1 INFORMATION SYSTEM INFORMATIONSYSTEM BUSINESSCHALLENGE BUSINESSSOLUTIONS...

57
1 INFORMATION SYSTEM INFORMATION SYSTEM INFORMATION INFORMATION SYSTEM SYSTEM BUSINESS BUSINESS CHALLENGE CHALLENGE BUSINESS BUSINESS SOLUTIONS SOLUTIONS MANAGEMENT MANAGEMENT INFORMATION INFORMATION TECHNOLOGY TECHNOLOGY ORGANIZATION ORGANIZATION 16. 2 BUILDING SYSTEMS TO FULFILL INFORMATION BUILDING SYSTEMS TO FULFILL INFORMATION REQUIREMENTS REQUIREMENTS INTEGRATING EXISTING SYSTEMS INTEGRATING EXISTING SYSTEMS Chapter 9 The Personal and Social Impact of Computers Ethical and Social Issues of Information Systems

Transcript of 1 INFORMATION SYSTEM INFORMATIONSYSTEM BUSINESSCHALLENGE BUSINESSSOLUTIONS...

1

INFORMATION SYSTEMINFORMATION SYSTEMINFORMATION SYSTEMINFORMATION SYSTEM

INFORMATION INFORMATION

SYSTEMSYSTEM

BUSINESS BUSINESS

CHALLENGECHALLENGE

BUSINESS BUSINESS

SOLUTIONSSOLUTIONS

MANAGEMENTMANAGEMENT

INFORMATIONINFORMATION

TECHNOLOGYTECHNOLOGY

ORGANIZATIONORGANIZATION

16.2

BUILDING SYSTEMS TO FULFILL INFORMATION BUILDING SYSTEMS TO FULFILL INFORMATION REQUIREMENTSREQUIREMENTS

INTEGRATING EXISTING SYSTEMSINTEGRATING EXISTING SYSTEMS

Chapter 9

The Personal and Social Impact of Computers

Ethical and Social Issues of Information Systems

Fundamentals of Information Systems, Fifth Edition 2

The Work Environment

• Computer technology and information systems

– Have opened up numerous avenues to professionals and nonprofessionals

• Despite increases in productivity and efficiency, computers and information systems can raise other concerns

3

Ethical Issues in Information Systems

What are Ethics?Principles of right and wrong used by individuals as free moral agents to guide behavior.

Business ethics means a great deal more than obeying the law

Code of ethicsStates the principles and core values that are

essential to a set of people and thus governs their behavior

4

Reading Email and Files

• Shared labs make it easy to find files and e-mail messages belonging to others– Is it ethically all right to read them? – Should there be regulations to prevent this?

5

Why are Ethics Important to MIS?

• few laws in place

• laws are not tested

• impacts of technology not always foreseeable

• new concerns are always emerging

6

Ethical Principles(Ethical bases for IT decision making)

Golden Rule

Kant’s Categorical Imperative

Descartes Rule of Change

Utilitarianism

Risk Aversion Principle

No free lunch

Fundamentals of Information Systems, Fifth Edition 7

Privacy Issues• Issue of privacy

– Deals with this right to be left alone or to be withdrawn from public view

• More data and information are produced and used today than ever before– “Who owns this information and knowledge?”

• What do companies do with the data they have about you?• When can they share it?

8

Privacy and the Federal Government

• U.S. federal government– Perhaps the largest collector of data

(Patriot Act ?)

• European Union – Has a data-protection directive that requires firms

transporting data across national boundaries to have certain privacy procedures in place

Fundamentals of Information Systems, Fifth Edition 9

Privacy at Work• There is conflict between rights of workers who

want their privacy and the interests of companies that demand to know more about their employees

• Nearly one-third of companies have fired an employee for violating corporate e-mail policies

Fundamentals of Information Systems, Fifth Edition 10

E-Mail Privacy• Federal law

– Permits employers to monitor e-mail sent and received by employees

• E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits

• Use of e-mail among public officials might violate “open meeting” laws

Instant Messaging Privacy• Using instant messaging (IM) to send and receive

messages, files, and images introduces the same privacy issues associated with e-mail

• Do not send personal or private IMs at work

Fundamentals of Information Systems, Fifth Edition 11

Privacy and Personal Sensing Devices

• RFID tags– Essentially microchips with antenna, are

embedded in many of the products we buy– Generate radio transmissions that, if appropriate

measures are not taken, can lead to potential privacy concerns

Also see Perspective: RFID tags: Big Brother in small packages http://news.cnet.com/2010-1069-980325.html

See blocks numbered 035 and 048 in Supplemental Material

Fundamentals of Information Systems, Fifth Edition 12

Privacy and the Internet

• Platform for Privacy Preferences (P3P)– Screening technology that shields users from

