information systems today, 2/c/e ©2008 pearson education canada 9-1 acs 1803 lecture outline 15...

19
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Upload: dwayne-warren

Post on 11-Jan-2016

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-1

ACS 1803

Lecture Outline 15

ETHICS AND

COMPUTER CRIME

Page 2: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-2

Information Age Terms

Computer LiteracyKnowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today

Computer LiteracyKnowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today

Digital DivideThe gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them

Digital DivideThe gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them

Computer EthicsThe issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

Computer EthicsThe issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

Page 3: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-3

Information Privacy and Issues *X

Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online

Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government.

Claim to privacy is protected by the Canadian Charter of Rights and Freedoms

In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA)

However, privacy can be challenged by the Internet: cookies, spyware

Information Privacy concerns what information an individual must reveal to others in the course of gaining employment or shopping online

Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the Government.

Claim to privacy is protected by the Canadian Charter of Rights and Freedoms

In 2000, in Canada, Personal Information Protection and Electronic Documents Act (PIPEDA)

However, privacy can be challenged by the Internet: cookies, spyware

Page 4: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-4

Other Privacy Concerns *X

• Intellectual property rights– Plagiarism from Internet

• Publishing slanderous information about a person on a website

• Etc…

Page 5: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-5

The Need for Ethical Behaviour *MC

Ethical BehaviourIllegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as:

• Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality

• Unauthorized use of computers – at work or at school, “stealing time” for personal business or use

• Information collection – by companies compiling information to sell for profit

Ethical BehaviourIllegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as:

• Photograph manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality

• Unauthorized use of computers – at work or at school, “stealing time” for personal business or use

• Information collection – by companies compiling information to sell for profit

Page 6: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-6

Responsible Computer Use *MC

The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors:

• Using a computer to harm others• Interfering with other people’s computer work• Snooping in other people’s files• Using a computer to steal• Using a computer to bear false witness• Copying or using proprietary software without paying for it• Using other people’s computer resources without

authorization or compensation• Appropriating other people’s intellectual output

The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors:

• Using a computer to harm others• Interfering with other people’s computer work• Snooping in other people’s files• Using a computer to steal• Using a computer to bear false witness• Copying or using proprietary software without paying for it• Using other people’s computer resources without

authorization or compensation• Appropriating other people’s intellectual output

GuidelinesIn area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

GuidelinesIn area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

Page 7: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-7

Responsible Computer Use *X

The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers:

• Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware)

• Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.)

The guidelines from the Computer Ethics Institute also recommend the following when creating programs or using computers:

• Thinking about the social consequences of programs you write and systems you design (e.g Napster, or a piece of Spyware)

• Using computers in ways that show consideration and respect for others (e.g. proliferation of viruses, instant messaging, etc.)

Page 8: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-8

Computer Crimes *MC

Computer CrimeThe act of using a computer to commit an illegal act. The broad definition of computer crime can include the following:

• Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains)

• Using a computer to commit and offense (e.g. stealing credit card numbers from a company database)

• Using computers to support criminal activity(e.g. drug dealer using computers to store records of illegal transactions)

Computer CrimeThe act of using a computer to commit an illegal act. The broad definition of computer crime can include the following:

• Targeting a computer while committing an offense (e.g gaining entry to a computer system in order to cause damage to the computer or the data it contains)

• Using a computer to commit and offense (e.g. stealing credit card numbers from a company database)

• Using computers to support criminal activity(e.g. drug dealer using computers to store records of illegal transactions)

Page 9: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-9

Computer Crime – Unauthorized Access

Unauthorized AccessA person gaining entry to a computer system for which they have no authority to use such access

THIS IS A COMPUTER CRIME!

Unauthorized AccessA person gaining entry to a computer system for which they have no authority to use such access

THIS IS A COMPUTER CRIME!

Page 10: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-10

Computer Crimes – Who Commits Them? *X

Unauthorized Access1998 Survey of

1600 companies by PricewaterhouseCoopers

82% come from inside the

organization(employees)

Page 11: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-11

Computer Crimes - Hacking and Cracking *MC

HackersA term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason

HackersA term to describe unauthorized access to computers based entirely on a curiosity to learn as much as possible about computers. It was originally used to describe MIT students in the 1960s that gained access to mainframes. It was later used universally used for gaining unauthorized access for any reason

CrackersA term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers

CrackersA term to describe those who break into computer systems with the intention of doing damage or committing crimes. This term was created because of protests by true hackers

Page 12: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-12

Computer Crimes – Cracker (Humorous)

Page 13: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-13

Computer Crime – Software Piracy *X

Software PiracyThis practice of buying one copy and making multiple copies for personal and commercial use, or for resale is illegal in most countries while others offer weak or nonexistent protections. This has become and international problem as shown below

Page 14: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-14

Computer Crimes – Destructive Code *X

Page 15: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-15

APPLIED COMPUTER SCIENCE DEPARTMENT *X

• Implementing an “Information Systems” pattern, and also “Health Informatics” pattern– Less technically and programming oriented than

traditional applied cs– Courses:

• 1805 Introduction to Programming• 1809 Website Design and Development• 1903 Programming Fundamentals• 1803 Intro to Information Systems• 2814 Applications of Database Systems

Page 16: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-16

IS Pattern

• More courses:• 2909 Introduction to Internet Programming• 2913 Software Requirements Analysis and Design• 2916 Business Application Systems• 3801 Principles in Information Systems• 3816 User Interfaces in Information Systems• 3811 Telecommunications• 3907 eCommerce• 3923 Technical Writing

Page 17: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-17

Health Informatics Pattern

• Information systems as applied to:– Administration– Delivery

of health care

Page 18: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-18

Bus & Admin Students

• Can take a selected number of IS courses to add to resume– e.g. major area of concentration:

Accounting (or Marketing) – courses taken: <list>

– Secondary area of concentration: Information Systems – courses taken: Introduction to Information Systems (A+), <list others>

Page 19: Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME

Information Systems Today, 2/C/e ©2008 Pearson Education Canada9-19

FINALLY

• The End of ACS 1803

• Good Luck on Exams and in Future!!!