Fundamentals of Information Systems, Fifth Edition Chapter 9 The Personal and Social Impact of ComputersFundamentals of Information Systems, Fifth Edition 2 Principles and Learning Objectives • Policies and procedures must be established to avoid computer waste and mistakes – Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions – Identify policies and procedures useful in eliminating waste and mistakes – Discuss the principles and limits of an individual’s right to privacyFundamentals of Information Systems, Fifth Edition 3 Principles and Learning Objectives (continued) • Computer crime is a serious and rapidly growing area of concern requiring management attention – Explain the types and effects of computer crime – Identify specific measures to prevent computer crimeFundamentals of Information Systems, Fifth Edition 4 Principles and Learning Objectives (continued) • Jobs, equipment, and working conditions must be designed to avoid negative health effects – List the important effects of computers on the work environment. – Identify specific actions that must be taken to ensure the health and safety of employeesFundamentals of Information Systems, Fifth Edition 5 Principles and Learning Objectives (continued) • Practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work – Outline criteria for the ethical use of information systemsFundamentals of Information Systems, Fifth Edition 6 Computer Waste and Mistakes • Computer waste – Inappropriate use of computer technology and resources • Computer-related mistakes – Errors, failures, and other computer problems that make computer output incorrect or not usefulFundamentals of Information Systems, Fifth Edition 7 Computer Waste • Discarding old software and even complete computer systems when they still have value • Building and maintaining complex systems that are never used to their fullest extent • Using corporate time and technology for personal use • SpamFundamentals of Information Systems, Fifth Edition 8 Computer-Related Mistakes • Causes: – Failure by users to follow proper procedures – Unclear expectations and a lack of feedback – Program development that contains errors – Incorrect data entry by data-entry clerkFundamentals of Information Systems, Fifth Edition 9 Preventing Computer-Related Waste and Mistakes • Preventing waste and mistakes involves: – Establishing policies and procedures – Implementing policies and procedures – Monitoring policies and procedures – Reviewing policies and proceduresFundamentals of Information Systems, Fifth Edition 10 Implementing Policies and Procedures • Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices • Training programs for individuals and workgroups • Manuals and documents on how computer systems are to be maintained and used • Approval of certain systems and applications to ensure compatibility and cost-effectivenessFundamentals of Information Systems, Fifth Edition 11 Implementing Policies and Procedures • Policies often focus on: – Implementation of source data automation and the use of data editing to ensure data accuracy and completeness – Assignment of clear responsibility for data accuracy within each information system • Training – Key aspect of implementationFundamentals of Information Systems, Fifth Edition 12 Monitoring Policies and Procedures • Monitor routine practices and take corrective action if necessary • Implement internal audits to measure actual results against established goalsFundamentals of Information Systems, Fifth Edition 13 Reviewing Policies and Procedures • During review, people should ask the following questions: – Do current policies cover existing practices adequately? – Does the organization plan any new activities in the future? – Are contingencies and disasters covered?Fundamentals of Information Systems, Fifth Edition 14 Computer Crime • Financial fraud, followed by virus attacks – The leading cause of financial loss from computer incidents • Average annual loss from computer incidents is $350,424 • Computer crime is now globalFundamentals of Information Systems, Fifth Edition 15 The Computer as a Tool to Commit Crime • Social engineering – Using social skills to get computer users to provide information to access an information system or its data • Dumpster diving – Going through the trash cans of an organization to find confidential information, including information needed to access an information systemFundamentals of Information Systems, Fifth Edition 16 Cyberterrorism • Cyberterrorist – Intimidates or coerces a government to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on themFundamentals of Information Systems, Fifth Edition 17 Identity Theft • Imposter obtains key pieces of personal identification information in order to impersonate someone else • Consumers can help protect themselves by: – Regularly checking their credit reports with major credit bureaus – Following up with creditors if their bills do not arrive on time – Not revealing any personal information in response to unsolicited e-mail or phone callsFundamentals of Information Systems, Fifth Edition 18 Internet Gambling • Size of the online gambling market is not known – Estimate is that $10–20 billion is wagered on online poker alone each year • Revenues generated by Internet gambling – Represent a major untapped source of income for the state and federal governmentsFundamentals of Information Systems, Fifth Edition 19 The Computer as the Object of Crime • Crimes fall into several categories such as: – Illegal access and use – Data alteration and destruction – Information and equipment theft – Software and Internet piracy – Computer-related scams – International computer crimeFundamentals of Information Systems, Fifth Edition 20 Illegal Access and Use • Hacker – Learns about and uses computer systems •
View Full Document