Date post: | 06-Jan-2018 |
Category: |
Documents |
Upload: | mitchell-harmon |
View: | 214 times |
Download: | 0 times |
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill
Chapter 10: Privacy,Chapter 10: Privacy,Security, and EthicsSecurity, and Ethics
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-2McGraw-Hill
IntroductionIntroduction• Information systems consist of Information systems consist of
people, procedures, software, people, procedures, software, hardware and data.hardware and data.
• This chapter focuses on people.This chapter focuses on people.
• Effective implementation of Effective implementation of computer technology involves computer technology involves maximizing its positive effects maximizing its positive effects while minimizing its negative while minimizing its negative effects.effects.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-3McGraw-Hill
PeoplePeople• Privacy – What are the threats Privacy – What are the threats
to personal privacy and how can to personal privacy and how can we protect ourselves?we protect ourselves?
• Security – How can access to Security – How can access to sensitive information be sensitive information be controlled and how can we controlled and how can we secure hardware and software?secure hardware and software?
• Ethics – How do the actions of Ethics – How do the actions of individual users and companiesindividual users and companiesaffect society?affect society?
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-4McGraw-Hill
PrivacyPrivacy• Privacy – concerns the Privacy – concerns the
collection and use of data collection and use of data about individualsabout individuals
• Three primary privacy issues: Three primary privacy issues: – AccuracyAccuracy– PropertyProperty– AccessAccess
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-5McGraw-Hill
Large DatabasesLarge Databases• Federal government alone Federal government alone
has over 2,000 databaseshas over 2,000 databases• Reverse directory compiles Reverse directory compiles
lists of the calls we makelists of the calls we make• Data gatherersData gatherers
– Information resellers or Information resellers or information brokersinformation brokers
– Electronic profiles are Electronic profiles are easily createdeasily created
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-6McGraw-Hill
Large Databases - Large Databases - Issues Issues
• Your personal information is a Your personal information is a marketable commodity, which marketable commodity, which raises many issues:raises many issues:– Collecting public, but personally Collecting public, but personally
identifying information (e.g., Google’s identifying information (e.g., Google’s Street View)Street View)
– Spreading information without personal Spreading information without personal consent, leading to identity theftconsent, leading to identity theft
– Spreading inaccurate informationSpreading inaccurate information• Mistaken identity Mistaken identity • Freedom of Information Act Freedom of Information Act
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-7McGraw-Hill
Private NetworksPrivate Networks• Employers can monitor e-mail Employers can monitor e-mail
legallylegally– 75 percent of all businesses search 75 percent of all businesses search
employees’ electronic mail and employees’ electronic mail and computer files using snoopwarecomputer files using snoopware
– A proposed law could prohibit this A proposed law could prohibit this type of type of electronic monitoringelectronic monitoringor at least require theor at least require theemployer to notifyemployer to notifythe employee firstthe employee first
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-8McGraw-Hill
The Internet and the The Internet and the WebWeb
• Illusion of anonymityIllusion of anonymity– People are not concerned about People are not concerned about
privacy when surfing the Internet or privacy when surfing the Internet or when sending e-mailwhen sending e-mail
• History file in Web browsersHistory file in Web browsers• Traditional cookies from Traditional cookies from
Web surfingWeb surfing• Spyware Spyware
– Ad network or adware cookiesAd network or adware cookies– Web bugsWeb bugs– Computer monitoring softwareComputer monitoring software
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-9McGraw-Hill
Viewing and Blocking Viewing and Blocking CookiesCookies
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-10McGraw-Hill
Spyware RemovalSpyware Removal• Anti-Spyware programsAnti-Spyware programs
– Designed to detect and remove Designed to detect and remove cookies, web bugs, and monitoring cookies, web bugs, and monitoring software, such as key loggerssoftware, such as key loggers
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-11McGraw-Hill
Privacy Law In SAPrivacy Law In SAThe National Assemble approved a law that will protect people from the illegal use of their private information - 11 Sep 2012 in the.
