tailieunhanh - Lecture Information systems (3e): Chapter 4 - Paige Baltzan

The objectives of this chapter: Understand the concept of a network; apply Metcalfe’s law in understanding the value of a network; identify major developments and trends in the industries, technologies, and business applications of telecommunications and Internet technologies;. | CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. 1 CHAPTER OVERVIEW SECTION – Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace SECTION – Information Security Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology 2 SECTION ETHICS 4-3 3 LEARNING OUTCOMES Explain the ethical issues in the use of the information age Identify the six epolicies an organization should implement to protect themselves 4 INFORMATION ETHICS Ethics – The principles and standards that guide our behavior toward other people Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself 5 INFORMATION ETHICS Business issues related to information ethics Intellectual property Copyright Pirated software Counterfeit software Digital rights management 6 INFORMATION ETHICS Privacy is a major ethical issue Privacy – The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality – the assurance that messages and information are available only to those who are authorized to view them 7 INFORMATION ETHICS Individuals form the only ethical component of MIS Individuals copy, use , and distribute software Search organizational databases for sensitive and personal information Individuals create and spread viruses Individuals hack into computer systems to steal information Employees destroy and steal information 8 INFORMATION ETHICS Acting ethically and legally are not always the same 9 Information Does Not Have Ethics, People Do Information does not care how it is used, it will not . | CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. 1 CHAPTER OVERVIEW SECTION – Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace SECTION – Information Security Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology 2 SECTION ETHICS 4-3 3 LEARNING OUTCOMES Explain the ethical issues in the use of the information age Identify the six epolicies an organization should implement to protect themselves 4 INFORMATION ETHICS Ethics – The principles and standards that guide our behavior toward other people Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information .