




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、信息時代的管理信息系統-Chap008信息時代的管理信息系統-Chap008STUDENT LEARNING OUTCOMESDefine ethics and describe the two factors that affect how you make a decision concerning an ethical issue.Define and describe intellectual property, copyright, Fair Use Doctrine, and pirated software.Describe privacy and describe ways i
2、n which it can be threatened.Describe the ways in which information on your computer or network is vulnerable and list measures you can take to protect it.8-3SHE LOST $400,000 TO AN E-MAIL SCAM“419” e-mails are a popular type of scam419 scams promise you, in an e-mail, that you will get rich if you
3、ante up a small feeJanella Spears took the bait and spent $400,000 trying to collect her fortuneShe even cashed in her husbands retirement to get the money to send the crooks8-4Case Study QuestionsWhat do you think about this true story?Have you ever been caught in a scam? How did you feel when you
4、discovered that you had been fooled?What would you do if you knew that your parent was being complicity in his or her own victimization?8-5INTRODUCTIONHandling information responsibly means understanding the following issuesEthicsPersonal privacyThreats to informationProtection of information8-6CHAP
5、TER ORGANIZATIONEthicsLearning Outcomes #1 & #2PrivacyLearning Outcome #3SecurityLearning Outcome #48-7ETHICSEthics the principles and standards that guide our behavior toward other peopleEthics are rooted in history, culture, and religion8-8Factors the Determine How You Decide Ethical IssuesAct
6、ions in ethical dilemmas determined byYour basic ethical structureThe circumstances of the situationYour basic ethical structure determines what you consider to beMinor ethical violationsSerious ethical violationsVery serious ethical violations8-9Basic Ethical Structure8-10Circumstances of the Situa
7、tionConsequences of the action or inactionSocietys opinion of the action or inactionLikelihood of effect of action or inactionTime to consequences of action or inactionRelatedness of people who will be affected by action or inactionReach of result of action or inaction8-11Intellectual PropertyIntell
8、ectual property intangible creative work that is embodied in physical formCopyright legal protection afforded an expression of an ideaFair Use Doctrine may use copyrighted material in certain situations8-12Intellectual PropertyUsing copyrighted software without permission violates copyright lawPirat
9、ed software the unauthorized use, duplication, distribution, or sale of copyrighted software8-13PRIVACYPrivacy the right to left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consentDimensions of privacyPsychological: to have a sen
10、se of controlLegal: to be able to protect yourself8-14Privacy and Other IndividualsKey logger (key trapper) software a program that, when installed on a computer, records every keystroke and mouse clickScreen capture programs capture screen from video cardE-mail is stored on many computers as it tra
11、vels from sender to recipientHardware key logger hardware device that captures keystrokes moving between keyboard and motherboard.Event Data Recorders (EDR) located in the airbag control module and collects data from your car as you are driving.8-15An E-Mail is Stored on Many Computers8-16Identity T
12、heftIdentity theft the forging of someones identity for the purpose of fraud8-17Identity TheftPhishing (carding, brand spoofing) a technique to gain personal information for the purpose of identity theftNEVERReply without question to an e-mail asking for personal informationClick directly on a Web s
13、ite provided in such an e-mail8-18Identity Theft8-19PharmingPharming - rerouting your request for a legitimate Web site sending it to a slightly different Web addressor by redirecting you after you are already on the legitimate sitePharming is accomplished by gaining access to the giant databases th
14、at Internet providers use to route Web traffic. It often works because its hard to spot the tiny difference in the Web site address.8-20Privacy and EmployeesCompanies need information about their employees to run their business effectivelyAs of March 202X, 60% of employers monitored employee e-mails
15、70% of Web traffic occurs during work hours78% of employers reported abuse60% employees admitted abuse8-21Privacy and EmployeesVisiting inappropriate sitesGaming, chatting, stock trading, social networking, etc.8-22Reasons for MonitoringHire the best people possibleEnsure appropriate behavior on the
16、 jobAvoid litigation for employee misconduct8-23Privacy and ConsumersConsumers want businesses toKnow who they are, but not to know too muchProvide what they want, but not gather information on themLet them know about products, but not pester them with advertising8-24CookiesCookie a small file that
17、contains information about you and your Web activities, which a Web site places on your computerHandle cookies by usingWeb browser cookie management optionBuy a program that manages cookies8-25SpamSpam unsolicited e-mail from businesses advertising goods and servicesGets past spam filters by Inserti
18、ng extra charactersInserting HTML tags that do nothingReplying usually increases, rather than decreases, amount of spam8-26Adware and SpywareAdware software to generate ads that installs itself when you download another programSpyware (sneakware, stealthware) software that comes hidden in downloaded
19、 software and helps itself to your computer resources8-27Adware in Free Version of Eudora8-28Trojan Horse SoftwareTrojan horse software software you dont want inside software you do wantSome ways to detect Trojan horse softwareAdAware at The Cleaner at Trojan First Aid Kit (TFAK)Check it out before
20、you download at 8-29Web LogsWeb log one line of information for every visitor to a Web siteClickstream records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.Anonymous Web browsing (AWB) hide
21、s your identity from the Web sites you visitThe Anonymizer at SuftSecret at 8-30Privacy and Government AgenciesAbout 2,000 government agencies have databases with information on peopleGovernment agencies need information to operate effectivelyWhenever you are in contact with government agency, you l
22、eave behind information about yourself8-31Government Agencies Storing Personal InformationLaw enforcementNCIC (National Crime Information Center)FBIElectronic SurveillanceCarnivore or DCS-1000Magic Lantern (software key logger)NSA (National Security Agency)Echelon collect electronic information by s
23、atellite8-32Government Agencies Storing Personal InformationIRSCensus BureauStudent loan servicesFICASocial Security AdministrationSocial service agenciesDepartment of Motor Vehicles8-33Laws on PrivacyHealth Insurance Portability and Accountability Act (HIPAA) protects personal health informationFinancial Services Modernization Act requires that financial institutions protect personal customer informationOther laws in Figure 8.6 on page 2448-34SECURITY AND EMPLOYEESAttacks on information and computer resources come from inside and outside the companyComputer sab
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 4數獨題目及答案大全
- 脂質過氧化調控-洞察及研究
- 2025至2030年中國電子積木行業市場全景評估及投資策略研究報告
- 異構回檔方案設計-洞察闡釋
- 灌封膠項目投資風險評估報告
- 綠化植物抗逆性研究-洞察闡釋
- 未來主義風格在建筑裝飾中的表現-洞察闡釋
- 滇西應用技術大學《多機位演播室攝影》2023-2024學年第二學期期末試卷
- 河北地質大學華信學院《數據管理原理與技術》2023-2024學年第二學期期末試卷
- 貴州民用航空職業學院《醫學影像成像》2023-2024學年第二學期期末試卷
- 2025年新高考1卷(新課標Ⅰ卷)英語試卷
- 張三慧大學物理全冊習題答案詳解
- 贛州市贛縣縣鄉鎮街道社區行政村統計表
- 臨邊作業的安全防護
- 影視文學教程整本書課件完整版電子教案全套課件最全教學教程ppt(最新)
- 固定污染源排污登記表(樣表)
- 城市雕塑藝術工程量清單計價定額2020版
- T∕CGMA 033002-2020 壓縮空氣站節能設計指南
- 住宅景觀水系的維護及設計優化
- 水利水能規劃課程設計計算書
- 蛇形管制造典型工藝
評論
0/150
提交評論