Information Systems Ethics and Computer Crime

advertisement
INFORMATION SYSTEMS FOR
COMPETITIVE ADVANTAGE
Chapter 9
SIX MAJOR ROLES AND GOALS OF
IT
 1.
Increase employee productivity by reducing time,
errors and costs using
 2.
Enhance decision making
 3.
Improve team collaboration
 4.
Create business partnerships and alliances
 5.
Enable global reach all over the world taking into
consideration the culture of each nation or society.
 6.
Facilitate organizational transformation as the
organization evolves and responds to the ever-changing
marketplace.
2
AGES OF PROGRESS
Agricultural
(Prior to 1890’s)
Industrial
(1890’s to 1960’s)
Informational
(1960’s to Present)
9-3
INFORMATION AGE TERMS
______________ ______________
Knowing how to use a computer to gather, store, organize, and otherwise process
information. These are desirable and even required for many occupations today
______________ ______________
The gap developing in society between those that are computer literate and
have access to computers and those that don’t and how it will affect them
______________ ______________
The issues and standards of conduct as they pertain to the use of information
systems including information privacy, accuracy, property, and accessibility
9-4
COMPUTER ETHICS CONCERNS
9-5
Paying for Privacy
INFORMATION PRIVACY AND ISSUES
______________ ______________
What information an individual must reveal to others in the course of gaining
employment or shopping online
______________ ______________
The stealing of another person’s private information (SIN, credit card numbers, etc.)
for the purpose of using it to gain credit, borrow money, buy merchandise, or
otherwise run up debt that are never paid. This is especially problematic because it:
• is ______________ to the victim, they don’t know it is happening
• is very ______________ correct…credit agencies are involved
• can cause ______________ and legal costs
9-6
INFORMATION PRIVACY - HOW TO MAINTAIN
Choose ______________ monitored by independent organizations
Use rating sites to identify merchant sites whose privacy policies
conform to standards and are monitored (e.g epubliceye.com)
Avoid having ______________ left on your machine
Use settings in your browser to block cookies from being deposited on
your machine by primary and third parties
Visit sites ______________
Use online privacy services that provide total privacy by blocking all
techniques used to identify you online (e.g. Anonymizer)
Use caution when ______________ confirmation email
Use a separate e-mail account from normal to protect information from
your employer, sellers, and any one using your computer
9-7
INFORMATION ACCURACY
______________ ______________
Concerned with assuring the authenticity and fidelity of information, and identifying
those responsible for information errors that harm people
Sources of information error
Errors in computer output can come from two primary sources. These are:
• ______________ Errors – errors in the computer program logic, communication
and/or processing that receives, processes, stores, and presents information
• ______________ Errors – errors by the person(s) entering data or information into
the computer system
9-8
INFORMATION PROPERTY
______________ ______________
Concerned with who owns information about individuals and how information can be
sold and exchanged
______________ ______________
The organization storing the information owns it if it is given willingly…even if
unknowingly by use of their sites (e.g. online surveys, credit card transactions, etc.)
______________ ______________
Are stated policies from the organizations collecting the information and how they intend
to use it. These are legally binding statements
• ______________ Use – used within the organization only
• ______________ Use – can be sold to outside parties
9-9
INFORMATION PROPERTY – GATHERING AND USES
From
Subject
1(484)993-7152 Hollie
Received
Size
****SPAM**** Fw: Re: GET YOURU NIVERSITY{} DIPLOMA
6/19/2007
9 KB
______________
This unsolicited e-mail can come from reputable sites selling your information. Possible
problems from spam include:
• ______________ in attachments or links
• Added to other spam lists by responding
• Slows systems by taking up resources, disk space
______________
These files stored on a computer do have legitimate uses but they also can:
• Store and transmit information about online habits including, sites visited,
purchases made, etc.
• ______________ accessing sites when cookies are refused
• ______________ and combine information with other information to build a
personal profile to be sold
9-10
INFORMATION PROPERTY – GATHERING AND
USES
______________
These ______________ computer ______________ are installed and then collect
information about individuals without their knowledge. Currently this technology
is not illegal
______________ ______________
Spyware applications collect and transmit, or use, this information locally in several
ways, including:
• ______________ of information to online marketers (spammers)
• Illegal uses such as identity theft
• ______________ user experience to market to the user by presenting ad
banners, pop-ups, etc. (Adware)
9-11
INFORMATION ACCESSIBILITY
______________ ______________
Concerned with defining what information a person or organization has the right to
obtain about others and how that information is used
Who has access?
