Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.

Similar presentations


Presentation on theme: "McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information."— Presentation transcript:

1 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information and People

2 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Knowledge Workers Checklist the importance of ethics privacy accommodating diversity information and its protection

3 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ethics doing what’s right acting in a principled way treating others with respect & dignity not always simple to determine what’s right

4 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Practical Circumstances in Ethical Dilemma consequences society’s opinion likelihood of effect time to consequences relatedness reach of result

5 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Intellectual Property intangible creative work in physical form

6 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Fair Use Doctrine provides exceptions to copyright can use in particular situations rules for software –one copy for self –pirated software cost $12 billion in 1999

7 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition employers can easily get your –credit standing –telephone use patterns –insurance coverage –comments you make on Internet Privacy & Employees

8 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Consumers businesses face a dilemma –how much information is enough? –need to know what consumer wants to provide mass customization –consumers want privacy special software helps consumer stay anonymous

9 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Privacy & Government National Crime Info Center –criminal records of 20 million people –linked to other databases Internal Revenue Service (IRS) –information on all taxpayers Census Bureau –makes info available to other agencies

10 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition safe-harbor principles –business must practice to trade with European Union (EU) –EU has strong privacy laws Privacy & International Trade

11 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Cultural Diversity cultural diversity causes culture shock three stages of adjustment

12 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Ergonomics design & arrange workplace to minimize damage to humans repetitive strain injury (RSI) –can usually be reduced through chair, desk, keyboard adjustment –what’s comfortable is unique to each person

13 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition raw material –part of a company’s product capital –used to provide all products Information Has 2 Roles

14 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Protecting Information Information is threatened by – component failure – carelessness – deliberate attacks

15 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition white-hat hackers –break in, don’t do damage black-hat hackers –break in, cause trouble crackers –break in for monetary gain script bunnies –use software created by others Hackers

16 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Most Common Types of Cyber Crime virus: destructive software –macro virus attaches to application –worm spreads easily denial-of-service –many e-businesses hit –can be disastrous

17 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Security Plan risk management –identification of risks or threats –implementation of security measures –monitoring plan for effectiveness

18 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Risk Assessment evaluate IT assets –what can go wrong? –how likely is it? –what are the consequences?

19 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Safeguards backups - ALWAYS firewalls encryption security software

20 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition a plan of what you’ll do if disaster strikes include consideration of –customers –facilities –knowledge workers –business information –computer equipment –communications infrastructure Disaster Recovery Plan

21 McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Haag Cummings McCubbrey Third Edition Summary ethical behavior is when people act in a principled way, treating everyone with respect & dignity Intellectual property is protected by Copyright, Patent and other laws while employers have access to a great deal of information on employees, employees are entitled to privacy as are consumers the EU has stronger privacy laws than the US culture shock is what you’ll experience if you go to live in another society ergonomics describes the fitting of hardware and furniture to make the user less prone to RSI & other injuries many types of cyber crimes are perpetrated all over the world organizations should have and use an effective security plan


Download ppt "McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information."

Similar presentations


Ads by Google