1 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security CHAPTER 15 IMPLEMENTING IT: ETHICS, IMPACTS, AND SECURITY 2 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Learning Objectives Describe the major ethical issues related to information technology and identify situations in which they occur Identify the major impacts of information technology on organizational structure, power, jobs, supervision, and decision making Understand the potential dehumanization of people by computers and other potential negative impacts of information technology Identify some of the major societal effects of information technology Describe the many threats to information security Understand the various defense mechanisms of information systems Explain IT auditing and planning for disaster recovery Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 3 Chapter Overview Ethical Issues Impacts of IT on Organizations and Jobs • A Framework • How will for Ethics Organizations be • Protecting Privacy changed? • Protecting • How will Jobs be Intellectual Property Changed? •Other Considerations Societal Impacts and Internet Communities • Improved Quality of life • Internet Communities • Telecommuting Security is a Concern for Everyone • Threats to information Systems • Systems Vulnerability • Computer Crimes Impacts on Individuals at Work • Will my Job be Eliminated? • Dehumanization and Psychological Impacts • Impact on Health and Safety • Other Impacts Protecting Information Systems • Defence Strategies: How do we Protect IT? • Auditing Information Systems • Disaster Recovery Planning • Security in the 21st Century Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 4 Case: Music Retailer Finds Commerce in Communities The Business Problem N2K, a retailer in the music industry, merged with an Internet Music store called Music Boulevard (www.musicblvd.com), but sales were small The Solution The company created genre-specific sites where each is focused on the specific needs of an Internet community. The Internet is viewed as a network that provides new kinds of “spaces,” a world of online communities and virtual chat room. The Results Increased sales dramatically High level of members’ loyalty to the site Minimal inventory cost 5 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Case (continued…) What have we learned from this case?? The concept of internet communities can offer the opportunity to significantly increase an online company’s revenue and profit IT has had an impact on society as well as on corporate operations and marketing methods 6 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Ethical Issues Ethics is a branch of philosophy that deals with what is considered to be right and wrong What is unethical is not necessarily illegal Codes of ethics is a collection of principles intended as a guide for members of a company or an association Ethics differ in countries and companies Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 7 Ethical Issues (continued …) A Framework for Ethics Issues Privacy Issues Accuracy Issues Property Issues What information about oneself should an individual be required to reveal to others? What kind of surveillance can an employer use on its employees? Who is responsible for the authenticity, fidelity, and accuracy of information collected? How can we ensure that information will be processed properly and presented accurately to users? Who owns the information? What are the just and fair prices for its exchange? Accessibility Who is allowed to access information? How much should be charged for permitting Issues accessibility to information? 8 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Ethical Issues (continued …) Protecting Privacy privacy - different things to different people four stages of privacy solitude intimacy anonymity reserve too expensive, cumbersome, and complex to invade information privacy personal computers, powerful software, large databases, and the internet have created an entirely new dimension of accessing and using personal data 9 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Ethical Issues (continued …) Electronic Surveillance (monitoring computer users) American Civil Liberties Union (ACLU) estimates that tens of millions of computer users are monitored Personal Information in Databases people may not appreciate the intrusion of vendors commercial companies advise individuals about how to protect their rights, and it monitors several database 10 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Ethical Issues (continued …) Information on Internet Bulletin Boards and Newsgroups how does society keep owners of bulletin boards from disseminating information that may be offensive to readers? highlights the conflict between freedom of speech, privacy, and ethics Privacy codes and Polices helps organizations avoid legal problems 11 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security International Aspects of Privacy Guidelines to protect individuals’ privacy in the electronic age in Europe are very strict Collection limitation Data quality Purpose specification Use limitation Security safeguards Openness Individual participation 12 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Data Collection Data should be collected on individuals only for the purpose of accomplishing a legitimate business objective. Data should be adequate, relevant, and not excessive in relation to the business objective. Individuals must give their consent before data pertaining to them can be gathered. Data Accuracy Sensitive data gathered on individuals should be verified before it is entered into the database. Data should be accurate and, where and when necessary, keep current. The file should be made available so the individual can ensure that the data are correct. If there is disagreement about the accuracy of the data, the individual’s version should be noted and included with any disclosure of the file. Data Confidentiality Privacy Policy Guidelines A Sampler Computer security procedures should be implemented to provide reasonable assurance against unauthorized disclosure of data. They should include physical, technical, and administrative security measures. Third parties should not be given access to data without the individual’s knowledge or permission, except as required by law. Disclosures of data, other than the most routine, should be noted and maintained for as long as the data are maintained. Data should not be disclosed for reasons incompatible with the business objective for which they are collected. 