72
Fundamentals of Information Systems, Seventh Edition 1 Fundamentals of Information Systems, Seventh Edition Chapter 9 The Personal and Social Impact of Computers

Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Fundamentals of Information Systems, Seventh Edition

1Fundamentals of Information Systems, Seventh Edition

Chapter 9The Personal and Social

Impact of Computers

Page 2: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Principles and Learning Objectives• Policies and procedures must be established

to avoid waste and mistakes associated with computer usage– Describe some examples of waste and mistakes in

an IS environment, their causes, and possible solutions

– Identify policies and procedures useful in eliminating waste and mistakes

– Discuss the principles and limits of an individual’s right to privacy

Fundamentals of Information Systems, Seventh Edition 2

Page 3: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Principles and Learning Objectives (continued)

• Computer crime is a serious and rapidly growing area of concern requiring management attention– Explain the types of computer crime and their

effects– Identify specific measures to prevent computer

crime

Fundamentals of Information Systems, Seventh Edition 3

Page 4: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Principles and Learning Objectives (continued)

• Jobs, equipment, and working conditions must be designed to avoid negative health effects from computers– List the important negative effects of computers

on the work environment– Identify specific actions that must be taken to

ensure the health and safety of employees

Fundamentals of Information Systems, Seventh Edition 4

Page 5: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Principles and Learning Objectives (continued)

• Practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work– Outline criteria for the ethical use of information

systems

Fundamentals of Information Systems, Seventh Edition 5

Page 6: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Why Learn About the Personal and Social Impact of the Internet?

• Both opportunities and threats:– Surround a wide range of nontechnical issues

associated with the use of information systems and the Internet

• You need to know about the topics in this chapter:– To help avoid becoming a victim of crime, fraud,

privacy invasion, and other potential problem

Fundamentals of Information Systems, Seventh Edition 6

Page 7: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Computer Waste and Mistakes• Computer waste:– Organizations operating unitegrated information

systems– Acquiring redundant systems–Wasting information system resources

• Computer-related mistakes:– Errors, failures, and other computer problems that

make computer output incorrect or not useful–Most of these caused by human error

Fundamentals of Information Systems, Seventh Edition 7

Page 8: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Computer Waste• Unitegrated information systems:–Make it difficult to collaborate and share

information leading to missed opportunities, increased costs, and lost sales

• Improper use of information systems and resources– Playing computer games, sending personal e-mail

or browsing the Internet

Fundamentals of Information Systems, Seventh Edition 8

Page 9: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Computer-Related Mistakes• Common causes:– Unclear expectations and a lack of feedback– Program development that contains errors– Incorrect data entry by data-entry clerk

Fundamentals of Information Systems, Seventh Edition 9

Page 10: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Preventing Computer-Related Waste and Mistakes

• Preventing waste and mistakes involves: – Establishing, implementing, monitoring, and

reviewing effective policies and procedures

Fundamentals of Information Systems, Seventh Edition 10

Page 11: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Establishing Policies and Procedures

Most common types of computer-related mistakes:– Data-entry or data-capture errors– Errors in computer programs– Mishandling of computer output– Inadequate planning for and control of equipment

malfunctions– Inadequate planning for and control of environmental

difficulties– Installing computing capacity inadequate for the level of

activity– Failure to provide access to the most current information

Fundamentals of Information Systems, Seventh Edition 11

Page 12: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Implementing Policies and Procedures

• Policies to minimize waste and mistakes:– Changes to critical tables, HTML, and URLs should

be tightly controlled– User manual should be available covering

operating procedures– Each system report should indicate its general

content in its title– System should have controls to prevent invalid

and unreasonable data entry

Fundamentals of Information Systems, Seventh Edition 12

Page 13: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Implementing Policies and Procedures (continued)

• Controls should exist to ensure that data input, HTML, and URLs are valid, applicable, and posted in the right time frame

• Users should implement proper procedures to ensure correct input data

Fundamentals of Information Systems, Seventh Edition 13

Page 14: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Monitoring Policies and Procedures• Monitor routine practices and take corrective

action if necessary• Implement internal audits to measure actual

results against established goals

Fundamentals of Information Systems, Seventh Edition 14

Page 15: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Reviewing Policies and Procedures• Questions to be answered:– Do current policies cover existing practices

adequately?– Does the organization plan any new activities in

the future?– Are contingencies and disasters covered?

