Transcript
Page 1: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

FundamentalsofInformationSystems,SeventhEdition

FundamentalsofInformationSystems,SeventhEdition 1

Chapter 9The Personal and Social

Impact of Computers

Page 2: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrinciplesandLearningObjectives(continued)

• Computercrimeisaseriousandrapidlygrowingareaofconcernrequiringmanagementattention– Explainthetypesofcomputercrimeandtheireffects

– Identifyspecificmeasurestopreventcomputercrime

FundamentalsofInformationSystems,SeventhEdition 2

Page 3: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrinciplesandLearningObjectives(continued)

• Jobs,equipment,andworkingconditionsmustbedesignedtoavoidnegativehealtheffectsfromcomputers– Listtheimportantnegativeeffectsofcomputersontheworkenvironment

– Identifyspecificactionsthatmustbetakentoensurethehealthandsafetyofemployees

FundamentalsofInformationSystems,SeventhEdition 3

Page 4: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrinciplesandLearningObjectives(continued)

• Practitionersinmanyprofessionssubscribetoacodeofethicsthatstatestheprinciplesandcorevaluesthatareessentialtotheirwork– Outlinecriteriafortheethicaluseofinformationsystems

FundamentalsofInformationSystems,SeventhEdition 4

Page 5: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

WhyLearnAboutthePersonalandSocialImpactoftheInternet?

• Bothopportunitiesandthreats:– SurroundawiderangeofnontechnicalissuesassociatedwiththeuseofinformationsystemsandtheInternet

• Youneedtoknowaboutthetopicsinthischapter:– Tohelpavoidbecomingavictimofcrime,fraud,privacyinvasion,andotherpotentialproblem

FundamentalsofInformationSystems,SeventhEdition 5

Page 6: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

ComputerCrime

• 300,000crimesreportedtoTheInternetCrimeComputerCenterin2010

• Twomostcommononlinecomputercrimes:– Undeliveredmerchandiseornonpayment– IdentitytheftusingnamesandphotosofU.S.governmentofficials

FundamentalsofInformationSystems,SeventhEdition 6

Page 7: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

TheComputerasaTooltoCommitCrime

• Computercriminalneedstwocapabilitiestocommitcrime:– Howtogainaccesstothecomputersystem– Howtomanipulatethesystemtogetthedesiredresult

• Socialengineering:– Usingsocialskillstogetcomputeruserstoprovideinformationtoaccessaninformationsystem

• Dumpsterdiving:– Goingthroughtrashcanstofindsecretorconfidentialinformation

FundamentalsofInformationSystems,SeventhEdition 7

Page 8: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Cyberterrorism• HomelandSecurityDepartment’sInformationAnalysisandInfrastructureProtection-Directorate:– Servesasafocalpointforthreatassessment,warning,investigation,andresponseforthreatsorattacksagainstthecountry’scriticalinfrastructure

• Cyberterrorist:– Intimidatesorcoercesagovernmentororganizationtoadvancehisorherpoliticalorsocialobjectives

FundamentalsofInformationSystems,SeventhEdition 8

Page 9: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

IdentityTheft

• Imposterobtainspersonalidentificationinformationinordertoimpersonatesomeoneelse:– Toobtaincredit,merchandise,andservicesinthenameofthevictim

– Tohavefalsecredentials

FundamentalsofInformationSystems,SeventhEdition 9

Page 10: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

InternetGambling

• Globalonlinegamblingmarketover$30billion

• Lawsregardinglegalityofonlinegamblingquiteconfusing

• RevenuesgeneratedbyInternetgamblingrepresentamajoruntappedsourceofincomeforstateandfederalgovernments

FundamentalsofInformationSystems,SeventhEdition 10

Page 11: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

TheComputerasaTooltoFightCrime

• Informationsystemscanbeusedtofightcrimeinmanyways:

• LeadsOnlineWeb-basedservicesystem:– Usedbylawenforcementtorecoverstolenproperty

– Containshundredsofmillionsofrecordsinitsdatabase

– Allowslawenforcementofficerstosearchthedatabasebyitemserialnumberorbyindividual

