Professional Documents
Culture Documents
Ethical Issues
Gaining competitive advantage by the use of IT may involve unethical or even legal actions. IT is used in the companies: To monitor the activities of other companies May invade the privacy of individuals
While using business intelligence i.e. spying on competitors, firms may engage itself in many unethical tactics by pressurizing competitors employees to reveal information or using software which is the intellectual property of other companies, without the latters knowledge. Many a times such as actions are legal so to say due to fact that IT is new and its legal environment is not well developed yet. The spread of IT has created many new ethical situations. Issue of a company monitoring electronic mail is supported by only 47 percent of the readers of information week, 53 percent disagree. There are major difference even with companies and individuals with respect to what is right and wrong. So also with different countries what is unethical is one culture may be perfectly acceptance to others. Most of the western countries have much higher concern for individual and their rights to privacy than some of the Asian countries. Big companies and professional organizations develop their own codes of ethics; which is a collection of principles intended as a guide for members of a company or an association.
It is different things for different people. Four stages of privacy are: Solitude an individuals desire to be left alone, away from outside interference. Intimacy the state of privacy one wants to enjoy from the outside world. Anonymity - a persons wish to be free from external surveillance. Reserve an individuals desire to control Information about himself.
Security Threats
Information systems have many components, which are at several locations. It is therefore, these are vulnerable to many potential hazards. The hazards may be: Accidental such as errors or natural disasters Intentional such as theft, viruses and malicious attacks on a computer centre.
The latter is serious due to the large number of potential computer criminals, both internal and external to the organization. Criminals have various motives and cannot be predicted why they would do.
Specific Threats
Some specific threats to information systems are: Loss, theft or corruption of data Inappropriate use of data(manipulating inputs) Theft of mainframe computer crime Theft of equipment and/or programs Errors in handling, entering, processing, transferring or programming of data Equipment malfunctions Accidental or malicious damage to computer resources and Destruction from viruses and similar attacks.
3. Salami Slicing: This technique works on the assumption that if small quantities of money are shaved from a lot of balances that are not closely checked and these shavings are combined in a central account which would swell to a large amount overtime. The finance sector is particularly vulnerable to the shaver. Internet posted to the bank or security accounts is often not checked by its owners down to the nearest paise- hence a criminal with access to an interest payment program could divert into his account all hundredths of paise in interest that should be credited to the real owners accounts. 4. Super Zap Programs: It can bypass regular system controls if a malfunction or significant error in the computer system exists. Example: If a vital update program crashes and the account balances updating are operative only when the programs runs, to fulfil the shortage, it has to be reconstructed by other methods. Before superzap programs allow their users privileged operations, only certain key personnel are authorized to use them. In the hands of the wrong person, they could be used to perform various criminal acts. 5. Trapdoor Routines: These are routines used in program development to allow developers access to various parts of the computers system in order to see that the program to view various sections of RAM, as a check that the program is storing data correctly. Trapdoors are supposed to be criminals accessed passwords through a trapdoor that was not removed and later used the passwords to break into the system. 6. Logic Bombs: It is a routine that causes part of tha computer system to become inoperative or to malfunction as soon as the routine is executed. Such malicious logic bombs are written by disgruntled programmers who are often on the verge of being forced to erase key files or programs or to cause programs to halt or process data incorrectly. Some of the software vendors may purposely incorporate logic bombs into programs usually to disable a software package after a certain time period.
Then it does whatever the virus programmer intended, whether it is to print phrases such as Beat the Vikings, erase date or damage the system.
Just as a biological virus causes disease by disrupting the normal operations of living cells in an organism, a computer virus invades the inner workings of computers and disrupts normal operations. The term computer virus is used to describe a logic bomb at which a piece of unauthorized code acts as a parasite that attaches itself to a host programme during a copy operation. Computer virus code to make it reproduce and transmit commands may be inserted to spread the virus from one computer to others on its network. Virus code is often implanted by the Trojan Horse technique. Virus Problems Virus infections gives raise to the following problems: Loss of productivity Screen messages and lockup Unreliable applications Loss of user confidence Corrupted files Loss data System crashes
Prventing Computer Crime Hire carefully Encrypt data and programs Beware of malcontents Monitor system transactions Separate employee functions Conduct frequent audits Restrict system use Protect sources with password or access cards and Educate people in security measures
Software Packages
These are: Central point antivirus Flu shot plus Viruscan Dr.Solomons antivirus tool kit Virucide
Scavenging Techniques Someone browses through garbage for information that can be used to perform a criminal activity. In one case, a scavenger looked through trash cans containing computer output and illegally ordered thousands of dollars worth of communications equipment before being caught. Leakage Leakage results when important data, programs or computer resources normally safeguardedleave a site without reason. Exsmple: Sensitive data can be transported to 3 1/2 diskette, which can be put in an employees pocket and never noticed when he/she leaves the work.Mathematical algorithms can be used to hash programs or data so that they look like garbage and are allowed to leave the company undetected. Eaves dropping Eaves Dropping allows a person to observe transmissions intended for other people. Micro to main frame telecommunication links and local area networks are unreliable to eavesdroppers. Their security features are improving over time. The primary targets of the eavesdropper are protected passwords and account numbers Wire Tapping Wire Tapping is a special case of eavesdropping, consists of setting up a special transmission path to divert the flow of data. Example: A wire/unauthorized acts such as: Espionage Stealing programs Altering data and so on.
