Kholoud AlSafadi 120050375 Ethical Issues in Information Systems and the Internet.

Slides:



Advertisements
Similar presentations
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Chapter 9: Privacy, Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Lecture 10 Security and Control.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14 Although information technology has become so valuable most of.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Policies and procedures must be established to avoid computer waste and mistakes
Management Information Systems
CYBER CRIME AND SECURITY TRENDS
Security Issues and Ethics in Education
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
BUS 311: Fall Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Waste and Security Privacy Computer Health.
1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Security, Privacy, and Ethics
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
C8- Securing Information Systems
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency.
Principles of Information Systems, Ninth Edition Chapter 14 The Personal and Social Impact of Computers.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
MIS323 – Business Telecommunications Chapter 10 Security.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers.
Securing Information Systems
Fundamentals & Ethics of Information Systems IS 201
Principles of Information Systems Eighth Edition
Add video notes to lecture
Fundamentals of Information Systems
CHAPTER 4 Information Security.
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Fundamentals of Information Systems Fourth Edition
Policies and procedures must be established to avoid computer waste and mistakes
Principles of Information Systems Eighth Edition
Principles of Information Systems Eighth Edition
Presentation transcript:

Kholoud AlSafadi Ethical Issues in Information Systems and the Internet

Computer Waste & Mistakes

Social Issues in Information Systems

Computer Waste  Discard technology  Unused systems  Personal use of corporate time and technology

Preventing Computer Waste and Mistakes  Establish Policies and Procedures  Implement Policies and Procedures  Monitor Policies and Procedures  Review Policies and Procedures

Types of Computer-Related Mistakes

Useful Policies to Eliminate Waste and Mistakes

Computer Crime

Number of Incidents Reported to CERT

Computer Crime and Security Survey

The Computer as a Tool to Commit Crime  Social engineering  Dumpster diving  Identity theft  Cyberterrorism

Computers as Objects of Crime  Illegal access and use  Hackers  Crackers  Information and equipment theft  Software and Internet piracy  Computer-related scams  International computer crime

How to Respond to a Security Incident

Data Alteration and Destruction  Virus  Worm  Logic bomb  Trojan horse

The Six Computer Incidents with the Greatest Worldwide Economic Impact

Top Viruses – July 2002

Preventing Computer-Related Crime  Crime prevention by state and federal agencies  Crime prevention by corporations  Public Key Infrastructure (PKI)  Biometrics  Anti-virus programs

Preventing Computer-Related Crime  Intrusion Detection Software  Managed Security Service Providers (MSSPs)  Internet Laws for Libel and Protection of Decency

Preventing Crime on the Internet  Develop effective Internet and security policies  Use a stand-alone firewall with network monitoring capabilities  Monitor managers and employees  Use Internet security specialists to perform audits

Common Methods Used to Commit Computer Crimes

How to Protect Your Corporate Data from Hackers

Privacy

Privacy Issues  Privacy and the Federal Government  Privacy at work  privacy  Privacy and the Internet

The Right to Know and the Ability to Decide