Principles Of Technology Ethics. 2. Hacking 3. Cyber Terrorism subjects of their own interest, from weekly chapter readings. They are to write an APA style 3 page minimum synthesizing those
Students must choose 3 (1. Principles Of Technology Ethics. 2. Hacking 3. Cyber Terrorism) subjects of their own interest, from weekly chapter readings. They are to write an APA style 3 page minimum synthesizing those subjects. It should have a cover page and references page, too. The summary should also include an applied reaction concept. As an example: How would you apply this information to the work place? Review the chapters to help focus areas of summary. Use this assignment to demonstrate your level of comprehension.
Security and Ethical Challenges
Chapter
13
McGraw-Hill/Irwin
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Multimedia Lecture Support Package to Accompany Basic Marketing
Lecture Script 6-*
13-*
Learning Objectives
- Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
- Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology.
13-*
Learning Objectives
- Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology.
13-*
Corporate Social Responsibility Theories
- Stockholder Theory
- Managers are agents of the stockholders
- Only responsible to increase profits without violating the law or fraud
- Social Contract Theory
- Responsible to all of society
- Stakeholder Theory
- Responsible to anyone affected by company
Stockholder Theory
Managers are agents of the stockholders
Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
Social Contract Theory
Companies have ethical responsibilities to all members of society, who allow corporations
to exist
Stakeholder Theory
Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders
Stakeholders are all individuals and groups that have a stake in, or claim on, a company
*
13-*
Principles of Technology Ethics
- Proportionality
- Good must outweigh the harm or risk
- Informed Consent
- Those affected should understand and accept risks
- Justice
- Benefits and burdens distributed fairly
- Minimized Risk
- Avoid all unnecessary risk
Proportionality
The good achieved by the technology must outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk
Informed Consent
Those affected by the technology should understand and accept the risks
Justice
The benefits and burdens of the technology should be distributed fairly.
Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk
Minimized Risk
Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk
*
13-*
Hacking
- Obsessive use of computers
- Unauthorized access and use of networked computer systems
- Electronic Breaking and Entering
- Accessing without stealing nor damaging
- Cracker (black hat or darkside hacker)
- Maintains knowledge of vulnerabilities for private advantage
- Common Hacking Tactics
- Figure 13.7
Denial of Service
Hammering a website’s equipment with too
many requests for information
Clogging the system, slowing performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of computers, services, and connections
Looking for weaknesses
Trojan House
A program that, unknown to the user, contains instructions that exploit a known vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point is detected or blocked
Malicious Applets
Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection
Logic Bombs
An instruction in a computer program that triggers a malicious act
Buffer Overflow
Crashing or gaining control of a computer by sending too much data to buffer memory
Password Crackers
Software that can guess passwords
Social Engineering
Gaining access to computer systems by talking unsuspecting company employees out of
valuable information, such as passwords
Dumpster Diving
Sifting through a company’s garbage to find information to help break into their computers
*
13-*
Cyber Theft
- Most involve theft of money
- “Inside jobs”
- Unauthorized activity
- Attacks through the Internet
- Most companies don’t report
Most involve theft of money
The majority are “inside jobs” that involve unauthorized network entry and alternation of computer databases to cover the tracks of the employees involved
Many attacks occur through the Internet
Most companies don’t reveal that they have been targets or victims of cybercrime
*
13-*
Cyberterrorism
- Use IT to attack electronic infrastructure, exchange information or make threats
- Terror related
- More political motivation than criminal
- Examples
- Attempt to disrupt life support at Antarctic research station
- Release of untreated sewage in Australia
- Shut down of government network and banks in Estonia
- Non-deliberate shut down of systems at nuclear reactor
The National Conference of State Legislatures (NCSL) puts a much finer point
on the definition of the term:
the use of information technology by terrorist groups and individuals to further their
agenda. This can include use of information technology to organize and execute attacks
against networks, computer systems and telecommunications infrastructures, or for
exchanging information or making threats electronically.
*
13-*
Software Piracy
- Unauthorized copying of computer programs
- Licensing
- Purchase – payment for fair use
- Site license – allows a certain number of copies
- Shareware – allows copies
- Public Domain – not copyrighted
- Software industry losses
- ⅓ to ½ of revenues
- Millions of copies in educational market
- 90% pirated software in China
- Sales negligible
Software Piracy
Unauthorized copying of computer programs
Licensing
Purchasing software is really a payment for a license for fair use
Site license allows a certain number of copies
A third of the software industry’s revenues are lost to piracy
Software companies are reluctant to pursue the educational market due to concerns that
several copies of purchased software may lead to millions of copies of illegal software,
produced “in the name of educating children.”