13 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Protecting Intellectual Property Intellectual property - the intangible property created by individuals or corporations Protected under Copyright - a statutory grant that provides the creators of intellectual property with ownership of it for 28 years Trade secret - intellectual work such as a business plan which is a company secret and is not based on public information Patent - a document that grants the holder exclusive rights on an invention for 17 years 14 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security The Impacts of IT on Organizations and Jobs How will organizations be changed? Flatter organizational hierarchies It is reasonable to assume that fewer managerial levels will exist in many organizations, and there will be fewer staff and line managers. Changes in supervision an employee’s work is performed online and stored electronically introducing the possibility for greater electronic supervision. Powers and status Knowledge is power. Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 15 The Impacts of IT on Organizations and Jobs How will jobs be changed? Job content Changes in job content occur when work is redesigned Employee career ladders the use of IT may short-cut a portion of learning curve by capturing and more efficiently managing knowledge The manager’s job It can change the manner in which many decisions are made and consequently change managers’ jobs. 16 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Impacts on Individuals at Work Will my Job be Eliminated? IT can significantly increase the productivity of employees, restructuring their job content and changing the skill requirement of many jobs. Because computers are becoming “smarter” and more capable as time passes, the competitive advantage of replacing people with machines is increasing rapidly. But many computer-related job are being created. Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 17 Impacts on Individuals at Work (continues …) Dehumanization computers reduce or eliminate the human element that was present in the non-computerized systems computer-supported activities may dehumanize people Psychological impacts people may feel depression and loneliness if they work and shop from their living rooms the lack of social contacts could be damaging to children’s development if they are schooled at home through IT Job satisfaction Some jobs may become more routine and less satisfying Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 18 Impacts on Individuals at Work (continues …) Impacts on Health and Safety Job stress - computerization has created an ever-increasing workload on many people Video display terminals (VDTs) - radiation exposure has been associated with cancer and other health-related problems Repetitive strain injuries - backaches and muscle tension in the wrists and fingers Lessening the Negative Impact on Health and Safety - ergonomic techniques focus on creating an environment for workers that are well lit, comfortable and safe Drug Store Department Store Education and Medical System Supermarket Education Administration and Records Computer Assisted Education Money Oared Real Estate Stocks Integrated Financial Database Entertainment , Business, and Education Home Information System Hospital Administration and Treatment Central Medical Database Public and Private Service System Environmental and appliances Security Travel Reservations Leisure Time System Insurance and Brokerage Accounting and Legal Police and Fire Theatre and Entertainment Hotel Reservations 19 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Information Systems and the Individuals The Individual Electronic Funds Transfer / Electric Commerce Financial System Consumer System 20 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Societal Impacts Improved Quality of Life Opportunities for people with disabilities The integration of intelligent systems, such as speech and vision recognition, into a computer-based information system can create new employment opportunities for people with disabilities. Improvements in heath care IT brought about major improvements in health care delivery, ranging from better and faster diagnoses, to expedited research and development of new drugs, to more accurate monitoring of critically ill patients. 21 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Societal Impacts (continued …) Improved Quality of Life Help for the consumer IT systems help the lay person perform tasks that require expertise. Robots performing hard and hazardous labor Robots can work in uncomfortable or dangerous environments. Crime fighting Improvement in education and other benefits 22 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Internet Communities Communities of Interest : provide place for people to interact with each other on a specific topic Communities of Relations : be organized around certain life experiences Communities of Fantasy : provide place for participants create imaginary environments Communities of Transactions : facilitate buying and selling Communities of Professionals : support professional communication and the exchange of valuable work or research-related information Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 23 Telecommuting Benefits To the employees • Less stress • Ability to go to school while working • Improved family life • Money is saved • Commuting time is saved • Ability to control schedule and manage time better • Employment opportunities for housebound people To the organization To society • Increased productivity • Less use of • Reduced real estate cost fossil fuels • Reduced cost of parking • Fewer • Ability to retain traffic skilled employees problems; • Ability to tap remote including labor pool less air • Lower labor and pollution absenteeism cost • More • Better interaction of business for employees with clients suburbs and and suppliers rural areas 24 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Telecommuting (continued …) Telecommuting and Productivity Increase productivity by increased motivation and satisfaction reduced absenteeism forces managers to manage by results instead of by overseeing Reduce productivity by some employees need to work with others not all jobs can be done while telecommuting not all managers can participate Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 25 Security Security Threats Database Database Access rules Radiation Systems Software Hardware Processor Tap Crosstalk Terminals Systems Programmer Operator Authorizer Application Programmer External Environment Terminal User Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 26 Computer Crimes Types of computer crimes computers are the target of the crime computers are the medium of the attack by creating an