Suche senden
Hochladen
Chap011 MIS
•
Als PPT, PDF herunterladen
•
5 gefällt mir
•
2,074 views
AMIT ROY
Folgen
Business
Wirtschaft & Finanzen
Melden
Teilen
Melden
Teilen
1 von 78
Jetzt herunterladen
Empfohlen
Chap002 MIS
Chap002 MIS
AMIT ROY
Chap010 MIS
Chap010 MIS
AMIT ROY
Chap013 MIS
Chap013 MIS
AMIT ROY
Chap005 MIS
Chap005 MIS
AMIT ROY
Chap003 MIS
Chap003 MIS
AMIT ROY
Chap009 MIS
Chap009 MIS
AMIT ROY
Chap006 MIS
Chap006 MIS
AMIT ROY
Chap001 MIS
Chap001 MIS
AMIT ROY
Empfohlen
Chap002 MIS
Chap002 MIS
AMIT ROY
Chap010 MIS
Chap010 MIS
AMIT ROY
Chap013 MIS
Chap013 MIS
AMIT ROY
Chap005 MIS
Chap005 MIS
AMIT ROY
Chap003 MIS
Chap003 MIS
AMIT ROY
Chap009 MIS
Chap009 MIS
AMIT ROY
Chap006 MIS
Chap006 MIS
AMIT ROY
Chap001 MIS
Chap001 MIS
AMIT ROY
Chap008 MIS
Chap008 MIS
AMIT ROY
Chap007 MIS
Chap007 MIS
AMIT ROY
MM Marketing - 10-Step Marketing Plan - by 3Musketeers
MM Marketing - 10-Step Marketing Plan - by 3Musketeers
emmanueljunio
Chap004 MIS
Chap004 MIS
AMIT ROY
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT Governance
Magdalena Bezuidenhout
Keynote by Mario Derba at Optimized Data Center event, Milano
Keynote by Mario Derba at Optimized Data Center event, Milano
Mario Derba
Business continuity whitepaper - Surviving Telecoms at all costs
Business continuity whitepaper - Surviving Telecoms at all costs
Sean van der Walt
Keynote by Mario Derba at Oracle Optimized Data Center event in Paris
Keynote by Mario Derba at Oracle Optimized Data Center event in Paris
Mario Derba
IT Enabled Higher Education
IT Enabled Higher Education
Infosys
IBM Software Story
IBM Software Story
Strategy Advisory Group
Demystifying cloud computing with IBM POWER Systems and IBM i
Demystifying cloud computing with IBM POWER Systems and IBM i
COMMON Europe
The IBM Software Story (2)
The IBM Software Story (2)
Strategy Advisory Group
2011 ibm cio study energy utilities
2011 ibm cio study energy utilities
John Juliano
BCS APSG The landscape of enterprise applications
BCS APSG The landscape of enterprise applications
Geoff Sharman
Why good social internal comms creates social external comms
Why good social internal comms creates social external comms
Capgemini
Summary HIMSS Preparation Briefing
Summary HIMSS Preparation Briefing
Paul Woudstra
case study on baxter inc(MIS)
case study on baxter inc(MIS)
rysoomro
An EBS Retirement Party - You're Uninvited
An EBS Retirement Party - You're Uninvited
eprentise
IBM zEnterprise: Healthcare
IBM zEnterprise: Healthcare
Strategy Advisory Group
Chapter 1 Lecture
Chapter 1 Lecture
JEngle
Chapter 03 MKT120 Ethics
Chapter 03 MKT120 Ethics
Deborah Oronzio
mis-slide-obrien.pdf
mis-slide-obrien.pdf
metriohanzel
Weitere ähnliche Inhalte
Was ist angesagt?
