Presentation is loading. Please wait.

Presentation is loading. Please wait.

8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.

Similar presentations


Presentation on theme: "8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility."— Presentation transcript:

1 8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility controls Network security, encryption, fire walls, physical, biometrics, failure controls Hackers: H2K convention –Procedural controls SOPs, authorization req’s, disaster recovery, people –Auditing Around, through; verifying accuracy of data & software Control logs

2 Ethics in IT: Overview Ethical foundations –Philosophies: egoism, natural law, utilitarianism, respect for people –Values: liberty, peace, human dignity, citizenship, charity –Models: behavioral stages, behavioral models Business ethics –Stockholder theory, social contract theory, stakeholder theory –Information ethics: issues: privacy, accuracy, property, accessibility –IT & employment: Luddites revisited –IT & individuality: dehumanization –IT & working conditions: more interesting/less interesting work, ergonomics

3 Ethics in IT: Privacy Issues Computer monitoring: keystroke recording, GPS Database conglomeration: Post office’s email idea Tracking users on the Internet Email privacy: does your company have a policy? Laws: –Electronic Communications Privacy Act (1986) –Computer Fraud & Abuse Act (1986) Censorship: spam, flaming, pornography, hate sites –www.walmartsucks.comwww.walmartsucks.com –Communications Decency Act (1996 - dead)

4 Ethics in IT: Crime Trespassing: hackers –Good hackers & bad hackers? Money theft Service theft Software theft –Digital Millenium Copyright Act Data theft Computer viruses


Download ppt "8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility."

Similar presentations


Ads by Google