Web sites that do not provide the level of privacy protection they desire

• Children’s Online Privacy Protection Act (COPPA), 1998– Require privacy policies and parental consent

Fundamentals of Information Systems, Fifth Edition 13

Fairness in Information Use

• Laws passed regarding a person’s right to privacy– The Privacy Act of 1974– Gramm-Leach-Bliley Act– USA Patriot Act– Other Federal Privacy Laws

Fundamentals of Information Systems, Fifth Edition 14

Fairness in Information Use (continued)

Fundamentals of Information Systems, Fifth Edition 15

Corporate Privacy Policies

• Invasions of privacy – Can hurt business, turn away customers, and

dramatically reduce revenues and profits• Multinational companies

– Face an extremely difficult challenge in implementing data collection and dissemination processes and policies

Fundamentals of Information Systems, Fifth Edition 16

Individual Efforts to Protect Privacy

• Find out what is stored about you in existing databases

• Be careful when you share information about yourself

• Be proactive to protect your privacy

• When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information

Fundamentals of Information Systems, Fifth Edition 17

Health Concerns / Health Effects

• Working with computers – Can cause occupational stress

• Training and counseling– Can often help the employee and deter problems

• Carpal tunnel syndrome (CTS) – Aggravation of the pathway for the nerves that

travel through the wrist (carpal tunnel)– What about RSI?

Fundamentals of Information Systems, Fifth Edition 18

Avoiding Health and Environmental Problems

• Many computer-related health problems

– Are caused by a poorly designed work environment

• Ergonomics

– Science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them

19

Telecommuting

• Telecommuting could substantially reduce pollution and commute times

• But it also reduces interpersonal contact

• Should society encourage move from traditional work to telecommuting?

20

Electronic Monitoring

• Should companies read employee email?

• Under what circumstances?

• Should they monitor PC use?

21

Job Loss

• IT threatens to eliminate a substantial number of jobs.

• Will this really happen?

• If so, what do we do to compensate for it?

22

Product Liability

• Are programmers responsible for damage caused by programming errors?

• Will this slow development of certain types of software?

23

Personal Use of Office PCs

• Can employees use office computers to play games outside work hours?

• What about surfing the net?

• Learning new software?

24

Intellectual Property Rights

• Is it ethical to make copies of Office 97?

• Who owns software created by companies?

25

What caused the problems?

What are the ethical issues?

Which ethical principles can be applied?

When Analyzing a Case -- Ask . . .

26

Controlling Information Systems Importance of IS

Information Systems and the information stored by these systems are critical to any organization. The loss of an IS or organizational information could be

a disaster.

27

Why are automated information systems so vulnerable?

• Concentration of data• Data has no physical (non-electronic) form• Data can be destroyed quickly• System procedures are invisible and

difficult to audit

28

Sources of Vulnerability• Disasters• Crime, Security Breaches• Unintentional Errors

Computer Waste and Mistakes• Computer waste

– Inappropriate use of computer technology and resources• Computer-related mistakes

– Errors, failures, and other computer problems that make computer output incorrect or not useful

Fundamentals of Information Systems, Fifth Edition 29

Computer Waste• Discarding old software and even complete computer

systems when they still have value

• Building and maintaining complex systems that are never used to their fullest extent

• Using corporate time and technology for personal use

• Spam

Computer-Related Mistakes• Causes:

– Failure by users to follow proper procedures– Unclear expectations and a lack of feedback– Program development that contains errors– Incorrect data entry by data-entry clerk

Fundamentals of Information Systems, Fifth Edition

30

Preventing Computer-Related Waste and Mistakes

• Preventing waste and mistakes involves:– Establishing policies and procedures– Implementing policies and procedures– Monitoring policies and procedures– Reviewing policies and procedures

Fundamentals of Information Systems, Fifth Edition 31

Implementing Policies and Procedures• Establish policies and procedures regarding efficient acquisition, use,

and disposal of systems and devices• Training programs for individuals and workgroups• Manuals and documents on how computer systems are to be

maintained and used• Approval of certain systems and applications to ensure compatibility

and cost-effectiveness

• Policies often focus on:– Implementation of source data automation and the use of data

editing to ensure data accuracy and completeness– Assignment of clear responsibility for data accuracy within each

information system• Training

– Key aspect of implementation

Fundamentals of Information Systems, Fifth Edition

32

Monitoring Policies and Procedures

• Monitor routine practices and take corrective action if necessary

• Implement internal audits to measure actual results against established goals

Reviewing Policies and Procedures• During review, people should ask the following questions:

– Do current policies cover existing practices adequately?

– Does the organization plan any new activities in the future?

– Are contingencies and disasters covered?