Fundamentals of Information Systems, Seventh Edition 15

Page 16: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Computer Crime• 300,000 crimes reported to The Internet

Crime Computer Center in 2010• Two most common online computer crimes:– Undelivered merchandise or nonpayment– Identity theft using names and photos of U.S.

government officials

Fundamentals of Information Systems, Seventh Edition 16

Page 17: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

The Computer as a Tool to Commit Crime

• Computer criminal needs two capabilities to commit crime:– How to gain access to the computer system– How to manipulate the system to get the desired result

• Social engineering:– Using social skills to get computer users to provide

information to access an information system • Dumpster diving:– Going through trash cans to find secret or confidential

information

Fundamentals of Information Systems, Seventh Edition 17

Page 18: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Cyberterrorism• Homeland Security Department’s Information

Analysis and Infrastructure Protection Directorate: – Serves as a focal point for threat assessment,

warning, investigation, and response for threats or attacks against the country’s critical infrastructure

• Cyberterrorist:– Intimidates or coerces a government or

organization to advance his or her political or social objectives

Fundamentals of Information Systems, Seventh Edition 18

Page 19: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Identity Theft• Imposter obtains personal identification

information in order to impersonate someone else:– To obtain credit, merchandise, and services in the

name of the victim– To have false credentials

• Child identity theft and preparation of false federal tax returns are rapidly growing areas of identity theft

Fundamentals of Information Systems, Seventh Edition 19

Page 20: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Internet Gambling• Global online gambling market over $30

billion• Laws regarding legality of online gambling

quite confusing• Revenues generated by Internet gambling

represent a major untapped source of income for state and federal governments

Fundamentals of Information Systems, Seventh Edition 20

Page 21: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

The Computer as a Tool to Fight Crime

• Information systems can be used to fight crime in many ways

• LeadsOnline Web-based service system:– Used by law enforcement to recover stolen

property– Contains hundreds of millions of records in its

database– Allows law enforcement officers to search the

database by item serial number or by individual

Fundamentals of Information Systems, Seventh Edition 21

Page 22: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Monitoring Criminals• JusticeXchange:–Web-based data sharing system– Provides information about offenders held in

participating jails across the United States• Offender Watch:–Web-based system used to track registered sex

offenders– Stores the registered offender’s address, physical

description, and vehicle information– Public can access database

Fundamentals of Information Systems, Seventh Edition 22

Page 23: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Assessing Crime Risk for a Given Area

• CAP Index provides quick overview of crime risk at a given address

• Other common GIS systems include:– The National Equipment Registry– The CompStat program– CargoNet

Fundamentals of Information Systems, Seventh Edition 23

Page 24: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

The Computer as the Object of Crime

• Crimes fall into several categories:– Illegal access and use– Data alteration and destruction– Information and equipment theft– Software and Internet piracy– Computer-related scams– International computer crime

Fundamentals of Information Systems, Seventh Edition 24

Page 25: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Fundamentals of Information Systems, Seventh Edition 25

Page 26: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Illegal Access and Use• Hacker:– Learns about and uses computer systems

• Criminal hacker:– Gains unauthorized use or illegal access to

computer systems• Script bunny:– Automates the job of crackers

• Insider:– Employee who comprises corporate systems

Fundamentals of Information Systems, Seventh Edition 26

Page 27: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Illegal Access and Use (continued)• Virus:– Program file capable of attaching to disks or other files and

replicating itself repeatedly• Worm:– Parasitic computer programs that replicate but, unlike

viruses, do not infect other computer program files• Trojan horse:– Malicious program that disguises itself as a useful

application or game and purposefully does something the user does not expect

Fundamentals of Information Systems, Seventh Edition 27

Page 28: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Illegal Access and Use (continued)

• Rootkit:– Set of programs that enable its user to gain

administrator level access to a computer or network

• Logic bomb:– Type of Trojan horse that executes when specific

conditions occur

• Variant:–Modified version of a virus that is produced by

virus’s author or another personFundamentals of Information Systems,

Seventh Edition 28

Page 29: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Spyware• Software installed on a personal computer to: – Intercept or take partial control over user’s

interaction with the computer without knowledge or permission of the user

• Similar to a Trojan horse in that:– Users unknowingly install it when they download

freeware or shareware from the Internet

Fundamentals of Information Systems, Seventh Edition 29

Page 30: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Information and Equipment Theft• Password sniffer:– Small program hidden in a network that records

identification numbers and passwords• Portable computers such as laptops and

portable storage devices are especially easy for thieves to take:– Data and information stored in these systems are

more valuable than the equipment

Fundamentals of Information Systems, Seventh Edition 30

Page 31: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Patent and Copyright Violations• Software piracy:– Act of unauthorized copying or distribution of

copyrighted software– Penalties can be severe

• Digital rights management:– The use of any of several technologies to enforce

policies for controlling access to digital media

Fundamentals of Information Systems, Seventh Edition 31

Page 32: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Patent and Copyright Violations (continued)

