managing technological challenges businesses protecting privacy the management of information...

11

Post on 22-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Managing Technological Managing Technological ChallengesChallenges

Businesses Protecting Privacy The Management of Information Security Internet Pornography Protecting Intellectual Property Managing Scientific Breakthroughs

ChapterChapter

14

Consumer perceptions of online privacyConsumer perceptions of online privacy

Percentage of Home Internet Users Who:Knew websites collected information about them even if they did not register.

Incorrectly believed that a website with a privacy policy would not share their personal information.

Thought that website privacy policy were easy to understand.

Have searched for information on how to protect their personal data.

Have used filters to block spam.

Have used software that looks for spyware.

Have used software that hid their computer’s identity from websites.

59%

57%

47%

46%

43%

23%

17%

Figure 14.1

Organizations protecting consumers’ rightsOrganizations protecting consumers’ rights

Selected by Consumer Webwatch for their commitment to five basic guidelines that help prevent confusion, deception, and fraud on the Internet:

About.com Diawlessharware.com Orbitz

Adobe.com Homestead.com Overture

Barnes&Noble.com Hotwire.com SafeShoppingNetwork.com

BizRate.com Insure.com Time Out New York

Caretaker.org ITDN.net Travelcity

CBS MarketWatch.com Kelley Blue Book URAC.org

Cenicola-Helvin.com LabTestsOnline.org UrbanMountain.com

Cleverwood.com MayoClinic.com Web MD

ClothingbyDesign.com Monster Webshots.com

ConferencingCompany.com Northcascades.com

Exhibit 14.A

The computer wormThe computer worm

In the Microsoft Windows OS, a computer worm infected tens of thousands of home computers and computer networks in 2003 despite warnings from Microsoft.

Many users neglected to download up-to-date virus protection. Worm spread by slipping into a computer connected to the

Internet or to another machine on the same network. Once in a computer, the worm could scan a network looking for

other machines. Infected computer became sluggish, or even, crashed. The second attack was less disruptive because users applied the

Microsoft patch for protection.

Exhibit 14.B

Percentage of organizations believing their Percentage of organizations believing their computer systems have been hackedcomputer systems have been hacked

Figure 14.2

0

10

20

30

40

50

60

70

80

1996 1997 1998 1999 2000 2001

Per

cen

t of

fir

ms

Years

Source: Computer Security Institute, www.gocsi.com; Federal Bureau of Investigation, www.fbi.gov; and Riptech, www.riptech.com

Sources of hacking efforts on computer Sources of hacking efforts on computer systemssystems

Figure 14.3

0

10

20

30

40

50

60

70

80

90

Independenthackers

Disgruntledemployees

U.S.competitors

Foreigncompetitors

Foreigngovernments

Per

cen

t of

fir

ms

Protecting intellectual propertyProtecting intellectual property

Intellectual property

The ideas, concepts, and other symbolic creations of the human mind.

Software piracy

The illegal copying of copyrighted software.

Digital Millennium Copyright Act (1998)

Makes it a crime to circumvent antipiracy measures built into most commercial software agreements between manufacturers and users.

Managing scientific breakthroughsManaging scientific breakthroughs

Human genome In 2000, the Celera Genomics Group announced that it completed

the first sequencing of human DNA makeup.

Tissue engineering

The growth of tissue in a laboratory dish for experimental research.

Stem-cell research

Research on nonspecialized cells that have the capacity to self-renew and to differentiate into more mature cells.

Managing scientific breakthroughs (continued)Managing scientific breakthroughs (continued)

Bioterrorism Terrorist groups see the use of deadly bioengineered diseases and

poisons, such as smallpox, anthrax, and bubonic plague, as effective tools.

Cloning In 1986, a Danish scientist announced the first successful cloning of

a sheep from fetal cells. In 2002, the U.S. Senate began debates on a bill to ban human

cloning.

Genetic engineering

Altering the natural makeup of a living organism. Genetically modified foods, or food processed from genetically

engineered crops.

Exhibit 13.B

Where religions stand on human cloning

The religious groups most opposed to cloning were Roman Catholics and Southern Baptists. The Catholic church saw cloning as an affront to human dignity.

The Southern Baptists condemned cloning on the grounds that it was an assault on the family.

Islamic religion opposed cloning children from women, since Islam was concerned with the paternal lineage of the child.

Protestant faiths and most Jews were moderately opposed to cloning, although cloning is condoned under certain circumstances.

Hindus and Buddhists generally approve of cloning, since they believed in reincarnation.

Source: Hanna Rosin, “Though Shalt Not Clone?” Pittsburgh Post Gazette, July 26, 2000, p. A3.