• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/73

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

73 Cards in this Set

  • Front
  • Back

Ethics

The principles and standards that guide our behavior toward other people

Information Ethics

Govern the ethical and moral issues that arise from IT, as well as creation, collection, distribution, and processing of information itself

Intellectual Property

Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

Copyright

The legal protection afforded an expression of an idea, such as a song, book, or video game

Pirated Software

Unauthorized use, duplication, distribution, or sale of copyrighted software

Counterfeit Software

Software that is manufactured to look like the real thing and sold as such

Digital Rights Mangement

A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

Privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without consent

Confidentiality

The assurance that messages and information remain available only to those authorized to see it

Information Ethics - Individuals form the only ethical component of MIS

-copy, use, distribute data


-search for sensitive information


-create and spread viruses


-hack into systems, steal information


-employees destroy and steal information

Ethics In Workplace

-workplace monitoring is a concern for many employees


-organizations can be held financially responsible for employees


-dilemma= workplace puts itself at risk if it fails to monitor employees, however some people feel it is unethical

Management Policies

Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement`

Ethical Computer Use Policy

1) Cyberbullying- threats or defamatory comments over the internet


2) Threat- an act or object that poses a danger to assets


3) Click-fraud- the abuse of pay-per-click, pay-per-call, and pay-per-convo revenue models to increase costs for advertiser


4)Competitive click-fraud- a competitor or disgruntled employee increases a company's search advertising costs by clicking advertiser's link

Information Privacy Policy

Contains general principles regarding information privacy

Acceptable Use Policy

1) Requires a user to agree to follow it to be provided access


2) Nonrepudiation- clause stating cannot deny actions


3) Internet use policy- general principles to guide proper use on internet


4) Cybervandalism- electronic defacing of an existing website


5)Typosquatting- registers purposely misspelled variations of well-known domain names


6) Website name stealing- theft of a website's name that occurs when someone changes ownership to someone else


7) Internet censorship- government attempts to control internet traffic


Email Privacy Policy

-The extent to which emails may be read by others


1) Mail bomb- sends massive amount of email to make it stop functioning


2) Spam- unsolicited email


3) Anti-spam policy- states email users will not send spam


4) opt out- get out of receiving incoming emails


5) Teergrubing- antispamming approach where receiver launches a return attack against spammer

Social Media Policy

Outlines corporate guidelines governing online employee communications

Workplace Monitoring Policy

1) Physical security- tangible protection


2) Workplace MIS monitoring- tracks people's activities


3) Employee monitoring policy- stating explicitly how, when, and where the company monitors its employees

Information Security

The protection of information from accidental or intentional misuse by people inside or outside the organization

Downtime

A period of time when the system is unavailable



How much will downtime cost your business?


Financial performance, revenue, reputation, other expenses

First Line of Defense - People

1) Insiders- legitimate users who purposely or accidentally misuse their access to the environment and cause a business-affecting incident


2) Social Engineering- hackers use their social skills to trick people into revealing access credentials or other valuable information


3) Dumpster Diving- looking through people's trash to obtain information

First Line of Defense - People (cont.)

1) Information security policies- identify the rules required to maintain information security


2) Information security plan- details how an organization will implement the information security policies

Second Line of Defense -Technology


(People-Authentication and Authorization)

Authentication- confirming an identity


Authorization- giving someone permission



The most secure type of authentication involves- something the user knows or has, or something that is part of the user

Second Line of Defense - Technology


(Data- Prevention and Resistance)

1) Content Filtering- when organizations use software that filters content to prevent transmission of unauthorized information


2) Encryption- scrambles information into alternative form that requires a key


3) Firewalls- hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

Second Line of Defense - Technology


(Attack- Detection and response)

If all else fails, an organization can use detect and response technologies to mitigate the damage



Intrusion Detection Software- full time monitoring tools that search for patterns in network traffic to ID intruders

MIS Infrastructure

The plans for how a firm will build, deploy, use and share its data, processes and MIS assets



1)Hardware- physical devices of computer


2)Software- set of instructions the hardware executes to carry out specific tasks


3)Network- a communications system created by linking two or more devices


4)Client- a computer designed to request information from a server


5)Server- a computer that provides information

Supporting Operations

Backup and recovery plan - an exact copy of a system's information is a backup / restoring is getting it back up and running (fault tolerance, failover, failback)



Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster



Business continuity plan - a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption (emergency and emergency preparedness)

Supporting Change

1) Accessibility - the varying levels that define what a user can access when operating a system


2) Availability- the time frames when the system is operational


3) Maintainability- how quickly a system can transform to support environmental changes


4) Portability- the ability to operate on different devices or software platforms


5) Reliability - ensures a system is providing accurate information


6) Scalability - describes how well a system can adapt to increased demands


7) Usability- describes how easy to learn and efficient a system is

MIS and the Environment

Moore's Law- the computer chip performance per dollar doubles every 18 months


Sustainable MIS- describes the production, management, use, and disposal of technology in a "green" way


Corporate Social Responsibility- companies acknowledged responsibility to society

Increased Electronic Waste, Increased Energy Consumption, Increased Carbon Emissions

Ewaste- discarded or broken electronic devices


Energy consumption- the amount of energy used by business processes and systems


Carbon Emissions- carbon dioxide and carbon monoxide produced by business processes and systems


