Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 27

CHAPTER 7:

MANAGING INFORMATION
TECHNOLOGY

Security and Ethical Challenges


Learning Objectives
 Identify several ethical issues in how the use of
information technologies in business affects:
employment, individuality, working conditions,
Privacy, crime, health, etc.
 Identify several types of security management
strategies and defenses, and explain how they can
be used to ensure the security of business
applications of information technology
 Propose steps to lessen the harmful effects and
increase the beneficial effects of the use of IT
2
Impact of information systems on Organizations
and society

 Impact on organizations
 Information system is one of the resources’ of an
organization which poses a major resource
management challenge.
 affects operational efficiency, employee productivity,
and customer service & satisfaction.
 is a major source of information & support needed for
effective decision making .
 affects organizational structure because it can reduce
the layers & numbers of middle level management.

3
Impact of Information systems on society:

Advantages
 A shift on employment - employment is increasing in
information sector because the economy is heavily
depending on the creation, management & distribution of
information.
 Usage of internet services:-the number of services
available to home users is growing. Electronic mail,
education service & video games, home banking, etc.
 Change on life style - individuals can do their jobs
independent of their workplace. Information systems have
created the opportunity for high standard of living and
increasing leisure time.

4
Ethics and Social Issues
 Ethics
 Principles of right and wrong that can be used by individuals
acting as free moral agents to make choices to guide their
behavior
 Information technology and Information Systems have
indeed raised new questions for both individuals and
societies within the ethical arena.
 They create opportunities for intense social change;
threatening existing distributions of power, money, rights
and obligations.

5
Ethical & Social Issues
 Ethical, Social, and Political Issues
Model
 Ethical, social, and political issues are closely linked. (See next
slide)
 The ethical dilemma you may face as a manager of information
systems typically is reflected in social and political debate.

6
Ethical & Social Issues

7
Ethical & Social Issues
 Ethical, Social, and Political Issues
Model
 Imagine society as a more or less calm pond on a summer day, a
delicate ecosystem in partial equilibrium with individuals and with
social and political institutions.
 Individuals know how to act in this pond because social institutions
(family, education, organizations) have developed well-honed rules of
behavior, and these are backed by laws developed in the political
sector that prescribe behavior and promise sanctions for violations.
 Now toss a rock into the center of the pond. But imagine instead of a
rock that the disturbing force is a powerful shock of new information
technology and systems hitting a society more or less at rest.
 What happens? ripples, of course.

8
Ethical & Social Issues
 Ethical, Social, and Political Issues
Model
 Suddenly individual actors are confronted with new situations often
not covered by the old rules.
 Social institutions cannot respond overnight to these ripples—it
may take years to develop etiquette, expectations, social
responsibility, “politically correct” attitudes, or approved rules.
 Political institutions also require time before developing new laws
and often require the demonstration of real harm before they act.
In the meantime, you may have to act.
 You may be forced to act in a legal “gray area.”

9
IT Security, Ethics, and Society

 IT has both beneficial


and detrimental
effects on society and
people
 Objective: Manage
work activities to
minimize the
detrimental effects of
IT and Optimize the
beneficial effects

10
I. Computer Crime
 Is a growing threat caused by irresponsible actions of few
computer professional and end users, who are taking
advantage of the widespread use of computers and IT in
our society.
 Computer crime includes
 Unauthorized use, access, modification, or destruction of
hardware, software, data, or network resources
 The unauthorized release of information
 The unauthorized copying of software
 Denying an end user access to his/her own hardware, software,
data, or network resources
 Using or conspiring to use computer or network resources illegally
to obtain information or tangible property

11
Computer Crime (Cont’d)

Cyber
Hacking
Theft

Computer
Viruses

Unauthorized
Piracy
Use at work

12
1.1. Hacking

 Hacking: The unauthorized access and use of networked


computer systems and reading files, but neither stealing
nor damaging anything
 Cracker: is a hacker with criminal intent of gaining
unauthorized access by finding weaknesses in the security
protections employed by Web sites and computer systems
 Hackers and crackers try to retrieve passwords, access or
steal network files, overload computer systems, or damage
data and programs.

13
1.2. Cyber Theft

 Many computer crimes involve the theft of money


that occur through the Internet
 The majority are “inside jobs” that involve
unauthorized network entry and alteration of
computer databases to cover the tracks of the
employees involved in the theft.
 More recent examples involve using the Internet

to access major banks’ computer systems.


