SlideShare a Scribd company logo
Principles of Information
Systems, Tenth Edition
Chapter 14
The Personal and Social
Impact of Computers
1
Principles and Learning Objectives
• Policies and procedures must be established to
avoid waste and mistakes associated with
computer usage
– Describe some examples of waste and mistakes in
an IS environment, their causes, and possible
solutions
– Identify policies and procedures useful in eliminating
waste and mistakes
– Discuss the principles and limits of an individual’s
right to privacy
Principles of Information Systems, Tenth Edition

2
Principles and Learning Objectives
(continued)
• Computer crime is a serious and rapidly growing
area of concern requiring management attention
– Explain the types of computer crime and their effects
– Identify specific measures to prevent computer crime

Principles of Information Systems, Tenth Edition

3
Principles and Learning Objectives
(continued)
• Jobs, equipment, and working conditions must be
designed to avoid negative health effects from
computers
– List the important negative effects of computers on
the work environment
– Identify specific actions that must be taken to ensure
the health and safety of employees

Principles of Information Systems, Tenth Edition

4
Principles and Learning Objectives
(continued)
• Practitioners in many professions subscribe to a
code of ethics that states the principles and core
values that are essential to their work
– Outline criteria for the ethical use of information
systems

Principles of Information Systems, Tenth Edition

5
Why Learn About the Personal and
Social Impact of the Internet?
• Both opportunities and threats:
– Surround a wide range of nontechnical issues
associated with the use of information systems and
the Internet

• You need to know about the topics in this chapter:
– To help avoid becoming a victim of crime, fraud,
privacy invasion, and other potential problem

Principles of Information Systems, Tenth Edition

6
Computer Waste and Mistakes
• Computer waste:
– Inappropriate use of computer technology and
resources

• Computer-related mistakes:
– Errors, failures, and other computer problems that
make computer output incorrect or not useful

Principles of Information Systems, Tenth Edition

7
Computer Waste
• Spam filter:
– Software that attempts to block unwanted e-mail
– Some might require first-time e-mailers to be verified
before their e-mails are accepted

• Image-based spam:
– New tactic spammers use to circumvent spamfiltering software

Principles of Information Systems, Tenth Edition

8
Computer-Related Mistakes
• Common causes:
– Unclear expectations and a lack of feedback
– Program development that contains errors
– Incorrect data entry by data-entry clerk

Principles of Information Systems, Tenth Edition

9
Preventing Computer-Related Waste
and Mistakes
• Preventing waste and mistakes involves:
– Establishing, implementing, monitoring, and
reviewing effective policies and procedures

Principles of Information Systems, Tenth Edition
Principles of Information Systems, Tenth

Edition

10
10
Establishing Policies and Procedures
• Types of computer-related mistakes:
–
–
–
–

Data-entry or data-capture errors
Errors in computer programs
Mishandling of computer output
Inadequate planning for and control of equipment
malfunctions
– Inadequate planning for and control of environmental
difficulties
– Installing computing capacity inadequate for the level
of activity
– Failure to provide access to the most current
information

Principles of Information Systems, Tenth Edition
Principles of Information Systems, Tenth

Edition

11
11
Implementing Policies and Procedures
• Policies to minimize waste and mistakes:
– Changes to critical tables, HTML, and URLs should
be tightly controlled
– User manual should be available covering operating
procedures
– Each system report should indicate its general
content in its title
– System should have controls to prevent invalid and
unreasonable data entry

Principles of Information Systems, Tenth Edition

12
Monitoring Policies and Procedures
• Monitor routine practices and take corrective action
if necessary
• Implement internal audits to measure actual results
against established goals

Principles of Information Systems, Tenth Edition

13
Reviewing Policies and Procedures
• Questions to be answered:
– Do current policies cover existing practices
adequately?
– Does the organization plan any new activities in the
future?
– Are contingencies and disasters covered?

Principles of Information Systems, Tenth Edition

14
Computer Crime
• Top four categories of computer crime reported to
law enforcement organizations during 2009:
–
–
–
–

Undelivered merchandise or nonpayment
Identity theft
Credit card fraud
Auction fraud

Principles of Information Systems, Tenth Edition

15
The Computer as a Tool to Commit
Crime
• Social engineering:
– Using social skills to get computer users to provide
information to access an information system

• Dumpster diving:
– Going through trash cans to find secret or
confidential information

Principles of Information Systems, Tenth Edition

16
Cyberterrorism
• Homeland Security Department’s Information
Analysis and Infrastructure Protection Directorate:
– Serves as a focal point for threat assessment,
warning, investigation, and response for threats or
attacks against the country’s critical infrastructure

• Cyberterrorist:
– Intimidates or coerces a government or organization
to advance his or her political or social objectives

Principles of Information Systems, Tenth Edition

17
Identity Theft
• Imposter obtains personal identification information
in order to impersonate someone else:
– To obtain credit, merchandise, and services in the
name of the victim
– To have false credentials

• More than 6 million customers of online brokerage
firm TD Ameritrade were:
– Involved in a class action lawsuit resulting from a
data theft

Principles of Information Systems, Tenth Edition

18
Internet Gambling
• Revenues generated by Internet gambling
represent a major untapped source of income for
state and federal governments
• Study showed that:
– While people of all income levels played state lottery
games, those people with an annual income of less
than $10,000 spent nearly three times as much

Principles of Information Systems, Tenth Edition

19
The Computer as a Tool to Fight
Crime
• Leads Online Web-based service system:
– Used by law enforcement to recover stolen property
– Contains more than 250 million records in its
database
– Allows law enforcement officers to search the
database by item serial number or by individual

Principles of Information Systems, Tenth Edition

20
Monitoring Sex Offenders
• Offender Watch:
– Web-based system used to track registered sex
offenders
– Stores the registered offender’s address, physical
description, and vehicle information

• GPS tracking devices and special software:
– Used to monitor the movement of registered sex
offenders

Principles of Information Systems, Tenth Edition

21
Use of Geographic Information
Systems
• Enables law enforcement agencies to gain a quick
overview of crime risk at a given address or in a
given locale
• Common GIS systems include:
– The National Equipment Registry
– The CompStat program
– CargoNet

