Академический Документы
Профессиональный Документы
Культура Документы
systems, which make it difficult for decisions implementation. Many users are not properly
makers to collaborate and share information. trained in using applications, and their mistakes
can be very costly.
Computer-Related Mistakes caused by unclear
expectations coupled with inadequate training Computer training helps to ensure acceptance
and a lack of feedback and implementation of policies and procedures.
.
PREVENTING COMPUTER-RELATED WASTE AND Monitoring Policies and Procedures To ensure
MISTAKES organizations must use all resources that users throughout an organization are
wisely. following established procedures, the next step
is to monitor routine practices and take
Establishing Policies and Procedures The first corrective action if necessary
step to prevent computer-related waste is to
establish policies and procedures regarding Reviewing Policies and Procedures The final
efficient acquisition, use, and disposal of step is to review existing policies and
systems and devices. procedures and determine whether they are
adequate
Prevention of computer-related mistakes
Data-entry or data-capture errors This review and planning allows companies to
Errors in computer programs take a proactive approach to problem solving,
Errors in handling files, including formatting a which can enhance a companys performance,
disk by mistake, copying an old file over a newer such as increasing productivity and improving
one, and deleting a file by mistake customer service.
Mishandling of computer output
Inadequate planning for and control of COMPUTER CRIME is less dangerous as a
equipment malfunctions computer criminal with the right equipment and
Inadequate planning for and control of know-how can steal large amounts of money
environmental difficulties (e.g., electrical and without leaving his or her home.
humidity problems)
Installing computing capacity inadequate for Internet Crime Computer Center : An alliance
the level of activity between the White Collar Crime Center and the
Failure to provide access to the most current Federal Bureau of Investigation that provides a
information by not adding new Web links and central site for Internet crime victims to report
not deleting old links and to alert appropriate agencies of crimes
committed.
Preventing computer-related mistakes begins
by identifying the most common types of errors. Computer crime Computer crime is a serious
and growing global concern.
Computer usage policies Organizations
establish polices to keep employees from THE COMPUTER AS A TOOL TO COMMIT CRIME
wasting time. A computer can be used as a tool to gain access
to valuable information and as the means to
Implementing Policies and Procedures steal millions of dollars.
Implementing policies and procedures to
minimize waste and mistakes varies according to social engineering: Using social skills to get
the business conducted. computer users to provide information that
allows a hacker to access an information system
or its data. a critical computer password has information systems used by law enforcement
been talked out of a person. to recover stolen property
dumpster diving: Going through the trash of an Monitoring Criminals JusticeXchange is a Web-
organization to find secret or confidential based data sharing system that places millions
information, including information needed to of nationwide booking records at the fingertips
access an information system or its data. of law enforcement officials. The system makes
Identity thieves are not above searching an it easy to collaborate with other law
organizations trash to find confidential enforcement professionals to locate persons of
information. interest.
cyberterrorism: The intimidation of government Assessing Crime Risk for a Given Area The
or civilian population by using information ready availability of personal computers,
technology to disable critical national coupled with the development of mapping and
infrastructures (e.g., energy, transportation, analysis software,
telecommunications, banking and finance, law
enforcement, and emergency response) to Mapping crime risk A GIS helps law
achieve political, religious, or ideological goals. enforcement agencies track and even diminish
Cyberterrorism includes threats or attacks crime risks.
against a countrys critical infrastructure, such
as the air traffic control system. THE COMPUTER AS THE OBJECT OF CRIME Each
time system access is illegally obtained, data or
cyberterrorist: Someone who intimidates or computer equipment is stolen or destroyed, or
coerces a government or organization to software is illegally copied, the computer
advance his or her political or social objectives becomes the object of crime.
by launching computer-based attacks against
computers, networks, and the information Common methods used to commit computer
stored on them. crimes
-Add, delete, or change inputs to the computer
identify theft: A crime in which an imposter system = Delete records of absences from class
obtains key pieces of personal identification in a students school records.
information, such as Social Security or drivers -Modify or develop computer programs that
license numbers, to impersonate someone else. commit the crime. = Change a banks program
for calculating interest so it deposits rounded
Computer Theft Ploutus malware is designed to amounts in the criminals account.
steal money directly from ATM machines. -Alter or modify the data files used by the
computer system. = Change a students grade
THE COMPUTER AS A TOOL TO FIGHT CRIME from C to A
The computer is also used as a tool to fight -Operate the computer system in such a way as
computer crime. Information systems are used to commit computer crime. = Access a restricted
to fight crime in many ways, including helping government computer system.
recover stolen property, monitoring sex -Offer worthless products for sale over the
offenders, and helping to better understand and Internet = Send emails requesting money for
diminish crime risks. worthless hair growth product.