Satellite facilities are especially vulnerable to wire tapping. Fibre optic cable, om the other hand is relatively safe from wiretaps because cutting the cable in any way deflects the transmitted light beams and garbles data completely.
Software Piracy Software Privacy refers to the unauthorized copying or use of programs. The most familiar form of software privacy is when people make unauthorized copies of such programs as LOTUS 1-2-3 or dBASE for their own use. Several law suits have evolved from such abuses. The costly form of software privacy to organizations, however is where professional thieves make thousands of copies of a software program and sell them illegally. Hacking The term hacker originally referred to computer professionals who solved complex computer problems. Today, the term Hacker has a negative meaning. Hacking is computer crime in which the criminal breaks into a computer system just for the challenge of doing so. Example: High school hackers in Milwaukee Computer Club broke into computers at the Sloan-Kellering Cancer Institute and at the Los Almos National Laboratory. However, hacking though receives wide publicity, it constitutes a relatively small percentage of computer crime.
The other preventions are: Restrict system use. Protect resources with passwords or other user authorization checks. Encrypt data and programmes. Monitor system transactions Conduct frequent audits
Intellectual Property
It refers to creations of the mind inventions, literary and artistic works, symbols, names, images, and designs used in commerce. Intellectual Property Rights is the exclusive right to inventions, writings and artistic creations shall be secured to inventors, authors, and artists for a limited period Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source A patent is the right granted to an inventor by a State, which allows the inventor to exclude anyone else from commercially exploiting his invention for a limited period. By granting an exclusive right, patents provide incentives to individuals, offering them recognition for their creativity and material reward for their marketable inventions. A trademark is a sign, or a combination of signs, which distinguishes the goods or services of one enterprise from those of another. Service mark a trademark used in connection with services A commercial or trade name is the name or designation that identifies an enterprise.
Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. According to the law, a copyright protection extends to original works of authorship fixed in any tangible medium or expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. The use of copyright materials that does not violate or infringe the exclusive rights of the copyright holder. Limitations of Copyright 1. Copyright does not protect the authors creative idea. 2. Copyright protects only fixed, original and creative expressions, not the ideas or facts upon which the expression is based For Example: Copyright may protect a film but it cannot protect the underlying theme of the film. 3. Copyright does not protect facts, whether scientific, historical, biographical, or news of the day. Any facts that an author discovers in the course of research are in public domain.
Relationship among Ethical, Social and Political Issues raised by Information Systems
Details 1. Closely related in an Information Society 2. How develops? Ethical issues Yes Social issues Yes Political issues Yes
Confronts individuals who must choose of action, in a situation in which two or more ethical principles are in conflict (Ethical dilemma)
Spring from ethical issues. Societies must develop expectations in individuals about the correct course of action. Social issues often become debates about the kind of situations and expectations that societies should develop so that individuals behave correctly.
Spring from social conflict. Have to do largely with laws that prescribe behavior and seek to create situations in which individuals behave correctly
After completion, you can consider what ethical principle you should apply to a situation to arrive at a judgement.
4. Utilitarian principle Take the action that achives the higher or greater value. This rule assumes you can prioritise values in a rank order and understand the consequences of various courses of action. 5. Risk Aversion principle Take the action that produces the least harm or the least potential cost. Some actions have extremely high failure costs of very low probability (e.g. Building a nuclear generating facility in Urban areas) or extremely high failure costs of moderate probability ( speeding and automobile accidents). Avoid these high failure cost actions, paying greater attention to high failure cost potential of moderate to high probability. 6. No free lunch Rule Assume that all tangible and intangible objects virtually are owned by someone alse unless there is a specific declaration otherwise and that the creator wants compensation for this work. If something someone else has created is useful to you, it has value and you should assume the creator wants compensation for the work. You have to decide which ethical principle you have to follow and decide how to prioritise them. These ethical rules cannot beabsolute guides to action; Actions that do not easily pass these rules deserve some very close attention and a great deal of caution.
7. Dumpster Diving Sifting through a companys garbage to find information to help break into their computers. Sometimes the information is used to make a stab at social engineering more credible. 8. Malicious Applets Tiny programmes, sometimes written in the popular java computer language, that misuse computers resources, modify files on the hard disk, send take e-mail, or steal passwords. Information technologies can support both beneficial and detrimental effects The use of information technologies in business has had major impacts on society and thus raise ethical issues in the areas of: Crime Individuality Health Privacy Employment Working conditions