environment in which a crime or fraud can occur computers are the tool by which the crime is perpetrated computers are used to intimidate or deceive Criminals hackers - outsider people who penetrate a computer system crackers - malicious hackers who may represent a serious problem for organizations Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 27 Computer Crime (continues ...) Computer Crime Methods of Attack Data tampering Programming fraud Viruses receiving its name from the program’s ability to attach itself to other computer programs, causing them to become viruses themselves Representative federal laws Computer Fraud and Abuse Act (1986) Computer Security act of 1987 28 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Protecting Information Systems Some of the reasons that make it complex or expensive to defend information systems Hundreds of potential threats exists. Computing resources may be situated in many locations. Many individuals control information assets. Computer networks can be outside the organization and difficult to protect. People tend to violate security procedures because the procedures are inconvenient Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 29 Protecting Information Systems (continued …) Defense strategies Controls for prevention and deterrence - prevent errors from occurring, deter criminals from attacking the system, deny access to unauthorized people Detection - the earlier it is detected, the earlier it is to combat and the less damage Limitation - minimizing losses once a malfunction has occurred Recovery - explains how to fix a damaged information system as quickly as possible Correction - prevent the problem from occurring again Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 30 Protecting Information Systems (continued …) General Controls - protect the system regardless of the specific application Physical controls provides protection against most natural hazards as well as against some human-created hazards Access controls restrict unauthorized user access to a portion of a computer system or to the entire system 31 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Protecting Information Systems (continued …) General Controls (CONT’) Biometric controls verify the identity of a person, based on physiological or behavioral characteristics hand geometry, blood vessel pattern in the retina of an eye, voice, signature, keystroke dynamics, facial thermography, fingerprints Data security controls protect data from accidental or intentional disclosure to unauthorized persons, or from unauthorized modification or destruction 32 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Protecting Information Systems (continued …) Application controls - protect specific application Input controls prevent data alteration or loss Processing controls allow only authorized users to access certain programs or facilities monitor the computer’s use by individuals Output controls ensure that outputs are sent only to authorized personnel Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 33 Network Protections and Firewalls Access Control guards against unauthorized dial-in attempts Encryption encodes regular digitized text into unreadable scrambled text or numbers, to be decoded upon receipt Cable Testers finds almost any fault that can occur with LAN cabling Firewalls enforces an access control policy between two networks do not protect against viruses Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 34 Auditing Information Systems Audit additional layer of controls or safeguards Types of Auditors and Audits internal auditor audit information systems external auditor reviews the findings of the internal audit and the inputs, processing, and outputs of information systems Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 35 How is Auditing Executed? Auditing around the computer Auditing through the computer Auditing with the computer 36 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Disaster Recovery Planning Disaster Recovery of Information Systems the chain of events linking planning to protection to recovery from a disaster keep the business running after a disaster occurs Disaster Avoidance an approach oriented toward prevention Back-up Arrangements an extra copy of data and/or programs are kept in another location 37 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security Disaster Recovery Planning (continued …) Planning for a recovery from Disasters Isolate data that change frequently Keep management and technical procedures separate Don’t include data in the plan if it can be obtained elsewhere after the disaster Write a plan that is independent of organization, positions, and personnel Gather data on a daily basis 38 Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security IT Security in the 21st Century Computer control and security are receiving increased attention almost 70 percent of all U.S. corporations have battled computer viruses the latest technologies need to be employed to protect against viruses and computer crimes using intelligent systems for detecting intruders and crimes Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 39 How Technologies Improved IT Security Area Improved systems reliability Early or real time detection of intrusion, failures, or noncompliance with rules Auditing information systems Troubleshooting Disaster planning Access protection IT Solution Fault tolerance systems, multiple disks Intelligent agents monitor performance, compare to standards, analyze profiles (e.g., Network Associates Inc.) Neural computer can detect fraud and expert systems evaluate controls Quick diagnosis by expert system, especially on networks and the Internet Internet-based expert systems for selfassessment including planning and disaster recovery Smart cards Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 40 What’s in IT for Me? For Accounting Accountant involved in Web-based auditing, security of data, and fraud prevention and detection programs For Finance Finance and banking industry is concerned about security and auditing in electronic commerce, computer criminals, the hazards and the available controls Introduction to Information Technology Turban, Rainer and Potter Chapter 15 Implementing IT: Ethics, Impacts, and Security 41 What’s in IT for Me? (continued …) For Marketing Marketers do not want to be sued because of invasion of privacy in data collected, nor do they want their innovative marketing strategies to fall into the hands of competitors For Human Resources Management Motivation, supervision, career development, recruiting, and more are all affected by IT Telecommuting is implemented by HRM