FundamentalsofInformationSystems,SeventhEdition 11

Page 12: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

MonitoringCriminals• JusticeXchange:–Web-baseddatasharingsystem– ProvidesinformationaboutoffendersheldinparticipatingjailsacrosstheUnitedStates

• OffenderWatch:–Web-basedsystemusedtotrackregisteredsexoffenders

– Storestheregisteredoffender’saddress,physicaldescription,andvehicleinformation

– PubliccanaccessdatabaseFundamentalsofInformationSystems,

SeventhEdition 12

Page 13: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

AssessingCrimeRiskforaGivenArea

• CAPIndexprovidesquickoverviewofcrimeriskatagivenaddress

• OthercommonGISsystemsinclude:– TheNationalEquipmentRegistry– TheCompStatprogram– CargoNet

FundamentalsofInformationSystems,SeventhEdition 13

Page 14: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

TheComputerastheObjectofCrime

• Crimesfallintoseveralcategories:– Illegalaccessanduse– Dataalterationanddestruction– Informationandequipmenttheft– SoftwareandInternetpiracy– Computer-relatedscams– Internationalcomputercrime

FundamentalsofInformationSystems,SeventhEdition 14

Page 15: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

FundamentalsofInformationSystems,SeventhEdition 15

Page 16: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

IllegalAccessandUse

• Hacker:– Learnsaboutandusescomputersystems

• Criminalhacker:– Gainsunauthorizeduseorillegalaccesstocomputersystems

• Scriptbunny:– Automatesthejobofcrackers

• Insider:– Employeewhocomprisescorporatesystems

FundamentalsofInformationSystems,SeventhEdition 16

Page 17: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

IllegalAccessandUse(continued)• Virus:– Programfilecapableofattachingtodisksorotherfilesandreplicatingitselfrepeatedly

• Worm:– Parasiticcomputerprogramsthatreplicatebut,unlikeviruses,donotinfectothercomputerprogramfiles

• Trojanhorse:– Maliciousprogramthatdisguisesitselfasausefulapplicationorgameandpurposefullydoessomethingtheuserdoesnotexpect

FundamentalsofInformationSystems,SeventhEdition 17

Page 18: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

IllegalAccessandUse(continued)• Rootkit:– Setofprogramsthatenableitsusertogainadministratorlevelaccesstoacomputerornetwork

• Logicbomb:– TypeofTrojanhorsethatexecuteswhenspecificconditionsoccur

• Variant:–Modifiedversionofavirusthatisproducedbyvirus’sauthororanotherperson

FundamentalsofInformationSystems,SeventhEdition 18

Page 19: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Spyware

• Softwareinstalledonapersonalcomputerto:– Interceptortakepartialcontroloveruser’sinteractionwiththecomputerwithoutknowledgeorpermissionoftheuser

• SimilartoaTrojanhorseinthat:– UsersunknowinglyinstallitwhentheydownloadfreewareorsharewarefromtheInternet

FundamentalsofInformationSystems,SeventhEdition 19

Page 20: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

InformationandEquipmentTheft

• Passwordsniffer:– Smallprogramhiddeninanetworkthatrecordsidentificationnumbersandpasswords

• Portablecomputerssuchaslaptopsandportablestoragedevicesareespeciallyeasyforthievestotake:– Dataandinformationstoredinthesesystemsaremorevaluablethantheequipment

FundamentalsofInformationSystems,SeventhEdition 20

Page 21: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PatentandCopyrightViolations

• Softwarepiracy:– Actofunauthorizedcopyingordistributionofcopyrightedsoftware

– Penaltiescanbesevere• Digitalrightsmanagement:– Theuseofanyofseveraltechnologiestoenforcepoliciesforcontrollingaccesstodigitalmedia

FundamentalsofInformationSystems,SeventhEdition 21

Page 22: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PatentandCopyrightViolations(continued)

