Lecture Business driven information systems (4e): Chapter 4 - Paige Baltzan

The learning objectives for this chapter include: Compare the responsibilities of a chief information officer (CIO), chief technology officer (CTO), chief privacy officer (CPO), chief security officer (CSO), and chief knowledge office (CKO); explain the gap between IT people and business people and the primary reason this gap exists; define the relationship between information security and ethics;. | CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS CHAPTER OVERVIEW SECTION – Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace SECTION – Information Security Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology SECTION Ethics LEARNING OUTCOMES Explain the ethical issues in the use of the information age Identify the six epolicies an organization should implement to protect themselves INFORMATION ETHICS Ethics – The principles and standards that guide our behavior toward other people Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself INFORMATION ETHICS Business issues related to information ethics Intellectual property Copyright Pirated software Counterfeit software Digital | CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS CHAPTER OVERVIEW SECTION – Ethics Information Ethics Developing Information Management Policies Ethics in the Workplace SECTION – Information Security Protecting Intellectual Assets The First Line of Defense - People The Second Line of Defense - Technology SECTION Ethics LEARNING OUTCOMES Explain the ethical issues in the use of the information age Identify the six epolicies an organization should implement to protect themselves INFORMATION ETHICS Ethics – The principles and standards that guide our behavior toward other people Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself INFORMATION ETHICS Business issues related to information ethics Intellectual property Copyright Pirated software Counterfeit software Digital rights management INFORMATION ETHICS Privacy is a major ethical issue Privacy – The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality – the assurance that messages and information are available only to those who are authorized to view them INFORMATION ETHICS Individuals form the only ethical component of MIS Individuals copy, use , and distribute software Search organizational databases for sensitive and personal information Individuals create and spread viruses Individuals hack into computer systems to steal information Employees destroy and steal information INFORMATION ETHICS Acting ethically and legally are not always the same Information Does Not Have Ethics, People Do Information does not care how it is used, it will not stop itself from sending spam, viruses, or highly-sensitive information Tools to prevent information misuse Information management .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.