Principles of Information Systems - Chapter 14

40
Principles of Information Sy stems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14

description

Principles of Information Systems Sixth Edition, Written by Ralph Star, George Reynolds

Transcript of Principles of Information Systems - Chapter 14

Page 1: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Security, Privacy, and Ethical Issues in Information Systems and

the Internet

Chapter 14

Page 2: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Principles and Learning Objectives

• Policies and procedures must be established to avoid computer waste and mistakes.

– Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions.

– Identify policies and procedures useful in eliminating waste and mistakes.

Page 3: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Principles and Learning Objectives

• Computer crime is a serious and rapidly growing area of concern requiring management attention.

– Explain the types and effects of computer crime.– Identify specific measures to prevent computer crime.– Discuss the principles and limits of an individual’s

right to privacy.

Page 4: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Principles and Learning Objectives

• Jobs, equipment, and working conditions must be designed to avoid negative health effects.

– List the important effects of computers on the work environment.

– Identify specific actions that must be taken to ensure the health and safety of employees.

– Outline criteria for the ethical use of information systems.

Page 5: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Social Issues in Information Systems

Page 6: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Computer Waste & Mistakes

Page 7: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Computer Waste

• Discard technology• Unused systems• Personal use of corporate time and technology

Page 8: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Preventing Computer Waste and Mistakes

• Establish Policies and Procedures• Implement Policies and Procedures• Monitor Policies and Procedures• Review Policies and Procedures

Page 9: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Preventing Computer-Related Waste and Mistakes

Page 10: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Implementing Policies and Procedures

Page 11: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Computer Crime

Page 12: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Number of Incidents Reported to CERT

Page 13: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Computer Crime and Security Survey

Page 14: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

The Computer as a Tool to Commit Crime

• Social engineering• Dumpster diving• Identity theft• Cyberterrorism

Page 15: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Computers as Objects of Crime

• Illegal access and use– Hackers vs. crackers– Script bunnies– Insiders

Page 16: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Illegal Access and Use

Page 17: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Data Alteration and Destruction

• Virus– Application virus– System virus– Macro virus

• Worm• Logic bomb

Page 18: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Data Alteration and Destruction

Page 19: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Top Viruses – July 2002

Page 20: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Top Viruses – July 2002

Page 21: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Computers as Objects of Crime

• Information and equipment theft• Software and Internet piracy• Computer-related scams• International computer crime

Page 22: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Preventing Computer-Related Crime

• Crime prevention by state and federal agencies• Crime prevention by corporations

– Public Key Infrastructure (PKI)– Biometrics

• Antivirus programs

Page 23: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Preventing Computer-Related Crime

• Intrusion Detection Software• Managed Security Service Providers (MSSPs)• Internet Laws for Libel and Protection of

Decency

Page 24: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Preventing Crime on the Internet

• Develop effective Internet and security policies• Use a stand-alone firewall with network monitoring

capabilities• Monitor managers and employees• Use Internet security specialists to perform audits

Page 25: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Common Methods Used to Commit Computer Crimes

Page 26: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

How to Protect Your Corporate Data from Hackers

Page 27: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Privacy

Page 28: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Privacy Issues

• Privacy and the Federal Government• Privacy at work• E-mail privacy• Privacy and the Internet

Page 29: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Using Antivirus Programs

Page 30: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Fairness and Information Use

Page 31: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Federal Privacy Laws and Regulations

• The Privacy Act of 1979• Gramm-Leach-Bliley Act• USA Patriot Act

Page 32: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Other Federal Privacy Laws

Page 33: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Other Federal Privacy Laws

Page 34: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

The Work Environment

Page 35: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Health Concerns

• Repetitive stress injury (RSI)• Carpal tunnel syndrome (CTS)• Ergonomics

Page 36: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Avoiding Health and Environment Problems

• Maintain good posture and positioning.• Don’t ignore pain or discomfort.• Use stretching and strengthening exercises.• Find a good physician who is familiar with RSI and how

to treat it.

Page 37: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Medical Topics on the Internet

Page 38: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Ethical Issues in Information Systems

• The AITP Code of Ethics– Obligation to management– Obligation to fellow AITP members– Obligation to society

• The ACM Code of Professional Conduct– Acquire and maintain professional competence

Page 39: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

AITP Code of Ethics

Page 40: Principles of Information Systems - Chapter 14

Principles of Information Systems, Sixth Edition

Summary

• Computer waste - the inappropriate use of computer technology and resources in both the public and private sectors

• Software and Internet piracy - represent the most common computer crime

• Ethics - determine generally accepted and discouraged activities within a company