CH 03
CH 03
st
Information Systems, 1
Edition
⬥ Authors: Rainer, Turban and
Potter
⬥ Publisher: John Wiley & Sons,
Inc.
Chapter 3 1
Chapter 3
Chapter 3 2
Chapter Outline
Chapter 3 3
Learning Objectives
Chapter 3 5
The Four Categories of
Ethical Issues
⬥ Privacy Issues involves collecting, storing
and disseminating information about
individuals.
⬥ Accuracy Issues involves the authenticity,
fidelity and accuracy of information that is
collected and processed.
⬥ Property Issues involves the ownership
and value of information.
⬥ Accessibility Issues revolve around who
should have access to information and
whether they should have to pay for this
access.
Chapter 3 6
Protecting Privacy
Chapter 3 10
Unintentional Threats
(Continued)
Chapter 3 12
Intentional Threats
(Continued)
⬥ Hacker. An outside person who has
penetrated a computer system,
usually with no criminal intent.
Chapter 3 13
Information Extortion
Chapter 3 21
Risk Mitigation Strategies
Chapter 3 23
Controls (Continued)
Chapter 3 24
Disaster Recovery
Planning
⬥ Disaster recovery. The chain of events
linking planning to protection to recovery,
disaster recovery plan.
⬥ Disaster avoidance. Oriented towards
prevention, uninterrupted power supply
(UPS).
⬥ Hot sites. External data center that is fully
configured and has copies of the
organization’s data and programs.
Chapter 3 25