SlideShare a Scribd company logo
1 of 55
Principles of Information
Systems
Eighth Edition
Chapter 14
The Personal and Social Impact of
Computers
2Principles of Information Systems, Eighth Edition
Principles and Learning Objectives
• Policies and procedures must be established to
avoid computer waste and mistakes
– Describe some examples of waste and mistakes in
an IS environment, their causes, and possible
solutions
– Identify policies and procedures useful in eliminating
waste and mistakes
– Discuss the principles and limits of an individual’s
right to privacy
3Principles of Information Systems, Eighth Edition
Principles and Learning Objectives
(continued)
• Computer crime is a serious and rapidly growing
area of concern requiring management attention
– Explain the types and effects of computer crime
– Identify specific measures to prevent computer crime
4Principles of Information Systems, Eighth Edition
Principles and Learning Objectives
(continued)
• Jobs, equipment, and working conditions must be
designed to avoid negative health effects
– List the important effects of computers on the work
environment
– Identify specific actions that must be taken to ensure
the health and safety of employees
– Outline criteria for the ethical use of information
systems
5Principles of Information Systems, Eighth Edition
Why Learn About Security, Privacy,
and Ethical Issues in Information
Systems and the Internet?
• Many nontechnical issues associated with ISs
• Human Resource employees need to:
– Prevent computer waste and mistakes
– Avoid privacy violations
– Comply with laws about:
• Collecting customer data
• Monitoring employees
• Employees, IS users, and Internet users need to:
– Avoid crime, fraud, privacy invasion
6Principles of Information Systems, Eighth Edition
Computer Waste and Mistakes
• Computer waste
– Inappropriate use of computer technology and
resources
• Computer-related mistakes
– Errors, failures, and other computer problems that
make computer output incorrect or not useful
– Caused mostly by human error
7Principles of Information Systems, Eighth Edition
Computer Waste
• Cause: improper management of information
systems and resources
– Discarding old software and computer systems when
they still have value
– Building and maintaining complex systems that are
never used to their fullest extent
– Using corporate time and technology for personal
use
– Spam
8Principles of Information Systems, Eighth Edition
Computer-Related Mistakes
• Common causes
– Failure by users to follow proper procedures
– Unclear expectations and a lack of feedback
– Program development that contains errors
– Incorrect data entry by data-entry clerk
9Principles of Information Systems, Eighth Edition
Preventing Computer-Related Waste
and Mistakes
• Effective policies and procedures must be:
– Established
– Implemented
– Monitored
– Reviewed
10Principles of Information Systems, Eighth Edition
Establishing Policies and Procedures
• Establish policies and procedures regarding
efficient acquisition, use, and disposal of systems
and devices
• Identify most common types of computer-related
mistakes
• Training programs for individuals and workgroups
• Manuals and documents on how computer systems
are to be maintained and used
• Approval of certain systems and applications
before they are implemented and used
11Principles of Information Systems, Eighth Edition
Implementing Policies and Procedures
• Policies often focus on:
– Implementation of source data automation
– Use of data editing to ensure data accuracy and
completeness
– Assignment of clear responsibility for data accuracy
within each information system
• Training is very important for acceptance and
implementation of policies and procedures
12Principles of Information Systems, Eighth Edition
Monitoring Policies and Procedures
• Monitor routine practices and take corrective action
if necessary
• Implement internal audits to measure actual results
against established goals
• Follow requirements in Sarbanes-Oxley Act
– Requires companies to document underlying
financial data to validate earnings reports
13Principles of Information Systems, Eighth Edition
Reviewing Policies and Procedures
• Do current policies cover existing practices
adequately?
– Were any problems or opportunities uncovered
during monitoring?
• Does the organization plan any new activities in the
future?
– If so, does it need new policies or procedures on
who will handle them and what must be done?
• Are contingencies and disasters covered?
14Principles of Information Systems, Eighth Edition
Computer Crime
• Often defies detection
• Amount stolen or diverted can be substantial
• Crime is “clean” and nonviolent
• Number of IT-related security incidents is
increasing dramatically
• Computer crime is now global
15Principles of Information Systems, Eighth Edition
The Computer as a Tool to Commit
Crime
• Criminals need two capabilities to commit most
computer crimes
– Knowing how to gain access to computer system
– Knowing how to manipulate the system to produce
desired results
• Examples
– Social engineering
– Dumpster diving
– Counterfeit and banking fraud using sophisticated
desktop publishing programs and high-quality
printers
16Principles of Information Systems, Eighth Edition
Cyberterrorism
• Cyberterrorist: intimidates or coerces a
government or organization to advance his or her
political or social objectives by launching computer-
based attacks against computers, networks, and
information stored on them
• Homeland Security Department’s Information
Analysis and Infrastructure Protection Directorate
– Serves as governmental focal point for fighting
cyberterrorism
17Principles of Information Systems, Eighth Edition
Identity Theft
• Imposter obtains personal identification information
such as Social Security or driver’s license numbers
in order to impersonate someone else
– To obtain credit, merchandise, and services in the
name of the victim
– To have false credentials
• Identity Theft and Assumption Deterrence Act of
1998 passed to fight identity theft
• 9 million victims in 2005
18Principles of Information Systems, Eighth Edition
The Computer as the Object of Crime
• Crimes fall into several categories
– Illegal access and use
– Data alteration and destruction
– Information and equipment theft
– Software and Internet piracy
– Computer-related scams
– International computer crime
19Principles of Information Systems, Eighth Edition
Illegal Access and Use
• Hacker: learns about and uses computer systems
• Criminal hacker (also called a cracker): gains
unauthorized use or illegal access to computer
systems
