SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Amity School of Business

      Jitendra Tomar
Amity School of Business,
     Amity University, UP

            09911331317
           0120 4392875
      jtomar@amity.edu




        MIS - Orator
Amity School of Business

           • Organizations, Management & Information.
                • Information Technology Infrastructure.
• Managing and Organizing Support Systems for the Firm.
        • Building Information Systems in the Digital Firm.
     • Managing Information Systems in the Digital Firm.




                                    MIS - Curriculum
Amity School of Business

                                         Issues with Society.
                                         • One should realize
                Privacy
                                           that    IT  has    had
                                           beneficial results as
Epye
mm
 lo n                                      well as detrimental
    t
                                           effects on society and
          Win
          okg
           r                               people in many areas.
            Ethics & Society
                                         • The use of IT has major
                                           impacts on society,
                                 Cdios
                                 oitn
                                  n        and thus raises issues
                                           in the areas of crime,
                                           privacy, individuality,
    irC                                    employment, health &
  em
             Individuality                 working conditions.


                               Issues with Information System
Amity School of Business

Is the person a responsible Professional?
As a business professional
• Managers have the responsibility to promote ethical uses of IT.
• They should accept the ethical responsibilities that come with
  their work activities.
• They should abide by the Ethical Foundations in business and
  IT.
   – Business Ethics – It is concerned with the numerous ethical
     questions that managers must confront as part of their
     daily business decision making.
   – Technology Ethics – These principles can serve as basic
     ethical requirements that companies should meet to help
     ensure the ethical implementation of IT and IS in business.

                             Issues with Information System
Amity School of Business

Basic Categories of Ethical Issues:
• Equity
   – Executive Salaries, comparable Worth, Product Pricing,
     Intellectual Property Rights, Noncompetitive Agreements,
     Etc.

• Rights
   – Corporate Due Process, Employee Health Screening,
     Consumer Privacy, Employee Privacy, Sexual Harassment,
     Affirmative Action, Equal Employment Opportunity,
     Shareholder Interests, Employment at Will, Etc.




                            Issues with Information System
Amity School of Business

Basic Categories of Ethical Issues:
• Honesty.
   – Employee Conflicts of Interest, Security of Company
     Information, Inappropriate Gifts, Advertising Content,
     Government Contract Issues, Financial and Cash
     Management Procedures, Questionable Business Practices
     in Foreign Countries, etc.
• Exercise of Corporate Power
   – Product Safety, Environmental Issues, Disinvestment,
     Corporate Contributions, Social Issues Raised by Religious
     Organizations, Plant/Facility closures and Downsizing,
     Political Action Committees, Workplace Safety.



                            Issues with Information System
Amity School of Business

Principles of Technology Ethics.
• Proportionality.
   – The good achieved by the technology must outweigh the harm
     or risk. Moreover there must be no alternative that achieves the
     same or comparable benefits with less harm or risk.
• Informed Consent
   – Those affected by the technology should understand and
     accept the risks.
• Justice
   – The benefits and burdens of the technology should be distributed
     fairly. Those who benefit should bear their fair share of the risks,
     and those who do not benefit should not suffer a significant
     increase in risk.
• Minimized Risk
   – Even if judged acceptable by the other three guidelines, the
     technology must be implemented so as to avoid all unnecessary
     risk.
                             Issues with Information System
Amity School of Business

Ethical Challenges – Few More
• Employment Challenges.
    – IT is directly related to the use of computers to achieve
      automation of work activities. Use of IT has created new
      jobs and increased productivity, while also causing a
      significant reduction in some types of job opportunities.


• Challenges in working conditions.
   – It has eliminated monotonous or obnoxious tasks that
     formerly had to be performed by people.
   – This allows people to concentrate on more challenging
     and interesting assignments, upgrade the skill level, which
     upgrades the quality of work and working conditions and
     the content of work activities.

                          Issues with Information System
Amity School of Business

Ethical Challenges – Few More
• Challenges to individuality.
   – Computer-based systems are criticized as impersonal
     systems that dehumanize and depersonalize activities
     eliminating human relationship.

