SECURITY, PRIVACY, AND ETHICAL ISSUES IN INFORMATION SYSTEMS - csactor

Breaking

csactor

computer science , software engineering ,information system and information technology lesson series like data structure and algorithm , computer networking , programming , database , web development , operating system , information system , digital marketing and business study.

Friday, August 17, 2018

SECURITY, PRIVACY, AND ETHICAL ISSUES IN INFORMATION SYSTEMS


SECURITY, PRIVACY, AND ETHICAL ISSUES IN INFORMATION SYSTEMS

SOCIAL ISSUES IN INFORMATION SYSTEMS

• Computer waste and mistakes 
• Computer crime 
• Privacy 
• Health concerns 
• Ethical issues

COMPUTER WASTE & MISTAKES 

• Computer waste Inappropriate use of computer technology and resources in both the public and private sectors



                         



COMPUTER WASTE

• Discard technology 
• Unused systems 
• Personal use of corporate time and technology

COMPUTER – RELATED MISTAKES 


•Program errors 
•Data-entry errors 
•Examples: At retail stores - Price mismatches

PREVENTING COMPUTER WASTE AND MISTAKES 


•Establish Policies and Procedures for efficient acquisition, use, and disposal of systems and devices 

•Implement Policies and Procedures 

•Training (for acceptance and implementation) 

•Monitor Policies and Procedures 

•Internal audits 

•Review Policies and Procedures 

•Revise current policies, & add new policies

USEFUL POLICIES TO ELIMINATE WASTE AND MISTAKES 

•Control changes to database and source code – All changes should be authorized by responsible owners and documented 

•A user manual including operating procedures for taking backups, security measures,..

•System controls to prevent invalid and unreasonable data entry •Implement proper procedures to ensure correct input data 




                       


Identity theft 

• A crime in which an imposter obtains key pieces of personal identification information, in order to impersonate someone else. 


Cyberterrorism 

• Force governments or organizations to advance his/her own political objectives by launching computer-based attacks against computers, networks, and the information stored on them.


Illegal access and use 

Hacker –computer experts who studies systems to discover holes within systems and the reasons for such holes 

Cracker – attempts to break the systems by gaining unauthorized or illegal access to computer systems 

Malicious insiders – People within the organization, or business associates, who have inside information concerning security practices, data and computer systems and attempt to harm the systems or data.

Information and equipment theft – Stealing of software and hardware 

•Steal identification numbers, passwords, invasion of privacy, plant viruses,… 

Software and Internet piracy 

•Act of illegally duplicating software 

•Illegally downloading software from the internet 

Computer related scams – for wrongful financial or personal gains 

Data alteration and deletion








No comments:

Post a Comment