Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

Information Systems for Business

Module 5
Agenda.
Ethical and Societal Issues in Information System

Computer Crime

Security and Control of Information Systems

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

2
Ethics
Principles of right and wrong that individuals,
acting as free moral agents, use to make choices
to guide their behaviors
D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

3
Information systems and Ethics
Information systems raise new ethical questions because they
create opportunities for:

Intense social change, threatening existing distributions of power,
money, rights, and obligations

New kinds of crime

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

4
IS Ethics
Privacy
Accuracy
Property
Accessibility
D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

5

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

6
Identity Theft
Barack Obama, Vijay Mallya,
Aditya Chopra Amartya Sen

Fabricated Data

Cyber Squatting
Sushmita Sen, SBI, Tata group,
Bharti Group, ET

Right of use and access


D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

7

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

8
IT Act 2008 66-E: (Privacy)
Whoever, intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without his or
her consent, under circumstances violating the privacy of that
person, shall be punished with imprisonment which may extend
to three years or with fine not exceeding two lakh rupees, or with
both.
IT Act 2008 43A: (Private information - Corporates)
Where a body corporate, possessing, dealing or handling any
sensitive personal data or information in a computer resource
which it owns, controls or operates, is negligent in implementing
and maintaining reasonable security practices and procedures
and thereby causes wrongful loss or wrongful gain to any person,
such body corporate shall be liable to pay damages by way of
compensation to the person so affected

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

9
IT Act 2008 66. (Private information punishment)
If any person, dishonestly or fraudulently, does any act referred to
in section 43, he shall be punishable with imprisonment for a
term which may extend to three years or with fine which may
extend to five lakh rupees or with both.
IT Act 2008 66C. (Private information punishment)
Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of
any other person, shall be punished with imprisonment of either
description for a term which may extend to three years and shall
also be liable to fine with may extend to rupees one lakh.
D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

10

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

11
RELATIONSHIP BETWEEN ETHICAL, SOCIAL, & POLITICAL
ISSUES IN AN INFORMATION SOCIETY


D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

12

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

13
Business Ethics & IT
Ethics questions that managers confront as part of their daily
business decision making include:
Equity
Rights
Honesty
Exercise of corporate power

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

15

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

16

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

17
Computer Crime
The act of using a computer to commit an illegal act

Computer crime includes
Unauthorized use, access, modification, or destruction of
hardware, software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software,
data, or network resources
Using or conspiring to use computer or network resources
illegally to obtain information or tangible property

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

18

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

19

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

20

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

21



Hacking
Cracking
Data diddling
Salami slicing
Phreaking
Carding
Piggybacking
Social engineering
Dumpster diving
Spoofing
D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

23
Security
Honeywell is committed to protecting the security of your
personal information. We use a variety of security
technologies and procedures to help protect your personal
information from unauthorized access, use, or disclosure. For
example, we store the personal information you provide on
computer systems with limited access that are located in
facilities to which access is limited. For sites to which you
login, it is your responsibility to ensure the security of your
password and not to reveal this information to others. When
you move around a site to which you have logged in, or from
one site to another that uses the same login mechanism, we
verify your identity by means of an encrypted cookie placed
on your machine.

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

24
CAPTCHA

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

25
Security Plan
Risk Analysis

Policy and Procedure
Information, Security, Use, Backup, Account Management.

Implementation

Training

Auditing
D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

26

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

27
"When I took office,
only high energy
physicists had ever
heard of what is
called the World
Wide Web ... Now
even my cat has it's
own page.
Bill Clinton Former
US President

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

28

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

29

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

30

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

31

D
e
c
e
m
b
e
r

1
2

I
n
f
o
r
m
a
t
i
o
n

S
y
s
t
e
m
s

f
o
r

B
u
s
i
n
e
s
s

32

You might also like