Personal, Legal, Ethical, and Organizational Issues of Information Systems
Personal, Legal, Ethical, and Organizational Issues of Information Systems
Personal, Legal, Ethical, and Organizational Issues of Information Systems
ORGANIZATIONAL ISSUES OF
INFORMATION SYSTEMS
Risks Associated with Information
Technologies
Misuses of information technology
Invade users’ privacy
Commit computer crimes
Minimize or prevent by:
Installing operating system updates regularly
Using antivirus software
Using e-mail security features
Cookies
Cookies
Small text files with a unique ID tag
Embedded in a Web browser
Saved on the user’s hard drive
Can be useful or intrusive
Many users disable cookies
By installing a cookie manager
Or using Web browser options
Spyware and Adware
Spyware
Software that secretly gathers information about users while they browse the
Web
Can be used maliciously
Install antivirus or antispyware software
Adware
Form of spyware
Collects information about the user to display advertisements in the Web browser
Phishing
Phishing
Sending fraudulent e-mails that seem to come from legitimate sources
Direct e-mail recipients to false Web sites
To capture private information
Keyloggers
Keyloggers
Monitor and record keystrokes
Can be software or hardware devices
Sometimes used by companies to track employees’ use of e-mail and the
Internet
Can be used for malicious purposes
Some antivirus and antispyware programs protect against software
keyloggers
Sniffing and Spoofing
Sniffing
Capturing and recording network traffic
Often used by hackers to intercept information
Spoofing
Attempt to gain access to a network by posing as an authorized user to find
sensitive information
Computer Crime and Fraud
Computer fraud
Unauthorized use of computer data for personal gain
Social networking sites
Used for committing computer crime
Examples
Denial-of-service attacks
Identity theft
Software piracy
Distributing child pornography
E-mail spamming
Computer Crime and Fraud (cont’d.)
Writing or spreading viruses, worms, Trojan programs, and other malicious code
Stealing file
Changing computer records
Virus hoaxes
Sabotage
Company insiders commit most computer crimes
Internet Fraud Cost $559 Million in 2009
Most of the complaints were about e-mail scams and the non-delivery of
merchandise or payments
Privacy Issues
Federal laws now regulate collecting and using information on people and
corporations
1970 Fair Credit Reporting Act
Acceptable use policies
Accountability
Nonrepudiation
Hardware or software controls
Determine what personal information is provided on the Web
E-mail
Intellectual property
Protections that involve copyrights, trademarks, trade secrets, and patents for
“creations of the mind” developed by people or businesses
Industrial property
Inventions, trademarks, logos, industrial designs
Copyrighted material
Literary and artistic works
May apply to online materials
Exceptions under Fair Use Doctrine
Intellectual Property (cont’d.)
Trademark
Protects product names and identifying marks
Patent
Protects new processes
Advantages of patents
Software piracy
Laws
Telecommunications Act of 1996
Communications Decency Act (CDA)
Laws against spamming
Intellectual Property (cont’d.)
Digital divide
Computers still aren’t affordable for many people
Haves and have-nots
Companies installing cables for Internet connections might subject their
communities to a type of economic “red-lining”
Children are often victims of this divide
Funding for computers at schools and libraries
Loaner programs
The Impact of Information Technology
in the Workplace
New jobs for:
Programmers
Systems analysts
Database and network administrators
Network engineers
Webmasters
Web page developers
e-commerce specialists
Chief information officers (CIOs)
Technicians
The Impact of Information Technology
in the Workplace (cont’d.)
Web designers
Java programmers
Web troubleshooters
Telecommuting and virtual work
Job deskilling
Skilled labor eliminated by introducing high technology
Job downgraded from a skilled to a semiskilled or unskilled position
Advantages and Disadvantages
of Telecommuting
The Impact of Information Technology
in the Workplace (cont’d.)
Job upgrading
Clerical workers who now use computers
One skilled worker might be capable of doing the job of several
workers
Virtual organizations
Networks of independent companies, suppliers, customers, and
manufacturers
Connected via information technologies
Share skills and costs
Have access to each other’s market
Information Technology and Health
Issues
Reports of health-related issues caused by video display terminals (VDTs)
No conclusive study
Health problems associated with the environment in which computers are used
Information Technology and Health
Issues (cont’d.)
Other reports of health problems
Vision
Musculoskeletal
Skin
Reproductive
Stress-related
Amount of time some people spend on the Web
Green Computing
Designing products that last longer and are modular in design so that
certain parts can be upgraded without replacing the entire system
Designing search engines and other computing routines that are faster and
consume less energy
Replacing several underutilized smaller servers with one large server using a
virtualization technique
Ways to Pursue a Green Computing
Strategy (cont’d.)
Information technologies
Affect privacy
Can be used for computer crimes
Privacy issues
E-mail
Censorship
Organizational issues
Digital divide
Workplace impacts
Health impact
Green computing