Chap008 MIS
Chap008 MIS
AMIT ROY
Chap007 MIS
Chap007 MIS
AMIT ROY
MM Marketing - 10-Step Marketing Plan - by 3Musketeers
MM Marketing - 10-Step Marketing Plan - by 3Musketeers
emmanueljunio
Chap004 MIS
Chap004 MIS
AMIT ROY
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT Governance
Magdalena Bezuidenhout
Keynote by Mario Derba at Optimized Data Center event, Milano
Keynote by Mario Derba at Optimized Data Center event, Milano
Mario Derba
Business continuity whitepaper - Surviving Telecoms at all costs
Business continuity whitepaper - Surviving Telecoms at all costs
Sean van der Walt
Keynote by Mario Derba at Oracle Optimized Data Center event in Paris
Keynote by Mario Derba at Oracle Optimized Data Center event in Paris
Mario Derba
IT Enabled Higher Education
IT Enabled Higher Education
Infosys
IBM Software Story
IBM Software Story
Strategy Advisory Group
Demystifying cloud computing with IBM POWER Systems and IBM i
Demystifying cloud computing with IBM POWER Systems and IBM i
COMMON Europe
The IBM Software Story (2)
The IBM Software Story (2)
Strategy Advisory Group
2011 ibm cio study energy utilities
2011 ibm cio study energy utilities
John Juliano
BCS APSG The landscape of enterprise applications
BCS APSG The landscape of enterprise applications
Geoff Sharman
Why good social internal comms creates social external comms
Why good social internal comms creates social external comms
Capgemini
Summary HIMSS Preparation Briefing
Summary HIMSS Preparation Briefing
Paul Woudstra
case study on baxter inc(MIS)
case study on baxter inc(MIS)
rysoomro
An EBS Retirement Party - You're Uninvited
An EBS Retirement Party - You're Uninvited
eprentise
IBM zEnterprise: Healthcare
IBM zEnterprise: Healthcare
Strategy Advisory Group
Chapter 1 Lecture
Chapter 1 Lecture
JEngle
Was ist angesagt?
(20)
Chap008 MIS
Chap008 MIS
Chap007 MIS
Chap007 MIS
MM Marketing - 10-Step Marketing Plan - by 3Musketeers
MM Marketing - 10-Step Marketing Plan - by 3Musketeers
Chap004 MIS
Chap004 MIS
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT Governance
Keynote by Mario Derba at Optimized Data Center event, Milano
Keynote by Mario Derba at Optimized Data Center event, Milano
Business continuity whitepaper - Surviving Telecoms at all costs
Business continuity whitepaper - Surviving Telecoms at all costs
Keynote by Mario Derba at Oracle Optimized Data Center event in Paris
Keynote by Mario Derba at Oracle Optimized Data Center event in Paris
IT Enabled Higher Education
IT Enabled Higher Education
IBM Software Story
IBM Software Story
Demystifying cloud computing with IBM POWER Systems and IBM i
Demystifying cloud computing with IBM POWER Systems and IBM i
The IBM Software Story (2)
The IBM Software Story (2)
2011 ibm cio study energy utilities
2011 ibm cio study energy utilities
BCS APSG The landscape of enterprise applications
BCS APSG The landscape of enterprise applications
Why good social internal comms creates social external comms
Why good social internal comms creates social external comms
Summary HIMSS Preparation Briefing
Summary HIMSS Preparation Briefing
case study on baxter inc(MIS)
case study on baxter inc(MIS)
An EBS Retirement Party - You're Uninvited
An EBS Retirement Party - You're Uninvited
IBM zEnterprise: Healthcare
IBM zEnterprise: Healthcare
Chapter 1 Lecture
Chapter 1 Lecture
Ähnlich wie Chap011 MIS
Chapter 03 MKT120 Ethics
Chapter 03 MKT120 Ethics
Deborah Oronzio
mis-slide-obrien.pdf
mis-slide-obrien.pdf
metriohanzel
Chap012 MIS
Chap012 MIS
AMIT ROY
Ethics1
Ethics1
ajaywelk123
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
Dell EMC World
Security Principles for CEOs
Security Principles for CEOs
Morten Bjørklund
BUS 300 Chapter 2
BUS 300 Chapter 2
BHUOnlineDepartment
Chap014 MIS
Chap014 MIS
AMIT ROY
Ethics and software engineering
Ethics and software engineering
Solomon Nsumba
Chap 4 conducting business ethically and responsibly 2
Chap 4 conducting business ethically and responsibly 2
Pimsat.University.Karachi
ARC MGMT 374 Week 1 Presentation
ARC MGMT 374 Week 1 Presentation
Michael Hill
