DOC PREVIEW
Radford ITEC 110 - Lecture Notes

This preview shows page 1-2-3-4-26-27-28-53-54-55-56 out of 56 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 56 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Fundamentals of Information Systems, Fifth Edition Chapter 9 The Personal and Social Impact of ComputersFundamentals of Information Systems, Fifth Edition 2 Principles and Learning Objectives • Policies and procedures must be established to avoid computer waste and mistakes – Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions – Identify policies and procedures useful in eliminating waste and mistakes – Discuss the principles and limits of an individual’s right to privacyFundamentals of Information Systems, Fifth Edition 3 Principles and Learning Objectives (continued) • Computer crime is a serious and rapidly growing area of concern requiring management attention – Explain the types and effects of computer crime – Identify specific measures to prevent computer crimeFundamentals of Information Systems, Fifth Edition 4 Principles and Learning Objectives (continued) • Jobs, equipment, and working conditions must be designed to avoid negative health effects – List the important effects of computers on the work environment. – Identify specific actions that must be taken to ensure the health and safety of employeesFundamentals of Information Systems, Fifth Edition 5 Principles and Learning Objectives (continued) • Practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work – Outline criteria for the ethical use of information systemsFundamentals of Information Systems, Fifth Edition 6 Computer Waste and Mistakes • Computer waste – Inappropriate use of computer technology and resources • Computer-related mistakes – Errors, failures, and other computer problems that make computer output incorrect or not usefulFundamentals of Information Systems, Fifth Edition 7 Computer Waste • Discarding old software and even complete computer systems when they still have value • Building and maintaining complex systems that are never used to their fullest extent • Using corporate time and technology for personal use • SpamFundamentals of Information Systems, Fifth Edition 8 Computer-Related Mistakes • Causes: – Failure by users to follow proper procedures – Unclear expectations and a lack of feedback – Program development that contains errors – Incorrect data entry by data-entry clerkFundamentals of Information Systems, Fifth Edition 9 Preventing Computer-Related Waste and Mistakes • Preventing waste and mistakes involves: – Establishing policies and procedures – Implementing policies and procedures – Monitoring policies and procedures – Reviewing policies and proceduresFundamentals of Information Systems, Fifth Edition 10 Implementing Policies and Procedures • Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices • Training programs for individuals and workgroups • Manuals and documents on how computer systems are to be maintained and used • Approval of certain systems and applications to ensure compatibility and cost-effectivenessFundamentals of Information Systems, Fifth Edition 11 Implementing Policies and Procedures • Policies often focus on: – Implementation of source data automation and the use of data editing to ensure data accuracy and completeness – Assignment of clear responsibility for data accuracy within each information system • Training – Key aspect of implementationFundamentals of Information Systems, Fifth Edition 12 Monitoring Policies and Procedures • Monitor routine practices and take corrective action if necessary • Implement internal audits to measure actual results against established goalsFundamentals of Information Systems, Fifth Edition 13 Reviewing Policies and Procedures • During review, people should ask the following questions: – Do current policies cover existing practices adequately? – Does the organization plan any new activities in the future? – Are contingencies and disasters covered?Fundamentals of Information Systems, Fifth Edition 14 Computer Crime • Financial fraud, followed by virus attacks – The leading cause of financial loss from computer incidents • Average annual loss from computer incidents is $350,424 • Computer crime is now globalFundamentals of Information Systems, Fifth Edition 15 The Computer as a Tool to Commit Crime • Social engineering – Using social skills to get computer users to provide information to access an information system or its data • Dumpster diving – Going through the trash cans of an organization to find confidential information, including information needed to access an information systemFundamentals of Information Systems, Fifth Edition 16 Cyberterrorism • Cyberterrorist – Intimidates or coerces a government to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on themFundamentals of Information Systems, Fifth Edition 17 Identity Theft • Imposter obtains key pieces of personal identification information in order to impersonate someone else • Consumers can help protect themselves by: – Regularly checking their credit reports with major credit bureaus – Following up with creditors if their bills do not arrive on time – Not revealing any personal information in response to unsolicited e-mail or phone callsFundamentals of Information Systems, Fifth Edition 18 Internet Gambling • Size of the online gambling market is not known – Estimate is that $10–20 billion is wagered on online poker alone each year • Revenues generated by Internet gambling – Represent a major untapped source of income for the state and federal governmentsFundamentals of Information Systems, Fifth Edition 19 The Computer as the Object of Crime • Crimes fall into several categories such as: – Illegal access and use – Data alteration and destruction – Information and equipment theft – Software and Internet piracy – Computer-related scams – International computer crimeFundamentals of Information Systems, Fifth Edition 20 Illegal Access and Use • Hacker – Learns about and uses computer systems •


View Full Document

Radford ITEC 110 - Lecture Notes

Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?