Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Week 13 ch14 c
1. Principles of Information SystemsPrinciples of Information Systems
Chapter 14Chapter 14
The Personal and Social Impact ofThe Personal and Social Impact of
ComputersComputers
2. 2
Principles and LearningPrinciples and Learning
ObjectivesObjectives
Policies and proceduresPolicies and procedures must bemust be
established to avoid computer waste andestablished to avoid computer waste and
mistakesmistakes
3. 3
Principles and LearningPrinciples and Learning
Objectives (continued)Objectives (continued)
Computer crimeComputer crime is a serious and rapidlyis a serious and rapidly
growing area of concern requiringgrowing area of concern requiring
management attentionmanagement attention
4. 4
Principles and LearningPrinciples and Learning
Objectives (continued)Objectives (continued)
Jobs, equipment, and working conditionsJobs, equipment, and working conditions
must be designed to avoid negative healthmust be designed to avoid negative health
effectseffects
5. 5
Computer Waste and MistakesComputer Waste and Mistakes
Computer wasteComputer waste
Inappropriate use of computer technology andInappropriate use of computer technology and
resourcesresources
Computer-related mistakesComputer-related mistakes
Errors, failures, and other computer problemsErrors, failures, and other computer problems
that make computer output incorrect or notthat make computer output incorrect or not
usefuluseful
Caused mostly by human errorCaused mostly by human error
6. 6
Computer-Related MistakesComputer-Related Mistakes
Common causesCommon causes
Failure by users to follow proper proceduresFailure by users to follow proper procedures
Unclear expectations and a lack of feedbackUnclear expectations and a lack of feedback
Program development that contains errorsProgram development that contains errors
Incorrect data entry by data-entry clerkIncorrect data entry by data-entry clerk
7. 7
Preventing Computer-RelatedPreventing Computer-Related
Waste and MistakesWaste and Mistakes
Effective policies and proceduresEffective policies and procedures must be:must be:
EstablishedEstablished
ImplementedImplemented
MonitoredMonitored
ReviewedReviewed
8. 8
The Computer as the Object ofThe Computer as the Object of
CrimeCrime
Crimes fall into several categoriesCrimes fall into several categories
Illegal access and useIllegal access and use
Data alteration and destructionData alteration and destruction
Information and equipment theftInformation and equipment theft
Software and Internet piracySoftware and Internet piracy
Computer-related scamsComputer-related scams
International computer crimeInternational computer crime
9. 9
Illegal Access and UseIllegal Access and Use
HackerHacker: learns about and uses computer: learns about and uses computer
systemssystems
Criminal hackerCriminal hacker (also called a cracker): gains(also called a cracker): gains
unauthorized use or illegal access to computerunauthorized use or illegal access to computer
systemssystems
Script bunnyScript bunny: automates the job of crackers: automates the job of crackers
InsiderInsider: employee who comprises corporate: employee who comprises corporate
systemssystems
MalwareMalware: software programs that destroy or: software programs that destroy or
damage processingdamage processing
10. 10
Illegal Access and UseIllegal Access and Use
(continued)(continued)
VirusVirus:: program file capable of attaching toprogram file capable of attaching to
disks or other files and replicating itselfdisks or other files and replicating itself
repeatedlyrepeatedly
WormWorm:: parasitic computer program thatparasitic computer program that
can create copies of itself on infectedcan create copies of itself on infected
computer or send copies to othercomputer or send copies to other
computers via a networkcomputers via a network
11. 11
Illegal Access and Use (continued)Illegal Access and Use (continued)
Trojan horseTrojan horse:: program that appears to beprogram that appears to be
useful but purposefully does something useruseful but purposefully does something user
does not expectdoes not expect
Logic bombLogic bomb:: type of Trojan horse that executestype of Trojan horse that executes
when specific conditions occurwhen specific conditions occur
VariantVariant:: modified version of a virus that ismodified version of a virus that is
produced by virus’s author or another personproduced by virus’s author or another person
12. 12
Using Antivirus ProgramsUsing Antivirus Programs
Antivirus programAntivirus program:: program or utility thatprogram or utility that
prevents viruses and recovers from them ifprevents viruses and recovers from them if
they infect a computerthey infect a computer
13. 13
Software and Internet Software PiracySoftware and Internet Software Piracy
Software is protected bySoftware is protected by copyright lawscopyright laws
Copyright law violationsCopyright law violations
Making additional copiesMaking additional copies
