Principles of Information Systems Eighth Edition

Download Report

Transcript Principles of Information Systems Eighth Edition

Principles of Information
Systems
Eighth Edition
Chapter 14
The Personal and Social Impact of
Computers
Principles and Learning Objectives
• Policies and procedures must be established to
avoid computer waste and mistakes
– Describe some examples of waste and mistakes in
an IS environment, their causes, and possible
solutions
– Identify policies and procedures useful in eliminating
waste and mistakes
– Discuss the principles and limits of an individual’s
right to privacy
Principles of Information Systems, Eighth Edition
2
Principles and Learning Objectives
(continued)
• Computer crime is a serious and rapidly growing
area of concern requiring management attention
– Explain the types and effects of computer crime
– Identify specific measures to prevent computer crime
Principles of Information Systems, Eighth Edition
3
Principles and Learning Objectives
(continued)
• Jobs, equipment, and working conditions must be
designed to avoid negative health effects
– List the important effects of computers on the work
environment
– Identify specific actions that must be taken to ensure
the health and safety of employees
– Outline criteria for the ethical use of information
systems
Principles of Information Systems, Eighth Edition
4
Why Learn About Security, Privacy,
and Ethical Issues in Information
Systems and the Internet?
• Many nontechnical issues associated with ISs
• Human Resource employees need to:
– Prevent computer waste and mistakes
– Avoid privacy violations
– Comply with laws about:
• Collecting customer data
• Monitoring employees
• Employees, IS users, and Internet users need to:
– Avoid crime, fraud, privacy invasion
Principles of Information Systems, Eighth Edition
5
Computer Waste and Mistakes
• Computer waste
– Inappropriate use of computer technology and
resources
• Computer-related mistakes
– Errors, failures, and other computer problems that
make computer output incorrect or not useful
– Caused mostly by human error
Principles of Information Systems, Eighth Edition
6
Computer Waste
• Cause: improper management of information
systems and resources
– Discarding old software and computer systems when
they still have value
– Building and maintaining complex systems that are
never used to their fullest extent
– Using corporate time and technology for personal
use
– Spam
Principles of Information Systems, Eighth Edition
7
Computer-Related Mistakes
• Common causes
–
–
–
–
Failure by users to follow proper procedures
Unclear expectations and a lack of feedback
Program development that contains errors
Incorrect data entry by data-entry clerk
Principles of Information Systems, Eighth Edition
8
Preventing Computer-Related Waste
and Mistakes
• Effective policies and procedures must be:
–
–
–
–
Established สร้าง
Implemented ทา
Monitored ติดตาม
Reviewed ทบทวน
Principles of Information Systems, Eighth Edition
9
Establishing Policies and Procedures
• Establish policies and procedures regarding
efficient acquisition, use, and disposal of systems
and devices
• Identify most common types of computer-related
mistakes
• Training programs for individuals and workgroups
• Manuals and documents on how computer systems
are to be maintained and used
• Approval of certain systems and applications
before they are implemented and used
Principles of Information Systems, Eighth Edition
10
Implementing Policies and Procedures
• Policies often focus on:
– Implementation of source data automation
– Use of data editing to ensure data accuracy and
completeness
– Assignment of clear responsibility for data accuracy
within each information system
• Training is very important for acceptance and
implementation of policies and procedures
Principles of Information Systems, Eighth Edition
11
Monitoring Policies and Procedures
• Monitor routine practices and take corrective action
if necessary
• Implement internal audits to measure actual results
against established goals
• Follow requirements in Sarbanes-Oxley Act
– Requires companies to document underlying
financial data to validate earnings reports
Principles of Information Systems, Eighth Edition
12
Reviewing Policies and Procedures
• Do current policies cover existing practices
adequately?
– Were any problems or opportunities uncovered
during monitoring?
• Does the organization plan any new activities in the
future?
– If so, does it need new policies or procedures on
who will handle them and what must be done?
• Are contingencies and disasters covered?