• Patentinfringement:– Occurswhensomeonemakesunauthorizeduseofanother’spatent

– Penaltyisuptothreetimesthedamagesclaimedbythepatentholder

FundamentalsofInformationSystems,SeventhEdition 22

Page 23: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Computer-RelatedScams

• Phishing:– Perpetratorsendemailthatlooksasifitcamefromalegitimateinstitution

– Recipientaskedtoprovidepersonalidentificationinformationsuchapinnumberandpassword

• Overthepastfewyears:– Creditcardcustomersofvariousbankshavebeentargetedbyscamartiststryingtogetpersonalinformationusingphishing

FundamentalsofInformationSystems,SeventhEdition 23

Page 24: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Computer-RelatedScams(continued)

• Vishing:– Similartophishing– Insteadofusingthevictim’scomputer,itusesthevictim’sphone

FundamentalsofInformationSystems,SeventhEdition 24

Page 25: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

InternationalComputerCrime

• Computercrimebecomesmorecomplexwhenitcrossesborders

• Moneylaundering:– Disguisingillegallygainedfundssothattheyseemlegal

FundamentalsofInformationSystems,SeventhEdition 25

Page 26: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PreventingComputer-RelatedCrime

• Greateremphasisplacedonpreventionanddetectionofcomputercrimeby:– Privateusers– Companies– Employees– Publicofficials

FundamentalsofInformationSystems,SeventhEdition 26

Page 27: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

CrimePreventionbyStateandFederalAgencies

• Stateandfederalagenciesaggressivelyattackingcomputercriminals

• ComputerFraudandAbuseActof1986:–Mandatespunishmentbasedonthevictim’sdollarloss

• ComputerEmergencyResponseTeam(CERT):– Respondstonetworksecuritybreaches–Monitorssystemsforemergingthreats

FundamentalsofInformationSystems,SeventhEdition 27

Page 28: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

CrimePreventionbyCorporations

• Companiestakingcomputercrimeseriously– Encryptionusedtoencodedata– Role-basedsystemaccessliststocontrolsystemaccess

– Separationofdutiestopreventcollusion– Useoffingerprintauthenticationdevicestogainaccess

FundamentalsofInformationSystems,SeventhEdition 28

Page 29: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

CrimePreventionbyCorporations(continued)

• Guidelinestoprotectyourcomputerfromcriminalhackers:– Installstronguserauthenticationandencryptioncapabilitiesonyourfirewall

– Installthelatestsecuritypatches– Disableguestaccountsandnulluseraccounts– Turnaudittrailson– ConsiderinstallingcallerID– InstallacorporatefirewallbetweenyourcorporatenetworkandtheInternet

FundamentalsofInformationSystems,SeventhEdition 29

Page 30: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

UsingIntrusionDetectionSoftware

• Usingintrusiondetectionsoftware:– Intrusiondetectionsystem(IDS):• Monitorssystemandnetworkresources• Notifiesnetworksecuritypersonnelwhenitsensesapossibleintrusion• Canprovidefalsealarms

FundamentalsofInformationSystems,SeventhEdition 30

Page 31: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

SecurityDashboard

• SecurityDashboard:– Providescomprehensivedisplayonasinglecomputerscreenof:• Allthevitaldatarelatedtoanorganization’ssecuritydefenses,includingthreats,exposures,policycompliance,andincidentalerts

FundamentalsofInformationSystems,SeventhEdition 31

Page 32: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

FundamentalsofInformationSystems,SeventhEdition 32

Page 33: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

UsingManagedSecurityServiceProviders

• Usingmanagedsecurityserviceproviders(MSSPs):–Manyorganizationsareoutsourcingtheirnetworksecurityoperations

FundamentalsofInformationSystems,SeventhEdition 33

Page 34: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

GuardingAgainstTheftofEquipmentandData

• Organizationsneedtotakestrongmeasurestoguardagainstthetheftofcomputerhardwareandthedatastoredsuchas:– Setguidelinesonwhatkindofdatacanbestoredonlaptops

– Encryptdataonlaptops– Securelaptops– Providetrainingonsafehandlingoflaptops– Installtrackingsoftware

