1 / 24

Ethical Issues in Information Systems and the Internet

Ethical Issues in Information Systems and the Internet. Kholoud AlSafadi 120050375. Computer Waste & Mistakes. Social Issues in Information Systems. Computer Waste. Discard technology Unused systems Personal use of corporate time and technology. Preventing Computer Waste and Mistakes.

Download Presentation

Ethical Issues in Information Systems and the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethical Issues in Information Systems and the Internet KholoudAlSafadi 120050375

  2. Computer Waste & Mistakes

  3. Social Issues in Information Systems

  4. Computer Waste • Discard technology • Unused systems • Personal use of corporate time and technology

  5. Preventing Computer Waste and Mistakes • Establish Policies and Procedures • Implement Policies and Procedures • Monitor Policies and Procedures • Review Policies and Procedures

  6. Types of Computer-Related Mistakes

  7. Useful Policies to Eliminate Waste and Mistakes

  8. Computer Crime

  9. Number of Incidents Reported to CERT

  10. Computer Crime and Security Survey

  11. The Computer as a Tool to Commit Crime • Social engineering • Dumpster diving • Identity theft • Cyberterrorism

  12. Computers as Objects of Crime • Illegal access and use • Hackers • Crackers • Information and equipment theft • Software and Internet piracy • Computer-related scams • International computer crime

  13. How to Respond to a Security Incident

  14. Data Alteration and Destruction • Virus • Worm • Logic bomb • Trojan horse

  15. The Six Computer Incidents with the Greatest Worldwide Economic Impact

  16. Top Viruses – July 2002

  17. Preventing Computer-Related Crime • Crime prevention by state and federal agencies • Crime prevention by corporations • Public Key Infrastructure (PKI) • Biometrics • Anti-virus programs

  18. Preventing Computer-Related Crime • Intrusion Detection Software • Managed Security Service Providers (MSSPs) • Internet Laws for Libel and Protection of Decency

  19. Preventing Crime on the Internet • Develop effective Internet and security policies • Use a stand-alone firewall with network monitoring capabilities • Monitor managers and employees • Use Internet security specialists to perform audits

  20. Common Methods Used to Commit Computer Crimes

  21. How to Protect Your Corporate Data from Hackers

  22. Privacy

  23. Privacy Issues • Privacy and the Federal Government • Privacy at work • E-mail privacy • Privacy and the Internet

  24. The Right to Know and the Ability to Decide

More Related