You are on page 1of 9

SECURITY AND ETHICAL CHALLENGES

Group Name-’’ABACUS’’
1.Tanjila Akter Keya-15102040
2.Pranto Sarker Topu-15102042
Learning Objectives
 Identify several ethical issues regarding how the use of
information technologies in business affects
employment, individuality, working conditions, privacy,
crime, health, and solutions to societal problems.
 Identify several types of security management strategies
and defenses and explain how they can be used to
ensure the security of business applications of
information technology.
IT Security, Ethics, and Society
IT has both beneficial
and detrimental effects
on society and people
•Manage work
activities to minimize
the detrimental
effects of IT
•Optimize the
beneficial effects
Theories of corporate social
responsibility

 The stockholders theory holds that managers are agents


of the stockholders and their only ethical responsibility
is to increase the profits of the business without
violating the law or engaging in fraudulent activities.
 The social contract theory states that companies have
ethical responsibilities to all members of society, which
allow corporations to exist based on a social contract
 The stakeholders theory states that managers have
ethical responsibility to manage a firm for the benefit.
Computer Crime
Unauthorized use,access,modification,or destruction of
hardware, software, data, or network resources
 The unauthorized release of information

 The unauthorized copying of software


Security challenges
 Hacking – The obsessive use of computers, or the
unauthorized access and use of networked
computer systems
 Cyber Theft – Involves unauthorized network
entry and the fraudulent alteration of computer
databases
 Unauthorized use at work – Also called time and
resource theft – May range from doing private
consulting or personal finances, to playing video
games, to unauthorized use of the Internet on
company networks
 Piracy of intellectual property – Other forms of
intellectual property covered by copyright laws
 Software Piracy – Unauthorized copying of
software
Privacy Issues
 Privacy on the internet & softwere:
 Users of the Internet are highly visible and open to violations of
privacy
 Cookies capture information about you every time you visit a site
That information may be sold to third parties
 Computer Matching :
Matching on computer-based information
systems and databases with individuals or other
organization internal documents for business,
government submission or any other work.
 Privacy Laws :
 Electronic Communications Privacy Act
 Computer Fraud and Abuse Act
Security management

 Encryption Security monitors


 Firewalls  Biometric security
 Computer failure
 Denial of service controls
attacks  Fault tolerant
 E-mail monitoring systems
 Disaster recovery
 Virus defense  System controls
 Security codes and audits
 Backup files
Conclusion
‘With great power comes great responsibilities’.
Information systems bring new opportunities and
advantages to how we do business but they also
introduce issues that can negatively affect society
(cybercrime). An organization needs to address
these issues and come up with a framework of MIS
security, ICT policy, etc.

You might also like