Textbook Notes (368,432)
Canada (161,877)
York University (12,845)
ADMS 2511 (127)
Carl Lapp (17)
Chapter 3

ADMS 2511 - Ch3 Ethics.docx

7 Pages
116 Views
Unlock Document

Department
Administrative Studies
Course
ADMS 2511
Professor
Carl Lapp
Semester
Winter

Description
Ch3 Ethics, Privacy, and information security 3.1 Ethical Issues Ethics – the principle of right and wrong that individuals use to make choices to guide their behaviors Code of ethics – a collection of principles that is intended to guide decision making by members of the organization. Three fundamental tenets of ethics o Responsibility – you accept the consequences of your decisions and actions o Accountability – determine who is responsible for actions that were taken o Liability – a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems Aframework for ethical issues (P71 Table 3.1) o Privacy issues – involve collecting, storing, and disseminating information about individual o Accuracy issues – involve the authenticity, integrity, and accuracy of information that is collected & processed o Property issues – involve the ownership and value of information o Accessibility issues – revolve around who should have access to information and whether they should have to pay for this access Protecting Privacy Privacy – is the right to be left alone and to be free of unreasonable personal intrusions  Information privacy- is the right to determine when, and to what extent, information about yourself can be gathered and communicated to others. Digital dossier – an electronic description of you and your habits Profiling – The process of forming a digital dossier Electronic Surveillance – monitoring is done by employers, the gov’t, and other institution Personal information in databases Information in internet bulletin boards, News groups, and social networking sites Privacy Codes & Policies – an organization’s guidelines for protecting the privacy of customers, clients, and employees o Opt-out model – informed consent permits the company to collect persona; information until the customer specifically request that data data not be collected o Opt- in model – informed consent, a business is prohibited from collecting any personal information unless the customer specifically authorizes it InternationalAspects of Privacy Privacy policy guidelines: a sampler (Table 3.2 P75) 3.2 Threats to information security Number of factors contribute to the increase vulnerability of information assets 1. Today’s interconnected, interdependent, wirelessly networked business environment 2. Government legislation 3. Smaller, faster, cheaper computers and storage devices 4. Decreasing skills necessary to be a computer hacker 5. International organized crime taking over cyber-crime 6. Downstream liability 7. Increased employee use of unmanaged devices 8. Lack of management support Threats to IS 1. Unintentional acts: act with no malicious intent. Human errors (biggest aspect), social engineering, deviations in quality of service by service providers, environmental hazards. - Human error (Table 3.3 P80) - Social engineering - Reverse social engineering - Social data mining - Deviations in the quality of service by service providers - Environmental hazards 2. Natural disasters: floods, earthquakes, hurricanes, fires. 3. Technical failures: hardware (crash of hard disk drive) and software problem (bugs). 4. Management failure: lack of funding for info security efforts and interest in those efforts. 5. Deliberate acts 1. Espionage or trespass: unauthorized individual attempts to gain illegal access to organizational info. 2. Information extortion: threatens to steal. 3. Sabotage or vandalism: deface company’s website, losing the image or confidence. 4. Theft of equipment or information: smaller devices are easier to steal and attackers. 5. Identity theft: deliberate assumption of another person’s identity for a crime 6. Compromises to intellectual property: patent: 20 yrs holder; copyright: life + 50yrs. Intellectual property Trade secret Patent Copyright Piracy 7. Software attacks: malicious software tried to infect as many computers worldwide as possible. Types of so
More Less

Related notes for ADMS 2511

Log In


OR

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit