Presentation on theme: "Security, Ethical and Societal Challenges of E-Business"— Presentation transcript:
1 Security, Ethical and Societal Challenges of E-Business Based on James O’Brien’sMIS Managing Information Technology in the E-Business Enterprise 5th Edition 2002Prepared by M. Pineda for Competh 3rd Term SY
2 Aspects of Security, Ethical & Societal Dimensions of E-Business EmploymentPrivacyE-BusinessSecurityEthics & SocietyHealthCrimeIndividualityWorking Conditions
3 Computer Crime, defined by the Assoc. of IT Professionals (AITP) Unauthorized use, access, modification, and destruction of hardware, software, data or network resourcesUnauthorized release of informationUnauthorized copying of softwareDenying an end-user access to his or her own hardware, software, data or network resourcesUsing or conspiring to use computer or network resources to illegally obtain information or tangible property.
4 Hacking (illegal hackers, also called crackers) The obsessive use of computersOr the unauthorized access and use of networked computer systems.Can monitor , web server access, or file transfers to access to extract passwords or steal network files or to plant data that will cause a system to welcome intruders.
5 Hacking issueWhat to do with a hacker who commits only electronic breaking and entering, i.e. gets access to a computer system, reads some files, but neither steals nor damages anything.
6 Common Hacking Tactics Denial of serviceScansSniffer programsSpoofingTrojan HorseBack DoorsMalicious AppletsWar DialingLogic BombsBuffer OverflowPassword CrackersSocial EngineeringDumpster Diving
7 Cyber TheftComputer crimes that involve the unauthorized network entry, fraudulent alteration of computer databases and the theft of moneyExample:
8 Unauthorized Use at Work Also called as Time & Resource TheftUnauthorized use of company-owned computer networks by employees– private consulting, personal finances, playing video games, unauthorized use of the Internet on company networks,
9 Online activities specifically discouraged by corporate policies PornographyGamblingChatShoppingSportsStock tradingJob huntingSource: Net managers Battle Online Trading Boom, Computerworld, July 5, 1999, p. 24. Copyright 1999 by Computerworld, Inc.
10 Software PiracyUnauthorized copying of software is a major form of software theft.Unauthorized copying is illegal because SOFTWARE is intellectual property i.e. protected by copyright law and user licensing agreements.
11 Piracy of Intellectual Property Other forms of copyrighted materials ---music, video, images, articles, books and other written works are especially vulnerable to copyright infringement.Example: P2P networking technologies like Napster, Gnutella and Kazaa have made digital versions of copyrighted materials more vulnerable to unauthorized use.
12 Computer Viruses (or worms) A program code that cannot work without being inserted into another programCopy annoying or destructive routines into the networked computer systems of anyone who accesses computers infected with the virus or who uses copies of magnetic disks taken from infected computers.
13 Subject: Important Message From <name> II. Impact I. DescriptionThe Melissa macro virus propagates in the form of an message containing an infected Word document as an attachment. The transport message has most frequently been reported to contain the following Subject headerSubject: Important Message From <name>II. ImpactUsers who open an infected document in Word97 or Word2000 with macros enabled will infect the Normal.dot template causing any documents referencing this template to be infected with this macro virus. If the infected document is opened by another user, the document, including the macro virus, will propagate. Note that this could cause the user's document to be propagated instead of the original document, and thereby leak sensitive information.Indirectly, this virus could cause a denial of service on mail servers. Many large sites have reported performance problems with their mail servers as a result of the propagation of this virus.III. SolutionsBlock messages with the signature of this virus at your mail transfer agents or other central point of control.
14 CIH/Chernobyl VirusThe CIH virus infects executable files and is spread by executing an infected file. Since many files are executed during normal use of a computer, the CIH virus can infect many files quickly.There are several variants of the CIH virus. Some activate every month on the 26th, while other variants activate just on April 26th or June 26th. Once the CIH virus activates, the virus attempts to erase the entire hard drive and to overwrite the system BIOS. Some machines may require a new BIOS chip to recover if overwritten by the CIH virus. CIH only affects Win95/98 machines.Description
16 Impt. Privacy IssuesAccessing individuals’ private conversations and computer recordsCollecting and sharing information about individuals gained from their visits to Internet websites and newsgroups
17 Impt. Privacy IssuesAlways knowing where a person is, esp. as mobile and paging services become more closely associated with people rather than placesUsing computer info gained from many sources to market additional business servicesCollecting telephone numbers, addresses, credit card numbers & other personal info to build individual customer profiles.
19 SpammingThe indiscriminate sending of unsolicited messages (spam) to many Internet users.Also used to spread computer viruses.
20 FlamingPractice of sending extremely critical, derogatory and often vulgar messages, or newsgroup postings to other users on the internet or online services.
21 Challenges in the Working Conditions Employment issueComputer monitoringIndividuality of employees /peopleHealth issuesHuman factors engineering
22 Ethical Responsibilities Digital artwork byKiran Budhrani
23 Ethical PhilosophiesEGOISM. What is best for a given individual is right.NATURAL LAW. Humans should promote their own health and life, propagate, pursue knowledge of the world and God, pursue close relationships with other people, and submit to legitimate authority.
24 Ethical PhilosophiesUTILITARIANISM. Those actions are right that produce the greatest good for the greatest number of people.RESPECT FOR PERSONS. People should be treated as an end and not as a means to an end; and actions are right if everyone adopts the moral rule presupposed by the action.
25 Western & Non-Western Values Common ValuesKyosei (Japanese): living & working together for the common good.Dharma (Hindu): the fulfillment of inherited duty.Satuthi (Buddhist): the importance of limited desires.Zakat (Muslim): the duty to give alms to the Muslim poor.Individual libertyEgalitarianismPolitical participationHuman rightsRespect for human dignityRespect for basic rightsGood citizenship
26 Business Ethics The stockholder theory The social contract theory The stakeholder theory
27 Ethical Guidelines Be a responsible end user by Acting with integrity, Increasing your professional competence,Setting high standards of personal performance,Accepting responsibility for your work, andAdvancing the health, privacy and general welfare of the public.
28 FOLLOW THE CODE OF ETHICS! The Association of Information Technology Professionals Code of EthicsComputing and Information Systems (Code of Ethics Online)