Information Rights:- Privacy and Freedom in the internet age. Privacy:- The claim of individuals to be left alone, free from interference from other individuals, organizations or the state. Laws ii. Users can use P3P to select the level of privacy they wish to maintain when interacting with the website. Privacy Protection Tools a. Managing Cookies b. Blocking ADS Control ads that pop up based user profiles and prevent ads from collecting or sending information. BHOCop, Adsubstract.
Encrypting email or data Scramble email or data so that they cannot be read. Anonymizers Allow users to surf the web without being identified or to send anonymous email. Example: anonymizer. Property Rights : Intellectual Property a. Trade secrets b. Copyright c. Patents d. Trade Secret Any confidential business information which provides an enterprise a competitive edge bay be considered a trade secret. Trade secrets encompass manufacturing or industrial secrets and commercial secrets.
The subject matter of trade secrets is usually defined n broad terms and incudes sakes method distribution methods, consumer profiles, advertising strategies lists of suppliers and clients and manufacturing processes.
A trade secret is an invented formula practice, process, design, instrument pattern commercial method or compilation of information which is not generally known or reasonably ascertainable by others and by which a business can obtain an economic advantage over competitors or customers.
Copyright It is a legal right created by the law of a country, that grants the creator of an original work exclusive rights to its use and distribution usually for a limited time, with the intention of enabling the creator e. The photographer of a photograph or the author of a book to receive compensation for their intellectual effort. Copyright is a form of intellectual property, applicable to any expressed representation of a creative work.
It is often shared among multiple authors, each of whom holds a set of rights to use or license the work and who are commonly referred to as right holders. Patents It is set of exclusive rights granted by a sovereign state to an inventor or assign for a limited period of time in exchange for detailed public disclosure of an invention An invention is a solution to a specific technology problem and is a product or a process.
Patents are a form of intellectual property. A patent may include many claims, each of which defines a specific property rights. It criminalizes production and dissemination of technology, devices or services intended to circumvent measures commonly known as digital rights management or DRM that control access to copyrighted works.
It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DCMA heightens the penalties for copyright infringement on the internet.
Accountability, Liability and Control It is challenging existing liability law and social practices for holding individuals and institutions accountable. System Quality Three principle sources of poor system performance are:- 1. Software bugs and errors.
Hardware or facility failure caused by natural or other causes. Poor input data quality. Quality of Life Equity access and boundaries: Computer and IT potentially can destroy valuable elements of our culture and society even while they bring us benefits.
If there is a balance of good and bad consequences of using information system, whom do we hold responsible for bad consequences. Some negative social consequences of social system are a.
Balancing power: Center vs. Periphery b. Rapidity of change: Reduced response time to competition. Maintaining boundaries: Family, work and leisure.
Dependence and Vulnerability: Today our business, governments, schools and private associations such as churches are incredibly dependent on information system and on therefore highly vulnerable if these systems should fail. Computer crime abuse f. Employment: re-engineering loss g. Equity and Access: Increasing racial and social class gaps Eg: Digital divide h.
Why systems are vulnerable???? Fig Telecommunication networks are highly vulnerable to natural failure of hardware and software and to misuse by programmers, computer operators, maintenance staff and end-users. It is possible to tap communications lines and illegally intercept data. High speed transformation over twisted wire communication channels causes interfaces called crosstalk.
Radiations can disrupt a network at various point as well. Internal threats :Employees: see urself Hacker: A hacker is a person who gains unauthorized access to a computer network for profits, criminal mischief, or personal pleasure. Security: Policies, procedures and technical measures used to prevent unauthorized access, atteraction, theft or physical damage to information system.
Types of Information System Controls Controls:- Controls consists of all the methods, policies, and organizational procedures that ensure the safety of the organizations assets, the accuracy and reliability of its accounting records, and the operational adherence to management standards. Generic Control General controls govern the design, security and use of computer programs and the security of data files in general throughout the organizations IT infrastructure.
General controls apply to all computerized applications and consist of a combination of hardware, software and manual procedures that create an overall control environment. General controls include software controls, physical hardware controls, computer operations control, data security controls, controls over the systems implementation process, and administrative control.
Most of these controls are designed and maintained by information systems specialist except data security controls and administrative controls which require input and oversight from end users and business managers.
Hardware Control Ensure that computer is physically secure and check for equipment malfunction. Computer equipment should be specially protected against fire and extreme temperature and humanity. Organizations that are critically dependent on their computers also must make provision for backup or continued operation to maintain constant services. Computer Operations Control Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.
They include controls over the setup of computer processing jobs and computer operations, and backup and recovery procedures for processing that and abnormally. Data Security Control Ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change or distribution while they are in use or in storage.
Administrative Control Formalized standards, rules, procedures and control disciplines to ensure that organizations general and application controls are properly executed and enforced. Implementation Control Audit the systems development process at various points to ensure that the process is properly controlled and managed.
Application Controls Application controls are specific controls unique to each computerized applications such as payroll or order processing. They consist of controls applied from the business functional area of a particular system and form program procedures. It includes both automated and manual procedures that ensure that only authorized data are completely and accurately processed by an application.
Application controls can be classified as:- a. Input controls b. Processing control c. Output control Input controls check data or accuracy and completeness when they enter the system. There are specific input controls for input authorization, data conversion, data editing and error handling. Processing controls establish that data are complete and accurate during updating. Run control totals, computer matching and program edit checks are used for this purpose. Output controls ensure that the results of computer processing are accurate, complete and properly distributed.