• Ergonomics & Health Issues.
   – Use of IT raises a variety of health problems like job stress,
     damaged arm and neck muscles, eye strain, radiation
     exposure, etc.
   – Ergonomics, some times called as human factor
     engineering, is to design healthy work environments that
     are safe, comfortable, and pleasant for people to work in,
     thus increasing employee morale and productivity.

                           Issues with Information System
Amity School of Business

Goals of Information Security.
• The development, implementation, and maintenance of ISs
  constitute a large and growing part of the cost of doing
  business.
• The protection of these resources is a primary concern.
• The increasing reliance on ISs, combined with their
  connection to the outside world in the form of the internet,
  makes securing corporate ISs increasingly challenging.
• The major goals of information security are:
   – To reduce the risk of systems & organization ceasing operations.
   – To maintain information confidentiality.
   – To ensure the integrity and reliability of data resources.
   – To ensure the uninterrupted availability of data resources.
   – To ensure compliance with national security law and policies.
                                  Information System Security
Amity School of Business

Computer Crime.
As per Association of Information Technology Professionals (AITP),
   computer crime is defined as
• The unauthorized use, access, modification and destruction of
   H/W, S/W, data or network resource.
• The unauthorized release of information.
• The unauthorized copying of S/W.
• Denying an end user access to his or her own H/W , S/W, data
   or network resource.
• Using or conspiring to use computer or network resources to
   illegally obtain information.
This definition was promoted by the AITP in a Model Computer
   Crime Act and is reflected in many computer crime Laws.

                              Information System Security
Amity School of Business

Tools for Computer Crime.
• Hacking.
   – Denial of Service, Scanning, Sniffing, Spoofing & Phishing, Trojan
     Horse, Back Doors, War Dialing, Logic Bombs, Password Crackers,
     Social Engineering, Dumpster Diving.
• Unauthorized Use at Work.
   – Moonlighting.

• Software Piracy.
• Piracy of Intellectual Property.
• Computer Virus and Worms.
• Computer Censorships.



                                Information System Security
Amity School of Business

Tools for Security Management.
• Encryption.
   – Cipher (Public & Private Keys).
   – Digital Certificate.
   – Virtual Private Network.
   – Secured Socket Layer (SSL).
• Firewall.
• Email Message Monitoring.
• Security Codes.
• Biometric Security.
• Backup Files.
• Virus Defense.
• Operating System Controls.
• Fault Tolerant Systems.
                              Information System Security
Amity School of Business

IS Security Management Control.
1. IS Control – They are designed to monitor and maintain the
    quality and security of the input, output, processing, and
    storage activities of IS.
                         S/W Control
                         H/W Control
                           Firewall
        Input            Checkpoints           Output
    Security Codes                           Security Codes
      Encryption                               Encryption
  Data Entry Screens                        Control Listings
     Error Signals                         End User Feedback

                       Storage Control
                        Security Codes
                          Encryption
                           Backups
                       DB Administration

                             Information System Security
Amity School of Business

Tools for Security Management.
2. Auditing IT Security
• Manual.
    – System is periodically examined manually to see the fault if
      any.
    – Such audit review evaluate whether proper & adequate
      security measures & management policies have been
      developed & implemented.
• Audit Trails.
    – It is presence of documentation that allows a transactions
      to be traced through all stages of its processing.
    – It takes the form of control logs that automatically record
      all computer network activity on disk.


                              Information System Security
Amity School of Business

Weitere ähnliche Inhalte

Was ist angesagt?

1. introduction e business management
1. introduction e business management1. introduction e business management
1. introduction e business managementJitendra Tomar
 
3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and TacticsJitendra Tomar
 
Analysis & Design of Business Systems - 5
Analysis & Design of Business Systems - 5Analysis & Design of Business Systems - 5
Analysis & Design of Business Systems - 5Jitendra Tomar
 
Module 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain ManagementModule 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain ManagementJitendra Tomar
 
Module 5 business intelligence
Module 5 business intelligenceModule 5 business intelligence
Module 5 business intelligenceJitendra Tomar
 
5. E-Commerce & Business Applications
5. E-Commerce & Business Applications5. E-Commerce & Business Applications
5. E-Commerce & Business ApplicationsJitendra Tomar
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2adrenal
 
ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)bpmcg2
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technologyOnline
 