• Patent infringement:– Occurs when someone makes unauthorized use of

another’s patent– Penalty is up to three times the damages claimed

by the patent holder

Fundamentals of Information Systems, Seventh Edition 32

Page 33: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Computer-Related Scams• Phishing:– Perpetrator send email that looks as if it came

from a legitimate institution– Recipient asked to provide personal identification

information such a pin number and password• Over the past few years:– Credit card customers of various banks have been

targeted by scam artists trying to get personal information using phishing

Fundamentals of Information Systems, Seventh Edition 33

Page 34: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Computer-Related Scams (continued)

• Vishing:– Similar to phishing– Instead of using the victim’s computer, it uses the

victim’s phone

Fundamentals of Information Systems, Seventh Edition 34

Page 35: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

International Computer Crime• Computer crime becomes more complex

when it crosses borders• Money laundering:– Disguising illegally gained funds so that they seem

legal

Fundamentals of Information Systems, Seventh Edition 35

Page 36: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Preventing Computer-Related Crime

• Greater emphasis placed on prevention and detection of computer crime by:– Private users– Companies– Employees– Public officials

Fundamentals of Information Systems, Seventh Edition 36

Page 37: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Crime Prevention by State and Federal Agencies

• State and federal agencies aggressively attacking computer criminals

• Computer Fraud and Abuse Act of 1986:–Mandates punishment based on the victim’s dollar

loss• Computer Emergency Response Team (CERT):– Responds to network security breaches–Monitors systems for emerging threats

Fundamentals of Information Systems, Seventh Edition 37

Page 38: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Crime Prevention by Corporations• Companies taking computer crime seriously– Encryption used to encode data– Role-based system access lists to control system

access– Separation of duties to prevent collusion– Use of fingerprint authentication devices to gain

access

Fundamentals of Information Systems, Seventh Edition 38

Page 39: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Crime Prevention by Corporations (continued)

• Guidelines to protect your computer from criminal hackers:– Install strong user authentication and encryption

capabilities on your firewall– Install the latest security patches– Disable guest accounts and null user accounts – Turn audit trails on– Consider installing caller ID– Install a corporate firewall between your

corporate network and the InternetFundamentals of Information Systems,

Seventh Edition 39

Page 40: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Using Intrusion Detection Software• Using intrusion detection software:– Intrusion detection system (IDS):• Monitors system and network resources• Notifies network security personnel when it senses a

possible intrusion• Can provide false alarms

Fundamentals of Information Systems, Seventh Edition 40

Page 41: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Security Dashboard• Security Dashboard:– Provides comprehensive display on a single

computer screen of: • All the vital data related to an organization’s security

defenses, including threats, exposures, policy compliance, and incident alerts

Fundamentals of Information Systems, Seventh Edition 41

Page 42: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Fundamentals of Information Systems, Seventh Edition 42

Page 43: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Using Managed Security Service Providers

• Using managed security service providers (MSSPs):–Many organizations are outsourcing their network

security operations

Fundamentals of Information Systems, Seventh Edition 43

Page 44: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Guarding Against Theft of Equipment and Data

• Organizations need to take strong measures to guard against the theft of computer hardware and the data stored such as:– Set guidelines on what kind of data can be stored

on laptops– Encrypt data on laptops– Secure laptops– Provide training on safe handling of laptops– Install tracking software

Fundamentals of Information Systems, Seventh Edition 44

Page 45: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Crime Prevention for Individuals and Employees

• Identity theft:– To protect yourself, regularly check credit reports

with major credit bureaus• Malware attacks:– Antivirus programs run in the background to

protect your computer–Many e-mail services and ISP providers offer free

antivirus protection

Fundamentals of Information Systems, Seventh Edition 45

Page 46: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Crime Prevention for Individuals and Employees (continued)

