8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.

Slides:



Advertisements
Similar presentations
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Advertisements

Ethics, Privacy and Information Security
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business.
Issues Raised by ICT.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Securing Information Systems
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
Security and Ethics Privacy Employment Health Crime Working
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Jeopardy: Digital Citizenship Please use presentation mode!
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
CONTROLLING INFORMATION SYSTEMS
Privacy, Security and Ethics
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
Security and Ethics Safeguards and Codes of Conduct.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Ethical aspects and copyright law. Ethical Responsibility ethics: what is right and what is wrong law: consensus, can be enforced theories: overall good,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Ethics IT Fundamentals Battlefield High School.
Securing Information Systems
Chapter 16 – Careers in Information Technology
CHAPTER FOUR OVERVIEW SECTION ETHICS
Securing Information Systems
ISNE101 Dr. Ken Cosh.
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
CHAPTER FOUR OVERVIEW SECTION ETHICS
Communication Technology in a Changing World
Ethical Issues in Information Technology By: Ronald F. White, Ph.D.
Presentation transcript:

8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility controls Network security, encryption, fire walls, physical, biometrics, failure controls Hackers: H2K convention –Procedural controls SOPs, authorization req’s, disaster recovery, people –Auditing Around, through; verifying accuracy of data & software Control logs

Ethics in IT: Overview Ethical foundations –Philosophies: egoism, natural law, utilitarianism, respect for people –Values: liberty, peace, human dignity, citizenship, charity –Models: behavioral stages, behavioral models Business ethics –Stockholder theory, social contract theory, stakeholder theory –Information ethics: issues: privacy, accuracy, property, accessibility –IT & employment: Luddites revisited –IT & individuality: dehumanization –IT & working conditions: more interesting/less interesting work, ergonomics

Ethics in IT: Privacy Issues Computer monitoring: keystroke recording, GPS Database conglomeration: Post office’s idea Tracking users on the Internet privacy: does your company have a policy? Laws: –Electronic Communications Privacy Act (1986) –Computer Fraud & Abuse Act (1986) Censorship: spam, flaming, pornography, hate sites – –Communications Decency Act ( dead)

Ethics in IT: Crime Trespassing: hackers –Good hackers & bad hackers? Money theft Service theft Software theft –Digital Millenium Copyright Act Data theft Computer viruses