McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.

Slides:



Advertisements
Similar presentations
Lesson 30 Computer Safety and Ethics
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Chapter 8 Protecting People and Information Threats and Safeguards
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Protecting People and Information Threats and Safeguards
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Ethical and Social Issues. Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Chapter 8: Protecting People and Information Threats and Safeguards Management Information Systems for the Information Age.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
history, hardware, software, safety, and computer ethics
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 5 Electronic Commerce.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 1 The Information Age.
PROTECTING PEOPLE & INFORMATION Threats and Safeguards Chapter 8.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Privacy, Security and Ethics
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Information Security and Privacy in HRIS
CHAPTER FOUR OVERVIEW SECTION ETHICS
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Fundamentals of Information Systems
This presentation was developed by Dr. Steven C
PROTECTING PEOPLE & INFORMATION
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information and People

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Knowledge Workers Checklist the importance of ethics privacy accommodating diversity information and its protection

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ethics doing what’s right acting in a principled way treating others with respect & dignity not always simple to determine what’s right

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Practical Circumstances in Ethical Dilemma consequences society’s opinion likelihood of effect time to consequences relatedness reach of result

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Intellectual Property intangible creative work in physical form

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Fair Use Doctrine provides exceptions to copyright can use in particular situations rules for software –one copy for self –pirated software cost $12 billion in 1999

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition employers can easily get your –credit standing –telephone use patterns –insurance coverage –comments you make on Internet Privacy & Employees

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Consumers businesses face a dilemma –how much information is enough? –need to know what consumer wants to provide mass customization –consumers want privacy special software helps consumer stay anonymous

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Government National Crime Info Center –criminal records of 20 million people –linked to other databases Internal Revenue Service (IRS) –information on all taxpayers Census Bureau –makes info available to other agencies

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition safe-harbor principles –business must practice to trade with European Union (EU) –EU has strong privacy laws Privacy & International Trade

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Cultural Diversity cultural diversity causes culture shock three stages of adjustment

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ergonomics design & arrange workplace to minimize damage to humans repetitive strain injury (RSI) –can usually be reduced through chair, desk, keyboard adjustment –what’s comfortable is unique to each person

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition raw material –part of a company’s product capital –used to provide all products Information Has 2 Roles

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Protecting Information Information is threatened by – component failure – carelessness – deliberate attacks

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition white-hat hackers –break in, don’t do damage black-hat hackers –break in, cause trouble crackers –break in for monetary gain script bunnies –use software created by others Hackers

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Most Common Types of Cyber Crime virus: destructive software –macro virus attaches to application –worm spreads easily denial-of-service –many e-businesses hit –can be disastrous

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Security Plan risk management –identification of risks or threats –implementation of security measures –monitoring plan for effectiveness

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Risk Assessment evaluate IT assets –what can go wrong? –how likely is it? –what are the consequences?

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Safeguards backups - ALWAYS firewalls encryption security software

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition a plan of what you’ll do if disaster strikes include consideration of –customers –facilities –knowledge workers –business information –computer equipment –communications infrastructure Disaster Recovery Plan

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Summary ethical behavior is when people act in a principled way, treating everyone with respect & dignity Intellectual property is protected by Copyright, Patent and other laws while employers have access to a great deal of information on employees, employees are entitled to privacy as are consumers the EU has stronger privacy laws than the US culture shock is what you’ll experience if you go to live in another society ergonomics describes the fitting of hardware and furniture to make the user less prone to RSI & other injuries many types of cyber crimes are perpetrated all over the world organizations should have and use an effective security plan