You are on page 1of 20

Security and Ethical Challenges

Management Information Systems

Management Information Systems 1


Security challenges
Computer crimes that exist in the present
society are:-
• Hacking
• Cyber Theft
• Unauthorized use at work
• Software Piracy
• Piracy of intellectual property
• Computer viruses and worms

Management Information Systems 2


Hacking
Hacking is the obsessive use of computers, or the
unauthorized access and use of networked computer
systems. Hackers usually
• Steal or damage data
• Get unauthorized access to computer files
• Monitor e-mails or web server access
• May use remote services that allow one computer to
execute programs on another
• Plant data that will cause system to welcome
intruders
Management Information Systems 3
Cyber Theft

Cyber theft involves theft of money by


unauthorized network entry and fraudulent
alteration of computer databases.

Management Information Systems 4


Unauthorized use at Work
Unauthorized use of computer resources
especially by employees
• Playing video games
• Unauthorized use of internet
• Non-work related upload/download
• Transmission or confidential data
• Moonlighting

Management Information Systems 5


Software Piracy

Unauthorized copying of data is called software


piracy or software theft
Software is protected by copyright law and user
license agreement that allows only limited
copies to be made

Management Information Systems 6


Piracy of Intellectual Property

Materials other than software are also pirated


by making multiple copies
• Piracy of music, video, images, articles, books
etc.
• Dissemination of these material through
internet websites

Management Information Systems 7


Computer viruses and worms
• A virus is a program code that cannot work without being
inserted into another program
• A worm is a distinct program that can run unaided
These programs copy annoying or destructive routines into the
networked computer systems of anyone who accesses
computers affected with the virus or who uses copies of
magnetic disks taken from infected computers
They enter a computer through e-mail or file attachments, or
through illegal software. A virus usually copies itself into the
OS, and then spreads to main memory and thus hard disk and
any inserted external memory.

Management Information Systems 8


Privacy Issues

• Privacy on the internet


• Computer Matching
• Privacy Laws
• Computer libel and censorship (threats are
spamming and flaming)

Management Information Systems 9


Other Challenges
• Employment challenges because a lot of tasks have
been automated
• Computer monitoring causes intrusion in personal
space for workers
• Challenges in working conditions are caused by tasks
which are monotonous in nature. But it also
automates most of the work and gives way to more
challenging jobs
• Challenges to individuality as they eliminate the
human relationships between people
Management Information Systems 10
Health issues

• Cumulative trauma disorders


• Carpal tunnel syndrome
• Radiation caused by cathode ray tubes (CRTs)
is also a health concern

Management Information Systems 11


Benefits

• Medical diagnosis
• Crime control
• Environmental monitoring
• Urban planning
• Computer based training
• Distance learning

Management Information Systems 12


Security management of IT
• Encryption • Security codes
• Firewalls • Backup files
• Denial of service attacks • Security monitors
• E-mail monitoring • Biometric security
• Virus defense • Computer failure controls
• Fault tolerant systems
• Disaster recovery
• System controls and
audits

Management Information Systems 13


Encryption
The concept of private key and public key can be
extended to authentication protocols. There
are three types of authentication protocols
followed by organizations.
1.Password Authentication protocol
2.Challenge Handshake authentication Protocol
3.Extensible Authentication Protocol

Management Information Systems 14


Firewall
Firewalls are used to restrict access to one
network from another network. Different
types of firewalls exist.
1.Packet Filtering
2.Stateful firewalls
3.Proxy Firewalls
4.Kernel Proxy firewalls

Management Information Systems 15


Ethical responsibility of business professionals

Business ethics are concerned with


• Equity
• Rights
• Honesty
• Exercise of corporate power

Management Information Systems 16


Management Information Systems 17
Theories of corporate social responsibility
• The stockholders theory holds that managers are agents of
the stockholders and their only ethical responsibility is to
increase the profits of the business without violating the law
or engaging in fraudulent activities.
• The social contract theory states that companies have ethical
responsibilities to all members of society, which allow
corporations to exist based on a social contract
• The stakeholders theory states that managers have ethical
responsibility to manage a firm for the benefit of all of its
stakeholders i.e. stockholders, employees, customers,
suppliers and local community.

Management Information Systems 18


Principles of technology ethics
• Proportionality of benefits to risk
• Informed consent to risks
• Justice in distribution of risk with benefits
derived to each subunit
• Minimized risk by the selected option

Management Information Systems 19


Ethical guideline
• Acting with integrity
• Increasing your professional competence
• Setting high standards of personal
performance
• Accepting responsibility for your work
• Advancing the health, privacy, and general
welfare of the public

Management Information Systems 20

You might also like