SlidePub
Home
Categories
Login
Register
Home
General
MIS - SECURITY AND ETHICAL CHALLENGES.ppt
MIS - SECURITY AND ETHICAL CHALLENGES.ppt
vani825135
16 views
16 slides
Jul 13, 2024
Slide
1
of 16
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
About This Presentation
MIS
Size:
870.09 KB
Language:
en
Added:
Jul 13, 2024
Slides:
16 pages
Slide Content
Slide 1
Eleventh Edition
1
Introduction to Information Systems
Essentials for the Internetworked E-Business Enterprise
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
C h a p t e r
James A. O’Brien
11
Security and
Ethical Challenges
of e-Business
Slide 2
Eleventh EditionJames A. O’Brien 2Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter Objectives
•Identify several ethical issues in how the
use of information technologies in e-
business affects employment,
individuality, working conditions, privacy,
crime, health, and solutions to societal
problems.
•Identify several types of security
management strategies and defenses,
and explain how they can be used to
ensure the security of e-business
applications.
Slide 3
Eleventh EditionJames A. O’Brien 3Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter Objectives
•Propose several ways that business
managers and professionals can help to
lessen the harmful effects and increase
the beneficial effects of the use of
information technology.
Slide 4
Eleventh EditionJames A. O’Brien 4Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Security and Ethical Challenges
Security
Ethics and
Society
Employment
Privacy
Health
Individuality
Crime
Working
Conditions
Slide 5
Eleventh EditionJames A. O’Brien 5Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Computer Crime
Hacking
Unauthorized
Use at work
Cyber
Theft
Piracy
Computer
Viruses
Slide 6
Eleventh EditionJames A. O’Brien 6Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Common Hacking Tactics
•Denial of Service
•Scans
•Sniffer Programs
•Spoofing
•Trojan Horse
•Back Doors
•Malicious Applets
•War Dialing
•Logic Bombs
•Buffer Overflow
•Password Crackers
•Social Engineering
•Dumpster Driving
Slide 7
Eleventh EditionJames A. O’Brien 7Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Employment Challenges
Lost Job
Opportunities
Computer
Monitoring
Lost
Individuality
Health
Issues
Working
Conditions
Slide 8
Eleventh EditionJames A. O’Brien 8Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Ergonomic Factors in the Workplace
The Tools
(Computer, Hardware,
and Software
The
Workstation
and
Environment
The Tasks
(Job Content & Context)
The
User/
Operator
Slide 9
Eleventh EditionJames A. O’Brien 9Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Ethical Considerations
•Ethical Principles
–Proportionality
–Informed Consent
–Justice
–Minimized Risk
•Standard of Conduct
–Act with integrity
–Protect the privacy and
confidentiality of
information
–Do not misrepresent or
withhold information
–Do not misuse resources
–Do not exploit weakness
of systems
–Set high standards
–Advance the health and
welfare of general public
Slide 10
Eleventh EditionJames A. O’Brien 10Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Security Management of e-Business
Encryption
Denial of Service
Defenses
Fire Walls
Monitor
E-mail
Virus
Defenses
Slide 11
Eleventh EditionJames A. O’Brien 11Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Other e-Business Security Measures
Security
Codes
Security
Monitors
Backup
Files
Biometric
Security Controls
Slide 12
Eleventh EditionJames A. O’Brien 12Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Computer System Failure ControlsApplications Environmental,
HW and SW
Faults
Application
redundancy,
Checkpoints
Systems Outages System isolation
Data security
Databases Data errors Transaction
histories, backup
files
Networks Transmission
errors
Alternate routing,
error correcting
routines
Processes HW and SW
faults
Checkpoints
Files Media Errors Replication of data
Processors HW Faults Instruction retry
Layer Threat Fault Tolerant Methods
Fault Tolerant Systems
Fail-Over Fail-Safe Fail-Soft
Slide 13
Eleventh EditionJames A. O’Brien 13Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Disaster Recovery
•Who will participate?
•What will be their
duties?
•What hardware and
software will be used?
•Priority of applications
to be run?
•What alternative
facilities will be used?
•Where will databases
be stored?
Slide 14
Eleventh EditionJames A. O’Brien 14Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
e-Business System Controls and Audits
Processing
Controls
Fire walls
Software
Hardware
Checkpoints
Storage
Controls
Input
Controls
Output
Controls
Security Codes
Encryption
Error Signals
Security Codes
Encryption
Backup Files
Security Codes
Encryption
Control Totals
User Feedback
Slide 15
Eleventh EditionJames A. O’Brien 15Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter Summary
•The vital role of e-bBusiness and e-commerce
systems in society raises serious ethical and
societal issues in terms of their impact on
employment, individuality, working conditions,
privacy, health, and computer crime.
•Managers can help solve the problems of
improper use of IT by assuming their ethical
responsibilities for ergonomic design,
beneficial use, and enlightened management of
e-business technologies in our society.
Slide 16
Eleventh EditionJames A. O’Brien 16Introduction to Information Systems
Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter Summary (cont)
•Business and IT activities involve many ethical
considerations. Ethical principles and
standards of conduct can serve as guidelines
for dealing with ethical businesses issues.
•One of the most important responsibilities of
the management of a company is to assure the
security and quality of its e-business activities.
•Security management tools and policies can
ensure the accuracy, integrity, and safety of e-
business systems and resources.
Tags
Categories
General
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
16
Slides
16
Age
515 days
Related Slideshows
22
Pray For The Peace Of Jerusalem and You Will Prosper
RodolfoMoralesMarcuc
36 views
26
Don_t_Waste_Your_Life_God.....powerpoint
chalobrido8
39 views
31
VILLASUR_FACTORS_TO_CONSIDER_IN_PLATING_SALAD_10-13.pdf
JaiJai148317
35 views
14
Fertility awareness methods for women in the society
Isaiah47
32 views
35
Chapter 5 Arithmetic Functions Computer Organisation and Architecture
RitikSharma297999
31 views
5
syakira bhasa inggris (1) (1).pptx.......
ourcommunity56
32 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-16)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better