0% found this document useful (0 votes)
37 views33 pages

Ch6-Legal, Ethical and Security Issues

The document discusses the legal, ethical, and security issues related to technology and information systems, highlighting the benefits and risks associated with digital advancements. It emphasizes the importance of privacy, the challenges posed by big data, and the need for ethical standards in handling personal information. Additionally, it outlines various security measures and tools necessary to protect information systems from vulnerabilities and unauthorized access.

Uploaded by

fobaid06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views33 pages

Ch6-Legal, Ethical and Security Issues

The document discusses the legal, ethical, and security issues related to technology and information systems, highlighting the benefits and risks associated with digital advancements. It emphasizes the importance of privacy, the challenges posed by big data, and the need for ethical standards in handling personal information. Additionally, it outlines various security measures and tools necessary to protect information systems from vulnerabilities and unauthorized access.

Uploaded by

fobaid06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

1

Legal, Ethical and Security issues

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
2

Technology: a double-edged sword

• Technology can be the source of many benefits, including the


ability to combat disease and crime and to achieve major cost
savings and efficiencies for business.

• At the same time, digital technology creates new opportunities for


invading your privacy and using information that could cause you
harm.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
3

Technology: a double-edged sword

• A manager, should be sensitive to both the positive and


negative impacts of information systems for the firm, the
employees, and the customers.

• A manager needs to learn how to resolve ethical


dilemmas involving information systems and be aware of
the laws related to information technology and data.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
4

The Dark Side of Big Data


• There’s a dark side to big data, and it has to do with privacy. We can
now collect or analyze data on a much larger scale than ever before
and use what we have learned about individuals in ways that may be
harmful to them.
• Targeting financially vulnerable individuals: data brokers now sell
reports that specifically highlight and target financially vulnerable
individuals.

Real-Life Scenarios
• Example: Online advertisers targeting individuals with ads for
expensive payday loans because they appear desperate for quick cash.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
5

The Dark Side of Big Data

• For example, a data broker might provide a report on retirees with


little or no savings to a company offering high-cost loans, or other
financially risky products. Very few rules or regulations exist to
prevent targeting of vulnerable groups.

• Privacy laws and regulations haven’t caught up with big data


technology.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
6

Ethical, Social, and Political Issues are


Raised by Information Systems
• Ethical issues in information systems have been given new
urgency by the rise of the Internet and e-commerce.

• Internet and digital firm technologies make it easier than ever to


assemble, integrate, and distribute information, unleashing new
concerns about the appropriate use of customer information, the
protection of personal privacy, and the protection of intellectual
property.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
7

Ethical, Social, and Political Issues


are Raised by Information Systems
• Other pressing ethical issues that information systems raise
include establishing accountability for the consequences of
information systems, and setting standards to safeguard
system quality that protects the safety of the individual.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
8

Business Intelligence Tools


• Advances in Business intelligence tools are another
technological trend that heightens ethical concerns because
companies and government agencies can find out highly detailed
personal information about individuals.

• Think of all the ways you generate digital information about


yourself—credit card purchases; banking records; local, state,
and federal government records (including court and police
records); and visits to websites.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
9

Business Intelligence Tools


• Put together and mined properly, this information could reveal
not only your credit information but also your driving habits,
your tastes, your associations, what you read and watch, and
your political interests.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
10

Information Rights: Privacy and


Freedom in the Internet Age (1 of 3)
• Privacy
– Claim of individuals to be left alone, free from surveillance
or interference from other individuals, organizations, or
state; claim to be able to control information about yourself
• In the United States, privacy protected by:
– First Amendment (freedom of speech and association)
– Fourth Amendment (unreasonable search and seizure)
– Additional federal statues (e.g., Privacy Act of 1974)

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
11

Information Rights: Privacy and


Freedom in the Internet Age (2 of 3)
• Most American and European privacy law is based on a regime
called Fair Information Practices (FIP) first set forth in a
report written in 1973 by a federal government advisory
committee and updated most recently in 2010 to take into
account new privacy-invading technology
– Set of principles governing the collection and use of
information
– After information is gathered about an individual to complete a
transaction, the record may not be used to support other activities
without the individual’s consent

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
12

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
13

EU General Data Protection Regulation


(GDP R)
• In Europe, privacy protection is much more stringent than in the
United States. Unlike the United States, European countries do
not allow businesses to use personally identifiable information
without consumer’s prior consent.
• The directive requires companies to inform people when they
collect information about them and disclose how it will be stored
and used. Customers must provide their informed consent
before any company can legally use data about them, and they
have the right to access that information, correct it, and request
that no further data be collected

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
14

EU General Data Protection Regulation


(GDP R)
• E U member nations cannot transfer personal data to countries
without similar privacy protection
– Applies across all E U countries to any firms operating in E
U or processing data on E U citizens or residents
– Allowing individuals to remove personal data from social
platforms like Facebook and prevent them from collecting
any new information.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
15

Internet Challenges to Privacy


• Websites track searches that have been conducted, the websites
and web pages visited, the online content a person has accessed,
and what items that person has inspected or purchased over the
web.

