Presentation is loading. Please wait.

Presentation is loading. Please wait.

Add video notes to lecture

Similar presentations


Presentation on theme: "Add video notes to lecture"— Presentation transcript:

1 Add video notes to lecture

2 Issues of the information age
Computer _______ and mistakes Preventing computer related waste & mistakes Computer crime Computer as tool to commit crime Computer as object of crime Preventing computer related crime Privacy issues _______ issues in information systems Patent & copyright issues Health concerns

3 Ethical Issues in Information Systems
“Old contract” vs “Social contract” of business

4 Computer Waste Computer waste
The inappropriate use of computer technology and resources Discarding of technology Unused systems Personal use of corporate time and technology __________

5 Computer-Related Mistakes
Errors, failures, and other computer problems that make computer output incorrect or not useful Mistakes can be caused by unclear expectations and a lack of feedback A programmer might develop a program that contains errors A data-entry clerk might enter the wrong data .

6 Preventing Computer-Related Waste and Mistakes
Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures

7 Types of Computer-Related Mistakes
Table 9.2: Types of Computer-Related Mistakes

8 Useful Policies to Eliminate Waste and Mistakes
? Table 9.3: Useful Policies to Eliminate Waste and Mistakes

9 The Business Challenge
Security – The Business Challenge Who’s the bad guy? Competitors, foreign governments, network hackers, disgruntled ex-employees, news and media, unauthorized customers, employees, etc? How do I protect my information from the bad guys, without making employees and authorized users less productive? Outsiders 20% Insiders 80% How can I administer security consistently, reliably, and cost effectively across all of my distributed information resources ? Studies show 80% of real security problems are caused by authorized users

10 Computer Crime Often defies detection
The amount ________ or diverted can be substantial The crime is “clean” and nonviolent number of IT-related security incidents is increasing Computer crime is now __________

11 The Computer as a Tool to Commit Crime
Criminals need two __________ to commit most computer crimes: Knowing how to gain __________ to the computer system Knowing how to __________ the system to produce the desired result __________ engineering Dumpster diving Cyberterroism & Identity Theft

12 Cyberterrorism Cyberterrorist: intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them

13 Identity Theft An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else The information is then used to obtain credit, merchandise, and services in the name of the victim or to provide the thief with false credentials

14 The Computer as the Object of Crime
Illegal access and use Hackers __________(also called crackers) Script bunnies Insiders Data alteration and destruction Virus Worm Trojan horse Logic bomb Antivirus program

15 The Computer as the Object of Crime (cont)
Information and equipment theft criminal hackers require illegal access to identification numbers and passwords Password sniffer Theft of data and software Theft of computer systems and equipment Software and Internet piracy Software piracy Internet software piracy Computer-related scams Phishing International computer crime

16 How to Respond to a Security Incident
Table 9.4: How to Respond to a Security Incident

17 How to Respond to a Security Incident (continued)
Table 9.4: How to Respond to a Security Incident (continued)

18 Preventing Computer-Related Crime
Crime prevention by corporations Public key infrastructure (PKI Biometrics

19 Common Methods Used to Commit Computer Crimes
Table 9.8: Common Methods Used to Commit Computer Crimes

20 Common Methods Used to Commit Computer Crimes (continued)
Table 9.8: Common Methods Used to Commit Computer Crimes (continued)

21 How to Protect Your Corporate Data from Hackers
Table 9.9: How to Protect Your Corporate Data from Hackers

22 How to Protect Your Corporate Data from Hackers (continued)
Table 9.9: How to Protect Your Corporate Data from Hackers (continued)

23 Preventing Computer-Related Crime (continued)
Intrusion detection system (IDS): __________ that monitors system and network resources and notifies network security personnel when it senses a possible intrusion Managed security service provider (MSSP): an organization that __________ ,manages, and maintains network security hardware and software for its client companies Using

24 Preventing Crime on the Internet
Develop effective __________ usage and security policies Use a stand-alone __________ with network monitoring capabilities Deploy intrusion detection systems, monitor them, and follow up on their alarms Monitor managers and employees Use Internet __________ specialists to perform audits

25 Privacy Issues With information systems, privacy deals with the collection and use or misuse of data Privacy and the federal government Privacy at work privacy Privacy and the Internet

26 Corporate Privacy Policies
Should address a customer’s knowledge, control, notice, and consent over the storage and use of information May cover who has access to private data and when it may be used A good database design practice is to assign a single unique identifier to each customer Corporate Privacy Policies Even though privacy laws for private organizations are not very restrictive, most organizations are very sensitive to privacy issues and fairness. They realize that invasions of privacy can hurt their business, turn away customers, and dramatically reduce revenues and profits. Even though they are not required to maintain privacy policies by law, most organizations do so. Some companies even have a privacy bill of rights that specifies how the privacy of employees, clients, and customers will be protected. Individual Efforts to Protect Privacy There are many things that individuals can do to protect their privacy. These include: Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information

27 Individual Efforts to Protect Privacy
Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information


Download ppt "Add video notes to lecture"

Similar presentations


Ads by Google