Recovery of Stolen Property The LeadsOnline Illegal Access and Use Crimes involving illegal
Web-based service system is one of several system access and use of computer services are
a concern to both government and business.
hacker: A person who enjoys computer another when the files are copied or shared.
technology and spends time learning and using Most viruses attach themselves to executable
computer systems. files, but some can target a master boot record,
autorun scripts, or Microsoft Office macros.
criminal hacker (cracker): A computer-savvy -Worm = A malicious program that spreads from
person who attempts to gain unauthorized or computer to computer, but unlike a virus, it can
illegal access to computer systems to steal spread without any human action. For example,
passwords, corrupt files and programs, or even a worm can send a copy of itself to everyone
transfer money. listed in your email address book.
intrusion detection system (IDS): Monitors Privacy and Instant Messaging Using instant
system and network resources and traffic and messaging (IM) to send and receive messages,
notifies network security personnel when it files, and images introduces the same privacy
senses a possible intrusion. issues associated with email
security dashboard: Software that provides a Privacy and Personal Sensing Devices RFID
comprehensive display on a single computer tags, essentially microchips with antenna, are
screen of all the vital data related to an embedded in many of the products we buy,
organizations security defenses, including from medicine containers, clothing, and books
threats, exposures, policy compliance and to computer printers, car keys, and tires.
incident alerts.
Privacy and the Internet Some people assume
managed security service providers (MSSPs): that there is no privacy on the Internet and that
Organizations that monitor, manage, and you use it at your own risk.
maintain network security for both hardware
and software for other organizations. Privacy and Internet Libel Concerns Libel
involves publishing an intentionally false written
antivirus program: Software that runs in the statement that is damaging to a persons or
background to protect your computer from organizations reputation.
dangers lurking on the Internet and other
possible sources of infected files. Corporate Privacy Policies Even though privacy
laws for private organizations are not very
restrictive, most organizations are sensitive to BBB recommends that a privacy notice includes
privacy issues and fairness. the following elements:80
Policy (what personal information is being
Individual Efforts to Protect Privacy Although collected on the site)
numerous state and federal laws deal with Choice (what options the customer has about
privacy, the laws do not completely protect how/whether his or her data is collected and
individual privacy. used)
Access (how a customer can see what data
Fairness Issues has been collected and change/correct it if
-The right to know necessary)
-The ability to decide Security (state how any data that is collected
Database Storage is stored/protected)
-Knowledge Redress (what a customer can do if the
-Control privacy policy is not met)
Database Usage Updates (how policy changes will be
-Notice communicated)
-Consent
Health Concerns Organizations can increase
Knowledge. Should people know what data is employee productivity by paying attention to
stored about them? In some cases, people are the health concerns in todays work
informed that information about them is stored environment.
in a corporate database. In others, they do not
know that their personal information is stored Avoiding Health and Environmental Problems
in corporate databases. Two primary causes of computer-related health
Control. Should people be able to correct errors problems are a poorly designed work
in corporate database systems? This ability is environment and failure to take regular breaks
possible with most organizations, although it to stretch the muscles and rest the eyes
can be difficult in some cases.
Notice. Should an organization that uses ergonomics: The science of designing machines,
personal data for a purpose other than the products, and systems to maximize the safety,
original purpose notify individuals in advance? comfort, and efficiency of the people who use
Most companies dont do this. them.
Consent. If information on people is to be used
for other purposes, should these people be Ergonomics Developing certain ergonomically
asked to give their consent before data on them correct habits can reduce the risk of adverse
is used? Many companies do not give people health effects when using a computer
the ability to decide if such information will be
sold or used for other purposes. The following is a useful checklist to help you
determine if you are properly seated at a
filtering software: Software that screens correctly positioned keyboard:81
Internet content. Your elbows are near your body in an open
angle to allow circulation to the lower arms and
Top-rated Internet filters hands
NetNanny Your arms are nearly perpendicular to the
McAfee Family Protection floor Your wrists are nearly straight
PureSight PC The height of the surface holding your
keyboard and mouse is 1 or 2 inches above your
thighs
Center the keyboard in front of your body.
The monitor is about one arms length (20 to
26 inches) away
The top of your monitor is at eye level
Your chair has a backrest that supports the
curve of your lower (lumbar) back