SlideShare a Scribd company logo
1 of 36
© 2007 by Prentice Hall© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George SchellManagement Information Systems, 10/e Raymond McLeod and George Schell 11
ManagementManagement
Information Systems,Information Systems,
10/e10/e
Raymond McLeod Jr. and George P.Raymond McLeod Jr. and George P.
SchellSchell
© 2007 by Prentice Hall© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George SchellManagement Information Systems, 10/e Raymond McLeod and George Schell 22
Chapter 10Chapter 10
Ethical Implications of InformationEthical Implications of Information
TechnologyTechnology
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod3
Learning ObjectivesLearning Objectives
► Understand how morals, ethics, and laws differ.Understand how morals, ethics, and laws differ.
► Be familiar with computer legislation that has been passedBe familiar with computer legislation that has been passed
in the United States and know how legislation in onein the United States and know how legislation in one
country can influence computer use in others as well.country can influence computer use in others as well.
► Know how a firm creates an ethical culture by firstKnow how a firm creates an ethical culture by first
establishing a corporate credo, then establishing ethicsestablishing a corporate credo, then establishing ethics
programs, and then lastly establishing a corporate ethicsprograms, and then lastly establishing a corporate ethics
code.code.
► Know why society demands that computers be usedKnow why society demands that computers be used
ethically.ethically.
► Know the four basic rights that society has concerning theKnow the four basic rights that society has concerning the
computer.computer.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod4
Learning Objectives (Cont’d)Learning Objectives (Cont’d)
► Know how the firm’s internal auditors can play a positiveKnow how the firm’s internal auditors can play a positive
role in achieving information systems that are designed torole in achieving information systems that are designed to
meet ethical performance criteria.meet ethical performance criteria.
► Be aware of computer industry codes of ethics, and theBe aware of computer industry codes of ethics, and the
wide variety of educational programs that can help firmswide variety of educational programs that can help firms
and employees use computers ethically.and employees use computers ethically.
► Know what the chief information officer (CIO) can do to beKnow what the chief information officer (CIO) can do to be
a power center as the firm follows ethical practices.a power center as the firm follows ethical practices.
► Be acquainted with the most produced piece of legislationBe acquainted with the most produced piece of legislation
to be levied on business in recent history–The Sarbanes-to be levied on business in recent history–The Sarbanes-
Oxley Act.Oxley Act.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod5
Prescriptive vs. DescriptivePrescriptive vs. Descriptive
CoverageCoverage
►Prescriptive coveragePrescriptive coverage is when weis when we
prescribe how the MISprescribe how the MIS ought to beought to be
developed and used in a business firm.developed and used in a business firm.
►Descriptive coverageDescriptive coverage explains howexplains how
thingsthings are beingare being done.done.
 Our mission is to recognize that businesspeopleOur mission is to recognize that businesspeople
in general and information people in particularin general and information people in particular
have definite responsibilities in terms ofhave definite responsibilities in terms of
performing within ethical, moral, and legalperforming within ethical, moral, and legal
constraints.constraints.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod6
Morals, Ethics, and LawsMorals, Ethics, and Laws
►MoralsMorals are traditions of belief about rightare traditions of belief about right
and wrong conduct; a social institution withand wrong conduct; a social institution with
a history and a list of rules.a history and a list of rules.
►EthicsEthics is a collection of guiding beliefs,is a collection of guiding beliefs,
standards, or ideals that pervades anstandards, or ideals that pervades an
individual or a group or community ofindividual or a group or community of
people.people.
►Pirated softwarePirated software –software that is illegally–software that is illegally
copied and then used or sold.copied and then used or sold.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod7
Morals, Ethics, and LawsMorals, Ethics, and Laws
(Cont’d)(Cont’d)
►LawsLaws are formal rules of conduct that aare formal rules of conduct that a
sovereign authority, such as a government,sovereign authority, such as a government,
imposes on its subjects or citizens.imposes on its subjects or citizens.
►In 1966, first case of computer crimeIn 1966, first case of computer crime
 Programmer for a bank altered a program not toProgrammer for a bank altered a program not to
flag his account for being overdrawn.flag his account for being overdrawn.
 Programmer not charged because no lawsProgrammer not charged because no laws
existed.existed.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod8
Computer Legislation in U.S.A.Computer Legislation in U.S.A.
► U.S. computer legislation has focused on rights and restrictions relatedU.S. computer legislation has focused on rights and restrictions related
to data access, information privacy, computer crime, and, mostto data access, information privacy, computer crime, and, most
recently, software patents.recently, software patents.
► The 1966 Freedom of Information ActThe 1966 Freedom of Information Act gave U.S. citizens andgave U.S. citizens and
organizations the right to access data held by the federal government.organizations the right to access data held by the federal government.
► The 1970 Fair Credit Reporting ActThe 1970 Fair Credit Reporting Act dealt with the handling ofdealt with the handling of
credit data.credit data.
► The 1978 Right to Federal Privacy ActThe 1978 Right to Federal Privacy Act limited the federallimited the federal
government’s ability to conduct searches of bank records.government’s ability to conduct searches of bank records.
► The 1988 Computer Matching and Privacy ActThe 1988 Computer Matching and Privacy Act restricted therestricted the
federal government’s right to match computer files for the purpose offederal government’s right to match computer files for the purpose of
determining eligibility for government programs or identifying debtors.determining eligibility for government programs or identifying debtors.
► The 1968 Electronics Communications Privacy ActThe 1968 Electronics Communications Privacy Act coveredcovered
only voice communications; rewritten in 1986 to include digital data,only voice communications; rewritten in 1986 to include digital data,
video communications, and electronic mail.video communications, and electronic mail.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod9
Computer Legislation in U.S.A.Computer Legislation in U.S.A.
(Cont’d)(Cont’d)
►In 1984, U.S. Congress passed federalIn 1984, U.S. Congress passed federal
statutes that applied to computer crime.statutes that applied to computer crime.
►The Small Business ComputerThe Small Business Computer
Security and Education AdvisorySecurity and Education Advisory
CouncilCouncil..
 Advises Congress of matters relating toAdvises Congress of matters relating to
computer crime against small businesses.computer crime against small businesses.
 Evaluate the effectiveness of federal and stateEvaluate the effectiveness of federal and state
crime laws in deterring and prosecutingcrime laws in deterring and prosecuting
computer crimes.computer crimes.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod10
Computer Legislation in U.S.A.Computer Legislation in U.S.A.
(Cont’d)(Cont’d)
► The Counterfeit Access Device and ComputerThe Counterfeit Access Device and Computer
Fraud and Abuse Act made it a federal felony forFraud and Abuse Act made it a federal felony for
someone to gain unauthorized access tosomeone to gain unauthorized access to
information pertaining to national defense orinformation pertaining to national defense or
foreign relations.foreign relations.
 Misdemeanor to gain unauthorized access to aMisdemeanor to gain unauthorized access to a
computer protected by the Right to Financial Privacy Actcomputer protected by the Right to Financial Privacy Act
or the Fair Credit Reporting Act and to misuseor the Fair Credit Reporting Act and to misuse
information in a computer owned by the federalinformation in a computer owned by the federal
government.government.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod11
Software PatentsSoftware Patents
► In July 1998, in theIn July 1998, in the State Street Decision,State Street Decision, thethe
US Court of Appeals affirmed that a businessUS Court of Appeals affirmed that a business
process could be patented.process could be patented.
► In April 2001, the U.S. Congress introduced a billIn April 2001, the U.S. Congress introduced a bill
requiring a determination of the significance of therequiring a determination of the significance of the
patent and whether it is appropriate for use withpatent and whether it is appropriate for use with
computer technology.computer technology.
► In this fashion, the U.S. federal government hasIn this fashion, the U.S. federal government has