• This monitoring and tracking of website visitors occurs in the


background without the visitor’s knowledge

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
16

Internet Challenges to Privacy

• It is conducted not just by individual websites but by advertising

networks such as Microsoft Advertising, Yahoo, and Google’s

that are capable of tracking personal browsing behavior across

thousands of websites.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
17

Internet Challenges to Privacy


• Cookies
– Identify browser and track visits to site
• Spyware
– Secretly installed on user’s computer
– May transmit user’s keystrokes or display unwanted ads
• Google services and behavioral targeting
– Google possesses the largest collection of personal information in
the world

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
18

Figure 4.3 How Cookies Identify Web


Visitors

1. The Web server reads the user's Web browser and determines the operating system,
browser name, version number, Internet address, and other information.
2. The server transmits a tiny text file with user identification information called a
cookie, which the user's browser receives and stores on the user's computer.
3. When the user returns to the Web site, the server requests the contents of any cookie
it deposited previously in the user's computer.
4. The Web server reads the cookie, identifies the visitor, and calls up data on the user.
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
19

Technical Solutions
• Solutions include:
– Email encryption
– Anonymity tools
– Anti-spyware tools
• Browser offer “Do not track” options: their browser will send a
request to websites requesting the user’s behavior not be tracked.
• Overall, technical solutions have failed to protect users from
being tracked from one site to another

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
20

Property Rights: Intellectual Property


• Information technology has made it difficult to protect
intellectual property because computerized information can be
so easily copied or distributed on networks.
• Protected in four main ways:
– Copyright
– Patents
– Trademarks
– Trade secret

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
21

Challenges to Intellectual Property


Rights
• Digital media different from physical media
– Ease of replication
– Ease of transmission (networks, Internet)
– Ease of alteration
– Difficulties in establishing uniqueness

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
22

Why Systems are Vulnerable


• Security
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems
• Controls
– Methods, policies, and organizational procedures that
ensure safety of organization’s assets; accuracy and
reliability of its accounting records; and operational
adherence to management standards

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
23

Figure 8.1 Contemporary Security


Challenges and Vulnerabilities

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
24

Internet Vulnerabilities
• Network open to anyone
• When the Internet becomes part of the corporate network,
the organization’s information systems are even more
vulnerable to actions from
• E-mail, I M
– Interception
– Attachments with malicious software
– Transmitting trade secrets

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
Malicious Software: Viruses, Worms,
25

Trojan Horses, and Spyware


• Viruses
• Worms
• Trojan horse
• Ransomware
• Spyware
– Key loggers
– Other types
 Reset browser home page
 Redirect search requests

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
26

What is the Business Value of


Security and Control?
• Failed computer systems can lead to significant or total
loss of business function
• Firms now are more vulnerable than ever
– Confidential personal and financial data
– Trade secrets, new products, strategies
• A security breach may cut into a firm’s market value almost
immediately
• Inadequate security and controls also bring forth issues of
liability

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
27

Tools and Technologies for


Safeguarding Information Systems
• Identity management software
– Automates keeping track of all users and privileges
– Assigning each user a unique digital identity for
accessing each system.
– Authenticates users, protecting identities, controlling
access
• Authentication
– Password systems
– Smart cards
– Biometric authentication
– Two-factor authentication
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
28

Tools and Technologies for


Safeguarding Information Systems
• Firewall
– Prevents unauthorized users from accessing private
networks
– The firewall identifies names, IP addresses,
applications, and other characteristics of incoming
traffic.
– It checks this information against the access rules that
the network administrator has programmed into the
system.

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
29

Tools and Technologies for


Safeguarding Information Systems
• Intrusion detection system
– Monitors hot spots on corporate networks to detect and
deter intruders
– Scanning software looks for patterns indicative of known
methods of computer attacks such as bad passwords,
– Checks to see whether important files have been removed
or modified, and sends warnings of vandalism or system
administration errors.
• Antivirus and antispyware software
– Checks computers for presence of malware and can
often eliminate it as well
Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
30

Ensuring System Availability


• Online transaction processing requires 100% availability
• Fault-tolerant computer systems
– Contain redundant hardware, software, and power
supply components that create an environment that
provides continuous, uninterrupted service
• Disaster recovery planning
– Devises plans for restoration of disrupted services

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
31

Ensuring Software Quality


• Software metrics: Objective assessments of system in
form of quantified measurements
– Number of transactions
– Online response time
• Early and regular testing
• Walkthrough: Review of specification or design document
by small group of qualified people
• Debugging: Process by which errors are eliminated

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
32

The Role of Auditing


• Information systems audit
– Examines firm’s overall security environment as well as
controls governing individual information systems
• Security audits
– Review technologies, procedures, documentation,
training, and personnel
– May even simulate disaster to test responses
• List and rank control weaknesses and the probability of
occurrence
• Assess financial and organizational impact of each threat

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved
33

Figure 8.4 Sample Auditor’s List of


Control Weaknesses

Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved

You might also like