1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business.

Slides:



Advertisements
Similar presentations
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
Advertisements

ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Crime and Security in the Networked Economy Part 4.
Auditing Computer-Based Information Systems
ICT Ethics 2 ICT 139.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Ethical and Social Issues in Information Systems
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Code of Conduct University of New England. Employment at the University carries with it an obligation to act in the public interest. All staff members.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
What does “secure” mean? Protecting Valuables
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Developing Business/IT Strategies Chapter 11.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Chap1: Is there a Security Problem in Computing?.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
CONTROLLING INFORMATION SYSTEMS
Chapter 8 Auditing in an E-commerce Environment
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
UNIT V Security Management of Information Technology.
Information Security and Privacy in HRIS

ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Chapter 17 Risks, Security and Disaster Recovery
Lecture 14: Business Information Systems - ICT Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 7 – Organisational Systems Security
Chapter 13 Security and Ethical Challenges.
INFORMATION SYSTEMS SECURITY and CONTROL
OBSERVE ETHICAL PRACTICES
CS-480b Network Security Dick Steflik
Presentation transcript:

1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business

2 Learning Objectives Identify several ethical issues in how the use of IT in E-Business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problem Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of E-business applications. Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of IT

3 Section 1- Security, Ethical, and Societal Challenges of E-Commerce IT can support both beneficial or detrimental effects on society in each of the areas: 1.Computer Crime in E-Business: the unauthorized use, access, modification, and destruction of hardware, software, data, or network resources.

4 Computer Crime Activities Hacking Cyber Theft Unauthorized use at Work Software Piracy Piracy of Intellectual Property Computer viruses

5 Privacy Issues Privacy on the Internet Computer Matching Privacy Laws Computer Libel and Censorship –Spamming –Flaming

6 Health Issues Heavy use of computers is reportedly causing health problems like job stress, damaged arm, neck muscles, eye strain, radiation exposure etc. Solution to some of these health problems are based on the science of ERGONOMICS sometime called human factors engineering. Goal is to design healthy work environment that are safe, comfortable and pleasant for people to work in thus increasing morale and productivity

7 Ergonomics which means “fitting the task to the worker”

8 Other Challenges Employment Challenges –Substituting of human efforts Computer Monitoring –Computers to monitor productivity and behaviors of employees Challenges in Working Conditions –Ongoing upgrading of working environment Challenges to individuality –Negative impact on individuals

9 You and Ethical Responsibility As a business end user,we have a responsibility to promote ethical uses of IT in the workplace. As a responsible IT user, it will be our responsibility to make decisions about business activities and the use of IT which may have an ethical dimension that must be considered.

10 Ethical Foundations Egoism – What is best for a given individual is right. Natural Law – Humans should promote their own health and life, pursue knowledge of the world and God,pursue close relationship with other people and submit to legitimate authority. Utilitarianism – Those actions are right that produce the greatest good for the greatest number of people. Respect for person – People should be treated as an end and not as a means to an end; and actions are right if everyone adopts the moral rule presupposed by the action.

11 Principles of Technology Ethics Proportionality – The good achieved by the technology must outweigh the harm or risk. Informed Consent – Those affected by the IT should understand and accept the risks. Justice – The benefits and burdens of the technology should be disturbed fairly. Minimized Risk – Even if judged acceptable by the other 3 guidelines, IT must be implemented so as to avoid all unnecessary risk.

12 Ethical Guidelines Business end users and IS professional would live up to their ethical responsibilities by: –Acting with integrity –Increasing your professional competence –Setting high standards of personal performance –Accepting responsibility for your work –Advancing the health, privacy, and general welfare of the public.

13 AITP Standards of Professional Conduct In recognition of my obligation to my employer I shall: Avoid conflicts of interest and ensure that my employer is aware of any potential conflicts. Protect the privacy and confidentiality of all information entrusted to me. Not withhold and misrepresent information that is relevant or useful to the situation. Not attempt to use the resources of my employer for personal gain or for any purpose without proper approval. Not exploit the weaknesses of a computer system for personal gain or personal satisfaction.

14 AITP Stand. Of PC con’t In recognition of my obligation to society I shall: Use my skill and knowledge to inform the public in all areas of my experience. To the best of my ability, ensure that the products of my work are used in a socially responsible way. Support, respect, and abide by the appropriate local, state, provincial and federal laws. Never misrepresent or withhold information that is germane to a problem or a situation of public concern, not will I allow any such known information to remain unchallenged. Not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain.

15 Section 2 – Security Management of E-commerce The goal of SM is the accuracy, integrity, and safety of all E-Business processes and resources. Thus, effective SM can minimize errors, fraud, and losses in the internetworked computer-based systems that interconnect today’s e-business enterprise.

16 Security Tools and Defensive Measures. Encryption Firewalls Monitoring - Policy Virus Defenses Security Codes – multilevel password Backup Files Security Monitors Biometric Security Computer Failure Controls Fault Tolerant Systems Disaster Recovery Plan

17 Essential E-commerce Processes 4 of 5 Event Notification: Multiple events take place in E-transactions. EC systems are event-driven. Event must be notified to different parties involved in the transactions Collaboration & Trading : Online/auction Sites for collective buying/selling requires collaboration between business partners. See the following diagram.

18 E-Business System Controls and Audits IS Controls are designed to monitor and maintain the quality and security of the IPOS activities of an information system. Input Controls –Security codes –Encryption –Data Entry Screens –Error Signals –Control Totals

19 System Controls con’t Processing Controls: Software controls, Hardware controls, Firewalls, Checkpoints Output Controls Security codes, Encryption, Control Totals, Control Listings, and End User Feedback. Storage Controls Security codes, Encryption, Backup Files, Library Procedures, Database Administrator

20 Auditing E-Business Systems E-Business systems should be periodically examined or audited by a company’s internal auditing staff or external auditors from professional accounting firms. Such auditors review and evaluate whether proper and adequate security measures and management policies have been developed and implemented. This typically involves verifying the accuracy and integrity of the E-Business software used as well as the input of data and output produced with secured storage.

21 Auditing IS con’t Audit Trial can be defined as the presence of documentation that allows a transaction to be traced through all stages of its information processing. Control Logs automatically record all computer network activity on a magnetic disk or devices.

22 Security Management for Internet Users Use antivirus software and update it often Use a hard to guess password, mix of numbers and letters and change frequently Use different password for different applications Use up to date web browser and software Install firewall software Don’t open attachment unless you know the source Confirm the site you are doing business with.

23 SUMMARY Section 1 – Security, Ethical, and Societal Challenges of E-Business: –Computer crime in business –Privacy Issues –Other Challenges –Health Issues –Societal Solutions –You and Ethical Responsibility Section II - Security Management of E-Busines –Security Management –Internetworked E-Business Defenses –Other Security Measures –E-Business System Controls and Audit