Principles of Information Systems, Eighth Edition
13
Computer Crime
•
•
•
•
Often defies detection
Amount stolen or diverted can be substantial
Crime is “clean” and nonviolent
Number of IT-related security incidents is
increasing dramatically
• Computer crime is now global
Principles of Information Systems, Eighth Edition
14
The Computer as a Tool to Commit Crime
• Criminals need two capabilities to commit most computer
crimes
– Knowing how to gain access to computer system
– Knowing how to manipulate the system to produce
desired results
• Examples
– Social engineering เทคนิคการเข้าระบบโดยใช้ช่องโหว่จากพฤติกรรมของผูใ้ ช้ เช่น
phishing
– Dumpster diving พฤติกรรมการรื้ อค้นขยะเพื่อหาสิ่ งที่มีประโยชน์ จึงอาจใช้เป็ น
ช่องทางในการหาข่าวและความลับของคู่แข่ง
– Counterfeit and banking fraud using sophisticated
desktop publishing programs and high-quality printers
Principles of Information Systems, Eighth Edition
15
Cyberterrorism
• Cyberterrorist: intimidates or coerces a
government or organization to advance his or her
political or social objectives by launching computerbased attacks against computers, networks, and
information stored on them การข่มขู่หรื อใช้อานาจบังคับให้รฐั บาล
หรื อองค์กรทาตามที่ผกู้ ่อการร้ายต้องการ เช่น การโจมตีต่างๆ
• Homeland Security Department’s Information
Analysis and Infrastructure Protection Directorate
– Serves as governmental focal point for fighting
cyberterrorism
Principles of Information Systems, Eighth Edition
16
Identity Theft
• Imposter obtains personal identification information
such as Social Security or driver’s license numbers
in order to impersonate someone else การปลอมแปลงหรื อ
การได้ขอ้ มูลส่ วนตัวของคนอื่นมา เพื่อจะได้เป็ นคนนั้น
– To obtain credit, merchandise, and services in the
name of the victim
– To have false credentials
• Identity Theft and Assumption Deterrence Act of
1998 passed to fight identity theft
• 9 million victims in 2005
Principles of Information Systems, Eighth Edition
17
The Computer as the Object of Crime
• Crimes fall into several categories
Illegal access and use การเข้าสู่ระบบหรื อใช้งาน แบบไม่ถูกต้อง
Data alteration and destruction การเปลี่ยนข้อมูลและทาลายข้อมูล
Information and equipment theft การขโมยข้อมูลและอุปกรณ์
Software and Internet piracy การลักลอบใช้ซอฟต์แวร์โดยไม่ได้รับ
อนุญาต
– Computer-related scams การโกงต่างๆที่เกี่ยวข้องกับคอมพิวเตอร์
– International computer crime อาชญากรรมคอมพิวเตอร์ขา้ มชาติ
–
–
–
–
Principles of Information Systems, Eighth Edition
18
Illegal Access and Use
• Hacker: learns about and uses computer systems
• Criminal hacker (also called a cracker): gains
unauthorized use or illegal access to computer
systems
• Script bunny: automates the job of crackers พวกที่เขียน
script เองไม่เป็ นแต่ใช้ของคนอื่น เพื่อสร้างความประทับใจให้กบั คนในกลุ่ม
• Insider: employee who comprises corporate
systems
• Malware: software programs that destroy or
damage processing
Principles of Information Systems, Eighth Edition
19
Illegal Access and Use (continued)
• Virus: program file capable of attaching to disks or
other files and replicating itself repeatedly
• Worm: parasitic computer program that can create
copies of itself on infected computer or send copies
to other computers via a network
Principles of Information Systems, Eighth Edition
20
Illegal Access and Use (continued)
• Trojan horse: program that appears to be useful
but purposefully does something user does not
expect
• Logic bomb: type of Trojan horse that executes
when specific conditions occur
• Variant: modified version of a virus that is
produced by virus’s author or another person
Principles of Information Systems, Eighth Edition
21
Using Antivirus Programs
• Antivirus program: program or utility that prevents
viruses and recovers from them if they infect a
computer
• Tips on using antivirus software
– Run and update antivirus software often
– Scan all diskettes and CDs before using them
– Install software only from a sealed package or
secure, well-known Web site
– Follow careful downloading practices
– If you detect a virus, take immediate action
Principles of Information Systems, Eighth Edition
22
Using Antivirus Programs (continued)
Antivirus software should be used and updated often
Principles of Information Systems, Eighth Edition
23
Information and Equipment Theft
• Obtaining identification numbers and passwords to