• Script bunny: automates the job of crackers
• Insider: employee who comprises corporate
systems
• Malware: software programs that destroy or
damage processing
20Principles of Information Systems, Eighth Edition
Illegal Access and Use (continued)
• Virus: program file capable of attaching to disks or
other files and replicating itself repeatedly
• Worm: parasitic computer program that can create
copies of itself on infected computer or send copies
to other computers via a network
21Principles of Information Systems, Eighth Edition
Illegal Access and Use (continued)
• Trojan horse: program that appears to be useful
but purposefully does something user does not
expect
• Logic bomb: type of Trojan horse that executes
when specific conditions occur
• Variant: modified version of a virus that is
produced by virus’s author or another person
22Principles of Information Systems, Eighth Edition
Using Antivirus Programs
• Antivirus program: program or utility that prevents
viruses and recovers from them if they infect a
computer
• Tips on using antivirus software
– Run and update antivirus software often
– Scan all diskettes and CDs before using them
– Install software only from a sealed package or
secure, well-known Web site
– Follow careful downloading practices
– If you detect a virus, take immediate action
23Principles of Information Systems, Eighth Edition
Using Antivirus Programs (continued)
Antivirus software should be used and updated often
24Principles of Information Systems, Eighth Edition
Information and Equipment Theft
• Obtaining identification numbers and passwords to
steal information or disrupt systems
– Trial and error, password sniffer program
• Software theft
• Computer systems and equipment theft
– Data on equipment is valuable
25Principles of Information Systems, Eighth Edition
Software and Internet Software Piracy
• Software is protected by copyright laws
• Copyright law violations
– Making additional copies
– Loading the software onto more than one machine
• Software piracy: act of illegally duplicating
software
• Internet-based software piracy
– Most rapidly expanding type of software piracy and
most difficult form to combat
– Examples: pirate Web sites, auction sites with
counterfeit software, peer-to-peer networks
26Principles of Information Systems, Eighth Edition
Computer-Related Scams
• Examples of Internet scams
– Get-rich-quick schemes
– “Free” vacations with huge hidden costs
– Bank fraud
– Fake telephone lotteries
– Selling worthless penny stocks
• Phishing
– Gaining access to personal information by
redirecting user to fake site
27Principles of Information Systems, Eighth Edition
International Computer Crime
• Computer crime becomes more complex when it is
committed internationally
• Large percentage of software piracy takes place
across borders
• Threat of terrorists, international drug dealers, and
other criminals using information systems to
launder illegally obtained funds
• Computer Associates International’s CleverPath for
Global Compliance software
28Principles of Information Systems, Eighth Edition
Preventing Computer-Related Crime
• Efforts to curb computer crime being made by:
– Private users
– Companies
– Employees
– Public officials
29Principles of Information Systems, Eighth Edition
Crime Prevention by State and
Federal Agencies
• Computer Fraud and Abuse Act of 1986
– Punishment based on the victim’s dollar loss
• Computer Emergency Response Team (CERT)
– Responds to network security breaches
– Monitors systems for emerging threats
• Newer and tougher computer crime legislation is
emerging
30Principles of Information Systems, Eighth Edition
Crime Prevention by Corporations
• Public key infrastructure (PKI)
– Allows users of an unsecured public network such as
the Internet to securely and privately exchange data
– Use of a public and a private cryptographic key pair,
obtained and shared through a trusted authority
• Biometrics: measurement of one of a person’s
traits, whether physical or behavioral
31Principles of Information Systems, Eighth Edition
Table 14.3: Common Methods Used to Commit Computer Crimes
Crime Prevention by Corporations
(continued)
32Principles of Information Systems, Eighth Edition
Crime Prevention by Corporations
(continued)
Table 14.3: Common Methods Used to Commit Computer Crimes
(continued)
33Principles of Information Systems, Eighth Edition
Using Intrusion Detection Software
• Intrusion detection system (IDS)
– Monitors system and network resources
– Notifies network security personnel when it senses a
possible intrusion, such as:
• Repeated failed logon attempts
• Attempts to download a program to a server
• Access to a system at unusual hours
– Can provide false alarms
– E-mail or voice message alerts may be missed
34Principles of Information Systems, Eighth Edition
Using Managed Security Service
Providers (MSSPs)
• Managed security service provider (MSSP):
organization that monitors, manages, and
maintains network security for both hardware and
software for its client companies
– Sifts through alarms and alerts from all monitoring
systems
– May provide scanning, blocking, and filtering
capabilities
– Useful for small and midsized companies
35Principles of Information Systems, Eighth Edition
Internet Laws for Libel and Protection
of Decency
• Filtering software
– Screens Internet content to protect children
– Prevents children from sending personal information
over e-mail or through chat groups
• Internet Content Rating Association (ICRA) rating
system for Web sites
• Children’s Internet Protection Act (CIPA)
– Requires filters in federally funded libraries
36Principles of Information Systems, Eighth Edition
Internet Laws for Libel and Protection
of Decency (continued)
• Libel: publishing an intentionally false written
statement that is damaging to a person’s reputation
• Can online services be sued for libel for content
that someone else publishes on their service?
37Principles of Information Systems, Eighth Edition
Preventing Crime on the Internet
• Develop effective Internet usage and security
policies
• Use a stand-alone firewall with network monitoring
capabilities
• Deploy intrusion detection systems, monitor them,
and follow up on their alarms
• Monitor managers’ and employees’ use of Internet
• Use Internet security specialists to perform audits
of all Internet and network activities
38Principles of Information Systems, Eighth Edition
Privacy Issues
• With information systems, privacy deals with the
collection and use or misuse of data
• More and more information on all of us is being
collected, stored, used, and shared among
