Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

Auditing Computer-Based Information Systems
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
9 - 1 Computer-Based Information Systems Control.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Pertemuan 23 & 24 Security and Ethical Challenges
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Ethical Use of Computers. Ethics and Responsibilities in the Computing Process Every profession operates with a set of ethics that help to define the.
Introduction to Information Systems
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Chapter 3 Ethics, Privacy & Security
1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Irwin/McGraw-Hill Copyright © 2001, The McGraw-Hill Companies, Inc. All rights reserved. I n t r o d u c t i o n t o I n f o r m a t i o n S y s t e m.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Developing Business/IT Strategies Chapter 11.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
22 Irwin/Mcgraw-Hill © The McGraw-Hill Companies, Inc., 2000 Information Technology for Human Resources.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Welcome to the ICT Department Unit 3_5 Security Policies.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
UNIT V Security Management of Information Technology.
Information Security and Privacy in HRIS
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Security and Ethical Challenges
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Chapter 17 Risks, Security and Disaster Recovery
Security and Ethical Challenges
Security and Ethical Challenges
Data integrity and security
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i n e s s E n t e r p r i s e Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. C h a p t e r James A. O’Brien 11 Security and Ethical Challenges of E-Business

Sixth Edition James A. O’Brien 2 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Security Ethics and Society Employment Privacy Health Individuality Crime Working Conditions

Sixth Edition James A. O’Brien 3 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Computer Crime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses

Sixth Edition James A. O’Brien 4 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Employment Challenges Lost Job Opportunities Computer Monitoring Lost Individuality Health Issues Working Conditions

Sixth Edition James A. O’Brien 5 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Considerations Ethical Principles –Proportionality –Informed Consent –Justice –Minimized Risk Standard of Conduct –Act with integrity –Protect the privacy and confidentiality of information –Do not misrepresent or withhold information –Do not misuse resources –Do not exploit weakness of systems –Set high standards –Advance the health and welfare of general public

Sixth Edition James A. O’Brien 6 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Security Management of E-Business Encryption Denial of Service Defenses Fire Walls Monitor Virus Defenses

Sixth Edition James A. O’Brien 7 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Other E-Business Security Measures Security Codes Security Monitors Backup Files Biometric Security Controls

Sixth Edition James A. O’Brien 8 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Computer System Failure Controls LayerThreatFault Tolerant Methods Fault Tolerant Systems Fail-Over Fail-Safe Fail-Soft

Sixth Edition James A. O’Brien 9 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Disaster Recovery Who will participate? What will be their duties? What hardware and software will be used? Priority of applications to be run? What alternative facilities will be used? Where will databases be stored?

Sixth Edition James A. O’Brien 10 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. E-Business System Controls and Audits Processing Controls Fire walls Software Hardware Checkpoints Processing Controls Fire walls Software Hardware Checkpoints Storage Controls Input Controls Output Controls Security Codes Encryption Error Signals Security Codes Encryption Backup Files Security Codes Encryption Control Totals User Feedback