ch09 - Principles and Learning Objectives • Policies and...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamentals of Information Systems, Third Edition 2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste and mistakes. Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions. Identify policies and procedures useful in eliminating waste and mistakes.
Background image of page 2
Fundamentals of Information Systems, Third Edition 3 Principles and Learning Objectives (continued) Computer crime is a serious and rapidly growing area of concern requiring management attention. Explain the types and effects of computer crime. Identify specific measures to prevent computer crime. Discuss the principles and limits of an individual’s right to privacy.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamentals of Information Systems, Third Edition 4 Principles and Learning Objectives (continued) Working conditions must be designed to avoid negative ethical consequences. Outline criteria for the ethical use of information systems.
Background image of page 4
Fundamentals of Information Systems, Third Edition 5 Computer Waste and Mistakes Computer waste The inappropriate use of computer technology and resources Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamentals of Information Systems, Third Edition 6 Computer Waste Discarding of technology Unused systems Personal use of corporate time and technology Spam
Background image of page 6
Fundamentals of Information Systems, Third Edition 7 Computer-Related Mistakes Mistakes can be caused by unclear expectations and a lack of feedback A programmer might develop a program that contains errors A data-entry clerk might enter the wrong data
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamentals of Information Systems, Third Edition 8 Preventing Computer-Related Waste and Mistakes Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures
Background image of page 8
Fundamentals of Information Systems, Third Edition 9 Establishing Policies and Procedures Table 9.2: Types of Computer-Related Mistakes
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamentals of Information Systems, Third Edition 10 Implementing Policies and Procedures Table 9.3: Useful Policies to Eliminate Waste and Mistakes
Background image of page 10
Fundamentals of Information Systems, Third Edition 11 Computer Crime Often defies detection The amount stolen or diverted can be substantial The crime is “clean” and nonviolent The number of IT-related security incidents is increasing dramatically Computer crime is now global
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamentals of Information Systems, Third Edition 12 Computer Crime (continued) Figure 9.1: Number of Incidents Reported to CERT
Background image of page 12
Fundamentals of Information Systems, Third Edition 13 The Computer as a Tool to Commit Crime Criminals need two capabilities to commit most computer crimes: Knowing how to gain access to the computer system Knowing how to manipulate the system to produce the desired result Social engineering Dumpster diving
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 44

ch09 - Principles and Learning Objectives • Policies and...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online