Module 3 - 2 MIS - Ethical Issues and Privacy

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

Introduction

 Information technology
- > Collects, stores, integrates and retrieves
data and information

 Store and Retrieve information!!!


- > a Negative impact on right to Privacy???
What is Privacy?
 The ability of an individual or group to secluded
themselves or information about themselves and
thereby reveal it selectively

 A personal, subjective condition. One person cannot


decide for another what his or her sense of privacy
should be?
 Privacy is sometimes related to anonymity, the wish to
remain unnoticed or unidentified in the public.
Ex. Privacy Issue
 Violation of Privacy

 Computer Monitoring

 Computer Matching

 Unauthorized Personal Files


PRIVACY
• Computing technology makes it possible to
collect and use our data.
• The website we visit is one of the way the data
collection.
• Would you matter if your personal
information is been shared ?

PRIMARY ACCURACY :Relates to the responsibility of those who collect the data is correct

PRIVACY PROPERTY :who on data and right to the software


ISSUES
ACCESS :relates to the responsibility of those who have data to control who is able to
use it
LARGE DATABASE

• Large organisation are constantly compiling


information about us.
• There are about 2000 database
• Example : Telephone companies-compile lists of the call we
make.
• REVERSE DIRECTORY list telephone
number followed by subscriber names.
• *insert picture
• *change title
• Information reseller(information broker) : Collect and sell personal
data. Electronic Profiles : are compiled from database to provide
highly detailed and personalized descriptions of individual
• Our personal information has been a marketable commodity. This
raises many issues including :

1.COLLECTING PUBLIC,BUT PERSONALLY


IDENTIFYING INFORMATION.

2.SPREADING INFORMATION WITHOUT


PERSONAL
CONSENT.

3.SPREADING INACCURATE
INFORMATION
How our Personal
Information Gets
Revealed?
When surfing the
internet, avoid “free”
offers and protect your
information!
Chatting – guard
Beware of phishing, which your information unless
are fake e-mails Sent to try
to gain You are 100%
your personal and
Sure who you are
financial information.
chatting with.

Protect your
privacy
on the Web
Cookies aren’t just for
Don’t even eating, they may be
open Spam, download sending your
a spam buster! personal information
to others.

E-mail is not secure


and should never be Protect your passwords
though like you would your wallet
of as private. or car keys.
Make it complicate!
• Is the illegal assumption of someone’s identity for the
purpose of economic gain.

• Occurs when an electronic profile of one person


is switched with another.
• INFORMATION OF INFORMATION ACT :
entitles individuals access to governmental
records relating to them.
Many organization monitor employee e-mail and computer files using
software called SNOOPWARE

Many people believe that, while using the web, little can be done to invade their
privacy. This is called the illusion of anonymity

Record location of visited


sites

Two basic type are TRADITIONAL COOKIES AND AD NETWORK


COOKIES(ADWARE COOKIES).
• TRADITIONAL COOKIES-Provide information to a single sites,a
cookies is deposited with the information that identifies specifically

• AD NETWORK(ADWARE COOKIES-Record your activities


across different sites.

• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER


BROWSING)-
eliminate history files and block cookies.

• SPYWARE-Secretly record and report internet activities.

• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches


what you do.

• WEB BUGS-Provide information back to spammers about activity on


e-mail account.

• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and


monitoring software.
1. Computer criminal included employee , outside
users , hacker and crackers ,carders , organized
crime, and terrorist
2. HACKER :Create or improve programs and shared
those program with fellow hackers . Typically are
not criminal.
3. CRACKERS :Share programs designed to gain
unauthorized access computer systems or disrupt
networks.Typically are criminals.
4. CARDERS :Specialize in stealing,trading and using
stolen credit cards over the internet.
• CYBER-BULLYING : intended to hurt or
embarrass another person.
• ROGUE WI-FI HOTSPOT:Capture
personal information
• SCAMS : designed to trick people into
spending their time/money.
• DENIAL OF SERVICE ATTACK(DOS) : Is attempt to
shut down or stop a computer system/network.it floods a
computer or network with requests for information and
data.

• Theft : Takes many forms including stealing


hardware, software, data and computer time.

• Data manipulation : Involves changing data or leaving


prank messages .The Computer Fraud and Abuse Act helps
protect against data manipulation.
• MALICIOUS PROGRAMS (MALWARE) : Design to
damage or disrupt computer system.3 most common types
of malware are viruses, worms, and Trojan horses.
VIRUSES
• Some of the viruses are harmless while some of it can damaging our
system
component.
WORMS
• It fill the computer a computer system with self replicating
information, clogging the system that is operation are slowed/stopped
• Typically find their way into microcomputer through e-mail
attached/programs downloaded from internet
Trojan horses
• Disguised as something else
• Not a viruses , but it carries viruses.
Zombies
• Remotely controlled infected computer for malicious
RESTRICTING ACCESS :
Sometimes security matter of putting guards on
company computer rooms and checking the
identification of everyone admitted.Other times it use
biometric scanning such as fingerprint and iris.
Password are secret words or phrases that must be
keyed into a computer system to gain access.
1. E-MAIL ENCRYPTING : Protect e-mails messages as the moves
across the internet.
2. FILE ENCRYPTING :Protects sensitive files by encrypting them
before they stored on a hard drive.
3. WEB SITES ENCRYPTING :Secures Web transaction,especially
financial transaction
4. VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections
between company networks and remote users such as workers
connecting from home
5. WIRELESS NETWORK ENCRYPTING :Restricts access to
authorized uses on wireless network.WEA(WIRED
EQUIVALENT PRIVACY) is one of the best-known wireless
encryption protocols.
 Spyware takes advantage of security holes by attacking
the browser and forcing it to be downloaded and
installed and gather your information without your
knowledge

 Phishing occurs when a criminal lures the victim into


providing financial or personal data

 Pharming occurs when criminals plant programs in


the victim’s computer which re-direct the victim
from legitimate Web sites to scam l ook- alike sites
Solutions to Protect
Online Privacy
 Cookies are data packets sent by a server to a web
client and then sent back unchanged by the client
each time it accesses that server

 Cookies are used for authenticating, session


tracking and maintaining specific information
about users, such as site preferences or the contents
of their electronic shopping carts

 Cookies are only data, not programs nor viruses


 Search engines have and use the ability to track
each one of your searches (e.g. ,IP address, search
terms, time)
 Anti-virus
software

 Firewalls

 Encryption tools
 Developed by the World Wide Web
Consortium (W3C)

 A protocol allowing websites to declare their


intended use of information they collect about
browsing users and allow users to configure
their browsers or other software tools in such a
way that they are notified whether web site
privacy policies match their pre-set preferences
2 important issues in computer ethics.
1. Copyright and Digital Right Management

2. Plagiarism
• Gives content creators the right to control the
use and distribution of their work.
Example of materials :
• Paintings , books , music, films , video games.

Others : make unauthorized copies


• Digital media. (violates copyright)
Software Privacy
• Is the unauthorized copying and distribution of software.

 Digital Millennium Copyright Act


-established the right of the program owner to make a backup
copy and disallow the creation of copies.
-illegal to download copyright-protected music and videos from
Internet.

 Digital rights management (DRM)


-collection of technologies designed to prevent copyright
violations.
-control the number of devices that can access given file.
-limits the kinds of devices that can access a file.
• The illegal and unethical representation of
some other person’s work and ideas as your
own without giving credit to the original
source.

Example :
cutting &
pasting Web content
into a report or paper.

You might also like