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA Student
AG RD
Chapter4
Chapter4
fletchercj
03 ethical issues in business
03 ethical issues in business
Nimantha Perera
Security Testing for Testing Professionals
Security Testing for Testing Professionals
TechWell
Mba 2011 12 ethics unit - session 4
Mba 2011 12 ethics unit - session 4
mishkasagar
Chpt03
Chpt03
Ahmad Wali Zia
Chapter 1
Chapter 1
ssuser3301be1
4. ETHICS IN ENGINEERING (ETC) 3130004 GTU
4. ETHICS IN ENGINEERING (ETC) 3130004 GTU
VATSAL PATEL
Ähnlich wie Chap011 MIS
(20)
Chapter 03 MKT120 Ethics
Chapter 03 MKT120 Ethics
mis-slide-obrien.pdf
mis-slide-obrien.pdf
Chap012 MIS
Chap012 MIS
Ethics1
Ethics1
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
Security Principles for CEOs
Security Principles for CEOs
BUS 300 Chapter 2
BUS 300 Chapter 2
Chap014 MIS
Chap014 MIS
Ethics and software engineering
Ethics and software engineering
Chap 4 conducting business ethically and responsibly 2
Chap 4 conducting business ethically and responsibly 2
ARC MGMT 374 Week 1 Presentation
ARC MGMT 374 Week 1 Presentation
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Chapter4
Chapter4
03 ethical issues in business
03 ethical issues in business
Security Testing for Testing Professionals
Security Testing for Testing Professionals
Mba 2011 12 ethics unit - session 4
Mba 2011 12 ethics unit - session 4
Chpt03
Chpt03
Chapter 1
Chapter 1
4. ETHICS IN ENGINEERING (ETC) 3130004 GTU
4. ETHICS IN ENGINEERING (ETC) 3130004 GTU
Mehr von AMIT ROY
Strategy Presentation.pdf
Strategy Presentation.pdf
AMIT ROY
Google adwords Introduction
Google adwords Introduction
AMIT ROY
YouTube Optimization
YouTube Optimization
AMIT ROY
Hummingbird An Overview
Hummingbird An Overview
AMIT ROY
Project Marketing
Project Marketing
AMIT ROY
Amit research report
Amit research report
AMIT ROY
Monetary policy 2012
Monetary policy 2012
AMIT ROY
Commercial Banks notes
Commercial Banks notes
AMIT ROY
NBFC notes
NBFC notes
AMIT ROY
(Amit roy)final research report.pdf 2
(Amit roy)final research report.pdf 2
AMIT ROY
Plastic money
Plastic money
AMIT ROY
mutual funds
mutual funds
AMIT ROY
Intl retailng
Intl retailng
AMIT ROY
1010 chapter1
1010 chapter1
AMIT ROY
Mutual funds
Mutual funds
AMIT ROY
Assignment
Assignment
AMIT ROY
commercial banks in india
commercial banks in india
AMIT ROY
Mehr von AMIT ROY
(17)
Strategy Presentation.pdf
Strategy Presentation.pdf
Google adwords Introduction
Google adwords Introduction
YouTube Optimization
YouTube Optimization
Hummingbird An Overview
Hummingbird An Overview
Project Marketing
Project Marketing
Amit research report
Amit research report
Monetary policy 2012
Monetary policy 2012
Commercial Banks notes
Commercial Banks notes
NBFC notes
NBFC notes
(Amit roy)final research report.pdf 2
(Amit roy)final research report.pdf 2
Plastic money
Plastic money
mutual funds
mutual funds
Intl retailng
Intl retailng
1010 chapter1
1010 chapter1
Mutual funds
Mutual funds
Assignment
Assignment
commercial banks in india
commercial banks in india
Kürzlich hochgeladen
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Seta Wicaksana
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Dave Litwiller
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
NZSG
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Dipal Arora
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
P&CO
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
hemanthkumar470700
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
IlamathiKannappan
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
P&CO
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
Neil Kimberley
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Seo
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Damini Dixit
Phases of Negotiation .pptx
Phases of Negotiation .pptx
nandhinijagan9867
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
Kürzlich hochgeladen
(20)
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Phases of Negotiation .pptx
Phases of Negotiation .pptx
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Chap011 MIS
1.