E-mail users will be
protected from junk mail
People will not need to tolerate
unwanted calls at
inconvenient times
The gathering, publication and selling of computer numbers will be a crime with a maximum of 10 years jail sentence.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-12McGraw-Hill
SecuritySecurity• Threats to computer security Threats to computer security
include criminals, computer include criminals, computer crimes, and other hazardscrimes, and other hazards
• Computer criminals:Computer criminals:– EmployeesEmployees– Outside usersOutside users– Hackers and crackersHackers and crackers– Organized crimeOrganized crime– TerroristsTerrorists
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-13McGraw-Hill
Computer CrimeComputer Crime• Malicious Malicious
ProgramsPrograms– VirusesViruses– WormsWorms– Trojan horseTrojan horse– ZombiesZombies
• Denial of Denial of service (DoS) service (DoS) attacksattacks
• Internet scams, Internet scams, such as such as phishingphishing
• Social networking Social networking risksrisks
• Rogue Wi-Fi hotspotsRogue Wi-Fi hotspots
• Theft of hardware, Theft of hardware, software, data, and software, data, and computer timecomputer time
• Data manipulation Data manipulation
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-14McGraw-Hill
Common Internet Common Internet ScamsScams
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-15McGraw-Hill
Other Hazards Other Hazards • Natural hazardsNatural hazards
– Natural forces such as fires, floods, and Natural forces such as fires, floods, and tornadoestornadoes
• Civil strife and terrorismCivil strife and terrorism– Wars, riots, and terrorist activitiesWars, riots, and terrorist activities
• Technological failuresTechnological failures– Voltage surge or spikeVoltage surge or spike– Use a surge protectorUse a surge protector
• Human errorsHuman errors– Data entry errorsData entry errors– Programmer errorProgrammer error
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-16McGraw-Hill
Measures to Protect Measures to Protect Computer SecurityComputer Security
• Restricting accessRestricting access• EncryptingEncrypting datadata• Anticipating disastersAnticipating disasters• Preventing data lossPreventing data loss
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-19McGraw-Hill
Ethics Ethics • CopyrightCopyright
– Gives content creators the right to Gives content creators the right to control the use and distribution of control the use and distribution of their worktheir work
• Software piracySoftware piracy– Unauthorized copying and distributionUnauthorized copying and distribution– Digital Millennium Copyright ActDigital Millennium Copyright Act– Digital rights management (DRM)Digital rights management (DRM)
• Plagiarism Plagiarism
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-20McGraw-Hill
VRAE?VRAE?
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill
Chapter 11: Your Future Chapter 11: Your Future and Information and Information
TechnologyTechnology
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-22McGraw-Hill
Changing TimesChanging Times• Banks Banks
– ATMATM
– ATM cardsATM cards
– Internet bankingInternet banking
– S/w verify signaturesS/w verify signatures
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-23McGraw-Hill
Technology and Technology and OrganizationsOrganizations
• New ProductsNew Products
• New EnterprisesNew Enterprises
• New Customer and Supplier New Customer and Supplier RelationshipsRelationships
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-24McGraw-Hill
How You Can Be a How You Can Be a WinnerWinner
• Stay Current – journals, conferencesStay Current – journals, conferences
• Maintain Your Computer Competency Maintain Your Computer Competency – books, journals, trade associations– books, journals, trade associations
• Develop Professional ContactsDevelop Professional Contacts
• Develop SpecialtiesDevelop Specialties
• Be alert for Organizational ChangeBe alert for Organizational Change
• Look for Innovative OpportunitiesLook for Innovative Opportunities
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-25McGraw-Hill
VRAE?VRAE?
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Com
puti
ng E
ssen
tial
s 20
12:
Com
puti
ng E
ssen
tial
s 20
12: M
akin
g IT
Wor
k fo
r You
Mak
ing
IT W
ork
for Y
ou
10-26McGraw-Hill
Chapter 10 + 11 Chapter 10 + 11
STUDY STUDY p308 – 313p308 – 313p331 – 336p331 – 336
•VISUAL SUMMARY VISUAL SUMMARY •KEY TERMSKEY TERMS•MULTIPLE CHOICE Q’sMULTIPLE CHOICE Q’s•MATCHING Q’sMATCHING Q’s