Anda di halaman 1dari 18

Introduction to Information

Technology
2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.

Chapter 15:
Implementing IT: Ethics, Impacts,
and Security

Prepared by:
Roberta M. Roth, Ph.D.
University of Northern Iowa

Introduction to Information Technology, 2nd Edition


15-1
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Chapter Preview
In this chapter, we will study:
Types of ethical issues that arise in
relation to information systems
Impacts that information systems
have had on organization, jobs,
individuals, and society
Various threats that may damage
computer and information systems
Ways to protect computer and
information systems from hazards
and threats
Introduction to Information Technology, 2nd Edition
15-2
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
IT Ethical Issues
 Ethics – branch of philosophy that deals
with what is considered to be right and
wrong
 Code of ethics – principles that guide
members of an organization
 Types of ethical issues
 Privacy – what is collected, stored, and
shared about others
 Accuracy – what is done to assure
authentic and accurate data
 Property – who owns intellectual property
and how are they compensated for it
 Accessibility – who can obtain information
Introduction to Information Technology, 2nd Edition
15-3
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Privacy Issues
 Information privacy – the right to
determine what information about
oneself can be shared with others
 Electronic surveillance – computer
users’ actions can be monitored
without knowledge both at work
and at home
 Storage of personal information in
databases:
 What is stored? How can be we sure
it’s accurate? Who will it be shared
with? How will it be used?
Introduction to Information Technology, 2nd Edition
15-4
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Privacy Issues (continued)
 Many organizations are developing and
enforcing privacy policies
 Internationally, countries vary widely
regarding their concerns about privacy.
Adds complexity to global commerce.
 Generally, an organization should…
•Only collect data that can be obtained legally and fairly
•Make sure data is accurate, complete, and kept up to date
•Know why we are collecting data and be sure there is a reason to
have it
•Make sure data is used just for its intended purpose
•Safeguard the data to ensure its quality
•Enable those about whom we store data know what we plan to do
with the data and can verify its accuracy

Introduction to Information Technology, 2nd Edition


15-5
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Intellectual Property Issues
 Intangible property created by people
or organizations, protected by trade
secret, patent, and copyright laws
 Trade secret – intellectual work - not public
 Patent – exclusive rights to invention
granted to inventor for 20 years
 Copyright – creators of intellectual property
granted ownership for their lives plus 50
years. Owners have right to collect fees for
use. Software is generally copyrighted.
 What are the negative consequences of
illegally copying software?
 Wide variation in the way different countries
protect intellectual property – globalization
issue
Introduction to Information Technology, 2nd Edition
15-6
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
IT and Organizations
 IT has the potential to significantly
change organizations.
 Structures can be flatter, eliminating
middle layers, with broader span of
control
 More extensive supervision is
possible electronically, even for those
working remotely
 Power shifts are likely as knowledge
is captured, stored, and shared.

Introduction to Information Technology, 2nd Edition


15-7
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
IT and Jobs
 Some jobs will be eliminated,
especially intermediaries (e.g.,
travel agents)
 BPR will cause many jobs to be
redesigned; more emphasis on
computing capabilities
 Experience and seniority may
become less important in job
advancement
 Managers’ approach to decision
making may change
 Computer-based communication
Introduction to Information Technology, 2nd Edition

skills may be more in demand


15-8
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
IT and Individuals
 Fears of dehumanization and loss
of social contact
 Increasing workload and demand
for computer skills can be
threatening
 Certain aspects of using
computers can be physically
damaging

Introduction to Information Technology, 2nd Edition


15-9
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
IT and Society
 Some will say that IT has improved our
quality of life
 Improvements for people with disabilities
 Improvements in health care system
 Improved consumer information
 Robots performing in dangerous situations
 Improvements in crime fighting
 Concern about deepening divide
between those with and without IT
access
 Internet communities provide social
contact for people with common
interests
 Telecommuting adds flexibility for
Introduction to Information Technology, 2nd Edition
workers and organizations
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
15-10
Security Concerns
 Information systems are subject to
many threats
 Unintentional threats
• Human error – in design or use of system
• Environmental hazards – acts of God and
other
• Computer system failures – faulty
products
 Intentional threats
• Systems are subject to a wide variety of
hazards from criminal attacks

Introduction to Information Technology, 2nd Edition


15-11
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Computer Crimes
 Computers may be the target of
criminal activity or the means by
which criminal activity is carried
out
 Methods of attack:
 Data tampering is most common
attack on computer systems
 Deliberate programming fraud also
common
• Viruses are a highly visible form of
programming attack
• Denial of service attacks target e-
commerce web sites
Introduction to Information Technology, 2nd Edition
15-12
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Protecting IT
 Individuals and organizations must
actively establish protection
mechanisms
 Prevent and deter damage
 Detect threats before damage is
widespread
 Limit loss from threat
 Plan for recovery in event of attack
 Correct system to prevent recurrence

Introduction to Information Technology, 2nd Edition


15-13
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Protecting IT (continued)
 General protection strategies:
 Physical security of facilities and
resources
 Control access to system
 Protect data from unauthorized
access
 Application control strategies:
 Ensure quality of inputs
 Verify quality of processing
 Ensure quality and accessibility of
outputs

Introduction to Information Technology, 2nd Edition


15-14
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Protecting IT (continued)
 Network control strategies:
 Control access to network resources
 Protect data on network with
encryption
 Monitor and detect intruders
 Protect with firewalls
 Verifying quality through audits
 Regular evaluation of records and
procedures
 May be performed by internal and
external auditors

Introduction to Information Technology, 2nd Edition


15-15
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Protecting IT (continued)
 Disaster Prevention and Recovery
Plans
 Organizations need to think through
how various disasters will be handled
 Key people should know exactly what
to do in the event of a disaster
 Disaster plans should be tested
through practice drills
 Critical component is back-up
procedures
 Discipline is needed to ensure that
protection plans are implemented
(how often do you back up your hard
drive?)
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
15-16
© 2003 John Wiley & Sons, Inc.
Chapter Summary
 Information systems pose a number of
ethical challenges for businesses and
individuals
 Information systems have changed
organizations, jobs, individual workers,
and society
 Information systems are vulnerable to a
number of hazards
 Individuals and organizations must take
steps to protect their systems from
threats
Introduction to Information Technology, 2nd Edition
15-17
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction
or translation of this work beyond that permitted in Section 117 of the 1976
United Stated Copyright Act without the express written permission of the
copyright owner is unlawful. Request for further information should be
addressed to the Permissions Department, John Wiley & Sons, Inc. The
purchaser may make back-up copies for his/her own use only and not for
distribution or resale. The Publisher assumes no responsibility for errors,
omissions, or damages, caused by the use of these programs or from the
use of the information herein.

Introduction to Information Technology, 2nd Edition


15-18
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.

Anda mungkin juga menyukai