gradually established a legal framework forgradually established a legal framework for
computer use.computer use.
► As with ethics, however, the computer laws canAs with ethics, however, the computer laws can
vary considerably from one country to the next.vary considerably from one country to the next.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod12
Ethics Culture ConceptEthics Culture Concept
► Ethics cultureEthics culture states that if a firm is to bestates that if a firm is to be
ethical, then top-management must be ethical inethical, then top-management must be ethical in
everything that it does and says, i.e., lead byeverything that it does and says, i.e., lead by
example.example.
► Corporate credoCorporate credo is a succinct statement ofis a succinct statement of
values that the firm seeks to uphold.values that the firm seeks to uphold.
► Ethics programEthics program is an effort consisting of multipleis an effort consisting of multiple
activities designed to provide employees withactivities designed to provide employees with
direction in carrying out the corporate credo.direction in carrying out the corporate credo.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod13
Figure 10.1 Top-Level Management ImposesFigure 10.1 Top-Level Management Imposes
Ethics Culture in a Top-Down MannerEthics Culture in a Top-Down Manner
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod14
Figure 10.2 Example of a CorporateFigure 10.2 Example of a Corporate
CredoCredo
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod15
Ethics Culture Concept (Cont’d)Ethics Culture Concept (Cont’d)
►Ethics auditEthics audit is when an internal auditoris when an internal auditor
meets with a manager in a several-hourmeets with a manager in a several-hour
session for the purpose of learning how thesession for the purpose of learning how the
manager’s unit is carrying out the corporatemanager’s unit is carrying out the corporate
credo.credo.
►Tailored corporate credoTailored corporate credo are usuallyare usually
adaptations of codes for a particularadaptations of codes for a particular
industry or profession that a firm hasindustry or profession that a firm has
devised for their own corporate credo.devised for their own corporate credo.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod16
Computer EthicsComputer Ethics
► Computer ethicsComputer ethics consists of two main activities:consists of two main activities:
 Analysis of the nature and social impact of computerAnalysis of the nature and social impact of computer
technology; andtechnology; and
 Formulation and justification of policies for the ethicalFormulation and justification of policies for the ethical
use of such technology.use of such technology.
► The CIO must:The CIO must:
1.1. Be alert to the effects that the computer is having onBe alert to the effects that the computer is having on
society; andsociety; and
2.2. Formulate policies to ensure that the technology is usedFormulate policies to ensure that the technology is used
throughout the firm in the right way.throughout the firm in the right way.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod17
Reasons for the Importance ofReasons for the Importance of
Computer EthicsComputer Ethics
► James H. Moor believes there are three main reasons forJames H. Moor believes there are three main reasons for
the high level of interest in computer ethics:the high level of interest in computer ethics:
 Logical Malleability:Logical Malleability:     The computer performs exactlyThe computer performs exactly
as instructed, so if it’s used for an unethical activity theas instructed, so if it’s used for an unethical activity the
computer is not the culprit.computer is not the culprit.
 The Transformation Factor:The Transformation Factor: CComputers canomputers can
drastically change the way we do things.drastically change the way we do things.
 The Invisibility FactorThe Invisibility Factor :: I Internal operations providesnternal operations provides
the opportunity for invisible programming values,the opportunity for invisible programming values,
invisible complex calculations, and invisible abuse.invisible complex calculations, and invisible abuse.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod18
Social Rights and the ComputerSocial Rights and the Computer
► Mason coined the acronymMason coined the acronym PAPAPAPA (privacy,(privacy,
accuracy, property, and accessibility) to representaccuracy, property, and accessibility) to represent
society’s four basic rights in terms of information.society’s four basic rights in terms of information.
► Mason felt that “the right to be left alone” is beingMason felt that “the right to be left alone” is being
threatened by two forces:threatened by two forces:
1.1. the increasing ability of the computer to be used forthe increasing ability of the computer to be used for
surveillance.surveillance.
2.2. the increasing value of information in decisionthe increasing value of information in decision
making.making.
► For example, decision makers place such a highFor example, decision makers place such a high
value on information that they will often be willingvalue on information that they will often be willing
to invade someone’s privacy to get it.to invade someone’s privacy to get it.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod19
More Rights …More Rights …
► Right to Accuracy:Right to Accuracy:   the potential for a level ofthe potential for a level of
accuracy that is unachievable in noncomputeraccuracy that is unachievable in noncomputer
systems;systems; some computer-based systems containsome computer-based systems contain
more errors than would be tolerated in manualmore errors than would be tolerated in manual
systems.systems.
► Right to PropertyRight to Property : c: copyright and patent lawsopyright and patent laws
provide some degree of protection.provide some degree of protection.
► Right to AccessRight to Access : much information has been: much information has been
converted to commercial databases, making it lessconverted to commercial databases, making it less
accessible to the public.accessible to the public.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod20
Information AuditingInformation Auditing
► External auditors from outside the organizationExternal auditors from outside the organization
verify the accuracy of accounting records of firmsverify the accuracy of accounting records of firms
of all sizes.of all sizes.
► Internal auditors perform the same analyses asInternal auditors perform the same analyses as
external auditors but have a broader range ofexternal auditors but have a broader range of
responsibilities.responsibilities.
► Audit committee defines the responsibilities of theAudit committee defines the responsibilities of the
internal auditing department and receives many ofinternal auditing department and receives many of
the audit reports.the audit reports.
► Director of internal auditing manages the internalDirector of internal auditing manages the internal
auditing department and reports to the CEO or theauditing department and reports to the CEO or the
CFO.CFO.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod21
Figure 10.3 The Position of InternalFigure 10.3 The Position of Internal
Auditing in the OrganizationAuditing in the Organization
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod22
Types of Auditing ActivityTypes of Auditing Activity
► Internal auditors offer more objectivity since their onlyInternal auditors offer more objectivity since their only
allegiance is to the board, the CEO, and the CFO.allegiance is to the board, the CEO, and the CFO.
► Four basic types of internal auditing activity:Four basic types of internal auditing activity:
 AA financial audit:financial audit: verifies the accuracy of the firm’s records andverifies the accuracy of the firm’s records and
is the type of activity performed by external auditors.is the type of activity performed by external auditors.
 AnAn operational audit:operational audit: aimed to validate the effectiveness ofaimed to validate the effectiveness of
procedures including adequacy of controls, efficiency, andprocedures including adequacy of controls, efficiency, and
compliance with company policy. Systems analyst does in SDLCcompliance with company policy. Systems analyst does in SDLC
analysis stage.analysis stage.
 AA concurrent audit:concurrent audit: is the same as an operational audit exceptis the same as an operational audit except
that the concurrent audit is ongoing.that the concurrent audit is ongoing.
 Internal Control Systems Design:Internal Control Systems Design:  the cost of correcting a the cost of correcting a
system flaw increases dramatically as the system life cyclesystem flaw increases dramatically as the system life cycle
progresses (Figure 10.4).progresses (Figure 10.4).
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod23
Figure 10.4 The Escalating Cost of CorrectingFigure 10.4 The Escalating Cost of Correcting
Design Errors as the System DevelopmentDesign Errors as the System Development
Life Cycle ProgressesLife Cycle Progresses
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod24
Internal Audit SubsystemInternal Audit Subsystem
►In the financial information system, theIn the financial information system, the
internal audit subsystem is one of the inputinternal audit subsystem is one of the input
subsystems.subsystems.
►Including internal auditors on systemsIncluding internal auditors on systems