organizations
• Who owns this information and knowledge?
39Principles of Information Systems, Eighth Edition
Privacy and the Federal Government
• Data collectors
– U.S. federal government
– State and local governments
– Profit and nonprofit organizations
• U.S. National Security Agency (NSA)’s program to
wiretap telephone and Internet traffic of U.S.
residents
40Principles of Information Systems, Eighth Edition
Privacy at Work
• Rights of workers who want their privacy versus
interests of companies that demand to know more
about their employees
• Workers can be closely monitored via computer
technology
– Track every keystroke made by a user
– Determine what workers are doing while at the
keyboard
– Estimate how many breaks workers are taking
• Many workers consider monitoring dehumanizing
41Principles of Information Systems, Eighth Edition
E-Mail Privacy
• Federal law permits employers to monitor e-mail
sent and received by employees
• E-mail messages that have been erased from hard
disks can be retrieved and used in lawsuits
• Use of e-mail among public officials might violate
“open meeting” laws
42Principles of Information Systems, Eighth Edition
Privacy and the Internet
• Huge potential for privacy invasion on the Internet
– E-mail messages
– Visiting a Web site
– Buying products over the Internet
• Platform for Privacy Preferences (P3P): screening
technology
• Children’s Online Privacy Protection Act (COPPA),
1998: requires privacy policies and parental
consent
• Potential dangers on social networking Web sites
43Principles of Information Systems, Eighth Edition
Fairness in Information Use
Table 14.4: The Right to Know and the Ability to Decide
44Principles of Information Systems, Eighth Edition
Fairness in Information Use
(continued)
• The Privacy Act of 1974: provides privacy
protection from federal agencies
• Gramm-Leach-Bliley Act: requires financial
institutions to protect customers’ nonpublic data
• USA Patriot Act: allows law enforcement and
intelligence agencies to gather private information
• Other laws regulate fax advertisements, credit-card
bureaus, the IRS, video rental stores,
telemarketers, etc.
45Principles of Information Systems, Eighth Edition
Corporate Privacy Policies
• Should address a customer’s knowledge, control,
notice, and consent over storage and use of
information
• May cover who has access to private data and
when it may be used
• A good database design practice is to assign a
single unique identifier to each customer
46Principles of Information Systems, Eighth Edition
Individual Efforts to Protect Privacy
• Find out what is stored about you in existing
databases
• Be careful when you share information about
yourself
• Be proactive to protect your privacy
• When purchasing anything from a Web site, make
sure that you safeguard your credit card numbers,
passwords, and personal information
47Principles of Information Systems, Eighth Edition
The Work Environment
• Use of computer-based information systems has
changed the workforce
– Jobs that require IS literacy have increased
– Less-skilled positions have decreased
• Computer technology and information systems
have opened up numerous avenues to
professionals and nonprofessionals
• Despite increasing productivity and efficiency,
computers and information systems can raise other
concerns
48Principles of Information Systems, Eighth Edition
Health Concerns
• Occupational stress
• Repetitive stress injury (RSI)
• Carpal tunnel syndrome (CTS)
• Emissions from improperly maintained and used
equipment
• Increase in traffic accidents due to drivers using
cell phones, laptops, or other devices while driving
49Principles of Information Systems, Eighth Edition
Avoiding Health and Environment
Problems
• Work stressors: hazardous activities associated
with unfavorable conditions of a poorly designed
work environment
• Ergonomics: science of designing machines,
products, and systems to maximize safety, comfort,
and efficiency of people who use them
• Employers, individuals, and hardware
manufacturing companies can take steps to reduce
RSI and develop a better work environment
50Principles of Information Systems, Eighth Edition
Avoiding Health and Environment
Problems (continued)
Research has shown that developing certain ergonomically correct habits can
reduce the risk of RSI when using a computer
51Principles of Information Systems, Eighth Edition
Ethical Issues in Information Systems
• Laws do not provide a complete guide to ethical
behavior
• Many IS-related organizations have codes of ethics
for their members
• American Computing Machinery (ACM): oldest
computing society founded in 1947
• ACM’s code of ethics and professional conduct
– Contribute to society and human well-being
– Avoid harm to others
– Be honest and trustworthy
52Principles of Information Systems, Eighth Edition
Ethical Issues in Information Systems
(continued)
• ACM’s code of ethics and professional conduct
(continued)
– Be fair and take action not to discriminate
– Honor property rights including copyrights and
patents
– Give proper credit for intellectual property
– Respect the privacy of others
– Honor confidentiality
53Principles of Information Systems, Eighth Edition
Summary
• Computer waste: inappropriate use of computer
technology and resources
• Computer-related mistakes: errors, failures, and
other computer problems that make computer
output incorrect or not useful; caused mostly by
human error
• Preventing computer-related waste and mistakes
requires establishing, implementing, monitoring,
and reviewing effective policies and procedures
54Principles of Information Systems, Eighth Edition
Summary (continued)
• Criminals need two capabilities to commit most
computer crimes: knowing how to gain access to a
computer system and knowing how to manipulate
the system to produce desired results
• Crimes in which computer is the tool:
cyberterrorism, identity theft, etc.
• Crimes in which computer is the object of crime:
illegal access and use, data alteration and
destruction, information and equipment theft,
software and Internet piracy, computer-related
scams, and international computer crime
55Principles of Information Systems, Eighth Edition
Summary (continued)
• Efforts to curb computer crime are being made by
state and federal agencies, corporations, and
individuals
• With information systems, privacy deals with the
collection and use or misuse of data
• Ergonomics: science of designing machines,
products, and systems to maximize safety, comfort,
and efficiency of people who use them
• Many IS-related organizations have codes of ethics
for their members

