Security and ethical issues - Arber Hoxhallari

725 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
725
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
24
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security and ethical issues - Arber Hoxhallari

  1. 1. Security and ethical issues in IT Arber Hoxhallari iiiiiiiiiiii
  2. 2. Overview • Ethical responsibility • Computer crime • Privacy issues • Health issues • Other issues
  3. 3. Ethical responsibility • Business ethics - is concerned with the numerous ethical questions that managers must confront as part of their daily business decision-making. • Technology ethics - This ethical dimension deals specifically with the ethics of the use of technology. • Ethical Guidelines - Acting with integrity, Increasing your professional competence, Setting high standards of personal performance, Accepting responsibility for your work, Advancing the health, privacy, and general welfare of the public.
  4. 4. Computer crime The Association of Information Technology Professionals defines computer crime as including: • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources. • The unauthorized release of information. • The unauthorized copying of software. • Denying an end user access to his or her own hardware, software, data, or network resources. • Using or conspiring to use computer or network resources to illegally obtain information or tangible property.
  5. 5. Privacy issues • Accessing individuals’ private e- mail conversations and computer records • Always “knowing” people’s location • Computer matching • Unauthorized personal files
  6. 6. Health issues The use of IT in the workplace raises a variety of health issues. Heavy use of computers is reportedly causing health problems such as: • Job stress • Damaged arm and neck muscles • Eye strain • Radiation exposure • Death by computer-caused accidents
  7. 7. Other challenges • Employment Challenges. • Computer Monitoring • Challenges in Working Conditions • Challenges to Individuality
  8. 8. Security Management Tools Internetworked Security defense • Encryption • Firewalls • e – mail monitoring • Virus protection Other Security measures • Passwords • Backup files • Biometric Security • Computer failures control • Disaster recovery
  9. 9. Thank You ! Questions ?
  10. 10. Thank You ! Questions ?

×