development teams is:development teams is:
 A good step toward having well-controlledA good step toward having well-controlled
systems, and the systems are:systems, and the systems are:
 A good step toward giving management theA good step toward giving management the
information it needs to achieve and maintaininformation it needs to achieve and maintain
ethical business operations.ethical business operations.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod25
Achieving Ethics in InformationAchieving Ethics in Information
TechnologyTechnology
►Ethic codes and ethics educationalEthic codes and ethics educational
programs can provide the foundation for theprograms can provide the foundation for the
culture.culture.
►Educational programs can assist inEducational programs can assist in
developing a corporate credo and in puttingdeveloping a corporate credo and in putting
ethics programs in place.ethics programs in place.
►Ethic codes can be used as is or can beEthic codes can be used as is or can be
tailored to the firm.tailored to the firm.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod26
Codes of EthicsCodes of Ethics
► ACM Code of Ethics and Professional Conduct.ACM Code of Ethics and Professional Conduct.
 Adopted in 1992.Adopted in 1992.
 Consists of 24 “imperatives”, i.e., statements of personalConsists of 24 “imperatives”, i.e., statements of personal
responsibility.responsibility.
► Code is subdivided into four parts.Code is subdivided into four parts.
 General moral imperatives.General moral imperatives.
 More specific professional responsibilities.More specific professional responsibilities.
 Organizational leadership imperatives.Organizational leadership imperatives.
 Compliance with the code.Compliance with the code.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod27
Figure 10.5 Outline of the ACM CodeFigure 10.5 Outline of the ACM Code
of Ethics and Professional Conductof Ethics and Professional Conduct
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod28
Table 10.1 Topics Covered by the ACM CodeTable 10.1 Topics Covered by the ACM Code
of Ethics and Professional Conductof Ethics and Professional Conduct
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod29
Table 10.2 Topics Covered by the ACMTable 10.2 Topics Covered by the ACM
Software Engineering Code of Ethics andSoftware Engineering Code of Ethics and
Professional PracticeProfessional Practice
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod30
ACM Software Engineering Code ofACM Software Engineering Code of
Ethics and Professional PracticeEthics and Professional Practice
► This code consists of expectations in eight majorThis code consists of expectations in eight major
areas:areas:
 PublicPublic
 Client and employerClient and employer
 ProductProduct
 JudgmentJudgment
 ManagementManagement
 ProfessionProfession
 ColleaguesColleagues
 SelfSelf
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod31
Computer Ethics EducationComputer Ethics Education
► College coursesCollege courses–ACM developed a model–ACM developed a model
computing curriculum of courses that should becomputing curriculum of courses that should be
offered.offered.
► Professional programsProfessional programs–AMA, Amer. Mgt. Assoc.,–AMA, Amer. Mgt. Assoc.,
offers special programs addressing ethics andoffers special programs addressing ethics and
integrity.integrity.
► Private educational programsPrivate educational programs–LRN, the Legal–LRN, the Legal
Knowledge Co., offers Web-based courseKnowledge Co., offers Web-based course
modules that address a wide range of ethical andmodules that address a wide range of ethical and
legal issues.legal issues.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod32
Ethics and the CIOEthics and the CIO
► As of August 11, 2002, CEOs and CFOs are required toAs of August 11, 2002, CEOs and CFOs are required to
sign off on the accuracy of their financial statements.sign off on the accuracy of their financial statements.
► This requirement puts responsibility on the executives butThis requirement puts responsibility on the executives but
also on the corporate information services unit and thealso on the corporate information services unit and the
information services units of the business areas to provideinformation services units of the business areas to provide
the executives with information that is accurate, complete,the executives with information that is accurate, complete,
and timely.and timely.
► Information Systems are only one unit in the organizationalInformation Systems are only one unit in the organizational
structure but it is in a key position to have the moststructure but it is in a key position to have the most
influence on satisfying the demands of both governmentinfluence on satisfying the demands of both government
and society for accurate financial reporting.and society for accurate financial reporting.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod33
Ethics and the CIO (Cont’d)Ethics and the CIO (Cont’d)
The CIO can bring financial reporting up to expectations byThe CIO can bring financial reporting up to expectations by
following a program that includes the following:following a program that includes the following:
 Achieving a higher level of understanding of accountingAchieving a higher level of understanding of accounting
principles.principles.
 Reviewing the information systems that accomplishReviewing the information systems that accomplish
financial reporting and taking remedial action.financial reporting and taking remedial action.
 Educating the firm's executives on financial systems.Educating the firm's executives on financial systems.
 Integrating alarms into information systems that alertIntegrating alarms into information systems that alert
executives to activities that require attention.executives to activities that require attention.
 Actively participating in the release of financialActively participating in the release of financial
information to environmental elements.information to environmental elements.
 Keeping tight control on money spent for informationKeeping tight control on money spent for information
resources.resources.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod34
Life under Sarbanes-OxleyLife under Sarbanes-Oxley
► The objective of Sarbanes-Oxley, known as SOX, is toThe objective of Sarbanes-Oxley, known as SOX, is to
protect investors by making the firm’s executivesprotect investors by making the firm’s executives
personally accountable for the financial informationpersonally accountable for the financial information
that is provided to the firm’s environment, primarilythat is provided to the firm’s environment, primarily
stockholders and the financial community.stockholders and the financial community.
► SOX consists of 10 major provisions, 2 directly affectSOX consists of 10 major provisions, 2 directly affect
the firm’s information services unit.the firm’s information services unit.
 CEOs and CFOs must certify the financial reports.CEOs and CFOs must certify the financial reports.
 U.S. companies are required to have internal audit units.U.S. companies are required to have internal audit units.
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod35
SOX Provisions Affecting InformationSOX Provisions Affecting Information
Services, Resources, and ITServices, Resources, and IT
► SOX 404 – CIO must ensure that SOX imposedSOX 404 – CIO must ensure that SOX imposed
control requirements are built into systems duringcontrol requirements are built into systems during
systems development and activities shouldsystems development and activities should
include:include:
 Identifying systems that play a role in financial reportingIdentifying systems that play a role in financial reporting
 Identifying the risks faced by these systemsIdentifying the risks faced by these systems
 Developing controls that address the risksDeveloping controls that address the risks
 Documenting and testing the controlsDocumenting and testing the controls
 Monitoring the effectiveness of the controls over timeMonitoring the effectiveness of the controls over time
 Updating the controls as neededUpdating the controls as needed
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod36
SOX Provisions … (Cont’d)SOX Provisions … (Cont’d)
► SOX 409–firm must be able to report changes in itsSOX 409–firm must be able to report changes in its
financial condition infinancial condition in real timereal time–as the changes occur.–as the changes occur.
 Should feature online inputs.Should feature online inputs.
 Output subsystems should be capable of immediatelyOutput subsystems should be capable of immediately
reporting changes in the firm’s financial condition.reporting changes in the firm’s financial condition.
► SOX and COBITSOX and COBIT
 COBIT is an industry organization that provides securityCOBIT is an industry organization that provides security
standards for the firm’s information resources.standards for the firm’s information resources.
 COBIT can assist the firm in addressing its SOXCOBIT can assist the firm in addressing its SOX
responsibilities because COBIT standards align very wellresponsibilities because COBIT standards align very well
with the SOX expectations.with the SOX expectations.
 COBIT has 47,000 members worldwide, its financialCOBIT has 47,000 members worldwide, its financial
reporting standards can have a global effect.reporting standards can have a global effect.