steal information or disrupt systems
– Trial and error, password sniffer program
• Software theft
• Computer systems and equipment theft
– Data on equipment is valuable
Principles of Information Systems, Eighth Edition
24
Software and Internet Software Piracy
• Software is protected by copyright laws กฎหมายลิขสิ ทธิ์
• Copyright law violations การละเมิดกฎหมายลิขสิ ทธิ์
– Making additional copies
– Loading the software onto more than one machine
• Software piracy: act of illegally duplicating
software การทาซ้ าซอฟต์แวร์แบบผิดกฎหมาย
• Internet-based software piracy
– Most rapidly expanding type of software piracy and
most difficult form to combat
– Examples: pirate Web sites, auction sites with
counterfeit software, peer-to-peer networks
Principles of Information Systems, Eighth Edition
25
Computer-Related Scams
• Examples of Internet scams โกง
–
–
–
–
–
Get-rich-quick schemes
“Free” vacations with huge hidden costs
Bank fraud
Fake telephone lotteries
Selling worthless penny stocks
• Phishing
– Gaining access to personal information by
redirecting user to fake site
การหลอกลวงทางอินเทอร์เน็ตที่หลอกให้เหยือ่ เข้าไปในเว็บไซต์ปลอม เพื่อกรอกข้อมูล
ส่ วนตัวหรื อเป็ นความลับลงไป
Principles of Information Systems, Eighth Edition
26
International Computer Crime
• Computer crime becomes more complex when it is
committed internationally
• Large percentage of software piracy takes place
across borders
• Threat of terrorists, international drug dealers, and
other criminals using information systems to
launder illegally obtained funds
• Computer Associates International’s CleverPath for
Global Compliance software
Principles of Information Systems, Eighth Edition
27
Preventing Computer-Related Crime
• Efforts to curb computer crime being made by:
–
–
–
–
Private users
Companies
Employees
Public officials
Principles of Information Systems, Eighth Edition
28
Crime Prevention by State and
Federal Agencies
• Computer Fraud and Abuse Act of 1986
– Punishment based on the victim’s dollar loss
• Computer Emergency Response Team (CERT)
ศูนย์ประสานงานการรักษาความปลอดภัยคอมพิวเตอร์
– Responds to network security breaches
– Monitors systems for emerging threats
• Newer and tougher computer crime legislation is
emerging การออกกฎหมายที่เกี่ยวกับอาชญากรรมทางคอมพิวเตอร์
Principles of Information Systems, Eighth Edition
29
Crime Prevention by Corporations
• Public key infrastructure (PKI) เป็ นระบบป้ องกันข้อมูลการสื่ อสาร
ผ่านเครื อข่าย โดยใช้ key คู่ (คือ public keyและprivate key) ในการเข้าและถอดรหัส
ข้อมูล โดยมี Certificate Authority เป็ นผูอ้ อกให้ มีวตั ถุประสงค์เพื่อปกปิ ดข้อมูลให้เป็ น
ความลับในระหว่างการส่ ง-รับข้อมูล
– Allows users of an unsecured public network such
as the Internet to securely and privately exchange
data
– Use of a public and a private cryptographic key pair,
obtained and shared through a trusted authority
• Biometrics: measurement of one of a person’s
traits, whether physical or behavioral
Principles of Information Systems, Eighth Edition
30
Crime Prevention by Corporations
(continued)
•
•
•
•
เพิ่ม ลบ เปลี่ยนข้อมูลที่นาเข้าระบบ เช่น การลบข้อมูลการขาดเรี ยน
เปลี่ยนแปลงหรื อพัฒนาระบบเพื่อใช้ก่ออาชญากรรม เช่นการเปลี่ยนโปรแกรมคานวณดอกเบี้ยเงินฝากของธนาคาร
เลือกหรื อเปลี่ยนแปลงแฟ้ มข้อมูล เช่น การเปลี่ยนเกรดจาก C เป็ น A
การใช้งานระบบคอมพิวเตอร์เพื่อก่ออาชญากรรม เช่น ลอบเข้าระบบของรัฐบาล
Table 14.3: Common Methods Used to Commit Computer Crimes
Principles of Information Systems, Eighth Edition
31
Crime Prevention by Corporations
(continued)
5. ทาให้ผลลัพธ์ที่ได้ออกมาไม่ถูกต้องหรื อนาไปใช้ในการที่ผดิ เช่น การขโมยข้อมูลลูกค้าจากถังขยะของบริ ษทั
6. การขโมยทรัพยากรต่างๆ เช่น hardware software และเวลา เช่น การcopyโปรแกรมมาใช้งานโดยไม่จ่ายเงิน
7. ขายสิ นค้าที่ไม่มีค่าบนอินเทอร์เน็ต เช่น การส่ง e-mail ขายของที่ไม่มีค่าหรื อไม่มีประโยชน์
8. การ blackmail ลักลอบนาข้อมูลที่เป็ นความลับหรื อมีประโยชน์มาเปิ ดเผย
9. การ blackmail โดยการข่มขู่เพื่อให้ได้สิ่งที่ตอ้ งการเรี ยกร้อง
Table 14.3: Common Methods Used to Commit Computer Crimes
(continued)
Principles of Information Systems, Eighth Edition
32
Using Intrusion Detection Software
• Intrusion detection system (IDS) ระบบตรวจจับการบุกรุ ก คิด
ตาม ตรวจสอบ
– Monitors system and network resources ติดตามดูแลระบบ
และทรัพยากรเครื อข่าย
– Notifies network security personnel when it senses a
possible intrusion, such as:
• Repeated failed logon attempts
