Introduction to Information Technology 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
Chapter 15: Implementing IT: Ethics, Impacts, and Security Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-1
Chapter Preview In this chapter, we will study: Types of ethical issues that arise in relation to information systems Impacts that information systems have had on organization, jobs, individuals, and society Various threats that may damage computer and information systems Ways to protect computer and information systems from hazards and threats Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-2
IT Ethical Issues Ethics – branch of philosophy that deals
with what is considered to be right and wrong Code of ethics – principles that guide members of an organization Types of ethical issues Privacy – what is collected, stored, and
shared about others Accuracy – what is done to assure authentic and accurate data Property – who owns intellectual property and how are they compensated for it Accessibility – who can obtain information
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-3
Privacy Issues Information privacy – the right to
determine what information about oneself can be shared with others Electronic surveillance – computer users’ actions can be monitored without knowledge both at work and at home Storage of personal information in databases: What is stored? How can be we sure it’s accurate? Who will it be shared with? How will it be used? Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-4
Privacy Issues (continued) Many organizations are developing and
enforcing privacy policies Internationally, countries vary widely regarding their concerns about privacy. Adds complexity to global commerce. Generally, an organization should… •Only collect data that can be obtained legally and fairly •Make sure data is accurate, complete, and kept up to date •Know why we are collecting data and be sure there is a reason to have it •Make sure data is used just for its intended purpose •Safeguard the data to ensure its quality •Enable those about whom we store data know what we plan to do with the data and can verify its accuracy Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-5
Intellectual Property Issues Intangible property created by people
or organizations, protected by trade secret, patent, and copyright laws
Trade secret – intellectual work - not public Patent – exclusive rights to invention granted to inventor for 20 years Copyright – creators of intellectual property granted ownership for their lives plus 50 years. Owners have right to collect fees for use. Software is generally copyrighted. What are the negative consequences of illegally copying software? Wide variation in the way different countries protect intellectual property – globalization issue Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-6
IT and Organizations IT has the potential to significantly
change organizations.
Structures can be flatter, eliminating middle layers, with broader span of control More extensive supervision is possible electronically, even for those working remotely Power shifts are likely as knowledge is captured, stored, and shared.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-7
IT and Jobs Some jobs will be eliminated,
especially intermediaries (e.g., travel agents) BPR will cause many jobs to be redesigned; more emphasis on computing capabilities Experience and seniority may become less important in job advancement Managers’ approach to decision making may change Computer-based communication skills may be more in demand
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-8
IT and Individuals Fears of dehumanization and loss
of social contact Increasing workload and demand for computer skills can be threatening Certain aspects of using computers can be physically damaging
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-9
IT and Society
Some will say that IT has improved our
quality of life
Improvements for people with disabilities Improvements in health care system Improved consumer information Robots performing in dangerous situations Improvements in crime fighting
Concern about deepening divide
between those with and without IT access Internet communities provide social contact for people with common interests Telecommuting adds flexibility for workers and organizations Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-10
Security Concerns
Information systems are subject to
many threats
Unintentional threats • Human error – in design or use of system • Environmental hazards – acts of God and
other • Computer system failures – faulty products
Intentional threats • Systems are subject to a wide variety of
hazards from criminal attacks
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-11
Computer Crimes
Computers may be the target of
criminal activity or the means by which criminal activity is carried out Methods of attack: Data tampering is most common attack on computer systems Deliberate programming fraud also common • Viruses are a highly visible form of
programming attack • Denial of service attacks target ecommerce web sites Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-12
Protecting IT
Individuals and organizations must
actively establish protection mechanisms
Prevent and deter damage Detect threats before damage is widespread Limit loss from threat Plan for recovery in event of attack Correct system to prevent recurrence
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-13
Protecting IT (continued)
General protection strategies: Physical security of facilities and resources Control access to system Protect data from unauthorized access Application control strategies: Ensure quality of inputs Verify quality of processing Ensure quality and accessibility of outputs Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-14
Protecting IT (continued)
Network control strategies: Control access to network resources Protect data on network with encryption Monitor and detect intruders Protect with firewalls Verifying quality through audits Regular evaluation of records and procedures May be performed by internal and external auditors Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-15
Protecting IT (continued)
Disaster Prevention and Recovery
Plans
Organizations need to think through how various disasters will be handled Key people should know exactly what to do in the event of a disaster Disaster plans should be tested through practice drills Critical component is back-up procedures Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-16
Chapter Summary Information systems pose a number of
ethical challenges for businesses and individuals Information systems have changed organizations, jobs, individual workers, and society Information systems are vulnerable to a number of hazards Individuals and organizations must take steps to protect their systems from threats Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-17
Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc.
15-18