More Related Content

What's hot (16)

Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 

Similar to Ch14 091120101906-phpapp01

IS740 Chapter 14
IS740 Chapter 14IS740 Chapter 14
IS740 Chapter 14iDocs
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxJhaiJhai6
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15ayahye
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1Dara Som
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan kabir Solicitor
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 

Similar to Ch14 091120101906-phpapp01 (20)

IS740 Chapter 14
IS740 Chapter 14IS740 Chapter 14
IS740 Chapter 14
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 

More from Cleophas Rwemera

Chapter003 150907175411-lva1-app6891
Chapter003 150907175411-lva1-app6891Chapter003 150907175411-lva1-app6891
Chapter003 150907175411-lva1-app6891Cleophas Rwemera
 
Chapter002 150831173907-lva1-app6892
Chapter002 150831173907-lva1-app6892Chapter002 150831173907-lva1-app6892
Chapter002 150831173907-lva1-app6892Cleophas Rwemera
 
Chapter001 150823230128-lva1-app6892
Chapter001 150823230128-lva1-app6892Chapter001 150823230128-lva1-app6892
Chapter001 150823230128-lva1-app6892Cleophas Rwemera
 
Chapter25 cancer-140105085413-phpapp01
Chapter25 cancer-140105085413-phpapp01Chapter25 cancer-140105085413-phpapp01
Chapter25 cancer-140105085413-phpapp01Cleophas Rwemera
 
Chapter24 immunology-140105101108-phpapp02
Chapter24 immunology-140105101108-phpapp02Chapter24 immunology-140105101108-phpapp02
Chapter24 immunology-140105101108-phpapp02Cleophas Rwemera
 
Chapter23 nervecells-140105100942-phpapp02
Chapter23 nervecells-140105100942-phpapp02Chapter23 nervecells-140105100942-phpapp02
Chapter23 nervecells-140105100942-phpapp02Cleophas Rwemera
 
Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02
Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02
Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02Cleophas Rwemera
 
Chapter21 cellbirthlineageanddeath-140105095914-phpapp02
Chapter21 cellbirthlineageanddeath-140105095914-phpapp02Chapter21 cellbirthlineageanddeath-140105095914-phpapp02
Chapter21 cellbirthlineageanddeath-140105095914-phpapp02Cleophas Rwemera
 
Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01
Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01
Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01Cleophas Rwemera
 
Chapter19 integratingcellsintotissues-140105095535-phpapp02
Chapter19 integratingcellsintotissues-140105095535-phpapp02Chapter19 integratingcellsintotissues-140105095535-phpapp02
Chapter19 integratingcellsintotissues-140105095535-phpapp02Cleophas Rwemera
 
Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...
Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...
Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...Cleophas Rwemera
 
Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02
Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02
Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02Cleophas Rwemera
 
Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...
Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...
Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...Cleophas Rwemera
 
Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...
Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...
Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...Cleophas Rwemera
 
Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01
Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01
Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01Cleophas Rwemera
 
Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01
Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01
Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01Cleophas Rwemera
 
Chapter12 cellularenergetics-140105093734-phpapp01
Chapter12 cellularenergetics-140105093734-phpapp01Chapter12 cellularenergetics-140105093734-phpapp01
Chapter12 cellularenergetics-140105093734-phpapp01Cleophas Rwemera
 
Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02
Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02
Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02Cleophas Rwemera
 
Chapter10 biomembranestructure-140105093829-phpapp02
Chapter10 biomembranestructure-140105093829-phpapp02Chapter10 biomembranestructure-140105093829-phpapp02
Chapter10 biomembranestructure-140105093829-phpapp02Cleophas Rwemera
 
Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01
Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01
Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01Cleophas Rwemera
 

More from Cleophas Rwemera (20)

Chapter003 150907175411-lva1-app6891
Chapter003 150907175411-lva1-app6891Chapter003 150907175411-lva1-app6891
Chapter003 150907175411-lva1-app6891
 
Chapter002 150831173907-lva1-app6892
Chapter002 150831173907-lva1-app6892Chapter002 150831173907-lva1-app6892
Chapter002 150831173907-lva1-app6892
 
Chapter001 150823230128-lva1-app6892
Chapter001 150823230128-lva1-app6892Chapter001 150823230128-lva1-app6892
Chapter001 150823230128-lva1-app6892
 
Chapter25 cancer-140105085413-phpapp01
Chapter25 cancer-140105085413-phpapp01Chapter25 cancer-140105085413-phpapp01
Chapter25 cancer-140105085413-phpapp01
 
Chapter24 immunology-140105101108-phpapp02
Chapter24 immunology-140105101108-phpapp02Chapter24 immunology-140105101108-phpapp02
Chapter24 immunology-140105101108-phpapp02
 
Chapter23 nervecells-140105100942-phpapp02
Chapter23 nervecells-140105100942-phpapp02Chapter23 nervecells-140105100942-phpapp02
Chapter23 nervecells-140105100942-phpapp02
 
Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02
Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02
Chapter22 themolecularcellbiologyofdevelopment-140105100412-phpapp02
 
Chapter21 cellbirthlineageanddeath-140105095914-phpapp02
Chapter21 cellbirthlineageanddeath-140105095914-phpapp02Chapter21 cellbirthlineageanddeath-140105095914-phpapp02
Chapter21 cellbirthlineageanddeath-140105095914-phpapp02
 
Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01
Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01
Chapter20 regulatingtheeukaryoticcellcycle-140105095738-phpapp01
 
Chapter19 integratingcellsintotissues-140105095535-phpapp02
Chapter19 integratingcellsintotissues-140105095535-phpapp02Chapter19 integratingcellsintotissues-140105095535-phpapp02
Chapter19 integratingcellsintotissues-140105095535-phpapp02
 
Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...
Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...
Chapter18 cellorganizationandmovementiimicrotubulesandintermediatefilaments-1...
 
Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02
Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02
Chapter17 cellorganizationandmovementimicrofilaments-140105094810-phpapp02
 
Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...
Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...
Chapter16 cellsignalingiisignalingpathwaysthatcontrolgeneactivity-14010509451...
 
Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...
Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...
Chapter15 cellsignalingisignaltransductionandshort-termcellularresponses-1401...
 
Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01
Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01
Chapter14 vesiculartrafficsecretionandendocytosis-140105094215-phpapp01
 
Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01
Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01
Chapter13 movingproteinsintomembranesandorganelles-140105094005-phpapp01
 
Chapter12 cellularenergetics-140105093734-phpapp01
Chapter12 cellularenergetics-140105093734-phpapp01Chapter12 cellularenergetics-140105093734-phpapp01
Chapter12 cellularenergetics-140105093734-phpapp01
 
Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02
Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02
Chapter11 transmembranetransportofionsandsmallmolecules-140105092904-phpapp02
 
Chapter10 biomembranestructure-140105093829-phpapp02
Chapter10 biomembranestructure-140105093829-phpapp02Chapter10 biomembranestructure-140105093829-phpapp02
Chapter10 biomembranestructure-140105093829-phpapp02
 
Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01
Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01
Chapter9 visualizingfractionatingandculturingcells-140105092245-phpapp01
 

Recently uploaded

Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 

Recently uploaded (20)

Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 

Ch14 091120101906-phpapp01

  • 1. Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers
  • 2. 2Principles of Information Systems, Eighth Edition Principles and Learning Objectives • Policies and procedures must be established to avoid computer waste and mistakes – Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions – Identify policies and procedures useful in eliminating waste and mistakes – Discuss the principles and limits of an individual’s right to privacy
  • 3. 3Principles of Information Systems, Eighth Edition Principles and Learning Objectives (continued) • Computer crime is a serious and rapidly growing area of concern requiring management attention – Explain the types and effects of computer crime – Identify specific measures to prevent computer crime
  • 4. 4Principles of Information Systems, Eighth Edition Principles and Learning Objectives (continued) • Jobs, equipment, and working conditions must be designed to avoid negative health effects – List the important effects of computers on the work environment – Identify specific actions that must be taken to ensure the health and safety of employees – Outline criteria for the ethical use of information systems
  • 5. 5Principles of Information Systems, Eighth Edition Why Learn About Security, Privacy, and Ethical Issues in Information Systems and the Internet? • Many nontechnical issues associated with ISs • Human Resource employees need to: – Prevent computer waste and mistakes – Avoid privacy violations – Comply with laws about: • Collecting customer data • Monitoring employees • Employees, IS users, and Internet users need to: – Avoid crime, fraud, privacy invasion
  • 6. 6Principles of Information Systems, Eighth Edition Computer Waste and Mistakes • Computer waste – Inappropriate use of computer technology and resources • Computer-related mistakes – Errors, failures, and other computer problems that make computer output incorrect or not useful – Caused mostly by human error
  • 7. 7Principles of Information Systems, Eighth Edition Computer Waste • Cause: improper management of information systems and resources – Discarding old software and computer systems when they still have value – Building and maintaining complex systems that are never used to their fullest extent – Using corporate time and technology for personal use – Spam
  • 8. 8Principles of Information Systems, Eighth Edition Computer-Related Mistakes • Common causes – Failure by users to follow proper procedures – Unclear expectations and a lack of feedback – Program development that contains errors – Incorrect data entry by data-entry clerk
  • 9. 9Principles of Information Systems, Eighth Edition Preventing Computer-Related Waste and Mistakes • Effective policies and procedures must be: – Established – Implemented – Monitored – Reviewed
  • 10. 10Principles of Information Systems, Eighth Edition Establishing Policies and Procedures • Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices • Identify most common types of computer-related mistakes • Training programs for individuals and workgroups • Manuals and documents on how computer systems are to be maintained and used • Approval of certain systems and applications before they are implemented and used
  • 11. 11Principles of Information Systems, Eighth Edition Implementing Policies and Procedures • Policies often focus on: – Implementation of source data automation – Use of data editing to ensure data accuracy and completeness – Assignment of clear responsibility for data accuracy within each information system • Training is very important for acceptance and implementation of policies and procedures
  • 12. 12Principles of Information Systems, Eighth Edition Monitoring Policies and Procedures • Monitor routine practices and take corrective action if necessary • Implement internal audits to measure actual results against established goals • Follow requirements in Sarbanes-Oxley Act – Requires companies to document underlying financial data to validate earnings reports
  • 13. 13Principles of Information Systems, Eighth Edition Reviewing Policies and Procedures • Do current policies cover existing practices adequately? – Were any problems or opportunities uncovered during monitoring? • Does the organization plan any new activities in the future? – If so, does it need new policies or procedures on who will handle them and what must be done? • Are contingencies and disasters covered?
  • 14. 14Principles of Information Systems, Eighth Edition Computer Crime • Often defies detection • Amount stolen or diverted can be substantial • Crime is “clean” and nonviolent • Number of IT-related security incidents is increasing dramatically • Computer crime is now global
  • 15. 15Principles of Information Systems, Eighth Edition The Computer as a Tool to Commit Crime • Criminals need two capabilities to commit most computer crimes – Knowing how to gain access to computer system – Knowing how to manipulate the system to produce desired results • Examples – Social engineering – Dumpster diving – Counterfeit and banking fraud using sophisticated desktop publishing programs and high-quality printers
  • 16. 16Principles of Information Systems, Eighth Edition Cyberterrorism • Cyberterrorist: intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer- based attacks against computers, networks, and information stored on them • Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate – Serves as governmental focal point for fighting cyberterrorism
  • 17. 17Principles of Information Systems, Eighth Edition Identity Theft • Imposter obtains personal identification information such as Social Security or driver’s license numbers in order to impersonate someone else – To obtain credit, merchandise, and services in the name of the victim – To have false credentials • Identity Theft and Assumption Deterrence Act of 1998 passed to fight identity theft • 9 million victims in 2005
  • 18. 18Principles of Information Systems, Eighth Edition The Computer as the Object of Crime • Crimes fall into several categories – Illegal access and use – Data alteration and destruction – Information and equipment theft – Software and Internet piracy – Computer-related scams – International computer crime
  • 19. 19Principles of Information Systems, Eighth Edition Illegal Access and Use • Hacker: learns about and uses computer systems • Criminal hacker (also called a cracker): gains unauthorized use or illegal access to computer systems • Script bunny: automates the job of crackers • Insider: employee who comprises corporate systems • Malware: software programs that destroy or damage processing
