+ All Categories
Home > Documents > Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10:...

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10:...

Date post: 06-Jan-2018
Category:
Upload: mitchell-harmon
View: 214 times
Download: 0 times
Share this document with a friend
Description:
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-3 McGraw-Hill People Privacy – What are the threats to personal privacy and how can we protect ourselves?Privacy – What are the threats to personal privacy and how can we protect ourselves? Security – How can access to sensitive information be controlled and how can we secure hardware and software?Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society?Ethics – How do the actions of individual users and companies affect society?
24
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw- Hill Chapter 10: Privacy, Chapter 10: Privacy, Security, and Ethics Security, and Ethics
Transcript
Page 1: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill

Chapter 10: Privacy,Chapter 10: Privacy,Security, and EthicsSecurity, and Ethics

Page 2: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-2McGraw-Hill

IntroductionIntroduction• Information systems consist of Information systems consist of

people, procedures, software, people, procedures, software, hardware and data.hardware and data.

• This chapter focuses on people.This chapter focuses on people.

• Effective implementation of Effective implementation of computer technology involves computer technology involves maximizing its positive effects maximizing its positive effects while minimizing its negative while minimizing its negative effects.effects.

Page 3: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-3McGraw-Hill

PeoplePeople• Privacy – What are the threats Privacy – What are the threats

to personal privacy and how can to personal privacy and how can we protect ourselves?we protect ourselves?

• Security – How can access to Security – How can access to sensitive information be sensitive information be controlled and how can we controlled and how can we secure hardware and software?secure hardware and software?

• Ethics – How do the actions of Ethics – How do the actions of individual users and companiesindividual users and companiesaffect society?affect society?

Page 4: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-4McGraw-Hill

PrivacyPrivacy• Privacy – concerns the Privacy – concerns the

collection and use of data collection and use of data about individualsabout individuals

• Three primary privacy issues: Three primary privacy issues: – AccuracyAccuracy– PropertyProperty– AccessAccess

Page 5: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-5McGraw-Hill

Large DatabasesLarge Databases• Federal government alone Federal government alone

has over 2,000 databaseshas over 2,000 databases• Reverse directory compiles Reverse directory compiles

lists of the calls we makelists of the calls we make• Data gatherersData gatherers

– Information resellers or Information resellers or information brokersinformation brokers

– Electronic profiles are Electronic profiles are easily createdeasily created

Page 6: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-6McGraw-Hill

Large Databases - Large Databases - Issues Issues

• Your personal information is a Your personal information is a marketable commodity, which marketable commodity, which raises many issues:raises many issues:– Collecting public, but personally Collecting public, but personally

identifying information (e.g., Google’s identifying information (e.g., Google’s Street View)Street View)

– Spreading information without personal Spreading information without personal consent, leading to identity theftconsent, leading to identity theft

– Spreading inaccurate informationSpreading inaccurate information• Mistaken identity Mistaken identity • Freedom of Information Act Freedom of Information Act

Page 7: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-7McGraw-Hill

Private NetworksPrivate Networks• Employers can monitor e-mail Employers can monitor e-mail

legallylegally– 75 percent of all businesses search 75 percent of all businesses search

employees’ electronic mail and employees’ electronic mail and computer files using snoopwarecomputer files using snoopware

– A proposed law could prohibit this A proposed law could prohibit this type of type of electronic monitoringelectronic monitoringor at least require theor at least require theemployer to notifyemployer to notifythe employee firstthe employee first

Page 8: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-8McGraw-Hill

The Internet and the The Internet and the WebWeb

• Illusion of anonymityIllusion of anonymity– People are not concerned about People are not concerned about

privacy when surfing the Internet or privacy when surfing the Internet or when sending e-mailwhen sending e-mail

• History file in Web browsersHistory file in Web browsers• Traditional cookies from Traditional cookies from

Web surfingWeb surfing• Spyware Spyware

– Ad network or adware cookiesAd network or adware cookies– Web bugsWeb bugs– Computer monitoring softwareComputer monitoring software

Page 9: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-9McGraw-Hill

Viewing and Blocking Viewing and Blocking CookiesCookies

Page 10: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-10McGraw-Hill

Spyware RemovalSpyware Removal• Anti-Spyware programsAnti-Spyware programs

– Designed to detect and remove Designed to detect and remove cookies, web bugs, and monitoring cookies, web bugs, and monitoring software, such as key loggerssoftware, such as key loggers

Page 11: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-11McGraw-Hill

Privacy Law In SAPrivacy Law In SAThe National Assemble approved a law that will protect people from the illegal use of their private information - 11 Sep 2012 in the.