 Most companies don’t reveal that they have been
targets or victims of cybercrime for fear of loss of
customer confidence.
14
1.3. Unauthorized Use at
Work (Service theft)

 Time and resource theft through unauthorized use of


computer systems and networks by employees
 This may include:
 Doing private consulting
 Doing personal finances
 Playing video games
 Unauthorized use of the Internet or company networks
1.4. Software Piracy
 Unauthorized copying of computer programs, which is
intellectual property protected by copy right law.
 Such piracy results in millions of dollars of lost profits
by software publishers.
15
1.5. Computer viruses

 A virus is a program that spreads destructive


program routines to destroy the contents of memory,
hard disks, and other storage devices.
 Commonly transmitted through
 The Internet and online services
 Email and file attachments
 Disks from contaminated computers

16
2. Privacy Issues

information technology can have a negative effect on every


individual’s right to privacy.
Violation of Privacy

 Accessing individuals’ private email conversations and

computer records
 Collecting and sharing information about individuals gained

from their visits to Internet websites


 Unauthorized Access of Personal Files

 Computer Monitoring: Tracking where a person is, mobile and paging


services are becoming more closely associated with people rather than
places

17
3. Employment Challenges of IT
Lost Job Lost
Opportunities Individuality

Working
Conditions

Health
Security Management
Issues

18
3. Employment Challenges

 The impact of information technologies on employment is a major


ethical concern to managers of today’s e-business.
 Information technology has created new jobs and
increased productivity; While it has caused a significant
reduction in some types of job opportunities.
 Computer Monitoring: Using computers to monitor the productivity and
behavior of employees as they work
 Criticized as unethical because it monitors individuals, not just work,
and is done constantly
 Criticized as invasion of privacy because many employees do not
know they are being monitored

19
Employment Challenges (Cont’d)
 Working Conditions

 Computers have eliminated monotonous or unpleasant tasks in


the office place, thereby improving the quality of work as they
have made some jobs repetitive and routine.
 Computerized systems can depersonalize human transactions,

forcing people to confront and respond to impersonal


programmed logic which lessens the importance of empathy
 Information systems also often require strict adherence to

detailed procedures, which is incompatible with human ideals of


flexibility.
 However, widespread use of personal computers and the Internet
has dramatically improved the development of people-oriented and
personalized systems.

20
4. Health Issues
 Heavy use of computers is linked to
 eyestrain,
 damaged arm,
 neck muscles, and
 radiation exposure.
 Ergonomics (Also called human factors engineering)
is the science that seeks Solutions to some of these
health problems
 The Goal of ergonomics is to design healthy work environments that
are Safe, comfortable, and pleasant for people to work

21
Ergonomics (Cont’d)
 Ergonomics examines three major
factors in the workplace:
 The tools used by the worker; e.g. computer
screens, computer human interfaces, etc.;
 The work environment, e.g. lighting, work
surfaces, climate etc.; and
 The job content and context, e.g. characteristics
of the task, shift work, rest breaks etc.

22
Security Management of IT

 Business managers and


professionals are responsible
to adhere to the goal of
security management, which is
to ensure the accuracy,
integrity, Quality and safety of
all information system
resources (Hardware,
software, networks, and data
resources).

23
Internetworked Security Defenses
 Encryption: uses to protect data that is transmitted via the
Internet, intranets, or extranets.
 Installing multiple intrusion-detection systems e.g. firewalls,
and multiple routers to control incoming traffic in order to
reduce choke points.
 Centralizing, distribution and updating of antivirus software to
Build defenses against the spread of computer viruses
 Setting and enforcing security policies such as e-mail
monitoring policy to prevent the infiltration of destructive
programs like Trojan Horses.

24
Other Security Measures (Cont’d)
 Security Codes. The use of passwords to control access
to information assets.

Backup Files. Such files may be stored off-premises and
can be a key component in disaster recovery.
 Security Monitors. are programs that
 Monitor the use of hardware, software, and data resources
of a computer.
 collect statistics on any attempt of misuse.
 Biometric Security Controls: include such detection
devices as voice recognition and fingerprinting, which must
correspond to the authorized person before admitting personnel
to the system.

25
Security and control issues
Three major areas of control
Information System Controls
 Methods and devices that
ensures the accuracy, validity,
and propriety of information
system activities
Procedural controls Include:
 Separation of duties

 Standard procedures and

documentation
 Authorization requirements

 Auditing

Physical control Include:


 Physical protection

 Computer failure controls

 Telecommunications controls

 Insurance
26
The End

27

You might also like