Principles of Information Systems, Tenth Edition

22
The Computer as the Object of Crime
• Crimes fall into several categories:
–
–
–
–
–
–

Illegal access and use
Data alteration and destruction
Information and equipment theft
Software and Internet piracy
Computer-related scams
International computer crime

Principles of Information Systems, Tenth Edition

23
Principles of Information Systems, Tenth Edition

24
Illegal Access and Use
• Hacker:
– Learns about and uses computer systems

• Criminal hacker:
– Gains unauthorized use or illegal access to
computer systems

• Script bunny:
– Automates the job of crackers

• Insider:
– Employee who comprises corporate systems
Principles of Information Systems, Tenth Edition

25
Illegal Access and Use (continued)
• Virus:
– Program file capable of attaching to disks or other
files and replicating itself repeatedly

• Worm:
– Parasitic computer programs that replicate but,
unlike viruses, do not infect other computer program
files

• Trojan horse:
– Malicious program that disguises itself as a useful
application or game and purposefully does
something the user does not expect
Principles of Information Systems, Tenth Edition
Principles of Information Systems, Tenth

Edition

26
26
Illegal Access and Use (continued)
• Rootkit:
– Set of programs that enable its user to gain
administrator level access to a computer or network

• Logic bomb:
– Type of Trojan horse that executes when specific
conditions occur

• Variant:
– Modified version of a virus that is produced by virus’s
author or another person

Principles of Information Systems, Tenth Edition

27
Spyware
• Software installed on a personal computer to:
– Intercept or take partial control over user’s
interaction with the computer without knowledge or
permission of the user

• Similar to a Trojan horse in that:
– Users unknowingly install it when they download
freeware or shareware from the Internet

Principles of Information Systems, Tenth Edition

28
Information and Equipment Theft
• Password sniffer:
– Small program hidden in a network that records
identification numbers and passwords

• Portable computers such as laptops and portable
storage devices are especially easy for thieves to
take:
– Data and information stored in these systems are
more valuable than the equipment

Principles of Information Systems, Tenth Edition

29
Safe Disposal of Personal Computers
• Deleting files and emptying the Recycle Bin does
not make it impossible for determined individuals to
view the data
• Use disk-wiping software utilities that overwrite all
sectors of your disk drive, making all data
unrecoverable

Principles of Information Systems, Tenth Edition

30
Patent and Copyright Violations
• Software piracy:
– Act of unauthorized copying or distribution of
copyrighted software
– Penalties can be severe

• Patent infringement:
– Occurs when someone makes unauthorized use of
another’s patent

Principles of Information Systems, Tenth Edition

31
Computer-Related Scams
• Over the past few years:
– Credit card customers of various banks have been
targeted by scam artists trying to get personal
information

• Vishing:
– Similar to phishing
– Instead of using the victim’s computer, it uses the
victim’s phone

Principles of Information Systems, Tenth Edition

32
International Computer Crime
• Computer crime becomes more complex when it
crosses borders
• Money laundering:
– Disguising illegally gained funds so that they seem
legal

Principles of Information Systems, Tenth Edition

33
Preventing Computer-Related Crime
• Efforts to curb computer crime are being made by:
–
–
–
–

Private users
Companies
Employees
Public officials

Principles of Information Systems, Tenth Edition

34
Crime Prevention by State and
Federal Agencies
• Computer Fraud and Abuse Act of 1986:
– Mandates punishment based on the victim’s dollar
loss

• Computer Emergency Response Team (CERT):
– Responds to network security breaches
– Monitors systems for emerging threats

Principles of Information Systems, Tenth Edition

35
Crime Prevention by Corporations
• Guidelines to protect your computer from criminal
hackers:
– Install strong user authentication and encryption
capabilities on your firewall
– Install the latest security patches
– Disable guest accounts and null user accounts
– Turn audit trails on
– Consider installing caller ID
– Install a corporate firewall between your corporate
network and the Internet
Principles of Information Systems, Tenth Edition

36
Using Intrusion Detection Software
• Using intrusion detection software:
– Intrusion detection system (IDS):
• Monitors system and network resources
• Notifies network security personnel when it senses a
possible intrusion
• Can provide false alarms

Principles of Information Systems, Tenth Edition

37
Using Intrusion Detection Software
(continued)
• Security Dashboard:
– Provides comprehensive display on a single
computer screen of:
• All the vital data related to an organization’s security
defenses, including threats, exposures, policy
compliance, and incident alerts

Principles of Information Systems, Tenth Edition

38
Principles of Information Systems, Tenth Edition

39
Using Intrusion Detection Software
(continued)
• Using managed security service providers
(MSSPs):
– Many are outsourcing their network security
operations to:
• Managed security service providers (MSSPs) such as
Counterpane, Guardent, IBM, Riptech, and Symantec

• Guarding against theft of equipment and data:
– Organizations need to take strong measures to
guard against the theft of computer hardware and
the data stored on it
Principles of Information Systems, Tenth Edition

40
Crime Prevention for Individuals and
Employees
• Identity theft:
– To protect yourself, regularly check credit reports
with major credit bureaus

• Malware attacks:
– Antivirus programs run in the background to protect
your computer
– Many e-mail services and ISP providers offer free
antivirus protection

Principles of Information Systems, Tenth Edition

41
Crime Prevention for Individuals and
Employees (continued)
• Computer scams:
– Tips to help you avoid becoming a victim:
• Don’t agree to anything in a high-pressure meeting or
seminar
• Don’t judge a company based on appearances
• Avoid any plan that pays commissions simply for
recruiting additional distributors
• Beware of shills
• Beware of a company’s claim that it can set you up in
a profitable home-based business

Principles of Information Systems, Tenth Edition

42
Privacy Issues
• Issue of privacy:
– Deals with the right to be left alone or to be
withdrawn from public view

• Data is constantly being collected and stored on
each of us

Principles of Information Systems, Tenth Edition

43
Privacy and the Federal Government
• The federal government:
– Has implemented a number of laws addressing
personal privacy

