Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
70 Cards in this Set
- Front
- Back
refers to the principles of right and wrong that individuals use to make choices that guide their behavior |
Ethics |
|
is a collection of principles intended to guide decisions to guide decision making by members of the organization |
Code of Ethics |
|
What is _____ is not necessarily ____
|
unethical; illegal |
|
Responsibility Accountability Liability |
Fundamental Tenets of Ethics |
|
a tenet ethics in which you accept the consequences of your decisions and actions |
Responsibility |
|
a tenets of ethics that refers to determining who is responsible for actions that were taken |
Accountability |
|
a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems |
Liability |
|
1. Privacy 2. Accuracy 3. Property 4. Accessibility |
The 4 categories ethical issues fall under |
|
the legal right to left alone and to be free of unreasonable personal intrusion |
Privacy |
|
involve collecting, storing,. and disseminating information about individuals |
Privacy issues |
|
involve the authenticity, fidelity, and correctness of information that is collected and processed |
Accuracy issues |
|
involve the ownership and value of information |
Property issues |
|
revolve around who should have access to information and whether a fee should be paid for the access |
Accessibility issues |
|
the right to determine when, and to what extent, personal information can be gathered by and/or communicated to others |
Information privacy |
|
an electronic description of an individual and his or her habits |
Digital Dossier |
|
tracking people's activities with the aid of computers |
Electronic Surveillance |
|
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.
|
Customer Intimacy |
|
a model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it |
Opt-In Model
|
|
a model of informed consent that permits a company to collect personal info until the customer specifically requests that the data not be collected |
Opt-Out Model |
|
are an organization's guidelines for protecting the privacy of its customers, clients, and employees |
Privacy codes/policies |
|
the process of forming digital dossier |
Profiling |
|
the ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.
|
rights |
|
refers to all of the processes and policies designed to protect an organization's info and info systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction |
Information Security |
|
is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company info such as passwords |
Social Engineering |
|
occurs when an unauthorized individual attempts to gain illegal access to organizational information |
Espionage or trespass |
|
occurs when an attacker either threatens to steal, or actually steals info from a company |
Information Extortion |
|
are deliberate acts that involve defecting an organization's Web site, possibly causing the organization to lose its image and experience a loss of confidence by its customers |
Sabotage and vandalism |
|
becoming a larger problem because computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage making it easier and more valuable to steal |
Theft of equipment and information |
|
is the deliberate assumption of another person's identity, usually to gain access to his or her financial info or to frame him or her for a crime |
Identity theft |
|
is a vital issue for ppl who make their livelihood in knowledge fields |
Preventing compromises to intellectual property |
|
occurs when malicious software penetrates an organization's computer system |
Software attacks |
|
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.
|
Virus |
|
is clandestine software that is installed on your computer through duplicitous methods |
Alien software |
|
refers to a large-scale, distributed measurement and control systems, SCADA systems are used to monitor or control chemical, physical, and transport processes and attempts to compromise such a system in order to cause damage to the real-world processes that the system controls |
Supervisory control and data acquisition |
|
attackers use a target's computer systems, particularly through the internet, to cause physical real-world harm or severe disruption usually to carry out a political agenda |
Cyberterrorism and Cyberwarfare |
|
In _____, the organization purchases insurance as a means to compensate for any loss.
|
Risk Transference |
|
controls that restrict unauthorized individuals from gaining access to a company's computer facilities |
Physical Controls |
|
controls that restrict unauthorized individuals from using information resources and are concerned with user identification |
Access controls |
|
Access controls involve _____ before _____.
|
authentication; authorization |
|
controls that deal with the movement of data across networks |
Communication controls |
|
a repository of historical data that are organized by subject to support decision makers in the organization |
Data warehouse |
|
a low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department |
Data-mart |
|
an approach to managing info across an entire organization |
Data governance |
|
a method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance |
Normalization |
|
collection of definitions of data elements; data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use this data element |
Data Dictionary |
|
diverse, high-volume, high-velocity, information assets that require new forms of processing to enable enhanced decision making, insight discovery, and process optimization |
Big Data |
|
a person, place, thing, or event about which information is maintained in a record |
Entity |
|
each characteristic or quality describing a particular entity |
Attribute |
|
the identifier field or attribute that uniquely identifies a record |
Primary Keys |
|
an identifier field or attribute that has some identifying information but typically does not identify the file with complete accuracy |
Secondary Key |
|
the cumulative store of subjective or experiential learning, which is highly personal and hard to formalize |
Tacit knowledge |
|
the more objective, rational, and technical types of knowledge |
Explicit knowledge |
|
Bit – byte – field – record – file – database
|
Members of the Data Hierarchiy in order |
|
represents the smallest unit of data a computer can process |
Bit |
|
represents a single character, and can be a symbol, number, or letter |
Byte |
|
a grouping of logically related characters into a word, a small group of words, or a complete number |
Field |
|
a grouping of logically related records
|
File |
|
a grouping of logically related fields, describes an entity |
Record |
|
a group of logically related files that stores data and the associations among them |
Database |
|
_____ occurs when applications cannot access data associated with other applications.
|
Data isolation |
|
_____ occurs when various copies of the data agree.
|
Data consistency |
|
When data are normalized, attributes in the table depend only on the _____.
|
Primary key |
|
What are the three distinct characteristics that distinguish big data from traditional data?
|
Volume, Velocity, and Variety |
|
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.
|
Freedom of speech; Privacy |
|
the likelihood that a threat will occur |
Risk |
|
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur |
Risk Acceptance |
|
the process in which an organization asses value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it |
Risk Analysis |
|
a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat |
Risk Limitation |
|
a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels |
Risk management |
|
a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan |
Risk Mitigation |