1 Chapter 11
Security and Ethical Challenges McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
2.
2
Learning Objectives Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
3.
3
Learning Objectives (continued) Identify types of security management strategies and defenses, and explain how they can be used to ensure the security of e-business applications. How can business managers and professionals help to lessen the harmful effects and increase the beneficial effects of the use of information technology? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
4.
4
Section I Security, Ethical, and Societal Challenges McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
5.
5
Ethical Responsibility The use of IT presents major security challenges, poses serious ethical questions, and affects society in significant ways. IT raises ethical issues in the areas of.. Crime Privacy Individuality Employment Health Working conditions McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
6.
6
Ethical Responsibility (continued) But, IT has had beneficial results as well. So as managers, it is our responsibility to minimize the detrimental effects and optimize the beneficial effects. McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
7.
7
Ethical Responsibility (continued) Business Ethics Basic categories of ethical issues Employee privacy Security of company records Workplace safety McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
8.
8
Ethical Responsibility (continued) Theories of corporate social responsibility Stockholder theory Managers are agents of the stockholders. Their only ethical responsibility is to increase profit without violating the law or engaging in fraud McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
9.
9
Ethical Responsibility (continued) Theories of corporate social responsibility (continued) Social Contract Theory Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
10.
10
Ethical Responsibility (continued) Theories of corporate social responsibility (continued) First condition – companies must enhance economic satisfaction of consumers and employees Second condition – avoid fraudulent practices, show respect for employees as human beings, and avoid practices that systematically worsen the position of any group in society McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
11.
11
Ethical Responsibility (continued) Theories of corporate social responsibility (continued) Stakeholder theory Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders. Stockholders Employees Customers Suppliers Local community McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
12.
12
Ethical Responsibility (continued) Theories of corporate social responsibility (continued) Sometimes stakeholders are considered to include Competitors Government agencies and special interest groups Future generations McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
13.
13
Ethical Responsibility (continued) Technology Ethics Four Principles Proportionality Good must outweigh any harm or risk Must be no alternative that achieves the same or comparable benefits with less harm or risk McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
14.
14
Ethical Responsibility (continued) Technology Ethics (continued) Informed consent Those affected should understand and accept the risks Justice Benefits and burdens should be distributed fairly McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
15.
15
Ethical Responsibility (continued) Technology Ethics (continued) Minimized Risk Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
16.
16
Ethical Responsibility (continued) Ethical Guidelines McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
17.
17
Ethical Responsibility (continued) Ethical guidelines (continued) Responsible end users Act with integrity Increase their professional competence Set high standards of personal performance Accept responsibility for their work Advance the health, privacy, and general welfare of the public McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
18.
18
Computer Crime Association of Information Technology Professionals (AITP) definition includes The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources Unauthorized release of information Unauthorized copying of software McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
19.
19
Computer Crime (continued) AITP guidelines (continued) Denying an end user his/her own hardware, software, data, or network resources Using or conspiring to use computer or network resources to illegally obtain info or tangible property McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
20.
20
Computer Crime (continued) Hacking The obsessive use of computers, or the unauthorized access and use of networked computer systems McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
21.
21
Computer Crime (continued) Cyber Theft Involves unauthorized network entry and the fraudulent alteration of computer databases McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
22.
22
Computer Crime (continued) Unauthorized use at work Also called time and resource theft May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
23.
23
Computer Crime (continued) Software Piracy Unauthorized copying of software Software is intellectual property protected by copyright law and user licensing agreements McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
24.
24
Computer Crime (continued) Piracy of intellectual property Other forms of intellectual property covered by copyright laws Music Videos Images Articles Books Other written works McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
25.
25
Computer Crime (continued) Computer viruses and worms Virus A program that cannot work without being inserted into another program Worm A distinct program that can run unaided McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
26.
26
Privacy Issues IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily. Benefit – increases efficiency and effectiveness But, may also have a negative effect on individual’s right to privacy McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
27.
