0% found this document useful (0 votes)
14 views

IST1101 Ch4 IS Ethics part 2

Uploaded by

mdavie junior
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

IST1101 Ch4 IS Ethics part 2

Uploaded by

mdavie junior
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

IST 1101

Foundations of Information
Systems and Technology

Chapter 4 – Information systems in


business/organizations/community
(Part 2)
Chapter 4 Outline
• Part 1
– Trend of Business Support Systems
– Strategic role of IS
– Introduction to electronic services
• Part 2
– Social, security, and ethical issues associated with
information systems
• Social: communal/common/societal/community
– Legal implications of information systems
– Ethical implications of information systems
Social implications of information systems (1)
1. Ease of access and availability of information
systems or services due to the rapid advances in
technology
2. Existence of Information rich & poor communities
 Widespread use of computers is dividing society
into information poor people (having limited
access to computers) & information rich people
(having easy access to computers)
3. Educational qualifications achieved due to ICTs
 Modern ICT allows citizens to study,
communicate, and participate in society
development.
Social implications of information systems (2)
4. Improved way of working of Knowledge workers
– People who add value by processing existing
information to create new information that could be
used to define and solve problems.
– Information systems have improved the quality of work
done by knowledge workers
5. Online retail businesses are supported
 Information systems have led to and supported online
businesses to enable internet shopping
 etc
Social and Security Issues/challenges
• Today computers have taken over human processors
because their operations overtake the limitations of
human processors. E.g.:
– They are cheap with respect to cost and
performance
– Can quickly process large volumes of data
• Consequently, majority of people have resorted to
using computers to improve their “ways of working”
• This has also provided “great opportunities” to
those who depend on fraud and crime/illegal
operations to survive or prosper.
Social and Security Issues/challenges
• A lot of data processing that takes place in an
Information System is not visible to the human
eye, thus control measures must be taken to
ensure that all business transactions are
correctly recorded & processed.
• ISs are used by human beings, and so are
vulnerable to deliberate abuse or accidental
misuse
– Thus, there is need to explore and understand
a number of social and security related issues
Social and Security Issues challenges
A. Security issues within the organisation
B. Security issues beyond the organisation
C. Operational problems and errors
D. Computer monitoring and invasion of privacy
E. Computers and unemployment
A. Security Risks Within an organization
• A1. Processing of fraudulent transactions
• A2. Unauthorised access to data and program
files
• A3. Physical theft or damage of equipment
A1. Processing of fraudulent transactions (1)
• Fraud – the manipulation of organisation records to conceal
or hide an illegal act, e.g. theft of funds or other assets
– Computers “simplify” schemes of defrauding an
organisation, especially if security and control measures
are ignored.
– In manual systems, fraud is limited using “separation of
duties”, where at least two people are involved in a
process such that each one effectively controls activities
of the others.
• In a computerised IS, the opportunity to commit fraud
increases because separate duties/functions are automated
& bundled into a module, thus a single clerk/official is
responsible for running a complete transaction.
A1. Processing of fraudulent transactions (2)
• Examples of fraudulent transactions include:
– Entering fictitious transactions:
• An Information system is used in the normal way too enter
forged transactions, but this is possible if governance or
control in the process/function that is being compromised is
loose.
– Modification of computer files:
• This requires more technical expertise to be able to
compromise the master file which has status information of
each file.
– Unauthorised changes to programs:
• Is usually limited to staff with programming expertise.
• E.g. skimming or salami technique, where a small amount is
deducted from each individual salary cheque and added to
a select individual’s payment.
A1. Processing of fraudulent transactions (3)
• How can an organization limit fraud?
a) It must stress the need for honesty and ethical
behaviour in all business activities.
b) It must reduce the level of opportunity to commit fraud
by using, e.g.:
– Strong internal controls,
– Separation of duties,
– Restricted access to sensitive applications,
– Audit trails to record the origin of every transaction,
– Sequential numbering of events to ensure that
records cannot be deleted or reports destroyed.
A1. Processing of fraudulent transactions (4)
