your Corporate Data from Hackers

27 Principles of Information Systems, Sixth Edition Privacy

28 Principles of Information Systems, Sixth Edition Privacy Issues Privacy and the Federal Government Privacy at work E-mail privacy Privacy and the Internet

29 Principles of Information Systems, Sixth Edition Using Antivirus Programs

30 Principles of Information Systems, Sixth Edition Fairness and Information Use

31 Principles of Information Systems, Sixth Edition Federal Privacy Laws and Regulations The Privacy Act of 1979 Gramm-Leach-Bliley Act USA Patriot Act

32 Principles of Information Systems, Sixth Edition Other Federal Privacy Laws

33 Principles of Information Systems, Sixth Edition Other Federal Privacy Laws

34 Principles of Information Systems, Sixth Edition The Work Environment

35 Principles of Information Systems, Sixth Edition Health Concerns Repetitive stress injury (RSI) Carpal tunnel syndrome (CTS) Ergonomics

36 Principles of Information Systems, Sixth Edition Avoiding Health and Environment Problems Maintain good posture and positioning. Don’t ignore pain or discomfort. Use stretching and strengthening exercises. Find a good physician who is familiar with RSI and how to treat it.

37 Principles of Information Systems, Sixth Edition Medical Topics on the Internet

38 Principles of Information Systems, Sixth Edition Ethical Issues in Information Systems The AITP Code of Ethics –Obligation to management –Obligation to fellow AITP members –Obligation to society The ACM Code of Professional Conduct –Acquire and maintain professional competence

39 Principles of Information Systems, Sixth Edition AITP Code of Ethics

40 Principles of Information Systems, Sixth Edition Summary Computer waste - the inappropriate use of computer technology and resources in both the public and private sectors Software and Internet piracy - represent the most common computer crime Ethics - determine generally accepted and discouraged activities within a company


Download ppt "Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14."

Similar presentations


Ads by Google