6. Computer Crime
• The unauthorized use, access,
modification, and destruction of
hardware, software, data, or network
resources
– Unauthorized release of information
– Unauthorized copying of software
May 16, 2015 6
7. Types of Computer Crime
Hacking
Unauthorized
Use at work
Cyber
Theft
Piracy
Computer
Viruses
May 16, 2015 7
8. Computer Crime (cont..)
• Hacking
– The obsessive use of computers, or the unauthorized access
and use of networked computer systems
• Cyber Theft
– Involves unauthorized network entry and the fraudulent
alteration of computer databases
• Unauthorized use at work
– May range from doing private consulting or personal
finances, to playing video games, to unauthorized use of the
Internet on company networks
• Software Piracy
– Unauthorized copying of software
May 16, 2015 8
9. Privacy Issues
• Privacy issues are at the top of the list in regards to ethical
use of information.
• Loss of control
• Misuse of information
• Risk to physical privacy
• Privacy on the Internet
– Users of the Internet are highly visible and open to violations of
privacy
– Unsecured with no real rules
• Privacy laws
– Attempt to enforce the privacy of computer-based files and
communications
– Electronic Communications Privacy Act
– Computer Fraud and Abuse Act
May 16, 2015 9
11. Other Challenges
• Health Issues
- Job stress
- Muscle damage
- Eye strain
- Accidents
• Individuality
– Computer-based systems criticized as impersonal
systems that dehumanize and depersonalize activities
• Working Conditions
– IT has eliminated many monotonous, obnoxious tasks,
but has created others
May 16, 2015 11
14. Security Measures (cont..)
• Encryption
Passwords, messages, files, and other data is transmitted in
scrambled form and unscrambled for authorized users
– Involves using special mathematical algorithms to transform digital
data in scrambled code
– Most widely used method uses a pair of public and private keys
unique to each individual
• Firewalls
– Serves as a “gatekeeper” system that protects a company’s
intranets and other computer networks from intrusion
• Security Monitors
– Programs that monitor the use of computer systems and
networks and protect them from unauthorized use, fraud,
and destruction
May 16, 2015
14
15. Security Measures (cont..)
• Virus Defenses
– Protection may accomplished through
• Centralized distribution and updating of antivirus software
• Outsourcing the virus protection responsibility to ISPs or to
telecommunications or security management companies
• Backup Files
Duplicate files of data or programs
File retention measures
• Biometric Security
Measure physical traits that make each individual unique
Voice
Fingerprints
Hand geometryMay 16, 2015 15
17. Business and IT
Global e-business
E-commerce
As the 21st century unfolds, many companies are
transforming themselves into global powerhouses
via major investments in…
Other IT initiatives
Business managers and professionals must know
how to manage this vital organizational function
May 16, 2015 17
19. IT Planning Process
Major components of IT planning
Strategic
development
Resource
management
Technology
architecture
May 16, 2015 19
20. Managing the IT Function
Companies have essential applications on their
intranets, without which they cannot function
It became apparent that maintaining PCs
on a network is very, very expensive
The Internet boom inspired businesses
to connect their networks
Three things recently happened
Created an urgent need for centralization
May 16, 2015 20
21. IT Staff Planning
Evaluating employees
and rewarding good job
performance with salary
increases, promotions
Designing
career paths
Setting salary
and wage levels
Recruiting, training,
and retaining
qualified IS personnel
May 16, 2015 21
22. Outsourcing
The purchase of goods or services
from third-party partners
that were previously provided internally
May 16, 2015 22
24. Offshoring
This location is typically overseas
Can be either production or service
Relocation of an organization’s business processes
to a lower-cost location
Digitization of many services
Availability of large amounts of reliable and
affordable communication infrastructure
Growth of services offshoring linked to…
May 16, 2015 24
25. Failures in IT Management
IT not used
effectively
Computerizing traditional business
processes instead of developing
innovative e-business processes
IT not used
efficiently Poorly managed application
development
Poor response times
Frequent downtime
May 16, 2015 25