Professional Documents
Culture Documents
CHAPTER 15
IMPLEMENTING IT:
ETHICS, IMPACTS,
AND SECURITY
Learning Objectives
Describe the major ethical issues related to information
technology and identify situations in which they occur
Identify the major impacts of information technology on
organizational structure, power, jobs, supervision, and
decision making
Understand the potential dehumanization of people by
computers and other potential negative impacts of
information technology
Identify some of the major societal effects of
information technology
Describe the many threats to information security
Understand the various defense mechanisms of
information systems
Explain IT auditing and planning for disaster recovery
Chapter Overview
Ethical Issues
Impacts of IT on
Organizations and Jobs
A Framework
How will
for Ethics
Organizations be
Protecting Privacy
changed?
Protecting
How will Jobs be
Intellectual Property Changed?
Other Considerations
Societal Impacts and
Internet Communities
Improved Quality
of life
Internet Communities
Telecommuting
Security is a Concern
for Everyone
Threats to
information Systems
Systems Vulnerability
Computer Crimes
Impacts on Individuals at
Work
Will my Job be Eliminated?
Dehumanization and
Psychological Impacts
Impact on Health and Safety
Other Impacts
Protecting
Information Systems
Defence Strategies: How do
we Protect IT?
Auditing Information
Systems
Disaster Recovery Planning
Security in the 21st Century
The Solution
The Results
Case (continued)
What have we learned from this case??
The concept of internet communities can
offer the opportunity to significantly
increase an online companys revenue and
profit
IT has had an impact on society as well as on
corporate operations and marketing methods
Ethical Issues
Ethics is a branch of philosophy that deals with
what is considered to be right and wrong
What is unethical is not necessarily illegal
Codes of ethics is a collection of principles
intended as a guide for members of a company
or an association
Ethics differ in countries and
companies
10
11
Data quality
Purpose specification
Use limitation
Security safeguards
Openness
Individual participation
12
Data
Collection
Data
Accuracy
Sensitive data gathered on individuals should be verified before it is entered into the
database.
Data should be accurate and, where and when necessary, keep current.
The file should be made available so the individual can ensure that the data are correct.
If there is disagreement about the accuracy of the data, the individuals version should
be noted and included with any disclosure of the file.
Data
Confidentiality
13
14
The Impacts of IT
on Organizations and Jobs
How will organizations be changed?
Flatter organizational hierarchies
It is reasonable to assume that fewer managerial
levels will exist in many organizations, and there
will be fewer staff and line managers.
Changes in supervision
an employees work is performed online and stored
electronically introducing the possibility for greater
electronic supervision.
15
The Impacts of IT
on Organizations and Jobs
How will jobs be changed?
Job content
Changes in job content occur when work
is redesigned
16
17
Job satisfaction
Some jobs may become more routine and less satisfying
18
Drug Store
Department Store
Education and
Medical System
Supermarket
Education
Administration
and Records
Computer
Assisted
Education
Money Oared
Real Estate
Stocks
Integrated
Financial
Database
Entertainment
, Business,
and Education
Home
Information System
Hospital
Administration
and Treatment
Central Medical
Database
Security
Travel
Reservations
Insurance and
Brokerage
Accounting
and Legal
Police and
Fire
Theatre and
Entertainment
Hotel
Reservations
19
Introduction to Information Technology
Turban, Rainer and Potter
Chapter 15 Implementing IT: Ethics, Impacts, and Security
Consumer
System
20
Societal Impacts
Improved Quality of Life
Opportunities for people with disabilities
The integration of intelligent systems, such as speech
and vision recognition, into a computer-based
information system can create new employment
opportunities for people with disabilities.
Improvements in heath care
IT brought about major improvements in health care
delivery, ranging from better and faster diagnoses, to
expedited research and development of new drugs, to
more accurate monitoring of critically ill patients.
21
22
Internet Communities
Communities of Interest : provide place for
people to interact with each other on a specific topic
Communities of Relations : be organized
around certain life experiences
Communities of Fantasy : provide place for
participants create imaginary environments
Communities of Transactions : facilitate buying
and selling
Communities of Professionals : support
professional communication and the exchange of
valuable work or research-related information
23
Telecommuting
Benefits
To the employees
Less stress
Ability to go to school
while working
Improved family life
Money is saved
Commuting time is
saved
Ability to control
schedule and manage
time better
Employment
opportunities
for housebound people
To the organization
To society
Increased productivity
Less use of
Reduced real estate cost
fossil fuels
Reduced cost of parking Fewer
Ability to retain
traffic
skilled employees
problems;
Ability to tap remote
including
labor pool
less air
Lower labor and
pollution
absenteeism cost
More
Better interaction of
business for
employees with clients
suburbs and
and suppliers
rural areas
24
Telecommuting (continued )
Telecommuting and Productivity
Increase productivity by
increased motivation and satisfaction
reduced absenteeism
forces managers to manage by results instead
of by overseeing
Reduce productivity by
some employees need to work with others
not all jobs can be done while telecommuting
not all managers can participate
25
Security
Security Threats
Database
Database
Access rules
Radiation
Systems Software
Hardware
Processor
Tap
Crosstalk
Terminals
Systems
Programmer
Operator
Authorizer
Application
Programmer
External Environment
Terminal User
26
Computer Crimes
Types of computer crimes
computers are the target of the crime
computers are the medium of the attack by creating an
environment in which a crime or fraud can occur
computers are the tool by which the crime is perpetrated
computers are used to intimidate or deceive
Criminals
hackers - outsider people who penetrate a computer system
crackers - malicious hackers who may represent a serious
problem for organizations
27
28
29
30
31
32
33
Encryption
encodes regular digitized text into unreadable
scrambled text or numbers, to be decoded upon receipt
Cable Testers
finds almost any fault that can occur with LAN cabling
Firewalls
enforces an access control policy between two networks
do not protect against viruses
34
35
Auditing
through
the computer
Auditing
with
the computer
36
Disaster Avoidance
an approach oriented toward prevention
Back-up Arrangements
an extra copy of data and/or programs are
kept in another location
37
38
39
Disaster planning
Access protection
IT Solution
Fault tolerance systems, multiple disks
Intelligent agents monitor performance,
compare to standards, analyze profiles
(e.g., Network Associates Inc.)
Neural computer can detect fraud and
expert systems evaluate controls
Quick diagnosis by expert system,
especially on networks and the Internet
Internet-based expert systems for selfassessment including planning and
disaster recovery
Smart cards
40
For Finance
Finance and banking industry is concerned
about security and auditing in electronic
commerce, computer criminals, the hazards
and the available controls
41