• How can an organization limit fraud (continued)?
c) When an organization discovers a case of fraud, action
must be taken against the offender.
– Some organizations do not prosecute guilty
employees for fear of the possible negative
publicity/image that the organization may receive in
the press
– This encourages criminals to repeat the activity in
their new working environment.
A2. Unauthorised data access (1)
• Password protection is the most common method of protecting
corporate data.
– Criminals bypass the password method in various ways.
a) Fraudulent transactions are often carried out by unauthorised
users who manage to gain access to the corporate network by
using the login details of another user
– This is usually achieved using a terminal spoof, a terminal
spoof is a program that runs on a machine and looks like the
normal login screen.
b) Criminals make use of an unattended computer that has been
left on by a user who has logged in to the network and then
left the office
– Time-out or screen-saver programs with password
protection provide a simple barrier to this.
A2. Unauthorised data access (2)
c) Some criminals develop offending codes (called
Trojan horse) that they add to a program, which will
activate under certain conditions to create an
undesirable situation.
d) Some criminals use the back-door technique, i.e. when
programmers are building systems, they may try to
bypass all the access security procedures to speed up
the development time.
– If these “back doors” are not removed, the
programmer can gain illegal entry into the system.
A3. Sabotage and Theft (1)
• One time the theft of computer hardware was very rare
because computers were the size of “small houses” and were
hidden in secure computer installations
• Today theft of computers is rampant because computers have
become portable.
– Mobile computing devices are more vulnerable to theft
– The most effective first line of defence is to devise measures
to limit (physical) access to equipment.
– Restrictions to entry can be based on electronic locks,
activated by using:
• Swipe cards or advanced biometric devices that identify
the individual based on characteristics such as
fingerprints or the pattern of the retina.
A3. Sabotage and Theft (2)
• Theft also relates to the copying of programs and data
resources in an organisation
– Stealing customer lists together with the details of the
amount and type of business
• Software piracy is theft of software programs by making
illegal copies of the programs rather than purchase the
package.
– This type of theft is more difficult to identify, since the
original product has not physically disappeared.
– If pirated software is found on your computer, then
you are by all means the “thief”.
A3. Sabotage and Theft (3)
• Computer theft also covers the illegal use of computer
time.
– This involves doing own work or third party work on
organization computers
– Computer hackers spending time searching for
networks to which they can gain access, but not with
the aim of doing harm
– All these forms of theft can result in criminal charges
of theft of computer time
B. Security Risks beyond an organization
• B1. Hackers vs. Firewalls
• B2. Eavesdropping vs. data encryption
• B3. Viruses vs. anti-virus
B1. Hackers vs. Firewalls (1)
• Hackers
– Hackers are users from outside the organisation,
who penetrate a computer system.
– Hackers have various motives, e.g.:
• To prove that they can bypass network security
• To maliciously damage data
• To steal sensitive information
• To enter fraudulent transactions
• Initiate a denial-of-service (dos) attack:
– Hackers flood a targeted web site with
requests to render it inaccessible for genuine
business customers.
B1. Hackers vs. Firewalls (2)
• For more details on:
– Hacking, cybervandalism, hacktivism, and
data breaches
– Read pages 263 to 270 in the e-book titled “E-
Commerce: business, technology, society” by
K.C. Laudon and C. G. Traver (10th Edition)
B1. Hackers vs. Firewalls (2)
• Firewall
• Firewall is an additional system that enforces access
control policy between two networks, especially
between a corporate network and the Internet.
• Firewall monitors all external communications, checks
user authorisation and maintains a log of all attempts
to access the network.
• Firewall can be used to:
– Check for the presence of viruses
– Check for the downloading of unauthorised
software
– Check to guard against denial-of-service attacks
B2. Eavesdropping vs. data encryption (1)
• Data that is in the process of being
communicated from one source to another is
vulnerable to eavesdropping
– Sniffing: “is a type of eavesdropping program
that monitors information traveling over a
network, enabling hackers to steal
proprietary information from anywhere on a
network, including e-mail messages, company
files, and confidential reports.”
• Read more about sniffing & eavesdropping from
the e-commerce book page 269, page 318
B2. Eavesdropping vs. data encryption (2)
• To overcome all forms of eavesdropping,
• Data Encryption techniques or algorithms
can be used to:
