Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Similar presentations


Presentation on theme: "Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics."— Presentation transcript:

1 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics

2 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-2 McGraw-Hill Introduction Information systems consist of people, procedures, software, hardware and data.Information systems consist of people, procedures, software, hardware and data. This chapter focuses on people.This chapter focuses on people. Effective implementation of computer technology involves maximizing its positive effects while minimizing its negative effects.Effective implementation of computer technology involves maximizing its positive effects while minimizing its negative effects.

3 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-3 McGraw-Hill People Privacy – What are the threats to personal privacy and how can we protect ourselves?Privacy – What are the threats to personal privacy and how can we protect ourselves? Security – How can access to sensitive information be controlled and how can we secure hardware and software?Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society?Ethics – How do the actions of individual users and companies affect society?

4 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-4 McGraw-Hill Privacy Privacy – concerns the collection and use of data about individualsPrivacy – concerns the collection and use of data about individuals Three primary privacy issues:Three primary privacy issues: –Accuracy –Property –Access

5 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-5 McGraw-Hill Large Databases Federal government alone has over 2,000 databasesFederal government alone has over 2,000 databases Reverse directory compiles lists of the calls we makeReverse directory compiles lists of the calls we make Data gatherersData gatherers –Information resellers or information brokers –Electronic profiles are easily created

6 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-6 McGraw-Hill Large Databases - Issues Your personal information is a marketable commodity, which raises many issues:Your personal information is a marketable commodity, which raises many issues: –Collecting public, but personally identifying information (e.g., Google’s Street View) –Spreading information without personal consent, leading to identity theft –Spreading inaccurate information Mistaken identityMistaken identity Freedom of Information ActFreedom of Information Act

7 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-7 McGraw-Hill Private Networks Employers can monitor e-mail legallyEmployers can monitor e-mail legally –75 percent of all businesses search employees’ electronic mail and computer files using snoopware –A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first

8 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-8 McGraw-Hill The Internet and the Web Illusion of anonymityIllusion of anonymity –People are not concerned about privacy when surfing the Internet or when sending e-mail History file in Web browsersHistory file in Web browsers Traditional cookies from Web surfingTraditional cookies from Web surfing SpywareSpyware –Ad network or adware cookies –Web bugs –Computer monitoring software

9 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-9 McGraw-Hill Viewing and Blocking Cookies

10 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-10 McGraw-Hill Spyware Removal Anti-Spyware programsAnti-Spyware programs –Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers

11 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-11 McGraw-Hill Privacy Law In SA The National Assemble approved a law that will protect people from the illegal use of their private information - 11 Sep 2012 in the. E-mail users will be protected from junk mail People will not need to tolerate unwanted calls at inconvenient times The gathering, publication and selling of computer numbers will be a crime with a maximum of 10 years jail sentence.

12 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-12 McGraw-Hill Security Threats to computer security include criminals, computer crimes, and other hazardsThreats to computer security include criminals, computer crimes, and other hazards Computer criminals:Computer criminals: –Employees –Outside users –Hackers and crackers –Organized crime –Terrorists

13 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-13 McGraw-Hill Computer Crime Malicious ProgramsMalicious Programs –Viruses –Worms –Trojan horse –Zombies Denial of service (DoS) attacksDenial of service (DoS) attacks Internet scams, such as phishingInternet scams, such as phishing Social networking risksSocial networking risks Rogue Wi-Fi hotspotsRogue Wi-Fi hotspots Theft of hardware, software, data, and computer timeTheft of hardware, software, data, and computer time Data manipulationData manipulation

14 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-14 McGraw-Hill Common Internet Scams

15 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-15 McGraw-Hill Other Hazards Natural hazardsNatural hazards –Natural forces such as fires, floods, and tornadoes Civil strife and terrorismCivil strife and terrorism –Wars, riots, and terrorist activities Technological failuresTechnological failures –Voltage surge or spike –Use a surge protector Human errorsHuman errors –Data entry errors –Programmer error

16 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-16 McGraw-Hill Measures to Protect Computer Security Restricting accessRestricting accessRestricting accessRestricting access Encrypting dataEncrypting dataEncrypting dataEncrypting data Anticipating disastersAnticipating disasters Preventing data lossPreventing data loss

17 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-17 McGraw-Hill Restricting Access Biometric scanningBiometric scanning –Fingerprint scanners –Iris (eye) scanners PasswordsPasswords FirewallsFirewalls Return

18 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-18 McGraw-Hill Encrypting Data Encryption is the process of coding information to make it unreadable, except to those who have the keyEncryption is the process of coding information to make it unreadable, except to those who have the key –E-mail encryption –File encryption –Web site encryption –Virtual private networks (VPNs) –Wireless network encryption Return

19 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-19 McGraw-Hill Ethics CopyrightCopyright –Gives content creators the right to control the use and distribution of their work Software piracySoftware piracy –Unauthorized copying and distribution –Digital Millennium Copyright Act –Digital rights management (DRM) PlagiarismPlagiarism

20 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-20 McGraw-Hill VRAE?

21 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 11: Your Future and Information Technology

22 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-22 McGraw-Hill Changing Times BanksBanks –ATM –ATM cards –Internet banking –S/w verify signatures

23 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-23 McGraw-Hill Technology and Organizations New ProductsNew Products New EnterprisesNew Enterprises New Customer and Supplier RelationshipsNew Customer and Supplier Relationships

24 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-24 McGraw-Hill How You Can Be a Winner Stay Current – journals, conferences Maintain Your Computer Competency – books, journals, trade associations Develop Professional Contacts Develop Specialties Be alert for Organizational Change Look for Innovative Opportunities

25 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-25 McGraw-Hill VRAE?

26 Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-26 McGraw-Hill Chapter 10 + 11 STUDY p308 – 313 p331 – 336 VISUAL SUMMARYVISUAL SUMMARY KEY TERMSKEY TERMS MULTIPLE CHOICE Q’sMULTIPLE CHOICE Q’s MATCHING Q’sMATCHING Q’s


Download ppt "Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics."

Similar presentations


Ads by Google