SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Security and Ethical Challenges Management Information Systems Management Information Systems Reported by: LOUIE A. MEDINACELI ZEPPELIN B. MALPAL AZUDIN T. MAZTURA CLODUALDO G. MAGAAN, JR. GILBERT S. DADOR, MBA Special Lecturer
Security challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Cyber Theft ,[object Object],Management Information Systems
Unauthorized use at Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Software Piracy ,[object Object],[object Object],Management Information Systems
Piracy of Intellectual Property ,[object Object],[object Object],[object Object],Management Information Systems
Computer viruses and worms ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Privacy Issues ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Other Challenges ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Health issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Benefits   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Ethical responsibility of business professionals ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Categories of Ethical Business Issues Management Information Systems
Theories of corporate social responsibility ,[object Object],[object Object],[object Object],Management Information Systems
Principles of technology ethics ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Ethical guideline ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Security management of IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Encryption ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Denial of Service Defenses ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
e-Mail Monitoring ,[object Object],[object Object],Management Information Systems
Virus Defenses ,[object Object],[object Object],[object Object],Management Information Systems
Security Codes ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Backup Files ,[object Object],[object Object],[object Object],Management Information Systems
Security Monitors ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Biometric Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Computer Failure Controls ,[object Object],[object Object],[object Object],Management Information Systems
Computer Failure Controls ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Computer Failure Controls ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Fault Tolerant Systems Management Information Systems
Disaster Recovery ,[object Object],Management Information Systems
THANK YOU !!! OPTICAL ILLUSION: if YOU LOOK at the PICTURE  CAREFULLY, AFTER a FEW SECONDS, YOU CAN SEE  the PHILIPPINES or the DIAMOND RING

Weitere ähnliche Inhalte

Was ist angesagt?

Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantageHarmanjeet Kaur
 
Components of information system
Components of information systemComponents of information system
Components of information systemSofia Priyadarshini
 
Strategic information system
Strategic information system Strategic information system
Strategic information system Megha_pareek
 
Implementation & Evaluation of MIS
Implementation & Evaluation of MISImplementation & Evaluation of MIS
Implementation & Evaluation of MISManoj Kumar
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)Jaisha Jaikishan
 
Functional information system
Functional  information systemFunctional  information system
Functional information systemamazing19
 
Managing International Information Systems
Managing International Information Systems Managing International Information Systems
Managing International Information Systems Mostafa Ewees
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceVinay Chaithanya
 
Mis – Subsystems
Mis – SubsystemsMis – Subsystems
Mis – SubsystemsArun Mishra
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
MIS 15 Application of MIS (Manufacturing Sector)
MIS 15 Application of MIS (Manufacturing Sector)MIS 15 Application of MIS (Manufacturing Sector)
MIS 15 Application of MIS (Manufacturing Sector)Tushar B Kute
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Role of it in business
Role of it in businessRole of it in business
Role of it in businessRohit Parkar
 
Strategic decision making
Strategic decision makingStrategic decision making
Strategic decision makingganpules
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 

Was ist angesagt? (20)

Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantage
 
Components of information system
Components of information systemComponents of information system
Components of information system
 
Strategic information system
Strategic information system Strategic information system
Strategic information system
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Implementation & Evaluation of MIS
Implementation & Evaluation of MISImplementation & Evaluation of MIS
Implementation & Evaluation of MIS
 
End user development
End user developmentEnd user development
End user development
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
 
Managing International Information Systems
Managing International Information Systems Managing International Information Systems
Managing International Information Systems
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Mis – Subsystems
Mis – SubsystemsMis – Subsystems
Mis – Subsystems
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
MIS 15 Application of MIS (Manufacturing Sector)
MIS 15 Application of MIS (Manufacturing Sector)MIS 15 Application of MIS (Manufacturing Sector)
MIS 15 Application of MIS (Manufacturing Sector)
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Knowledge Management System. MIS
Knowledge Management System. MISKnowledge Management System. MIS
Knowledge Management System. MIS
 
Role of it in business
Role of it in businessRole of it in business
Role of it in business
 
Strategic decision making
Strategic decision makingStrategic decision making
Strategic decision making
 
Management information system Unit 1
Management information system Unit 1Management information system Unit 1
Management information system Unit 1
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 

Andere mochten auch

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Andere mochten auch (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 

Ähnlich wie Security & ethical challenges

security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxjeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxtodd521
 

Ähnlich wie Security & ethical challenges (20)

security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
I0516064
I0516064I0516064
I0516064
 
Need for security
Need for securityNeed for security
Need for security
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Data security
Data securityData security
Data security
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Mis 1
Mis 1Mis 1
Mis 1
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 

Mehr von Louie Medinaceli

Fiscal administration 2 ppt
Fiscal administration 2 pptFiscal administration 2 ppt
Fiscal administration 2 pptLouie Medinaceli
 
Human resource development
Human resource developmentHuman resource development
Human resource developmentLouie Medinaceli
 
Public fiscal admin report
Public fiscal admin reportPublic fiscal admin report
Public fiscal admin reportLouie Medinaceli
 
Report civil service policies
Report civil service policiesReport civil service policies
Report civil service policiesLouie Medinaceli
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government serviceLouie Medinaceli
 
Theoretical perspectives 2
Theoretical perspectives 2Theoretical perspectives 2
Theoretical perspectives 2Louie Medinaceli
 
Government budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsGovernment budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsLouie Medinaceli
 
Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6Louie Medinaceli
 
Civil society and public administration
Civil society and public administrationCivil society and public administration
Civil society and public administrationLouie Medinaceli
 

Mehr von Louie Medinaceli (12)

Report interpersonal
Report interpersonalReport interpersonal
Report interpersonal
 
Ethics report
Ethics reportEthics report
Ethics report
 
Fiscal administration 2 ppt
Fiscal administration 2 pptFiscal administration 2 ppt
Fiscal administration 2 ppt
 
Human resource development
Human resource developmentHuman resource development
Human resource development
 
Hyphothesis
HyphothesisHyphothesis
Hyphothesis
 
Public fiscal admin report
Public fiscal admin reportPublic fiscal admin report
Public fiscal admin report
 
Report civil service policies
Report civil service policiesReport civil service policies
Report civil service policies
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
 
Theoretical perspectives 2
Theoretical perspectives 2Theoretical perspectives 2
Theoretical perspectives 2
 
Government budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsGovernment budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problems
 
Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6
 
Civil society and public administration
Civil society and public administrationCivil society and public administration
Civil society and public administration
 

Kürzlich hochgeladen

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Kürzlich hochgeladen (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Security & ethical challenges

  • 1. Security and Ethical Challenges Management Information Systems Management Information Systems Reported by: LOUIE A. MEDINACELI ZEPPELIN B. MALPAL AZUDIN T. MAZTURA CLODUALDO G. MAGAAN, JR. GILBERT S. DADOR, MBA Special Lecturer
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Categories of Ethical Business Issues Management Information Systems
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Fault Tolerant Systems Management Information Systems
  • 32.
  • 33. THANK YOU !!! OPTICAL ILLUSION: if YOU LOOK at the PICTURE CAREFULLY, AFTER a FEW SECONDS, YOU CAN SEE the PHILIPPINES or the DIAMOND RING