信息时代的管理信息系统Chap_003.ppt
- 文档编号:1425966
- 上传时间:2022-10-22
- 格式:PPT
- 页数:39
- 大小:1.85MB
信息时代的管理信息系统Chap_003.ppt
《信息时代的管理信息系统Chap_003.ppt》由会员分享,可在线阅读,更多相关《信息时代的管理信息系统Chap_003.ppt(39页珍藏版)》请在冰豆网上搜索。
Chapter8ProtectingPeopleandInformation:
ThreatsandSafeguards,Copyright2010bytheMcGraw-HillCompanies,Inc.Allrightsreserved.,McGraw-Hill/Irwin,STUDENTLEARNINGOUTCOMES,Defineethicsanddescribethetwofactorsthataffecthowyoumakeadecisionconcerninganethicalissue.Defineanddescribeintellectualproperty,copyright,FairUseDoctrine,andpiratedsoftware.Describeprivacyanddescribewaysinwhichitcanbethreatened.Describethewaysinwhichinformationonyourcomputerornetworkisvulnerableandlistmeasuresyoucantaketoprotectit.,8-2,SHELOST$400,000TOANE-MAILSCAM,“419”e-mailsareapopulartypeofscam419scamspromiseyou,inane-mail,thatyouwillgetrichifyouanteupasmallfeeJanellaSpearstookthebaitandspent$400,000tryingtocollectherfortuneSheevencashedinherhusbandsretirementtogetthemoneytosendthecrooks,8-3,CaseStudyQuestions,Whatdoyouthinkaboutthistruestory?
Haveyoueverbeencaughtinascam?
Howdidyoufeelwhenyoudiscoveredthatyouhadbeenfooled?
Whatwouldyoudoifyouknewthatyourparentwasbeingcomplicityinhisorherownvictimization?
8-4,INTRODUCTION,HandlinginformationresponsiblymeansunderstandingthefollowingissuesEthicsPersonalprivacyThreatstoinformationProtectionofinformation,8-5,CHAPTERORGANIZATION,EthicsLearningOutcomes#1PrivacyLearningOutcome#3SecurityLearningOutcome#4,8-6,ETHICS,EthicstheprinciplesandstandardsthatguideourbehaviortowardotherpeopleEthicsarerootedinhistory,culture,andreligion,8-7,FactorstheDetermineHowYouDecideEthicalIssues,ActionsinethicaldilemmasdeterminedbyYourbasicethicalstructureThecircumstancesofthesituationYourbasicethicalstructuredetermineswhatyouconsidertobeMinorethicalviolationsSeriousethicalviolationsVeryseriousethicalviolations,8-8,BasicEthicalStructure,8-9,CircumstancesoftheSituation,ConsequencesoftheactionorinactionSocietysopinionoftheactionorinactionLikelihoodofeffectofactionorinactionTimetoconsequencesofactionorinactionRelatednessofpeoplewhowillbeaffectedbyactionorinactionReachofresultofactionorinaction,8-10,IntellectualProperty,IntellectualpropertyintangiblecreativeworkthatisembodiedinphysicalformCopyrightlegalprotectionaffordedanexpressionofanideaFairUseDoctrinemayusecopyrightedmaterialincertainsituations,8-11,IntellectualProperty,UsingcopyrightedsoftwarewithoutpermissionviolatescopyrightlawPiratedsoftwaretheunauthorizeduse,duplication,distribution,orsaleofcopyrightedsoftware,8-12,PRIVACY,Privacytherighttoleftalonewhenyouwanttobe,tohavecontroloveryourownpersonalpossessions,andnottobeobservedwithoutyourconsentDimensionsofprivacyPsychological:
tohaveasenseofcontrolLegal:
tobeabletoprotectyourself,8-13,PrivacyandOtherIndividuals,Keylogger(keytrapper)softwareaprogramthat,wheninstalledonacomputer,recordseverykeystrokeandmouseclickScreencaptureprogramscapturescreenfromvideocardE-mailisstoredonmanycomputersasittravelsfromsendertorecipientHardwarekeyloggerhardwaredevicethatcaptureskeystrokesmovingbetweenkeyboardandmotherboard.EventDataRecorders(EDR)locatedintheairbagcontrolmoduleandcollectsdatafromyourcarasyouaredriving.,8-14,AnE-MailisStoredonManyComputers,8-15,IdentityTheft,Identitythefttheforgingofsomeonesidentityforthepurposeoffraud,8-16,IdentityTheft,Phishing(carding,brandspoofing)atechniquetogainpersonalinformationforthepurposeofidentitytheftNEVERReplywithoutquestiontoane-mailaskingforpersonalinformationClickdirectlyonaWebsiteprovidedinsuchane-mail,8-17,IdentityTheft,8-18,Pharming,Pharming-reroutingyourrequestforalegitimateWebsitesendingittoaslightlydifferentWebaddressorbyredirectingyouafteryouarealreadyonthelegitimatesitePharmingisaccomplishedbygainingaccesstothegiantdatabasesthatInternetprovidersusetorouteWebtraffic.ItoftenworksbecauseitshardtospotthetinydifferenceintheWebsiteaddress.,8-19,PrivacyandEmployees,CompaniesneedinformationabouttheiremployeestoruntheirbusinesseffectivelyAsofMarch2005,60%ofemployersmonitoredemployeee-mails70%ofWebtrafficoccursduringworkhours78%ofemployersreportedabuse60%employeesadmittedabuse,8-20,PrivacyandEmployees,VisitinginappropriatesitesGaming,chatting,stocktrading,socialnetworking,etc.,8-21,ReasonsforMonitoring,HirethebestpeoplepossibleEnsureappropriatebehavioronthejobAvoidlitigationforemployeemisconduct,8-22,PrivacyandConsumers,ConsumerswantbusinessestoKnowwhotheyare,butnottoknowtoomuchProvidewhattheywant,butnotgatherinformationonthemLetthemknowaboutproducts,butnotpesterthemwithadvertising,8-23,Cookies,CookieasmallfilethatcontainsinformationaboutyouandyourWebactivities,whichaWebsitep
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 信息时代 管理信息系统 Chap_003