lOMoARcPSD| 47206071
Ethics and Privacy Information Security
Objectives
Define ethics, list and describe the three fundamental tenets of ethics,
and describe the four categories of ethical issues related to
information technology.
Lecture 4
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 2
Identify three places that store personal data, and for each
one, discuss at least one potential threat to the privacy of
the data stored there.
Identify the five factors that contribute to the increasing vulnerability of
information resources, and provide a specific example of each one.
Compare and contrast human mistakes and social engineering, and
provide a specific example of each one.
Discuss the 10 types of deliberate attacks
Ref.: Chapter 3 & 4
Ethical Issues
•Ethics refers to the principles of right and wrong
that individuals use to make choices that guide
their behavior
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 3
•There are many frameworks that can help
us make ethical decisions
•Ethical Frameworks
•Ethics in the Corporate Environment
•Ethics and Information Technology
•Ethical Frameworks
4 standards
5 steps
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 4
Utilitarian approach
Rights approach
Fairness approach
Common good approach
Recognize an ethical
issue
Get the facts
Evaluate alternative
actions
Make a decision and test
it
Act and reflect on the
outcome of your decision
Combine these 4 standards by these 5 steps to develop a general
framework for ethics (or ethical decision making)
•Four standards
•The utilitarian approach states that an ethical
action is the one that provides the most good or
does the least harm
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 5
•The rights approach maintains that an
ethical action is the one that best protects and
respects the moral rights of the affected parties
•The fairness approach posits that ethical actions
treat all human beings equally, or, if unequally, then
fairly, based on some defensible standard.
•the common good approach highlights the
interlocking relationships that underlie all societies
If we combine these four standards, we can develop a general
framework for ethics (or ethical decision making). This
framework consists of five steps:
Recognize an ethical issue:
Could this decision or situation damage someone or some group?
Does this decision involve a choice between a good and a bad alternative?
Does this issue involve more than simply legal considerations? If so, then
in what way?
Get the facts:
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 6
What are the relevant facts of the situation?
Do I have sufficient information to make a decision?
Which individuals and/or groups have an important stake in the outcome?
Have I consulted all relevant persons and groups?
Evaluate alternative actions:
Which option will produce the most good and do the least harm? (the
utilitarian approach)
Which option best respects the rights of all stakeholders? (the rights
approach)
Which option treats people equally or proportionately? (the fairness
approach)
Which option best serves the community as a whole, and not just some
members? (the common good approach)
Make a decision and test it:
Considering all the approaches, which option best addresses the situation?
Act and reflect on the outcome of your decision:
How can I implement my decision with the greatest care and attention to
the concerns of all stakeholders?
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 7
How did my decision turn out, and what did I learn from this specific
situation?
•Ethics in the Corporate Environment:
•A code of ethics is a collection of principles
intended to guide decision making by members of
the organization
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 8
•Fundamental tenets of ethics:
Responsibility means that you accept the
consequences of your decisions and actions.
Accountability refers to determining who is
responsible for actions that were taken.
Liability is a legal concept that gives individuals the
right to recover the damages done to them by other
individuals, organizations, or systems.
•Ethics and Information Technology
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 9
PAPA
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 10
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 11
Privacy
•Privacy is the right to be left alone and to be free
of unreasonable personal intrusions
•Information privacy is the right to determine when,
and to what extent, information about you can be
gathered and/or communicated to others.
•Two rules
•The right of privacy is not absolute. Privacy must be
balanced against the needs of society.
•The public’s right to know supersedes the
individual’s right of privacy.
•Electronic Surveillance
•Personal Information in Databases
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 12
•Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
•Privacy Codes and Policies
•International Aspects of Privacy
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 13
•Privacy
Policy
Guidelines:
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 14
A Sampler
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 15
Information Security
•Introduction to Information Security
•It is difficult for organizations to provide perfect
security for their data.
•There is a growing danger that countries are
engaging in economic cyberwarfare among
themselves
•Security is the degree of protection against
criminal activity, danger, damage, and/or loss
•Information security refers to all of the processes
and policies designed to protect an organization’s
information and information systems (IS) from
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 16
unauthorized access, use, disclosure,
disruption, modification, or destruction
•A threat to an information resource is any danger
to which a system may be exposed
•The exposure of an information resource is the
harm, loss, or damage that can result if a threat
compromises that resource
•An information resource’s vulnerability is the
possibility that the system will be harmed by a
threat
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 17
Unintentional Threats to Information Systems
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 18
Human Errors
Social Engineering
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 19
•Human
Mistakes
lOMoARcPSD| 47206071
Faculty of Economics and Business Introduction to MIS 20
Deliberate Threats to Information Systems
•Software Attacks
Deliberate
Threats
trespass
Information
extortion
Sabotage or
vandalism
Theft of
equipment or
information
Identity theft
Compromises
to intellectual
property
Software
attacks
Alien software
Supervisory
control and
data
acquisition
(
SCADA)
attacks
Cyberterrorism
and
cyberwarfare

Preview text:

lOMoAR cPSD| 47206071 Lecture 4
Ethics and Privacy Information Security Objectives
• Define ethics, list and describe the three fundamental tenets of ethics,
and describe the four categories of ethical issues related to information technology. lOMoAR cPSD| 47206071
• Identify three places that store personal data, and for each
one, discuss at least one potential threat to the privacy of the data stored there.
• Identify the five factors that contribute to the increasing vulnerability of
information resources, and provide a specific example of each one.
• Compare and contrast human mistakes and social engineering, and
provide a specific example of each one.
