ITM 102 Lecture Notes - Lecture 9: Phishing, Absenteeism, Information SecurityPremium
DepartmentInformation Technology Management
Course CodeITM 102
This preview shows half of the first page. to view the full 2 pages of the document.
ITM102 - Business Driven Information Systems - Lecture 8: Organizational Information
● Ethics - principles and standards that guide our behavior towards other people.
○ Privacy - the right to have control of your own observations without consent.
○ Confidentiality - assurance that your messages are secure and available to those
of your choice.
● Individuals form the only ethical component of management information systems.
○ Individuals copy, use and distribute software; search organizational databases for
sensitive and personal information; and individuals create and spread viruses.
○ Individuals create and spread viruses to steal information and destroy company
● Employee absenteeism - taking care of personal business; when you monitor employees
they feel like their privacy.
○ This leads to lower job satisfaction particularly because employees will begin to
believe the quantity of work is more important than quality
● Information privacy - concerns the legal right or general expectation of individuals,
groups or institutions to determine for themselves when, and to what extent, information
about them is communicated to others.
● e-policies - when organizations strive to build corporate culture based on ethical
● Ethical computer use policy - contains general principles to guide computer user
○ 1. Adoption and implementation of a policy.
○ 2. Notice and disclosure.
○ 3. Choice and consent.
○ 4. Information security.
○ 5. Information quality and access.
● Acceptable use policy - when a user agrees to follow provided access to a network or
● Nonrepudiation clause - a contractual stipulation to ensure that e-business participants
do not deny their online actions.
● Information security - protection of information from accidental or intentional misuse by
persons inside or outside an organization.
○ Information must be protected to maintain a company’s competitive advantage.
● The greatest threat to a business information systems are insiders - or employees and
authorized of information systems that can exploit the company.
○ Negligence, mistakes and ignorance of the consequence of risky behavior.
○ Victims of social engineering, the use, by hackers, or social skills to acquire
passwords and personal data.
You're Reading a Preview
Unlock to view full version