Date post: | 17-Dec-2015 |
Category: |
Documents |
Upload: | laura-bell |
View: | 217 times |
Download: | 0 times |
Class 11: Information Systems Ethics and CrimeMIS 2101: Management Information Systems
Based on material from Information Systems Today: Managing in the Digital World, Leonard Jessup and Joseph Valacich, Pearson Prentice Hall, 2007
Worldwide losses due to software piracy in 2008 exceeded $50 billion.
Business Software Alliance, 2009
Worldwide losses due to software piracy in 2005 exceeded $34 billion.
Business Software Alliance, 2006
2010: $58.8 billion – almost double the amount in 2003.
Emerging economies account for almost half
US is the leader at $9.52 billion
http://www.businessweek.com/news/2011-05-12/software-piracy-losses-jump-to-59-billion-in-2010-report-says.html
3
Learning Objectives
Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility.
Define computer crime and list several types of computer crime.
Describe and explain the differences between cyberwar and cyberterrorism.
Computer Ethics
What are
“Computer Ethics”?
Issues and standards of conduct as they pertain to the use of information systems.
Information Privacy
What information should you have to reveal?
What information you might want to keep private?
What is identity theft?
Information Privacy Companies seem to know about our every move –
how much information do we need to reveal?
Amazon.com is famous for personalization
What are the costs?
How to Maintain Your Privacy Online
Review the privacy policy of the company with which you are transacting
The policy should indicate: What information is being gathered about you How the seller will use this information Whether and how you can “opt out” of these practices
Additional tips: Choose Web sites monitored by independent organizations Avoid having cookies left on your machine Visit sites anonymously Use caution when requesting confirmation email
Information Accuracy
Who is responsible for ensuring of the authenticity and fidelity of information?
Information Property
Who owns information about individuals?
How can this information be sold and exchanged?
Data Privacy Statements
If a company maintaining the database with customer information legally owns itIs free to sell it?
• Must it ensure proper data handling practices?
Spam, Cookies and Spyware
What is “Spam”? Unsolicited email
What are “Cookies”? Text files storing web activities
What is “Spyware”? Software used for data collection without our knowledge
Combating Spyware
Windows defender Spyware
monitoring and removal
Others Include: Ad-aware Spybot Search &
Destroy
Cybersquatting
What is “Cybersquatting”?
What protection do organizations have against cybersquatting?
Legal Support for Electronic Communication Privacy
What laws protect electronic communications privacy? Provides little support
Geared toward protecting voice privacyNo other laws for emailSome states define their own rules for companies.
Need for a Code of Ethical Conduct
Many businesses have guidelines for appropriate use
Universities endorse guidelines proposed by EduCom
Responsible computer use (based on work of the Computer Ethics Institute) prohibits:1. Using a computer to harm others2. Interfering with other people’s computer work3. Snooping in other people’s files
Need for a Code of Ethical Conduct
Responsible computer use prohibits (continued):
4. Using a computer to steal
5. Copying or using proprietary software without paying for it
6. Using other people’s computer resources without authorization
7. Appropriating other people’s intellectual output
No Place to Hide Video
What are the major technologies discussed in the video?
Who uses the technologies for what purpose? What are the ethical issues (privacy, accuracy,
property, and accessibility)? Do you feel that the technology applications
are appropriate?
Learning Objectives
Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility.
Define computer crime and list several types of computer crime.
Describe and explain the differences between cyberwar and cyberterrorism.
28
Types of Computer Crimes and Financial Losses
What do you think happens to a company’s stock price if they report that their systems have been compromised?
Would you report it if you didn’t have to?
Unauthorized Computer Access
What do we mean by “Unauthorized Computer Access”?
Examples?
How much goes unreported?
Federal and State Laws
Two main federal laws against computer crime Computer Fraud and Abuse Act of 1986 1996 Amendment
Electronic Communications Privacy Act of 1986
USA PATRIOT Act of 2002
Who Commits Computer Crimes?
Can you paint a picture of the typical computer criminal?
Four groups of computer criminals1. Current or former employees
• 85-95% of theft from business comes from the inside• How much time/money do we focus on keeping outsiders out of our systems?
2. People with technical knowledge committing crimes for personal gain
3. Career criminals using computers to assist them in crimes
4. Outside crackers hoping to find information of value
Computer Viruses and Other Destructive Code
Malware (malicious software)1,400 new pieces released in one monthViruses
• Reproduce themselves• Usually delete or destroy files• Boot sector viruses• File infector viruses• Viruses can spread through e-mail attachments
Learning Objectives
Discuss the ethical concerns associated with information privacy, accuracy, property, and accessibility.
Define computer crime and list several types of computer crime.
Describe and explain the differences between cyberwar and cyberterrorism.
Cyberwar Military’s attempt to disrupt or destroy other
country’s information and communication systems