Chapter 10: Privacy,
Security, and Ethics
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
mputing Essentials 2012: Making IT Work for You
Introduction
• Information systems consist of
people, procedures, software,
hardware and data.
• This chapter focuses on people.
• Effective implementation of
computer technology involves
maximizing its positive effects
while minimizing its negative
effects. Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
McGraw-Hill
reserved.
10-2
mputing Essentials 2012: Making IT Work for You
People
• Privacy – What are the threats
to personal privacy and how can
we protect ourselves?
• Security – How can access to
sensitive information be
controlled and how can we
secure hardware and software?
• Ethics – How do the actions of
individual users and companies
affect society?
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-3
mputing Essentials 2012: Making IT Work for You
Privacy
• Privacy – concerns the
collection and use of data
about individuals
• Three primary privacy issues:
– Accuracy
– Property
– Access
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-4
mputing Essentials 2012: Making IT Work for You
Large Databases
• Federal government alone
has over 2,000 databases
• Reverse directory compiles
lists of the calls we make
• Data gatherers
– Information resellers or
information brokers
– Electronic profiles are
easily created
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-5
mputing Essentials 2012: Making IT Work for You
Large Databases Issues
• Your personal information is a
marketable commodity, which
raises many issues:
– Collecting public, but personally
identifying information (e.g., Google’s
Street View)
– Spreading information without personal
consent, leading to identity theft
– Spreading inaccurate information
McGraw-Hill
• Mistaken identity
• Freedom of Information Act
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-6
mputing Essentials 2012: Making IT Work for You
Private Networks
• Employers can monitor e-mail
legally
– 75 percent of all businesses search
employees’ electronic mail and
computer files using snoopware
– A proposed law could prohibit this
type of
electronic monitoring
or at least require the
employer to notify
the employee first
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-7
mputing Essentials 2012: Making IT Work for You
The Internet and the
Web
• Illusion of anonymity
– People are not concerned about
privacy when surfing the Internet or
when sending e-mail
• History file in Web browsers
• Traditional cookies from
Web surfing
• Spyware
–
–
–
McGraw-Hill
Ad network or adware cookies
Web bugs
Computer
Copyrightmonitoring
© 2012 The McGraw-Hillsoftware
Companies, Inc. All rights
reserved.
10-8
mputing Essentials 2012: Making IT Work for You
McGraw-Hill
Viewing and Blocking
Cookies
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-9
mputing Essentials 2012: Making IT Work for You
Spyware Removal
• Anti-Spyware programs
– Designed to detect and remove
cookies, web bugs, and monitoring
software, such as key loggers
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-10
mputing Essentials 2012: Making IT Work for You
Privacy Law In SA
The National Assemble approved a
law that will protect people from the
illegal use of their private information
- 11 Sep 2012 in the.
E-mail users
will be
protected
from junk mail
People will not
need to
tolerate
unwanted
calls at
inconvenient
times
The gathering, publication and
selling of computer numbers will be a
crime with a maximum of 10 years
jail sentence.
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-11
mputing Essentials 2012: Making IT Work for You
Security
• Threats to computer security
include criminals, computer
crimes, and other hazards
• Computer criminals:
–
–
–
–
–
McGraw-Hill
Employees
Outside users
Hackers and crackers
Organized crime
Terrorists
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-12
mputing Essentials 2012: Making IT Work for You
Computer Crime
• Malicious
Programs
–
–
–
–
Viruses
Worms
Trojan horse
Zombies
• Social networking
risks
• Rogue Wi-Fi hotspots
• Denial of
• Theft of hardware,
service (DoS)
software, data, and
attacks
computer time
• Internet scams,
such as
• Data manipulation
phishing
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-13
mputing Essentials 2012: Making IT Work for You
McGraw-Hill
Common Internet
Scams
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-14
mputing Essentials 2012: Making IT Work for You
Other Hazards
• Natural hazards
– Natural forces such as fires, floods, and
tornadoes
• Civil strife and terrorism
– Wars, riots, and terrorist activities
• Technological failures
– Voltage surge or spike
– Use a surge protector
• Human errors
– Data entry errors
Copyright ©
2012 The McGraw-Hill Companies, Inc. All rights
– Programmer
error
McGraw-Hill
reserved.
10-15
mputing Essentials 2012: Making IT Work for You
Measures to Protect
Computer Security
• Restricting access
• Encrypting data
• Anticipating disasters
• Preventing data loss
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-16
mputing Essentials 2012: Making IT Work for You
Ethics
• Copyright
– Gives content creators the right to
control the use and distribution of
their work
• Software piracy
–
–
–
Unauthorized copying and distribution
Digital Millennium Copyright Act
Digital rights management (DRM)
ã Plagiarism
McGraw-Hill
Copyright â 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-19
mputing Essentials 2012: Making IT Work for You
McGraw-Hill
VRAE?
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-20
Chapter 11: Your Future
and Information
Technology
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
mputing Essentials 2012: Making IT Work for You
Changing Times
• Banks
– ATM
– ATM cards
– Internet banking
– S/w verify signatures
McGraw-Hill
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.
10-22