Security and ethical issues - Arber Hoxhallari
-
Upload
arber-hoxhallari -
Category
Business
-
view
275 -
download
1
description
Transcript of Security and ethical issues - Arber Hoxhallari
Security and ethical issues in IT
Arber Hoxhallari
iiiiiiiiiiiiii
Overview
• Ethical responsibility
• Computer crime
• Privacy issues
• Health issues
• Other issues
iiiiiiiiiiiii
Ethical responsibility
• Business ethics - is concerned with the numerous ethical questions that managers must confront as part of their daily business decision-making.
• Technology ethics - This ethical dimension deals specifically with the ethics of the use of technology.
• Ethical Guidelines - Acting with integrity, Increasing your professional competence, Setting high standards of personal performance, Accepting responsibility for your work, Advancing the health, privacy, and general welfare of the public.
iiiiiiiiiiiiiii
Computer crime
The Association of Information Technology Professionals defines computer crime as including:
• The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources.
• The unauthorized release of information.
• The unauthorized copying of software.
• Denying an end user access to his or her own hardware, software, data, or network resources.
• Using or conspiring to use computer or network resources to illegally obtain information or tangible property.
iiiiiiiiiiiiiiiii
Privacy issues
• Accessing individuals’ private e-mail conversations and computer records
• Always “knowing” people’s location
• Computer matching
• Unauthorized personal files
iiiiiiiiiiiii
Health issues
The use of IT in the workplace raises a variety of health issues. Heavy use of computers is reportedly causing health problems such as:
• Job stress • Damaged arm and neck muscles • Eye strain • Radiation exposure • Death by computer-caused accidents
iiiiiiiiiiiiiii
Other challenges
• Employment Challenges.
• Computer Monitoring
• Challenges in Working Conditions
• Challenges to Individuality
iiiiiiiiiiiiii
Security Management ToolsInternetworked Security defense
• Encryption
• Firewalls
• e – mail monitoring
• Virus protection
Other Security measures
• Passwords
• Backup files
• Biometric Security
• Computer failures control
• Disaster recovery
iiiiiiiiiiiiii
Thank You !
Questions ?
iiiiiiiiiiiii