Download presentation
Presentation is loading. Please wait.
Published byNigel Arnold Modified over 8 years ago
1
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information and People
2
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Knowledge Workers Checklist the importance of ethics privacy accommodating diversity information and its protection
3
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ethics doing what’s right acting in a principled way treating others with respect & dignity not always simple to determine what’s right
4
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Practical Circumstances in Ethical Dilemma consequences society’s opinion likelihood of effect time to consequences relatedness reach of result
5
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Intellectual Property intangible creative work in physical form
6
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Fair Use Doctrine provides exceptions to copyright can use in particular situations rules for software –one copy for self –pirated software cost $12 billion in 1999
7
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition employers can easily get your –credit standing –telephone use patterns –insurance coverage –comments you make on Internet Privacy & Employees
8
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Consumers businesses face a dilemma –how much information is enough? –need to know what consumer wants to provide mass customization –consumers want privacy special software helps consumer stay anonymous
9
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Government National Crime Info Center –criminal records of 20 million people –linked to other databases Internal Revenue Service (IRS) –information on all taxpayers Census Bureau –makes info available to other agencies
10
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition safe-harbor principles –business must practice to trade with European Union (EU) –EU has strong privacy laws Privacy & International Trade
11
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Cultural Diversity cultural diversity causes culture shock three stages of adjustment
12
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ergonomics design & arrange workplace to minimize damage to humans repetitive strain injury (RSI) –can usually be reduced through chair, desk, keyboard adjustment –what’s comfortable is unique to each person
13
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition raw material –part of a company’s product capital –used to provide all products Information Has 2 Roles
14
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Protecting Information Information is threatened by – component failure – carelessness – deliberate attacks
15
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition white-hat hackers –break in, don’t do damage black-hat hackers –break in, cause trouble crackers –break in for monetary gain script bunnies –use software created by others Hackers
16
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Most Common Types of Cyber Crime virus: destructive software –macro virus attaches to application –worm spreads easily denial-of-service –many e-businesses hit –can be disastrous
17
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Security Plan risk management –identification of risks or threats –implementation of security measures –monitoring plan for effectiveness
18
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Risk Assessment evaluate IT assets –what can go wrong? –how likely is it? –what are the consequences?
19
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Safeguards backups - ALWAYS firewalls encryption security software
20
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition a plan of what you’ll do if disaster strikes include consideration of –customers –facilities –knowledge workers –business information –computer equipment –communications infrastructure Disaster Recovery Plan
21
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Summary ethical behavior is when people act in a principled way, treating everyone with respect & dignity Intellectual property is protected by Copyright, Patent and other laws while employers have access to a great deal of information on employees, employees are entitled to privacy as are consumers the EU has stronger privacy laws than the US culture shock is what you’ll experience if you go to live in another society ergonomics describes the fitting of hardware and furniture to make the user less prone to RSI & other injuries many types of cyber crimes are perpetrated all over the world organizations should have and use an effective security plan
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.