Chap004 - Chapter 4 CHAPTER FOUR OVERVIEW SECTION 4.1 -...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter 4 CHAPTER FOUR OVERVIEW SECTION 4.1 - ETHICS Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace SECTION 4.2 - INFORMATION SECURITY Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology 4-2 Chapter 4 ORGANIZATIONAL FUNDAMENTALS ETHICS AND SECURITY Ethics and security are two fundamental building blocks that organizations must base their businesses on to be successful In recent years, such events as the Enron and Martha Stewart, along with 9/11 have shed new light on the meaning of ethics and security 4-3 Chapter 4 ETHICS Ethics the principles and standards that guide our behavior toward other people Issues affected by technology advances Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software You may watch the video: http://video.google.com/videoplay?docid= 4-7 Chapter 4 ETHICS Privacy is a major ethical issue Privacy the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent http://www.albumoftheday.com/facebook/ Confidentiality the assurance that messages and information are available only to those who are authorized to view them 4-8 Chapter 4 ETHICS One of the main ingredients in trust is privacy Primary reasons privacy issues lost trust for ebusiness 4-9 Chapter 4 INFORMATION ETHICS Individuals form the only ethical component of IT Individuals copy, use , and distribute software Search organizational databases for sensitive and personal information Individuals create and spread viruses Individuals hack into computer systems to steal information Employees destroy and steal information 4-10 Chapter 4 INFORMATION HAS NO ETHICS Acting ethically and legally are not always the same 4-11 Chapter 4 INFORMATION HAS NO ETHICS Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or 4-12 Chapter 4 DEVELOPING INFORMATION MANAGEMENT POLICIES Organizations strive to build a corporate...
View Full Document

This note was uploaded on 10/07/2010 for the course BITM 330 taught by Professor Eliotrich during the Fall '09 term at SUNY Albany.

Page1 / 33

Chap004 - Chapter 4 CHAPTER FOUR OVERVIEW SECTION 4.1 -...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online