SlideShare a Scribd company logo
1 of 27
1May 16, 2015
2May 16, 2015
3May 16, 2015
SECURITY AND ETHICAL
CHALLENGES OF INFORMATION
TECHNOLOGY
May 16, 2015 4
Ethical Responsibility
Security
Ethics and
Society
Employment Privacy
Health Crime
Working
Conditions
Individuality
May 16, 2015 5
Computer Crime
• The unauthorized use, access,
modification, and destruction of
hardware, software, data, or network
resources
– Unauthorized release of information
– Unauthorized copying of software
May 16, 2015 6
Types of Computer Crime
Hacking
Unauthorized
Use at work
Cyber
Theft
Piracy
Computer
Viruses
May 16, 2015 7
Computer Crime (cont..)
• Hacking
– The obsessive use of computers, or the unauthorized access
and use of networked computer systems
• Cyber Theft
– Involves unauthorized network entry and the fraudulent
alteration of computer databases
• Unauthorized use at work
– May range from doing private consulting or personal
finances, to playing video games, to unauthorized use of the
Internet on company networks
• Software Piracy
– Unauthorized copying of software
May 16, 2015 8
Privacy Issues
• Privacy issues are at the top of the list in regards to ethical
use of information.
• Loss of control
• Misuse of information
• Risk to physical privacy
• Privacy on the Internet
– Users of the Internet are highly visible and open to violations of
privacy
– Unsecured with no real rules
• Privacy laws
– Attempt to enforce the privacy of computer-based files and
communications
– Electronic Communications Privacy Act
– Computer Fraud and Abuse Act
May 16, 2015 9
Employment Challenges
Lost Job
Opportunities
Computer
Monitoring
Lost
Individuality
Health
Issues
Working
Conditions
May 16, 2015 10
Other Challenges
• Health Issues
- Job stress
- Muscle damage
- Eye strain
- Accidents
• Individuality
– Computer-based systems criticized as impersonal
systems that dehumanize and depersonalize activities
• Working Conditions
– IT has eliminated many monotonous, obnoxious tasks,
but has created others
May 16, 2015 11
Security Measures
Encryption
Denial of Service
Defenses
Fire Walls
Monitor
E-mail
Virus
Defenses
May 16, 2015 12
Security Measures (cont..)
Security
Codes
Security
Monitors
Backup
Files
Biometric
Security Controls
May 16, 2015 13
Security Measures (cont..)
• Encryption
Passwords, messages, files, and other data is transmitted in
scrambled form and unscrambled for authorized users
– Involves using special mathematical algorithms to transform digital
data in scrambled code
– Most widely used method uses a pair of public and private keys
unique to each individual
• Firewalls
– Serves as a “gatekeeper” system that protects a company’s
intranets and other computer networks from intrusion
• Security Monitors
– Programs that monitor the use of computer systems and
networks and protect them from unauthorized use, fraud,
and destruction
May 16, 2015
14
Security Measures (cont..)
• Virus Defenses
– Protection may accomplished through
• Centralized distribution and updating of antivirus software
• Outsourcing the virus protection responsibility to ISPs or to
telecommunications or security management companies
• Backup Files
Duplicate files of data or programs
File retention measures
• Biometric Security
Measure physical traits that make each individual unique
Voice
Fingerprints
Hand geometryMay 16, 2015 15
Enterprise & Global
Management
of
Information
Technology
May 16, 2015 16
Business and IT
Global e-business
E-commerce
As the 21st century unfolds, many companies are
transforming themselves into global powerhouses
via major investments in…
Other IT initiatives
Business managers and professionals must know
how to manage this vital organizational function
May 16, 2015 17
Components of IT Management
May 16, 2015 18
IT Planning Process
Major components of IT planning
Strategic
development
Resource
management
Technology
architecture
May 16, 2015 19
Managing the IT Function
Companies have essential applications on their
intranets, without which they cannot function
It became apparent that maintaining PCs
on a network is very, very expensive
The Internet boom inspired businesses
to connect their networks
Three things recently happened
Created an urgent need for centralization
May 16, 2015 20
IT Staff Planning
Evaluating employees
and rewarding good job
performance with salary
increases, promotions
Designing
career paths
Setting salary
and wage levels
Recruiting, training,
and retaining
qualified IS personnel
May 16, 2015 21
Outsourcing
The purchase of goods or services
from third-party partners
that were previously provided internally
May 16, 2015 22
Why Companies Outsource
May 16, 2015 23
Offshoring
This location is typically overseas
Can be either production or service
Relocation of an organization’s business processes
to a lower-cost location
Digitization of many services
Availability of large amounts of reliable and
affordable communication infrastructure
Growth of services offshoring linked to…
May 16, 2015 24
Failures in IT Management
IT not used
effectively
Computerizing traditional business
processes instead of developing
innovative e-business processes
IT not used
efficiently Poorly managed application
development
Poor response times
Frequent downtime
May 16, 2015 25
May 16, 2015 26
May 16, 2015 27