Loading the software onto more than oneLoading the software onto more than one
machinemachine
Software piracySoftware piracy:: act of illegally duplicatingact of illegally duplicating
softwaresoftware
14. 14
Computer-Related ScamsComputer-Related Scams
Examples of Internet scamsExamples of Internet scams
Get-rich-quick schemesGet-rich-quick schemes
““Free” vacations with huge hidden costsFree” vacations with huge hidden costs
Bank fraudBank fraud
Fake telephone lotteriesFake telephone lotteries
Selling worthless penny stocksSelling worthless penny stocks
PhishingPhishing
Gaining access to personal information byGaining access to personal information by
redirecting user to fake siteredirecting user to fake site
15. 15
International Computer CrimeInternational Computer Crime
Computer crime becomes more complexComputer crime becomes more complex
when it is committed internationallywhen it is committed internationally
Threat of terrorists, international drugThreat of terrorists, international drug
dealers, and other criminals using informationdealers, and other criminals using information
systems to launder illegally obtained fundssystems to launder illegally obtained funds
17. 17
Crime Prevention by State andCrime Prevention by State and
Federal AgenciesFederal Agencies
Computer Emergency Response TeamComputer Emergency Response Team
(CERT)(CERT)
Responds to network security breachesResponds to network security breaches
Monitors systems for emerging threatsMonitors systems for emerging threats
Newer and tougher computer crimeNewer and tougher computer crime
legislation is emerginglegislation is emerging
19. 19
Incidents Trends Q3 2009
From July to September 2009, MyCERT, via its Cyber999 service, handled a total
of 1087 incidents.
20. 20
THE MALAYSIAN COMMUNICATIONS AND
MULTIMEDIA COMMISSION / SKMM
1. Digital Signature Act 1997,
2. Computer Crimes Act 1997,
3. Copyright (Amendment) Act 1997, (also read Copyright Act
1987)
4. Telemedicine Act 1997,
5. Communications and Multimedia Act 1998,
6. Communications and Multimedia Commission Act 1998,
and
7. Electronic Commerce Act 2006.
It was reported that the Government would introduce some
new cyber laws including: the Electronic Government
Activities Bill and the Personal Data Protection Bill.
21. 21
Preventing Crime on the InternetPreventing Crime on the Internet
Develop effective Internet usage and securityDevelop effective Internet usage and security
policiespolicies
Use a stand-alone firewall with networkUse a stand-alone firewall with network
monitoring capabilitiesmonitoring capabilities
Monitor managers’ and employees’ use ofMonitor managers’ and employees’ use of
InternetInternet
Use Internet security specialists to performUse Internet security specialists to perform
audits of all Internet and network activitiesaudits of all Internet and network activities
22. 22
Privacy IssuesPrivacy Issues
With information systems, privacy dealsWith information systems, privacy deals
with the collection and use or misuse ofwith the collection and use or misuse of
datadata
More and more information on all of us isMore and more information on all of us is
being collectedbeing collected, stored, used, and shared, stored, used, and shared
among organizationsamong organizations
23. 23
Privacy at WorkPrivacy at Work
Rights of workers who want their privacy versusRights of workers who want their privacy versus
interests of companies that demand to knowinterests of companies that demand to know
more about their employeesmore about their employees
Workers can be closely monitored via computerWorkers can be closely monitored via computer
technologytechnology
Determine what workers are doing while atDetermine what workers are doing while at
the keyboardthe keyboard
Many workers consider monitoringMany workers consider monitoring
dehumanizingdehumanizing
24. 24
E-Mail PrivacyE-Mail Privacy
Federal law permits employers to monitor e-Federal law permits employers to monitor e-
mailmail sent and received by employeessent and received by employees
E-mail messages that have been erased fromE-mail messages that have been erased from
hard disks can be retrieved and used inhard disks can be retrieved and used in
lawsuitslawsuits
25. 25
The Work EnvironmentThe Work Environment
Use of computer-based informationUse of computer-based information
systems has changed the workforcesystems has changed the workforce
Jobs that require IS literacy haveJobs that require IS literacy have
increasedincreased
Less-skilled positions have decreasedLess-skilled positions have decreased
26. Health ConcernsHealth Concerns
• Continued work using computer keyboards,Continued work using computer keyboards,
mice, or other equipmentmice, or other equipment can lead to repetitivecan lead to repetitive
stress disorder and carpal tunnel syndrome,stress disorder and carpal tunnel syndrome,
both resulting in pain in the fingers, wrist, orboth resulting in pain in the fingers, wrist, or
hand.hand.