• Computer scams:– Tips to help you avoid becoming a victim:• Don’t agree to anything in a high-pressure meeting or

seminar• Don’t judge a company based on appearances• Avoid any plan that pays commissions simply for

recruiting additional distributors• Beware of shills• Beware of a company’s claim that it can set you up in a

profitable home-based business

Fundamentals of Information Systems, Seventh Edition 46

Page 47: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy Issues• Issue of privacy:– Deals with the right to be left alone or to be

withdrawn from public view• Data is constantly being collected and stored

on each of us• This data is often distributed over easily

accessed networks and without our knowledge or consent

• Who owns this information and knowledge?Fundamentals of Information Systems,

Seventh Edition 47

Page 48: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and the Federal Government

• The federal government:– Has implemented a number of laws addressing

personal privacy• European Union:– Has data-protection directive that requires firms

transporting data across national boundaries to have certain privacy procedures in place

Fundamentals of Information Systems, Seventh Edition 48

Page 49: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy at Work• Employers using technology and corporate

policies to manage worker productivity and protect the use of IS resources.

• Employers concerned about inappropriate Web surfing, with over half of employers monitoring Web activity of their employees.

• Organizations also monitor employees’ e-mail, with more than half retaining and reviewing messages.

Fundamentals of Information Systems, Seventh Edition 49

Page 50: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy at Work (continued)• Most employers today have a policy that

explicitly eliminates any expectation of privacy when an employee uses any company-owned computer, server, or e-mail system.

• The courts have ruled that, without a reasonable expectation of privacy, there is no Fourth Amendment protection for the employee.

Fundamentals of Information Systems, Seventh Edition 50

Page 51: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and E-Mail• Federal law permits employers to monitor e-

mail sent and received by employees• E-mail messages that have been erased from

hard disks can be retrieved and used in lawsuits

• Use of e-mail among public officials might violate “open meeting” laws

Fundamentals of Information Systems, Seventh Edition 51

Page 52: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and Instant Messaging • To protect your privacy and your employer’s

property:– Do not send personal or private IMs at work– Choose a nonrevealing, nongender-specific,

unprovocative IM screen name– Do not open files or click links in messages from

people you do not know– Never send sensitive personal data such as credit

card numbers via IM

Fundamentals of Information Systems, Seventh Edition 52

Page 53: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and Personal Sensing Devices

• RFID tags:–Microchips with antenna– Embedded in many of the products we buy:• Medicine containers, clothing, computer printers, car

keys, library books, tires– Generate radio transmissions that, if appropriate

measures are not taken, can lead to potential privacy concerns

Fundamentals of Information Systems, Seventh Edition 53

Page 54: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and the Internet• Huge potential for privacy invasion on the Internet:– E-mail messages– Visiting a Web site– Buying products over the Internet

• Platform for Privacy Preferences (P3P):– Screening technology

• Social network services:– Parents should discuss potential dangers, check their

children’s profiles, and monitor their activities

Fundamentals of Information Systems, Seventh Edition 54

Page 55: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and the Internet (continued)

• Children’s Online Privacy Protection Act (COPPA)– Directed at Web sites catering to children– Requires site owners to post comprehensive

privacy policies and to obtain parental consent before they collect any personal information from children under 13 years of age

• Web site operators are liable for civil penalties of up to $11,000 per violation

Fundamentals of Information Systems, Seventh Edition 55

Page 56: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Internet Libel Concerns• Libel:– Publishing an intentionally false written statement

that is damaging to a person’s or organization’s reputation

• Individuals:– Can post information to the Internet using

anonymous e-mail accounts or screen names–Must be careful what they post on the Internet to

avoid libel charges

Fundamentals of Information Systems, Seventh Edition 56

Page 57: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy and Fairness in Information Use

• Selling information to other companies can be so lucrative that many companies will store and sell the data they collect on customers, employees, and others–When is this information storage and use fair and

reasonable to the people whose data is stored and sold?

– Do people have a right to know about data stored about them and to decide what data is stored and used?

Fundamentals of Information Systems, Seventh Edition 57

Page 58: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Filtering and Classifying Internet Content

• Filtering software:– Help screen Internet content

• Children’s Internet Protection Act (CIPA)– Schools and libraries subject to CIPA do not

receive the discounts offered by the “E-Rate” program unless they certify that they have certain Internet safety measures in place to block or filter “visual depictions that are obscene, child pornography, or are harmful to minors”

Fundamentals of Information Systems, Seventh Edition 58

Page 59: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Privacy Act of 1974• Provides privacy protection from federal

agencies• Applies to all federal agencies except the CIA

and law enforcement agencies• Requires training for all federal employees

who interact with a “system of records” under the act

Fundamentals of Information Systems, Seventh Edition 59

Page 60: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Electronic Communications Privacy Act

• Deals with three main issues– Protection of communications while in transit from sender to receiver– Protection of communications held in electronic storage– Prohibition of devices to record dialing, routing, addressing, and

signaling information without a search warrant– Prohibits government from intercepting electronic messages unless it

obtains a court order based on probable cause. – Prohibits access to wire and electronic communications for stored

communications not readily accessible to the general public

Fundamentals of Information Systems, Seventh Edition 60

Page 61: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Gramm-Leach-Bliley Act– Requires financial institutions to protect

customers’ nonpublic data– Assumes that all customers approve of the

financial institutions’ collecting and storing their personal information.