• European Union:
– Has data-protection directive that requires firms
transporting data across national boundaries to have
certain privacy procedures in place

Principles of Information Systems, Tenth Edition

44
E-Mail Privacy
• Federal law:
– Permits employers to monitor e-mail sent and
received by employees

• E-mail messages that have been erased from hard
disks can be retrieved and used in lawsuits
• Use of e-mail among public officials might violate
“open meeting” laws

Principles of Information Systems, Tenth Edition

45
Instant Messaging Privacy
• To protect your privacy and your employer’s
property:
– Do not send personal or private IMs at work
– Choose a nonrevealing, nongender-specific,
unprovocative IM screen name
– Do not open files or click links in messages from
people you do not know
– Never send sensitive personal data such as credit
card numbers via IM

Principles of Information Systems, Tenth Edition

46
Privacy and Personal Sensing Devices
• RFID tags:
– Microchips with antenna
– Embedded in many of the products we buy:
• Medicine containers, clothing, computer printers, car
keys, library books, tires

– Generate radio transmissions that, if appropriate
measures are not taken, can lead to potential
privacy concerns

Principles of Information Systems, Tenth Edition

47
Privacy and the Internet
• Huge potential for privacy invasion on the Internet:
– E-mail messages
– Visiting a Web site
– Buying products over the Internet

• Platform for Privacy Preferences (P3P):
– Screening technology

• Social network services:
– Parents should discuss potential dangers, check
their children’s profiles, and monitor their activities
Principles of Information Systems, Tenth Edition

48
Internet Libel Concerns
• Libel:
– Publishing an intentionally false written statement
that is damaging to a person’s or organization’s
reputation

• Individuals:
– Can post information to the Internet using
anonymous e-mail accounts or screen names
– Must be careful what they post on the Internet to
avoid libel charges

Principles of Information Systems, Tenth Edition

49
Filtering and Classifying Internet
Content
• Filtering software:
– Help screen Internet content

• Internet Content Rating Association (ICRA):
– Goals are to protect children from potentially harmful
material while also safeguarding free speech on the
Internet

Principles of Information Systems, Tenth Edition

50
Fairness in Information Use
• The Privacy Act of 1974:
– Provides privacy protection from federal agencies
– Applies to all federal agencies except the CIA and
law enforcement agencies
– Requires training for all federal employees who
interact with a “system of records” under the act

Principles of Information Systems, Tenth Edition
Principles of Information Systems, Tenth

Edition

51
51
Electronic Communications Privacy
Act
• Gramm-Leach-Bliley Act:
– Requires financial institutions to protect customers’
nonpublic data

• USA Patriot Act:
– Internet service providers and telephone companies
must turn over customer information

• Corporate privacy policies:
– Should address a customer’s knowledge, control,
notice, and consent over the storage and use of
information
Principles of Information Systems, Tenth Edition
Principles of Information Systems, Tenth

Edition

52
52
Individual Efforts to Protect Privacy
• To protect personal privacy:
– Find out what is stored about you in existing
databases
– Be careful when you share information about
yourself
– Be proactive to protect your privacy
– Take extra care when purchasing anything from a
Web site

Principles of Information Systems, Tenth Edition

53
The Work Environment
• Use of computer-based information systems has
changed the workforce:
– Jobs that require IS literacy have increased
– Less-skilled positions have decreased

• Enhanced telecommunications:
– Has been the impetus for new types of business
– Has created global markets in industries once limited
to domestic markets

Principles of Information Systems, Tenth Edition

54
Health Concerns
•
•
•
•

Occupational stress
Seated immobility thromboembolism (SIT)
Carpal tunnel syndrome (CTS)
Video display terminal (VDT) bill:
– Employees who spend at least four hours a day
working with computer screens should be given 15minute breaks every two hours

Principles of Information Systems, Tenth Edition

55
Avoiding Health and Environment
Problems
• Work stressors:
– Hazardous activities associated with unfavorable
conditions of a poorly designed work environment

• Ergonomics:
– Science of designing machines, products, and
systems to maximize safety, comfort, and efficiency
of people who use them

Principles of Information Systems, Tenth Edition

56
Ethical Issues in Information Systems
• Code of ethics:
– States the principles and core values essential to a
set of people and, therefore, govern their behavior
– Can become a reference point for weighing what is
legal and what is ethical

Principles of Information Systems, Tenth Edition

57
Summary
• Computer waste:
– The inappropriate use of computer technology and
resources in both the public and private sectors

• Preventing waste and mistakes involves:
– Establishing, implementing, monitoring, and
reviewing effective policies and procedures

• Some crimes use computers as tools
• Cyberterrorist:
– Intimidates or coerces a government or organization
to advance his or her political or social objectives
Principles of Information Systems, Tenth Edition

58
Summary (continued)
• To detect and prevent computer crime use:
– Antivirus software
– Intrusion detection systems (IDSs)

• Privacy issues:
– A concern with government agencies, e-mail use,
corporations, and the Internet

• Businesses:
– Should develop a clear and thorough policy about
privacy rights for customers, including database
access
Principles of Information Systems, Tenth Edition

59
Summary (continued)
• Computer-related scams:
– Have cost people and companies thousands of
dollars

• Ergonomics:
– The study of designing and positioning computer
equipment

• Code of ethics:
– States the principles and core values that are
essential to the members of a profession or
organization
Principles of Information Systems, Tenth Edition

60

More Related Content

What's hot

System analysis and design
System analysis and designSystem analysis and design
System analysis and design
LOKESH KUMAR
 
Hci activity#3
Hci activity#3Hci activity#3
Hci activity#3
Desalegn Aweke
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3
Alan Dix
 
Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
Desalegn Aweke
 
Usability Engineering Presentation Slides
Usability Engineering Presentation SlidesUsability Engineering Presentation Slides
Usability Engineering Presentation Slides
wajahat Gul
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
UNIVERSITAS TEKNOKRAT INDONESIA
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6
Alan Dix
 
IS740 Chapter 11
IS740 Chapter 11IS740 Chapter 11
IS740 Chapter 11
iDocs
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCI
Usman Mukhtar
 