  • 20. 20Principles of Information Systems, Eighth Edition Illegal Access and Use (continued) • Virus: program file capable of attaching to disks or other files and replicating itself repeatedly • Worm: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network
  • 21. 21Principles of Information Systems, Eighth Edition Illegal Access and Use (continued) • Trojan horse: program that appears to be useful but purposefully does something user does not expect • Logic bomb: type of Trojan horse that executes when specific conditions occur • Variant: modified version of a virus that is produced by virus’s author or another person
  • 22. 22Principles of Information Systems, Eighth Edition Using Antivirus Programs • Antivirus program: program or utility that prevents viruses and recovers from them if they infect a computer • Tips on using antivirus software – Run and update antivirus software often – Scan all diskettes and CDs before using them – Install software only from a sealed package or secure, well-known Web site – Follow careful downloading practices – If you detect a virus, take immediate action
  • 23. 23Principles of Information Systems, Eighth Edition Using Antivirus Programs (continued) Antivirus software should be used and updated often
  • 24. 24Principles of Information Systems, Eighth Edition Information and Equipment Theft • Obtaining identification numbers and passwords to steal information or disrupt systems – Trial and error, password sniffer program • Software theft • Computer systems and equipment theft – Data on equipment is valuable
  • 25. 25Principles of Information Systems, Eighth Edition Software and Internet Software Piracy • Software is protected by copyright laws • Copyright law violations – Making additional copies – Loading the software onto more than one machine • Software piracy: act of illegally duplicating software • Internet-based software piracy – Most rapidly expanding type of software piracy and most difficult form to combat – Examples: pirate Web sites, auction sites with counterfeit software, peer-to-peer networks
  • 26. 26Principles of Information Systems, Eighth Edition Computer-Related Scams • Examples of Internet scams – Get-rich-quick schemes – “Free” vacations with huge hidden costs – Bank fraud – Fake telephone lotteries – Selling worthless penny stocks • Phishing – Gaining access to personal information by redirecting user to fake site
  • 27. 27Principles of Information Systems, Eighth Edition International Computer Crime • Computer crime becomes more complex when it is committed internationally • Large percentage of software piracy takes place across borders • Threat of terrorists, international drug dealers, and other criminals using information systems to launder illegally obtained funds • Computer Associates International’s CleverPath for Global Compliance software
  • 28. 28Principles of Information Systems, Eighth Edition Preventing Computer-Related Crime • Efforts to curb computer crime being made by: – Private users – Companies – Employees – Public officials
  • 29. 29Principles of Information Systems, Eighth Edition Crime Prevention by State and Federal Agencies • Computer Fraud and Abuse Act of 1986 – Punishment based on the victim’s dollar loss • Computer Emergency Response Team (CERT) – Responds to network security breaches – Monitors systems for emerging threats • Newer and tougher computer crime legislation is emerging
  • 30. 30Principles of Information Systems, Eighth Edition Crime Prevention by Corporations • Public key infrastructure (PKI) – Allows users of an unsecured public network such as the Internet to securely and privately exchange data – Use of a public and a private cryptographic key pair, obtained and shared through a trusted authority • Biometrics: measurement of one of a person’s traits, whether physical or behavioral
  • 31. 31Principles of Information Systems, Eighth Edition Table 14.3: Common Methods Used to Commit Computer Crimes Crime Prevention by Corporations (continued)
  • 32. 32Principles of Information Systems, Eighth Edition Crime Prevention by Corporations (continued) Table 14.3: Common Methods Used to Commit Computer Crimes (continued)
  • 33. 33Principles of Information Systems, Eighth Edition Using Intrusion Detection Software • Intrusion detection system (IDS) – Monitors system and network resources – Notifies network security personnel when it senses a possible intrusion, such as: • Repeated failed logon attempts • Attempts to download a program to a server • Access to a system at unusual hours – Can provide false alarms – E-mail or voice message alerts may be missed
  • 34. 34Principles of Information Systems, Eighth Edition Using Managed Security Service Providers (MSSPs) • Managed security service provider (MSSP): organization that monitors, manages, and maintains network security for both hardware and software for its client companies – Sifts through alarms and alerts from all monitoring systems – May provide scanning, blocking, and filtering capabilities – Useful for small and midsized companies
  • 35. 35Principles of Information Systems, Eighth Edition Internet Laws for Libel and Protection of Decency • Filtering software – Screens Internet content to protect children – Prevents children from sending personal information over e-mail or through chat groups • Internet Content Rating Association (ICRA) rating system for Web sites • Children’s Internet Protection Act (CIPA) – Requires filters in federally funded libraries
  • 36. 36Principles of Information Systems, Eighth Edition Internet Laws for Libel and Protection of Decency (continued) • Libel: publishing an intentionally false written statement that is damaging to a person’s reputation • Can online services be sued for libel for content that someone else publishes on their service?
  • 37. 37Principles of Information Systems, Eighth Edition Preventing Crime on the Internet • Develop effective Internet usage and security policies • Use a stand-alone firewall with network monitoring capabilities • Deploy intrusion detection systems, monitor them, and follow up on their alarms • Monitor managers’ and employees’ use of Internet • Use Internet security specialists to perform audits of all Internet and network activities
  • 38. 38Principles of Information Systems, Eighth Edition Privacy Issues • With information systems, privacy deals with the collection and use or misuse of data • More and more information on all of us is being collected, stored, used, and shared among organizations • Who owns this information and knowledge?
