Security, Privacy, and Ethical Issues in Information Systems and the Internet - PowerPoint PPT Presentation

1 / 40
About This Presentation
Title:

Security, Privacy, and Ethical Issues in Information Systems and the Internet

Description:

Policies and procedures must be established to avoid computer waste and mistakes. ... Ergonomics. Principles of Information Systems, Sixth Edition ... – PowerPoint PPT presentation

Number of Views:354
Avg rating:3.0/5.0
Slides: 41
Provided by: new456
Category:

less

Transcript and Presenter's Notes

Title: Security, Privacy, and Ethical Issues in Information Systems and the Internet


1
Security, Privacy, and Ethical Issues in
Information Systems and the Internet
  • Chapter 14

2
Principles and Learning Objectives
  • Policies and procedures must be established to
    avoid computer waste and mistakes.
  • Describe some examples of waste and mistakes in
    an IS environment, their causes, and possible
    solutions.
  • Identify policies and procedures useful in
    eliminating waste and mistakes.

3
Principles and Learning Objectives
  • Computer crime is a serious and rapidly growing
    area of concern requiring management attention.
  • Explain the types and effects of computer crime.
  • Identify specific measures to prevent computer
    crime.
  • Discuss the principles and limits of an
    individuals right to privacy.

4
Principles and Learning Objectives
  • Jobs, equipment, and working conditions must be
    designed to avoid negative health effects.
  • List the important effects of computers on the
    work environment.
  • Identify specific actions that must be taken to
    ensure the health and safety of employees.
  • Outline criteria for the ethical use of
    information systems.

5
Social Issues in Information Systems
6
Computer Waste Mistakes
7
Computer Waste
  • Discard technology
  • Unused systems
  • Personal use of corporate time and technology

8
Preventing Computer Waste and Mistakes
  • Establish Policies and Procedures
  • Implement Policies and Procedures
  • Monitor Policies and Procedures
  • Review Policies and Procedures

9
Preventing Computer-Related Waste and Mistakes
10
Implementing Policies and Procedures
11
Computer Crime
12
Number of Incidents Reported to CERT
13
Computer Crime and Security Survey
14
The Computer as a Tool to Commit Crime
  • Social engineering
  • Dumpster diving
  • Identity theft
  • Cyberterrorism

15
Computers as Objects of Crime
  • Illegal access and use
  • Hackers vs. crackers
  • Script bunnies
  • Insiders

16
Illegal Access and Use
17
Data Alteration and Destruction
  • Virus
  • Application virus
  • System virus
  • Macro virus
  • Worm
  • Logic bomb

18
Data Alteration and Destruction
19
Top Viruses July 2002
20
Top Viruses July 2002
21
Computers as Objects of Crime
  • Information and equipment theft
  • Software and Internet piracy
  • Computer-related scams
  • International computer crime

22
Preventing Computer-Related Crime
  • Crime prevention by state and federal agencies
  • Crime prevention by corporations
  • Public Key Infrastructure (PKI)
  • Biometrics
  • Antivirus programs

23
Preventing Computer-Related Crime
  • Intrusion Detection Software
  • Managed Security Service Providers (MSSPs)
  • Internet Laws for Libel and Protection of Decency

24
Preventing Crime on the Internet
  • Develop effective Internet and security policies
  • Use a stand-alone firewall with network
    monitoring capabilities
  • Monitor managers and employees
  • Use Internet security specialists to perform
    audits

25
Common Methods Used to Commit Computer Crimes
26
How to Protect Your Corporate Data from Hackers
27
Privacy
28
Privacy Issues
  • Privacy and the Federal Government
  • Privacy at work
  • E-mail privacy
  • Privacy and the Internet

29
Using Antivirus Programs
30
Fairness and Information Use
31
Federal Privacy Laws and Regulations
  • The Privacy Act of 1979
  • Gramm-Leach-Bliley Act
  • USA Patriot Act

32
Other Federal Privacy Laws
33
Other Federal Privacy Laws
34
The Work Environment
35
Health Concerns
  • Repetitive stress injury (RSI)
  • Carpal tunnel syndrome (CTS)
  • Ergonomics

36
Avoiding Health and Environment Problems
  • Maintain good posture and positioning.
  • Dont ignore pain or discomfort.
  • Use stretching and strengthening exercises.
  • Find a good physician who is familiar with RSI
    and how to treat it.

37
Medical Topics on the Internet
38
Ethical Issues in Information Systems
  • The AITP Code of Ethics
  • Obligation to management
  • Obligation to fellow AITP members
  • Obligation to society
  • The ACM Code of Professional Conduct
  • Acquire and maintain professional competence

39
AITP Code of Ethics
40
Summary
  • Computer waste - the inappropriate use of
    computer technology and resources in both the
    public and private sectors
  • Software and Internet piracy - represent the most
    common computer crime
  • Ethics - determine generally accepted and
    discouraged activities within a company
Write a Comment
User Comments (0)
About PowerShow.com