E-mail users will be

protected from junk mail

People will not need to tolerate

unwanted calls at

inconvenient times

The gathering, publication and selling of computer numbers will be a crime with a maximum of 10 years jail sentence.

Page 12: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-12McGraw-Hill

SecuritySecurity• Threats to computer security Threats to computer security

include criminals, computer include criminals, computer crimes, and other hazardscrimes, and other hazards

• Computer criminals:Computer criminals:– EmployeesEmployees– Outside usersOutside users– Hackers and crackersHackers and crackers– Organized crimeOrganized crime– TerroristsTerrorists

Page 13: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-13McGraw-Hill

Computer CrimeComputer Crime• Malicious Malicious

ProgramsPrograms– VirusesViruses– WormsWorms– Trojan horseTrojan horse– ZombiesZombies

• Denial of Denial of service (DoS) service (DoS) attacksattacks

• Internet scams, Internet scams, such as such as phishingphishing

• Social networking Social networking risksrisks

• Rogue Wi-Fi hotspotsRogue Wi-Fi hotspots

• Theft of hardware, Theft of hardware, software, data, and software, data, and computer timecomputer time

• Data manipulation Data manipulation

Page 14: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-14McGraw-Hill

Common Internet Common Internet ScamsScams

Page 15: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-15McGraw-Hill

Other Hazards Other Hazards • Natural hazardsNatural hazards

– Natural forces such as fires, floods, and Natural forces such as fires, floods, and tornadoestornadoes

• Civil strife and terrorismCivil strife and terrorism– Wars, riots, and terrorist activitiesWars, riots, and terrorist activities

• Technological failuresTechnological failures– Voltage surge or spikeVoltage surge or spike– Use a surge protectorUse a surge protector

• Human errorsHuman errors– Data entry errorsData entry errors– Programmer errorProgrammer error

Page 16: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-16McGraw-Hill

Measures to Protect Measures to Protect Computer SecurityComputer Security

• Restricting accessRestricting access• EncryptingEncrypting datadata• Anticipating disastersAnticipating disasters• Preventing data lossPreventing data loss

Page 17: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-19McGraw-Hill

Ethics Ethics • CopyrightCopyright

– Gives content creators the right to Gives content creators the right to control the use and distribution of control the use and distribution of their worktheir work

• Software piracySoftware piracy– Unauthorized copying and distributionUnauthorized copying and distribution– Digital Millennium Copyright ActDigital Millennium Copyright Act– Digital rights management (DRM)Digital rights management (DRM)

• Plagiarism Plagiarism

Page 18: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-20McGraw-Hill

VRAE?VRAE?

Page 19: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill

Chapter 11: Your Future Chapter 11: Your Future and Information and Information

TechnologyTechnology

Page 20: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-22McGraw-Hill

Changing TimesChanging Times• Banks Banks

– ATMATM

– ATM cardsATM cards

– Internet bankingInternet banking

– S/w verify signaturesS/w verify signatures

Page 21: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-23McGraw-Hill

Technology and Technology and OrganizationsOrganizations

• New ProductsNew Products

• New EnterprisesNew Enterprises

• New Customer and Supplier New Customer and Supplier RelationshipsRelationships

Page 22: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-24McGraw-Hill

How You Can Be a How You Can Be a WinnerWinner

• Stay Current – journals, conferencesStay Current – journals, conferences

• Maintain Your Computer Competency Maintain Your Computer Competency – books, journals, trade associations– books, journals, trade associations

• Develop Professional ContactsDevelop Professional Contacts

• Develop SpecialtiesDevelop Specialties

• Be alert for Organizational ChangeBe alert for Organizational Change

• Look for Innovative OpportunitiesLook for Innovative Opportunities

Page 23: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-25McGraw-Hill

VRAE?VRAE?

Page 24: Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Com

puti

ng E

ssen

tial

s 20

12:

Com

puti

ng E

ssen

tial

s 20

12: M

akin

g IT

Wor

k fo

r You

Mak

ing

IT W

ork

for Y

ou

10-26McGraw-Hill

Chapter 10 + 11 Chapter 10 + 11

STUDY STUDY p308 – 313p308 – 313p331 – 336p331 – 336

•VISUAL SUMMARY VISUAL SUMMARY •KEY TERMSKEY TERMS•MULTIPLE CHOICE Q’sMULTIPLE CHOICE Q’s•MATCHING Q’sMATCHING Q’s


Recommended