– Scramble data into an unreadable form,
– Improve data privacy
– Prevent any unauthorised changes to the
message,
– Protect the confidentiality of data within
the organisation
B3. Viruses
• A computer virus is a program that invades a
computer system, normally by residing in
corrupt files.
• A virus can replicate itself and spread to other
files and computer systems.
• Some viruses are merely advertise their presence,
but others corrupt the files they infect and even
destroy databases
• So you need an “anti-virus” installed on your
computer
C. Operational Problems and Errors (1)
1. Dependency: Users of on-line and real-time systems are
usually totally reliant on the computer to perform their
tasks, and any breakdown seriously affects business.
– If a transaction processing system of a large
supermarket fails on a busy day, all point of sale
terminals linked can’t obtain price and other
product information until the problem is fixed.
– Have you been at the bank & been requested to
wait until the system is up so that you can be
served? If YES, then you now know effects of
“dependency”
– There must be a contingency plan to cover such
emergencies & enable availability and reliability of the
service needed.
C. Operational Problems and Errors (2)
2. Illogical Processes
• Usually computer errors are due to hardware
malfunction or the corruption of data.
• But errors such as incorrect reports result from
illogical errors in functions/modules made by
the developer.
• These issues can be overcome by adding
reasonability checks in the computer
programmes
D. Computer Monitoring and Privacy
1. Computer Monitoring
– Computer users on an organization network can be
monitored, so that the resultant information can be
used to judge the performance of each individual
user.
– The question is, how far can this process go before it
becomes an invasion of privacy?
2. Invasion of Privacy
– Privacy is a right of everyone
– But if criminal actions have increased, authorities have
to intercept and read your private “stuff”
– When organisations obtain information about
individuals and use it for commercial advantage.
E. Computers and Unemployment
• Advances in information technology have
provided business with cheap, reliable processing
power
• But they have also begun to impact on
employment levels.
Legal implications of information systems
• Due to the various social and security issues, regulatory
authorities have put in place laws/acts/regulations that
govern information processing, storage, and use.
• Examples include:
– The Data Protection Act
– The Computer Misuse Act 1990
– Copyright, Designs and Patents Act
• The Regulation of Investigatory Powers Act 2000
• The Freedom of Information (Scotland) Act 2002
– Health and safety regulations
• These acts are available via the Internet.
Self Study Task – Individual – Task 4.2.1
• Which laws, regulations, policies on ICT issues
have been developed in Uganda?
Economic implications of ICT
• Most jobs in ICT require that some further education
and training is carried out after leaving school
– Programmer/analyst
– Web administrator
– Network administrator
– Database manager
– Project leader and Senior analyst
– IT manager
• What is the main role or responsibility of the above
positions in an organization? – details are in the
notes
Ethical implications of information systems
• Ethics refers to principles of right and wrong that individuals
(acting as free moral agents) use to make choices to guide their
behaviour
• Information systems and ethics
– Information systems raise new ethical questions because they
create opportunities for:
• Intense social change, threatening existing distributions of
power, money, rights, and obligations
• New kinds of crime
• ethics in information systems: principles of right and wrong that
individuals (acting as free moral agents) use to make choices to
guide their behaviour when developing, using, and maintaining
information systems
Ethical implications of information systems
1. Netiquette: User’s guide to the polite way you use the web and
e-mail, whether on the Internet or an Intranet
2. Intellectual property rights
– Intellectual property is a form of knowledge that society has
decided can be assigned specific property rights.
– These rights have some resemblance to ownership rights over
physical property or land
 Censorship
• There is now control over what can be shown and
communicated, and unacceptable material (whether
written or visual) about an organization
– Regulating the content of the Internet
 Privacy and encryption
 ICT and global citizenship
Exploratory Reading Class Task 4.2.2
• Briefly discuss at least 5 fascinating computer crimes
that have been publicized over the past years.
• Briefly discuss at least 5 incidences where criminals
who were first charged with a computer crime, but
were later offered professional positions to help
authorities solve computer crime-related issues.
• Briefly explain the impact of at least 5 deadly
computer viruses
• Briefly list at least 5 computer anti-viruses

You might also like