4545675-Security-and-Ethical-Challenges-(13) - Chapter 13...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Learning Objectives Identify several ethical issues in how the use of information technologies in business affects: employment, individuality, working conditions, Privacy, crime, health, and solutions to societal problems Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of IT 2 Chapter 13 Security and Ethical Challenges
Background image of page 2
Case 1 Cyberscams and Cybercriminals Cyberscams are today’s fastest-growing criminal niche 87 percent of companies surveyed reported a security incident The U.S. Federal Trade Commission says identity theft is its top complaint eBay has 60 people combating fraud; Microsoft has 65 Stolen credit card account numbers are regularly sold online 3 Chapter 13 Security and Ethical Challenges
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Case Study Questions What are several reasons why “cyberscams are today’s fastest-growing criminal niche”? Explain why the reasons you give contribute to the growth of cyberscams What are several security measures that could be implemented to combat the spread of cyberscams? Explain why your suggestions would be effective in limiting the spread of cyberscams Which one or two of the four top cybercriminals described in this case poses the greatest threat to businesses? To consumers? Explain the reasons for your choices, and how businesses and consumers can protect themselves from these cyberscammers 4 Chapter 13 Security and Ethical Challenges
Background image of page 4
IT Security, Ethics, and Society 5 Chapter 13 Security and Ethical Challenges IT has both beneficial and detrimental effects on society and people Manage work activities to minimize the detrimental effects of IT Optimize the beneficial effects
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Business Ethics Ethics questions that managers confront as part of their daily business decision making include: Equity Rights Honesty Exercise of corporate power 6 Chapter 13 Security and Ethical Challenges
Background image of page 6
Categories of Ethical Business Issues 7 Chapter 13 Security and Ethical Challenges
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Corporate Social Responsibility Theories Stockholder Theory Managers are agents of the stockholders Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices Social Contract Theory Companies have ethical responsibilities to all members of society, who allow corporations to exist Stakeholder Theory Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders Stakeholders are all individuals and groups that have a stake in, or claim on, a company 8 Chapter 13 Security and Ethical Challenges
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/15/2010 for the course COMPUTER E IT-402 taught by Professor Muhammadkashifshaikh during the Spring '10 term at Sir Syed University of Engineering &Technology.

Page1 / 61

4545675-Security-and-Ethical-Challenges-(13) - Chapter 13...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online