Fundamentals of Information Systems, Fifth Edition

33

Computer Crime

• Financial fraud, followed by virus attacks– The leading cause of financial loss from

computer incidents

• Average annual loss from computer incidents is $350,424

• Computer crime is now global

Fundamentals of Information Systems, Fifth Edition 34

The Computer as a Tool to Commit Crime• Social engineering

– Using social skills to get computer users to provide information to access an information system or its data

• Dumpster diving– Going through the trash cans of an organization to find confidential information, including

information needed to access an information system• Cyberterrorist

– Intimidates or coerces a government to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them

• Identity Theft– Imposter obtains key pieces of personal identification information in order to impersonate

someone else• Consumers can help protect themselves by:

– Regularly checking their credit reports with major credit bureaus– Following up with creditors if their bills do not arrive on time– Not revealing any personal information in response to unsolicited e-mail or phone calls

– Internet Gambling– Size of the online gambling market is not known

• Estimate is that $10–20 billion is wagered on online poker alone each year– Revenues generated by Internet gambling

• Represent a major untapped source of income for the state and federal governments

Fundamentals of Information Systems, Fifth Edition

35

The Computer as the Object of Crime

• Crimes fall into several categories such as:– Illegal access and use– Data alteration and destruction– Information and equipment theft– Software and Internet piracy– Computer-related scams– International computer crime

Fundamentals of Information Systems, Fifth Edition

36

Illegal Access and Use• Hacker

– Learns about and uses computer systems • Criminal hacker (cracker)

– Gains unauthorized use or illegal access to computer systems• Script bunnies

– Automate the job of crackers• Insider

– Employee who compromises corporate systems

• Virus

– Computer program file capable of attaching to disks or other files and replicating itself repeatedly

• Worm

– Parasitic computer programs that replicate but do not infect other computer program files

• Trojan horse

– Disguises itself as a useful application or game and purposefully does something the user does not expect

37

Types of VirusesComputer viruses are small programs that spread through computer systems

without the users’ knowledge or consent– File-Based Viruses

• attack a type of file (e.g., *.exe or *.com)– Boot Sector Viruses

• come alive whenever the system starts– Memory Resident Viruses

• can be either of the above• stay in memory to work continually

What Do Viruses Do?• Search for a new host• Infect the new host• Execute at some time or in some situation to do

something– print a message– erase data

38

How to Prevent Virus Infections

• Use virus detection software continuously– Runs in the background to protect your computer from dangers

lurking on the Internet and other possible sources of infected files

• Tips on using antivirus software:– Run and update antivirus software often– Scan all removable media before use– Install software only from a sealed package or secure, well-

known Web site– Follow careful downloading practices– If you detect a virus, take immediate actionScan periodically for

viruses– Be careful when sharing media– Never start your computer with removable media

Fundamentals of Information Systems, Fifth Edition

39

Spyware• Software installed on a personal computer to:

– Intercept or take partial control over the user’s interaction with the computer without knowledge or permission of the user

Fundamentals of Information Systems, Fifth Edition 40

Information and Equipment Theft• Data and information

– Assets or goods that can also be stolen

• Password sniffer

– Small program hidden in a network or a computer system that records identification numbers and passwords

Safe Disposal of Personal Computers• Deleting files and emptying the Recycle Bin does not make it

impossible for determined individuals to view the data

• To make data unrecoverable use disk-wiping software utilities that overwrite all sectors of your disk drive

Fundamentals of Information Systems, Fifth Edition 41

Patent and Copyright Violations• Software piracy

– The act of unauthorized copying or distribution of copyrighted software

– Penalties can be severe• Patent infringement

– Occurs when someone makes unauthorized use of another’s patent

Computer-Related Scams• To avoid becoming a scam victim:

– Do not agree to anything in a high-pressure meeting or seminar

– Do not judge a company based on appearances

– Avoid any plan that pays commissions simply for recruiting additional distributors

– Do your homework

Fundamentals of Information Systems, Fifth Edition 42

Preventing Computer-Related Crime• All states have passed computer crime legislation• Some believe that these laws are not effective because:

– Companies do not always actively detect and pursue computer crime– Security is inadequate– Convicted criminals are not severely punished

Crime Prevention by State and Federal Agencies• State and federal agencies have begun aggressive attacks on computer criminals• Computer Fraud and Abuse Act, 1986

– Mandates punishment based on the victim’s dollar loss• Computer Emergency Response Team (CERT)

– Responds to network security breaches and monitors systems for emerging threats

International Computer Crime• Computer crime is an international issue

• Software industry loses about $11 to $12 billion in revenue to software piracy annually

Fundamentals of Information Systems, Fifth Edition

43

Crime Prevention by Corporations• Encryption

– The process of converting an original electronic message into a form that can be understood only by the intended recipients

• To protect your computer from criminal hackers:

– Install strong user authentication and encryption capabilities on your firewall

– Install the latest security patches

– Disable guest accounts and null user accounts

– Turn audit trails on

Using Intrusion Detection Software• Monitors system and network resources and notifies network security

personnel when it senses a possible intrusion

• Can provide false alarms that result in wasted effort

Fundamentals of Information Systems, Fifth Edition 44

Security Dashboard• Employed to:

– Provide a comprehensive display on a single computer screen of all the vital data related to an organization’s security defenses

• Data comes from a variety of sources including:

– Firewalls

– Applications

– Servers

– Other software and hardware devices

Using Managed Security Service Providers (MSSPs)

• MSSPs– Monitors, manages, and maintains network security for both hardware and

software – Provide vulnerability scanning and Web blocking/filtering capabilities

Fundamentals of Information Systems, Fifth Edition

45

Filtering and Classifying Internet Content• Filtering software

– Screens Internet content

– Used by companies to prevent employees from visiting nonwork-related Web sites

• Internet Content Rating Association (ICRA)

– Goals are to protect children from potentially harmful material, while also safeguarding free speech on the Internet

Fundamentals of Information Systems, Fifth Edition

46

Internet Libel Concerns• Companies should be aware that:

– Publishing Internet content to the world can subject them to different countries’ laws

• Geolocation tools– Match user’s IP address with outside information to determine the actual

geographic location of the online user• Individuals

– Must be careful what they post on the Internet to avoid libel charges

Preventing Crime on the Internet• Develop effective Internet usage and security policies for all employees

• Use a stand-alone firewall (hardware and software) with network monitoring capabilities

• Deploy intrusion detection systems, monitor them, and follow up on their alarms

• Monitor managers and employees to make sure that they are using the Internet for business purposes

• Use Internet security specialists to perform audits of all Internet and network activities

47

So What?

According to McPartlin’s (1992) studyof Fortune 1000 firms:

– average 9 (4-hour) disruptions per year

– lost productivity (37 million hours)

– customer dissatisfaction

– unnecessary cost ($4 billion U.S.)

48

How do firms minimize the risks?

• Disaster Recovery Plan (responsive)

• “Fault Tolerant” Systems (responsive)

• Controls (preventative)

49

General Controls

• Control over system development

• Control over changes to systems

• Hardware security

• Operations controls

• Network controls (firewalls)

50

Application Controls

• Microsoft Access can control:

– referential integrity

– invalid entries

– unusual entries

– access to data

51

What is IS auditing?

• Identifies all controls governing an IS and assesses their effectiveness

• Lists control weaknesses, • estimates probabilities of occurrence,• assesses financial and organizational impacts

• Should include data quality audit

52

Management Challenges

• How can large distributed multi-user networks be controlled?– remote access by “thousands of workers”

• Risk analysis is highly subjective

– What is the risk of a flood?How much do we spend to prepare?

53

Assessing ControlsQuestions to Ask

• How important is the xxxxx System?

• Identify control weaknesses in xxxxx.

• How would you design controls to deal with these weaknesses?

54

Computer SecurityHuman Errors• in data input, procedures, controlSoftware errors• bugs in programs

Physical threats• fire, flood, other natural disaster• power failure• hardware malfunctions

Computer CrimeThe deliberate theft or criminal destruction of data or services: the use of hardware, software or date for illegal activities; or the illegal use of computersHackersPeople who gain unauthorized access to a computer network for profit, criminal mischief, or personal reasons.VirusesA rogue software program that spreads rampantly through computer systems, destroying data or causing the systems to become congested and malfunctionCorporate espionageTheft of valuable, confidential data

55

ControlsGeneral Controls• Supervision• Segregation of Duties• Procedures• Documentation• restricting access• checking for machine malfunction• backup and recovery procedures• quality control in software development

Application Controls• input• output• processing

56

Summary• Computer waste

– Inappropriate use of computer technology and resources in both the public and private sectors

• Some crimes use computers as tools• Computer crimes target computer systems and include:

– Illegal access to computer systems by criminal hackers– Alteration and destruction of data and programs by viruses– Theft of computer resources

• Because of increased computer use greater emphasis is placed on the prevention and detection of computer crime

• Although most companies use data files for legitimate, justifiable purposes opportunities for invasion of privacy abound

• A business should:Develop a clear and thorough policy about privacy rights for

customers, including database access

57

Summary (continued)

• Computers have: – Changed the makeup of the workforce and even eliminated

some jobs– Expanded and enriched employment opportunities in many

ways• Ethics

– Determine generally accepted and discouraged activities within a company and society at large

Policies, procedures, and controls must be established to avoid• Computer waste

(Inappropriate use of computer technology and resources)

• Computer related mistakes (Errors, failures, and other computer problems that make computer output incorrect or not useful)