security and ethical challenges
TRANSCRIPT
![Page 1: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/1.jpg)
SECURITY AND ETHICAL CHALLENGES
Submitted By:
VISHAKHA JOSHI
MBA II Sem
![Page 2: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/2.jpg)
SECURITY CHALLENGES
Computer crime that exist in the present society are :
Hacking Cyber Theft Unauthorized use at work Software Piracy Piracy of intellectual property Computer viruses and worms
![Page 3: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/3.jpg)
HACKING
Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems.
![Page 4: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/4.jpg)
CYBER THEFT
Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.
![Page 5: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/5.jpg)
UNAUTHORIZED USE AT WORK
Unauthorized use of computer resources especially by employees
Playing video games Unauthorized use of internet Non-work related upload/download Transmission of confidential data Moonlighting
![Page 6: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/6.jpg)
SOFTWARE PIRACY
Software is protected by copyright law and user license agreement that allows only limited copies to be made.
Unauthorized copying of data is called software piracy or software theft.
![Page 7: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/7.jpg)
PIRACY OF INTELLECTUAL
PROPERTYMaterials other than software are also pirated
by making multiple copies Piracy of music, video, images, articles,
books etc. Dissemination of these material through
internet websites.
![Page 8: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/8.jpg)
COMPUTER VIRUSES AND WORMS
•A virus is a program code that cannot work without being inserted into another program.•A worm is a distinct program that can run unaided.
![Page 9: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/9.jpg)
BUSINESS ETHICS
Business ethics are concerned with : Equity Rights Honesty Exercise of corporate power.
![Page 10: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/10.jpg)
CATEGORIES OF ETHICAL BUSINESS ISSUES
![Page 11: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/11.jpg)
WHY ETHICAL PROBLEMS OCCUR..??
Ethical problems occur for the following reasons:
Personal gain Individual value widely differ with
organizational goals Managers values and attitudes Competitive pressures Cross-cultural contradictions
![Page 12: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/12.jpg)
ETHICAL ISSUES
Gaining competitive advantage by the use of IT may involve unethical actions. IT is used in the companies:
To monitor the activities of other companies
May invade the privacy of individuals
![Page 13: Security and ethical challenges](https://reader035.vdocuments.us/reader035/viewer/2022070318/5579f973d8b42abc2e8b4e5f/html5/thumbnails/13.jpg)