Not all of the application controls are used in every information system. Require more of these controls then others, depending on the importance of data and native of the application. Fig: Internet Security Challenges There are security challenges at each of the layer of an internet computing environment, in the client and server layers.
The firewall identifies name, IP address, applications and other characteristics of incoming traffic. It takes this information against the access rules that have been programmed into the system by network administrator.
The firewall prevents unauthorized communication into and ou of the network, allowing the organization to enforce a security policy on traffic flowing between its network and the internet. There are two types of Firewall: 1. Proxies 2. Stateful inspection 1.
If a user outside the company wants to communicate with a user inside the organization, the outside user first takes to the Santosh Dhungana MIS Version 1. Likewise, computer user inside the organization goal through the proxy to talk with computers on the outside. Stateful Inspection In stateful inspection, the firewall scans each packet of incoming data, checking its source, destination address or services.
It sets up state tables to track information over multiple packets. Users define access roles that must identify every type of packet that the organization does not want to admit. Although stateful inspection consumes fewer network resources then proxies, it is not as secure as proxies. Cisco systems firewalls product is an example of stateful inspection.
Intrusion detecting systems:- self Legal and Regulatory Requirements for Electronic Records Protection of data from abuse, exposure and unauthorized access. Laws:- 1. Gramm- Leach- Billey Act 3. Sarbanes- Oxley Act Electronic Evidence and Computer Forensics - Information from printed or type written, computer data stored on portable floppy disk, CDs, external drives, computer hard disk, email, instant messages, e-commerce, transaction over the internet are example of electronic evidence.
They authentication, firewalls, intrusion detection systems, antivirus software and encryption. A token is a physical device similar to an identity card i. Firms invest in IS projects that have very specific objectives and that will be implemented in 12 to 24 months. Firms also invest in IT infrastructure and such investments often take place over longer periods of time. Through improvement in existing business processes or the creation of entirely new business processes, the net result of which is to increase firm efficiency.
IS contribute to improvements in management decision making by increasing the speed of decision making. Both of these improvements can be measured using traditional capital budgeting method. Traditional Capital Budgeting Models Capital Budgeting Models are one of the several techniques used to measure the value of investing in long term capital investment projects. The process of analyzing and selecting various proposal for capital expenditure is called capital budgeting.
Firms invest in capital projects to expand production to reduce anticipated demand or to modernize production equipment to reduce cost. Firms also invest in capital projects for many non-economic reasons such as installing pollution control equipment, converting to a human resource database to meet government regulations, or satisfying non-market public demands.
IS are considered long term capital investment projects. Six capital budgeting methods are used to evaluate capital projects.
They are:- - The pay back method. All capital budgeting methods rely on measures of cash flow into and out of the firm. Tangible Benefits Tangible benefits can be quantified and assigned a monitory value. Intangible benefits such as more efficient customer service or enhance decision making cannot be immediately quantified but may lead to be quantifiable gains in the long run is called intangible benefits.
Billing enhancements 2. Reduced paralegals 3. Reduced clerical 4. Reduced messenger 5. Reduced telecommunica tion 6. Lawyer efficiencies Santosh Dhungana MIS Version 1. Total Benefits 1. The initial investment of a project. Weakness: This method ignores time value of money, the amount of cash flow after the pay back periods, the disposal value usually zero with computer systems , and the profitability of the investment. Accounting Rate of Return on Investment ROI The accounting rate of return on investment ROI calculates the rate of return from an investment by adjusting the cash inflows produced by the investment for deprecation.
It gives an approximation of the accounting income earned by the project. To find ROI, first calculated the average net benefit. Cost Benefit Ratio It is the ratio of benefits to costs. The profitability index is calculated by dividing the present value of the total cost in flows, from an investment by initial cost of the investment. It takes into account the time value of money. IRR is defined as the rate of return or profit that an investment is expected to earn. IRR is the discount interest rate that will equal the present value of the projects future cash flows to the initial cost of the project.
Financial models do not express the risks and uncertainty of their own cost and benefit estimates. Costs and benefits do not access in the same time frame-costs tend to be upfront and tangible, whereas frame-costs tend to be back loaded and intangible.
Inflection may affect costs and benefits differently. The difficulties of measuring intangible benefits give financial models an application bias. Total views , On Slideshare 0. From embeds 0. Number of embeds Downloads 6, Shares 0.
Comments 0. Likes You just clipped your first slide! Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips. Visibility Others can see my Clipboard. Git Version Control. Aug 4, Math Statistics, Linear Algebra, etc. Re-arranging misc. Regular Expressions. Semantic Web. Software Engineering and Architecture. Adding Building Evolutionary Architectures.
View code. Programming Node. Any PR and suggestions are welcomed. Net [pdf] Node. New sections on master-slave flip flop, counters, code converters and horizontal and vertical micro programming 3.
Introduces Multi bus organization, memory addressing and memory technology 4. Over new multiple choice questions and updated exercise problems. Step-1 : Read the Book Name and author Name thoroughly. Clash of Clans. Subway Surfers. TubeMate 3.
Google Play. Spider-Man: No Way Home review. Log4j software bug. Apple iOS Analogue Pocket review. PS5 restock tracker. Windows Windows.
0コメント