Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Eleventh Edition Chapter Security and Ethical Challenges of e-Business
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise C h a p t e r 11 Security and Ethical Challenges of e-Business
James A.O'Brien Introduction to Information Systems Eleventh Edition Chapter Objectives Identify several ethical issues in how the use of information technologies in e- business affects employment, individuality,working conditions,privacy, crime,health,and solutions to societal problems. Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of e-business applications
James A. O’Brien Introduction to Information Systems Eleventh Edition 2 Chapter Objectives • Identify several ethical issues in how the use of information technologies in ebusiness affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. • Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of e-business applications
James A.O'Brien Introduction to Information Systems Eleventh Edition Chapter Objectives Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology
James A. O’Brien Introduction to Information Systems Eleventh Edition 3 Chapter Objectives • Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology
James A.O'Brien Introduction to Information Systems Eleventh Edition 4 Security and Ethical Challenges Employment Privacy Health Crime Security Ethics and Society Individuality Working Conditions
James A. O’Brien Introduction to Information Systems Eleventh Edition 4 Security and Ethical Challenges Security Ethics and Society Employment Privacy Health Individuality Crime Working Conditions
James A.O'Brien Introduction to Information Systems Eleventh Edition Computer Crime Hacking Cyber Theft Computer Viruses Unauthorized Use at work Piracy
James A. O’Brien Introduction to Information Systems Eleventh Edition 5 Computer Crime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses
James A.O'Brien Introduction to Information Systems Eleventh Edition 6 Common Hacking Tactics Denial of Service War Dialing Scans ·Logic Bombs Sniffer Programs ·Buffer Overflow 。 Spoofing ·Password Crackers 。Trojan Horse ·Social Engineering Back Doors Dumpster Driving ·Malicious Applets
James A. O’Brien Introduction to Information Systems Eleventh Edition 6 Common Hacking Tactics • Denial of Service • Scans • Sniffer Programs • Spoofing • Trojan Horse • Back Doors • Malicious Applets • War Dialing • Logic Bombs • Buffer Overflow • Password Crackers • Social Engineering • Dumpster Driving
James A.O'Brien Introduction to Information Systems Eleventh Edition7 Employment Challenges Lost Job Lost Opportunities Individuality Working Conditions Computer Health Monitoring Issues
James A. O’Brien Introduction to Information Systems Eleventh Edition 7 Employment Challenges Lost Job Opportunities Computer Monitoring Lost Individuality Health Issues Working Conditions
Eleventh Edition 8 Ergonomic Factors in the Workplace The Tools The (Computer Workstation Hardware and and Software) Environment The User/ Operator The Tasks (Job Content&Context)
James A. O’Brien Introduction to Information Systems Eleventh Edition 8 Ergonomic Factors in the Workplace The Tools (Computer Hardware and Software) The Workstation and Environment The Tasks (Job Content & Context) The User/ Operator
James A.O'Brien Introduction to Information Systems Eleventh Edition 9 Ethical Considerations Ethical Principles ● Standard of Conduct Proportionality Act with integrity Informed Consent Protect the privacy and confidentiality of Justice information -Minimized Risk Do not misrepresent or withhold information Do not misuse resources Do not exploit weakness of systems Set high standards -Advance the health and welfare of general public
James A. O’Brien Introduction to Information Systems Eleventh Edition 9 Ethical Considerations • Ethical Principles – Proportionality – Informed Consent – Justice – Minimized Risk • Standard of Conduct – Act with integrity – Protect the privacy and confidentiality of information – Do not misrepresent or withhold information – Do not misuse resources – Do not exploit weakness of systems – Set high standards – Advance the health and welfare of general public
James A.O'Brien Introduction to Information Systems Eleventh Edition 10 Security Management of e-Business Encryption Fire Walls Virus Defenses Denial of Service Monitor Defenses E-mail
James A. O’Brien Introduction to Information Systems Eleventh Edition 10 Security Management of e-Business Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses