Ch15

  • Uploaded by: nipas
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ch15 as PDF for free.

More details

  • Words: 1,439
  • Pages: 18
Introduction to Information Technology 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

Chapter 15: Implementing IT: Ethics, Impacts, and Security Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-1

Chapter Preview In this chapter, we will study: Types of ethical issues that arise in relation to information systems Impacts that information systems have had on organization, jobs, individuals, and society Various threats that may damage computer and information systems Ways to protect computer and information systems from hazards and threats Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-2

IT Ethical Issues  Ethics – branch of philosophy that deals

with what is considered to be right and wrong  Code of ethics – principles that guide members of an organization  Types of ethical issues  Privacy – what is collected, stored, and

shared about others  Accuracy – what is done to assure authentic and accurate data  Property – who owns intellectual property and how are they compensated for it  Accessibility – who can obtain information

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-3

Privacy Issues  Information privacy – the right to

determine what information about oneself can be shared with others  Electronic surveillance – computer users’ actions can be monitored without knowledge both at work and at home  Storage of personal information in databases:  What is stored? How can be we sure it’s accurate? Who will it be shared with? How will it be used? Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-4

Privacy Issues (continued)  Many organizations are developing and

enforcing privacy policies  Internationally, countries vary widely regarding their concerns about privacy. Adds complexity to global commerce.  Generally, an organization should… •Only collect data that can be obtained legally and fairly •Make sure data is accurate, complete, and kept up to date •Know why we are collecting data and be sure there is a reason to have it •Make sure data is used just for its intended purpose •Safeguard the data to ensure its quality •Enable those about whom we store data know what we plan to do with the data and can verify its accuracy Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-5

Intellectual Property Issues  Intangible property created by people

or organizations, protected by trade secret, patent, and copyright laws

 Trade secret – intellectual work - not public  Patent – exclusive rights to invention granted to inventor for 20 years  Copyright – creators of intellectual property granted ownership for their lives plus 50 years. Owners have right to collect fees for use. Software is generally copyrighted.  What are the negative consequences of illegally copying software?  Wide variation in the way different countries protect intellectual property – globalization issue Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-6

IT and Organizations  IT has the potential to significantly

change organizations.

 Structures can be flatter, eliminating middle layers, with broader span of control  More extensive supervision is possible electronically, even for those working remotely  Power shifts are likely as knowledge is captured, stored, and shared.

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-7

IT and Jobs  Some jobs will be eliminated,    

especially intermediaries (e.g., travel agents) BPR will cause many jobs to be redesigned; more emphasis on computing capabilities Experience and seniority may become less important in job advancement Managers’ approach to decision making may change Computer-based communication skills may be more in demand

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-8

IT and Individuals  Fears of dehumanization and loss

of social contact  Increasing workload and demand for computer skills can be threatening  Certain aspects of using computers can be physically damaging

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-9

IT and Society

 Some will say that IT has improved our

quality of life

    

Improvements for people with disabilities Improvements in health care system Improved consumer information Robots performing in dangerous situations Improvements in crime fighting

 Concern about deepening divide

between those with and without IT access  Internet communities provide social contact for people with common interests  Telecommuting adds flexibility for workers and organizations Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-10

Security Concerns

 Information systems are subject to

many threats

 Unintentional threats • Human error – in design or use of system • Environmental hazards – acts of God and

other • Computer system failures – faulty products

 Intentional threats • Systems are subject to a wide variety of

hazards from criminal attacks

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-11

Computer Crimes

 Computers may be the target of

criminal activity or the means by which criminal activity is carried out  Methods of attack:  Data tampering is most common attack on computer systems  Deliberate programming fraud also common • Viruses are a highly visible form of

programming attack • Denial of service attacks target ecommerce web sites Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-12

Protecting IT

 Individuals and organizations must

actively establish protection mechanisms

 Prevent and deter damage  Detect threats before damage is widespread  Limit loss from threat  Plan for recovery in event of attack  Correct system to prevent recurrence

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-13

Protecting IT (continued)

 General protection strategies:  Physical security of facilities and resources  Control access to system  Protect data from unauthorized access  Application control strategies:  Ensure quality of inputs  Verify quality of processing  Ensure quality and accessibility of outputs Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-14

Protecting IT (continued)

 Network control strategies:  Control access to network resources  Protect data on network with encryption  Monitor and detect intruders  Protect with firewalls  Verifying quality through audits  Regular evaluation of records and procedures  May be performed by internal and external auditors Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-15

Protecting IT (continued)

 Disaster Prevention and Recovery

Plans

 Organizations need to think through how various disasters will be handled  Key people should know exactly what to do in the event of a disaster  Disaster plans should be tested through practice drills  Critical component is back-up procedures  Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-16

Chapter Summary  Information systems pose a number of

ethical challenges for businesses and individuals  Information systems have changed organizations, jobs, individual workers, and society  Information systems are vulnerable to a number of hazards  Individuals and organizations must take steps to protect their systems from threats Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-17

Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.

15-18

Related Documents

Ch15
May 2020 7
Ch15
November 2019 21
Ch15
May 2020 7
Ch15
October 2019 21
Ch15
November 2019 15
Ch15
June 2020 7

More Documents from ""

Ch09
May 2020 15
Ch07
May 2020 7
Ch13
May 2020 15
Ch15
May 2020 7
Ch03
May 2020 8
Ch04
May 2020 3