Fundamentals of Information Systems, Seventh Edition 61

Page 62: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

USA Patriot Act– Passed in response to the September 11 terrorism

acts– Proponents argue that it gives necessary new

powers to both domestic law enforcement and international intelligence agencies.

– Critics argue that the law removes many of the checks and balances that previously allowed the courts to ensure that law enforcement agencies did not abuse their powers.

Fundamentals of Information Systems, Seventh Edition 62

Page 63: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Corporate Privacy Policies

–Most organizations realize that invasions of privacy can hurt their business, turn away customers, and dramatically reduce revenues and profits

–Most organizations maintain privacy policies, even though they are not required by law

– Policies should address a customer’s knowledge, control, notice, and consent over the storage and use of information

Fundamentals of Information Systems, Seventh Edition 63

Page 64: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Individual Efforts to Protect Privacy• To protect personal privacy:– Find out what is stored about you in existing

databases– Be careful when you share information about

yourself– Be proactive to protect your privacy– Take extra care when purchasing anything from a

Web site

Fundamentals of Information Systems, Seventh Edition 64

Page 65: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

The Work Environment• Use of computer-based information systems

has changed the workforce:– Jobs that require IS literacy have increased– Less-skilled positions have decreased

• Enhanced telecommunications: – Has been the impetus for new types of business – Has created global markets in industries once

limited to domestic markets

Fundamentals of Information Systems, Seventh Edition 65

Page 66: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Health Concerns

• Occupational stress

• Seated immobility thromboembolism (SIT)

• Carpal tunnel syndrome (CTS)

• Video display terminal (VDT) bill:– Employees who spend at least four hours a day

working with computer screens should be given 15-minute breaks every two hours

Fundamentals of Information Systems, Seventh Edition 66

Page 67: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Avoiding Health and Environment Problems

• Work stressors:– Hazardous activities associated with unfavorable

conditions of a poorly designed work environment• Ergonomics:– Science of designing machines, products, and

systems to maximize safety, comfort, and efficiency of people who use them

Fundamentals of Information Systems, Seventh Edition 67

Page 68: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Ethical Issues in Information Systems

• Code of ethics:– States the principles and core values essential to a

set of people and, therefore, govern their behavior

– Can become a reference point for weighing what is legal and what is ethical

Fundamentals of Information Systems, Seventh Edition 68

Page 69: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Ethical Issues in Information Systems (continued)

–Mishandling of the social issues discussed in this chapter—including waste and mistakes, crime, privacy, health, and ethics—can devastate an organization

– Prevention of these problems and recovery from them are important aspects of managing information and information systems as critical corporate assets

Fundamentals of Information Systems, Seventh Edition 69

Page 70: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Summary• Computer waste:– The inappropriate use of computer technology and

resources in both the public and private sectors• Preventing waste and mistakes involves:– Establishing, implementing, monitoring, and reviewing

effective policies and procedures• Some crimes use computers as tools• Cyberterrorist:– Intimidates or coerces a government or organization to

advance his or her political or social objectives

Fundamentals of Information Systems, Seventh Edition 70

Page 71: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Summary (continued)• To detect and prevent computer crime use:– Antivirus software – Intrusion detection systems (IDSs)

• Privacy issues:– A concern with government agencies, e-mail use,

corporations, and the Internet• Businesses:– Should develop a clear and thorough policy about privacy

rights for customers, including database access

Fundamentals of Information Systems, Seventh Edition 71

Page 72: Fundamentals of Information Systems, Seventh Editionmhtay/ITEC110/Fundamental_Info_Sys/Lec… · attacks against the country’s critical infrastructure • Cyberterrorist: –Intimidates

Summary (continued)• Computer-related scams:– Have cost people and companies thousands of dollars

• Ergonomics:– The study of designing and positioning computer

equipment• Code of ethics:– States the principles and core values that are essential to

the members of a profession or organization

Fundamentals of Information Systems, Seventh Edition 72