MIS managing digital firms companies
MIS managing digital firms companies MIS managing digital firms companies
MIS managing digital firms companies gufranresearcher
 
Chapter 12 answers to discussion questions
Chapter 12 answers to discussion questionsChapter 12 answers to discussion questions
Chapter 12 answers to discussion questionsVatan77
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3Waseem Saeed
 

Was ist angesagt? (20)

1. introduction e business management
1. introduction e business management1. introduction e business management
1. introduction e business management
 
3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics
 
Analysis & Design of Business Systems - 5
Analysis & Design of Business Systems - 5Analysis & Design of Business Systems - 5
Analysis & Design of Business Systems - 5
 
Module 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain ManagementModule 4 ERP and Selling Chain Management
Module 4 ERP and Selling Chain Management
 
Module 5 business intelligence
Module 5 business intelligenceModule 5 business intelligence
Module 5 business intelligence
 
E- business how businesses use information systems
E- business how businesses use information systemsE- business how businesses use information systems
E- business how businesses use information systems
 
5. E-Commerce & Business Applications
5. E-Commerce & Business Applications5. E-Commerce & Business Applications
5. E-Commerce & Business Applications
 
Chap001
Chap001Chap001
Chap001
 
Information systems, organizations, and strategy
Information systems,  organizations, and strategyInformation systems,  organizations, and strategy
Information systems, organizations, and strategy
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2
 
ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technology
 
MIS managing digital firms companies
MIS managing digital firms companies MIS managing digital firms companies
MIS managing digital firms companies
 
ICT in Business
ICT in BusinessICT in Business
ICT in Business
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 12 answers to discussion questions
Chapter 12 answers to discussion questionsChapter 12 answers to discussion questions
Chapter 12 answers to discussion questions
 
Information system in global business
Information system in global business  Information system in global business
Information system in global business
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 

Andere mochten auch

Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Jitendra Tomar
 
Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Jitendra Tomar
 
4. E-Commerce & Payment System
4. E-Commerce & Payment System4. E-Commerce & Payment System
4. E-Commerce & Payment SystemJitendra Tomar
 
Management Information System 4
Management Information System 4Management Information System 4
Management Information System 4Jitendra Tomar
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 

Andere mochten auch (6)

Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2
 
Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1
 
4. E-Commerce & Payment System
4. E-Commerce & Payment System4. E-Commerce & Payment System
4. E-Commerce & Payment System
 
Management Information System 4
Management Information System 4Management Information System 4
Management Information System 4
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - Normalization
 

Ähnlich wie Management Information System 5

B ; PROFESSIONAL SOCIETIES.pptx
B ; PROFESSIONAL SOCIETIES.pptxB ; PROFESSIONAL SOCIETIES.pptx
B ; PROFESSIONAL SOCIETIES.pptxsnowj7467
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of itPraveen Choursiya
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxNapoleon NV
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Item46763
Item46763Item46763
Item46763madunix
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxharigopala
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 

Ähnlich wie Management Information System 5 (20)

B ; PROFESSIONAL SOCIETIES.pptx
B ; PROFESSIONAL SOCIETIES.pptxB ; PROFESSIONAL SOCIETIES.pptx
B ; PROFESSIONAL SOCIETIES.pptx
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptx
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Item46763
Item46763Item46763
Item46763
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptx
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
IT Policy
IT PolicyIT Policy
IT Policy
 

Mehr von Jitendra Tomar

Industrial IIOT and Physical Internet
Industrial IIOT and Physical InternetIndustrial IIOT and Physical Internet
Industrial IIOT and Physical InternetJitendra Tomar
 
Artificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxArtificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxJitendra Tomar
 
AI, Business Intelligence and MIS
AI, Business Intelligence and MISAI, Business Intelligence and MIS
AI, Business Intelligence and MISJitendra Tomar
 
Reshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceReshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceJitendra Tomar
 
Redefining Management using AI
Redefining Management using AIRedefining Management using AI
Redefining Management using AIJitendra Tomar
 
AI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningAI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningJitendra Tomar
 
AI in economics and business management.
AI in economics and business management.AI in economics and business management.
AI in economics and business management.Jitendra Tomar
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and ArchitectureJitendra Tomar
 