FundamentalsofInformationSystems,SeventhEdition 34

Page 35: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

CrimePreventionforIndividualsandEmployees

• Identitytheft:– Toprotectyourself,regularlycheckcreditreportswithmajorcreditbureaus

• Malwareattacks:– Antivirusprogramsruninthebackgroundtoprotectyourcomputer

–Manye-mailservicesandISPprovidersofferfreeantivirusprotection

FundamentalsofInformationSystems,SeventhEdition 35

Page 36: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

CrimePreventionforIndividualsandEmployees(continued)

• Computerscams:– Tipstohelpyouavoidbecomingavictim:• Don’tagreetoanythinginahigh-pressuremeetingorseminar• Don’tjudgeacompanybasedonappearances• Avoidanyplanthatpayscommissionssimplyforrecruitingadditionaldistributors• Bewareofshills• Bewareofacompany’sclaimthatitcansetyouupinaprofitablehome-basedbusiness

FundamentalsofInformationSystems,SeventhEdition 36

Page 37: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyIssues

• Issueofprivacy:– Dealswiththerighttobeleftaloneortobewithdrawnfrompublicview

• Dataisconstantlybeingcollectedandstoredoneachofus

• Thisdataisoftendistributedovereasilyaccessednetworksandwithoutourknowledgeorconsent

• Whoownsthisinformationandknowledge?FundamentalsofInformationSystems,

SeventhEdition 37

Page 38: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandtheFederalGovernment

• Thefederalgovernment:– Hasimplementedanumberoflawsaddressingpersonalprivacy

• EuropeanUnion:– Hasdata-protectiondirectivethatrequiresfirmstransportingdataacrossnationalboundariestohavecertainprivacyproceduresinplace

FundamentalsofInformationSystems,SeventhEdition 38

Page 39: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyatWork

• EmployersusingtechnologyandcorporatepoliciestomanageworkerproductivityandprotecttheuseofISresources.

• EmployersconcernedaboutinappropriateWebsurfing,withoverhalfofemployersmonitoringWebactivityoftheiremployees.

• Organizationsalsomonitoremployees’e-mail,withmorethanhalfretainingandreviewingmessages.

FundamentalsofInformationSystems,SeventhEdition 39

Page 40: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyatWork(continued)

• Mostemployerstodayhaveapolicythatexplicitlyeliminatesanyexpectationofprivacywhenanemployeeusesanycompany-ownedcomputer,server,ore-mailsystem.

• Thecourtshaveruledthat,withoutareasonableexpectationofprivacy,thereisnoFourthAmendmentprotectionfortheemployee.

FundamentalsofInformationSystems,SeventhEdition 40

Page 41: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandE-Mail

• Federallawpermitsemployerstomonitore-mailsentandreceivedbyemployees

• E-mailmessagesthathavebeenerasedfromharddiskscanberetrievedandusedinlawsuits

• Useofe-mailamongpublicofficialsmightviolate“openmeeting”laws

FundamentalsofInformationSystems,SeventhEdition 41

Page 42: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandInstantMessaging

• Toprotectyourprivacyandyouremployer’sproperty:– DonotsendpersonalorprivateIMsatwork– Chooseanonrevealing,nongender-specific,unprovocativeIMscreenname

– Donotopenfilesorclicklinksinmessagesfrompeopleyoudonotknow

– NeversendsensitivepersonaldatasuchascreditcardnumbersviaIM

FundamentalsofInformationSystems,SeventhEdition 42

Page 43: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandPersonalSensingDevices

• RFIDtags:–Microchipswithantenna– Embeddedinmanyoftheproductswebuy:• Medicinecontainers,clothing,computerprinters,carkeys,librarybooks,tires

– Generateradiotransmissionsthat,ifappropriatemeasuresarenottaken,canleadtopotentialprivacyconcerns

FundamentalsofInformationSystems,SeventhEdition 43

Page 44: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandtheInternet• HugepotentialforprivacyinvasionontheInternet:– E-mailmessages– VisitingaWebsite– BuyingproductsovertheInternet

