SlideShare une entreprise Scribd logo
1  sur  37
Principles of Information SystemsPrinciples of Information Systems
Chapter 14Chapter 14
The Personal and Social Impact ofThe Personal and Social Impact of
ComputersComputers
2
Principles and LearningPrinciples and Learning
ObjectivesObjectives
 Policies and proceduresPolicies and procedures must bemust be
established to avoid computer waste andestablished to avoid computer waste and
mistakesmistakes
3
Principles and LearningPrinciples and Learning
Objectives (continued)Objectives (continued)
 Computer crimeComputer crime is a serious and rapidlyis a serious and rapidly
growing area of concern requiringgrowing area of concern requiring
management attentionmanagement attention
4
Principles and LearningPrinciples and Learning
Objectives (continued)Objectives (continued)
 Jobs, equipment, and working conditionsJobs, equipment, and working conditions
must be designed to avoid negative healthmust be designed to avoid negative health
effectseffects
5
Computer Waste and MistakesComputer Waste and Mistakes
 Computer wasteComputer waste

Inappropriate use of computer technology andInappropriate use of computer technology and
resourcesresources
 Computer-related mistakesComputer-related mistakes

Errors, failures, and other computer problemsErrors, failures, and other computer problems
that make computer output incorrect or notthat make computer output incorrect or not
usefuluseful

Caused mostly by human errorCaused mostly by human error
6
Computer-Related MistakesComputer-Related Mistakes
 Common causesCommon causes

Failure by users to follow proper proceduresFailure by users to follow proper procedures

Unclear expectations and a lack of feedbackUnclear expectations and a lack of feedback

Program development that contains errorsProgram development that contains errors

Incorrect data entry by data-entry clerkIncorrect data entry by data-entry clerk
7
Preventing Computer-RelatedPreventing Computer-Related
Waste and MistakesWaste and Mistakes
 Effective policies and proceduresEffective policies and procedures must be:must be:

EstablishedEstablished

ImplementedImplemented

MonitoredMonitored

ReviewedReviewed
8
The Computer as the Object ofThe Computer as the Object of
CrimeCrime
 Crimes fall into several categoriesCrimes fall into several categories

Illegal access and useIllegal access and use

Data alteration and destructionData alteration and destruction

Information and equipment theftInformation and equipment theft

Software and Internet piracySoftware and Internet piracy

Computer-related scamsComputer-related scams

International computer crimeInternational computer crime
9
Illegal Access and UseIllegal Access and Use
 HackerHacker: learns about and uses computer: learns about and uses computer
systemssystems
 Criminal hackerCriminal hacker (also called a cracker): gains(also called a cracker): gains
unauthorized use or illegal access to computerunauthorized use or illegal access to computer
systemssystems
 Script bunnyScript bunny: automates the job of crackers: automates the job of crackers
 InsiderInsider: employee who comprises corporate: employee who comprises corporate
systemssystems
 MalwareMalware: software programs that destroy or: software programs that destroy or
damage processingdamage processing
10
Illegal Access and UseIllegal Access and Use
(continued)(continued)
 VirusVirus:: program file capable of attaching toprogram file capable of attaching to
disks or other files and replicating itselfdisks or other files and replicating itself
repeatedlyrepeatedly
 WormWorm:: parasitic computer program thatparasitic computer program that
can create copies of itself on infectedcan create copies of itself on infected
computer or send copies to othercomputer or send copies to other
computers via a networkcomputers via a network
11
Illegal Access and Use (continued)Illegal Access and Use (continued)
 Trojan horseTrojan horse:: program that appears to beprogram that appears to be
useful but purposefully does something useruseful but purposefully does something user
does not expectdoes not expect
 Logic bombLogic bomb:: type of Trojan horse that executestype of Trojan horse that executes
when specific conditions occurwhen specific conditions occur
 VariantVariant:: modified version of a virus that ismodified version of a virus that is
produced by virus’s author or another personproduced by virus’s author or another person
12
Using Antivirus ProgramsUsing Antivirus Programs
 Antivirus programAntivirus program:: program or utility thatprogram or utility that
prevents viruses and recovers from them ifprevents viruses and recovers from them if
they infect a computerthey infect a computer
13
Software and Internet Software PiracySoftware and Internet Software Piracy
 Software is protected bySoftware is protected by copyright lawscopyright laws
 Copyright law violationsCopyright law violations