HCI 3e - Ch 3: The interaction
HCI 3e - Ch 3:  The interactionHCI 3e - Ch 3:  The interaction
HCI 3e - Ch 3: The interaction
Alan Dix
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Zakaria Hossain
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
Alan Dix
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)
Lora Aroyo
 
IntrIntroduction
IntrIntroductionIntrIntroduction
IntrIntroduction
Preeti Mishra
 
Quality Attributes Workshop
Quality Attributes WorkshopQuality Attributes Workshop
Quality Attributes WorkshopCS, NcState
 
Operating System and Building Blocks
Operating System and Building BlocksOperating System and Building Blocks
Operating System and Building Blocks
AnupritaBhoyar
 
Human Computer Interaction unit 1
Human Computer Interaction unit 1Human Computer Interaction unit 1
Human Computer Interaction unit 1
Vinoth Chandrasekaran
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
Alan Dix
 

What's hot (20)

System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Hci activity#3
Hci activity#3Hci activity#3
Hci activity#3
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3
 
Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
 
Usability Engineering Presentation Slides
Usability Engineering Presentation SlidesUsability Engineering Presentation Slides
Usability Engineering Presentation Slides
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6
 
IS740 Chapter 11
IS740 Chapter 11IS740 Chapter 11
IS740 Chapter 11
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCI
 
HCI 3e - Ch 3: The interaction
HCI 3e - Ch 3:  The interactionHCI 3e - Ch 3:  The interaction
HCI 3e - Ch 3: The interaction
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)
 
IntrIntroduction
IntrIntroductionIntrIntroduction
IntrIntroduction
 
Quality Attributes Workshop
Quality Attributes WorkshopQuality Attributes Workshop
Quality Attributes Workshop
 
Operating System and Building Blocks
Operating System and Building BlocksOperating System and Building Blocks
Operating System and Building Blocks
 
Human Computer Interaction unit 1
Human Computer Interaction unit 1Human Computer Interaction unit 1
Human Computer Interaction unit 1
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
 

Viewers also liked

IS740 Chapter 08
IS740 Chapter 08IS740 Chapter 08
IS740 Chapter 08
iDocs
 
IS740 Chapter 07
IS740 Chapter 07IS740 Chapter 07
IS740 Chapter 07
iDocs
 
IS740 Chapter 03
IS740 Chapter 03IS740 Chapter 03
IS740 Chapter 03
iDocs
 
IS740 Chapter 06
IS740 Chapter 06IS740 Chapter 06
IS740 Chapter 06
iDocs
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
Dara Som
 
The Casual Giver - iOS Design Specification
The Casual Giver - iOS Design SpecificationThe Casual Giver - iOS Design Specification
The Casual Giver - iOS Design Specificationmjennex
 
Type of Contract Delays By Dean Ellis
Type of Contract Delays By Dean EllisType of Contract Delays By Dean Ellis
Type of Contract Delays By Dean EllisDean Ball
 
Scope creep ankit sharma
Scope creep ankit sharmaScope creep ankit sharma
Scope creep ankit sharma
Ankit Sharma
 
The Battle Rages: 5 Strategies to Combat Constant Scope Creep
The Battle Rages: 5 Strategies to Combat Constant Scope CreepThe Battle Rages: 5 Strategies to Combat Constant Scope Creep
The Battle Rages: 5 Strategies to Combat Constant Scope Creep
Lou Russell
 
2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...
2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...
2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...
Yoshiki Sato
 
Types of E commerce & Payment Models
Types of E commerce & Payment ModelsTypes of E commerce & Payment Models
Types of E commerce & Payment Modelspriya_trehan
 
Core Concepts in Information Systems
Core Concepts in Information SystemsCore Concepts in Information Systems
Core Concepts in Information Systems
saurdubey
 
Training Scope Creep Linked In
Training Scope Creep Linked InTraining Scope Creep Linked In
Training Scope Creep Linked In
haddadmazen
 
WCSD 2015: Milestones and Delivery. Tough Conversations and Scope Creep
WCSD 2015: Milestones and Delivery. Tough Conversations and Scope CreepWCSD 2015: Milestones and Delivery. Tough Conversations and Scope Creep
WCSD 2015: Milestones and Delivery. Tough Conversations and Scope Creep
Wes Chyrchel
 
Introduction to SCORE - strategy-assessment beyond SWOT
Introduction to SCORE - strategy-assessment beyond SWOTIntroduction to SCORE - strategy-assessment beyond SWOT
Introduction to SCORE - strategy-assessment beyond SWOT
Tetradian Consulting
 
Managing scope creep in IT projects
Managing scope creep in IT projectsManaging scope creep in IT projects
Managing scope creep in IT projectsHimanshu Prabhakar
 

Viewers also liked (17)

IS740 Chapter 08
IS740 Chapter 08IS740 Chapter 08
IS740 Chapter 08
 
IS740 Chapter 07
IS740 Chapter 07IS740 Chapter 07
IS740 Chapter 07
 
IS740 Chapter 03
IS740 Chapter 03IS740 Chapter 03
IS740 Chapter 03
 
IS740 Chapter 06
IS740 Chapter 06IS740 Chapter 06
IS740 Chapter 06
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
The Casual Giver - iOS Design Specification
The Casual Giver - iOS Design SpecificationThe Casual Giver - iOS Design Specification
The Casual Giver - iOS Design Specification
 
Scope Management
Scope ManagementScope Management
Scope Management
 
Type of Contract Delays By Dean Ellis
Type of Contract Delays By Dean EllisType of Contract Delays By Dean Ellis
Type of Contract Delays By Dean Ellis
 
Scope creep ankit sharma
Scope creep ankit sharmaScope creep ankit sharma
Scope creep ankit sharma
 
The Battle Rages: 5 Strategies to Combat Constant Scope Creep
The Battle Rages: 5 Strategies to Combat Constant Scope CreepThe Battle Rages: 5 Strategies to Combat Constant Scope Creep
The Battle Rages: 5 Strategies to Combat Constant Scope Creep
 
2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...
2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...
2016-12-07 Development of a Project/Problem Based Learning Body of Knowledge ...
 