• PlatformforPrivacyPreferences(P3P):– Screeningtechnology

• Socialnetworkservices:– Parentsshoulddiscusspotentialdangers,checktheirchildren’sprofiles,andmonitortheiractivities

FundamentalsofInformationSystems,SeventhEdition 44

Page 45: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandtheInternet(continued)

• Children’sOnlinePrivacyProtectionAct(COPPA)– DirectedatWebsitescateringtochildren– Requiressiteownerstopostcomprehensiveprivacypoliciesandtoobtainparentalconsentbeforetheycollectanypersonalinformationfromchildrenunder13yearsofage

• Websiteoperatorsareliableforcivilpenaltiesofupto$11,000perviolation

FundamentalsofInformationSystems,SeventhEdition 45

Page 46: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

InternetLibelConcerns

• Libel:– Publishinganintentionallyfalsewrittenstatementthatisdamagingtoaperson’sororganization’sreputation

• Individuals:– CanpostinformationtotheInternetusinganonymouse-mailaccountsorscreennames

–MustbecarefulwhattheypostontheInternettoavoidlibelcharges

FundamentalsofInformationSystems,SeventhEdition 46

Page 47: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyandFairnessinInformationUse

• Sellinginformationtoothercompaniescanbesolucrativethatmanycompanieswillstoreandsellthedatatheycollectoncustomers,employees,andothers–Whenisthisinformationstorageandusefairandreasonabletothepeoplewhosedataisstoredandsold?

– Dopeoplehavearighttoknowaboutdatastoredaboutthemandtodecidewhatdataisstoredandused?

FundamentalsofInformationSystems,SeventhEdition 47

Page 48: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

FilteringandClassifyingInternetContent

• Filteringsoftware:– HelpscreenInternetcontent

• Children’sInternetProtectionAct(CIPA)– SchoolsandlibrariessubjecttoCIPAdonotreceivethediscountsofferedbythe“E-Rate”programunlesstheycertifythattheyhavecertainInternetsafetymeasuresinplacetoblockorfilter“visualdepictionsthatareobscene,childpornography,orareharmfultominors”

FundamentalsofInformationSystems,SeventhEdition 48

Page 49: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

PrivacyActof1974

• Providesprivacyprotectionfromfederalagencies

• AppliestoallfederalagenciesexcepttheCIAandlawenforcementagencies

• Requirestrainingforallfederalemployeeswhointeractwitha“systemofrecords”undertheact

FundamentalsofInformationSystems,SeventhEdition 49

Page 50: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

ElectronicCommunicationsPrivacyAct

• Dealswiththreemainissues– Protectionofcommunicationswhileintransitfromsendertoreceiver– Protectionofcommunicationsheldinelectronicstorage– Prohibitionofdevicestorecorddialing,routing,addressing,and

signalinginformationwithoutasearchwarrant– Prohibitsgovernmentfrominterceptingelectronicmessagesunlessit

obtainsacourtorderbasedonprobablecause.– Prohibitsaccesstowireandelectroniccommunicationsforstored

communicationsnotreadilyaccessibletothegeneralpublic

FundamentalsofInformationSystems,SeventhEdition 50

Page 51: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Gramm-Leach-BlileyAct

– Requiresfinancialinstitutionstoprotectcustomers’nonpublicdata

– Assumesthatallcustomersapproveofthefinancialinstitutions’collectingandstoringtheirpersonalinformation.

FundamentalsofInformationSystems,SeventhEdition 51

Page 52: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

USAPatriotAct

– PassedinresponsetotheSeptember11terrorismacts

– Proponentsarguethatitgivesnecessarynewpowerstobothdomesticlawenforcementandinternationalintelligenceagencies.

– Criticsarguethatthelawremovesmanyofthechecksandbalancesthatpreviouslyallowedthecourtstoensurethatlawenforcementagenciesdidnotabusetheirpowers.

