Professional Documents
Culture Documents
11
Learning Objectives
Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
11
Section I
11
Ethical Responsibility
The use of IT presents major security challenges, poses serious ethical questions, and affects society in significant ways. IT raises ethical issues in the areas of..
Crime Privacy Individuality Employment Health Working conditions
5
10
11
12
13
Informed consent
Those affected should understand and accept the risks
Justice
Benefits and burdens should be distributed fairly
14
15
16
17
11
Computer Crime
11
AITP guidelines (continued) Denying an end user his/her own hardware, software, data, or network resources Using or conspiring to use computer or network resources to illegally obtain info or tangible property
19
11
Hacking
The obsessive use of computers, or the unauthorized access and use of networked computer systems
Cyber Theft
Involves unauthorized network entry and the fraudulent alteration of computer databases
20
21
11
Software Piracy
Unauthorized copying of software
Software is intellectual property protected by copyright law and user licensing agreements
22
11
11
Worm
A distinct program that can run unaided
24
11
Privacy Issues
IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily.
Benefit increases efficiency and effectiveness But, may also have a negative effect on individuals right to privacy
25
11
26
11
27
11
28
11
29
11
Computer matching
Computer profiling and matching personal data to that profile
Mistakes can be a major problem
30
11
Privacy laws
Attempt to enforce the privacy of computer-based files and communications Electronic Communications Privacy Act Computer Fraud and Abuse Act
31
11
32
11
Other Challenges
Employment
New jobs have been created and productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT.
33
11
Computer Monitoring
Concerns workplace privacy
Monitors individuals, not just work Is done continually. May be seen as violating workers privacy & personal freedom Workers may not know that they are being monitored or how the information is being used May increase workers stress level May rob workers of the dignity of their work
34
Individuality
Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities Regimentation
35
11
Health Issues
Job stress Muscle damage Eye strain Radiation exposure Accidents Some solutions
Ergonomics (human factors engineering)
Goal is to design healthy work environments
36
11
37
11
Societal Solutions
11
Section II
Security Management
39
40
11
41
11
Firewalls
Serves as a gatekeeper system that protects a companys intranets and other computer networks from intrusion
Provides a filter and safe transfer point Screens all network traffic for proper passwords or other security codes
43
11
Defensive measures and security precautions must be taken at all three levels
44
11
E-mail Monitoring
Spot checks just arent good enough anymore. The tide is turning toward systematic monitoring of corporate email traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.
45
46
11
Security codes
Multilevel password system
Log onto the computer system Gain access into the system Access individual files
47
11
Backup Files
Duplicate files of data or programs File retention measures Sometimes several generations of files are kept for control purposes
48
11
Security Monitors
Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction
49
11
Biometric Security
Measure physical traits that make each individual unique
Voice Fingerprints Hand geometry Signature dynamics Keystroke analysis Retina scanning Face recognition and Genetic pattern analysis
50
11
51
11
52
11
Disaster Recovery
Disaster recovery plan
Which employees will participate and their duties What hardware, software, and facilities will be used Priority of applications that will be processed
53
11
54
11
55
11
Discussion Questions
What can be done to improve ecommerce security on the Internet? What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems?
56
11
References
James A. O'Brien; George M. Marakas. Management Information Systems: Managing Information Technology in the Business Enterprise 6th Ed., Boston: McGraw-Hill/ Irwin,2004
60