Types of E commerce & Payment Models
Types of E commerce & Payment ModelsTypes of E commerce & Payment Models
Types of E commerce & Payment Models
 
Core Concepts in Information Systems
Core Concepts in Information SystemsCore Concepts in Information Systems
Core Concepts in Information Systems
 
Training Scope Creep Linked In
Training Scope Creep Linked InTraining Scope Creep Linked In
Training Scope Creep Linked In
 
WCSD 2015: Milestones and Delivery. Tough Conversations and Scope Creep
WCSD 2015: Milestones and Delivery. Tough Conversations and Scope CreepWCSD 2015: Milestones and Delivery. Tough Conversations and Scope Creep
WCSD 2015: Milestones and Delivery. Tough Conversations and Scope Creep
 
Introduction to SCORE - strategy-assessment beyond SWOT
Introduction to SCORE - strategy-assessment beyond SWOTIntroduction to SCORE - strategy-assessment beyond SWOT
Introduction to SCORE - strategy-assessment beyond SWOT
 
Managing scope creep in IT projects
Managing scope creep in IT projectsManaging scope creep in IT projects
Managing scope creep in IT projects
 

Similar to IS740 Chapter 14

Ch14
Ch14Ch14
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01
Cleophas Rwemera
 
IS740 Chapter 01
IS740 Chapter 01IS740 Chapter 01
IS740 Chapter 01
iDocs
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
Dara Som
 
ch01_5e.pdf
ch01_5e.pdfch01_5e.pdf
ch01_5e.pdf
yebegashet
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15ayahye
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
IbrahimAl22
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
gtrajasekaran1
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
yaminohime
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
JhaiJhai6
 
Ppt ch01
Ppt ch01Ppt ch01
Ppt ch01
PuppyTreadmills
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan kabir Solicitor
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
myturtlegame
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
yaminohime
 
Uc13.chapter.12
Uc13.chapter.12Uc13.chapter.12
Uc13.chapter.12
Irfan Ali Memon
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
AslamHossain30
 

Similar to IS740 Chapter 14 (20)

Ch14
Ch14Ch14
Ch14
 
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01
 
IS740 Chapter 01
IS740 Chapter 01IS740 Chapter 01
IS740 Chapter 01
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
 
ch01_5e.pdf
ch01_5e.pdfch01_5e.pdf
ch01_5e.pdf
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
Is ch01
Is ch01Is ch01
Is ch01
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 
Ppt ch01
Ppt ch01Ppt ch01
Ppt ch01
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
 
Uc13.chapter.12
Uc13.chapter.12Uc13.chapter.12
Uc13.chapter.12
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 

More from iDocs

MGMT 340 - Chapter 03
MGMT 340 - Chapter 03MGMT 340 - Chapter 03
MGMT 340 - Chapter 03
iDocs
 
MGMT 340 - Chapter 02
MGMT 340 - Chapter 02MGMT 340 - Chapter 02
MGMT 340 - Chapter 02
iDocs
 
MGMT 340: Chapter 01
MGMT 340: Chapter 01MGMT 340: Chapter 01
MGMT 340: Chapter 01
iDocs
 
ACCT321 Chapter 14
ACCT321 Chapter 14ACCT321 Chapter 14
ACCT321 Chapter 14
iDocs
 
ACCT321 Chapter 10
ACCT321 Chapter 10ACCT321 Chapter 10
ACCT321 Chapter 10
iDocs
 
ACCT321 Chapter 09
ACCT321 Chapter 09ACCT321 Chapter 09
ACCT321 Chapter 09
iDocs
 
ACCT321 Chapter 08
ACCT321 Chapter 08ACCT321 Chapter 08
ACCT321 Chapter 08
iDocs
 
ACCT321 Chapter 07
ACCT321 Chapter 07ACCT321 Chapter 07
ACCT321 Chapter 07
iDocs
 
ACCT321 Chapter 06
ACCT321 Chapter 06ACCT321 Chapter 06
ACCT321 Chapter 06
iDocs
 
ACCT321 Chapter 05
ACCT321 Chapter 05ACCT321 Chapter 05
ACCT321 Chapter 05
iDocs
 
ACCT321 Chapter 04
ACCT321 Chapter 04ACCT321 Chapter 04
ACCT321 Chapter 04
iDocs
 
ACCT321 Chapter 02
ACCT321 Chapter 02ACCT321 Chapter 02
ACCT321 Chapter 02
iDocs
 
ACCT321 Chapter 01
ACCT321 Chapter 01ACCT321 Chapter 01
ACCT321 Chapter 01
iDocs
 
ACCT 321 Chapter 11
ACCT 321 Chapter 11ACCT 321 Chapter 11
ACCT 321 Chapter 11
iDocs
 
MBA 760 - Labor Force Composition
MBA 760 - Labor Force CompositionMBA 760 - Labor Force Composition
MBA 760 - Labor Force CompositioniDocs
 
MBA760 Chapter 11
MBA760 Chapter 11MBA760 Chapter 11
MBA760 Chapter 11
iDocs
 
MBA760 Chapter 09
MBA760 Chapter 09MBA760 Chapter 09
MBA760 Chapter 09
iDocs
 

More from iDocs (17)

MGMT 340 - Chapter 03
MGMT 340 - Chapter 03MGMT 340 - Chapter 03
MGMT 340 - Chapter 03
 
MGMT 340 - Chapter 02
MGMT 340 - Chapter 02MGMT 340 - Chapter 02
MGMT 340 - Chapter 02
 
MGMT 340: Chapter 01
MGMT 340: Chapter 01MGMT 340: Chapter 01
MGMT 340: Chapter 01
 
