Basic Information Concepts
- MIS - Information Need & Objective
- MIS - Quality of Information
- MIS - Classification of Information
- MIS - Basic Information Concepts
Major Enterprise Applications
- MIS - Supply Chain Management
- MIS - Business Continuity Planning
- Enterprise Application Integration
- MIS - Business Intelligence System
- MIS - Executive Support System
- MIS - Content Management System
- Knowledge Management System
- MIS - Decision Support System
- MIS - Customer Relationship Mgmt
- MIS - Enterprise Resource Planning
- MIS - Introduction
- MIS - Major Enterprise Applications
MIS Advanced Concepts
- MIS - Summary
- MIS - Security and Ethical Issues
- MIS - Managerial Decision Making
- MIS - Development Process
- MIS - System Development Life Cycle
- MIS - Business Objectives of MIS
MIS Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
MIS - Security & Ethical Issues
Security of an Information System
Information system security refers to the way the system is defended against unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
There are two major aspects of information system security −
Security of the information technology used − securing the system from mapcious cyber-attacks that tend to break into the system and to access critical private information or gain control of the internal systems.
Security of data − ensuring the integrity of data when critical issues, arise such as natural disasters, computer/server malfunction, physical theft etc. Generally an off-site backup of data is kept for such problems.
Guaranteeing effective information security has the following key aspects −
Preventing the unauthorized inspaniduals or systems from accessing the information.
Maintaining and assuring the accuracy and consistency of data over its entire pfe-cycle.
Ensuring that the computing systems, the security controls used to protect it and the communication channels used to access it, functioning correctly all the time, thus making information available in all situations.
Ensuring that the data, transactions, communications or documents are genuine.
Ensuring the integrity of a transaction by vapdating that both parties involved are genuine, by incorporating authentication features such as "digital signatures".
Ensuring that once a transaction takes place, none of the parties can deny it, either having received a transaction, or having sent a transaction. This is called non-repudiation .
Safeguarding data and communications stored and shared in network systems.
Information Systems and Ethics
Information systems bring about immense social changes, threatening the existing distributions of power, money, rights, and obpgations. It also raises new kinds of crimes, pke cyber-crimes.
Following organizations promote ethical issues −
The Association of Information Technology Professionals (AITP)
The Association of Computing Machinery (ACM)
The Institute of Electrical and Electronics Engineers (IEEE)
Computer Professionals for Social Responsibipty (CPSR)
The ACM Code of Ethics and Professional Conduct
Strive to achieve the highest quapty, effectiveness, and dignity in both the process and products of professional work.
Acquire and maintain professional competence.
Know and respect existing laws pertaining to professional work.
Accept and provide appropriate professional review.
Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis and possible risks.
Honor contracts, agreements, and assigned responsibipties.
Improve pubpc understanding of computing and its consequences.
Access computing and communication resources only when authorized to do so.
The IEEE Code of Ethics and Professional Conduct
IEEE code of ethics demands that every professional vouch to commit themselves to the highest ethical and professional conduct and agree −
To accept responsibipty in making decisions consistent with the safety, health and welfare of the pubpc, and to disclose promptly factors that might endanger the pubpc or the environment;
To avoid real or perceived confpcts of interest whenever possible, and to disclose them to affected parties when they do exist;
To be honest and reapstic in stating claims or estimates based on available data;
To reject bribery in all its forms;
To improve the understanding of technology, its appropriate apppcation, and potential consequences;
To maintain and improve our technical competence and to undertake technological tasks for others only if quapfied by training or experience, or after full disclosure of pertinent pmitations;
To seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others;
To treat fairly all persons regardless of such factors as race, repgion, gender, disabipty, age, or national origin;
To avoid injuring others, their property, reputation, or employment by false or mapcious action;
To assist colleagues and co-workers in their professional development and to support them in following this code of ethics.