{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Chap004 - CHAPTER FOUR OVERVI EW Chapter 4 SECTI ON 4.1...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 4 CHAPTER FOUR OVERVIEW SECTION 4.1 - ETHICS § Ethics § Information Ethics § Developing Information Management Policies § Ethics in the Workplace SECTION 4.2 - INFORMATION SECURITY § Protecting Intellectual Assets § The First Line of Defense - People § The Second Line of Defense - Technology 4-2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Chapter 4 ORGANIZATIONAL FUNDAMENTALS – ETHICS AND SECURITY Ethics and security are two fundamental building blocks that organizations must base their businesses on to be successful In recent years, such events as the Enron and Martha Stewart, along with 9/11 have shed new light on the meaning of ethics and security 4-3
Background image of page 2
Chapter 4 ETHICS Ethics – the principles and standards that guide our behavior toward other people Issues affected by technology advances § Intellectual property § Copyright § Fair use doctrine § Pirated software § Counterfeit software You may watch the video: http://video.google.com/videoplay?docid= 4-7
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Chapter 4 ETHICS Privacy is a major ethical issue § Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent § http://www.albumoftheday.com/facebook/ § Confidentiality – the assurance that messages and information are available only to those who are authorized to view them 4-8
Background image of page 4
Chapter 4 ETHICS One of the main ingredients in trust is privacy Primary reasons privacy issues lost trust for ebusiness 4-9
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Chapter 4 INFORMATION ETHICS Individuals form the only ethical component of IT § Individuals copy, use , and distribute software § Search organizational databases for sensitive and personal information § Individuals create and spread viruses § Individuals hack into computer systems to steal information § Employees destroy and steal information 4-10
Background image of page 6
Chapter 4 INFORMATION HAS NO ETHICS Acting ethically and legally are not always the same 4-11
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Chapter 4 INFORMATION HAS NO ETHICS Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself 4-12
Background image of page 8
Chapter 4 DEVELOPING INFORMATION MANAGEMENT POLICIES Organizations strive to build a corporate
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}