I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

26
INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE Chapter 9

Transcript of I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

Page 1: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE

Chapter 9

Page 2: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

2

SIX MAJOR ROLES AND GOALS OF IT

1. Increase employee productivity by reducing time, errors and costs using

2. Enhance decision making 3. Improve team collaboration 4. Create business partnerships and alliances 5. Enable global reach all over the world taking into

consideration the culture of each nation or society. 6. Facilitate organizational transformation as the

organization evolves and responds to the ever-changing marketplace.

Page 3: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-3

AGES OF PROGRESS

Agricultural Industrial(Prior to 1890’s) (1890’s to 1960’s)

Informational(1960’s to Present)

Page 4: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-4

INFORMATION AGE TERMS______________ ______________ Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today

______________ ______________ Knowing how to use a computer to gather, store, organize, and otherwise process information. These are desirable and even required for many occupations today

______________ ______________ The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them

______________ ______________ The gap developing in society between those that are computer literate and have access to computers and those that don’t and how it will affect them

______________ ______________ The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

______________ ______________ The issues and standards of conduct as they pertain to the use of information systems including information privacy, accuracy, property, and accessibility

Page 5: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-5

COMPUTER ETHICS CONCERNS

Page 6: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-6

INFORMATION PRIVACY AND ISSUES______________ ______________ What information an individual must reveal to others in the course of gaining employment or shopping online

______________ ______________ What information an individual must reveal to others in the course of gaining employment or shopping online

______________ ______________

The stealing of another person’s private information (SIN, credit card numbers, etc.) for the purpose of using it to gain credit, borrow money, buy merchandise, or otherwise run up debt that are never paid. This is especially problematic because it:

• is ______________ to the victim, they don’t know it is happening • is very ______________ correct…credit agencies are involved• can cause ______________ and legal costs

Paying for Privacy

Page 7: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-7

INFORMATION PRIVACY - HOW TO MAINTAIN

Avoid having ______________ left on your machineUse settings in your browser to block cookies from being deposited on your machine by primary and third parties

Use caution when ______________ confirmation emailUse a separate e-mail account from normal to protect information from your employer, sellers, and any one using your computer

Visit sites ______________ Use online privacy services that provide total privacy by blocking all techniques used to identify you online (e.g. Anonymizer)

Choose ______________ monitored by independent organizationsUse rating sites to identify merchant sites whose privacy policies conform to standards and are monitored (e.g epubliceye.com)

Page 8: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-8

INFORMATION ACCURACY______________ ______________ Concerned with assuring the authenticity and fidelity of information, and identifying those responsible for information errors that harm people

______________ ______________ Concerned with assuring the authenticity and fidelity of information, and identifying those responsible for information errors that harm people

Sources of information errorErrors in computer output can come from two primary sources. These are:

• ______________ Errors – errors in the computer program logic, communication and/or processing that receives, processes, stores, and presents information

• ______________ Errors – errors by the person(s) entering data or information into the computer system

Page 9: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-9

INFORMATION PROPERTY______________ ______________ Concerned with who owns information about individuals and how information can be sold and exchanged

______________ ______________ Concerned with who owns information about individuals and how information can be sold and exchanged

______________ ______________ Are stated policies from the organizations collecting the information and how they intend to use it. These are legally binding statements

• ______________ Use – used within the organization only • ______________ Use – can be sold to outside parties

______________ ______________ The organization storing the information owns it if it is given willingly…even if unknowingly by use of their sites (e.g. online surveys, credit card transactions, etc.)

Page 10: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-10

INFORMATION PROPERTY – GATHERING AND USES

______________ This unsolicited e-mail can come from reputable sites selling your information. Possible problems from spam include:

• ______________ in attachments or links• Added to other spam lists by responding • Slows systems by taking up resources, disk space

______________ This unsolicited e-mail can come from reputable sites selling your information. Possible problems from spam include:

• ______________ in attachments or links• Added to other spam lists by responding • Slows systems by taking up resources, disk space

______________ These files stored on a computer do have legitimate uses but they also can:

• Store and transmit information about online habits including, sites visited, purchases made, etc.

