Chapter 10: Privacy, Security, and Ethics McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved omputing mputing Essentials 2012: Making IT Work for You Introduction • Information systems consist of people, procedures, software, hardware and data • This chapter focuses on people • Effective implementation of computer technology involves maximizing its positive effects while minimizing its negative effects Copyright © 2012 The McGraw-Hill Companies, Inc All rights McGraw-Hill reserved 10-2 omputing mputing Essentials 2012: Making IT Work for You People • Privacy – What are the threats to personal privacy and how can we protect ourselves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ethics – How the actions of individual users and companies affect society? McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-3 omputing mputing Essentials 2012: Making IT Work for You Privacy • Privacy – concerns the collection and use of data about individuals • Three primary privacy issues: – Accuracy – Property – Access McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-4 omputing mputing Essentials 2012: Making IT Work for You Large Databases • Federal government alone has over 2,000 databases • Reverse directory compiles lists of the calls we make • Data gatherers – Information resellers or information brokers – Electronic profiles are easily created McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-5 omputing mputing Essentials 2012: Making IT Work for You Large Databases Issues • Your personal information is a marketable commodity, which raises many issues: – Collecting public, but personally identifying information (e.g., Google’s Street View) – Spreading information without personal consent, leading to identity theft – Spreading inaccurate information McGraw-Hill • Mistaken identity • Freedom of Information Act Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-6 omputing mputing Essentials 2012: Making IT Work for You Private Networks • Employers can monitor e-mail legally – 75 percent of all businesses search employees’ electronic mail and computer files using snoopware – A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-7 omputing mputing Essentials 2012: Making IT Work for You The Internet and the Web • Illusion of anonymity – People are not concerned about privacy when surfing the Internet or when sending e-mail • History file in Web browsers • Traditional cookies from Web surfing • Spyware – Ad network or adware cookies – Web bugs – Computer monitoring Copyright © 2012 The McGraw-Hillsoftware Companies, Inc All rights McGraw-Hill reserved 10-8 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill Viewing and Blocking Cookies Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-9 omputing mputing Essentials 2012: Making IT Work for You Spyware Removal • Anti-Spyware programs – Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-10 omputing mputing Essentials 2012: Making IT Work for You Privacy Law In SA The National Assemble approved a law that will protect people from the illegal use of their private information - 11 Sep 2012 in the E-mail users will be protected from junk mail People will not need to tolerate unwanted calls at inconvenient times The gathering, publication and selling of computer numbers will be a crime with a maximum of 10 years jail sentence McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-11 omputing mputing Essentials 2012: Making IT Work for You Security • Threats to computer security include criminals, computer crimes, and other hazards • Computer criminals: – – – – – McGraw-Hill Employees Outside users Hackers and crackers Organized crime Terrorists Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-12 omputing mputing Essentials 2012: Making IT Work for You Computer Crime • Malicious Programs – Viruses – Worms – Trojan horse – Zombies • Social networking risks • Rogue Wi-Fi hotspots • Denial of • Theft of hardware, service (DoS) software, data, and attacks computer time • Internet scams, such as • Data manipulation phishing McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-13 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill Common Internet Scams Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-14 omputing mputing Essentials 2012: Making IT Work for You Other Hazards • Natural hazards – Natural forces such as fires, floods, and tornadoes • Civil strife and terrorism – Wars, riots, and terrorist activities • Technological failures – Voltage surge or spike – Use a surge protector • Human errors – Data entry errors Copyright © 2012 The McGraw-Hill Companies, Inc All rights – Programmer error McGraw-Hill reserved 10-15 omputing mputing Essentials 2012: Making IT Work for You Measures to Protect Computer Security • Restricting access • Encrypting data • Anticipating disasters • Preventing data loss McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-16 omputing mputing Essentials 2012: Making IT Work for You Ethics • Copyright – Gives content creators the right to control the use and distribution of their work • Software piracy – – – Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management (DRM) • Plagiarism McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-19 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill VRAE? Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-20 Chapter 11: Your Future and Information Technology McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved omputing mputing Essentials 2012: Making IT Work for You Changing Times • Banks – ATM – ATM cards – Internet banking – S/w verify signatures McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-22 omputing mputing Essentials 2012: Making IT Work for You Technology and Organizations • New Products • New Enterprises • New Customer and Supplier Relationships McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-23 omputing mputing Essentials 2012: Making IT Work for You How You Can Be a Winner • Stay Current – journals, conferences • Maintain Your Computer Competency – books, journals, trade associations • Develop Professional Contacts • Develop Specialties • Be alert for Organizational Change ã Look for Innovative Opportunities McGraw-Hill Copyright â 2012 The McGraw-Hill Companies, Inc All rights reserved 10-24 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill VRAE? Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-25 omputing mputing Essentials 2012: Making IT Work for You Chapter 10 + 11 STUDY p308 p331 – – 313 336 •VISUAL SUMMARY •KEY TERMS •MULTIPLE CHOICE Q’s •MATCHING Q’s McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-26 ... threats to personal privacy and how can we protect ourselves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ethics – How the actions... Hazards • Natural hazards – Natural forces such as fires, floods, and tornadoes • Civil strife and terrorism – Wars, riots, and terrorist activities • Technological failures – Voltage surge or... Making IT Work for You Ethics • Copyright – Gives content creators the right to control the use and distribution of their work • Software piracy – – – Unauthorized copying and distribution Digital