Paper

Submitted by: Submitted by

Views: 51

Words: 8348

Pages: 34

Category: Other Topics

Date Submitted: 01/24/2015 02:35 PM

Report This Essay

13 Security and Ethical

Challenges

I. CHAPTER OVERVIEW

This chapter discusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology.

Section I: Security, Ethical and Societal Challenges of IT

Section II: Security Management of Information Technology

II. LEARNING OBJECTIVES

Learning Objectives

1. Identify several ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.

2. Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.

3. Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology.

III. TEACHING SUGGESTIONS

Figure 13.2 outlines major aspects of the ethical and societal dimensions of information technology. It should be stressed to students that information technology could have both positive and negative effects on society. Instructors should spend some time discussing the different types of computer crimes, and why they are considered crimes at all. Figure 13.4 outlines the four principles of technology ethics – proportionality, informed consent, justice, and minimized risk. Figure 13.7 gives a number of common examples of common hacking tactics used to assault e-business enterprises and other organizations through the use of the Internet and other networks. Figure 13.12 is related to a number of ergonomic factors that are found in the workplace. It stresses that good ergonomic design considers tools, tasks, the workstation, and the environment.

The necessity of controls for information systems should...