Repetitive stress injury (RSI)Repetitive stress injury (RSI)
RSI is caused due to lifestyle without ergonomic care
Carpal tunnel syndrome (CTS)Carpal tunnel syndrome (CTS)
27. 27
Health ConcernsHealth Concerns
Occupational stressOccupational stress
Emissions from improperly maintained andEmissions from improperly maintained and
used equipmentused equipment
Increase in traffic accidents due to driversIncrease in traffic accidents due to drivers
using cell phones, laptops, or other devicesusing cell phones, laptops, or other devices
while drivingwhile driving
29. CTS can be a very annoying condition and is often seen in the working
population, especially in people using computers or keyboards.
The canal in the wrist that houses several tendons and the nerve going to your
fingers is too tight.
30. 30
Avoiding Health and EnvironmentAvoiding Health and Environment
ProblemsProblems
ErgonomicsErgonomics:: science of designingscience of designing
machines, products, and systems tomachines, products, and systems to
maximize safety, comfort, and efficiency ofmaximize safety, comfort, and efficiency of
people who use thempeople who use them
Employers, individuals, and hardwareEmployers, individuals, and hardware
manufacturing companies can take stepsmanufacturing companies can take steps
to reduce RSI and develop a better workto reduce RSI and develop a better work
environmentenvironment
31. 31
Avoiding Health and Environment ProblemsAvoiding Health and Environment Problems
(continued)(continued)
Research has shown that developing certain
ergonomically correct habits can reduce the risk of
RSI when using a computer
33. 33
Ethics (also known as moral philosophy) is a
branch of philosophy which seeks to address
questions about morality; that is, about concepts
such as good and bad, right and wrong, justice,
and virtue.
Ethic
s
34. 34
Ethical Issues in Information SystemsEthical Issues in Information Systems
Laws do not provide a complete guide to ethicalLaws do not provide a complete guide to ethical
behaviorbehavior
Many IS-related organizations have codes ofMany IS-related organizations have codes of
ethics for their membersethics for their members
American Computing Machinery (ACM): oldestAmerican Computing Machinery (ACM): oldest
computing society founded in 1947computing society founded in 1947
ACM’s code of ethicsACM’s code of ethics and professional conductand professional conduct
Contribute to society and human well-beingContribute to society and human well-being
Avoid harm to othersAvoid harm to others
Be honest and trustworthyBe honest and trustworthy
35. 35
Ethical Issues in Information SystemsEthical Issues in Information Systems
(continued)(continued)
ACM’s code of ethicsACM’s code of ethics and professionaland professional
conduct (continued)conduct (continued)
Be fair and take action not to discriminateBe fair and take action not to discriminate
Honor property rights including copyrights andHonor property rights including copyrights and
patentspatents
Give proper credit for intellectual propertyGive proper credit for intellectual property
Respect the privacy of othersRespect the privacy of others
Honor confidentialityHonor confidentiality
36. 36
SummarySummary
Computer waste: inappropriate use ofComputer waste: inappropriate use of
computer technology and resourcescomputer technology and resources
Computer-related mistakes: errors, failures,Computer-related mistakes: errors, failures,
and other computer problems that makeand other computer problems that make
computer output incorrect or not useful;computer output incorrect or not useful;
caused mostly by human errorcaused mostly by human error
Preventing computer-related waste andPreventing computer-related waste and
mistakes requires establishing, implementing,mistakes requires establishing, implementing,
monitoring, and reviewing effective policiesmonitoring, and reviewing effective policies
and proceduresand procedures
Continued work using computer keyboards, mice, or other equipment can lead to repetitive stress disorder and carpal tunnel syndrome, both resulting in pain in the fingers, wrist, or hand. Workers’ compensation claims for these disorders has been costly for some companies.
There is contradictory evidence about other health effects, such as ozone released by improperly maintained laser printers and the relationship of emissions from computer displays and cancer.
Ergonomics is the study of designing and positioning equipment to enhance employee safety and health. Ergonomics has suggested that furniture can be designed to decrease fatigue, strain, or injury from working with computers. The positioning of keyboards and display screens, as well as lighting, is also important.
Continued work using computer keyboards, mice, or other equipment can lead to repetitive stress disorder and carpal tunnel syndrome, both resulting in pain in the fingers, wrist, or hand. Workers’ compensation claims for these disorders has been costly for some companies.
There is contradictory evidence about other health effects, such as ozone released by improperly maintained laser printers and the relationship of emissions from computer displays and cancer.
Ergonomics is the study of designing and positioning equipment to enhance employee safety and health. Ergonomics has suggested that furniture can be designed to decrease fatigue, strain, or injury from working with computers. The positioning of keyboards and display screens, as well as lighting, is also important.