SlideShare una empresa de Scribd logo
1 de 33
Security and Ethical Challenges Management Information Systems Management Information Systems Reported by: LOUIE A. MEDINACELI ZEPPELIN B. MALPAL AZUDIN T. MAZTURA CLODUALDO G. MAGAAN, JR. GILBERT S. DADOR, MBA Special Lecturer
Security challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Cyber Theft ,[object Object],Management Information Systems
Unauthorized use at Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Software Piracy ,[object Object],[object Object],Management Information Systems
Piracy of Intellectual Property ,[object Object],[object Object],[object Object],Management Information Systems
Computer viruses and worms ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Privacy Issues ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Other Challenges ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Health issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Benefits   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Ethical responsibility of business professionals ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Categories of Ethical Business Issues Management Information Systems
Theories of corporate social responsibility ,[object Object],[object Object],[object Object],Management Information Systems
Principles of technology ethics ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Ethical guideline ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Security management of IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Encryption ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Denial of Service Defenses ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
e-Mail Monitoring ,[object Object],[object Object],Management Information Systems
Virus Defenses ,[object Object],[object Object],[object Object],Management Information Systems
Security Codes ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Backup Files ,[object Object],[object Object],[object Object],Management Information Systems
Security Monitors ,[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Biometric Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Management Information Systems
Computer Failure Controls ,[object Object],[object Object],[object Object],Management Information Systems
Computer Failure Controls ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Computer Failure Controls ,[object Object],[object Object],[object Object],[object Object],Management Information Systems
Fault Tolerant Systems Management Information Systems
Disaster Recovery ,[object Object],Management Information Systems
THANK YOU !!! OPTICAL ILLUSION: if YOU LOOK at the PICTURE  CAREFULLY, AFTER a FEW SECONDS, YOU CAN SEE  the PHILIPPINES or the DIAMOND RING

Más contenido relacionado

La actualidad más candente

Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision Making
Arun Mishra
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
Rohit Kumar
 
Mis – Subsystems
Mis – SubsystemsMis – Subsystems
Mis – Subsystems
Arun Mishra
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
Sayantan Sur
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
Prof. Othman Alsalloum
 

La actualidad más candente (20)

Structure of MIS
Structure of MISStructure of MIS
Structure of MIS
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision Making
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )
 
End user development approach mis
End user development approach mis End user development approach mis
End user development approach mis
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information System
 
Decision making and mis
Decision making and misDecision making and mis
Decision making and mis
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
Mis – Subsystems
Mis – SubsystemsMis – Subsystems
Mis – Subsystems
 
MIS concepts
MIS conceptsMIS concepts
MIS concepts
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
 
Multiple approaches to structure of mis
Multiple approaches to structure of misMultiple approaches to structure of mis
Multiple approaches to structure of mis
 
strategic information system
strategic information systemstrategic information system
strategic information system
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
DSS and decision support system and its types
DSS and decision support system and its typesDSS and decision support system and its types
DSS and decision support system and its types
 
Implementation of MIS and its methods
Implementation of MIS and its methodsImplementation of MIS and its methods
Implementation of MIS and its methods
 

Destacado

Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
guest5f7bf4
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
Hamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
SMITA V MORE
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
BenRay95
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Destacado (19)

Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 

Similar a Security & ethical challenges

Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
Ram Dutt Shukla
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
Jennifer Letterman
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
jeanettehully
 

Similar a Security & ethical challenges (20)

Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
I0516064
I0516064I0516064
I0516064
 
Need for security
Need for securityNeed for security
Need for security
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Data security
Data securityData security
Data security
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Mis 1
Mis 1Mis 1
Mis 1
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 

Más de Louie Medinaceli

Fiscal administration 2 ppt
Fiscal administration 2 pptFiscal administration 2 ppt
Fiscal administration 2 ppt
Louie Medinaceli
 
Human resource development
Human resource developmentHuman resource development
Human resource development
Louie Medinaceli
 
Public fiscal admin report
Public fiscal admin reportPublic fiscal admin report
Public fiscal admin report
Louie Medinaceli
 
Report civil service policies
Report civil service policiesReport civil service policies
Report civil service policies
Louie Medinaceli
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
Louie Medinaceli
 
Theoretical perspectives 2
Theoretical perspectives 2Theoretical perspectives 2
Theoretical perspectives 2
Louie Medinaceli
 
Government budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsGovernment budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problems
Louie Medinaceli
 
Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6
Louie Medinaceli
 
Civil society and public administration
Civil society and public administrationCivil society and public administration
Civil society and public administration
Louie Medinaceli
 

Más de Louie Medinaceli (12)

Report interpersonal
Report interpersonalReport interpersonal
Report interpersonal
 
Ethics report
Ethics reportEthics report
Ethics report
 
Fiscal administration 2 ppt
Fiscal administration 2 pptFiscal administration 2 ppt
Fiscal administration 2 ppt
 
Human resource development
Human resource developmentHuman resource development
Human resource development
 
Hyphothesis
HyphothesisHyphothesis
Hyphothesis
 
Public fiscal admin report
Public fiscal admin reportPublic fiscal admin report
Public fiscal admin report
 
Report civil service policies
Report civil service policiesReport civil service policies
Report civil service policies
 
Report ethics in government service
Report ethics in government serviceReport ethics in government service
Report ethics in government service
 
Theoretical perspectives 2
Theoretical perspectives 2Theoretical perspectives 2
Theoretical perspectives 2
 
Government budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problemsGovernment budgeting & expenditures issues & problems
Government budgeting & expenditures issues & problems
 
Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6Fundamentals of employees discipline group 6
Fundamentals of employees discipline group 6
 
Civil society and public administration
Civil society and public administrationCivil society and public administration
Civil society and public administration
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Security & ethical challenges

  • 1. Security and Ethical Challenges Management Information Systems Management Information Systems Reported by: LOUIE A. MEDINACELI ZEPPELIN B. MALPAL AZUDIN T. MAZTURA CLODUALDO G. MAGAAN, JR. GILBERT S. DADOR, MBA Special Lecturer
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Categories of Ethical Business Issues Management Information Systems
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Fault Tolerant Systems Management Information Systems
  • 32.
  • 33. THANK YOU !!! OPTICAL ILLUSION: if YOU LOOK at the PICTURE CAREFULLY, AFTER a FEW SECONDS, YOU CAN SEE the PHILIPPINES or the DIAMOND RING