SECURITY, PRIVACY, AND ETHICAL ISSUES IN INFORMATION SYSTEMS
SOCIAL ISSUES IN INFORMATION SYSTEMS
• Computer waste and mistakes
• Computer crime
• Privacy
• Health concerns
• Ethical issues
COMPUTER WASTE & MISTAKES
• Computer waste Inappropriate use of computer technology and resources in both the public and private sectors
COMPUTER WASTE
• Discard technology
• Unused systems
• Personal use of corporate time and technology
COMPUTER – RELATED MISTAKES
•Program errors
•Data-entry errors
•Examples: At retail stores - Price mismatches
PREVENTING COMPUTER WASTE AND MISTAKES
•Establish Policies and Procedures for efficient acquisition, use, and disposal of systems and devices
•Implement Policies and Procedures
•Training (for acceptance and implementation)
•Monitor Policies and Procedures
•Internal audits
•Review Policies and Procedures
•Revise current policies, & add new policies
USEFUL POLICIES TO ELIMINATE WASTE AND MISTAKES
•Control changes to database and source code – All changes should be authorized by responsible owners and documented
•A user manual including operating procedures for taking backups, security measures,..
•System controls to prevent invalid and unreasonable data entry •Implement proper procedures to ensure correct input data
• Identity theft
• A crime in which an imposter obtains key pieces of personal identification information, in order to impersonate someone else.
• Cyberterrorism
• Force governments or organizations to advance his/her own political objectives by launching computer-based attacks against computers, networks, and the information stored on them.
Illegal access and use
• Hacker –computer experts who studies systems to discover holes within systems and the reasons for such holes
• Cracker – attempts to break the systems by gaining unauthorized or illegal access to computer systems
• Malicious insiders – People within the organization, or business associates, who have inside information concerning security practices, data and computer systems and attempt to harm the systems or data.
• Information and equipment theft – Stealing of software and hardware
•Steal identification numbers, passwords, invasion of privacy, plant viruses,…
• Software and Internet piracy
•Act of illegally duplicating software
•Illegally downloading software from the internet
• Computer related scams – for wrongful financial or personal gains
• Data alteration and deletion
No comments:
Post a Comment