More Related Content

What's hot

Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technologymegat zainurul anuar
 
Business information systems in your career
Business information systems in your careerBusiness information systems in your career
Business information systems in your careerProf. Othman Alsalloum
 
Definition of Information System
Definition of Information SystemDefinition of Information System
Definition of Information SystemLansey Wegner
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01Norazila Mat
 
Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...butest
 
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentManagement Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentAG RD
 
Management Information System Types
Management Information System TypesManagement Information System Types
Management Information System TypesJunaid Ashraf
 
james o'brien chapter 7 electronic business system
james o'brien chapter 7 electronic business system james o'brien chapter 7 electronic business system
james o'brien chapter 7 electronic business system mousumsts
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systemsProf. Othman Alsalloum
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2Dara Som
 
Lo1=p1, p2, m1
Lo1=p1, p2, m1Lo1=p1, p2, m1
Lo1=p1, p2, m1sparkeyrob
 
Chap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technologyChap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technologyMemoona Qadeer
 

What's hot (20)

Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Business information systems in your career
Business information systems in your careerBusiness information systems in your career
Business information systems in your career
 
Information what is it
Information what is itInformation what is it
Information what is it
 
MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
MIS Chap # 5...
 
Definition of Information System
Definition of Information SystemDefinition of Information System
Definition of Information System
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
 
Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...
 
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentManagement Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA Student
 
Information systems in the enterprise
Information systems in the  enterpriseInformation systems in the  enterprise
Information systems in the enterprise
 
Management Information System Types
Management Information System TypesManagement Information System Types
Management Information System Types
 
Information system
Information systemInformation system
Information system
 
james o'brien chapter 7 electronic business system
james o'brien chapter 7 electronic business system james o'brien chapter 7 electronic business system
james o'brien chapter 7 electronic business system
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
Gr 2: Current Focus on Information Use
Gr 2: Current Focus on Information UseGr 2: Current Focus on Information Use
Gr 2: Current Focus on Information Use
 
Laudon mis14 ch01
Laudon mis14 ch01Laudon mis14 ch01
Laudon mis14 ch01
 
Lo1=p1, p2, m1
Lo1=p1, p2, m1Lo1=p1, p2, m1
Lo1=p1, p2, m1
 
Management Information System Chapter 03
Management Information System Chapter 03Management Information System Chapter 03
Management Information System Chapter 03
 
Chap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technologyChap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technology
 
Mis unit i
Mis unit iMis unit i
Mis unit i
 

Viewers also liked (12)

Mis jaiswal-chapter-10
Mis jaiswal-chapter-10Mis jaiswal-chapter-10
Mis jaiswal-chapter-10
 
Mis 6
Mis 6Mis 6
Mis 6
 
MIS Chap # 7.....
MIS Chap # 7.....MIS Chap # 7.....
MIS Chap # 7.....
 