• Attempts to download a program to a server
• Access to a system at unusual hours
– Can provide false alarms
– E-mail or voice message alerts may be missed
Principles of Information Systems, Eighth Edition
33
Using Managed Security Service
Providers (MSSPs)
• Managed security service provider (MSSP):
organization that monitors, manages, and
maintains network security for both hardware and
software for its client companies
บริ ษทั หรื อผูใ้ ห้บริ การดูแลรักษาความปลอดภัยข้อมูลขององค์กร และป้ องกันภัยจากการ
ใช้อินเทอร์เน็ต
– Sifts through alarms and alerts from all monitoring
systems
– May provide scanning, blocking, and filtering
capabilities
– Useful for small and midsized companies
Principles of Information Systems, Eighth Edition
34
Internet Laws for Libel and Protection
of Decency
• Filtering software
– Screens Internet content to protect children
– Prevents children from sending personal information
over e-mail or through chat groups
• Internet Content Rating Association (ICRA) rating
system for Web sites
• Children’s Internet Protection Act (CIPA)
– Requires filters in federally funded libraries
Principles of Information Systems, Eighth Edition
35
Internet Laws for Libel and Protection
of Decency (continued)
• Libel: publishing an intentionally false written
statement that is damaging to a person’s reputation
• Can online services be sued for libel for content
that someone else publishes on their service?
• การหมิ่นประมาททางอินเทอร์เน็ต ฟ้ องร้องได้
Principles of Information Systems, Eighth Edition
36
Preventing Crime on the Internet
• Develop effective Internet usage and security
policies
• Use a stand-alone firewall with network monitoring
capabilities
• Deploy intrusion detection systems, monitor them,
and follow up on their alarms
• Monitor managers’ and employees’ use of Internet
• Use Internet security specialists to perform audits
of all Internet and network activities
Principles of Information Systems, Eighth Edition
37
Privacy Issues
• With information systems, privacy deals with the
collection and use or misuse of data
• More and more information on all of us is being
collected, stored, used, and shared among
organizations
• Who owns this information and knowledge?
Principles of Information Systems, Eighth Edition
38
Privacy and the Federal Government
• Data collectors
– U.S. federal government
– State and local governments
– Profit and nonprofit organizations
• U.S. National Security Agency (NSA)’s program to
wiretap telephone and Internet traffic of U.S.
residents
Principles of Information Systems, Eighth Edition
39
Privacy at Work
• Rights of workers who want their privacy versus
interests of companies that demand to know more
about their employees
• Workers can be closely monitored via computer
technology
– Track every keystroke made by a user
– Determine what workers are doing while at the
keyboard
– Estimate how many breaks workers are taking
• Many workers consider monitoring dehumanizing
Principles of Information Systems, Eighth Edition
40
E-Mail Privacy
• Federal law permits employers to monitor e-mail
sent and received by employees
• E-mail messages that have been erased from hard
disks can be retrieved and used in lawsuits
• Use of e-mail among public officials might violate
“open meeting” laws
Principles of Information Systems, Eighth Edition
41
Privacy and the Internet
• Huge potential for privacy invasion on the Internet
– E-mail messages
– Visiting a Web site
– Buying products over the Internet
• Platform for Privacy Preferences (P3P): screening
technology นโยบายในการคุม้ ครองสิ ทธิส่วนบุคคล เช่น cookies
• Children’s Online Privacy Protection Act (COPPA),
1998: requires privacy policies and parental
consent
• Potential dangers on social networking Web sites
Principles of Information Systems, Eighth Edition
42
Fairness in Information Use
Table 14.4: The Right to Know and the Ability to Decide
Principles of Information Systems, Eighth Edition
43
Fairness in Information Use
(continued)
• The Privacy Act of 1974: provides privacy
protection from federal agencies
• Gramm-Leach-Bliley Act: requires financial
institutions to protect customers’ nonpublic data
• USA Patriot Act: allows law enforcement and
intelligence agencies to gather private information
• Other laws regulate fax advertisements, credit-card
bureaus, the IRS, video rental stores,
telemarketers, etc.