  • 39. 39Principles of Information Systems, Eighth Edition Privacy and the Federal Government • Data collectors – U.S. federal government – State and local governments – Profit and nonprofit organizations • U.S. National Security Agency (NSA)’s program to wiretap telephone and Internet traffic of U.S. residents
  • 40. 40Principles of Information Systems, Eighth Edition Privacy at Work • Rights of workers who want their privacy versus interests of companies that demand to know more about their employees • Workers can be closely monitored via computer technology – Track every keystroke made by a user – Determine what workers are doing while at the keyboard – Estimate how many breaks workers are taking • Many workers consider monitoring dehumanizing
  • 41. 41Principles of Information Systems, Eighth Edition E-Mail Privacy • Federal law permits employers to monitor e-mail sent and received by employees • E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits • Use of e-mail among public officials might violate “open meeting” laws
  • 42. 42Principles of Information Systems, Eighth Edition Privacy and the Internet • Huge potential for privacy invasion on the Internet – E-mail messages – Visiting a Web site – Buying products over the Internet • Platform for Privacy Preferences (P3P): screening technology • Children’s Online Privacy Protection Act (COPPA), 1998: requires privacy policies and parental consent • Potential dangers on social networking Web sites
  • 43. 43Principles of Information Systems, Eighth Edition Fairness in Information Use Table 14.4: The Right to Know and the Ability to Decide
  • 44. 44Principles of Information Systems, Eighth Edition Fairness in Information Use (continued) • The Privacy Act of 1974: provides privacy protection from federal agencies • Gramm-Leach-Bliley Act: requires financial institutions to protect customers’ nonpublic data • USA Patriot Act: allows law enforcement and intelligence agencies to gather private information • Other laws regulate fax advertisements, credit-card bureaus, the IRS, video rental stores, telemarketers, etc.
  • 45. 45Principles of Information Systems, Eighth Edition Corporate Privacy Policies • Should address a customer’s knowledge, control, notice, and consent over storage and use of information • May cover who has access to private data and when it may be used • A good database design practice is to assign a single unique identifier to each customer
  • 46. 46Principles of Information Systems, Eighth Edition Individual Efforts to Protect Privacy • Find out what is stored about you in existing databases • Be careful when you share information about yourself • Be proactive to protect your privacy • When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information
  • 47. 47Principles of Information Systems, Eighth Edition The Work Environment • Use of computer-based information systems has changed the workforce – Jobs that require IS literacy have increased – Less-skilled positions have decreased • Computer technology and information systems have opened up numerous avenues to professionals and nonprofessionals • Despite increasing productivity and efficiency, computers and information systems can raise other concerns
  • 48. 48Principles of Information Systems, Eighth Edition Health Concerns • Occupational stress • Repetitive stress injury (RSI) • Carpal tunnel syndrome (CTS) • Emissions from improperly maintained and used equipment • Increase in traffic accidents due to drivers using cell phones, laptops, or other devices while driving
  • 49. 49Principles of Information Systems, Eighth Edition Avoiding Health and Environment Problems • Work stressors: hazardous activities associated with unfavorable conditions of a poorly designed work environment • Ergonomics: science of designing machines, products, and systems to maximize safety, comfort, and efficiency of people who use them • Employers, individuals, and hardware manufacturing companies can take steps to reduce RSI and develop a better work environment
  • 50. 50Principles of Information Systems, Eighth Edition Avoiding Health and Environment Problems (continued) Research has shown that developing certain ergonomically correct habits can reduce the risk of RSI when using a computer
  • 51. 51Principles of Information Systems, Eighth Edition Ethical Issues in Information Systems • Laws do not provide a complete guide to ethical behavior • Many IS-related organizations have codes of ethics for their members • American Computing Machinery (ACM): oldest computing society founded in 1947 • ACM’s code of ethics and professional conduct – Contribute to society and human well-being – Avoid harm to others – Be honest and trustworthy
  • 52. 52Principles of Information Systems, Eighth Edition Ethical Issues in Information Systems (continued) • ACM’s code of ethics and professional conduct (continued) – Be fair and take action not to discriminate – Honor property rights including copyrights and patents – Give proper credit for intellectual property – Respect the privacy of others – Honor confidentiality
  • 53. 53Principles of Information Systems, Eighth Edition Summary • Computer waste: inappropriate use of computer technology and resources • Computer-related mistakes: errors, failures, and other computer problems that make computer output incorrect or not useful; caused mostly by human error • Preventing computer-related waste and mistakes requires establishing, implementing, monitoring, and reviewing effective policies and procedures
  • 54. 54Principles of Information Systems, Eighth Edition Summary (continued) • Criminals need two capabilities to commit most computer crimes: knowing how to gain access to a computer system and knowing how to manipulate the system to produce desired results • Crimes in which computer is the tool: cyberterrorism, identity theft, etc. • Crimes in which computer is the object of crime: illegal access and use, data alteration and destruction, information and equipment theft, software and Internet piracy, computer-related scams, and international computer crime
  • 55. 55Principles of Information Systems, Eighth Edition Summary (continued) • Efforts to curb computer crime are being made by state and federal agencies, corporations, and individuals • With information systems, privacy deals with the collection and use or misuse of data • Ergonomics: science of designing machines, products, and systems to maximize safety, comfort, and efficiency of people who use them • Many IS-related organizations have codes of ethics for their members