Management Information System: Unit 5
Management Information System: Unit 5
INFORMATION SYSTEM
UNIT 5
LEARNING OBJECTIVES
• Identify several ethical issues regarding how the use of information technologies in business affects
employment, individuality, working conditions, privacy, crime, health and solutions to societal
problems.
• Identify the several types of security management strategies and defenses and explain how they can
be used to ensure the security of business applications of information technology.
• Propose several ways that business managers and professionals can help lessen the harmful effects
and increase the beneficial effects of the use of information technology.
SECURITY AND ETHICAL CHALLENGES - INTRODUCTION
• The use of information technologies in business has a major impact on society and thus
raises ethical issues in the area of crime, privacy, individuality, employment, health and
working conditions.
• It is important to understand that information technology has had a beneficial results as
well as detrimental effects, on society and people in each of these areas.
• For example, computerizing a manufacturing process may have the beneficial result of
improving working conditions and producing products of higher quality at lower cost, but
it also have the adverse effect of eliminating people’s jobs.
ETHICAL RESPONSIBILITY OF BUSINESS
PROFESSIONALS
• Ethical responsibility of business professionals includes performing their role as a vital
human resource in the business systems to develop and use in their organization
• To make a decision in an organization managers or business professionals approach in a
ethical dimension.
• Business Ethics concerned with the numerical ethical question that managers must
confront as part of their daily business decision making.
TECHNOLOGY ETHICS
• Proportionality – the good achieved by the technology must outweigh the harm or risk.
• Informed Consent – those affected by the technology should understand and accept the
risks.
• Justice – The benefits and burdens of the technology should be distributed fairly.
• Minimized risk – even if judged acceptable by the order three guidelines, the technology
must be implemented so as to avoid all unnecessary risk.
MIS AS CONTROL SYSTEM
• Controls are constraints and other restrictions imposed on user and a system and they can be used to secure systems
against the risk or to reduce damage caused to systems, app. and data.
• Controls are not only for access but also to implement policies and ensure nonsensical(ridiculous) data not entered
into corporate database.
• Elements of Control System:
• 1. Set of Objectives
• 2. Performance Standards
• 3. Feed back mechanism
• 4. Control /action center
• All these should be properly evolved and instituted in the org with due identity to internal and external environment
FEATURES OF CONTROL SYSTEM
• Strategy Support
• Data Processing Strategy Support:
• While computers cannot create business strategies by themselves they can assist management in
understanding the effects of their strategies, and help enable effective decision making.
• It provide financial statements and performance reports to assist in the planning, monitoring and
implementation of strategy.
• Unmanageable volumes of data: By studying the correct reports decision-makers can identify
patterns and trends that would have remained unseen if the raw data were consulted manually
DATA PROCESSING:
• Risks to Hardware
• Natural disasters
• Blackouts and brownouts
• Vandalism
13 RISKS TO INFORMATION SYSTEMS
Figure 17.2 Frequency of security breaches in a 12-month period based on a survey of 745
professionals
15 RISKS TO ONLINE OPERATIONS
• Spoofing
• Deception of users to make them think they are logged on at one site while they actually are on
another
16 CONTROLLING INFORMATION SYSTEM
RISKS
• Controls: Constraints imposed on a user or a system to secure systems against risks .
• Authentication
• Process of ensuring that the sender and receiver of a message is indeed that person
• Original message – plaintext
• Coded message – ciphertext
• Messages scrambled on sending end; descramble to plain text on receiving end
21 ENCRYPTION STRENGTH
Figure 17.6 Estimated time needed to break encryption keys, using $100,000
worth of computer equipment
22 ENCRYPTION
• Distribution Restrictions
• Public Key encryption
• Symmetric
• Both sender and recipient use same key
• Key is referred to as secret key
• Secure Sockets Layer and Secure Hypertext Transport Protocol ensure online transactions
are secure
• Pretty Good Privacy – Network Associates product that allows individuals to register for
public and private keys
25 DIGITAL SIGNATURES AND DIGITAL
CERTIFICATES
• Electronic Signatures
• Digital Signatures
• Different each time you send a message
• Digital Certificates
• Computer files that serve as the equivalent of ID cards
26 FIREWALLS
• Security measures slow data communications and require discipline that is not easy to
maintain
• Passwords
• Encryption
• Firewalls