• ______________ accessing sites when cookies are refused• ______________ and combine information with other information to build a

personal profile to be sold

From Subject Received Size1(484)993-7152 Hollie ****SPAM**** Fw: Re: GET YOURU NIVERSITY{} DIPLOMA 6/19/2007 9 KB

Page 11: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-11

INFORMATION PROPERTY – GATHERING AND USES

______________ These ______________ computer ______________ are installed and then collect information about individuals without their knowledge. Currently this technology is not illegal

______________ These ______________ computer ______________ are installed and then collect information about individuals without their knowledge. Currently this technology is not illegal

______________ ______________

Spyware applications collect and transmit, or use, this information locally in several ways, including:

• ______________ of information to online marketers (spammers)• Illegal uses such as identity theft• ______________ user experience to market to the user by presenting ad

banners, pop-ups, etc. (Adware)

______________ ______________

Spyware applications collect and transmit, or use, this information locally in several ways, including:

• ______________ of information to online marketers (spammers)• Illegal uses such as identity theft• ______________ user experience to market to the user by presenting ad

banners, pop-ups, etc. (Adware)

Page 12: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-12

INFORMATION ACCESSIBILITY

______________ ______________ Concerned with defining what information a person or organization has the right to obtain about others and how that information is used

______________ ______________ Concerned with defining what information a person or organization has the right to obtain about others and how that information is used

Who has access?Besides personal access, other parties have the legal right to access and view private information including:

• ______________– using advanced software packages (e.g Carnivore), e-mail traffic and all online activity can be monitored in real-time or after the fact

• ______________– they can legally limit, monitor or access activities on company-owned computers or networks as long as policy has been distributed to employees

Page 13: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-13

INFORMATION ACCESS – EXAMPLE OF CARNIVORE

Page 14: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-14

THE NEED FOR ______________ BEHAVIOUR

______________ ______________ Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as:

• ______________ manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality

• ______________ use of computers – at work or at school, “stealing time” for personal business or use

• ______________ ______________ – by companies compiling information to sell for profit

______________ ______________ Illegal versus unethical behaviour is an information age concern. Though activities are not explicitly illegal, questions exist of whether they are unethical, such as:

• ______________ manipulation/modification – in this circumstance, the photograph not longer reflects absolute reality

• ______________ use of computers – at work or at school, “stealing time” for personal business or use

• ______________ ______________ – by companies compiling information to sell for profit

Page 15: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-15

RESPONSIBLE COMPUTER USE

The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors:

• Using a computer to ______________ others• Interfering with other ______________ computer work• Snooping in other people’s files• Using a computer to ______________ • Using a ______________ to bear false witness• Copying or using proprietary software without paying for it• Using other people’s computer resources without authorization

or compensation• Appropriating other people’s ______________ output

The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit the following behaviors:

• Using a computer to ______________ others• Interfering with other ______________ computer work• Snooping in other people’s files• Using a computer to ______________ • Using a ______________ to bear false witness• Copying or using proprietary software without paying for it• Using other people’s computer resources without authorization

or compensation• Appropriating other people’s ______________ output

______________ In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

______________ In area of ethics, we rely on guidelines to guide behaviour. These guidelines can come from many organizations

Pirates

Page 16: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-16

COMPUTER CRIMES

______________ ______________ The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following:

• Targeting a computer while committing an offense

• Using a computer to ______________ and offense

• Using computers to support criminal ______________

______________ ______________ The act of using a computer to commit an illegal act. The broad definition of computer crime can include the following:

• Targeting a computer while committing an offense

• Using a computer to ______________ and offense

• Using computers to support criminal ______________

Page 17: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-17

COMPUTER CRIME – ______________ ACCESS______________ AccessA person gaining entry to a computer system for which they have no authority to use such access

THIS IS A COMPUTER CRIME!

