Privacy, security, and ethics (NHẬP môn điện TOÁN SLIDE)

24 16 0
Privacy, security, and ethics (NHẬP môn điện TOÁN SLIDE)

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 10: Privacy, Security, and Ethics McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved omputing mputing Essentials 2012: Making IT Work for You Introduction • Information systems consist of people, procedures, software, hardware and data • This chapter focuses on people • Effective implementation of computer technology involves maximizing its positive effects while minimizing its negative effects Copyright © 2012 The McGraw-Hill Companies, Inc All rights McGraw-Hill reserved 10-2 omputing mputing Essentials 2012: Making IT Work for You People • Privacy – What are the threats to personal privacy and how can we protect ourselves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ethics – How the actions of individual users and companies affect society? McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-3 omputing mputing Essentials 2012: Making IT Work for You Privacy • Privacy – concerns the collection and use of data about individuals • Three primary privacy issues: – Accuracy – Property – Access McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-4 omputing mputing Essentials 2012: Making IT Work for You Large Databases • Federal government alone has over 2,000 databases • Reverse directory compiles lists of the calls we make • Data gatherers – Information resellers or information brokers – Electronic profiles are easily created McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-5 omputing mputing Essentials 2012: Making IT Work for You Large Databases Issues • Your personal information is a marketable commodity, which raises many issues: – Collecting public, but personally identifying information (e.g., Google’s Street View) – Spreading information without personal consent, leading to identity theft – Spreading inaccurate information McGraw-Hill • Mistaken identity • Freedom of Information Act Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-6 omputing mputing Essentials 2012: Making IT Work for You Private Networks • Employers can monitor e-mail legally – 75 percent of all businesses search employees’ electronic mail and computer files using snoopware – A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-7 omputing mputing Essentials 2012: Making IT Work for You The Internet and the Web • Illusion of anonymity – People are not concerned about privacy when surfing the Internet or when sending e-mail • History file in Web browsers • Traditional cookies from Web surfing • Spyware – Ad network or adware cookies – Web bugs – Computer monitoring Copyright © 2012 The McGraw-Hillsoftware Companies, Inc All rights McGraw-Hill reserved 10-8 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill Viewing and Blocking Cookies Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-9 omputing mputing Essentials 2012: Making IT Work for You Spyware Removal • Anti-Spyware programs – Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-10 omputing mputing Essentials 2012: Making IT Work for You Privacy Law In SA The National Assemble approved a law that will protect people from the illegal use of their private information - 11 Sep 2012 in the E-mail users will be protected from junk mail People will not need to tolerate unwanted calls at inconvenient times The gathering, publication and selling of computer numbers will be a crime with a maximum of 10 years jail sentence McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-11 omputing mputing Essentials 2012: Making IT Work for You Security • Threats to computer security include criminals, computer crimes, and other hazards • Computer criminals: – – – – – McGraw-Hill Employees Outside users Hackers and crackers Organized crime Terrorists Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-12 omputing mputing Essentials 2012: Making IT Work for You Computer Crime • Malicious Programs – Viruses – Worms – Trojan horse – Zombies • Social networking risks • Rogue Wi-Fi hotspots • Denial of • Theft of hardware, service (DoS) software, data, and attacks computer time • Internet scams, such as • Data manipulation phishing McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-13 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill Common Internet Scams Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-14 omputing mputing Essentials 2012: Making IT Work for You Other Hazards • Natural hazards – Natural forces such as fires, floods, and tornadoes • Civil strife and terrorism – Wars, riots, and terrorist activities • Technological failures – Voltage surge or spike – Use a surge protector • Human errors – Data entry errors Copyright © 2012 The McGraw-Hill Companies, Inc All rights – Programmer error McGraw-Hill reserved 10-15 omputing mputing Essentials 2012: Making IT Work for You Measures to Protect Computer Security • Restricting access • Encrypting data • Anticipating disasters • Preventing data loss McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-16 omputing mputing Essentials 2012: Making IT Work for You Ethics • Copyright – Gives content creators the right to control the use and distribution of their work • Software piracy – – – Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management (DRM) • Plagiarism McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-19 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill VRAE? Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-20 Chapter 11: Your Future and Information Technology McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved omputing mputing Essentials 2012: Making IT Work for You Changing Times • Banks – ATM – ATM cards – Internet banking – S/w verify signatures McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-22 omputing mputing Essentials 2012: Making IT Work for You Technology and Organizations • New Products • New Enterprises • New Customer and Supplier Relationships McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-23 omputing mputing Essentials 2012: Making IT Work for You How You Can Be a Winner • Stay Current – journals, conferences • Maintain Your Computer Competency – books, journals, trade associations • Develop Professional Contacts • Develop Specialties • Be alert for Organizational Change ã Look for Innovative Opportunities McGraw-Hill Copyright â 2012 The McGraw-Hill Companies, Inc All rights reserved 10-24 omputing mputing Essentials 2012: Making IT Work for You McGraw-Hill VRAE? Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-25 omputing mputing Essentials 2012: Making IT Work for You Chapter 10 + 11 STUDY p308 p331 – – 313 336 •VISUAL SUMMARY •KEY TERMS •MULTIPLE CHOICE Q’s •MATCHING Q’s McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-26 ... threats to personal privacy and how can we protect ourselves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ethics – How the actions... Hazards • Natural hazards – Natural forces such as fires, floods, and tornadoes • Civil strife and terrorism – Wars, riots, and terrorist activities • Technological failures – Voltage surge or... Making IT Work for You Ethics • Copyright – Gives content creators the right to control the use and distribution of their work • Software piracy – – – Unauthorized copying and distribution Digital

Ngày đăng: 29/03/2021, 12:42

Mục lục

    Chapter 10: Privacy, Security, and Ethics

    Large Databases - Issues

    The Internet and the Web

    Viewing and Blocking Cookies

    Privacy Law In SA

    Measures to Protect Computer Security

    Chapter 11: Your Future and Information Technology

    How You Can Be a Winner

Tài liệu cùng người dùng

Tài liệu liên quan