Making additional copiesMaking additional copies

Loading the software onto more than oneLoading the software onto more than one
machinemachine
 Software piracySoftware piracy:: act of illegally duplicatingact of illegally duplicating
softwaresoftware
14
Computer-Related ScamsComputer-Related Scams
 Examples of Internet scamsExamples of Internet scams

Get-rich-quick schemesGet-rich-quick schemes

““Free” vacations with huge hidden costsFree” vacations with huge hidden costs

Bank fraudBank fraud

Fake telephone lotteriesFake telephone lotteries

Selling worthless penny stocksSelling worthless penny stocks
 PhishingPhishing

Gaining access to personal information byGaining access to personal information by
redirecting user to fake siteredirecting user to fake site
15
International Computer CrimeInternational Computer Crime
 Computer crime becomes more complexComputer crime becomes more complex
when it is committed internationallywhen it is committed internationally
 Threat of terrorists, international drugThreat of terrorists, international drug
dealers, and other criminals using informationdealers, and other criminals using information
systems to launder illegally obtained fundssystems to launder illegally obtained funds
16
Preventing Computer-RelatedPreventing Computer-Related
CrimeCrime
 Efforts to curb computerEfforts to curb computer crime beingcrime being
made by:made by:

Private usersPrivate users

CompaniesCompanies

EmployeesEmployees

Public officialsPublic officials
17
Crime Prevention by State andCrime Prevention by State and
Federal AgenciesFederal Agencies
 Computer Emergency Response TeamComputer Emergency Response Team
(CERT)(CERT)

Responds to network security breachesResponds to network security breaches

Monitors systems for emerging threatsMonitors systems for emerging threats
 Newer and tougher computer crimeNewer and tougher computer crime
legislation is emerginglegislation is emerging
18
Malaysia Computer Emergency Response Team (MyCERT)
E-mail: mycert@mycert.org.myE-mail: mycert@mycert.org.my
Cyber999 Hotline: 1 300 88 2999 (Office Hours)Cyber999 Hotline: 1 300 88 2999 (Office Hours)
Phone: (603) 8992 6969 (Office Hours)Phone: (603) 8992 6969 (Office Hours)
Fax: (603) 8945 3442Fax: (603) 8945 3442
Phone: 019-266 5850 (24x7)Phone: 019-266 5850 (24x7)
SMS: Type CYBER999 report <email> <report> & SMS to 15888SMS: Type CYBER999 report <email> <report> & SMS to 15888
http://www.mycert.org.my/http://www.mycert.org.my/
19
Incidents Trends Q3 2009
From July to September 2009, MyCERT, via its Cyber999 service, handled a total
of 1087 incidents.
20
THE MALAYSIAN COMMUNICATIONS AND
MULTIMEDIA COMMISSION / SKMM
1. Digital Signature Act 1997,
2. Computer Crimes Act 1997,
3. Copyright (Amendment) Act 1997, (also read Copyright Act
1987)
4. Telemedicine Act 1997,
5. Communications and Multimedia Act 1998,
6. Communications and Multimedia Commission Act 1998,
and
7. Electronic Commerce Act 2006.
It was reported that the Government would introduce some
new cyber laws including: the Electronic Government
Activities Bill and the Personal Data Protection Bill.
21
Preventing Crime on the InternetPreventing Crime on the Internet
 Develop effective Internet usage and securityDevelop effective Internet usage and security
policiespolicies
 Use a stand-alone firewall with networkUse a stand-alone firewall with network
monitoring capabilitiesmonitoring capabilities
 Monitor managers’ and employees’ use ofMonitor managers’ and employees’ use of
InternetInternet
 Use Internet security specialists to performUse Internet security specialists to perform
audits of all Internet and network activitiesaudits of all Internet and network activities
22
Privacy IssuesPrivacy Issues
 With information systems, privacy dealsWith information systems, privacy deals
with the collection and use or misuse ofwith the collection and use or misuse of
datadata
 More and more information on all of us isMore and more information on all of us is
being collectedbeing collected, stored, used, and shared, stored, used, and shared
among organizationsamong organizations
23
Privacy at WorkPrivacy at Work
 Rights of workers who want their privacy versusRights of workers who want their privacy versus
interests of companies that demand to knowinterests of companies that demand to know
more about their employeesmore about their employees
 Workers can be closely monitored via computerWorkers can be closely monitored via computer
technologytechnology