3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology FundamentalsJitendra Tomar
 
2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective2. Internet of Things - A Market Perspective
2. Internet of Things - A Market PerspectiveJitendra Tomar
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoTJitendra Tomar
 
Module 3: Code of Ethics
Module 3: Code of EthicsModule 3: Code of Ethics
Module 3: Code of EthicsJitendra Tomar
 
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsPFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsJitendra Tomar
 
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsPFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsJitendra Tomar
 
PFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsPFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsJitendra Tomar
 
PFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsPFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsJitendra Tomar
 
PFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernancePFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernanceJitendra Tomar
 
PFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsPFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsJitendra Tomar
 
PFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievancePFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievanceJitendra Tomar
 
PFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsPFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsJitendra Tomar
 

Mehr von Jitendra Tomar (20)

Industrial IIOT and Physical Internet
Industrial IIOT and Physical InternetIndustrial IIOT and Physical Internet
Industrial IIOT and Physical Internet
 
Artificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxArtificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptx
 
AI, Business Intelligence and MIS
AI, Business Intelligence and MISAI, Business Intelligence and MIS
AI, Business Intelligence and MIS
 
Reshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceReshaping Business with Artificial Intelligence
Reshaping Business with Artificial Intelligence
 
Redefining Management using AI
Redefining Management using AIRedefining Management using AI
Redefining Management using AI
 
AI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningAI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business Planning
 
AI in economics and business management.
AI in economics and business management.AI in economics and business management.
AI in economics and business management.
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture
 
3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals
 
2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT
 
Module 3: Code of Ethics
Module 3: Code of EthicsModule 3: Code of Ethics
Module 3: Code of Ethics
 
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsPFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
 
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsPFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
 
PFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsPFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development Goals
 
PFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsPFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental Ethics
 
PFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernancePFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate Governance
 
PFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsPFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCs
 
PFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievancePFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee Grievance
 
PFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsPFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with Minors
 

