Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Ch. 12: Key Learning Objectives
Understanding why management and regulation of
information technology is a challenge for governments and
businesses.
Identifying the various information technology interventions
undertaken by governments.
Examining challenges businesses face in managing
information about key stakeholders, including employees and
customers.
Knowing the causes and partial remedies to the problem of
cybercrime.
Assessing the emerging role and responsibilities of the
organizations chief information officer and organizational
functions responsible to ensure information security and
privacy.
Identifying international and national governments efforts to
combat cybercrime.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-2
McGraw-Hill Education.
Information Technology Challenges
for Governments and Businesses
While scientists and technicians keep technology
moving quickly, governments must try to keep
pace, ensuring that the public is protected.
One of the major obstacles to achieving the right
balance between the enjoying the benefits of
information technology and controlling its
potential threats is that government and business
often do not understand each other very well.
Cooperation will be necessary if society is to able to reap the
full benefits of technology without threat to peoples security
and safety.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-3
McGraw-Hill Education.
Government Interventions of
Information and Ideas
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-4
McGraw-Hill Education.
Government Internet Censorship and
Control
China
The Chinese government operates one of the most sophisticated
systems of Internet censorship in the world.
It requires all China-based Web sites and blogs to register with
the government and blocks access to many kinds of information.
Passed new rules requiring Internet users:
To provide their real names to service providers
Required all Chinese video-streaming sites to receive approval
from Chinas top broadcasting regulator or have the content
banned
In 2015, Chinese Internet companies deleted tens of thousands of
user accounts based on new rules that increased government
control over online disclosure.
According to the Chinese government, many of these deletions
were based on misleading or harmful usernames.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-5
McGraw-Hill Education.
Government Internet Censorship and Control
Pakistan
The Pakistani government broadened an existing ban on social
networking sites to include YouTube, some Flickr and Wikipedia sites, and
about 450 individual Web pages
Because of what it described as growing sacrilegious content.
Iran
Since 2009, after contentious presidential elections that pitted various
religious groups against each other, the elected Iranian government
banned Facebook, Twitter and YouTube, and later Instagram
stop the spread of the decadent Western culture.
North Korea
North Korea is one of the worlds most recognized censors of the Internet
But its government made an unprecedented move in 2013 when it
allowed Internet searches on mobile devices and laptops by
foreigners--but not by its citizens.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-6
McGraw-Hill Education.
Government Internet Censorship and
Control
Governments intervened to
restrict their citizens
access to information and
various Internet and social
media sites
To suppress political dissent
To impose particular religious or
ideological views
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-7
McGraw-Hill Education.
Government Acquisition of Information
to Protect the Public Good
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-8
McGraw-Hill Education.
Government Protecting
Individuals Rights and Property
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of12-9
McGraw-Hill Education.
Top 10 Countries by Percentage of Users
Using Unlicensed Software, 2013
Figure 12.1
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-10
McGraw-Hill Education.
Government Protecting Individuals Rights
and Property
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-11
McGraw-Hill Education.
Business Access to and Use of
Confidential Information
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-12
McGraw-Hill Education.
Access to Stakeholders Personal Information
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-13
McGraw-Hill Education.
Access to Stakeholders Personal Information
Arguments:
How much information companies
should collect about their stakeholders
and whether the collection of
stakeholders information benefits
these stakeholders or not remain
controversial?
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-14
McGraw-Hill Education.
Special Issue: Cybercrime - A Threat to Organizations and the
Public
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-15
McGraw-Hill Education.
Special Issue: Cybercrime - A Threat to Organizations and
the Public
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-16
McGraw-Hill Education.
Costs of Cybercrime
According to a study by the Ponemon Institute,
the cost of cybercrime per U.S. business
organization was $12.7 million in 2014, a 9.3
percent increase from the prior year.
The study concluded by noting that the volume
of cyberattacks was increasing, with 138 attacks
during a single week in 2014.
Companies were struggling with their capabilities
to keep up with criminals when it came to cyber-
risk management.
As more and more highly visible breaches occurred with
growing regularity, most technology executives believed that
they were losing ground to cyberattackers.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-17
McGraw-Hill Education.
Center for Strategic and
International Studies (CSIS)
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-18
McGraw-Hill Education.
Why Do Hackers Hack?
Figure 12.2
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-19
McGraw-Hill Education.
Exploring Why Hackers Hack
The hackers motivation to profit from her or
his computer skills and willingness to break
the law for payment.
The hackers are politically motivated.
Hack to gain media attention.
Hack to raise public awareness.
White hatters: individuals employed by businesses or
governments to hack their systems deliberately to
discover possible vulnerabilities of their own systems.
Grey hatters: hackers working on their own, often
seeking media attention, but inclined to share their
hacking exploits with the businesses they hacked in the
expectation that the firm will pay them for the
information.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-20
McGraw-Hill Education.
Business Responses to
Invasions of Information Security
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-21
McGraw-Hill Education.
The Chief Information,
Security, Technology Officer
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-22
McGraw-Hill Education.
The Roles and Responsibilities of the
Chief Information Officer (CIO)
Figure 12.3
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-23
McGraw-Hill Education.
Government Efforts to Combat Cybercrime
Since 2007, representatives from the
United States and dozens of European
countries have gathered annually for
what is known as Data Privacy Day,
held annually on January 28th
To raise awareness and empower people to
protect their privacy, control their digital
footprint, and escalate the protection of privacy
and data as everyones priority.
Leaders of the North Atlantic Treaty
Organization (NATO) ratified a change
in the organizations mission of
collective defense.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-24
McGraw-Hill Education.
Government Efforts to Combat Cybercrime
The United States took a number of
measures to establish a system of
voluntary cybersecurity standards.
In 2013, a federal government-led group
partnered with the private sector to improve
information sharing and bolster existing
cybersecurity regulations.
In 2015, the U.S. federal government opened a
new center to more quickly assess and deter
cyberattacks on the United States.
Additional coordinated efforts by
international governmental agencies
are needed to better ensure that the
threat of cyberattacks.
Copyright 2017 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
12-25
McGraw-Hill Education.