ACCT321 Chapter 14
ACCT321 Chapter 14ACCT321 Chapter 14
ACCT321 Chapter 14
 
ACCT321 Chapter 10
ACCT321 Chapter 10ACCT321 Chapter 10
ACCT321 Chapter 10
 
ACCT321 Chapter 09
ACCT321 Chapter 09ACCT321 Chapter 09
ACCT321 Chapter 09
 
ACCT321 Chapter 08
ACCT321 Chapter 08ACCT321 Chapter 08
ACCT321 Chapter 08
 
ACCT321 Chapter 07
ACCT321 Chapter 07ACCT321 Chapter 07
ACCT321 Chapter 07
 
ACCT321 Chapter 06
ACCT321 Chapter 06ACCT321 Chapter 06
ACCT321 Chapter 06
 
ACCT321 Chapter 05
ACCT321 Chapter 05ACCT321 Chapter 05
ACCT321 Chapter 05
 
ACCT321 Chapter 04
ACCT321 Chapter 04ACCT321 Chapter 04
ACCT321 Chapter 04
 
ACCT321 Chapter 02
ACCT321 Chapter 02ACCT321 Chapter 02
ACCT321 Chapter 02
 
ACCT321 Chapter 01
ACCT321 Chapter 01ACCT321 Chapter 01
ACCT321 Chapter 01
 
ACCT 321 Chapter 11
ACCT 321 Chapter 11ACCT 321 Chapter 11
ACCT 321 Chapter 11
 
MBA 760 - Labor Force Composition
MBA 760 - Labor Force CompositionMBA 760 - Labor Force Composition
MBA 760 - Labor Force Composition
 
MBA760 Chapter 11
MBA760 Chapter 11MBA760 Chapter 11
MBA760 Chapter 11
 
MBA760 Chapter 09
MBA760 Chapter 09MBA760 Chapter 09
MBA760 Chapter 09
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