*
13-*
Theft of Intellectual Property
- Intellectual Property
- Copyrighted material
- Music, videos, images, articles, books, software
- Copyright Infringement is Illegal
- Easy to trade pirated intellectual property
- Publishers Offer Inexpensive Online Music
- Illegal downloading is declining
Intellectual Property
Copyrighted material
Music, videos, images, articles, books, software
Copyright Infringement is Illegal
Peer-to-peer networking techniques have made it easy to trade pirated intellectual property
Publishers Offer Inexpensive Online Music
Illegal downloading of music and video is down and continues to drop
*
13-*
Adware and Spyware
- Adware
- Useful software allows ads without consent
- Spyware
- Type of Adware
- Can steal private information
- Add advertising links to Web pages
- Redirect affiliate payments
- Change a users home page and search settings
- Make modem call premium-rate numbers
- Leave security holes that let Trojans in
- Degrade system performance
- Removal often not completely successful
Adware
Software that purports to serve a useful purpose, and often does
Allows advertisers to display pop-up and banner ads without the consent of the computer users
Spyware
Adware that uses an Internet connection in the background, without the user’s permission
or knowledge
Captures information about the user and sends it over the Internet
*
13-*
Computer Libel and Censorship
- The opposite side of the privacy debate…
- Freedom of information, speech, and press
- Biggest battlegrounds
- Bulletin boards
- Email boxes
- Online files of Internet and public networks
- Weapons used in this battle
- Spamming
- Flame mail
- Libel laws
- Censorship
Spamming
Indiscriminate sending of unsolicited email messages to many Internet users
Flaming
Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the Internet or online services
Especially prevalent on special-interest newsgroups
*
13-*
Health Issues
- Cumulative Trauma Disorders (CTDs)
- Disorders caused by fast-paced repetitive keystroke jobs
- Carpal Tunnel Syndrome
- Painful, crippling ailment of the hand and wrist
- Typically requires surgery to cure
- Ergonomics
- Designing healthy work environments
Cumulative Trauma Disorders (CTDs)
Disorders suffered by people who sit at a PC or terminal and do fast-paced repetitive keystroke jobs
Carpal Tunnel Syndrome
Painful, crippling ailment of the hand and wrist
Typically requires surgery to cure
Ergonomics
Designing healthy work environments
Safe, comfortable, and pleasant for people
to work in
Increases employee morale and productivity
Also called human factors engineering
*
13-*
Societal Solutions
- Use IT to solve human and social problems
- Medical diagnosis
- Computer-assisted instruction (CAI)
- Computer based training (CBT)
- Governmental program planning
- Environmental quality control
- Law enforcement
- Job placement
- Detrimental effects
- Actions without ethical responsibility
13-*
Denial of Service Attacks
- Depend on three layers of networked computer systems
- The victim’s website
- The victim’s Internet service provider
- Zombie or slave computers commandeered by cybercriminals
- Defense
- At Zombie Machines
- Set and enforce security policies
- Scan for vulnerabilities
- At the ISP
- Monitor and block traffic spikes
- At the Victim’s Website
- Create backup servers and network connections
Denial of service attacks depend on three layers of networked computer systems
The victim’s website
The victim’s Internet service provider
Zombie or slave computers that have been commandeered by the cybercriminals
Defense
At Zombie Machines
Set and enforce security policies
Scan for vulnerabilities
At the ISP
Monitor and block traffic spikes
At the Victim’s Website
Create backup servers and network connections
*
,
Security and Ethical Challenges
Chapter
13
McGraw-Hill/Irwin
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Multimedia Lecture Support Package to Accompany Basic Marketing
Lecture Script 6-*
13-*
Learning Objectives
- Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
- Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology.
13-*
Learning Objectives
- Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology.
13-*
Corporate Social Responsibility Theories
- Stockholder Theory
- Managers are agents of the stockholders
- Only responsible to increase profits without violating the law or fraud
- Social Contract Theory
- Responsible to all of society
- Stakeholder Theory
- Responsible to anyone affected by company
Stockholder Theory
Managers are agents of the stockholders
Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
Social Contract Theory
Companies have ethical responsibilities to all members of society, who allow corporations
to exist
Stakeholder Theory
Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders
Stakeholders are all individuals and groups that have a stake in, or claim on, a company
*
13-*
Principles of Technology Ethics
- Proportionality
- Good must outweigh the harm or risk
- Informed Consent
- Those affected should understand and accept risks
- Justice
- Benefits and burdens distributed fairly
- Minimized Risk
- Avoid all unnecessary risk
Proportionality
The good achieved by the technology must outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk
Informed Consent
Those affected by the technology should understand and accept the risks
Justice
The benefits and burdens of the technology should be distributed fairly.
Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk
Minimized Risk
Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk
*
13-*
Hacking
- Obsessive use of computers
- Unauthorized access and use of networked computer systems
- Electronic Breaking and Entering
- Accessing without stealing nor damaging
- Cracker (black hat or darkside hacker)
- Maintains knowledge of vulnerabilities for private advantage
- Common Hacking Tactics
- Figure 13.7
Denial of Service
Hammering a website’s equipment with too
many requests for information
Clogging the system, slowing performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of computers, services, and connections
Looking for weaknesses
Trojan House
A program that, unknown to the user, contains instructions that exploit a known vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point is detected or blocked
Malicious Applets
Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection
Logic Bombs
An instruction in a computer program that triggers a malicious act
Buffer Overflow
Crashing or gaining control of a computer by sending too much data to buffer memory
Password Crackers
Software that can guess passwords
Social Engineering
Gaining access to computer systems by talking unsuspecting company employees out of
valuable information, such as passwords
Dumpster Diving
Sifting through a company’s garbage to find information to help break into their computers
*
13-*
Cyber Theft
- Most involve theft of money
- “Inside jobs”
- Unauthorized activity
- Attacks through the Internet
- Most companies don’t report
Most involve theft of money
The majority are “inside jobs”
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
All Rights Reserved Terms and Conditions
College pals.com Privacy Policy 2010-2018