Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.

Similar presentations


Presentation on theme: "Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i."— Presentation transcript:

1 Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i n e s s E n t e r p r i s e Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. C h a p t e r James A. O’Brien 11 Security and Ethical Challenges of E-Business

2 Sixth Edition James A. O’Brien 2 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Security Ethics and Society Employment Privacy Health Individuality Crime Working Conditions

3 Sixth Edition James A. O’Brien 3 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Computer Crime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses

4 Sixth Edition James A. O’Brien 4 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Employment Challenges Lost Job Opportunities Computer Monitoring Lost Individuality Health Issues Working Conditions

5 Sixth Edition James A. O’Brien 5 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Considerations Ethical Principles –Proportionality –Informed Consent –Justice –Minimized Risk Standard of Conduct –Act with integrity –Protect the privacy and confidentiality of information –Do not misrepresent or withhold information –Do not misuse resources –Do not exploit weakness of systems –Set high standards –Advance the health and welfare of general public

6 Sixth Edition James A. O’Brien 6 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Security Management of E-Business Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses

7 Sixth Edition James A. O’Brien 7 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Other E-Business Security Measures Security Codes Security Monitors Backup Files Biometric Security Controls

8 Sixth Edition James A. O’Brien 8 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Computer System Failure Controls LayerThreatFault Tolerant Methods Fault Tolerant Systems Fail-Over Fail-Safe Fail-Soft

9 Sixth Edition James A. O’Brien 9 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Disaster Recovery Who will participate? What will be their duties? What hardware and software will be used? Priority of applications to be run? What alternative facilities will be used? Where will databases be stored?

10 Sixth Edition James A. O’Brien 10 M a n a g e m e n t I n f o r m a t i o n S y s t e m s Irwin/McGraw-Hill Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. E-Business System Controls and Audits Processing Controls Fire walls Software Hardware Checkpoints Processing Controls Fire walls Software Hardware Checkpoints Storage Controls Input Controls Output Controls Security Codes Encryption Error Signals Security Codes Encryption Backup Files Security Codes Encryption Control Totals User Feedback


Download ppt "Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i."

Similar presentations


Ads by Google