IS740 Chapter 14

  • 1. Principles of Information Systems, Tenth Edition Chapter 14 The Personal and Social Impact of Computers 1
  • 2. Principles and Learning Objectives • Policies and procedures must be established to avoid waste and mistakes associated with computer usage – Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions – Identify policies and procedures useful in eliminating waste and mistakes – Discuss the principles and limits of an individual’s right to privacy Principles of Information Systems, Tenth Edition 2
  • 3. Principles and Learning Objectives (continued) • Computer crime is a serious and rapidly growing area of concern requiring management attention – Explain the types of computer crime and their effects – Identify specific measures to prevent computer crime Principles of Information Systems, Tenth Edition 3
  • 4. Principles and Learning Objectives (continued) • Jobs, equipment, and working conditions must be designed to avoid negative health effects from computers – List the important negative effects of computers on the work environment – Identify specific actions that must be taken to ensure the health and safety of employees Principles of Information Systems, Tenth Edition 4
  • 5. Principles and Learning Objectives (continued) • Practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work – Outline criteria for the ethical use of information systems Principles of Information Systems, Tenth Edition 5
  • 6. Why Learn About the Personal and Social Impact of the Internet? • Both opportunities and threats: – Surround a wide range of nontechnical issues associated with the use of information systems and the Internet • You need to know about the topics in this chapter: – To help avoid becoming a victim of crime, fraud, privacy invasion, and other potential problem Principles of Information Systems, Tenth Edition 6
  • 7. Computer Waste and Mistakes • Computer waste: – Inappropriate use of computer technology and resources • Computer-related mistakes: – Errors, failures, and other computer problems that make computer output incorrect or not useful Principles of Information Systems, Tenth Edition 7
  • 8. Computer Waste • Spam filter: – Software that attempts to block unwanted e-mail – Some might require first-time e-mailers to be verified before their e-mails are accepted • Image-based spam: – New tactic spammers use to circumvent spamfiltering software Principles of Information Systems, Tenth Edition 8
  • 9. Computer-Related Mistakes • Common causes: – Unclear expectations and a lack of feedback – Program development that contains errors – Incorrect data entry by data-entry clerk Principles of Information Systems, Tenth Edition 9
  • 10. Preventing Computer-Related Waste and Mistakes • Preventing waste and mistakes involves: – Establishing, implementing, monitoring, and reviewing effective policies and procedures Principles of Information Systems, Tenth Edition Principles of Information Systems, Tenth Edition 10 10
  • 11. Establishing Policies and Procedures • Types of computer-related mistakes: – – – – Data-entry or data-capture errors Errors in computer programs Mishandling of computer output Inadequate planning for and control of equipment malfunctions – Inadequate planning for and control of environmental difficulties – Installing computing capacity inadequate for the level of activity – Failure to provide access to the most current information Principles of Information Systems, Tenth Edition Principles of Information Systems, Tenth Edition 11 11
  • 12. Implementing Policies and Procedures • Policies to minimize waste and mistakes: – Changes to critical tables, HTML, and URLs should be tightly controlled – User manual should be available covering operating procedures – Each system report should indicate its general content in its title – System should have controls to prevent invalid and unreasonable data entry Principles of Information Systems, Tenth Edition 12
  • 13. Monitoring Policies and Procedures • Monitor routine practices and take corrective action if necessary • Implement internal audits to measure actual results against established goals Principles of Information Systems, Tenth Edition 13
  • 14. Reviewing Policies and Procedures • Questions to be answered: – Do current policies cover existing practices adequately? – Does the organization plan any new activities in the future? – Are contingencies and disasters covered? Principles of Information Systems, Tenth Edition 14
  • 15. Computer Crime • Top four categories of computer crime reported to law enforcement organizations during 2009: – – – – Undelivered merchandise or nonpayment Identity theft Credit card fraud Auction fraud Principles of Information Systems, Tenth Edition 15
  • 16. The Computer as a Tool to Commit Crime • Social engineering: – Using social skills to get computer users to provide information to access an information system • Dumpster diving: – Going through trash cans to find secret or confidential information Principles of Information Systems, Tenth Edition 16
  • 17. Cyberterrorism • Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate: – Serves as a focal point for threat assessment, warning, investigation, and response for threats or attacks against the country’s critical infrastructure • Cyberterrorist: – Intimidates or coerces a government or organization to advance his or her political or social objectives Principles of Information Systems, Tenth Edition 17
  • 18. Identity Theft • Imposter obtains personal identification information in order to impersonate someone else: – To obtain credit, merchandise, and services in the name of the victim – To have false credentials • More than 6 million customers of online brokerage firm TD Ameritrade were: – Involved in a class action lawsuit resulting from a data theft Principles of Information Systems, Tenth Edition 18
  • 19. Internet Gambling • Revenues generated by Internet gambling represent a major untapped source of income for state and federal governments • Study showed that: – While people of all income levels played state lottery games, those people with an annual income of less than $10,000 spent nearly three times as much Principles of Information Systems, Tenth Edition 19
  • 20. The Computer as a Tool to Fight Crime • Leads Online Web-based service system: – Used by law enforcement to recover stolen property – Contains more than 250 million records in its database – Allows law enforcement officers to search the database by item serial number or by individual Principles of Information Systems, Tenth Edition 20
  • 21. Monitoring Sex Offenders • Offender Watch: – Web-based system used to track registered sex offenders – Stores the registered offender’s address, physical description, and vehicle information • GPS tracking devices and special software: – Used to monitor the movement of registered sex offenders Principles of Information Systems, Tenth Edition 21
  • 22. Use of Geographic Information Systems • Enables law enforcement agencies to gain a quick overview of crime risk at a given address or in a given locale • Common GIS systems include: – The National Equipment Registry – The CompStat program – CargoNet Principles of Information Systems, Tenth Edition 22
  • 23. The Computer as the Object of Crime • Crimes fall into several categories: – – – – – – Illegal access and use Data alteration and destruction Information and equipment theft Software and Internet piracy Computer-related scams International computer crime Principles of Information Systems, Tenth Edition 23
  • 24. Principles of Information Systems, Tenth Edition 24
  • 25. Illegal Access and Use • Hacker: – Learns about and uses computer systems • Criminal hacker: – Gains unauthorized use or illegal access to computer systems • Script bunny: – Automates the job of crackers • Insider: – Employee who comprises corporate systems Principles of Information Systems, Tenth Edition 25
  • 26. Illegal Access and Use (continued) • Virus: – Program file capable of attaching to disks or other files and replicating itself repeatedly • Worm: – Parasitic computer programs that replicate but, unlike viruses, do not infect other computer program files • Trojan horse: – Malicious program that disguises itself as a useful application or game and purposefully does something the user does not expect Principles of Information Systems, Tenth Edition Principles of Information Systems, Tenth Edition 26 26
  • 27. Illegal Access and Use (continued) • Rootkit: – Set of programs that enable its user to gain administrator level access to a computer or network • Logic bomb: – Type of Trojan horse that executes when specific conditions occur • Variant: – Modified version of a virus that is produced by virus’s author or another person Principles of Information Systems, Tenth Edition 27
  • 28. Spyware • Software installed on a personal computer to: – Intercept or take partial control over user’s interaction with the computer without knowledge or permission of the user • Similar to a Trojan horse in that: – Users unknowingly install it when they download freeware or shareware from the Internet Principles of Information Systems, Tenth Edition 28
  • 29. Information and Equipment Theft • Password sniffer: – Small program hidden in a network that records identification numbers and passwords • Portable computers such as laptops and portable storage devices are especially easy for thieves to take: – Data and information stored in these systems are more valuable than the equipment Principles of Information Systems, Tenth Edition 29
  • 30. Safe Disposal of Personal Computers • Deleting files and emptying the Recycle Bin does not make it impossible for determined individuals to view the data • Use disk-wiping software utilities that overwrite all sectors of your disk drive, making all data unrecoverable Principles of Information Systems, Tenth Edition 30
  • 31. Patent and Copyright Violations • Software piracy: – Act of unauthorized copying or distribution of copyrighted software – Penalties can be severe • Patent infringement: – Occurs when someone makes unauthorized use of another’s patent Principles of Information Systems, Tenth Edition 31
