Popular in Course
Popular in Information & Operations Mgmt
This 17 page Class Notes was uploaded by Darwin Stamm on Wednesday October 21, 2015. The Class Notes belongs to INFO 210 at Texas A&M University taught by Ravi Sen in Fall. Since its upload, it has received 30 views. For similar materials see /class/226259/info-210-texas-a-m-university in Information & Operations Mgmt at Texas A&M University.
Reviews for HNR
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 10/21/15
Managing IS Ethics and Crime Computer Literacy and Digital Divide 0 Computer literacy knowing how to use a computer 0 Digital divide the gap between those individuals in our society who are computer literate and have access to info resources and those who do not major ethical challenge of society 9 link between computer literacy and ability to compete in the Information Age get a job 0 Neo Luddites oppose IS fearing negative impacts such as social decay increased consumerism or loss of privacy Computer Ethics Info Accessibility All are central to most ethical concerns about info technology IT K 39139 f Info Property Information Privacy 0 What information an individual should have to reveal to others in the workplace or through other transactions ie online shopping 0 Identity theft one of the fastest growing info crimes 0 Unethical behavior misuses of computers and info 0 Steps to maintain privacy Choose web sites that are monitored by independent organizations Avoid having cookies left on your machine Visit sites anonymously Use caution when requesting con rmation email Information Accuracy 0 ensuring the authenticity and fidelity of info as well as with identifying who is responsible for info errors that harm people 0 People believe everything on the internet is factual so info accuracy is stepping toward making sure it is accurate 0 Example bank statements often need to be reconciled Top Ten List of DotCons Internet Auctions Internet access service Credit card fraud International modem dialing Web cramming Multilevel marketing plans pyramids Travel vacations Business opportunities Investements Health care products service Information Property Who owns legal info about individuals and how much info can be sold exchanged How did I get on another mailing list The company that maintains the database of customers or subscribers legally owns the info and is free to sell it 0 Your name address and other info for said company s future mailings and solicitations but said company can sell the info to other companies with similar mailings Limits If a co states any time that its collection of data was to only be used internally When you fill out a survey you are giving that co the ability to use your information Information Property Cybersguatting registering a domain name then trying to sell the name for big bucks to the person company or organization most likely to want it Digital rights management DRM technological solution that allows publishers to control their digital media to discourage limit or prevent illegal copying and distribution 0 Restrictions include which devices will play the media how many devices the medial will play on and how many times the media can be played 0 Minimizes sales losses by preventing unauthorized duplication Watermark electronic version of physical watermarks placed on paper currency to prevent counterfeiting used to prevent illegal sharing of DRM free content easily tracked Information Accessibility 0 Defining what info a person or organization has the right to obtain about others and how this info can be accessed and used The Need for a Code of Ethical Conduct 0 Guidelines of Ethics Prohibit Using a computer to harm others Interfering with other people s computer work Snooping in other people s files Using a computer to steal Using a computer to bear false witness Copying or using proprietary software without paying for it Using other people s computer resources without authorization or compensation Appropriating other people s intellectual output Think about social consequences of programs you write and systems you design Use a computer in ways that show consideration and respect for others Computer Crime 0 Computer crime the act of using a computer to commit an illegal act 0 Targeting a comp while committing an offense 0 Using a computer to commit an offense stealing credit card numbers skim money from bank accts or make unauthorized electronic fund transfers from financial institutions 0 Using computers to support a criminal activity despite the fact that comps are not actually targeted ie drug dealers Carding Cloning Data diddling Dumpster diving Spoofing phishing Phreaking f Types of Computer Crimes Stealing credit card info for one s own use or to sell Using scanners to steal Wireless transmitter codes for cell phones then duplicating the phone for illegal use Changing data before or after it is entered on computer s Scouring wastebaskets and dumpsters for credit card receipts and other info then using the info illegally selling it Attempting to trick financial acct and credit card holders into giving away their authorization info Breaking into telephone systems to make free long distance calls or for other purposes Con nuedquot Piggybacking shoulder surfing Salami slicing Social engineering masquerading Vishing Looking over a Person s shoulder While he she is using an ATM cell Phone or other device in order to steal access info Stealing small amts of money from a large number of financial accts Misrepresenting yourself in order to steal equipment or to trick others into revealing sensitive info Asking users to call a fake telephone number and confirm their acct info Computer Viruses and other harmful code 0 Malvvare malicious software viruses wormsTrojan horses 0 Viruses destructive programs that disrupt the normal functioning of computer systems can reproduce 0 worms usually doesn t destroy files but is designed to copy and send itself spreading rapidly throughout networked computers 0 Trojan horse does not copy itself but does a lot of damage hides instructions computer appears to function normally 0 Logic bombs variations of Trojan horses lie in wait for unsuspecting users to perform a triggering operation 0 Botnets destructive bots working together on a collection of zombie computers via the Internet Cyberwa rCyberterrorism 0 Cybervvar organized attempt by a country s military to disrupt or destroy the info and communication systems of another country 0 Web vandalism can occur by simply defacing Web sites 0 Patriot hackers independent citizens or supporters or a country that perpetrate attacks on perceived or real enemies 0 Cyberterrorism launched by individuals and organized groups use of computer and networking technologies against persons or property to intimidate or coerce govts civilians or any segment of society Categories of Cyberterrorist Attacks Coordinated bomb attacks Manipulation of financial and banking info Manipulation of the Pharmaceutical industry Manipulation of transportation control systems Manipulation of the broader civilian infrastructures Manipulation of nuclear power plants How Terrorists are using the internet Info dissemination Data mining Fund raising Recruiting and mobilization Networking Info sharing Planning and coordinating Info gathering Location monitoring