Chapter 10: Privacy, Security, and Ethics Chapter 10: Privacy, Security, and Ethics... • Information systems consist of people, procedures, software, hardware and data.. • This chapter
Trang 1Chapter 10: Privacy, Security, and Ethics Chapter 10: Privacy, Security, and Ethics
Trang 2• Information systems consist of
people, procedures, software,
hardware and data.
• This chapter focuses on people.
• Effective implementation of
computer technology involves
maximizing its positive effects
while minimizing its negative
effects.
Trang 3• Privacy – What are the threats
to personal privacy and how can
we protect ourselves?
• Security – How can access to
sensitive information be
controlled and how can we
secure hardware and software?
• Ethics – How do the actions of
individual users and companies
affect society?
Trang 4collection and use of data
about individuals
– Accuracy – Property – Access
Trang 5has over 2,000 databases
lists of the calls we make
Trang 6• Your personal information is a
marketable commodity, which
raises many issues:
– Collecting public, but personally
identifying information (e.g., Google’s Street View)
– Spreading information without personal
consent, leading to identity theft
– Spreading inaccurate information
• Mistaken identity
• Freedom of Information Act
Trang 7computer files using snoopware
– A proposed law could prohibit this type of
Trang 8– People are not concerned about
privacy when surfing the Internet or when sending e-mail
• History file in Web browsers
• Traditional cookies from
Trang 10– Designed to detect and remove
cookies, web bugs, and monitoring software, such as key loggers
Trang 11The National Assemble approved a
law that will protect people from the
illegal use of their private information
- 11 Sep 2012 in the.
E-mail users will be protected
tolerate unwanted calls at inconvenient times
The gathering, publication and
selling of computer numbers will be a
crime with a maximum of 10 years
jail sentence.
Trang 12• Threats to computer security
include criminals, computer
crimes, and other hazards
• Computer criminals:
– Employees – Outside users – Hackers and crackers – Organized crime
– Terrorists
Trang 15• Civil strife and terrorism
• Technological failures
• Human errors
Trang 17– Gives content creators the right to
control the use and distribution of their work
Trang 19Chapter 11: Your Future
Chapter 11: Your Future
Trang 21Relationships
Trang 22• Stay Current – journals, conferences
• Maintain Your Computer Competency
– books, journals, trade associations
• Develop Professional Contacts
• Develop Specialties
• Be alert for Organizational Change
• Look for Innovative Opportunities