0% found this document useful (0 votes)
50 views32 pages

Security, Ethical Challenges of IT

This document discusses several ethical challenges related to information technology, security, and computer use. It covers issues around business ethics, technology ethics, computer crime, hacking, software piracy, privacy, unauthorized computer use, internet abuses, and employment challenges. Specific topics mentioned include intellectual property rights, customer and employee privacy, security of company records, exercise of corporate power, product safety, environmental issues, computer monitoring, and health issues like repetitive stress injuries.

Uploaded by

Shirin Banu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views32 pages

Security, Ethical Challenges of IT

This document discusses several ethical challenges related to information technology, security, and computer use. It covers issues around business ethics, technology ethics, computer crime, hacking, software piracy, privacy, unauthorized computer use, internet abuses, and employment challenges. Specific topics mentioned include intellectual property rights, customer and employee privacy, security of company records, exercise of corporate power, product safety, environmental issues, computer monitoring, and health issues like repetitive stress injuries.

Uploaded by

Shirin Banu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 32

Security , Ethical challenges of

IT

Health
Employment
Individuality
Working
Crime
Privacy
Business Ethics

Is concerned with the no of ethical


questions that managers must confront as
part of their daily business decision
making
To Promote responsibility of business
professionals
Business Ethics
Intellectual Property right
Customer and employee privacy
Security of company records
Exercise of corporate power
Customer and employee privacy

Employee health
Sexual Harassment
Affirmative action
Equal employment opportunity
Security of company records
Inappropriate gift
Advertising content
Government cash
Financial and cash management
procedure
Questionable business practices in foreign
country
Exercise of corporate power
Product safety
Environment issue
Disinvestment
Corporate contribution
Social issue raised by religious
organizations
Political action committee
Technology Ethics
AITP (Association of information
Technology)
Informed consent
Justice
Minimized risk
Computer Crime / Cyber Crime

The unauthorized use, access, modification and


destruction of H/W, S/W, data or network
resources
The unauthorized release of information
The unauthorized copying of S/W
Denying an end user access to their own H/W,
S/w , Data
Using network resources to illegally obtain
information or tangible property
Security Technology

Antivirus
Virtual Private network
Intrusion-detection system
Content filtering / monitoring
Public key infrastructure
Smart cards
Bio informatics
Hacking
Hacker can be outsiders or company
employee who use the internet and other
networks to steal or damage data
Common Hacking Tactics

Denial of services
Shifter –Capture password or entire contents / is
frequently used to monitor network traffic to
evaluate network capacity as well as reveal
evidence of improper use
Spooling – Faking an email address or web
page to trick users into passing along critical info
like passwords ,or credit card numbers
Common Hacking Tactics
…..
Viruses
( Trojan Horse , Back Doors, malicious,
applets, logic bombs, buffer overflows,
password crackers)
Cyber theft
Many computer crimes involves the theft
of money
Unauthorized use at work
Use of computer systems and networks
can be called time and resource theft
(personal use on office computer)
Doing private consulting or personal
Playing video games
To unauthorized use of internet on
company networks
Internet Abuses
General E-Mail abuses
Unauthorized usage and access
Copy right infringement
Newsgroup posting
Transmission of confidential data
Pornography
Hacking
Non work related download / upload
Leisure use of the internet
Usage of external ISPs
Moonlighting
Moonlighting

Using office resources such as networks


and computers to organize and conduct
personal business (side jobs)
Software Piracy
Computer programs are valuable property and
thus are the subject of theft from computer
systems. However unauthorized copying of
software or software piracy is also a major form
of S/W theft.
S/W is not the only property subject to computer
based piracy . Other intellectual property in the
forms of copy righted material such as music,
videos , images, articles, books and other written
materials
Privacy Issues
Right to privacy of every individual
Spamming is the indiscriminate sending of
unsolicited email message (spam)
Junk e mail
Unsolicited advertisement
Flaming –is the practice of sending
extremely critical derogatory and often
vulgar email messages
Usage of external ISPs

Using an external ISP to connect to the


internet to avoid detection
Leisure use of the internet

Locating around the internet , which


includes shopping , sending e cards and
personal email, gabling online ,chatting ,
game playing , stock trading and doing
personal activities
Non work related download /
upload
Propagation of S/w that ties up office
bandwidth ,use of programs that allow the
transmission of movie , music and
graphical materials
Hacking

Hacking of websites, ranging from denial


of service attacks to accessing
organizational data bases
Pornography

Accessing sexually explicit sites from


workplace as well as the display,
distribution and surfing of these offensive
sites
Transmission of confidential data

Using the internet to display or transmit


trade secrets
Newsgroup posting

Posting of messages on various non work


related
Copy right infringement

Using illegal or pirated S/W


Copying of web sites
Copyrighted logos
Unauthorized usage and access

Sharing of passwords and access into


networks without permission
General E-Mail abuses

Include spamming, harassments, chain


letters , spoofing, viruses
Other Challenges
Employment Challenges
Computer Monitoring
Health Issues
Employment Challenges

- New jobs availability


- Significant reduction in some types of
job opportunity
Computer Monitoring

 Computer are being used to monitor the


productivity and behavior of millions of
employees while they works
Health Issues

Repetitive key stroke jobs can suffer a


variety of health problems
Cumulative trauma disorders( fingers,
wrists, arms, necks, and backs may
become so weak)
Carpal Tunnel Syndrome( a painful,
crippling, ailment of the hand and wrist
that typically requires surgery to cure)

You might also like