Introduction to Business & Information Systems PDF
Document Details
Uploaded by ReachableHeliotrope6282
Universiti Teknologi PETRONAS
Tags
Related
- Management information systems managing the digital firm (Jane Price Laudon Kenneth C. Laudon) (Z-Library) - Copy (1) (9).pdf
- Essentials of Management Information Systems PDF
- PrEUIS - Week 1 - Lesson 1 & 2 PDF
- Lecture 4: Ethical Organizational Communication in Information Systems PDF
- Information Technology Professional Ethics Lecture Notes PDF
- Business Information Management (MI4007) Week 10 Lecture 2 PDF
Summary
This document is a presentation on introduction to business and information systems, discussing information ethics, security threats, and intellectual property protection. It gives a general overview of the topics.
Full Transcript
FBB0025 ORGANIZATIONAL INTRODUCTION TO BUSINESS & STRUCTURES THAT SUPPORT STRATEGIC INFORMATION SYSTEMS INITIATIVES LEARNING OUTCOMES 1. Explain the ethical issues in the use of the information age. 2. Describe information...
FBB0025 ORGANIZATIONAL INTRODUCTION TO BUSINESS & STRUCTURES THAT SUPPORT STRATEGIC INFORMATION SYSTEMS INITIATIVES LEARNING OUTCOMES 1. Explain the ethical issues in the use of the information age. 2. Describe information security and the difference between hackers and viruses. © McGraw Hill 2 INFORMATION ETHICS 1 Ethics – The principles and standards that guide our behavior toward other people. Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself. © McGraw Hill 3 INFORMATION ETHICS 2 Business issues related to information ethics. Copyright. Counterfeit software. Digital rights management. Intellectual property. Patent. Pirated software. © McGraw Hill 4 INFORMATION ETHICS 3 Privacy is a major ethical issue Privacy – The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality – the assurance that messages and information are available only to those who are authorized to view them © McGraw Hill 5 INFORMATION ETHICS 4 Individuals form the only ethical component of MIS. Individuals copy, use, and distribute software. Search organizational databases for sensitive and personal information. Individuals create and spread viruses. Individuals hack into computer systems to steal information. Employees destroy and steal information. © McGraw Hill 6 INFORMATION ETHICS 5 Acting ethically and legally are not always the same. © McGraw Hill 7 INFORMATION DOES NOT HAVE ETHICS, PEOPLE DO Information does not care how it is used, it will not stop itself from sending spam, viruses, or highly-sensitive information. Tools to prevent information misuse. Information management. Information governance. Information compliance. Information Secrecy. Information Property. © McGraw Hill 8 PROTECTING INTELLECTUAL ASSETS 1 Organizational information is intellectual capital - it must be protected. Information security – The protection of information from accidental or intentional misuse by persons inside or outside an organization. Downtime – Refers to a period of time when a system is unavailable. © McGraw Hill 9 PROTECTING INTELLECTUAL ASSETS 2 Sources of Unplanned Downtime Bomb threat Hacker Snowstorm Burst pipe Hail Sprinkler malfunction Chemical spill Hurricane Static electricity Construction Ice storm Strike Corrupted data Insects Terrorism Earthquake Lightning Theft Electrical short Network failure Tornado Epidemic Plane crash Train derailment Equipment failure Frozen pipe Smoke damage Evacuation Power outage Vandalism Explosion Power surge Vehicle crash Fire Rodents Virus Flood Sabotage Water damage (various) Fraud Shredded data Wind © McGraw Hill 10 PROTECTING INTELLECTUAL ASSETS 3 How Much Will Downtime Cost Your Business? © McGraw Hill 11 SECURITY THREATS CAUSED BY HACKERS AND VIRUSES 1 Hacker – Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. Black-hat hacker. Cracker. Cyberterrorist. Hactivist. Script kiddies or script bunnies. White-hat hacker. © McGraw Hill 12 SECURITY THREATS CAUSED BY HACKERS AND VIRUSES 2 Virus - Software written with malicious intent to cause annoyaance or damage. Worm. Malware. Adware. Spyware. Ransomware. Scareware. © McGraw Hill 13 SECURITY THREATS CAUSED BY HACKERS AND VIRUSES 3 Virus - Software written with malicious intent to cause annoyance or damage. Backdoor program. Denial-of-service attack (DoS). Distributed denial-of-service attack (DDoS). Polymorphic virus. Trojan-horse virus. © McGraw Hill 14 SECURITY THREATS CAUSED BY HACKERS AND VIRUSES 4 How Computer Viruses Spread © McGraw Hill 15 SECURITY THREATS CAUSED BY HACKERS AND VIRUSES 5 Security threats to ebusiness include. Elevation of privilege. Hoaxes. Malicious code. Packet tampering. Sniffer. Spoofing. Splogs. Spyware. © McGraw Hill 16