Determine what workers are doing while atDetermine what workers are doing while at
the keyboardthe keyboard
 Many workers consider monitoringMany workers consider monitoring
dehumanizingdehumanizing
24
E-Mail PrivacyE-Mail Privacy
 Federal law permits employers to monitor e-Federal law permits employers to monitor e-
mailmail sent and received by employeessent and received by employees
 E-mail messages that have been erased fromE-mail messages that have been erased from
hard disks can be retrieved and used inhard disks can be retrieved and used in
lawsuitslawsuits
25
The Work EnvironmentThe Work Environment
 Use of computer-based informationUse of computer-based information
systems has changed the workforcesystems has changed the workforce

Jobs that require IS literacy haveJobs that require IS literacy have
increasedincreased

Less-skilled positions have decreasedLess-skilled positions have decreased
Health ConcernsHealth Concerns
• Continued work using computer keyboards,Continued work using computer keyboards,
mice, or other equipmentmice, or other equipment can lead to repetitivecan lead to repetitive
stress disorder and carpal tunnel syndrome,stress disorder and carpal tunnel syndrome,
both resulting in pain in the fingers, wrist, orboth resulting in pain in the fingers, wrist, or
hand.hand.
 Repetitive stress injury (RSI)Repetitive stress injury (RSI)
RSI is caused due to lifestyle without ergonomic care
 Carpal tunnel syndrome (CTS)Carpal tunnel syndrome (CTS)
27
Health ConcernsHealth Concerns
 Occupational stressOccupational stress
 Emissions from improperly maintained andEmissions from improperly maintained and
used equipmentused equipment
 Increase in traffic accidents due to driversIncrease in traffic accidents due to drivers
using cell phones, laptops, or other devicesusing cell phones, laptops, or other devices
while drivingwhile driving
Health ConcernsHealth Concerns
 Carpal tunnel syndrome (CTS)Carpal tunnel syndrome (CTS)
CTS can be a very annoying condition and is often seen in the working
population, especially in people using computers or keyboards.
The canal in the wrist that houses several tendons and the nerve going to your
fingers is too tight.
30
Avoiding Health and EnvironmentAvoiding Health and Environment
ProblemsProblems
 ErgonomicsErgonomics:: science of designingscience of designing
machines, products, and systems tomachines, products, and systems to
maximize safety, comfort, and efficiency ofmaximize safety, comfort, and efficiency of
people who use thempeople who use them
 Employers, individuals, and hardwareEmployers, individuals, and hardware
manufacturing companies can take stepsmanufacturing companies can take steps
to reduce RSI and develop a better workto reduce RSI and develop a better work
environmentenvironment
31
Avoiding Health and Environment ProblemsAvoiding Health and Environment Problems
(continued)(continued)
Research has shown that developing certain
ergonomically correct habits can reduce the risk of
RSI when using a computer
32
Computer Workstation VariablesComputer Workstation Variables
Source: Ergonomics, Integrated Safety Management, Berkeley Lab.
33
Ethics (also known as moral philosophy) is a
branch of philosophy which seeks to address
questions about morality; that is, about concepts
such as good and bad, right and wrong, justice,
and virtue.
Ethic
s
34
Ethical Issues in Information SystemsEthical Issues in Information Systems
 Laws do not provide a complete guide to ethicalLaws do not provide a complete guide to ethical
behaviorbehavior
 Many IS-related organizations have codes ofMany IS-related organizations have codes of
ethics for their membersethics for their members
 American Computing Machinery (ACM): oldestAmerican Computing Machinery (ACM): oldest
computing society founded in 1947computing society founded in 1947
 ACM’s code of ethicsACM’s code of ethics and professional conductand professional conduct

Contribute to society and human well-beingContribute to society and human well-being

Avoid harm to othersAvoid harm to others

Be honest and trustworthyBe honest and trustworthy
35
Ethical Issues in Information SystemsEthical Issues in Information Systems
(continued)(continued)
 ACM’s code of ethicsACM’s code of ethics and professionaland professional
conduct (continued)conduct (continued)

Be fair and take action not to discriminateBe fair and take action not to discriminate

Honor property rights including copyrights andHonor property rights including copyrights and
patentspatents

Give proper credit for intellectual propertyGive proper credit for intellectual property

