tailieunhanh - Lecture Business and society: Stakeholders, ethics, public policy (14/e): Chapter 13 - Anne Lawrence, James Weber

Chapter 13 - Managing technology and innovation. After studying this chapter you will be able to: Evaluating the growth in breaches of personal information privacy, understanding where these attacks come from and what their effects are, evaluating initiatives taken by government and business to minimize invasions of privacy, recognizing the emerging role and responsibilities of the organization’s chief information officer, | Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Ch. 13 Key Learning Objectives Evaluating the growth in breaches of personal information privacy Understanding where these attacks come from and what their effects are Evaluating initiatives taken by government and business to minimize invasions of privacy Recognizing the emerging role and responsibilities of the organization’s chief information officer Examining violations of intellectual property through the piracy of software, music, movies, and books, and how business and government attempt to prevent these illegal actions Recognizing the benefits, as well as the ethical and social challenges that arise from technological breakthroughs in science and medicine 13- Violations of Privacy: Causes and Costs The potential for violations of privacy can come from many different sources Employees have access to new technologies at work and companies | Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Ch. 13 Key Learning Objectives Evaluating the growth in breaches of personal information privacy Understanding where these attacks come from and what their effects are Evaluating initiatives taken by government and business to minimize invasions of privacy Recognizing the emerging role and responsibilities of the organization’s chief information officer Examining violations of intellectual property through the piracy of software, music, movies, and books, and how business and government attempt to prevent these illegal actions Recognizing the benefits, as well as the ethical and social challenges that arise from technological breakthroughs in science and medicine 13- Violations of Privacy: Causes and Costs The potential for violations of privacy can come from many different sources Employees have access to new technologies at work and companies may be monitoring usage, raising employee concerns about invasions of privacy More aggressive efforts by cyber criminals resulted in a steep rise of attacks on information security Recent technological advancements have increased the number of ways that privacy violations may occur 13- “Cybercrime has emerged as a formidable threat, thanks to deeply determined, highly skilled, and well-organized cyber criminals from nation states to hacktivists, from criminal gangs to lone-wolf perpetrators. Organizations need to be aware and adjust to this changing landscape.” PricewaterhouseCoopers executive Violations of Privacy: Causes and Costs 13- In a survey of 583 . companies 90 percent said their companies’ computers were breached at least once by hackers over the past year Nearly 60 percent reported two or more breaches More than 50 percent said they had little confidence of being able to stave off future attacks The number of instances of identity theft and the losses associated

TỪ KHÓA LIÊN QUAN