27
Privacy Issues (continued) Examples of important privacy issues Accessing private e-mail and computer records & sharing information about individuals gained from their visits to websites and newsgroups Always knowing where a person is via mobile and paging services McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
28.
28
Privacy Issues (continued) Examples of important privacy issues (continued) Using customer information obtained from many sources to market additional business services Collecting personal information to build individual customer profiles McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
29.
29
Privacy Issues (continued) Privacy on the Internet Users of the Internet are highly visible and open to violations of privacy Unsecured with no real rules Cookies capture information about you every time you visit a site That information may be sold to third parties McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
30.
30
Privacy Issues (continued) Privacy on the Internet (continued) Protect your privacy by Encrypting your messages Post to newsgroups through anonymous remailers Ask your ISP not to sell your information to mailing list providers and other marketers Decline to reveal personal data and interests online McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
31.
31
Privacy Issues (continued) Computer matching Computer profiling and matching personal data to that profile Mistakes can be a major problem McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
32.
32
Privacy Issues (continued) Privacy laws Attempt to enforce the privacy of computer- based files and communications Electronic Communications Privacy Act Computer Fraud and Abuse Act McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
33.
33
Privacy Issues (continued) Computer Libel and Censorship The opposite side of the privacy debate Right to know (freedom of information) Right to express opinions (freedom of speech) Right to publish those opinions (freedom of the press) Spamming Flaming McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
34.
34
Other Challenges Employment New jobs have been created and productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT. McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
35.
35
Other Challenges (continued) Computer Monitoring Concerns workplace privacy Monitors individuals, not just work Is done continually. May be seen as violating workers’ privacy & personal freedom Workers may not know that they are being monitored or how the information is being used May increase workers’ stress level May rob workers of the dignity of their work McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
36.
36
Other Challenges (continued) Working Conditions IT has eliminated many monotonous, obnoxious tasks, but has created others McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
37.
37
Other Challenges (continued) Individuality Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities Regimentation McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
38.
38
Health Issues Job stress Muscle damage Eye strain Radiation exposure Accidents Some solutions Ergonomics (human factors engineering) Goal is to design healthy work environments McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
39.
39
Health Issues (continued) McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
40.
40
Societal Solutions Beneficial effects on society Solve human and social problems Medical diagnosis Computer-assisted instruction Governmental program planning Environmental quality control Law enforcement Crime control Job placement McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
41.
41
Section II Security Management McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
42.
42
Tools of Security Management Goal Minimize errors, fraud, and losses in the e- business systems that interconnect businesses with their customers, suppliers, and other stakeholders McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
43.
43
Tools of Security Management (continued) McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
44.
44
Internetworked Security Defenses Encryption Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users Involves using special mathematical algorithms to transform digital data in scrambled code Most widely used method uses a pair of public and private keys unique to each individual McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
45.
45
Internetworked Security Defenses (continued) Firewalls Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion Provides a filter and safe transfer point Screens all network traffic for proper passwords or other security codes McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
46.
46
Internetworked Security Defenses (continued) Denial of Service Defenses These assaults depend on three layers of networked computer systems Victim’s website Victim’s ISP Sites of “zombie” or slave computers Defensive measures and security precautions must be taken at all three levels McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
47.
47
Internetworked Security Defenses (continued) E-mail Monitoring “Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.” McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
48.
48
Internetworked Security Defenses (continued) Virus Defenses Protection may accomplished through Centralized distribution and updating of antivirus software Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
49.
49
Other Security Measures Security codes Multilevel password system Log onto the computer system Gain access into the system Access individual files McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
50.
50
Other Security Measures (continued) Backup Files Duplicate files of data or programs File retention measures Sometimes several generations of files are kept for control purposes McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
51.
51
Other Security Measures (continued) Security Monitors Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
52.
52
Other Security Measures (continued) Biometric Security Measure physical traits that make each individual unique Voice Fingerprints Hand geometry Signature dynamics Keystroke analysis Retina scanning Face recognition and Genetic pattern analysis McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
53.
