Page 634 - Introduction to Business
P. 634
608 PART 6 Managing Business Operations, Management Information Systems, and the Digital Enterprise
Information Systems Controls
LEARNING OBJECTIVE 6
Illustrate what businesses can do to assure the security and accuracy of their information systems.
information systems controls The Information systems controls are the policies, procedures, and technical measures
policies, procedures, and technical used to protect information systems and to assure the accuracy and reliability of
measures used to protect information
these systems. Information systems controls consist of system controls, procedural
systems and to assure the accuracy
and reliability of these systems controls, and facility controls. Systems controls monitor the accuracy and security
systems controls Controls to monitor of the input, processing, storage, and output activities. Input controls include pass-
the accuracy and security of the input, words and other security codes, formatted data entry screens, and audible error
processing, storage, and output
signals. Processing controls identify errors in arithmetic or logical operations, as
activities
well as assure that data are not lost and are processed. Output controls ensure that
information products are correct and complete and are available to authorized
users in a timely manner. Access to the online output of computer networks is usu-
ally controlled by security codes that determine which users can receive what infor-
mation. Storage controls protect the data resources of an organization. Typically, a
multilevel password system is used to protect databases. At the first level, the pass-
word allows users to read information from a file in the database; at the second
level, the password allows users to change information in the file; and at the third
computer monitoring Using computers
level, the password allows users to create or delete files in the database.
to monitor the productivity of employees
while they work
Ethics in Business
Computer Monitoring
Computer monitoring is the use of lance, it has also been blamed for causing health
computers to monitor the productivity problems among monitored workers. Finally, com-
of employees while they work. Supposedly, computer puter monitoring has been blamed for robbing work-
monitoring is done so employers can collect produc- ers of the dignity of their work. In effect, some people
tivity data about their employees to increase the effi- say that computer monitoring creates an “electronic
ciency and quality of service. However, computer sweatshop,” where workers are forced to work at a
monitoring has been criticized as unethical because it hectic pace under poor working conditions.
monitors individuals, not just work, and is done con- Political pressure is building to outlaw computer
tinually, thus violating workers’ privacy and personal monitoring in the workplace. For example, public
freedom. For example, in an airline reservations firm, advocacy groups, labor unions, and many legislators
the reservations agent may be timed on the number are pushing for action at the state and federal levels
of seconds he or she takes per caller to make an air- in the United States. The proposed laws would regu-
line reservation, the time between calls, and the num- late computer monitoring and protect the worker’s
ber and length of breaks taken. In addition, the reser- right to know and right to privacy. In the meantime,
vation agent’s conversation with the customer may lawsuits by monitored workers against employers are
be monitored. increasing. So computer monitoring of workers is
Computer monitoring has been criticized as an one ethical issue that will not go away.
invasion of the privacy of employees because, in
Source: Adapted from James O’Brien, Introduction to Information
many cases, they do not know that they are being Systems, 9th Edition, McGraw-Hill/Irwin, 2000. Copyright © 2000 by
monitored or how the monitored information is being The McGraw-Hill Companies, Inc. Reprinted with permission.
used. Critics also say that an employee’s right of due
Questions
process may be harmed by the improper use of col-
lected data to make personnel decisions. Since com- 1. Discuss when computer monitoring may be ethi-
puter monitoring increases the stress on employees cal and when it may not.
who must work under constant electronic surveil- 2. Should computer monitoring be regulated by laws?
Copyright 2010 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.