The Personal and Social Impact of Computers Why Learn About Security, Privacy, and Ethical Issues in Information Systems and the Internet? Many nontechnical issues associated with ISs Human Resource employees need to: Prevent computer waste and mistakes Avoid privacy violations Comply with laws about: Collecting customer data Monitoring employees Employees, IS users, and Internet users need to: Avoid crime, fraud, privacy invasion Computer Waste and Mistakes Computer waste: Inappropriate use of computer technology and resources Cause: improper management of information systems and resources Discarding old software and even complete computer systems when they still have value Building and maintaining complex systems that are never used to their fullest extent Using corporate time and technology for personal use Spam Computer-related mistakes: Errors, failures, and other computer problems that make computer output incorrect or not useful Causes Failure by users to follow proper procedures Unclear expectations and a lack of feedback Program development that contains errors Incorrect data entry by dataentry clerk Prevention Methods: Policies and Procedures Establishing - Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices Training programs for individuals and workgroups Manuals and documents on how computer systems are to be maintained and used Approval of certain systems and applications to ensure compatibility and costeffectiveness Implementing - Policies often focus on: Implementation of source data automation and the use of data editing to ensure data accuracy and completeness Assignment of clear responsibility for data accuracy within each information system Training is often the key to acceptance and implementation of policies and procedures Policies and Procedures Monitoring - Monitor routine practices and take corrective action if necessary Implement internal audits to measure actual results against established goals Follow requirements in Sarbanes-Oxley Act Reviewing - During review, people should ask the following questions: Do current policies cover existing practices adequately? Were any problems or opportunities uncovered during monitoring? Does the organization plan any new activities in the future? If so, does it need new policies or procedures on who will handle them and what must be done? Are contingencies and disasters covered? Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents is increasing dramatically Computer crime is now global The Computer as a Tool to Commit Crime Criminals need two capabilities to commit most computer crimes Knowing how to gain access to the computer system Knowing how to manipulate the system to produce the desired result Examples Social engineering Dumpster diving Counterfeit and banking fraud using sophisticated desktop publishing programs and high-quality printers Cyberterrorism Cyberterrorist Someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate Serves as governmental focal point for fighting cyberterrorism Identity Theft Imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else Information is then used to obtain credit, merchandise, and/or services in the name of the victim or to provide the thief with false credentials Identity Theft and Assumption Deterrence Act of 1998 passed to fight identity theft 9 million victims in 2005 The Computer as the Object of Crime Crimes fall into several categories such as: Illegal access and use Data alteration and destruction Information and equipment theft Software and Internet piracy Computer-related scams International computer crime Illegal Access and Use Hacker: learns about and uses computer systems Criminal hacker (also called a cracker): gains unauthorized use or illegal access to computer systems Script bunnies: automate the job of crackers Insider: employee who compromises corporate systems Malware: software programs that destroy or damage processing Virus: computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission Worm: parasitic computer program that can create copies of itself on the infected computer or send copies to other computers via a network Trojan horse: malicious program that disguises itself as a useful application and purposefully does something the user does not expect Logic bomb: type of Trojan horse that executes when specific conditions occur Triggers for logic bombs can include a change in a file by a particular series of keystrokes or at a specific time or date Illegal Access and Use Tips for avoiding viruses and worms Install antivirus software on your computer and configure it to scan all downloads, e-mail, and disks Update your antivirus software regularly Back up your files regularly Do not open any files attached to an e-mail from an unknown, suspicious, or untrustworthy source Do not open any files attached to an e-mail unless you know what it is, even if it appears to come from a friend or someone you know Exercise caution when downloading files from the Internet Ensure that the source is legitimate and reputable Information and Equipment Theft Obtaining identification numbers and passwords to steal information or disrupt systems Trial and error, password sniffer program Software theft Computer systems and equipment theft Data on equipment is valuable Software and Internet Software Piracy Software piracy: act of illegally duplicating software Internet software piracy: illegally downloading software from the Internet Most rapidly expanding type of software piracy Most difficult form to combat Examples: pirate Web sites, auction sites that offer counterfeit software, peer-to-peer networks Penalties can be severe Computer-Related Scams Examples of Internet scams Get-rich-quick schemes involving bogus real estate deals “Free” vacations with huge hidden costs Bank fraud Fake telephone lotteries Phishing Gaining access to personal information by redirecting user to fake site International Computer Crime Computer crime is an international issue Software industry loses about $9 billion in revenue annually to software piracy occurring outside the United States Terrorists, international drug dealers, and other criminals might use information systems to launder illegally obtained funds Preventing Computer-Related Crime All states have passed computer crime legislation Some believe that these laws are not effective because: Companies do not always actively detect and pursue computer crime Security is inadequate Convicted criminals are not severely punished Individual and group efforts are being made to curb computer crime, and recent efforts have met with some success State and