Week 6
Week 6
Week 6
9-1
Information Age Terms
Computer Literacy
Knowing how to use a computer to gather, store,
organize, and otherwise process information. These are
desirable and even required for many occupations today
Digital Divide
The gap developing in society between those that are
computer literate and have access to computers and
those that don’t and how it will affect them
Computer Ethics
The issues and standards of conduct as they pertain to
the use of information systems including information
privacy, accuracy, property, and accessibility
Information Privacy
What information an individual must reveal to others in the
course of gaining employment or shopping online
Identify Theft
The stealing of another person’s private information
(SSN, credit card numbers, etc.) for the purpose of using it
to gain credit, borrow money, buy merchandise, or
otherwise run up debt that are never paid. This is
especially problematic because it:
• is invisible to the victim, they don’t know it is happening
• is very difficult to correct…credit agencies are involved
• can cause unrecoverable losses and legal costs
Information Accuracy
Concerned with assuring the authenticity and fidelity of
information, and identifying those responsible for
informational errors that harm people
Information Property
Concerned with who owns information about individuals and
how information can be sold and exchanged
Information Ownership
The organization storing the information owns it if it is given
willingly…even if unknowingly by use of their sites (e.g.
online surveys, credit card transactions, etc.)
Privacy Statements
Are stated policies from the organizations collecting the
information and how they intend to use it. These are legally
binding statements
• Internal Use – used within the organization only
• External Use – can be sold to outside parties
Cookies
These files stored on a computer do have legitimate uses
but they also can:
• Store and transmit information about online habits
including, sites visited, purchases made, etc.
• Prevent accessing sites when cookies are refused
• Collect and combine information with other information
to build a personal profile to be sold
Information Systems Today 9-9 (©2006 Prentice Hall)
Information Property – Gathering and Uses
Spyware
These stealth computer applications are installed and
then collect information about individuals without their
knowledge. Currently this technology is not illegal
Spyware Issues
Spyware applications collect and transmit, or use, this
information locally in several ways including:
• Sale of information to online marketers (spammers)
• Illegal uses such as identity theft
• Modify user experience to market to the user by
presenting ad banners, pop-ups, etc. (Adware)
Information Accessibility
Concerned with defining what information a person or
organization has the right to obtain about others and how
that information is used
Ethical Behavior
Illegal versus unethical behavior is an information age
concern. Though activities are not explicitly illegal,
questions exist of whether they are unethical such as:
• Photograph manipulation/modification – in this
circumstance, the photograph not longer reflects
absolute reality
• Unauthorized use of computers – at work or at
school, “stealing time” for personal business or use
• Information collection – by companies compiling
information to sell for profit
Computer Crime
The act of using a computer to commit an illegal act. The
broad definition of computer crime can include the
following:
• Targeting a computer while committing an offense
(e.g gaining entry to a computer system in order to
cause damage to the computer or the data it contains)
• Using a computer to commit and offense
(e.g. stealing credit card numbers from a company
database)
• Using computers to support criminal activity
(e.g. drug dealer using computers to store records of
illegal transactions)
Unauthorized Access
A person gaining entry
to a computer system
for which they have no
authority to use such
access
THIS IS A
COMPUTER CRIME!
Unauthorized Access
1998 Survey of
1600 companies by
PricewaterhouseCoopers
Unauthorized Access
2004 Survey by
Computer Security Institute
Hackers
A term to describe unauthorized access to computers
based entirely on a curiosity to learn as much as
possible about computers. It was originally used to
describe MIT students in the 1960s that gained access to
mainframes. It was later used universally used for gaining
unauthorized access for any reason
Crackers
A term to describe those who break into computer
systems with the intention of doing damage or
committing crimes. This was created because of
protests by true hackers
Software Piracy
This practice of buying one copy and making multiple
copies for personal and commercial use, or for resale
is illegal in most countries while others offer weak or
nonexistent protections. This has become and
international problem as shown below
Worms
This destructive code also replicates and spreads through
networked computers but does damage by clogging up
memory to slow the computer versus destroying files
Information Systems Today 9-25 (©2006 Prentice Hall)