unit - ethical moral and security issues

Upload: hulasj

Post on 10-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    1/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers

    1

    Unit 5 : Ethical, Social, Moral& Security Issues wrt I.S.

    Information Systems for Managers

    MBA(Tech), Trim VIII (2008-09)

    Prepared by : Kedar Subramanian

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    2/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    2

    Ethical, Social & Political Issues

    Ethical, social, and political issues are closely linked.

    Introduction of new technology has a ripple effect onthem.

    Ethical decisions draw on the concepts of:

    Responsibility: Accepting the potential costs, duties,and obligations of one's decisions accountability

    Accountability: A feature of systems and socialinstitutions, accountability means that mechanismsare in place to determine who took responsibleaction and who is responsible for an action

    Liability: Refers to the existence of laws that permitindividuals to recover the damages done to themby other actors, systems, or organizations

    Due process: Requires that laws are known andunderstood by all, and that individuals can appealto higher authorities to ensure laws were properlyapplied.

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    3/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    3

    Ethical, Social & Political Issues

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    4/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    4

    Privacy Issue

    Privacy is the claim of individuals to be left alone, freefrom surveillance or interference from otherindividuals or organizations, including the state.

    Information technology and systems threatenindividual claims to privacy by making the invasionof privacy cheap, profitable, and effective.

    The Internet poses new challenges to the protection ofindividual privacy because information can easily bemonitored, captured, and stored as it passesthrough its network of computer systems.

    Companies can record a user's on-line activities, suchas what files were accessed or which Web sites werevisited.

    Web sites can learn the identity of their visitors if thevisitors voluntarily register at the site or they cancapture information about visitors without their

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    5/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    5

    Privacy Issue..

    Most Internet businesses do little to protect theircustomers' privacy other than publish privacystatements.

    Some e-commerce sites add opt-out selection boxesto their privacy statement, which, when accepted bya visitor, permit the collection of personalinformation.

    Privacy advocates promote the wider use of an opt-inmodel of informed consent in which businesses areprohibited from collecting information unless

    allowed by the consumer

    Spyware is small applications that can secretly installitself on an Internet user's computer bypiggybacking on larger applications.

    Once installed, the spyware calls out to Web sites tosend banner ads and other unsolicited material to

    '

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    6/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    6

    Patents & Copyrights wrt DigitalProducts

    Digital media and software can be so easily copied,altered, or transmitted, that it is difficult to protectwith existing intellectual property safeguards.

    Illegal copying of software and music and video files isrampant worldwide.

    While protecting against copying of software programcode, copyright protection can't prevent anotherperson from using the underlying ideas behind apiece of software and developing software thatfollows the same concepts.

    Very little software has received patent protection,which does protect the underlying ideas behindsoftware, because the software must pass verystringent criteria concerning the originality andnovelty of those ideas.

    The Internet makes it even easier to copy intellectual

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    7/12

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    8/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    8

    The Problem of Spam Mail

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    9/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    9

    Security Tools

    New authentication technologies include: Token: A physical device similar to an identification card

    that is designed to prove the identity of a single user.

    Smart card: A device about the size of a credit card thatcontains a chip formatted with access permission and

    other data. Biometric authentication: Compares a person's unique

    characteristics, such as fingerprints, face, or retinalimage, against a stored set profile.

    A firewall is a combination of hardware and softwarethat controls the flow of incoming and outgoingnetwork traffic and prevents unauthorizedcommunication into and out of the network.

    The firewall identifies names, Internet Protocol (IP)addresses, applications, and other characteristics ofincoming traffic.

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    10/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    10

    Security Tools

    Intrusion detection systems feature full-timemonitoring tools placed at the most vulnerablepoints of corporate networks to detect and deterintruders continually.

    Antivirus software is designed to check computersystems and drives for the presence of computerviruses. However, to remain effective, the antivirussoftware must be continually updated.

    Digital signatures and digital certificates help withauthentication.

    A digital signature is a digital code attached to anelectronically transmitted message that is used toverify the origin and contents of a message.

    Digital certificates are data files used to establish theidentity of users and electronic assets for protectionof online transactions.

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    11/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    11

  • 8/8/2019 Unit - Ethical Moral and Security Issues

    12/12

    10/24/10

    Informatio

    nSystemsforMan

    ag

    ers(ISM

    )

    12