Besides personal access, other parties have the legal right to access and view private
information including:
• ______________– using advanced software packages (e.g Carnivore), e-mail
traffic and all online activity can be monitored in real-time or after the fact
• ______________– they can legally limit, monitor or access activities on
company-owned computers or networks as long as policy has been distributed to
employees
9-12
INFORMATION ACCESS – EXAMPLE OF
CARNIVORE
9-13
THE NEED FOR ______________
BEHAVIOUR
9-14
______________ ______________
Illegal versus unethical behaviour is an information age concern. Though activities
are not explicitly illegal, questions exist of whether they are unethical, such as:
• ______________ manipulation/modification – in this circumstance, the
photograph not longer reflects absolute reality
• ______________ use of computers – at work or at school, “stealing time” for
personal business or use
• ______________ ______________ – by companies compiling information to
sell for profit
Pirates
RESPONSIBLE COMPUTER USE
______________
In area of ethics, we rely on guidelines to guide behaviour. These guidelines can
come from many organizations
9-15
The Computer Ethics Institute developed these guidelines for ethical computer use
that prohibit the following behaviors:
• Using a computer to ______________ others
• Interfering with other ______________ computer work
• Snooping in other people’s files
• Using a computer to ______________
• Using a ______________ to bear false witness
• Copying or using proprietary software without paying for it
• Using other people’s computer resources without authorization
or compensation
• Appropriating other people’s ______________ output
COMPUTER CRIMES
______________ ______________
The act of using a computer to commit an illegal act. The broad definition of
computer crime can include the following:
• Targeting a computer while committing an offense
• Using a computer to ______________ and offense
• Using computers to support criminal ______________
9-16
COMPUTER CRIME – ______________
ACCESS
______________
Access
THIS IS A
COMPUTER CRIME!
____come from
inside the
organization
(employees)
9-17
A person gaining entry
to a computer system for
which they have no
authority to use such
access
COMPUTER CRIME – VARIOUS TYPES 1ST
HALF
9-18
COMPUTER CRIME – VARIOUS TYPES 2ND
HALF
9-19
Phishing
COMPUTER CRIMES - ______________ AND
______________
______________
A term to describe ______________ access to computers based entirely on a
curiosity to learn as much as possible about computers.
______________
A term to describe those who break into computer systems with the intention of
doing ______________ or committing ______________ This term was created
because of protests by true hackers
9-20
COMPUTER CRIME – ______________ ______________
9-21
______________ ______________
This practice of buying one copy and making multiple copies for personal and
commercial use, or for resale is illegal in most countries while others offer weak or
nonexistent protections. This has become and international problem as shown below
DESTRUCTIVE CODE THAT REPLICATES
Viruses
These programs disrupt the normal function of a computer system through harmless
pranks or by destroying files on the infected computer. They come in several types:
• Combination –
• Attachment
______________
This destructive code also replicates and spreads through networked computers but
does damage by clogging up memory to slow the computer versus destroying files
9-22
• ______________ Sector
• ______________ Infector –
COMPUTER CRIMES – DESTRUCTIVE CODE
9-23
DESTRUCTIVE CODE THAT DOESN’T
REPLICATES
______________ ______________
A variation of a Trojan Horse that also do not replicate and are hidden but are
designed to lie in wait for a triggering operation. (i.e. a disgruntled employee
that sets a program to go off after they leave the company)
• ______________ Bombs – are set off by dates (e.g. a
birthday)
• ______________ Bombs – are set off by certain operations
(e.g. a certain password)
9-24
______________ ______________
These programs do not replicate but can do ______________ as they run hidden
programs on the infected computer that appears to be running ______________
(i.e. a game program that creates an account on the unsuspecting user’s computer
for unauthorized access)
______________ AND ______________
______________
An organized attempt by a country’s ______________ to
disrupt or ______________ the information and
communications systems of another country.
9-25
______________
The use of ______________ and networking technologies
against persons or property to intimidate or coerce
governments, civilians, or any ______________ of society in
order to attain ______________ religious, or ideological
goals
Download