Session 3 - Welcome to ADMS 2511 Management Information...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyright I. Splettstoesser-Hogeterp, 2009 1 Welcome to … ADMS 2511 Management Information Systems, Unit 3 Anna Chow Email: anchow@yorku.ca PODS: get your overheads loaded up and your video links ready please.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright I. Splettstoesser-Hogeterp, 2009 2 Unit 3 Learning Objectives Examine IT ethical issues, practice ethical analysis and consider identity theft Describe the control layers used to categorize operational practices Relate IT threats and risks to mitigation (i.e. controls)
Background image of page 2
Copyright I. Splettstoesser-Hogeterp, 2009 3 A framework for ethical issues (Table 3.1, p. 65) Privacy Accuracy Property Accessibility TIP: DEFINE AND PROVIDE EXAMPLES OF THE FOUR CATEGORIES OF ETHICAL ISSUES.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright I. Splettstoesser-Hogeterp, 2009 4 Privacy mega-horrors: Payment processor (Heartland Payment Systems) breach disclosed January 2009; More than 100 million credit and debit cards could be affected (itbusiness.ca, Vijayan, Jan 22/09) Method: multiple planted software Compare to TJX (2007, 46 million cards) Jan 2009: Monster‟s database hacked
Background image of page 4
Copyright I. Splettstoesser-Hogeterp, 2009 5 Accuracy problem results in loot: Three extra zeros on a bank loan resulted in receiving $10 million (not $10,000) in New Zealand The applicants took $2.6 million and ran (May 2009, Toronto Star, Lilley) Have you ever experienced a bank error?
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright I. Splettstoesser-Hogeterp, 2009 6 Phishing for cash (property): Fake bank emails or web sites, even a fake Canada Revenue Agency refund phish! (itbusiness.ca, Jan 20, 2009, Jackson) Confidential data can also be sold from stolen laptops or USB keys, i.e. data theft
Background image of page 6
2009 7 Accessibility successes and failures: Facebook materials ordered disclosed for automobile accident lawsuit (Mar 14, 2009, Toronto Star, Tyler) Ryerson student data available online unencrypted (Feb 24, 2009, Metro, Cdn Press) Computer „junkie‟ warned a school about a potential bombing (March 21, 2009, Toronto Star, Chung)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 29

Session 3 - Welcome to ADMS 2511 Management Information...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online