SlideShare a Scribd company logo
Security and ethical issues in IT
Arber Hoxhallari
iiiiiiiiiiii
Overview
• Ethical responsibility
• Computer crime
• Privacy issues
• Health issues
• Other issues
Ethical responsibility
• Business ethics - is concerned with the
numerous ethical questions that managers must confront
as part of their daily business decision-making.
• Technology ethics - This ethical dimension
deals specifically with the ethics of the use of
technology.
• Ethical Guidelines - Acting with integrity,
Increasing your professional competence, Setting high
standards of personal performance, Accepting
responsibility for your work, Advancing the health,
privacy, and general welfare of the public.
Computer crime
The Association of Information Technology
Professionals defines computer crime as including:
• The unauthorized use, access, modification, and
destruction of hardware, software, data, or network
resources.
• The unauthorized release of information.
• The unauthorized copying of software.
• Denying an end user access to his or her own hardware,
software, data, or network resources.
• Using or conspiring to use computer or network resources
to illegally obtain information or tangible property.
Privacy issues
• Accessing individuals’ private e-
mail conversations and computer
records
• Always “knowing” people’s
location
• Computer matching
• Unauthorized personal files
Health issues
The use of IT in the workplace raises a variety of
health issues. Heavy use of computers is reportedly
causing health problems such as:
• Job stress
• Damaged arm and neck muscles
• Eye strain
• Radiation exposure
• Death by computer-caused accidents
Other challenges
• Employment
Challenges.
• Computer Monitoring
• Challenges in Working
Conditions
• Challenges to
Individuality
Security Management Tools
Internetworked Security defense
• Encryption
• Firewalls
• e – mail monitoring
• Virus protection
Other Security measures
• Passwords
• Backup files
• Biometric Security
• Computer failures control
• Disaster recovery
Thank You !
Questions ?
Thank You !
Questions ?

More Related Content

What's hot

Information system and security control
Information system and security controlInformation system and security control
Information system and security control
Cheng Olayvar
 
Securing information system
Securing information systemSecuring information system
Securing information system
Tanjim Rasul
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
Aqib Syed
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
Prof. Othman Alsalloum
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
Sukanya Ben
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
Sammer Qader
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
Dhani Ahmad
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
Masudur Rahman
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 

What's hot (19)

Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
information security technology
information security technologyinformation security technology
information security technology
 

Viewers also liked

lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
Hamid Zainudin
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
Frances Coronel
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
SMITA V MORE
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
BenRay95
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Viewers also liked (12)

lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Security and ethical issues - Arber Hoxhallari

Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
GagandeepSinghJass
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
Silvia Afrima Chandra
 
Shak taha
Shak tahaShak taha
Shak taha
Shakir Taha
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
sameersheikh
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
RogerPrimo2
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
Online ethics
Online ethicsOnline ethics
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
GC University Fsd
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
Faraz Ahmed
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
CallplanetsDeveloper
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
Muhammad Rawaha Saleem
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
balewayalew
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
SATYAJIT58
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in an
Melanietcastillo
 

Similar to Security and ethical issues - Arber Hoxhallari (20)

Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Shak taha
Shak tahaShak taha
Shak taha
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in an
 

More from Arber Hoxhallari

Social Networking - Arber Hoxhallari
Social Networking - Arber HoxhallariSocial Networking - Arber Hoxhallari
Social Networking - Arber Hoxhallari
Arber Hoxhallari
 
Elscint and the worldwide medical imaging industry - Arber Hoxhallari
Elscint and the worldwide medical imaging industry - Arber HoxhallariElscint and the worldwide medical imaging industry - Arber Hoxhallari
Elscint and the worldwide medical imaging industry - Arber Hoxhallari
Arber Hoxhallari
 
Grameen Bank - Arber Hoxhallari
Grameen Bank - Arber HoxhallariGrameen Bank - Arber Hoxhallari
Grameen Bank - Arber Hoxhallari
Arber Hoxhallari
 
Jomos Schuhfabrik - Arber Hoxhallari
Jomos Schuhfabrik - Arber HoxhallariJomos Schuhfabrik - Arber Hoxhallari
Jomos Schuhfabrik - Arber Hoxhallari
Arber Hoxhallari
 
Training the sales force - Arber Hoxhallari
Training the sales force - Arber HoxhallariTraining the sales force - Arber Hoxhallari
Training the sales force - Arber Hoxhallari
Arber Hoxhallari
 
BMW Group - Arber Hoxhallari
BMW Group - Arber HoxhallariBMW Group - Arber Hoxhallari
BMW Group - Arber Hoxhallari
Arber Hoxhallari
 

More from Arber Hoxhallari (6)

Social Networking - Arber Hoxhallari
Social Networking - Arber HoxhallariSocial Networking - Arber Hoxhallari
Social Networking - Arber Hoxhallari
 
Elscint and the worldwide medical imaging industry - Arber Hoxhallari
Elscint and the worldwide medical imaging industry - Arber HoxhallariElscint and the worldwide medical imaging industry - Arber Hoxhallari
Elscint and the worldwide medical imaging industry - Arber Hoxhallari
 
Grameen Bank - Arber Hoxhallari
Grameen Bank - Arber HoxhallariGrameen Bank - Arber Hoxhallari
Grameen Bank - Arber Hoxhallari
 
Jomos Schuhfabrik - Arber Hoxhallari
Jomos Schuhfabrik - Arber HoxhallariJomos Schuhfabrik - Arber Hoxhallari
Jomos Schuhfabrik - Arber Hoxhallari
 
Training the sales force - Arber Hoxhallari
Training the sales force - Arber HoxhallariTraining the sales force - Arber Hoxhallari
Training the sales force - Arber Hoxhallari
 
BMW Group - Arber Hoxhallari
BMW Group - Arber HoxhallariBMW Group - Arber Hoxhallari
BMW Group - Arber Hoxhallari
 

Recently uploaded

Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 

Recently uploaded (20)

Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 

Security and ethical issues - Arber Hoxhallari

  • 1. Security and ethical issues in IT Arber Hoxhallari iiiiiiiiiiii
  • 2. Overview • Ethical responsibility • Computer crime • Privacy issues • Health issues • Other issues
  • 3. Ethical responsibility • Business ethics - is concerned with the numerous ethical questions that managers must confront as part of their daily business decision-making. • Technology ethics - This ethical dimension deals specifically with the ethics of the use of technology. • Ethical Guidelines - Acting with integrity, Increasing your professional competence, Setting high standards of personal performance, Accepting responsibility for your work, Advancing the health, privacy, and general welfare of the public.
  • 4. Computer crime The Association of Information Technology Professionals defines computer crime as including: • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources. • The unauthorized release of information. • The unauthorized copying of software. • Denying an end user access to his or her own hardware, software, data, or network resources. • Using or conspiring to use computer or network resources to illegally obtain information or tangible property.
  • 5. Privacy issues • Accessing individuals’ private e- mail conversations and computer records • Always “knowing” people’s location • Computer matching • Unauthorized personal files
  • 6. Health issues The use of IT in the workplace raises a variety of health issues. Heavy use of computers is reportedly causing health problems such as: • Job stress • Damaged arm and neck muscles • Eye strain • Radiation exposure • Death by computer-caused accidents
  • 7. Other challenges • Employment Challenges. • Computer Monitoring • Challenges in Working Conditions • Challenges to Individuality
  • 8. Security Management Tools Internetworked Security defense • Encryption • Firewalls • e – mail monitoring • Virus protection Other Security measures • Passwords • Backup files • Biometric Security • Computer failures control • Disaster recovery