federal agencies have begun aggressive attacks on computer criminals Computer Fraud and Abuse Act, 1986 Computer Emergency Response Team (CERT) Many states are now passing new, comprehensive bills to help eliminate computer crimes Crime Prevention by Corporations Public key infrastructure (PKI): enables users of an unsecured public network such as the Internet to securely and privately exchange data Uses a public and a private cryptographic key pair that is obtained and shared through a trusted authority Biometrics: measurement of one of a person’s traits, whether physical or behavioral Security & Biometric Video http://www.youtube.com/watch?v=CkRAUnFLYKA Using Intrusion Detection Software Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion Suspicious activities: failed login attempts, attempts to download program to server, accessing a system at unusual hours Can provide false alarms E-mail or voice message alerts may be missed Internet Laws for Libel and Protection of Decency Filtering software helps screen Internet content Also prevents children from sending personal information over e-mail or through chat groups Internet Content Rating Association (ICRA) Rates Web sites based on authors’ responses from questionnaire Children’s Internet Protection Act (CIPA), 2000 Required filters in federally funded libraries Libel is an important legal issue on the Internet Publishing Internet content to the world can subject companies to different countries’ laws Preventing Crime on the Internet Develop effective Internet usage and security policies for all employees Use a stand-alone firewall (hardware and software) with network monitoring capabilities Deploy intrusion detection systems, monitor them, and follow up on their alarms Monitor managers and employees to make sure that they are using the Internet for business purposes Use Internet security specialists to perform audits of all Internet and network activities Privacy Issues With information systems, privacy deals with the collection and use or misuse of data More data and information are produced and used today than ever before Data is constantly being collected and stored on each of us This data is often distributed over easily accessed networks and without our knowledge or consent Concerns of privacy regarding this data must be addressed Privacy and the Federal Government U.S. federal government is perhaps the largest collector of data Over 4 billion records exist on citizens, collected by about 100 federal agencies U.S. National Security Agency (NSA) had secretly collected phone call records of tens of millions of U.S. citizens after the September 11, 2001 terrorist attacks Ruled unconstitutional and illegal by a federal judge in August 2006 Privacy at Work There is conflict between rights of workers who want their privacy and the interests of companies that demand to know more about their employees Workers might be monitored via computer technology that can: Track every keystroke made by a worker Know when the worker is not using the keyboard or computer system Estimate how many breaks he or she is taking Many workers consider monitoring dehumanizing E-Mail Privacy Federal law permits employers to monitor email sent and received by employees E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits Use of e-mail among public officials might violate “open meeting” laws Privacy and the Internet Huge potential for privacy invasion on the Internet E-mail is a prime target Platform for Privacy Preferences (P3P): screening technology that shields users from Web sites that do not provide the level of privacy protection they desire Children’s Online Privacy Protection Act (COPPA), 1998: require privacy policies and parental consent Potential dangers on social networking Web sites Corporate Privacy Policies Should address a customer’s knowledge, control, notice, and consent over the storage and use of information May cover who has access to private data and when it may be used A good database design practice is to assign a single unique identifier to each customer Single record describing all relationships with the company across all its business units Can apply customer privacy preferences consistently throughout all databases Individual Efforts to Protect Privacy Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information Health Concerns Working with computers can cause occupational stress Training and counseling can often help the employee and deter problems Computer use can affect physical health as well Strains, sprains, tendonitis, repetitive motion disorder, carpal tunnel syndrome Concerns about emissions from improperly maintained and used equipment, display screens, and cell phones Many computer-related health problems are caused by a poorly designed work environment Ergonomics: science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior Moral dimensions of the information age Information rights & obligations Property rights Accountability & control System quality Quality of life Moral dimensions of the information age Information rights & obligations Property rights Accountability & control System quality Quality of life Ethics in an information society Ethical analysis: Identify, describe facts Define conflict, identify values Identify stakeholders Identify options Identify potential consequences Ethics in an information society Ethical principles: Treat others as you want to be treated If action not right for everyone, not right For anyone If action not repeatable, not right at any time Put value on outcomes, understand consequences Incur least harm or cost No free lunch Information rights Privacy: right to be left alone Fair information practices (FIP): No secret personal records Individuals can access, amend information about them Use info only with prior consent Managers accountable for damage done by systems Governments can intervene Intellectual property Intellectual property: intangible creations protected by law Trade secret: intellectual work or product belonging to business, not in public domain Copyright: statutory grant protecting intellectual property from copying by others Trade Mark: legally registered mark, device, or name to distinguish one’s goods Patent: legal document granting owner exclusive monopoly on an invention for 17 years Ethical Issues in Information Systems Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behavior ACM code of ethics and professional conduct Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patents Give proper credit for intellectual property Respect the privacy of others Honor confidentiality