unit - ethical moral and security issues
TRANSCRIPT
-
8/8/2019 Unit - Ethical Moral and Security Issues
1/12
10/24/10
Informatio
nSystemsforMan
ag
ers
1
Unit 5 : Ethical, Social, Moral& Security Issues wrt I.S.
Information Systems for Managers
MBA(Tech), Trim VIII (2008-09)
Prepared by : Kedar Subramanian
-
8/8/2019 Unit - Ethical Moral and Security Issues
2/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
2
Ethical, Social & Political Issues
Ethical, social, and political issues are closely linked.
Introduction of new technology has a ripple effect onthem.
Ethical decisions draw on the concepts of:
Responsibility: Accepting the potential costs, duties,and obligations of one's decisions accountability
Accountability: A feature of systems and socialinstitutions, accountability means that mechanismsare in place to determine who took responsibleaction and who is responsible for an action
Liability: Refers to the existence of laws that permitindividuals to recover the damages done to themby other actors, systems, or organizations
Due process: Requires that laws are known andunderstood by all, and that individuals can appealto higher authorities to ensure laws were properlyapplied.
-
8/8/2019 Unit - Ethical Moral and Security Issues
3/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
3
Ethical, Social & Political Issues
-
8/8/2019 Unit - Ethical Moral and Security Issues
4/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
4
Privacy Issue
Privacy is the claim of individuals to be left alone, freefrom surveillance or interference from otherindividuals or organizations, including the state.
Information technology and systems threatenindividual claims to privacy by making the invasionof privacy cheap, profitable, and effective.
The Internet poses new challenges to the protection ofindividual privacy because information can easily bemonitored, captured, and stored as it passesthrough its network of computer systems.
Companies can record a user's on-line activities, suchas what files were accessed or which Web sites werevisited.
Web sites can learn the identity of their visitors if thevisitors voluntarily register at the site or they cancapture information about visitors without their
-
8/8/2019 Unit - Ethical Moral and Security Issues
5/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
5
Privacy Issue..
Most Internet businesses do little to protect theircustomers' privacy other than publish privacystatements.
Some e-commerce sites add opt-out selection boxesto their privacy statement, which, when accepted bya visitor, permit the collection of personalinformation.
Privacy advocates promote the wider use of an opt-inmodel of informed consent in which businesses areprohibited from collecting information unless
allowed by the consumer
Spyware is small applications that can secretly installitself on an Internet user's computer bypiggybacking on larger applications.
Once installed, the spyware calls out to Web sites tosend banner ads and other unsolicited material to
'
-
8/8/2019 Unit - Ethical Moral and Security Issues
6/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
6
Patents & Copyrights wrt DigitalProducts
Digital media and software can be so easily copied,altered, or transmitted, that it is difficult to protectwith existing intellectual property safeguards.
Illegal copying of software and music and video files isrampant worldwide.
While protecting against copying of software programcode, copyright protection can't prevent anotherperson from using the underlying ideas behind apiece of software and developing software thatfollows the same concepts.
Very little software has received patent protection,which does protect the underlying ideas behindsoftware, because the software must pass verystringent criteria concerning the originality andnovelty of those ideas.
The Internet makes it even easier to copy intellectual
-
8/8/2019 Unit - Ethical Moral and Security Issues
7/12
-
8/8/2019 Unit - Ethical Moral and Security Issues
8/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
8
The Problem of Spam Mail
-
8/8/2019 Unit - Ethical Moral and Security Issues
9/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
9
Security Tools
New authentication technologies include: Token: A physical device similar to an identification card
that is designed to prove the identity of a single user.
Smart card: A device about the size of a credit card thatcontains a chip formatted with access permission and
other data. Biometric authentication: Compares a person's unique
characteristics, such as fingerprints, face, or retinalimage, against a stored set profile.
A firewall is a combination of hardware and softwarethat controls the flow of incoming and outgoingnetwork traffic and prevents unauthorizedcommunication into and out of the network.
The firewall identifies names, Internet Protocol (IP)addresses, applications, and other characteristics ofincoming traffic.
-
8/8/2019 Unit - Ethical Moral and Security Issues
10/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
10
Security Tools
Intrusion detection systems feature full-timemonitoring tools placed at the most vulnerablepoints of corporate networks to detect and deterintruders continually.
Antivirus software is designed to check computersystems and drives for the presence of computerviruses. However, to remain effective, the antivirussoftware must be continually updated.
Digital signatures and digital certificates help withauthentication.
A digital signature is a digital code attached to anelectronically transmitted message that is used toverify the origin and contents of a message.
Digital certificates are data files used to establish theidentity of users and electronic assets for protectionof online transactions.
-
8/8/2019 Unit - Ethical Moral and Security Issues
11/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
11
-
8/8/2019 Unit - Ethical Moral and Security Issues
12/12
10/24/10
Informatio
nSystemsforMan
ag
ers(ISM
)
12