+ All Categories
Home > Documents > Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on...

Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on...

Date post: 17-Dec-2015
Category:
Upload: laura-bell
View: 217 times
Download: 0 times
Share this document with a friend
46
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the Digital World , Leonard Jessup and Joseph Valacich, Pearson Prentice Hall, 2007
Transcript

Class 11: Information Systems Ethics and CrimeMIS 2101: Management Information Systems

Based on material from Information Systems Today: Managing in the Digital World, Leonard Jessup and Joseph Valacich, Pearson Prentice Hall, 2007

Worldwide losses due to software piracy in 2008 exceeded $50 billion.

Business Software Alliance, 2009

Worldwide losses due to software piracy in 2005 exceeded $34 billion.

Business Software Alliance, 2006

2010: $58.8 billion – almost double the amount in 2003.

Emerging economies account for almost half

US is the leader at $9.52 billion

http://www.businessweek.com/news/2011-05-12/software-piracy-losses-jump-to-59-billion-in-2010-report-says.html

3

4

Learning Objectives

Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility.

Define computer crime and list several types of computer crime.

Describe and explain the differences between cyberwar and cyberterrorism.

Computer Ethics

What are

“Computer Ethics”?

Issues and standards of conduct as they pertain to the use of information systems.

Information Privacy

What information should you have to reveal?

What information you might want to keep private?

What is identity theft?

Information Privacy

Information Privacy Companies seem to know about our every move –

how much information do we need to reveal?

Amazon.com is famous for personalization

What are the costs?

How to Maintain Your Privacy Online

Review the privacy policy of the company with which you are transacting

The policy should indicate: What information is being gathered about you How the seller will use this information Whether and how you can “opt out” of these practices

Additional tips: Choose Web sites monitored by independent organizations Avoid having cookies left on your machine Visit sites anonymously Use caution when requesting confirmation email

Avoid Getting Conned in Cyberspace

Top 10 List of Things Not to Do

Information Accuracy

Who is responsible for ensuring of the authenticity and fidelity of information?

Information Property

Who owns information about individuals?

How can this information be sold and exchanged?

Data Privacy Statements

If a company maintaining the database with customer information legally owns itIs free to sell it?

• Must it ensure proper data handling practices?

Spam, Cookies and Spyware

What is “Spam”? Unsolicited email

What are “Cookies”? Text files storing web activities

What is “Spyware”? Software used for data collection without our knowledge

Combating Spyware

Windows defender Spyware

monitoring and removal

Others Include: Ad-aware Spybot Search &

Destroy

Cybersquatting

What is “Cybersquatting”?

What protection do organizations have against cybersquatting?

Information Accessibility

Who has the right to monitor the information?

What was “Carnivore”?

Legal Support for Electronic Communication Privacy

What laws protect electronic communications privacy? Provides little support

Geared toward protecting voice privacyNo other laws for emailSome states define their own rules for companies.

Need for a Code of Ethical Conduct

Many businesses have guidelines for appropriate use

Universities endorse guidelines proposed by EduCom

Responsible computer use (based on work of the Computer Ethics Institute) prohibits:1. Using a computer to harm others2. Interfering with other people’s computer work3. Snooping in other people’s files

Need for a Code of Ethical Conduct

Responsible computer use prohibits (continued):

4. Using a computer to steal

5. Copying or using proprietary software without paying for it

6. Using other people’s computer resources without authorization

7. Appropriating other people’s intellectual output

No Place to Hide Video

What are the major technologies discussed in the video?

Who uses the technologies for what purpose? What are the ethical issues (privacy, accuracy,

property, and accessibility)? Do you feel that the technology applications

are appropriate?

Learning Objectives

Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility.

Define computer crime and list several types of computer crime.

Describe and explain the differences between cyberwar and cyberterrorism.

Computer Crime

What defines a “Computer Crime”?

28

Types of Computer Crimes and Financial Losses

What do you think happens to a company’s stock price if they report that their systems have been compromised?

Would you report it if you didn’t have to?

29

Financial Impact of Virus Attacks

Unauthorized Computer Access

What do we mean by “Unauthorized Computer Access”?

Examples?

How much goes unreported?

31

Unauthorized computer access

Why has unauthorized access been on a decline?

Federal and State Laws

Two main federal laws against computer crime Computer Fraud and Abuse Act of 1986 1996 Amendment

Electronic Communications Privacy Act of 1986

USA PATRIOT Act of 2002

What is “Computer Forensics”?

Hacking and Cracking

What is the difference between a “Hacker”, a “Cracker” and a “Hacktivist”?

Who Commits Computer Crimes?

Can you paint a picture of the typical computer criminal?

Four groups of computer criminals1. Current or former employees

• 85-95% of theft from business comes from the inside• How much time/money do we focus on keeping outsiders out of our systems?

2. People with technical knowledge committing crimes for personal gain

3. Career criminals using computers to assist them in crimes

4. Outside crackers hoping to find information of value

Types of Computer Crimes

37

Types of Computer Crimes

Software Piracy

Legal activities

Illegal activities

Applicable copyright laws

Computer Viruses and Other Destructive Code

Malware (malicious software)1,400 new pieces released in one monthViruses

• Reproduce themselves• Usually delete or destroy files• Boot sector viruses• File infector viruses• Viruses can spread through e-mail attachments

Computer Viruses

41

How a Computer Virus is Spread

Worms, Trojan Horses and Other Sinister Programs

Worm

Trojan horse

Logic bombs and time bombs

Learning Objectives

Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility.

Define computer crime and list several types of computer crime.

Describe and explain the differences between cyberwar and cyberterrorism.

Cyberterrorism

Cyberwar Military’s attempt to disrupt or destroy other

country’s information and communication systems

Cyberterrorism

Governments not involved Can be launched from anywhere in the world Goal is to cause fear, panic and destruction Cyberterrorism will likely become weapon of

choice


Recommended