Security and Ethical Challenges in MIS
Security and Ethical Challenges in MIS
Security and Ethical Challenges in MIS
2
Ethical Responsibility of Business
Professionals
3
Ethical Responsibility of Business
Professionals(continued)
Business Ethics
Managers must confront numerous ethical
questions concerned with Business Ethics.
Basic categories of ethical issues
Intellectual property rights.
Consumer & employee privacy.
Security of company information.
Workplace safety
4
Ethical Responsibility of Business
Professionals(continued)
Technology Ethics
Another important ethical dimension
Four principles serve as basic ethical
dimension
Proportionality:
Good must outweigh any harm or risk
Must be no alternative that achieves the same or
comparable benefits with less harm or risk
5
Ethical Responsibility of Business
Professionals(continued)
Ethical Guidelines
Business and IS professionals should
follows:
Acting with integrity.
Increasing your professional competence.
Setting high standards of personal performance.
Accepting responsibility for your work.
Advancing the health, privacy and general
welfare of the public.
7
Computer Crime
Who commits computer crime?
Association of Information
Technology Professionals
(AITP) definition includes
The unauthorized use, access,
modification, and destruction of
hardware, software, data, or
network resources
Unauthorized release of
information
Unauthorized copying of
software
8
Computer Crime
List of Top 20 Countries with the highest
Hacking rate of Cybercrime (source: Business
Week/Symantec
The obsessive use of
computers, or the
unauthorized access
and use of networked
computer systems
Cyber Theft
Involves unauthorized
network entry and the
fraudulent alteration of
computer databases
9
Source: http://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/
Computer Crime (continued)
10
Computer Crime (continued)
Software Piracy Theft of intellectual
Unauthorized property
copying of software Other forms of
Software is intellectual property
intellectual property covered by
protected by
copyright laws
copyright law and
user licensing Music, videos and
agreements images
Articles & books
Other written works
11
Computer Crime (continued)
Computer viruses and worms
Virus
A program that cannot work without being
inserted into another program
Worm
A distinct program that can run
unaided
12
Computer Crime (continued)
14
Privacy Issues
15
Privacy Issues (continued)
16
Privacy Issues (continued)
Privacy on the Internet (continued)
Protect your privacy by
Encrypting your messages
Post to newsgroups through anonymous
remailers
Ask your ISP not to sell your information to
mailing list providers and other marketers
Decline to reveal personal data and interests
online
17
Privacy Issues (continued)
Privacy laws
Attempt to enforce the privacy of
computer-based files and
communications
Electronic Communications Privacy Act
Computer Fraud and Abuse Act
18
Privacy Issues (continued)
Employment
New jobs have been created and
productivity has increased, yet there has
been a significant reduction in some
types of jobs as a result of IT.
20
Other Challenges (continued)
Computer Monitoring
Concerns workplace privacy
Monitors individuals, not just work
Is done continually. May be seen as violating
workers’ privacy & personal freedom
Workers may not know that they are being
monitored or how the information is being
used
May increase workers’ stress level
May rob workers of the dignity of their work
21
Other Challenges (continued)
22
Health Issues
Job stress
Muscle damage
Eye strain
Radiation exposure
Accidents
Some solutions
Ergonomics (human factors engineering)
Goal is to design healthy work environments
23
Societal Solutions
24
THANK YOU
25