53
Other Security Measures (continued) Computer Failure Controls Preventive maintenance of hardware and management of software updates Backup computer system Carefully scheduled hardware or software changes Highly trained data center personnel McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
54.
54
Other Security Measures (continued) Fault Tolerant Systems Computer systems that have redundant processors, peripherals, and software Fail-over Fail-safe Fail-soft McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
55.
55
Other Security Measures (continued) Disaster Recovery Disaster recovery plan Which employees will participate and their duties What hardware, software, and facilities will be used Priority of applications that will be processed McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
56.
56
System Controls and Audits Information System Controls Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities Designed to monitor and maintain the quality and security of input, processing, and storage activities McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
57.
57
System Controls and Audits (continued) Auditing Business Systems Review and evaluate whether proper and adequate security measures and management policies have been developed and implemented Testing the integrity of an application’s audit trail McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
58.
58
Discussion Questions What can be done to improve e-commerce security on the Internet? What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
59.
59
Discussion Questions (continued) What artificial intelligence techniques can a business use to improve computer security and fight computer crime? What are your major concerns about computer crime and privacy on the Internet? What can you do about it? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
60.
60
Discussion Questions (continued) What is disaster recovery? How could it be implemented at your school or work? Is there an ethical crisis in e-business today? What role does information technology play in unethical business practices? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
61.
61
Discussion Questions (continued) What business decisions will you have to make as a manager that have both an ethical and IT dimension? What would be examples of one positive and one negative effect of the use of e-business technologies in each of the ethical and societal dimensions illustrated in the chapter? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
62.
62
Real World Case 1 – MTV Networks & First Citizens Bank Defending Against Hacker and Virus Attacks What are the business value and security benefits and limitations of defenses against DDOS attacks like those used by MTV Networks? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
63.
63
Real World Case 1 (continued) What are the business benefits and limitations of an intrusion-detection system like that installed at First Citizens? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
64.
64
Real World Case 1 (continued) What security defense should small businesses have to protect their websites and internal systems? Why did you make that choice? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
65.
65
Real World Case 1 (continued) What other network security threats besides denial of service, viruses, and hacker attacks should businesses protect themselves against? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
66.
66 Real World Case
2 – Oppenheimer Funds, Cardinal Health, & Exodus IT Security Management Qualifications Technical Business People skills Experience and expertise in areas like government liaison, international regulations, and cyberterrorism McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
67.
67
Real World Case 2 (continued) What mix of skills is most sought after for IT security specialists? Why is this mix important in business? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
68.
68
Real World Case 2 (continued) Why must IT security executives in business have the mix of skills and experience outlined in this case? What other skills do you think are important to have for effective IT security management? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
69.
69
Real World Case 2 (continued) How should businesses protect themselves from the spread of cyberterrorism in today’s internetworked world? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
70.
70
Real World Case 3 – Brandon Internet Services & PayPal What are the business benefits and limitations of the cybercrime investigative work done by firms like Brandon Internet Services? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
71.
71
Real World Case 3 (continued) When should a company use cyberforensic investigative services like those offered by Predictive Systems? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
72.
72
Real World Case 3 (continued) What is the business value of their cyberforensic and investigative capabilities to PayPal? Would you trust PayPal for your online payment transactions? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
73.
73 Real
World Case 4 – Providence Health Systems & Others Why is there a growing need for IT security defenses and management in business? What challenges does this pose to effective IT security management? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
74.
74
Real World Case 4 (continued) What are some of the IT security defenses companies are using to meet these challenges? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
75.
75
Real World Case 4 (continued) Do you agree with the IT usage policies of Link Staffing? The security audit policies of Cervalis? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
76.
76
Real World Case 5 – The Doctor’s Co. & Rockland Trust What are the benefits and limitations for a business of outsourcing IT security management according to the companies in this case? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
77.
77
Real World Case 5 (continued) What are the benefits and limitations to a business of using “pure play” IT security management companies like Counterpane and Ubizen? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
78.
78
Real World Case 5 (continued) What are the benefits and limitations of outsourcing IT security management to vendors like Symantec and Network Associates? McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
Jetzt herunterladen