Principles of Information Systems, Eighth Edition
44
Corporate Privacy Policies
• Should address a customer’s knowledge, control,
notice, and consent over storage and use of
information
• May cover who has access to private data and
when it may be used
• A good database design practice is to assign a
single unique identifier to each customer
Principles of Information Systems, Eighth Edition
45
Individual Efforts to Protect Privacy
• Find out what is stored about you in existing
databases เก็บข้อมูลเกี่ยวกับตนเองอะไรไว้บา้ งในฐานข้อมูล
• Be careful when you share information about yourself
ระมัดระวังการshareข้อมูลของตนเอง
• Be proactive to protect your privacy ป้ องกันข้อมูลส่ วนตัวของ
ตนเอง
• When purchasing anything from a Web site, make
sure that you safeguard your credit card numbers,
passwords, and personal information เมื่อมีการซื้อขายในเว็บไซต์
ให้ระมัดระวังเกี่ยวกับข้อมูลให้มาก เช่นข้อมูลส่ วนตัว เลขที่บตั รเครดิต รหัสผ่าน
Principles of Information Systems, Eighth Edition
46
The Work Environment
• Use of computer-based information systems has
changed the workforce
– Jobs that require IS literacy have increased
– Less-skilled positions have decreased
• Computer technology and information systems
have opened up numerous avenues to
professionals and nonprofessionals
• Despite increasing productivity and efficiency,
computers and information systems can raise other
concerns
Principles of Information Systems, Eighth Edition
47
Health Concerns
• Occupational stress ความเครี ยด
• Repetitive stress injury (RSI) อาการที่เกิดจากการนัง่ ทางานอยูห่ น้า
เครื่ องนานๆ แบบไม่ถูกสุ ขลักษณะ
• Carpal tunnel syndrome (CTS) เส้นประสาทที่ขอ้ มือถูกกด
• Emissions from improperly maintained and used
equipment ใช้อุปกรณ์หรื อเครื่ องมือไม่เหมาะสม
• Increase in traffic accidents due to drivers using
cell phones, laptops, or other devices while driving
ใช้มือถือ โน๊ตบุ๊คหรื ออุปกรณ์อื่นๆ ขณะขับรถ
Principles of Information Systems, Eighth Edition
48
Avoiding Health and Environment
Problems
• Work stressors: hazardous activities associated
with unfavorable conditions of a poorly designed
work environment ตัวก่อความเครี ยดในงาน, ความเครี ยด ,แรงกดดัน
ความต้องการสาเร็ จ เป็ นต้น
• Ergonomics: science of designing machines,
products, and systems to maximize safety, comfort,
and efficiency of people who use them การยศาสตร์
• Employers, individuals, and hardware
manufacturing companies can take steps to reduce
RSI and develop a better work environment
Principles of Information Systems, Eighth Edition
49
Avoiding Health and Environment
Problems (continued)
Research has shown that developing certain ergonomically correct habits can
reduce the risk of RSI when using a computer
Principles of Information Systems, Eighth Edition
50
Ethical Issues in Information Systems
• Laws do not provide a complete guide to ethical
behavior
• Many IS-related organizations have codes of ethics
for their members
• American Computing Machinery (ACM): oldest
computing society founded in 1947
• ACM’s code of ethics and professional conduct
– Contribute to society and human well-being
– Avoid harm to others
– Be honest and trustworthy
Principles of Information Systems, Eighth Edition
51
Ethical Issues in Information Systems
(continued)
• ACM’s code of ethics and professional conduct
(continued)
– Be fair and take action not to discriminate
– Honor property rights including copyrights and
patents
– Give proper credit for intellectual property
– Respect the privacy of others
– Honor confidentiality
Principles of Information Systems, Eighth Edition
52
Summary
• Computer waste: inappropriate use of computer
technology and resources
• Computer-related mistakes: errors, failures, and
other computer problems that make computer
output incorrect or not useful; caused mostly by
human error
• Preventing computer-related waste and mistakes
requires establishing, implementing, monitoring,
and reviewing effective policies and procedures
Principles of Information Systems, Eighth Edition
53
Summary (continued)
• Criminals need two capabilities to commit most
computer crimes: knowing how to gain access to a
computer system and knowing how to manipulate
the system to produce desired results
• Crimes in which computer is the tool:
cyberterrorism, identity theft, etc.
• Crimes in which computer is the object of crime:
illegal access and use, data alteration and
destruction, information and equipment theft,
software and Internet piracy, computer-related
scams, and international computer crime
Principles of Information Systems, Eighth Edition
54
Summary (continued)
• Efforts to curb computer crime are being made by
state and federal agencies, corporations, and
individuals
• With information systems, privacy deals with the
collection and use or misuse of data
• Ergonomics: science of designing machines,
products, and systems to maximize safety, comfort,
and efficiency of people who use them
• Many IS-related organizations have codes of ethics
for their members
Principles of Information Systems, Eighth Edition
55