More Related Content

What's hot

DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Week 4 pp presentation
Week 4  pp presentationWeek 4  pp presentation
Week 4 pp presentationJonica Bowne
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy PresentationSarah Cortes
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Digital information security
Digital information securityDigital information security
Digital information securitySayed Ahmad
 
Computer Hacking Prevention
Computer Hacking PreventionComputer Hacking Prevention
Computer Hacking PreventionCorey Seitz
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset ManagementNada G.Youssef
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionAronson LLC
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to workNetIQ
 

What's hot (20)

DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Week 4 pp presentation
Week 4  pp presentationWeek 4  pp presentation
Week 4 pp presentation
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy Presentation
 
It Policies
It PoliciesIt Policies
It Policies
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Digital information security
Digital information securityDigital information security
Digital information security
 
Computer Hacking Prevention
Computer Hacking PreventionComputer Hacking Prevention
Computer Hacking Prevention
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
 
Bcs april 2013
Bcs april 2013Bcs april 2013
Bcs april 2013
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to work
 
Class 17 and 18
Class 17 and 18Class 17 and 18
Class 17 and 18
 
Computer security
Computer securityComputer security
Computer security
 

Viewers also liked

Digiajastu trendid ja andmeturve
Digiajastu trendid ja andmeturveDigiajastu trendid ja andmeturve
Digiajastu trendid ja andmeturveLeego
 
Id3 torres colque katherine lisbeth
Id3 torres colque katherine lisbeth Id3 torres colque katherine lisbeth
Id3 torres colque katherine lisbeth Katherine Torres
 
Translocality in Key Ideological and Theoretical Underpinnings
Translocality in Key Ideological and Theoretical Underpinnings Translocality in Key Ideological and Theoretical Underpinnings
Translocality in Key Ideological and Theoretical Underpinnings Randy Nobleza
 
Gema Intermulia Sejahtera - Jakarta Office Market in 2015
Gema Intermulia Sejahtera - Jakarta Office Market in 2015Gema Intermulia Sejahtera - Jakarta Office Market in 2015
Gema Intermulia Sejahtera - Jakarta Office Market in 2015Jakarta Business Networkers
 
Sri Lanka (Small Miracle)
Sri Lanka (Small Miracle)Sri Lanka (Small Miracle)
Sri Lanka (Small Miracle)zagchange
 
Trasplante de órganos
Trasplante de órganosTrasplante de órganos
Trasplante de órganosaslaneto
 
Autonomous spaces, Info Shop Conference
Autonomous spaces, Info Shop ConferenceAutonomous spaces, Info Shop Conference
Autonomous spaces, Info Shop ConferenceRandy Nobleza
 
dlsu CLA graduate colloquia
dlsu CLA graduate colloquiadlsu CLA graduate colloquia
dlsu CLA graduate colloquiaRandy Nobleza
 
Yale Open Course and Open Sourse
Yale Open Course and Open SourseYale Open Course and Open Sourse
Yale Open Course and Open SourseRandy Nobleza
 

Viewers also liked (15)

Digiajastu trendid ja andmeturve
Digiajastu trendid ja andmeturveDigiajastu trendid ja andmeturve
Digiajastu trendid ja andmeturve
 
Id3 torres colque katherine lisbeth
Id3 torres colque katherine lisbeth Id3 torres colque katherine lisbeth
Id3 torres colque katherine lisbeth
 
Vocanic jakarta business networkers
Vocanic   jakarta business networkersVocanic   jakarta business networkers
Vocanic jakarta business networkers
 
Chemistry
ChemistryChemistry
Chemistry
 
Translocality in Key Ideological and Theoretical Underpinnings
Translocality in Key Ideological and Theoretical Underpinnings Translocality in Key Ideological and Theoretical Underpinnings
Translocality in Key Ideological and Theoretical Underpinnings
 
Gema Intermulia Sejahtera - Jakarta Office Market in 2015
Gema Intermulia Sejahtera - Jakarta Office Market in 2015Gema Intermulia Sejahtera - Jakarta Office Market in 2015
Gema Intermulia Sejahtera - Jakarta Office Market in 2015
 
Marty
MartyMarty
Marty
 
Sri Lanka (Small Miracle)
Sri Lanka (Small Miracle)Sri Lanka (Small Miracle)
Sri Lanka (Small Miracle)
 
Savills Indonesia - CBD Office Market Update
Savills Indonesia - CBD Office Market UpdateSavills Indonesia - CBD Office Market Update
Savills Indonesia - CBD Office Market Update
 
Trasplante de órganos
Trasplante de órganosTrasplante de órganos
Trasplante de órganos
 
