Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Crime and Security in the Networked Economy Part 4.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 7 IT Ethics, Crime and Privacy. Quiz Instructions 1.Print your name (first and last) on a blank sheet of paper 2.Print date and class day and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Presented by Student Name Workplace Issues – Lecture 4.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security Issues and Ethics in Education
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Issues Raised by ICT.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Free Cookies and Other Security and Privacy Issues.
Digital Access Digital Commerce Digital Communication Digital Literacy Digital Etiquette Digital Law Digital Rights and Responsibilities Digital Health.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Ethical aspects and copyright law. Ethical Responsibility ethics: what is right and what is wrong law: consensus, can be enforced theories: overall good,
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
Computers: Tools for an Information Age
Presentation transcript:

Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

Quit 9.2 Our Information Society Monthly Technology Update The Workplace EthicsEthics Security Issues

Quit 9.3 The Workplace Cumulative trauma disorder Carpal tunnel syndrome Repetitive stress injuries Video operator’s distress syndrome Ergonomics: Study of the relationships between people and the things we use. Ergonomics

Quit 9.4 Workplace Design  Include flexibility  OSHA requirements  Ergonomic considerations  Employee training A healthy, happy worker is a more productive worker.

Quit 9.5 Common Abuses of IT   Send/receive frivolous   Non-business Internet browsing   Gaming on company time   Toying with technology

Quit 9.6 Green Computing  Environmentally sensible computing  Energy Star guidelines  Less printing  Recycle whenever possible

Quit 9.7 Who Knows What About You?  Tax data  Education data  Medical data  Driver and crime data  Census data  Insurance data  Lifestyle data  Credit data  WWW data  Miscellaneous Social Security Number is Link!

Quit 9.8 Privacy of Personal Information  Sources of Personal Data Credit cards provide lifestyle profile Credit cards provide lifestyle profile Phone calls Phone calls Internet Internet  Violating Privacy Selling your information Selling your information Cookies Cookies

Quit 9.9 Privacy of Personal Information  Computer Matching Used to identify individuals common to separate databases that are engaged in wrongdoing Used to identify individuals common to separate databases that are engaged in wrongdoing Garnishing wages for student loans Garnishing wages for student loans IRS creates lifestyle profiles IRS creates lifestyle profiles  New applications Background checks for airline passengers Background checks for airline passengers  Securing integrity There are no easy answers to the Privacy question

Quit 9.10 Privacy of Personal Information  Computer monitoring Most controversial application Most controversial application Measure worker performance Measure worker performance Often without worker’s knowledge Often without worker’s knowledge monitoring monitoring

Quit 9.11 Software Piracy  Theft of intellectual property  Federal copyright law automatically protects software  Install on only one computer  Site license for LAN  Pilferage  $250,000/5 years in jail possible  Net poses big problems

Quit 9.12 Security Issues  White-collar crime  Computer viruses  Natural disasters  Vandalism  Carelessness 4 of every 5 business computer systems has been violated in some way.

Quit 9.13 Computer-Center Security  Hardware Use fault-tolerant design Use fault-tolerant design Install uninterruptible power source (UPS) for backup Install uninterruptible power source (UPS) for backup  Software Minimize opportunities for unlawful modification of software Minimize opportunities for unlawful modification of software Use antiviral programs Use antiviral programs IBM’s electronic immune system IBM’s electronic immune system Generations of backups Generations of backups Serendipitous Surfing: Music

Quit 9.14 Computer-Center Security  Data Communications Employ cryptography technology Employ cryptography technology Encryption/Decryption Encryption/Decryption Secure Sockets Layer - SSL Secure Sockets Layer - SSL Digital ID Digital ID E-signature E-signature  Personnel Courtesy of E- Systems, Inc.

Quit 9.15 Other Security Issues  Information systems security Physical security Physical security Logical security (ID and password) Logical security (ID and password)  PC security Lock and key Lock and key Badge reader Badge reader ID and password ID and password  Acceptable level of risk Courtesy of Kensington Technology Group

Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. End of Chapter 8