Management Information System 5

  • 1. Amity School of Business Jitendra Tomar Amity School of Business, Amity University, UP 09911331317 0120 4392875 jtomar@amity.edu MIS - Orator
  • 2. Amity School of Business • Organizations, Management & Information. • Information Technology Infrastructure. • Managing and Organizing Support Systems for the Firm. • Building Information Systems in the Digital Firm. • Managing Information Systems in the Digital Firm. MIS - Curriculum
  • 3. Amity School of Business Issues with Society. • One should realize Privacy that IT has had beneficial results as Epye mm lo n well as detrimental t effects on society and Win okg r people in many areas. Ethics & Society • The use of IT has major impacts on society, Cdios oitn n and thus raises issues in the areas of crime, privacy, individuality, irC employment, health & em Individuality working conditions. Issues with Information System
  • 4. Amity School of Business Is the person a responsible Professional? As a business professional • Managers have the responsibility to promote ethical uses of IT. • They should accept the ethical responsibilities that come with their work activities. • They should abide by the Ethical Foundations in business and IT. – Business Ethics – It is concerned with the numerous ethical questions that managers must confront as part of their daily business decision making. – Technology Ethics – These principles can serve as basic ethical requirements that companies should meet to help ensure the ethical implementation of IT and IS in business. Issues with Information System
  • 5. Amity School of Business Basic Categories of Ethical Issues: • Equity – Executive Salaries, comparable Worth, Product Pricing, Intellectual Property Rights, Noncompetitive Agreements, Etc. • Rights – Corporate Due Process, Employee Health Screening, Consumer Privacy, Employee Privacy, Sexual Harassment, Affirmative Action, Equal Employment Opportunity, Shareholder Interests, Employment at Will, Etc. Issues with Information System
  • 6. Amity School of Business Basic Categories of Ethical Issues: • Honesty. – Employee Conflicts of Interest, Security of Company Information, Inappropriate Gifts, Advertising Content, Government Contract Issues, Financial and Cash Management Procedures, Questionable Business Practices in Foreign Countries, etc. • Exercise of Corporate Power – Product Safety, Environmental Issues, Disinvestment, Corporate Contributions, Social Issues Raised by Religious Organizations, Plant/Facility closures and Downsizing, Political Action Committees, Workplace Safety. Issues with Information System
  • 7. Amity School of Business Principles of Technology Ethics. • Proportionality. – The good achieved by the technology must outweigh the harm or risk. Moreover there must be no alternative that achieves the same or comparable benefits with less harm or risk. • Informed Consent – Those affected by the technology should understand and accept the risks. • Justice – The benefits and burdens of the technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk. • Minimized Risk – Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. Issues with Information System
  • 8. Amity School of Business Ethical Challenges – Few More • Employment Challenges. – IT is directly related to the use of computers to achieve automation of work activities. Use of IT has created new jobs and increased productivity, while also causing a significant reduction in some types of job opportunities. • Challenges in working conditions. – It has eliminated monotonous or obnoxious tasks that formerly had to be performed by people. – This allows people to concentrate on more challenging and interesting assignments, upgrade the skill level, which upgrades the quality of work and working conditions and the content of work activities. Issues with Information System
  • 9. Amity School of Business Ethical Challenges – Few More • Challenges to individuality. – Computer-based systems are criticized as impersonal systems that dehumanize and depersonalize activities eliminating human relationship. • Ergonomics & Health Issues. – Use of IT raises a variety of health problems like job stress, damaged arm and neck muscles, eye strain, radiation exposure, etc. – Ergonomics, some times called as human factor engineering, is to design healthy work environments that are safe, comfortable, and pleasant for people to work in, thus increasing employee morale and productivity. Issues with Information System
  • 10. Amity School of Business Goals of Information Security. • The development, implementation, and maintenance of ISs constitute a large and growing part of the cost of doing business. • The protection of these resources is a primary concern. • The increasing reliance on ISs, combined with their connection to the outside world in the form of the internet, makes securing corporate ISs increasingly challenging. • The major goals of information security are: – To reduce the risk of systems & organization ceasing operations. – To maintain information confidentiality. – To ensure the integrity and reliability of data resources. – To ensure the uninterrupted availability of data resources. – To ensure compliance with national security law and policies. Information System Security
  • 11. Amity School of Business Computer Crime. As per Association of Information Technology Professionals (AITP), computer crime is defined as • The unauthorized use, access, modification and destruction of H/W, S/W, data or network resource. • The unauthorized release of information. • The unauthorized copying of S/W. • Denying an end user access to his or her own H/W , S/W, data or network resource. • Using or conspiring to use computer or network resources to illegally obtain information. This definition was promoted by the AITP in a Model Computer Crime Act and is reflected in many computer crime Laws. Information System Security
  • 12. Amity School of Business Tools for Computer Crime. • Hacking. – Denial of Service, Scanning, Sniffing, Spoofing & Phishing, Trojan Horse, Back Doors, War Dialing, Logic Bombs, Password Crackers, Social Engineering, Dumpster Diving. • Unauthorized Use at Work. – Moonlighting. • Software Piracy. • Piracy of Intellectual Property. • Computer Virus and Worms. • Computer Censorships. Information System Security
  • 13. Amity School of Business Tools for Security Management. • Encryption. – Cipher (Public & Private Keys). – Digital Certificate. – Virtual Private Network. – Secured Socket Layer (SSL). • Firewall. • Email Message Monitoring. • Security Codes. • Biometric Security. • Backup Files. • Virus Defense. • Operating System Controls. • Fault Tolerant Systems. Information System Security
  • 14. Amity School of Business IS Security Management Control. 1. IS Control – They are designed to monitor and maintain the quality and security of the input, output, processing, and storage activities of IS. S/W Control H/W Control Firewall Input Checkpoints Output Security Codes Security Codes Encryption Encryption Data Entry Screens Control Listings Error Signals End User Feedback Storage Control Security Codes Encryption Backups DB Administration Information System Security
  • 15. Amity School of Business Tools for Security Management. 2. Auditing IT Security • Manual. – System is periodically examined manually to see the fault if any. – Such audit review evaluate whether proper & adequate security measures & management policies have been developed & implemented. • Audit Trails. – It is presence of documentation that allows a transactions to be traced through all stages of its processing. – It takes the form of control logs that automatically record all computer network activity on disk. Information System Security
  • 16. Amity School of Business