Autonomous spaces, Info Shop Conference
Autonomous spaces, Info Shop ConferenceAutonomous spaces, Info Shop Conference
Autonomous spaces, Info Shop Conference
 
Presentation institut de soudure
Presentation institut de soudurePresentation institut de soudure
Presentation institut de soudure
 
dlsu CLA graduate colloquia
dlsu CLA graduate colloquiadlsu CLA graduate colloquia
dlsu CLA graduate colloquia
 
AMR Group Noida Rain Cafe Presentation
AMR Group Noida Rain Cafe PresentationAMR Group Noida Rain Cafe Presentation
AMR Group Noida Rain Cafe Presentation
 
Yale Open Course and Open Sourse
Yale Open Course and Open SourseYale Open Course and Open Sourse
Yale Open Course and Open Sourse
 

Similar to Project Management

Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Bonagiri Rajitha
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Darek Czuchaj
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Cleophas Rwemera
 
Session 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.pptSession 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.pptENRIQUE EGLESIAS
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 

Similar to Project Management (20)

Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Ch14
Ch14Ch14
Ch14
 
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01
 
ICT systems
ICT systemsICT systems
ICT systems
 
Session 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.pptSession 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.ppt
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 

Recently uploaded

{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 

Recently uploaded (20)

Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 

Project Management

  • 4. SECURITY AND ETHICAL CHALLENGES OF INFORMATION TECHNOLOGY May 16, 2015 4
  • 5. Ethical Responsibility Security Ethics and Society Employment Privacy Health Crime Working Conditions Individuality May 16, 2015 5
  • 6. Computer Crime • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources – Unauthorized release of information – Unauthorized copying of software May 16, 2015 6
  • 7. Types of Computer Crime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses May 16, 2015 7
  • 8. Computer Crime (cont..) • Hacking – The obsessive use of computers, or the unauthorized access and use of networked computer systems • Cyber Theft – Involves unauthorized network entry and the fraudulent alteration of computer databases • Unauthorized use at work – May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks • Software Piracy – Unauthorized copying of software May 16, 2015 8
  • 9. Privacy Issues • Privacy issues are at the top of the list in regards to ethical use of information. • Loss of control • Misuse of information • Risk to physical privacy • Privacy on the Internet – Users of the Internet are highly visible and open to violations of privacy – Unsecured with no real rules • Privacy laws – Attempt to enforce the privacy of computer-based files and communications – Electronic Communications Privacy Act – Computer Fraud and Abuse Act May 16, 2015 9
  • 11. Other Challenges • Health Issues - Job stress - Muscle damage - Eye strain - Accidents • Individuality – Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities • Working Conditions – IT has eliminated many monotonous, obnoxious tasks, but has created others May 16, 2015 11
  • 12. Security Measures Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses May 16, 2015 12
  • 14. Security Measures (cont..) • Encryption Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users – Involves using special mathematical algorithms to transform digital data in scrambled code – Most widely used method uses a pair of public and private keys unique to each individual • Firewalls – Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion • Security Monitors – Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction May 16, 2015 14
  • 15. Security Measures (cont..) • Virus Defenses – Protection may accomplished through • Centralized distribution and updating of antivirus software • Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies • Backup Files Duplicate files of data or programs File retention measures • Biometric Security Measure physical traits that make each individual unique Voice Fingerprints Hand geometryMay 16, 2015 15
  • 17. Business and IT Global e-business E-commerce As the 21st century unfolds, many companies are transforming themselves into global powerhouses via major investments in… Other IT initiatives Business managers and professionals must know how to manage this vital organizational function May 16, 2015 17
  • 18. Components of IT Management May 16, 2015 18
  • 19. IT Planning Process Major components of IT planning Strategic development Resource management Technology architecture May 16, 2015 19
  • 20. Managing the IT Function Companies have essential applications on their intranets, without which they cannot function It became apparent that maintaining PCs on a network is very, very expensive The Internet boom inspired businesses to connect their networks Three things recently happened Created an urgent need for centralization May 16, 2015 20
  • 21. IT Staff Planning Evaluating employees and rewarding good job performance with salary increases, promotions Designing career paths Setting salary and wage levels Recruiting, training, and retaining qualified IS personnel May 16, 2015 21
  • 22. Outsourcing The purchase of goods or services from third-party partners that were previously provided internally May 16, 2015 22
  • 24. Offshoring This location is typically overseas Can be either production or service Relocation of an organization’s business processes to a lower-cost location Digitization of many services Availability of large amounts of reliable and affordable communication infrastructure Growth of services offshoring linked to… May 16, 2015 24
  • 25. Failures in IT Management IT not used effectively Computerizing traditional business processes instead of developing innovative e-business processes IT not used efficiently Poorly managed application development Poor response times Frequent downtime May 16, 2015 25