Respect the privacy of othersRespect the privacy of others

Honor confidentialityHonor confidentiality
36
SummarySummary
 Computer waste: inappropriate use ofComputer waste: inappropriate use of
computer technology and resourcescomputer technology and resources
 Computer-related mistakes: errors, failures,Computer-related mistakes: errors, failures,
and other computer problems that makeand other computer problems that make
computer output incorrect or not useful;computer output incorrect or not useful;
caused mostly by human errorcaused mostly by human error
 Preventing computer-related waste andPreventing computer-related waste and
mistakes requires establishing, implementing,mistakes requires establishing, implementing,
monitoring, and reviewing effective policiesmonitoring, and reviewing effective policies
and proceduresand procedures
37
Τηανκ ΨουΤηανκ Ψου

νν
Γοοδ ΛυχκΓοοδ Λυχκ
Μοηδ ϑαιλανι ΠαιµανΜοηδ ϑαιλανι Παιµαν
016 252 5511016 252 5511
03 7962 222903 7962 2229
ϕαιλανιπαιµαν≅ψαηοο.χοµϕαιλανιπαιµαν≅ψαηοο.χοµ

Contenu connexe

Tendances

Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
Wesen Tegegne
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 

Tendances (20)

Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to work
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
COMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxCOMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
 
C3
C3C3
C3
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Ht r32
Ht r32Ht r32
Ht r32
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
Security_saftety_privacy of computer by sarmad baloch
Security_saftety_privacy of computer by sarmad balochSecurity_saftety_privacy of computer by sarmad baloch
Security_saftety_privacy of computer by sarmad baloch
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 

En vedette

Week 11 12 chap11 c-2
Week 11 12 chap11 c-2Week 11 12 chap11 c-2
Week 11 12 chap11 c-2
Zahir Reza
 
Week 7 8 & 10 ch10 c
Week 7 8 & 10 ch10 cWeek 7 8 & 10 ch10 c
Week 7 8 & 10 ch10 c
Zahir Reza
 
RoBoard x LabVIEW 特別節目劇情版
RoBoard x LabVIEW 特別節目劇情版RoBoard x LabVIEW 特別節目劇情版
RoBoard x LabVIEW 特別節目劇情版
roboard
 
Week 3 & 4 ch02 c
Week 3 & 4 ch02 cWeek 3 & 4 ch02 c
Week 3 & 4 ch02 c
Zahir Reza
 
RoBoard 與 Lego NXT Sensors 之連接
RoBoard 與 Lego NXT Sensors 之連接RoBoard 與 Lego NXT Sensors 之連接
RoBoard 與 Lego NXT Sensors 之連接
roboard
 
Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面
roboard
 
Introduction to Vortex86EX Motion Control Modules
Introduction to Vortex86EX Motion Control ModulesIntroduction to Vortex86EX Motion Control Modules
Introduction to Vortex86EX Motion Control Modules
roboard
 
LinuxCNC 入門簡介
LinuxCNC 入門簡介LinuxCNC 入門簡介
LinuxCNC 入門簡介
roboard
 
馬達基本認識與 BLDC 驅動實驗
馬達基本認識與 BLDC 驅動實驗馬達基本認識與 BLDC 驅動實驗
馬達基本認識與 BLDC 驅動實驗
roboard
 
認識 RoBoard 硬體
認識 RoBoard 硬體認識 RoBoard 硬體
認識 RoBoard 硬體
roboard
 
3D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 2014
3D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 20143D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 2014
3D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 2014
roboard
 
BLDC FOC 控制原理
BLDC FOC 控制原理BLDC FOC 控制原理
BLDC FOC 控制原理
roboard
 

En vedette (18)

Week 11 12 chap11 c-2
Week 11 12 chap11 c-2Week 11 12 chap11 c-2
Week 11 12 chap11 c-2
 
Elder Abuse in New York
Elder Abuse in New YorkElder Abuse in New York
Elder Abuse in New York
 
Week 7 8 & 10 ch10 c
Week 7 8 & 10 ch10 cWeek 7 8 & 10 ch10 c
Week 7 8 & 10 ch10 c
 
RoBoard x LabVIEW 特別節目劇情版
RoBoard x LabVIEW 特別節目劇情版RoBoard x LabVIEW 特別節目劇情版
RoBoard x LabVIEW 特別節目劇情版
 
Week 3 & 4 ch02 c
Week 3 & 4 ch02 cWeek 3 & 4 ch02 c
Week 3 & 4 ch02 c
 
Week 6 ch09 c
Week 6 ch09 cWeek 6 ch09 c
Week 6 ch09 c
 
RoBoard 與 Lego NXT Sensors 之連接
RoBoard 與 Lego NXT Sensors 之連接RoBoard 與 Lego NXT Sensors 之連接
RoBoard 與 Lego NXT Sensors 之連接
 
Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面
 
Introduction to Vortex86EX Motion Control Modules
Introduction to Vortex86EX Motion Control ModulesIntroduction to Vortex86EX Motion Control Modules
Introduction to Vortex86EX Motion Control Modules
 
LinuxCNC 入門簡介
LinuxCNC 入門簡介LinuxCNC 入門簡介
LinuxCNC 入門簡介
 
86Duino 小六足機器人 DIY 課程教材
86Duino 小六足機器人 DIY 課程教材86Duino 小六足機器人 DIY 課程教材
86Duino 小六足機器人 DIY 課程教材
 
3D Printer 韌體原始碼解析心得 (以 Marlin 為對象)
3D Printer 韌體原始碼解析心得 (以 Marlin 為對象)3D Printer 韌體原始碼解析心得 (以 Marlin 為對象)
3D Printer 韌體原始碼解析心得 (以 Marlin 為對象)
 
Arduino 底層原始碼解析心得
Arduino 底層原始碼解析心得Arduino 底層原始碼解析心得
Arduino 底層原始碼解析心得
 
廢柴小六足機器人 DIY 課程
廢柴小六足機器人 DIY 課程廢柴小六足機器人 DIY 課程
廢柴小六足機器人 DIY 課程
 
馬達基本認識與 BLDC 驅動實驗
馬達基本認識與 BLDC 驅動實驗馬達基本認識與 BLDC 驅動實驗
馬達基本認識與 BLDC 驅動實驗
 
認識 RoBoard 硬體
認識 RoBoard 硬體認識 RoBoard 硬體
認識 RoBoard 硬體
 
3D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 2014
3D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 20143D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 2014
3D Printer 關鍵軟體控制技術之分析與探討 @ COSCUP 2014
 
BLDC FOC 控制原理
BLDC FOC 控制原理BLDC FOC 控制原理
BLDC FOC 控制原理
 

Similaire à Week 13 ch14 c

Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
guest34b014
 

Similaire à Week 13 ch14 c (20)

Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cyber security
Cyber securityCyber security
Cyber security
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
Mis 1
Mis 1Mis 1
Mis 1
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Week 13 ch14 c