Chapter 6-information system
Chapter 6-information systemChapter 6-information system
Chapter 6-information system
 
Chapter 6 MIS
Chapter 6 MISChapter 6 MIS
Chapter 6 MIS
 
Chapter 10 MIS
Chapter 10 MISChapter 10 MIS
Chapter 10 MIS
 
Management Information System 6
Management Information System 6Management Information System 6
Management Information System 6
 
Chapter 9 MIS
Chapter 9 MISChapter 9 MIS
Chapter 9 MIS
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Raymond
RaymondRaymond
Raymond
 
raymonds ppt
raymonds pptraymonds ppt
raymonds ppt
 
Raymond
RaymondRaymond
Raymond
 

Similar to MIS chap # 10..

SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10Welly Tjoe
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxJhaiJhai6
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2MLG College of Learning, Inc
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)Craig Mullins
 

Similar to MIS chap # 10.. (20)

SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
Topik 5
Topik 5Topik 5
Topik 5
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Review questions
Review questionsReview questions
Review questions
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptx
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Lesson 2-Identify Theft
Lesson 2-Identify TheftLesson 2-Identify Theft
Lesson 2-Identify Theft
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 

More from Syed Muhammad Zeejah Hashmi

Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)Syed Muhammad Zeejah Hashmi
 
Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]Syed Muhammad Zeejah Hashmi
 
Importance of learning business communication skills
Importance of learning business communication skillsImportance of learning business communication skills
Importance of learning business communication skillsSyed Muhammad Zeejah Hashmi
 
[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntation[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntationSyed Muhammad Zeejah Hashmi
 

More from Syed Muhammad Zeejah Hashmi (20)

Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
 
Digital divide
Digital divideDigital divide
Digital divide
 
Human development index (HDI)
Human development index (HDI)Human development index (HDI)
Human development index (HDI)
 
Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]
 
Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)
 
Khalil Gibran by Zee Production
Khalil Gibran by Zee ProductionKhalil Gibran by Zee Production
Khalil Gibran by Zee Production
 
Can ethics be taught..!!
Can ethics be taught..!!Can ethics be taught..!!
Can ethics be taught..!!
 
Can ethics be taught.?
Can ethics be taught.?Can ethics be taught.?
Can ethics be taught.?
 
Co-factor matrix..
Co-factor matrix..Co-factor matrix..
Co-factor matrix..
 
Importance of learning business communication skills
Importance of learning business communication skillsImportance of learning business communication skills
Importance of learning business communication skills
 
Accounting Project
Accounting ProjectAccounting Project
Accounting Project
 
Poverty
PovertyPoverty
Poverty
 
MIS chap # 11.....
MIS chap # 11.....MIS chap # 11.....
MIS chap # 11.....
 
MIS chap # 8.....
MIS chap # 8.....MIS chap # 8.....
MIS chap # 8.....
 
MIS chap # 6....
MIS chap # 6....MIS chap # 6....
MIS chap # 6....
 
[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntation[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntation
 
Emosfet slides....
Emosfet slides....Emosfet slides....
Emosfet slides....
 
Students report card for C++ project..
Students report card for C++ project..Students report card for C++ project..
Students report card for C++ project..
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

MIS chap # 10..

