managing technological challenges businesses protecting privacy the management of information...
Post on 22-Dec-2015
214 views
TRANSCRIPT
Managing Technological Managing Technological ChallengesChallenges
Businesses Protecting Privacy The Management of Information Security Internet Pornography Protecting Intellectual Property Managing Scientific Breakthroughs
ChapterChapter
14
Consumer perceptions of online privacyConsumer perceptions of online privacy
Percentage of Home Internet Users Who:Knew websites collected information about them even if they did not register.
Incorrectly believed that a website with a privacy policy would not share their personal information.
Thought that website privacy policy were easy to understand.
Have searched for information on how to protect their personal data.
Have used filters to block spam.
Have used software that looks for spyware.
Have used software that hid their computer’s identity from websites.
59%
57%
47%
46%
43%
23%
17%
Figure 14.1
Organizations protecting consumers’ rightsOrganizations protecting consumers’ rights
Selected by Consumer Webwatch for their commitment to five basic guidelines that help prevent confusion, deception, and fraud on the Internet:
About.com Diawlessharware.com Orbitz
Adobe.com Homestead.com Overture
Barnes&Noble.com Hotwire.com SafeShoppingNetwork.com
BizRate.com Insure.com Time Out New York
Caretaker.org ITDN.net Travelcity
CBS MarketWatch.com Kelley Blue Book URAC.org
Cenicola-Helvin.com LabTestsOnline.org UrbanMountain.com
Cleverwood.com MayoClinic.com Web MD
ClothingbyDesign.com Monster Webshots.com
ConferencingCompany.com Northcascades.com
Exhibit 14.A
The computer wormThe computer worm
In the Microsoft Windows OS, a computer worm infected tens of thousands of home computers and computer networks in 2003 despite warnings from Microsoft.
Many users neglected to download up-to-date virus protection. Worm spread by slipping into a computer connected to the
Internet or to another machine on the same network. Once in a computer, the worm could scan a network looking for
other machines. Infected computer became sluggish, or even, crashed. The second attack was less disruptive because users applied the
Microsoft patch for protection.
Exhibit 14.B
Percentage of organizations believing their Percentage of organizations believing their computer systems have been hackedcomputer systems have been hacked
Figure 14.2
0
10
20
30
40
50
60
70
80
1996 1997 1998 1999 2000 2001
Per
cen
t of
fir
ms
Years
Source: Computer Security Institute, www.gocsi.com; Federal Bureau of Investigation, www.fbi.gov; and Riptech, www.riptech.com
Sources of hacking efforts on computer Sources of hacking efforts on computer systemssystems
Figure 14.3
0
10
20
30
40
50
60
70
80
90
Independenthackers
Disgruntledemployees
U.S.competitors
Foreigncompetitors
Foreigngovernments
Per
cen
t of
fir
ms
Protecting intellectual propertyProtecting intellectual property
Intellectual property
The ideas, concepts, and other symbolic creations of the human mind.
Software piracy
The illegal copying of copyrighted software.
Digital Millennium Copyright Act (1998)
Makes it a crime to circumvent antipiracy measures built into most commercial software agreements between manufacturers and users.
Managing scientific breakthroughsManaging scientific breakthroughs
Human genome In 2000, the Celera Genomics Group announced that it completed
the first sequencing of human DNA makeup.
Tissue engineering
The growth of tissue in a laboratory dish for experimental research.
Stem-cell research
Research on nonspecialized cells that have the capacity to self-renew and to differentiate into more mature cells.
Managing scientific breakthroughs (continued)Managing scientific breakthroughs (continued)
Bioterrorism Terrorist groups see the use of deadly bioengineered diseases and
poisons, such as smallpox, anthrax, and bubonic plague, as effective tools.
Cloning In 1986, a Danish scientist announced the first successful cloning of
a sheep from fetal cells. In 2002, the U.S. Senate began debates on a bill to ban human
cloning.
Genetic engineering
Altering the natural makeup of a living organism. Genetically modified foods, or food processed from genetically
engineered crops.
Exhibit 13.B
Where religions stand on human cloning
The religious groups most opposed to cloning were Roman Catholics and Southern Baptists. The Catholic church saw cloning as an affront to human dignity.
The Southern Baptists condemned cloning on the grounds that it was an assault on the family.
Islamic religion opposed cloning children from women, since Islam was concerned with the paternal lineage of the child.
Protestant faiths and most Jews were moderately opposed to cloning, although cloning is condoned under certain circumstances.
Hindus and Buddhists generally approve of cloning, since they believed in reincarnation.
Source: Hanna Rosin, “Though Shalt Not Clone?” Pittsburgh Post Gazette, July 26, 2000, p. A3.