• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back
Ethics
Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior
Information systems and ethics
1. Intense social change
2. threatening existing distributions of power, money, rights, and obligations
•New kinds of crime
Candidate ethical principles
Golden Rule
Kant's
Descartes
GR: Do onto others
K: Categorical Imperative: If action not right categoricaly for all...not right for one.
D: Rule of (REPEATIDLY) Change. If can't be taken REPEATIDLY not right at all
Copyrights
Statutory grant
(Protects IP)
From being copied for life of author plus 70
Intellectual Property (other terms)
Trade Secret
Patents
Trade Secret: Intellectual work or product belonging to business, not in the public domain
Patents: Grants creator of invention for 20 yrs
Malicious Software
1 Viruses
2 Worms
3 Trogan horses
4 Spyware
5 Key Loggers
1. Viruses
2. Worms
3. Trojan Horse
4. Spyware
1 V: Rogue Software attaches itself to other programs or data files to be executed
2. W: Independent programs that copy themseleves from 1 computer to other computers over network
3 T Horses: Program that appears to be benign but then does something BAD
4. spyware: Small program installs surreptitously, monitors web activity and serves up advertising
5. Key: Records every keysroke...for passwords etc
Computer crime
Any violations of criminal law that involve a KNOWLEDGE OF COMPUTER TECHNOLOGY for Perpetration
Investigation, or prosection
Computer as target: data, access
computer as instrument of crime. theft of trade secret, email for threat, harassment
Identify Theft
Phishing
Evil Twins
Pharming
Identify Theft: Personal info to impersonate
Phising: fake web site or emails look like leg business.
Evil Twins: Wireless networks pretends to offer wifi to internet
Pharming: Redirects to bogus webpage, even when correct URL typed in
Hackers:
System Intrusions
1 Theft of goods and information
2 System damage
3 Cybervandalism
Hackers
Spoofing
Sniffer
Denial of services
1. Spoofing: misrepresenting self. Fake email or masquerading
2. Sniffer: Eavesdropping programs
3. DOService: flooding server
4. DDOS: Distributed denial of service via bots, numerious computers
Internal threats: Employees
1. Inside knowledge
2. Sloppy security procedures or user lack knowledge
3. Social Engineering: Tricking employees to reveal passwords by pretening legit
General Controls...

Govern What?
1. Design, security, and use of computer programs and data in IT
2. Combo of hardware software and manual procedures to create overall control enviornment
Types of General Control
1 Software Control
2 Hardware C
3 Computer Operations C
4 Data security C
5. Implementation C
6 Admin Controls
Risk assessment
Determines level of risk to firm if specific "activity" or "process" is not properly controlled.
1. Types of threat
2. Probability of occurence during year
3. Potential losses, value of threat
4. Expected annual loss
Security Policy (Identifies)
1. Ranks Information Risks
2. Acceptable security goals
3. Mechanisms for achieving goals.
Security Policy drives other policies
AUP: Acceptable use Policy
Authorization Policy: Determining levels of user access
1 Disaster recovery planning
2. Business continuity planning
1 Plans for restoring service
2. Restoring operations after disaster
Both plans identify critical systems and processes.
Determine: max time system can be down and which systems restored 1st.
Access Control
Policy/Procedures prevent IMPROPER access to systems by UNATHORIZED insiders and outsiders.
Authorization: Who?
Authentication: Tokens, smart cars, biometric, psswrds
Public key encryption
Sender encrypts with public key...its sent...recipient uses private key to decrypt
Enterprise Software
Enterprise level software is software which provides business logic support (predefined business processes) functionality for entire company
Value of Enterprise Systems
1 Increase Efficiency
2 Firmwide info for decision making
3 Rapid Responses to customer requests
4. Analytical tools to eval overall org performance
The Supply Chain
Procure Raw Materials
Transform them into products
Distribute products
Upstream: Suppliers suppliers
Downstream: org's processes responsible for delivering products
(Supply Chain IT: inefficeines waste operating expenese)
JIT
Safety Stock
Bullwhip Effect
JIT Components arrive and ship just in time
Saftety stock: Buffer
Bullwhip effect: Info about demand distorted as it passes from entities in supply chain
Push (stock) and
Pull (order) supply chains
Push: (Build to Stock) Schedules based on best guesses
Pull: (Demand driven) Customer orders trigger events in supply chain
Customer Relationship Management
1 Capture data
2 Consoldiate and analyze
3 Distribute customer info to various systems and accross enterprise
4 Provide single enterprise view of customer

(Sales, marketing, Service)
Business Value of CRM
1 Increased Customer Satisfaction
2 Reduce direct marketing costs
3 More effective marketing, lower costs for acquistion
4 Increasd sales revenue
5. Reduced Churn
Why E-commerce is different
8 unique features
1. Ubiquity: Web everywhere
2. Global reach:
3. Universal standards: 1 standards
4. Richenss: Video, audio
Ecommerce different
8 unique features
5.Interactivity: interaction with the user
6.Information density
•itotal amount and quality of information available to all market participants
7.Personalization/Customization:permits modification of messages, goods
8.Social technology
•User content generation and social networking
Key Concepts of Ecommerce:1
Digital Markets Reduce
Reduces:
1.Information asymmetry
2. Search costs
3. Transaction costs
4. Menu Costs
Key Concepts of Ecommerce:2
Digital Markets enable
Enable
1. Pricing: Dynamic, discrimination: sold diff prices
2. Dinintermediation
Types of E-commerce
Pure Play modesl
clicks and mortar models