FundamentalsofInformationSystems,SeventhEdition 52

Page 53: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

CorporatePrivacyPolicies

–Mostorganizationsrealizethatinvasionsofprivacycanhurttheirbusiness,turnawaycustomers,anddramaticallyreducerevenuesandprofits

–Mostorganizationsmaintainprivacypolicies,eventhoughtheyarenotrequiredbylaw

– Policiesshouldaddressacustomer’sknowledge,control,notice,andconsentoverthestorageanduseofinformation

FundamentalsofInformationSystems,SeventhEdition 53

Page 54: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

IndividualEffortstoProtectPrivacy

• Toprotectpersonalprivacy:– Findoutwhatisstoredaboutyouinexistingdatabases

– Becarefulwhenyoushareinformationaboutyourself

– Beproactivetoprotectyourprivacy– TakeextracarewhenpurchasinganythingfromaWebsite

FundamentalsofInformationSystems,SeventhEdition 54

Page 55: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

TheWorkEnvironment

• Useofcomputer-basedinformationsystemshaschangedtheworkforce:– JobsthatrequireISliteracyhaveincreased– Less-skilledpositionshavedecreased

• Enhancedtelecommunications:– Hasbeentheimpetusfornewtypesofbusiness– Hascreatedglobalmarketsinindustriesoncelimitedtodomesticmarkets

FundamentalsofInformationSystems,SeventhEdition 55

Page 56: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

HealthConcerns

• Occupationalstress• Seatedimmobilitythromboembolism(SIT)• Carpaltunnelsyndrome(CTS)• Videodisplayterminal(VDT)bill:– Employeeswhospendatleastfourhoursadayworkingwithcomputerscreensshouldbegiven15-minutebreakseverytwohours

FundamentalsofInformationSystems,SeventhEdition 56

Page 57: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

AvoidingHealthandEnvironmentProblems

• Workstressors:– Hazardousactivitiesassociatedwithunfavorableconditionsofapoorlydesignedworkenvironment

• Ergonomics:– Scienceofdesigningmachines,products,andsystemstomaximizesafety,comfort,andefficiencyofpeoplewhousethem

FundamentalsofInformationSystems,SeventhEdition 57

Page 58: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

EthicalIssuesinInformationSystems

• Codeofethics:– Statestheprinciplesandcorevaluesessentialtoasetofpeopleand,therefore,governtheirbehavior

– Canbecomeareferencepointforweighingwhatislegalandwhatisethical

FundamentalsofInformationSystems,SeventhEdition 58

Page 59: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

EthicalIssuesinInformationSystems(continued)

–Mishandlingofthesocialissuesdiscussedinthischapter—includingwasteandmistakes,crime,privacy,health,andethics—candevastateanorganization

– Preventionoftheseproblemsandrecoveryfromthemareimportantaspectsofmanaginginformationandinformationsystemsascriticalcorporateassets

FundamentalsofInformationSystems,SeventhEdition 59

Page 60: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Summary• Somecrimesusecomputersastools• Cyberterrorist:– Intimidatesorcoercesagovernmentororganizationtoadvancehisorherpoliticalorsocialobjectives

FundamentalsofInformationSystems,SeventhEdition 60

Page 61: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Summary(continued)• Todetectandpreventcomputercrimeuse:– Antivirussoftware– Intrusiondetectionsystems(IDSs)

• Privacyissues:– Aconcernwithgovernmentagencies,e-mailuse,corporations,andtheInternet

• Businesses:– Shoulddevelopaclearandthoroughpolicyaboutprivacyrightsforcustomers,includingdatabaseaccess

FundamentalsofInformationSystems,SeventhEdition 61

Page 62: Fundamentals of Information Systems, Seventh EditionFundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition 1 Chapter 9 The Personal

Summary(continued)• Computer-relatedscams:– Havecostpeopleandcompaniesthousandsofdollars

• Ergonomics:– Thestudyofdesigningandpositioningcomputerequipment

• Codeofethics:– Statestheprinciplesandcorevaluesthatareessentialtothemembersofaprofessionororganization

FundamentalsofInformationSystems,SeventhEdition 62


Recommended