  • 1. © 2007 by Prentice Hall© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George SchellManagement Information Systems, 10/e Raymond McLeod and George Schell 11 ManagementManagement Information Systems,Information Systems, 10/e10/e Raymond McLeod Jr. and George P.Raymond McLeod Jr. and George P. SchellSchell
  • 2. © 2007 by Prentice Hall© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George SchellManagement Information Systems, 10/e Raymond McLeod and George Schell 22 Chapter 10Chapter 10 Ethical Implications of InformationEthical Implications of Information TechnologyTechnology
  • 3. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod3 Learning ObjectivesLearning Objectives ► Understand how morals, ethics, and laws differ.Understand how morals, ethics, and laws differ. ► Be familiar with computer legislation that has been passedBe familiar with computer legislation that has been passed in the United States and know how legislation in onein the United States and know how legislation in one country can influence computer use in others as well.country can influence computer use in others as well. ► Know how a firm creates an ethical culture by firstKnow how a firm creates an ethical culture by first establishing a corporate credo, then establishing ethicsestablishing a corporate credo, then establishing ethics programs, and then lastly establishing a corporate ethicsprograms, and then lastly establishing a corporate ethics code.code. ► Know why society demands that computers be usedKnow why society demands that computers be used ethically.ethically. ► Know the four basic rights that society has concerning theKnow the four basic rights that society has concerning the computer.computer.
  • 4. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod4 Learning Objectives (Cont’d)Learning Objectives (Cont’d) ► Know how the firm’s internal auditors can play a positiveKnow how the firm’s internal auditors can play a positive role in achieving information systems that are designed torole in achieving information systems that are designed to meet ethical performance criteria.meet ethical performance criteria. ► Be aware of computer industry codes of ethics, and theBe aware of computer industry codes of ethics, and the wide variety of educational programs that can help firmswide variety of educational programs that can help firms and employees use computers ethically.and employees use computers ethically. ► Know what the chief information officer (CIO) can do to beKnow what the chief information officer (CIO) can do to be a power center as the firm follows ethical practices.a power center as the firm follows ethical practices. ► Be acquainted with the most produced piece of legislationBe acquainted with the most produced piece of legislation to be levied on business in recent history–The Sarbanes-to be levied on business in recent history–The Sarbanes- Oxley Act.Oxley Act.
  • 5. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod5 Prescriptive vs. DescriptivePrescriptive vs. Descriptive CoverageCoverage ►Prescriptive coveragePrescriptive coverage is when weis when we prescribe how the MISprescribe how the MIS ought to beought to be developed and used in a business firm.developed and used in a business firm. ►Descriptive coverageDescriptive coverage explains howexplains how thingsthings are beingare being done.done.  Our mission is to recognize that businesspeopleOur mission is to recognize that businesspeople in general and information people in particularin general and information people in particular have definite responsibilities in terms ofhave definite responsibilities in terms of performing within ethical, moral, and legalperforming within ethical, moral, and legal constraints.constraints.
  • 6. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod6 Morals, Ethics, and LawsMorals, Ethics, and Laws ►MoralsMorals are traditions of belief about rightare traditions of belief about right and wrong conduct; a social institution withand wrong conduct; a social institution with a history and a list of rules.a history and a list of rules. ►EthicsEthics is a collection of guiding beliefs,is a collection of guiding beliefs, standards, or ideals that pervades anstandards, or ideals that pervades an individual or a group or community ofindividual or a group or community of people.people. ►Pirated softwarePirated software –software that is illegally–software that is illegally copied and then used or sold.copied and then used or sold.
  • 7. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod7 Morals, Ethics, and LawsMorals, Ethics, and Laws (Cont’d)(Cont’d) ►LawsLaws are formal rules of conduct that aare formal rules of conduct that a sovereign authority, such as a government,sovereign authority, such as a government, imposes on its subjects or citizens.imposes on its subjects or citizens. ►In 1966, first case of computer crimeIn 1966, first case of computer crime  Programmer for a bank altered a program not toProgrammer for a bank altered a program not to flag his account for being overdrawn.flag his account for being overdrawn.  Programmer not charged because no lawsProgrammer not charged because no laws existed.existed.
  • 8. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod8 Computer Legislation in U.S.A.Computer Legislation in U.S.A. ► U.S. computer legislation has focused on rights and restrictions relatedU.S. computer legislation has focused on rights and restrictions related to data access, information privacy, computer crime, and, mostto data access, information privacy, computer crime, and, most recently, software patents.recently, software patents. ► The 1966 Freedom of Information ActThe 1966 Freedom of Information Act gave U.S. citizens andgave U.S. citizens and organizations the right to access data held by the federal government.organizations the right to access data held by the federal government. ► The 1970 Fair Credit Reporting ActThe 1970 Fair Credit Reporting Act dealt with the handling ofdealt with the handling of credit data.credit data. ► The 1978 Right to Federal Privacy ActThe 1978 Right to Federal Privacy Act limited the federallimited the federal government’s ability to conduct searches of bank records.government’s ability to conduct searches of bank records. ► The 1988 Computer Matching and Privacy ActThe 1988 Computer Matching and Privacy Act restricted therestricted the federal government’s right to match computer files for the purpose offederal government’s right to match computer files for the purpose of determining eligibility for government programs or identifying debtors.determining eligibility for government programs or identifying debtors. ► The 1968 Electronics Communications Privacy ActThe 1968 Electronics Communications Privacy Act coveredcovered only voice communications; rewritten in 1986 to include digital data,only voice communications; rewritten in 1986 to include digital data, video communications, and electronic mail.video communications, and electronic mail.
  • 9. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod9 Computer Legislation in U.S.A.Computer Legislation in U.S.A. (Cont’d)(Cont’d) ►In 1984, U.S. Congress passed federalIn 1984, U.S. Congress passed federal statutes that applied to computer crime.statutes that applied to computer crime. ►The Small Business ComputerThe Small Business Computer Security and Education AdvisorySecurity and Education Advisory CouncilCouncil..  Advises Congress of matters relating toAdvises Congress of matters relating to computer crime against small businesses.computer crime against small businesses.  Evaluate the effectiveness of federal and stateEvaluate the effectiveness of federal and state crime laws in deterring and prosecutingcrime laws in deterring and prosecuting computer crimes.computer crimes.
  • 10. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod10 Computer Legislation in U.S.A.Computer Legislation in U.S.A. (Cont’d)(Cont’d) ► The Counterfeit Access Device and ComputerThe Counterfeit Access Device and Computer Fraud and Abuse Act made it a federal felony forFraud and Abuse Act made it a federal felony for someone to gain unauthorized access tosomeone to gain unauthorized access to information pertaining to national defense orinformation pertaining to national defense or foreign relations.foreign relations.  Misdemeanor to gain unauthorized access to aMisdemeanor to gain unauthorized access to a computer protected by the Right to Financial Privacy Actcomputer protected by the Right to Financial Privacy Act or the Fair Credit Reporting Act and to misuseor the Fair Credit Reporting Act and to misuse information in a computer owned by the federalinformation in a computer owned by the federal government.government.
  • 11. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod11 Software PatentsSoftware Patents ► In July 1998, in theIn July 1998, in the State Street Decision,State Street Decision, thethe US Court of Appeals affirmed that a businessUS Court of Appeals affirmed that a business process could be patented.process could be patented. ► In April 2001, the U.S. Congress introduced a billIn April 2001, the U.S. Congress introduced a bill requiring a determination of the significance of therequiring a determination of the significance of the patent and whether it is appropriate for use withpatent and whether it is appropriate for use with computer technology.computer technology. ► In this fashion, the U.S. federal government hasIn this fashion, the U.S. federal government has gradually established a legal framework forgradually established a legal framework for computer use.computer use. ► As with ethics, however, the computer laws canAs with ethics, however, the computer laws can vary considerably from one country to the next.vary considerably from one country to the next.
