+ All Categories
Home > Education > Management information system chap11

Management information system chap11

Date post: 30-Jul-2015
Category:
Upload: ashish-gupta
View: 47 times
Download: 3 times
Share this document with a friend
Popular Tags:
79
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
Transcript
Page 1: Management information system chap11

1

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Page 2: Management information system chap11

2

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter

11

Security and Ethical Challenges

Page 3: Management information system chap11

3

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Learning Objectives

Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.

Page 4: Management information system chap11

4

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Learning Objectives (continued)

Identify types of security management strategies and defenses, and explain how they can be used to ensure the security of e-business applications.

How can business managers and professionals help to lessen the harmful effects and increase the beneficial effects of the use of information technology?

Page 5: Management information system chap11

5

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Section I

Security, Ethical, and Societal Challenges

Page 6: Management information system chap11

6

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility

The use of IT presents major security challenges, poses serious ethical questions, and affects society in significant ways.

IT raises ethical issues in the areas of..CrimePrivacyIndividualityEmployment HealthWorking conditions

Page 7: Management information system chap11

7

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

But, IT has had beneficial results as well.

So as managers, it is our responsibility to minimize the detrimental effects and optimize the beneficial effects.

Page 8: Management information system chap11

8

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Business EthicsBasic categories of ethical issues

Employee privacySecurity of company recordsWorkplace safety

Page 9: Management information system chap11

9

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Theories of corporate social responsibilityStockholder theory

Managers are agents of the stockholders. Their only ethical responsibility is to increase profit without violating the law or engaging in fraud

Page 10: Management information system chap11

10

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)Social Contract Theory

Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract

Page 11: Management information system chap11

11

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)

First condition – companies must enhance economic satisfaction of consumers and employees

Second condition – avoid fraudulent practices, show respect for employees as human beings, and avoid practices that systematically worsen the position of any group in society

Page 12: Management information system chap11

12

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)Stakeholder theory

Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders.StockholdersEmployeesCustomersSuppliersLocal community

Page 13: Management information system chap11

13

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)

Sometimes stakeholders are considered to includeCompetitorsGovernment agencies and special

interest groupsFuture generations

Page 14: Management information system chap11

14

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Technology EthicsFour Principles

ProportionalityGood must outweigh any harm or riskMust be no alternative that achieves the

same or comparable benefits with less harm or risk

Page 15: Management information system chap11

15

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Technology Ethics (continued)Informed consent

Those affected should understand and accept the risks

JusticeBenefits and burdens should be

distributed fairly

Page 16: Management information system chap11

16

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Technology Ethics (continued)Minimized Risk

Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

Page 17: Management information system chap11

17

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Ethical Guidelines

Page 18: Management information system chap11

18

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Responsibility (continued)

Ethical guidelines (continued)Responsible end users

Act with integrityIncrease their professional competenceSet high standards of personal

performanceAccept responsibility for their workAdvance the health, privacy, and general

welfare of the public

Page 19: Management information system chap11

19

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime

Association of Information Technology Professionals (AITP) definition includesThe unauthorized use, access, modification,

and destruction of hardware, software, data, or network resources

Unauthorized release of informationUnauthorized copying of software

Page 20: Management information system chap11

20

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

AITP guidelines (continued)Denying an end user his/her own hardware,

software, data, or network resourcesUsing or conspiring to use computer or

network resources to illegally obtain info or tangible property

Page 21: Management information system chap11

21

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

HackingThe obsessive use of computers, or the

unauthorized access and use of networked computer systems

Page 22: Management information system chap11

22

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

Cyber TheftInvolves unauthorized network entry and

the fraudulent alteration of computer databases

Page 23: Management information system chap11

23

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

Unauthorized use at workAlso called time and resource theftMay range from doing private consulting or

personal finances, to playing video games, to unauthorized use of the Internet on company networks

Page 24: Management information system chap11

24

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

Software PiracyUnauthorized copying of software

Software is intellectual property protected by copyright law and user licensing agreements

Page 25: Management information system chap11

25

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

Piracy of intellectual propertyOther forms of intellectual property covered

by copyright lawsMusicVideosImagesArticlesBooksOther written works

Page 26: Management information system chap11

26

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime (continued)

Computer viruses and wormsVirus

A program that cannot work without being inserted into another program

WormA distinct program that can run unaided

Page 27: Management information system chap11

27

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues

IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily.Benefit – increases efficiency and

effectivenessBut, may also have a negative effect on

individual’s right to privacy

Page 28: Management information system chap11

28

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Examples of important privacy issuesAccessing private e-mail and computer

records & sharing information about individuals gained from their visits to websites and newsgroups