______________ AccessA person gaining entry to a computer system for which they have no authority to use such access

THIS IS A COMPUTER CRIME!

____come from inside the

organization(employees)

Page 18: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-18

COMPUTER CRIME – VARIOUS TYPES 1ST HALF

Page 19: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-19

COMPUTER CRIME – VARIOUS TYPES 2ND HALF

Page 20: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-20

COMPUTER CRIMES - ______________ AND ______________

______________ A term to describe ______________ access to computers based entirely on a curiosity to learn as much as possible about computers.

______________ A term to describe ______________ access to computers based entirely on a curiosity to learn as much as possible about computers.

______________

A term to describe those who break into computer systems with the intention of doing ______________ or committing ______________ This term was created because of protests by true hackers

______________

A term to describe those who break into computer systems with the intention of doing ______________ or committing ______________ This term was created because of protests by true hackers

Phishing

Page 21: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-21

COMPUTER CRIME – ______________ ______________

______________ ______________ This practice of buying one copy and making multiple copies for personal and commercial use, or for resale is illegal in most countries while others offer weak or nonexistent protections. This has become and international problem as shown below

Page 22: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-22

DESTRUCTIVE CODE THAT REPLICATESViruses These programs disrupt the normal function of a computer system through harmless pranks or by destroying files on the infected computer. They come in several types:

• ______________ Sector• ______________ Infector – • Combination – • Attachment

Viruses These programs disrupt the normal function of a computer system through harmless pranks or by destroying files on the infected computer. They come in several types:

• ______________ Sector• ______________ Infector – • Combination – • Attachment

______________

This destructive code also replicates and spreads through networked computers but does damage by clogging up memory to slow the computer versus destroying files

______________

This destructive code also replicates and spreads through networked computers but does damage by clogging up memory to slow the computer versus destroying files

Page 23: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-23

COMPUTER CRIMES – DESTRUCTIVE CODE

Page 24: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-24

DESTRUCTIVE CODE THAT DOESN’T REPLICATES

______________ ______________ These programs do not replicate but can do ______________ as they run hidden programs on the infected computer that appears to be running ______________ (i.e. a game program that creates an account on the unsuspecting user’s computer for unauthorized access)

______________ ______________ These programs do not replicate but can do ______________ as they run hidden programs on the infected computer that appears to be running ______________ (i.e. a game program that creates an account on the unsuspecting user’s computer for unauthorized access)

______________ ______________ A variation of a Trojan Horse that also do not replicate and are hidden but are designed to lie in wait for a triggering operation. (i.e. a disgruntled employee that sets a program to go off after they leave the company)

• ______________ Bombs – are set off by dates (e.g. a birthday)

• ______________ Bombs – are set off by certain operations (e.g. a certain password)

______________ ______________ A variation of a Trojan Horse that also do not replicate and are hidden but are designed to lie in wait for a triggering operation. (i.e. a disgruntled employee that sets a program to go off after they leave the company)

• ______________ Bombs – are set off by dates (e.g. a birthday)

• ______________ Bombs – are set off by certain operations (e.g. a certain password)

Page 25: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.

9-25

______________ AND ______________

______________ The use of ______________ and networking technologies against persons or property to intimidate or coerce governments, civilians, or any ______________ of society in order to attain ______________ religious, or ideological goals

______________

An organized attempt by a country’s ______________ to disrupt or ______________ the information and communications systems of another country.

______________ The use of ______________ and networking technologies against persons or property to intimidate or coerce governments, civilians, or any ______________ of society in order to attain ______________ religious, or ideological goals

______________

An organized attempt by a country’s ______________ to disrupt or ______________ the information and communications systems of another country.

Page 26: I NFORMATION S YSTEMS FOR C OMPETITIVE A DVANTAGE Chapter 9.