  • 1. Principles of Information SystemsPrinciples of Information Systems Chapter 14Chapter 14 The Personal and Social Impact ofThe Personal and Social Impact of ComputersComputers
  • 2. 2 Principles and LearningPrinciples and Learning ObjectivesObjectives  Policies and proceduresPolicies and procedures must bemust be established to avoid computer waste andestablished to avoid computer waste and mistakesmistakes
  • 3. 3 Principles and LearningPrinciples and Learning Objectives (continued)Objectives (continued)  Computer crimeComputer crime is a serious and rapidlyis a serious and rapidly growing area of concern requiringgrowing area of concern requiring management attentionmanagement attention
  • 4. 4 Principles and LearningPrinciples and Learning Objectives (continued)Objectives (continued)  Jobs, equipment, and working conditionsJobs, equipment, and working conditions must be designed to avoid negative healthmust be designed to avoid negative health effectseffects
  • 5. 5 Computer Waste and MistakesComputer Waste and Mistakes  Computer wasteComputer waste  Inappropriate use of computer technology andInappropriate use of computer technology and resourcesresources  Computer-related mistakesComputer-related mistakes  Errors, failures, and other computer problemsErrors, failures, and other computer problems that make computer output incorrect or notthat make computer output incorrect or not usefuluseful  Caused mostly by human errorCaused mostly by human error
  • 6. 6 Computer-Related MistakesComputer-Related Mistakes  Common causesCommon causes  Failure by users to follow proper proceduresFailure by users to follow proper procedures  Unclear expectations and a lack of feedbackUnclear expectations and a lack of feedback  Program development that contains errorsProgram development that contains errors  Incorrect data entry by data-entry clerkIncorrect data entry by data-entry clerk
  • 7. 7 Preventing Computer-RelatedPreventing Computer-Related Waste and MistakesWaste and Mistakes  Effective policies and proceduresEffective policies and procedures must be:must be:  EstablishedEstablished  ImplementedImplemented  MonitoredMonitored  ReviewedReviewed
  • 8. 8 The Computer as the Object ofThe Computer as the Object of CrimeCrime  Crimes fall into several categoriesCrimes fall into several categories  Illegal access and useIllegal access and use  Data alteration and destructionData alteration and destruction  Information and equipment theftInformation and equipment theft  Software and Internet piracySoftware and Internet piracy  Computer-related scamsComputer-related scams  International computer crimeInternational computer crime
  • 9. 9 Illegal Access and UseIllegal Access and Use  HackerHacker: learns about and uses computer: learns about and uses computer systemssystems  Criminal hackerCriminal hacker (also called a cracker): gains(also called a cracker): gains unauthorized use or illegal access to computerunauthorized use or illegal access to computer systemssystems  Script bunnyScript bunny: automates the job of crackers: automates the job of crackers  InsiderInsider: employee who comprises corporate: employee who comprises corporate systemssystems  MalwareMalware: software programs that destroy or: software programs that destroy or damage processingdamage processing
  • 10. 10 Illegal Access and UseIllegal Access and Use (continued)(continued)  VirusVirus:: program file capable of attaching toprogram file capable of attaching to disks or other files and replicating itselfdisks or other files and replicating itself repeatedlyrepeatedly  WormWorm:: parasitic computer program thatparasitic computer program that can create copies of itself on infectedcan create copies of itself on infected computer or send copies to othercomputer or send copies to other computers via a networkcomputers via a network
  • 11. 11 Illegal Access and Use (continued)Illegal Access and Use (continued)  Trojan horseTrojan horse:: program that appears to beprogram that appears to be useful but purposefully does something useruseful but purposefully does something user does not expectdoes not expect  Logic bombLogic bomb:: type of Trojan horse that executestype of Trojan horse that executes when specific conditions occurwhen specific conditions occur  VariantVariant:: modified version of a virus that ismodified version of a virus that is produced by virus’s author or another personproduced by virus’s author or another person
  • 12. 12 Using Antivirus ProgramsUsing Antivirus Programs  Antivirus programAntivirus program:: program or utility thatprogram or utility that prevents viruses and recovers from them ifprevents viruses and recovers from them if they infect a computerthey infect a computer
  • 13. 13 Software and Internet Software PiracySoftware and Internet Software Piracy  Software is protected bySoftware is protected by copyright lawscopyright laws  Copyright law violationsCopyright law violations  Making additional copiesMaking additional copies  Loading the software onto more than oneLoading the software onto more than one machinemachine  Software piracySoftware piracy:: act of illegally duplicatingact of illegally duplicating softwaresoftware
  • 14. 14 Computer-Related ScamsComputer-Related Scams  Examples of Internet scamsExamples of Internet scams  Get-rich-quick schemesGet-rich-quick schemes  ““Free” vacations with huge hidden costsFree” vacations with huge hidden costs  Bank fraudBank fraud  Fake telephone lotteriesFake telephone lotteries  Selling worthless penny stocksSelling worthless penny stocks  PhishingPhishing  Gaining access to personal information byGaining access to personal information by redirecting user to fake siteredirecting user to fake site
