• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back

Chief Information Officer (CIO)

oversees all uses of information technology and ensures the strategic alignment of IT with business goals and objectives (effectiveness)

Chief Technology Officer (CTO)

ensuring the throughput, speed, accuracy, availability, and reliability of an organizations information technology (efficiency)

Chief Security Officer (CSO)

ensuring the security of IT systems and developing strategies and IT safeguards against attacks for hackers and viruses

Chief Privacy Officer (CPO)

responsible for the ethical and legal use of information within the organization

Chief knowledge officer (CKO)

responsible for collecting, maintaining, and distributing the organization's knowledge. Also, responsible for designing programs and systems that make it easy for people to reuse knowledge

Ethics

the principles and standards that guide our behavior toward other people

Privacy

the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent

biggest ethical issue facing organizations today

Privacy

The main ingredient in _________ is privacy

trust

Intellectual Property

intangible creative work that is embodied in physical form

Copyright

the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents

Fair use doctrine

in certain situations, it is legal to use copyrighted material

Pirated Software

the unauthorized use, duplication, distribution, or sale of copyrighted software

Counterfeit Software

Software that is manufactured to look like the real thing and sold as such.

intellectual capital

includes patents, transactional and analytical information

Information Security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside and outside an organization

Security mistakes

leaving sticky notes next to computers, leaving doors wide open, not logging off