McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information and People
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Knowledge Workers Checklist the importance of ethics privacy accommodating diversity information and its protection
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ethics doing what’s right acting in a principled way treating others with respect & dignity not always simple to determine what’s right
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Practical Circumstances in Ethical Dilemma consequences society’s opinion likelihood of effect time to consequences relatedness reach of result
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Intellectual Property intangible creative work in physical form
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Fair Use Doctrine provides exceptions to copyright can use in particular situations rules for software –one copy for self –pirated software cost $12 billion in 1999
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition employers can easily get your –credit standing –telephone use patterns –insurance coverage –comments you make on Internet Privacy & Employees
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Consumers businesses face a dilemma –how much information is enough? –need to know what consumer wants to provide mass customization –consumers want privacy special software helps consumer stay anonymous
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Government National Crime Info Center –criminal records of 20 million people –linked to other databases Internal Revenue Service (IRS) –information on all taxpayers Census Bureau –makes info available to other agencies
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition safe-harbor principles –business must practice to trade with European Union (EU) –EU has strong privacy laws Privacy & International Trade
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Cultural Diversity cultural diversity causes culture shock three stages of adjustment
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ergonomics design & arrange workplace to minimize damage to humans repetitive strain injury (RSI) –can usually be reduced through chair, desk, keyboard adjustment –what’s comfortable is unique to each person
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition raw material –part of a company’s product capital –used to provide all products Information Has 2 Roles
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Protecting Information Information is threatened by – component failure – carelessness – deliberate attacks
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition white-hat hackers –break in, don’t do damage black-hat hackers –break in, cause trouble crackers –break in for monetary gain script bunnies –use software created by others Hackers
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Most Common Types of Cyber Crime virus: destructive software –macro virus attaches to application –worm spreads easily denial-of-service –many e-businesses hit –can be disastrous
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Security Plan risk management –identification of risks or threats –implementation of security measures –monitoring plan for effectiveness
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Risk Assessment evaluate IT assets –what can go wrong? –how likely is it? –what are the consequences?
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Safeguards backups - ALWAYS firewalls encryption security software
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition a plan of what you’ll do if disaster strikes include consideration of –customers –facilities –knowledge workers –business information –computer equipment –communications infrastructure Disaster Recovery Plan
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Summary ethical behavior is when people act in a principled way, treating everyone with respect & dignity Intellectual property is protected by Copyright, Patent and other laws while employers have access to a great deal of information on employees, employees are entitled to privacy as are consumers the EU has stronger privacy laws than the US culture shock is what you’ll experience if you go to live in another society ergonomics describes the fitting of hardware and furniture to make the user less prone to RSI & other injuries many types of cyber crimes are perpetrated all over the world organizations should have and use an effective security plan