  • 32. Computer-Related Scams • Over the past few years: – Credit card customers of various banks have been targeted by scam artists trying to get personal information • Vishing: – Similar to phishing – Instead of using the victim’s computer, it uses the victim’s phone Principles of Information Systems, Tenth Edition 32
  • 33. International Computer Crime • Computer crime becomes more complex when it crosses borders • Money laundering: – Disguising illegally gained funds so that they seem legal Principles of Information Systems, Tenth Edition 33
  • 34. Preventing Computer-Related Crime • Efforts to curb computer crime are being made by: – – – – Private users Companies Employees Public officials Principles of Information Systems, Tenth Edition 34
  • 35. Crime Prevention by State and Federal Agencies • Computer Fraud and Abuse Act of 1986: – Mandates punishment based on the victim’s dollar loss • Computer Emergency Response Team (CERT): – Responds to network security breaches – Monitors systems for emerging threats Principles of Information Systems, Tenth Edition 35
  • 36. Crime Prevention by Corporations • Guidelines to protect your computer from criminal hackers: – Install strong user authentication and encryption capabilities on your firewall – Install the latest security patches – Disable guest accounts and null user accounts – Turn audit trails on – Consider installing caller ID – Install a corporate firewall between your corporate network and the Internet Principles of Information Systems, Tenth Edition 36
  • 37. Using Intrusion Detection Software • Using intrusion detection software: – Intrusion detection system (IDS): • Monitors system and network resources • Notifies network security personnel when it senses a possible intrusion • Can provide false alarms Principles of Information Systems, Tenth Edition 37
  • 38. Using Intrusion Detection Software (continued) • Security Dashboard: – Provides comprehensive display on a single computer screen of: • All the vital data related to an organization’s security defenses, including threats, exposures, policy compliance, and incident alerts Principles of Information Systems, Tenth Edition 38
  • 39. Principles of Information Systems, Tenth Edition 39
  • 40. Using Intrusion Detection Software (continued) • Using managed security service providers (MSSPs): – Many are outsourcing their network security operations to: • Managed security service providers (MSSPs) such as Counterpane, Guardent, IBM, Riptech, and Symantec • Guarding against theft of equipment and data: – Organizations need to take strong measures to guard against the theft of computer hardware and the data stored on it Principles of Information Systems, Tenth Edition 40
  • 41. Crime Prevention for Individuals and Employees • Identity theft: – To protect yourself, regularly check credit reports with major credit bureaus • Malware attacks: – Antivirus programs run in the background to protect your computer – Many e-mail services and ISP providers offer free antivirus protection Principles of Information Systems, Tenth Edition 41
  • 42. Crime Prevention for Individuals and Employees (continued) • Computer scams: – Tips to help you avoid becoming a victim: • Don’t agree to anything in a high-pressure meeting or seminar • Don’t judge a company based on appearances • Avoid any plan that pays commissions simply for recruiting additional distributors • Beware of shills • Beware of a company’s claim that it can set you up in a profitable home-based business Principles of Information Systems, Tenth Edition 42
  • 43. Privacy Issues • Issue of privacy: – Deals with the right to be left alone or to be withdrawn from public view • Data is constantly being collected and stored on each of us Principles of Information Systems, Tenth Edition 43
  • 44. Privacy and the Federal Government • The federal government: – Has implemented a number of laws addressing personal privacy • European Union: – Has data-protection directive that requires firms transporting data across national boundaries to have certain privacy procedures in place Principles of Information Systems, Tenth Edition 44
  • 45. E-Mail Privacy • Federal law: – Permits employers to monitor e-mail sent and received by employees • E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits • Use of e-mail among public officials might violate “open meeting” laws Principles of Information Systems, Tenth Edition 45
  • 46. Instant Messaging Privacy • To protect your privacy and your employer’s property: – Do not send personal or private IMs at work – Choose a nonrevealing, nongender-specific, unprovocative IM screen name – Do not open files or click links in messages from people you do not know – Never send sensitive personal data such as credit card numbers via IM Principles of Information Systems, Tenth Edition 46
  • 47. Privacy and Personal Sensing Devices • RFID tags: – Microchips with antenna – Embedded in many of the products we buy: • Medicine containers, clothing, computer printers, car keys, library books, tires – Generate radio transmissions that, if appropriate measures are not taken, can lead to potential privacy concerns Principles of Information Systems, Tenth Edition 47
  • 48. Privacy and the Internet • Huge potential for privacy invasion on the Internet: – E-mail messages – Visiting a Web site – Buying products over the Internet • Platform for Privacy Preferences (P3P): – Screening technology • Social network services: – Parents should discuss potential dangers, check their children’s profiles, and monitor their activities Principles of Information Systems, Tenth Edition 48
  • 49. Internet Libel Concerns • Libel: – Publishing an intentionally false written statement that is damaging to a person’s or organization’s reputation • Individuals: – Can post information to the Internet using anonymous e-mail accounts or screen names – Must be careful what they post on the Internet to avoid libel charges Principles of Information Systems, Tenth Edition 49
  • 50. Filtering and Classifying Internet Content • Filtering software: – Help screen Internet content • Internet Content Rating Association (ICRA): – Goals are to protect children from potentially harmful material while also safeguarding free speech on the Internet Principles of Information Systems, Tenth Edition 50
  • 51. Fairness in Information Use • The Privacy Act of 1974: – Provides privacy protection from federal agencies – Applies to all federal agencies except the CIA and law enforcement agencies – Requires training for all federal employees who interact with a “system of records” under the act Principles of Information Systems, Tenth Edition Principles of Information Systems, Tenth Edition 51 51
  • 52. Electronic Communications Privacy Act • Gramm-Leach-Bliley Act: – Requires financial institutions to protect customers’ nonpublic data • USA Patriot Act: – Internet service providers and telephone companies must turn over customer information • Corporate privacy policies: – Should address a customer’s knowledge, control, notice, and consent over the storage and use of information Principles of Information Systems, Tenth Edition Principles of Information Systems, Tenth Edition 52 52
  • 53. Individual Efforts to Protect Privacy • To protect personal privacy: – Find out what is stored about you in existing databases – Be careful when you share information about yourself – Be proactive to protect your privacy – Take extra care when purchasing anything from a Web site Principles of Information Systems, Tenth Edition 53
  • 54. The Work Environment • Use of computer-based information systems has changed the workforce: – Jobs that require IS literacy have increased – Less-skilled positions have decreased • Enhanced telecommunications: – Has been the impetus for new types of business – Has created global markets in industries once limited to domestic markets Principles of Information Systems, Tenth Edition 54
  • 55. Health Concerns • • • • Occupational stress Seated immobility thromboembolism (SIT) Carpal tunnel syndrome (CTS) Video display terminal (VDT) bill: – Employees who spend at least four hours a day working with computer screens should be given 15minute breaks every two hours Principles of Information Systems, Tenth Edition 55
  • 56. Avoiding Health and Environment Problems • Work stressors: – Hazardous activities associated with unfavorable conditions of a poorly designed work environment • Ergonomics: – Science of designing machines, products, and systems to maximize safety, comfort, and efficiency of people who use them Principles of Information Systems, Tenth Edition 56
  • 57. Ethical Issues in Information Systems • Code of ethics: – States the principles and core values essential to a set of people and, therefore, govern their behavior – Can become a reference point for weighing what is legal and what is ethical Principles of Information Systems, Tenth Edition 57
  • 58. Summary • Computer waste: – The inappropriate use of computer technology and resources in both the public and private sectors • Preventing waste and mistakes involves: – Establishing, implementing, monitoring, and reviewing effective policies and procedures • Some crimes use computers as tools • Cyberterrorist: – Intimidates or coerces a government or organization to advance his or her political or social objectives Principles of Information Systems, Tenth Edition 58
  • 59. Summary (continued) • To detect and prevent computer crime use: – Antivirus software – Intrusion detection systems (IDSs) • Privacy issues: – A concern with government agencies, e-mail use, corporations, and the Internet • Businesses: – Should develop a clear and thorough policy about privacy rights for customers, including database access Principles of Information Systems, Tenth Edition 59
  • 60. Summary (continued) • Computer-related scams: – Have cost people and companies thousands of dollars • Ergonomics: – The study of designing and positioning computer equipment • Code of ethics: – States the principles and core values that are essential to the members of a profession or organization Principles of Information Systems, Tenth Edition 60