Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Chief Information Officer (CIO) |
oversees all uses of information technology and ensures the strategic alignment of IT with business goals and objectives (effectiveness) |
|
Chief Technology Officer (CTO) |
ensuring the throughput, speed, accuracy, availability, and reliability of an organizations information technology (efficiency) |
|
Chief Security Officer (CSO) |
ensuring the security of IT systems and developing strategies and IT safeguards against attacks for hackers and viruses |
|
Chief Privacy Officer (CPO) |
responsible for the ethical and legal use of information within the organization |
|
Chief knowledge officer (CKO) |
responsible for collecting, maintaining, and distributing the organization's knowledge. Also, responsible for designing programs and systems that make it easy for people to reuse knowledge |
|
Ethics |
the principles and standards that guide our behavior toward other people |
|
Privacy |
the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent |
|
biggest ethical issue facing organizations today |
Privacy |
|
The main ingredient in _________ is privacy |
trust |
|
Intellectual Property |
intangible creative work that is embodied in physical form |
|
Copyright |
the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents |
|
Fair use doctrine |
in certain situations, it is legal to use copyrighted material |
|
Pirated Software |
the unauthorized use, duplication, distribution, or sale of copyrighted software |
|
Counterfeit Software |
Software that is manufactured to look like the real thing and sold as such. |
|
intellectual capital |
includes patents, transactional and analytical information |
|
Information Security |
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside and outside an organization |
|
Security mistakes |
leaving sticky notes next to computers, leaving doors wide open, not logging off |