managing technology and innovation chapter 13 copyright © 2014 by the mcgraw-hill companies, inc....

17
Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserve McGraw-Hill/Irwin

Upload: oswin-blake

Post on 11-Jan-2016

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Managing Technology and Innovation

Chapter 13

Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Page 2: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Ch. 13 Key Learning Objectives Evaluating the growth in breaches of personal information

privacy Understanding where these attacks come from and what

their effects are Evaluating initiatives taken by government and business to

minimize invasions of privacy Recognizing the emerging role and responsibilities of the

organization’s chief information officer Examining violations of intellectual property through the

piracy of software, music, movies, and books, and how business and government attempt to prevent these illegal actions

Recognizing the benefits, as well as the ethical and social challenges that arise from technological breakthroughs in science and medicine

13-2

Page 3: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Violations of Privacy: Causes and Costs The potential for violations of privacy can come from

many different sources Employees have access to new technologies at work

and companies may be monitoring usage, raising employee concerns about invasions of privacy

More aggressive efforts by cyber criminals resulted in a steep rise of attacks on information security

Recent technological advancements have increased the number of ways that privacy violations may occur

13-3

Page 4: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

“Cybercrime has emerged as a formidable threat, thanks to deeply determined, highly skilled, and well-organized cyber criminals from nation states to hacktivists, from criminal gangs to lone-wolf perpetrators. Organizations need to be aware and adjust to this changing landscape.” PricewaterhouseCoopers executive

Violations of Privacy: Causes and Costs

13-4

Page 5: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

In a survey of 583 U.S. companies 90 percent said their companies’ computers were breached

at least once by hackers over the past year Nearly 60 percent reported two or more breaches More than 50 percent said they had little confidence of being

able to stave off future attacks

The number of instances of identity theft and the losses associated with these fraudulent activities are increasing

Violations of Privacy: Causes and Costs

13-5

Page 6: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Cases of Identity Theft and Fraud Losses in the U.S., 2006 – 2009

Figure 13.1

13-6

Page 7: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Recent technological advances have increased the number of ways that privacy violations may occur Employees making inadvertent mistakes Computer hackers, individuals, often with advanced technology

training, who, for thrill or profit, breach a business information security system using:

• Zombies, a hijacked computer that can be remote-controlled by the attacker to respond to the attacker’s commands

• Trojan horses, that enable hackers to gain access to computers when people clicked on dangerous links

• Worms that would replicate, spread and corrupt computer files within the company’s system

• Logic bombs that could hide in computers and then “go off” and delete files at a specific time

Ways Privacy Violations May Occur

13-7

Page 8: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Managing the Protection of Privacy

Since 2007, representatives from the United States and 27 European countries have gathered annually for Data Privacy Day The event, which brings together privacy professionals,

government leaders, academics and students, and business executives, was designed to raise awareness and generate discussion about data privacy practices and rights

13-8

Page 9: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Managing the Protection of Privacy The Children’s Online Privacy Protection Act of 1998

(COPPA) requires commercial websites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13

In 2010, the U.S. government launched the “Perfect Citizen” program to detect cyber assaults on private U.S. companies and government agencies running critical infrastructures, such as the electricity grid and nuclear power plants

Governments must act with businesses themselves—both Internet companies and any firm collecting and storing sensitive information—to secure information

13-9

Page 10: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Business Response to Information Security Invasions

Businesses have gone to great lengths to build strong defenses to protect information and ensure stakeholder privacy

Companies are now using honeypots, a system used by security professionals to lure hackers to a fabricated website that can track all their movements

13-10

Page 11: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Chief Information Officer (CIO) Is responsible for managing technology, including its

many security issues, for companies Position has been elevated in recent years, with most

CIOs reporting directly to their CEOs CIOs’ role expanded even more to include broader

responsibilities and greater influences on corporate policies and practices

Part of job is enabling or driving business innovation through use of technology

13-11

Page 12: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Protecting Intellectual Property Intellectual property

The ideas, concepts, and other symbolic creations of the human mind

Protected in U.S. by copyright, patent and trademark laws

Theft of intellectual property, artistic performance, or copyrighted material exploded with the entrance of the Internet and global connectivity

Whether it is computer-based software, musical recordings, video movie productions, or electronic versions of books, piracy is on the rise and victims are retaliating turning to governments for enforcement and protection of their rights, or seeking collaborative solutions to this ethical challenge

13-12

Page 13: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Business and Government Responses to Violations of Intellectual Property

Companies have sought assistance on the issue of software piracy from governmental agencies and the courts both inside and outside the United States In 1998, the United States passed the Digital Millennium

Copyright Act, making it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufacturer and the user

In China, where experts estimate that 90 percent of all software in use is unlicensed, government officials have also take steps to curb piracy

Despite efforts at the international, national and business levels, piracy continues to rise each year globally

13-13

Page 14: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Commercial Value of Pirated Software, by Region, 2007-2011

Figure 13.3

13-14

Page 15: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Managing Scientific Breakthroughs Nanotechnology

The application of engineering to create materials on a molecular or atomic scale

So far, at least, the U.S. government has not regulated the use of nanomaterials and nanoparticles in consumer products

Human genome When Celera Genomics Group announced that it completed the

first sequencing of human DNA makeup, the achievement was hailed as the most significant scientific breakthrough since landing on the moon

A new era of medicine, as well as great opportunity for biotechnology companies, appeared to be born with the decoding of the human genome

13-15

Page 16: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Managing Scientific Breakthroughs Biotechnology and Stem Cell Research

Tissue engineering is the growth of tissue in a laboratory dish for experimental research

Stem-cell research is research on nonspecialized cells that have the capacity to self-renew and to differentiate into more mature cells

Cloning Clearly stem cell research leading to the possibility of human

cloning and the human consumption of food cloned from animals are important issues and will likely increase in prominence in the near future

In 2008 the F.D.A. declared that food from cloned animals and their offspring was safe to eat, but imposed a voluntary ban on the sale of cloned animals

13-16

Page 17: Managing Technology and Innovation Chapter 13 Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin

Managing Scientific Breakthroughs Genetically engineered foods

Genetic engineering is altering the natural makeup of a living organism, allowing scientists to insert any gene in to a plant

Significant economic implications for agricultural industry

Genetically modified foods is food processed from genetically engineered crops

Early on was backlash against genetically modified foods in Europe, initial opposition has weakened

By 2007, developing countries planting genetically modified seeds outnumbered developed countries, according to a report from the International Service for the Acquisition of Agri-biotech Applications

13-17