ch03 - CHAPTER 3 Ethics, Privacy and Information Security...

Info iconThis preview shows pages 1–19. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 3 Ethics, Privacy and Information Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources
Background image of page 2
LEARNING OBJECTIVES Describe the major ethical issues related to information technology and identify situations in which they occur. Describe the many threats to information security. Understand the various defense mechanisms used to protect information systems. Explain IT auditing and planning for disaster recovery.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
NASA Loses Secret Information for Years
Background image of page 4
Ethical Issues Ethics Code of Ethics
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Fundamental Tenets of Ethics Responsibility Accountability Liability
Background image of page 6
Unethical vs. Illegal What is unethical is not necessarily illegal. Ethics scenarios
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Four Categories of Ethical Issues Privacy Issues Accuracy Issues Property Issues Accessibility Issues
Background image of page 8
Privacy Issues How much privacy do we have left?
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
You Be the Judge Terry Childs: Guilty or not Guilty?
Background image of page 10
Privacy Court decisions have followed two rules: (1) The right of privacy is not absolute. Your privacy must be balanced against the needs of society. (2) The public’s right to know is superior to the individual’s right of privacy.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Threats to Privacy Data aggregators, digital dossiers, and profiling Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Background image of page 12
Data Aggregators, Digital Dossiers, and Profiling
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Electronic Surveillance
Background image of page 14
Electronic Surveillance See " The State of Surveillance " article in BusinessWeek See the surveillance slideshow See additional surveillance slides And you think you have privacy? ( video ) Sense-through-the-Wall
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Personal Information in Databases Banks Utility companies Government agencies Credit reporting agencies
Background image of page 16
Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cause You Problems Anyone can post derogatory information about you anonymously . (See this Washington Post
Background image of page 18
Image of page 19
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/15/2011 for the course M I S 204 taught by Professor Yvonnegreewood during the Fall '07 term at Pennsylvania State University, University Park.

Page1 / 79

ch03 - CHAPTER 3 Ethics, Privacy and Information Security...

This preview shows document pages 1 - 19. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online