14
Fifth Edition 1 g e m e n t I n f o r m a t i o n S y s I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i n e s s E n Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserve C h a p t e r James A. O’Brien 9 Security and Ethical Challenges of E-Business

Security and Ethical Challenges of E-Business

Embed Size (px)

DESCRIPTION

9. Security and Ethical Challenges of E-Business. Chapter Objectives. Identify several ethical issues in how the use of information technologies in E-Business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. - PowerPoint PPT Presentation

Citation preview

Page 1: Security and Ethical Challenges of E-Business

Fifth Edition

1

M a n a g e m e n t I n f o r m a t i o n S y s t e m sM a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i n e s s E n t e r p r i s e

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

C h a p t e r

James A. O’Brien

9Security and

Ethical Challenges

of E-Business

Page 2: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 2M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter Objectives

• Identify several ethical issues in how the use of information technologies in E-Business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.

• Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of E-Business applications.

Page 3: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 3M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter Objectives

• Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology.

Page 4: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 4M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Security and Ethical Challenges

SecurityEthics andSociety

Employment Privacy

Health

Individuality

Crime

WorkingConditions

Page 5: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 5M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Computer Crime

Hacking

UnauthorizedUse at work

CyberTheft

Piracy

ComputerViruses

Page 6: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 6M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Employment Challenges

Lost JobOpportunities

ComputerMonitoring

LostIndividuality

HealthIssues

WorkingConditions

Page 7: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 7M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Ethical Considerations

• Ethical Principles– Proportionality– Informed Consent– Justice– Minimized Risk

• Standard of Conduct– Act with integrity– Protect the privacy and

confidentiality of information

– Do not misrepresent or withhold information

– Do not misuse resources– Do not exploit weakness

of systems– Set high standards– Advance the health and

welfare of general public

Page 8: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 8M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Security Management of E-Business

Encryption

Denial of ServiceDefenses

Fire Walls

MonitorE-mail

VirusDefenses

Page 9: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 9M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Other E-Business Security Measures

SecurityCodes

SecurityMonitors

BackupFiles

BiometricSecurity Controls

Page 10: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 10M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Computer System Failure Controls

Applications Environmental,HW and SWFaults

Applicationredundancy,Checkpoints

Systems Outages System isolationData security

Databases Data errors Transactionhistories, backupfiles

Networks Transmissionerrors

Alternate routing,error correctingroutines

Processes HW and SWfaults

Checkpoints

Files Media Errors Replication of data

Processors HW Faults Instruction retry

Layer Threat Fault Tolerant Methods

Fault Tolerant SystemsFail-Over Fail-Safe Fail-Soft

Page 11: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 11M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Disaster Recovery

• Who will participate?• What will be their

duties?• What hardware and

software will be used?• Priority of applications

to be run?• What alternative

facilities will be used?• Where will databases

be stored?

Page 12: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 12M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

E-Business System Controls and Audits

ProcessingControls

Fire wallsSoftwareHardware

Checkpoints

ProcessingControls

Fire wallsSoftwareHardware

Checkpoints

StorageControls

InputControls

OutputControls

Security CodesEncryptionError Signals

Security CodesEncryptionBackup Files

Security CodesEncryptionControl TotalsUser Feedback

Page 13: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 13M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter Summary

• The vital role of E-Business and E-Commerce systems in society raises serious ethical and societal issues in terms of their impact on employment, individuality, working conditions, privacy, health, and computer crime.

• Managers can help solve the problems of improper use of IT by assuming their ethical responsibilities for ergonomic design, beneficial use, and enlightened management of E-Business technologies in our society.

Page 14: Security and Ethical Challenges of E-Business

Fifth EditionJames A. O’Brien 14M a n a g e m e n t I n f o r m a t i o n S y s t e m s

Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter Summary (cont)• Business and IT activities involve many ethical

considerations. Ethical principles and standards of conduct can serve as guidelines for dealing with ethical businesses issues.

• One of the most important responsibilities of the management of a company is to assure the security and quality of its E-Business activities.

• Security management tools and policies can ensure the accuracy, integrity, and safety of E-Business systems and resources.