  • 12. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod12 Ethics Culture ConceptEthics Culture Concept ► Ethics cultureEthics culture states that if a firm is to bestates that if a firm is to be ethical, then top-management must be ethical inethical, then top-management must be ethical in everything that it does and says, i.e., lead byeverything that it does and says, i.e., lead by example.example. ► Corporate credoCorporate credo is a succinct statement ofis a succinct statement of values that the firm seeks to uphold.values that the firm seeks to uphold. ► Ethics programEthics program is an effort consisting of multipleis an effort consisting of multiple activities designed to provide employees withactivities designed to provide employees with direction in carrying out the corporate credo.direction in carrying out the corporate credo.
  • 13. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod13 Figure 10.1 Top-Level Management ImposesFigure 10.1 Top-Level Management Imposes Ethics Culture in a Top-Down MannerEthics Culture in a Top-Down Manner
  • 14. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod14 Figure 10.2 Example of a CorporateFigure 10.2 Example of a Corporate CredoCredo
  • 15. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod15 Ethics Culture Concept (Cont’d)Ethics Culture Concept (Cont’d) ►Ethics auditEthics audit is when an internal auditoris when an internal auditor meets with a manager in a several-hourmeets with a manager in a several-hour session for the purpose of learning how thesession for the purpose of learning how the manager’s unit is carrying out the corporatemanager’s unit is carrying out the corporate credo.credo. ►Tailored corporate credoTailored corporate credo are usuallyare usually adaptations of codes for a particularadaptations of codes for a particular industry or profession that a firm hasindustry or profession that a firm has devised for their own corporate credo.devised for their own corporate credo.
  • 16. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod16 Computer EthicsComputer Ethics ► Computer ethicsComputer ethics consists of two main activities:consists of two main activities:  Analysis of the nature and social impact of computerAnalysis of the nature and social impact of computer technology; andtechnology; and  Formulation and justification of policies for the ethicalFormulation and justification of policies for the ethical use of such technology.use of such technology. ► The CIO must:The CIO must: 1.1. Be alert to the effects that the computer is having onBe alert to the effects that the computer is having on society; andsociety; and 2.2. Formulate policies to ensure that the technology is usedFormulate policies to ensure that the technology is used throughout the firm in the right way.throughout the firm in the right way.
  • 17. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod17 Reasons for the Importance ofReasons for the Importance of Computer EthicsComputer Ethics ► James H. Moor believes there are three main reasons forJames H. Moor believes there are three main reasons for the high level of interest in computer ethics:the high level of interest in computer ethics:  Logical Malleability:Logical Malleability:     The computer performs exactlyThe computer performs exactly as instructed, so if it’s used for an unethical activity theas instructed, so if it’s used for an unethical activity the computer is not the culprit.computer is not the culprit.  The Transformation Factor:The Transformation Factor: CComputers canomputers can drastically change the way we do things.drastically change the way we do things.  The Invisibility FactorThe Invisibility Factor :: I Internal operations providesnternal operations provides the opportunity for invisible programming values,the opportunity for invisible programming values, invisible complex calculations, and invisible abuse.invisible complex calculations, and invisible abuse.
  • 18. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod18 Social Rights and the ComputerSocial Rights and the Computer ► Mason coined the acronymMason coined the acronym PAPAPAPA (privacy,(privacy, accuracy, property, and accessibility) to representaccuracy, property, and accessibility) to represent society’s four basic rights in terms of information.society’s four basic rights in terms of information. ► Mason felt that “the right to be left alone” is beingMason felt that “the right to be left alone” is being threatened by two forces:threatened by two forces: 1.1. the increasing ability of the computer to be used forthe increasing ability of the computer to be used for surveillance.surveillance. 2.2. the increasing value of information in decisionthe increasing value of information in decision making.making. ► For example, decision makers place such a highFor example, decision makers place such a high value on information that they will often be willingvalue on information that they will often be willing to invade someone’s privacy to get it.to invade someone’s privacy to get it.
  • 19. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod19 More Rights …More Rights … ► Right to Accuracy:Right to Accuracy:   the potential for a level ofthe potential for a level of accuracy that is unachievable in noncomputeraccuracy that is unachievable in noncomputer systems;systems; some computer-based systems containsome computer-based systems contain more errors than would be tolerated in manualmore errors than would be tolerated in manual systems.systems. ► Right to PropertyRight to Property : c: copyright and patent lawsopyright and patent laws provide some degree of protection.provide some degree of protection. ► Right to AccessRight to Access : much information has been: much information has been converted to commercial databases, making it lessconverted to commercial databases, making it less accessible to the public.accessible to the public.
  • 20. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod20 Information AuditingInformation Auditing ► External auditors from outside the organizationExternal auditors from outside the organization verify the accuracy of accounting records of firmsverify the accuracy of accounting records of firms of all sizes.of all sizes. ► Internal auditors perform the same analyses asInternal auditors perform the same analyses as external auditors but have a broader range ofexternal auditors but have a broader range of responsibilities.responsibilities. ► Audit committee defines the responsibilities of theAudit committee defines the responsibilities of the internal auditing department and receives many ofinternal auditing department and receives many of the audit reports.the audit reports. ► Director of internal auditing manages the internalDirector of internal auditing manages the internal auditing department and reports to the CEO or theauditing department and reports to the CEO or the CFO.CFO.
  • 21. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod21 Figure 10.3 The Position of InternalFigure 10.3 The Position of Internal Auditing in the OrganizationAuditing in the Organization
  • 22. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod22 Types of Auditing ActivityTypes of Auditing Activity ► Internal auditors offer more objectivity since their onlyInternal auditors offer more objectivity since their only allegiance is to the board, the CEO, and the CFO.allegiance is to the board, the CEO, and the CFO. ► Four basic types of internal auditing activity:Four basic types of internal auditing activity:  AA financial audit:financial audit: verifies the accuracy of the firm’s records andverifies the accuracy of the firm’s records and is the type of activity performed by external auditors.is the type of activity performed by external auditors.  AnAn operational audit:operational audit: aimed to validate the effectiveness ofaimed to validate the effectiveness of procedures including adequacy of controls, efficiency, andprocedures including adequacy of controls, efficiency, and compliance with company policy. Systems analyst does in SDLCcompliance with company policy. Systems analyst does in SDLC analysis stage.analysis stage.  AA concurrent audit:concurrent audit: is the same as an operational audit exceptis the same as an operational audit except that the concurrent audit is ongoing.that the concurrent audit is ongoing.  Internal Control Systems Design:Internal Control Systems Design:  the cost of correcting a the cost of correcting a system flaw increases dramatically as the system life cyclesystem flaw increases dramatically as the system life cycle progresses (Figure 10.4).progresses (Figure 10.4).
  • 23. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod23 Figure 10.4 The Escalating Cost of CorrectingFigure 10.4 The Escalating Cost of Correcting Design Errors as the System DevelopmentDesign Errors as the System Development Life Cycle ProgressesLife Cycle Progresses