Always knowing where a person is via mobile and paging services

Page 29: Management information system chap11

29

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Examples of important privacy issues (continued)Using customer information obtained from

many sources to market additional business services

Collecting personal information to build individual customer profiles

Page 30: Management information system chap11

30

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Privacy on the InternetUsers of the Internet are highly visible and

open to violations of privacyUnsecured with no real rulesCookies capture information about you

every time you visit a siteThat information may be sold to third

parties

Page 31: Management information system chap11

31

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Privacy on the Internet (continued)Protect your privacy by

Encrypting your messagesPost to newsgroups through anonymous

remailersAsk your ISP not to sell your information

to mailing list providers and other marketers

Decline to reveal personal data and interests online

Page 32: Management information system chap11

32

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Computer matchingComputer profiling and matching personal

data to that profileMistakes can be a major problem

Page 33: Management information system chap11

33

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Privacy lawsAttempt to enforce the privacy of computer-

based files and communicationsElectronic Communications Privacy ActComputer Fraud and Abuse Act

Page 34: Management information system chap11

34

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Privacy Issues (continued)

Computer Libel and CensorshipThe opposite side of the privacy debate

Right to know (freedom of information)Right to express opinions (freedom of

speech)Right to publish those opinions (freedom

of the press)SpammingFlaming

Page 35: Management information system chap11

35

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Challenges

EmploymentNew jobs have been created and

productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT.

Page 36: Management information system chap11

36

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Challenges (continued)

Computer MonitoringConcerns workplace privacy

Monitors individuals, not just workIs done continually. May be seen as violating

workers’ privacy & personal freedomWorkers may not know that they are being

monitored or how the information is being usedMay increase workers’ stress levelMay rob workers of the dignity of their work

Page 37: Management information system chap11

37

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Challenges (continued)

Working ConditionsIT has eliminated many monotonous,

obnoxious tasks, but has created others

Page 38: Management information system chap11

38

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Challenges (continued)

IndividualityComputer-based systems criticized as

impersonal systems that dehumanize and depersonalize activities

Regimentation

Page 39: Management information system chap11

39

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Health Issues

Job stressMuscle damageEye strainRadiation exposureAccidentsSome solutions

Ergonomics (human factors engineering)Goal is to design healthy work

environments

Page 40: Management information system chap11

40

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Health Issues (continued)

Page 41: Management information system chap11

41

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Societal Solutions

Beneficial effects on societySolve human and social problems

Medical diagnosisComputer-assisted instructionGovernmental program planningEnvironmental quality controlLaw enforcementCrime controlJob placement

Page 42: Management information system chap11

42

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Section II

Security Management

Page 43: Management information system chap11

43

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Tools of Security Management

GoalMinimize errors, fraud, and losses in the e-

business systems that interconnect businesses with their customers, suppliers, and other stakeholders

Page 44: Management information system chap11

44

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Tools of Security Management (continued)

Page 45: Management information system chap11

45

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Internetworked Security Defenses

EncryptionPasswords, messages, files, and other data is

transmitted in scrambled form and unscrambled for authorized users

Involves using special mathematical algorithms to transform digital data in scrambled code

Most widely used method uses a pair of public and private keys unique to each individual

Page 46: Management information system chap11

46

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Internetworked Security Defenses (continued)

FirewallsServes as a “gatekeeper” system that

protects a company’s intranets and other computer networks from intrusionProvides a filter and safe transfer pointScreens all network traffic for proper

passwords or other security codes

Page 47: Management information system chap11

47

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Internetworked Security Defenses (continued)

Denial of Service DefensesThese assaults depend on three layers of

networked computer systemsVictim’s websiteVictim’s ISPSites of “zombie” or slave computers

Defensive measures and security precautions must be taken at all three levels

Page 48: Management information system chap11

48

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Internetworked Security Defenses (continued)

E-mail Monitoring“Spot checks just aren’t good enough

anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”

Page 49: Management information system chap11

49

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Internetworked Security Defenses (continued)

Virus DefensesProtection may accomplished through

Centralized distribution and updating of antivirus software

Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies

Page 50: Management information system chap11

50

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures

Security codesMultilevel password system

Log onto the computer systemGain access into the systemAccess individual files

Page 51: Management information system chap11

51

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures (continued)

Backup FilesDuplicate files of data or programsFile retention measuresSometimes several generations of files are

kept for control purposes

Page 52: Management information system chap11

52

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures (continued)

Security MonitorsPrograms that monitor the use of computer

systems and networks and protect them from unauthorized use, fraud, and destruction

Page 53: Management information system chap11

53

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures (continued)

Biometric SecurityMeasure physical traits that make each individual

uniqueVoiceFingerprintsHand geometrySignature dynamicsKeystroke analysisRetina scanningFace recognition and Genetic pattern analysis