• Discuss the 10 types of deliberate attacks • Ref.: Chapter 3 & 4 Ethical Issues
•Ethics refers to the principles of right and wrong
that individuals use to make choices that guide their behavior
Faculty of Economics and Business Introduction to MIS 2 lOMoAR cPSD| 47206071
•There are many frameworks that can help us make ethical decisions •Ethical Frameworks
•Ethics in the Corporate Environment
•Ethics and Information Technology •Ethical Frameworks 4 standards 5 steps
Faculty of Economics and Business Introduction to MIS 3 lOMoAR cPSD| 47206071 ▪ Utilitarian approach • Recognize an ethical ▪ Rights approach issue ▪ Fairness approach • Get the facts
▪ Common good approach • Evaluate alternative actions • Make a decision and test it • Act and reflect on the outcome of your decision
Combine these 4 standards by these 5 steps to develop a general
framework for ethics (or ethical decision making) •Four standards
•The utilitarian approach states that an ethical
action is the one that provides the most good or does the least harm
Faculty of Economics and Business Introduction to MIS 4 lOMoAR cPSD| 47206071
•The rights approach maintains that an
ethical action is the one that best protects and
respects the moral rights of the affected parties
•The fairness approach posits that ethical actions
treat all human beings equally, or, if unequally, then
fairly, based on some defensible standard.
•the common good approach highlights the
interlocking relationships that underlie all societies
• If we combine these four standards, we can develop a general
framework for ethics (or ethical decision making). This
framework consists of five steps:
• Recognize an ethical issue:
• Could this decision or situation damage someone or some group?
• Does this decision involve a choice between a good and a bad alternative?
• Does this issue involve more than simply legal considerations? If so, then in what way? • Get the facts:
Faculty of Economics and Business Introduction to MIS 5 lOMoAR cPSD| 47206071
• What are the relevant facts of the situation?
• Do I have sufficient information to make a decision?
• Which individuals and/or groups have an important stake in the outcome?
• Have I consulted all relevant persons and groups?
• Evaluate alternative actions:
• Which option will produce the most good and do the least harm? (the utilitarian approach)
• Which option best respects the rights of all stakeholders? (the rights approach)
• Which option treats people equally or proportionately? (the fairness approach)
• Which option best serves the community as a whole, and not just some
members? (the common good approach)
• Make a decision and test it:
• Considering all the approaches, which option best addresses the situation?
• Act and reflect on the outcome of your decision:
• How can I implement my decision with the greatest care and attention to
the concerns of all stakeholders?
Faculty of Economics and Business Introduction to MIS 6 lOMoAR cPSD| 47206071
• How did my decision turn out, and what did I learn from this specific situation?
•Ethics in the Corporate Environment:
•A code of ethics is a collection of principles
intended to guide decision making by members of the organization
Faculty of Economics and Business Introduction to MIS 7 lOMoAR cPSD| 47206071
•Fundamental tenets of ethics:
Responsibility means that you accept the
consequences of your decisions and actions.
Accountability refers to determining who is
responsible for actions that were taken.
Liability is a legal concept that gives individuals the
right to recover the damages done to them by other
individuals, organizations, or systems.
•Ethics and Information Technology
Faculty of Economics and Business Introduction to MIS 8 lOMoAR cPSD| 47206071 PAPA
Faculty of Economics and Business Introduction to MIS 9 lOMoAR cPSD| 47206071
Faculty of Economics and Business Introduction to MIS 10 lOMoAR cPSD| 47206071 Privacy
•Privacy is the right to be left alone and to be free
of unreasonable personal intrusions
•Information privacy is the right to determine when,
and to what extent, information about you can be
gathered and/or communicated to others. •Two rules
•The right of privacy is not absolute. Privacy must be
balanced against the needs of society.
•The public’s right to know supersedes the
individual’s right of privacy. •Electronic Surveillance
•Personal Information in Databases
Faculty of Economics and Business Introduction to MIS 11 lOMoAR cPSD| 47206071
•Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites •Privacy Codes and Policies
•International Aspects of Privacy
Faculty of Economics and Business Introduction to MIS 12 lOMoAR cPSD| 47206071 •Privacy Policy Guidelines:
Faculty of Economics and Business Introduction to MIS 13 lOMoAR cPSD| 47206071 A Sampler
Faculty of Economics and Business Introduction to MIS 14 lOMoAR cPSD| 47206071 Information Security
•Introduction to Information Security
•It is difficult for organizations to provide perfect security for their data.
•There is a growing danger that countries are
engaging in economic cyberwarfare among themselves
•Security is the degree of protection against
criminal activity, danger, damage, and/or loss
•Information security refers to all of the processes
and policies designed to protect an organization’s
information and information systems (IS) from
Faculty of Economics and Business Introduction to MIS 15 lOMoAR cPSD| 47206071
unauthorized access, use, disclosure,
disruption, modification, or destruction
•A threat to an information resource is any danger
to which a system may be exposed
•The exposure of an information resource is the
harm, loss, or damage that can result if a threat compromises that resource
•An information resource’s vulnerability is the
possibility that the system will be harmed by a threat
Faculty of Economics and Business Introduction to MIS 16 lOMoAR cPSD| 47206071
• Unintentional Threats to Information Systems
Faculty of Economics and Business Introduction to MIS 17 lOMoAR cPSD| 47206071 • Human Errors • Social Engineering
Faculty of Economics and Business Introduction to MIS 18 lOMoAR cPSD| 47206071 •Human Mistakes
Faculty of Economics and Business Introduction to MIS 19 lOMoAR cPSD| 47206071
Deliberate Threats to Information Systems Espionage or trespass Cyberterrorism Information and extortion cyberwarfare Supervisory control and data Sabotage or acquisition vandalism ( SCADA) attacks Deliberate Threats Theft of Alien software equipment or information Software Identity theft attacks Compromises to intellectual property •Software Attacks
Faculty of Economics and Business Introduction to MIS 20