1May 16, 2015
2May 16, 2015
3May 16, 2015
SECURITY AND ETHICAL
CHALLENGES OF INFORMATION
TECHNOLOGY
May 16, 2015 4
Ethical Responsibility
Security
Ethics and
Society
Employment Privacy
Health Crime
Working
Conditions
Individuality
May 16, 2015 5
Computer Crime
• The unauthorized use, access,
modification, and destruction of
hardware, software, data, or network
resources
– Unauthorized release of information
– Unauthorized copying of software
May 16, 2015 6
Types of Computer Crime
Hacking
Unauthorized
Use at work
Cyber
Theft
Piracy
Computer
Viruses
May 16, 2015 7
Computer Crime (cont..)
• Hacking
– The obsessive use of computers, or the unauthorized access
and use of networked computer systems
• Cyber Theft
– Involves unauthorized network entry and the fraudulent
alteration of computer databases
• Unauthorized use at work
– May range from doing private consulting or personal
finances, to playing video games, to unauthorized use of the
Internet on company networks
• Software Piracy
– Unauthorized copying of software
May 16, 2015 8
Privacy Issues
• Privacy issues are at the top of the list in regards to ethical
use of information.
• Loss of control
• Misuse of information
• Risk to physical privacy
• Privacy on the Internet
– Users of the Internet are highly visible and open to violations of
privacy
– Unsecured with no real rules
• Privacy laws
– Attempt to enforce the privacy of computer-based files and
communications
– Electronic Communications Privacy Act
– Computer Fraud and Abuse Act
May 16, 2015 9
Employment Challenges
Lost Job
Opportunities
Computer
Monitoring
Lost
Individuality
Health
Issues
Working
Conditions
May 16, 2015 10
Other Challenges
• Health Issues
- Job stress
- Muscle damage
- Eye strain
- Accidents
• Individuality
– Computer-based systems criticized as impersonal
systems that dehumanize and depersonalize activities
• Working Conditions
– IT has eliminated many monotonous, obnoxious tasks,
but has created others
May 16, 2015 11
Security Measures
Encryption
Denial of Service
Defenses
Fire Walls
Monitor
E-mail
Virus
Defenses
May 16, 2015 12
Security Measures (cont..)
Security
Codes
Security
Monitors
Backup
Files
Biometric
Security Controls
May 16, 2015 13
Security Measures (cont..)
• Encryption
Passwords, messages, files, and other data is transmitted in
scrambled form and unscrambled for authorized users
– Involves using special mathematical algorithms to transform digital
data in scrambled code
– Most widely used method uses a pair of public and private keys
unique to each individual
• Firewalls
– Serves as a “gatekeeper” system that protects a company’s
intranets and other computer networks from intrusion
• Security Monitors
– Programs that monitor the use of computer systems and
networks and protect them from unauthorized use, fraud,
and destruction
May 16, 2015
14
Security Measures (cont..)
• Virus Defenses
– Protection may accomplished through
• Centralized distribution and updating of antivirus software
• Outsourcing the virus protection responsibility to ISPs or to
telecommunications or security management companies
• Backup Files
Duplicate files of data or programs
File retention measures
• Biometric Security
Measure physical traits that make each individual unique
Voice
Fingerprints
Hand geometryMay 16, 2015 15
Enterprise & Global
Management
of
Information
Technology
May 16, 2015 16
Business and IT
Global e-business
E-commerce
As the 21st century unfolds, many companies are
transforming themselves into global powerhouses
via major investments in…
Other IT initiatives
Business managers and professionals must know
how to manage this vital organizational function
May 16, 2015 17
Components of IT Management
May 16, 2015 18
IT Planning Process
Major components of IT planning
Strategic
development
Resource
management
Technology
architecture
May 16, 2015 19
Managing the IT Function
Companies have essential applications on their
intranets, without which they cannot function
It became apparent that maintaining PCs
on a network is very, very expensive
The Internet boom inspired businesses
to connect their networks
Three things recently happened
Created an urgent need for centralization
May 16, 2015 20
IT Staff Planning
Evaluating employees
and rewarding good job
performance with salary
increases, promotions
Designing
career paths
Setting salary
and wage levels
Recruiting, training,
and retaining
qualified IS personnel
May 16, 2015 21
Outsourcing
The purchase of goods or services
from third-party partners
that were previously provided internally
May 16, 2015 22
Why Companies Outsource
May 16, 2015 23
Offshoring
This location is typically overseas
Can be either production or service
Relocation of an organization’s business processes
to a lower-cost location
Digitization of many services
Availability of large amounts of reliable and
affordable communication infrastructure
Growth of services offshoring linked to…
May 16, 2015 24
Failures in IT Management
IT not used
effectively
Computerizing traditional business
processes instead of developing
innovative e-business processes
IT not used
efficiently Poorly managed application
development
Poor response times
Frequent downtime
May 16, 2015 25
May 16, 2015 26
May 16, 2015 27

Project Management

  • 1.
