Friday, April 8, 2011

Week 5 Chapter 4: Ethics and Security



Explain the ethical issues surrounding information technology.
Intellectual Property- a person's right to protect their creative and intellectual efforts.

Copyright- the exclusive right to perform certain actions with a piece intangible property, such as songs, books, movies, etc.

Fair Use Doctrine- the legal right to use copyrighted material, but not make a profit on it.

Pirated Software- the unauthorised and illegal use of copyrighted material e.g. duplicating, selling, downloading

Counterfeit Software- the selling of copied software to look like the original e.g claiming copied software as your own


Describe a situation involving technology that is ethical but illegal.
Hiring a DVD from a video shop and loving it so much that you make a copy of it for yourself, so that you won't have to re-hire it later and that you can watch it as much as you want, also saving you from having to spend money to purchase your own copy.


Figure 1: This is a commercial which is usually shown in the previews before a movie or DVD starts.


Describe and explain one of the computer use policies that a company might employ.
An Internet use policy provides the user with rules and guidelines outlining how to use the Internet in a appropriate and proper manner. This policy applies to all employers within a company who have access to the Internet through any multimedia device and it is expected that the employee's adhere to the policy.

Some terms and conditions that an Internet use policy may include are:
-Describing the available Internet services.
-Defining the companies position on the purpose of Internet access and the restrictions.
-This should compliment the ethical computer use policy.
-Describe the users responsibility for citing sources, properly handling offensive material and protecting the companies good name.
-Should clearly state the consequences if the policy is violated.


What are the 5 main technology security risks?
-Human Error
-Natural Disasters
-Technical Failures
-Deliberate Acts
-Management Failure


Figure 2: This is a diagram which demonstrates the 5 main technology security risks.


Outline one way to reduce each risk.
Human Error- Stronger passwords that are frequently changed to ensure strong security, providing information to prove a person's identity, as well as better training for employers

Natural Disasters- Main hard drive which constantly stores and saves information from the network onto an online storage space, so that all folders and files are able to be found, recovered and kept in a safe and easily accessible place.

Technical Failures- Install and use high profile firewalls and anti-virus programs to prevent unauthorised external access.

Deliberate Acts- Use programs which track and screen a person's actions and activities on a computer and highlight and alert if there is inappropriate use happening.

Management Failure- Provide regular training which allows for refreshment on basic skills, introduces new skills, teaches them important skills that are necessary and relevant to their job, etc. 


What is a disaster recovery plan, what strategies might a firm employ?
A disaster recovery plan is a list of tasks which allow for computer systems and data to be recovered  and for access to be regained after a disaster has occurred.

Strategies for a disaster recovery plan include:
-Back-up of files, folders, procedures
-Backed-up material to be moved off site
-Off site material to be kept up-to-date
-Hot or warm back-up sites
-Well documented procedures
-Regular recovery testing


Reference's:

Baltzan, Phillips, Lynch, Blakey, Business Driven Information Systems, 1st Australian/New Zealand Edition, Mc Graw Hill, 2010.

kubusclem,  Movie Piracy - it's a crime, YouTube, http://www.youtube.com/watch?v=l5SmrHNWhak&feature=related, Visited 8/4/2011


No comments:

Post a Comment