  • 15. 15 International Computer CrimeInternational Computer Crime  Computer crime becomes more complexComputer crime becomes more complex when it is committed internationallywhen it is committed internationally  Threat of terrorists, international drugThreat of terrorists, international drug dealers, and other criminals using informationdealers, and other criminals using information systems to launder illegally obtained fundssystems to launder illegally obtained funds
  • 16. 16 Preventing Computer-RelatedPreventing Computer-Related CrimeCrime  Efforts to curb computerEfforts to curb computer crime beingcrime being made by:made by:  Private usersPrivate users  CompaniesCompanies  EmployeesEmployees  Public officialsPublic officials
  • 17. 17 Crime Prevention by State andCrime Prevention by State and Federal AgenciesFederal Agencies  Computer Emergency Response TeamComputer Emergency Response Team (CERT)(CERT)  Responds to network security breachesResponds to network security breaches  Monitors systems for emerging threatsMonitors systems for emerging threats  Newer and tougher computer crimeNewer and tougher computer crime legislation is emerginglegislation is emerging
  • 18. 18 Malaysia Computer Emergency Response Team (MyCERT) E-mail: mycert@mycert.org.myE-mail: mycert@mycert.org.my Cyber999 Hotline: 1 300 88 2999 (Office Hours)Cyber999 Hotline: 1 300 88 2999 (Office Hours) Phone: (603) 8992 6969 (Office Hours)Phone: (603) 8992 6969 (Office Hours) Fax: (603) 8945 3442Fax: (603) 8945 3442 Phone: 019-266 5850 (24x7)Phone: 019-266 5850 (24x7) SMS: Type CYBER999 report <email> <report> & SMS to 15888SMS: Type CYBER999 report <email> <report> & SMS to 15888 http://www.mycert.org.my/http://www.mycert.org.my/
  • 19. 19 Incidents Trends Q3 2009 From July to September 2009, MyCERT, via its Cyber999 service, handled a total of 1087 incidents.
  • 20. 20 THE MALAYSIAN COMMUNICATIONS AND MULTIMEDIA COMMISSION / SKMM 1. Digital Signature Act 1997, 2. Computer Crimes Act 1997, 3. Copyright (Amendment) Act 1997, (also read Copyright Act 1987) 4. Telemedicine Act 1997, 5. Communications and Multimedia Act 1998, 6. Communications and Multimedia Commission Act 1998, and 7. Electronic Commerce Act 2006. It was reported that the Government would introduce some new cyber laws including: the Electronic Government Activities Bill and the Personal Data Protection Bill.
  • 21. 21 Preventing Crime on the InternetPreventing Crime on the Internet  Develop effective Internet usage and securityDevelop effective Internet usage and security policiespolicies  Use a stand-alone firewall with networkUse a stand-alone firewall with network monitoring capabilitiesmonitoring capabilities  Monitor managers’ and employees’ use ofMonitor managers’ and employees’ use of InternetInternet  Use Internet security specialists to performUse Internet security specialists to perform audits of all Internet and network activitiesaudits of all Internet and network activities
  • 22. 22 Privacy IssuesPrivacy Issues  With information systems, privacy dealsWith information systems, privacy deals with the collection and use or misuse ofwith the collection and use or misuse of datadata  More and more information on all of us isMore and more information on all of us is being collectedbeing collected, stored, used, and shared, stored, used, and shared among organizationsamong organizations
  • 23. 23 Privacy at WorkPrivacy at Work  Rights of workers who want their privacy versusRights of workers who want their privacy versus interests of companies that demand to knowinterests of companies that demand to know more about their employeesmore about their employees  Workers can be closely monitored via computerWorkers can be closely monitored via computer technologytechnology  Determine what workers are doing while atDetermine what workers are doing while at the keyboardthe keyboard  Many workers consider monitoringMany workers consider monitoring dehumanizingdehumanizing
  • 24. 24 E-Mail PrivacyE-Mail Privacy  Federal law permits employers to monitor e-Federal law permits employers to monitor e- mailmail sent and received by employeessent and received by employees  E-mail messages that have been erased fromE-mail messages that have been erased from hard disks can be retrieved and used inhard disks can be retrieved and used in lawsuitslawsuits
  • 25. 25 The Work EnvironmentThe Work Environment  Use of computer-based informationUse of computer-based information systems has changed the workforcesystems has changed the workforce  Jobs that require IS literacy haveJobs that require IS literacy have increasedincreased  Less-skilled positions have decreasedLess-skilled positions have decreased
  • 26. Health ConcernsHealth Concerns • Continued work using computer keyboards,Continued work using computer keyboards, mice, or other equipmentmice, or other equipment can lead to repetitivecan lead to repetitive stress disorder and carpal tunnel syndrome,stress disorder and carpal tunnel syndrome, both resulting in pain in the fingers, wrist, orboth resulting in pain in the fingers, wrist, or hand.hand.  Repetitive stress injury (RSI)Repetitive stress injury (RSI) RSI is caused due to lifestyle without ergonomic care  Carpal tunnel syndrome (CTS)Carpal tunnel syndrome (CTS)
  • 27. 27 Health ConcernsHealth Concerns  Occupational stressOccupational stress  Emissions from improperly maintained andEmissions from improperly maintained and used equipmentused equipment  Increase in traffic accidents due to driversIncrease in traffic accidents due to drivers using cell phones, laptops, or other devicesusing cell phones, laptops, or other devices while drivingwhile driving
  • 28. Health ConcernsHealth Concerns  Carpal tunnel syndrome (CTS)Carpal tunnel syndrome (CTS)
  • 29. CTS can be a very annoying condition and is often seen in the working population, especially in people using computers or keyboards. The canal in the wrist that houses several tendons and the nerve going to your fingers is too tight.
  • 30. 30 Avoiding Health and EnvironmentAvoiding Health and Environment ProblemsProblems  ErgonomicsErgonomics:: science of designingscience of designing machines, products, and systems tomachines, products, and systems to maximize safety, comfort, and efficiency ofmaximize safety, comfort, and efficiency of people who use thempeople who use them  Employers, individuals, and hardwareEmployers, individuals, and hardware manufacturing companies can take stepsmanufacturing companies can take steps to reduce RSI and develop a better workto reduce RSI and develop a better work environmentenvironment
  • 31. 31 Avoiding Health and Environment ProblemsAvoiding Health and Environment Problems (continued)(continued) Research has shown that developing certain ergonomically correct habits can reduce the risk of RSI when using a computer
  • 32. 32 Computer Workstation VariablesComputer Workstation Variables Source: Ergonomics, Integrated Safety Management, Berkeley Lab.
  • 33. 33 Ethics (also known as moral philosophy) is a branch of philosophy which seeks to address questions about morality; that is, about concepts such as good and bad, right and wrong, justice, and virtue. Ethic s
  • 34. 34 Ethical Issues in Information SystemsEthical Issues in Information Systems  Laws do not provide a complete guide to ethicalLaws do not provide a complete guide to ethical behaviorbehavior  Many IS-related organizations have codes ofMany IS-related organizations have codes of ethics for their membersethics for their members  American Computing Machinery (ACM): oldestAmerican Computing Machinery (ACM): oldest computing society founded in 1947computing society founded in 1947  ACM’s code of ethicsACM’s code of ethics and professional conductand professional conduct  Contribute to society and human well-beingContribute to society and human well-being  Avoid harm to othersAvoid harm to others  Be honest and trustworthyBe honest and trustworthy
  • 35. 35 Ethical Issues in Information SystemsEthical Issues in Information Systems (continued)(continued)  ACM’s code of ethicsACM’s code of ethics and professionaland professional conduct (continued)conduct (continued)  Be fair and take action not to discriminateBe fair and take action not to discriminate  Honor property rights including copyrights andHonor property rights including copyrights and patentspatents  Give proper credit for intellectual propertyGive proper credit for intellectual property  Respect the privacy of othersRespect the privacy of others  Honor confidentialityHonor confidentiality
  • 36. 36 SummarySummary  Computer waste: inappropriate use ofComputer waste: inappropriate use of computer technology and resourcescomputer technology and resources  Computer-related mistakes: errors, failures,Computer-related mistakes: errors, failures, and other computer problems that makeand other computer problems that make computer output incorrect or not useful;computer output incorrect or not useful; caused mostly by human errorcaused mostly by human error  Preventing computer-related waste andPreventing computer-related waste and mistakes requires establishing, implementing,mistakes requires establishing, implementing, monitoring, and reviewing effective policiesmonitoring, and reviewing effective policies and proceduresand procedures
  • 37. 37 Τηανκ ΨουΤηανκ Ψου  νν Γοοδ ΛυχκΓοοδ Λυχκ Μοηδ ϑαιλανι ΠαιµανΜοηδ ϑαιλανι Παιµαν 016 252 5511016 252 5511 03 7962 222903 7962 2229 ϕαιλανιπαιµαν≅ψαηοο.χοµϕαιλανιπαιµαν≅ψαηοο.χοµ

Notes de l'éditeur

  1. Continued work using computer keyboards, mice, or other equipment can lead to repetitive stress disorder and carpal tunnel syndrome, both resulting in pain in the fingers, wrist, or hand. Workers’ compensation claims for these disorders has been costly for some companies. There is contradictory evidence about other health effects, such as ozone released by improperly maintained laser printers and the relationship of emissions from computer displays and cancer. Ergonomics is the study of designing and positioning equipment to enhance employee safety and health. Ergonomics has suggested that furniture can be designed to decrease fatigue, strain, or injury from working with computers. The positioning of keyboards and display screens, as well as lighting, is also important.
  2. Continued work using computer keyboards, mice, or other equipment can lead to repetitive stress disorder and carpal tunnel syndrome, both resulting in pain in the fingers, wrist, or hand. Workers’ compensation claims for these disorders has been costly for some companies. There is contradictory evidence about other health effects, such as ozone released by improperly maintained laser printers and the relationship of emissions from computer displays and cancer. Ergonomics is the study of designing and positioning equipment to enhance employee safety and health. Ergonomics has suggested that furniture can be designed to decrease fatigue, strain, or injury from working with computers. The positioning of keyboards and display screens, as well as lighting, is also important.