  • 2.
  • 3.
  • 4.
    SECURITY AND ETHICAL CHALLENGESOF INFORMATION TECHNOLOGY May 16, 2015 4
  • 5.
    Ethical Responsibility Security Ethics and Society EmploymentPrivacy Health Crime Working Conditions Individuality May 16, 2015 5
  • 6.
    Computer Crime • Theunauthorized use, access, modification, and destruction of hardware, software, data, or network resources – Unauthorized release of information – Unauthorized copying of software May 16, 2015 6
  • 7.
    Types of ComputerCrime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses May 16, 2015 7
  • 8.
    Computer Crime (cont..) •Hacking – The obsessive use of computers, or the unauthorized access and use of networked computer systems • Cyber Theft – Involves unauthorized network entry and the fraudulent alteration of computer databases • Unauthorized use at work – May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks • Software Piracy – Unauthorized copying of software May 16, 2015 8
  • 9.
    Privacy Issues • Privacyissues are at the top of the list in regards to ethical use of information. • Loss of control • Misuse of information • Risk to physical privacy • Privacy on the Internet – Users of the Internet are highly visible and open to violations of privacy – Unsecured with no real rules • Privacy laws – Attempt to enforce the privacy of computer-based files and communications – Electronic Communications Privacy Act – Computer Fraud and Abuse Act May 16, 2015 9
  • 10.
  • 11.
    Other Challenges • HealthIssues - Job stress - Muscle damage - Eye strain - Accidents • Individuality – Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities • Working Conditions – IT has eliminated many monotonous, obnoxious tasks, but has created others May 16, 2015 11
  • 12.
    Security Measures Encryption Denial ofService Defenses Fire Walls Monitor E-mail Virus Defenses May 16, 2015 12
  • 13.
  • 14.
    Security Measures (cont..) •Encryption Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users – Involves using special mathematical algorithms to transform digital data in scrambled code – Most widely used method uses a pair of public and private keys unique to each individual • Firewalls – Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion • Security Monitors – Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction May 16, 2015 14
  • 15.
    Security Measures (cont..) •Virus Defenses – Protection may accomplished through • Centralized distribution and updating of antivirus software • Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies • Backup Files Duplicate files of data or programs File retention measures • Biometric Security Measure physical traits that make each individual unique Voice Fingerprints Hand geometryMay 16, 2015 15
  • 16.
  • 17.
    Business and IT Globale-business E-commerce As the 21st century unfolds, many companies are transforming themselves into global powerhouses via major investments in… Other IT initiatives Business managers and professionals must know how to manage this vital organizational function May 16, 2015 17
  • 18.
    Components of ITManagement May 16, 2015 18
  • 19.
    IT Planning Process Majorcomponents of IT planning Strategic development Resource management Technology architecture May 16, 2015 19
  • 20.
    Managing the ITFunction Companies have essential applications on their intranets, without which they cannot function It became apparent that maintaining PCs on a network is very, very expensive The Internet boom inspired businesses to connect their networks Three things recently happened Created an urgent need for centralization May 16, 2015 20
  • 21.
    IT Staff Planning Evaluatingemployees and rewarding good job performance with salary increases, promotions Designing career paths Setting salary and wage levels Recruiting, training, and retaining qualified IS personnel May 16, 2015 21
  • 22.
    Outsourcing The purchase ofgoods or services from third-party partners that were previously provided internally May 16, 2015 22
  • 23.
  • 24.
    Offshoring This location istypically overseas Can be either production or service Relocation of an organization’s business processes to a lower-cost location Digitization of many services Availability of large amounts of reliable and affordable communication infrastructure Growth of services offshoring linked to… May 16, 2015 24
  • 25.
    Failures in ITManagement IT not used effectively Computerizing traditional business processes instead of developing innovative e-business processes IT not used efficiently Poorly managed application development Poor response times Frequent downtime May 16, 2015 25
  • 26.
  • 27.