  • 24. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod24 Internal Audit SubsystemInternal Audit Subsystem ►In the financial information system, theIn the financial information system, the internal audit subsystem is one of the inputinternal audit subsystem is one of the input subsystems.subsystems. ►Including internal auditors on systemsIncluding internal auditors on systems development teams is:development teams is:  A good step toward having well-controlledA good step toward having well-controlled systems, and the systems are:systems, and the systems are:  A good step toward giving management theA good step toward giving management the information it needs to achieve and maintaininformation it needs to achieve and maintain ethical business operations.ethical business operations.
  • 25. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod25 Achieving Ethics in InformationAchieving Ethics in Information TechnologyTechnology ►Ethic codes and ethics educationalEthic codes and ethics educational programs can provide the foundation for theprograms can provide the foundation for the culture.culture. ►Educational programs can assist inEducational programs can assist in developing a corporate credo and in puttingdeveloping a corporate credo and in putting ethics programs in place.ethics programs in place. ►Ethic codes can be used as is or can beEthic codes can be used as is or can be tailored to the firm.tailored to the firm.
  • 26. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod26 Codes of EthicsCodes of Ethics ► ACM Code of Ethics and Professional Conduct.ACM Code of Ethics and Professional Conduct.  Adopted in 1992.Adopted in 1992.  Consists of 24 “imperatives”, i.e., statements of personalConsists of 24 “imperatives”, i.e., statements of personal responsibility.responsibility. ► Code is subdivided into four parts.Code is subdivided into four parts.  General moral imperatives.General moral imperatives.  More specific professional responsibilities.More specific professional responsibilities.  Organizational leadership imperatives.Organizational leadership imperatives.  Compliance with the code.Compliance with the code.
  • 27. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod27 Figure 10.5 Outline of the ACM CodeFigure 10.5 Outline of the ACM Code of Ethics and Professional Conductof Ethics and Professional Conduct
  • 28. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod28 Table 10.1 Topics Covered by the ACM CodeTable 10.1 Topics Covered by the ACM Code of Ethics and Professional Conductof Ethics and Professional Conduct
  • 29. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod29 Table 10.2 Topics Covered by the ACMTable 10.2 Topics Covered by the ACM Software Engineering Code of Ethics andSoftware Engineering Code of Ethics and Professional PracticeProfessional Practice
  • 30. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod30 ACM Software Engineering Code ofACM Software Engineering Code of Ethics and Professional PracticeEthics and Professional Practice ► This code consists of expectations in eight majorThis code consists of expectations in eight major areas:areas:  PublicPublic  Client and employerClient and employer  ProductProduct  JudgmentJudgment  ManagementManagement  ProfessionProfession  ColleaguesColleagues  SelfSelf
  • 31. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod31 Computer Ethics EducationComputer Ethics Education ► College coursesCollege courses–ACM developed a model–ACM developed a model computing curriculum of courses that should becomputing curriculum of courses that should be offered.offered. ► Professional programsProfessional programs–AMA, Amer. Mgt. Assoc.,–AMA, Amer. Mgt. Assoc., offers special programs addressing ethics andoffers special programs addressing ethics and integrity.integrity. ► Private educational programsPrivate educational programs–LRN, the Legal–LRN, the Legal Knowledge Co., offers Web-based courseKnowledge Co., offers Web-based course modules that address a wide range of ethical andmodules that address a wide range of ethical and legal issues.legal issues.
  • 32. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod32 Ethics and the CIOEthics and the CIO ► As of August 11, 2002, CEOs and CFOs are required toAs of August 11, 2002, CEOs and CFOs are required to sign off on the accuracy of their financial statements.sign off on the accuracy of their financial statements. ► This requirement puts responsibility on the executives butThis requirement puts responsibility on the executives but also on the corporate information services unit and thealso on the corporate information services unit and the information services units of the business areas to provideinformation services units of the business areas to provide the executives with information that is accurate, complete,the executives with information that is accurate, complete, and timely.and timely. ► Information Systems are only one unit in the organizationalInformation Systems are only one unit in the organizational structure but it is in a key position to have the moststructure but it is in a key position to have the most influence on satisfying the demands of both governmentinfluence on satisfying the demands of both government and society for accurate financial reporting.and society for accurate financial reporting.
  • 33. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod33 Ethics and the CIO (Cont’d)Ethics and the CIO (Cont’d) The CIO can bring financial reporting up to expectations byThe CIO can bring financial reporting up to expectations by following a program that includes the following:following a program that includes the following:  Achieving a higher level of understanding of accountingAchieving a higher level of understanding of accounting principles.principles.  Reviewing the information systems that accomplishReviewing the information systems that accomplish financial reporting and taking remedial action.financial reporting and taking remedial action.  Educating the firm's executives on financial systems.Educating the firm's executives on financial systems.  Integrating alarms into information systems that alertIntegrating alarms into information systems that alert executives to activities that require attention.executives to activities that require attention.  Actively participating in the release of financialActively participating in the release of financial information to environmental elements.information to environmental elements.  Keeping tight control on money spent for informationKeeping tight control on money spent for information resources.resources.
  • 34. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod34 Life under Sarbanes-OxleyLife under Sarbanes-Oxley ► The objective of Sarbanes-Oxley, known as SOX, is toThe objective of Sarbanes-Oxley, known as SOX, is to protect investors by making the firm’s executivesprotect investors by making the firm’s executives personally accountable for the financial informationpersonally accountable for the financial information that is provided to the firm’s environment, primarilythat is provided to the firm’s environment, primarily stockholders and the financial community.stockholders and the financial community. ► SOX consists of 10 major provisions, 2 directly affectSOX consists of 10 major provisions, 2 directly affect the firm’s information services unit.the firm’s information services unit.  CEOs and CFOs must certify the financial reports.CEOs and CFOs must certify the financial reports.  U.S. companies are required to have internal audit units.U.S. companies are required to have internal audit units.
  • 35. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod35 SOX Provisions Affecting InformationSOX Provisions Affecting Information Services, Resources, and ITServices, Resources, and IT ► SOX 404 – CIO must ensure that SOX imposedSOX 404 – CIO must ensure that SOX imposed control requirements are built into systems duringcontrol requirements are built into systems during systems development and activities shouldsystems development and activities should include:include:  Identifying systems that play a role in financial reportingIdentifying systems that play a role in financial reporting  Identifying the risks faced by these systemsIdentifying the risks faced by these systems  Developing controls that address the risksDeveloping controls that address the risks  Documenting and testing the controlsDocumenting and testing the controls  Monitoring the effectiveness of the controls over timeMonitoring the effectiveness of the controls over time  Updating the controls as neededUpdating the controls as needed
  • 36. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod36 SOX Provisions … (Cont’d)SOX Provisions … (Cont’d) ► SOX 409–firm must be able to report changes in itsSOX 409–firm must be able to report changes in its financial condition infinancial condition in real timereal time–as the changes occur.–as the changes occur.  Should feature online inputs.Should feature online inputs.  Output subsystems should be capable of immediatelyOutput subsystems should be capable of immediately reporting changes in the firm’s financial condition.reporting changes in the firm’s financial condition. ► SOX and COBITSOX and COBIT  COBIT is an industry organization that provides securityCOBIT is an industry organization that provides security standards for the firm’s information resources.standards for the firm’s information resources.  COBIT can assist the firm in addressing its SOXCOBIT can assist the firm in addressing its SOX responsibilities because COBIT standards align very wellresponsibilities because COBIT standards align very well with the SOX expectations.with the SOX expectations.  COBIT has 47,000 members worldwide, its financialCOBIT has 47,000 members worldwide, its financial reporting standards can have a global effect.reporting standards can have a global effect.