Page 54: Management information system chap11

54

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures (continued)

Computer Failure ControlsPreventive maintenance of hardware and

management of software updatesBackup computer systemCarefully scheduled hardware or software

changesHighly trained data center personnel

Page 55: Management information system chap11

55

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures (continued)

Fault Tolerant SystemsComputer systems that have redundant

processors, peripherals, and softwareFail-overFail-safeFail-soft

Page 56: Management information system chap11

56

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Other Security Measures (continued)

Disaster RecoveryDisaster recovery plan

Which employees will participate and their duties

What hardware, software, and facilities will be used

Priority of applications that will be processed

Page 57: Management information system chap11

57

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

System Controls and Audits

Information System ControlsMethods and devices that attempt to ensure

the accuracy, validity, and propriety of information system activities

Designed to monitor and maintain the quality and security of input, processing, and storage activities

Page 58: Management information system chap11

58

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

System Controls and Audits (continued)

Auditing Business SystemsReview and evaluate whether proper and

adequate security measures and management policies have been developed and implemented

Testing the integrity of an application’s audit trail

Page 59: Management information system chap11

59

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Discussion Questions

What can be done to improve e-commerce security on the Internet?

What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems?

Page 60: Management information system chap11

60

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Discussion Questions (continued)

What artificial intelligence techniques can a business use to improve computer security and fight computer crime?

What are your major concerns about computer crime and privacy on the Internet? What can you do about it?

Page 61: Management information system chap11

61

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Discussion Questions (continued)

What is disaster recovery? How could it be implemented at your school or work?

Is there an ethical crisis in e-business today? What role does information technology play in unethical business practices?

Page 62: Management information system chap11

62

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Discussion Questions (continued)

What business decisions will you have to make as a manager that have both an ethical and IT dimension?

What would be examples of one positive and one negative effect of the use of e-business technologies in each of the ethical and societal dimensions illustrated in the chapter?

Page 63: Management information system chap11

63

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 1 – MTV Networks & First Citizens Bank

Defending Against Hacker and Virus Attacks

What are the business value and security benefits and limitations of defenses against DDOS attacks like those used by MTV Networks?

Page 64: Management information system chap11

64

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 1 (continued)

What are the business benefits and limitations of an intrusion-detection system like that installed at First Citizens?

Page 65: Management information system chap11

65

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 1 (continued)

What security defense should small businesses have to protect their websites and internal systems?

Why did you make that choice?

Page 66: Management information system chap11

66

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 1 (continued)

What other network security threats besides denial of service, viruses, and hacker attacks should businesses protect themselves against?

Page 67: Management information system chap11

67

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 2 – Oppenheimer Funds, Cardinal Health, & Exodus

IT Security Management QualificationsTechnicalBusinessPeople skillsExperience and expertise in areas like

government liaison, international regulations, and cyberterrorism

Page 68: Management information system chap11

68

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 2 (continued)

What mix of skills is most sought after for IT security specialists?

Why is this mix important in business?

Page 69: Management information system chap11

69

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 2 (continued)

Why must IT security executives in business have the mix of skills and experience outlined in this case?

What other skills do you think are important to have for effective IT security management?

Page 70: Management information system chap11

70

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 2 (continued)

How should businesses protect themselves from the spread of cyberterrorism in today’s internetworked world?

Page 71: Management information system chap11

71

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 3 – Brandon Internet Services & PayPal

What are the business benefits and limitations of the cybercrime investigative work done by firms like Brandon Internet Services?

Page 72: Management information system chap11

72

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 3 (continued)

When should a company use cyberforensic investigative services like those offered by Predictive Systems?

Page 73: Management information system chap11

73

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 3 (continued)

What is the business value of their cyberforensic and investigative capabilities to PayPal?

Would you trust PayPal for your online payment transactions?

Page 74: Management information system chap11

74

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 4 – Providence Health Systems & Others

Why is there a growing need for IT security defenses and management in business?

What challenges does this pose to effective IT security management?

Page 75: Management information system chap11

75

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 4 (continued)

What are some of the IT security defenses companies are using to meet these challenges?

Page 76: Management information system chap11

76

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 4 (continued)

Do you agree with the IT usage policies of Link Staffing? The security audit policies of Cervalis?

Page 77: Management information system chap11

77

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 5 – The Doctor’s Co. & Rockland Trust

What are the benefits and limitations for a business of outsourcing IT security management according to the companies in this case?

Page 78: Management information system chap11

78

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 5 (continued)

What are the benefits and limitations to a business of using “pure play” IT security management companies like Counterpane and Ubizen?

Page 79: Management information system chap11

79

McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.

Real World Case 5 (continued)

What are the benefits and limitations of outsourcing IT security management to vendors like Symantec and Network Associates?


Recommended