Supporting the Environment

Grid Computing- a collection of computers coordinated to solve a common problem


Cloud Computing- a model for enabling access to a shared pool of computing resources that can be done anywhere with internet access


Virtualized Computing- multiple virtual machines on one single computing device

Benefits of High Quality Information

-Information is everywhere


-Employees must be able to obtain and analyze organizational information to make the right decisions


-Successfully collecting, compiling, sorting, and analyzing information can provide tremendous insight into how an organization is performing

Costs of Low Quality Information

-Inability to accurately track customers


-Difficulty identifying valuable customers


-Inability to identify selling opportunities


-Marketing to nonexistent customers


-Difficulty tracking revenue


-Inability to build strong customer relationships

Characteristics of High Quality Information

-Accurate


-Complete


-Consistent


-Unique


-Timely

Database

Maintains information about various types of objects, events, people, and places

Database Advantages

-Increased Flexibility


-Increased Scalability and Performance


-Reduced Information Redundance


-Increased Information Integrity


-Increased Information Security

Increased Flexibility

-Should handle changes quick and easy


-Provide users with different views


(1) Physical View- deals with the physical storage of information on a storage device


(Multiple) Logical Views- focuses on how individual users logically access information to meet their own particular business needs

Increased Scalability and Performance

-Database must scale to meet increased demand, while maintaining acceptable performance levels


1) Scalability- how well a system responds to increased demands


2) Performance- measures how quickly a system performs a certain process or transaction


Reduced Data Redundancy

-Databases reduce data redundancy


- The same file in multiple places, creates inconsistancy

Increased Information Integrity

1) Information Integrity- measures the quality of information


2) Integrity Constraint- rules that help ensure the quality of information


-relational integrity constraint: rules that enforce basic and fundamental information based constraints


-business-critical integrity constraint: enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints


Increased Information Security

Databases offer several security features:


1)Password- provides authentication for the user


2)Access-level- determines who has access to different types of information


3)Access Control- determines types of user access, such as read-only access

Data-Driven Website

An interactive website kept constantly updated and relevant to the needs of its customers using a database

Data Driven Website Advantages

-Easy to manage content


-Easy to store large amounts of data


-Easy to eliminate human errors

Database Management Systems

Software through which users and application programs interact with a database

Data Warehouse

-Primary purpose is to aggregate information throughout an organization into a single repository for decision-making purposes



A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks



Benefits of Data Warehousing

-Extend transformation of data into information


-In 1990's, business executives became less concerned with day-to-day business operations and more concerned with overall business functions


-The data warehouse provided the ability to support decision making without disrupting the day-to-day operations

Extraction, Transformation, and Loading (ETL)

A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

Data Mart

A subset of data warehouse information

Multidimensional Analysis

-Databases contain information in a series of two-dimensional tables


-In a data warehouse and data mart, information is multidimensional, it contains layers of columns and rows


1) Dimension- a particular attribute of information


2) Cube- common term for the representation of multidimensional information

Information Cleansing or Scrubbing

An organization must maintain high quality data



Cleansing or Scrubbing- a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

Data Mining

Process of analyzing data to extract information not offered by the raw data alone

Data Mining Tools

Use a variety of techniques to find patterns and relationships in large volumes of information



1)Classification-assigns records to to one of the predefined set of classes


2)Estimation- determines values for an unknown continuous variable behavior or estimated future value


3)Affinity Grouping- determines which things go together


4)Clustering- segments a heterogeneous population of records into a number of more homogeneous subgroups

The Problem - Data Rich

Data rich, information poor (Data Explosion)

The Solution - Business Intelligence

-Improving business decisions has direct impact on costs and revenue


-reliable, consistent, understandable

Business Analytics v. Business Intelligence

Analytics covers all transaction data, new term that incorporates prediction

Visual Business Intelligence (Analytics)

1)Informing- accessing large amounts of data from different management information systems


2)Infographics- displays information graphically


3)Data Visualization- allows users to "see" or visualize data to transform information into a business perspective


4)Data Visualization Tools- sophisticated analysis techniques such as pie charts, controls, instruments, maps, etc.

Network Basics

Telecommunication System- enable the transmission of data over public or private networks



Network- a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate

Comparing Telecommunication Technologies

Faster? Harder to deal with? Most secure? Total value v. cost?

Network Categories

Local Area Network (LAN)- connects computers in close proximity


Wide Area Network (WAN)- spans a large geographic area


Metropolitan Area Network (MAN)- spans a city

Network Access Technologies

Bandwidth- maximum amount of data that can pass from one point to another in a unit of time



Bit- smallest element of data (0 or 1)


Bit Rate- the of bit transferred or received per unit of time


Modem- a device that enables a computer to transmit and receive data

Benefits of a Connected World

Networks offer many advantages for a business:


-sharing resources


-providing opportunities


-reducing travel

Sharing Resources

Primary Resources for sharing include:


-Intranet: restricted network that relies on internet technologies to provide an internet-like environment within a company for information sharing


-Extranet: extension of an intranet that is available to only authorized outsiders, such as customers, partners, and suppliers


-Virtual Private Network: the "private tunnels" secure network

Challenges of a Connected World

-Create a globally connected world, eliminating time and distance


-make it possible to communicate in ways not previously imaginable


-create challenges in security, social, political, and ethical issues

Wireless Network Categories

Personal Area Networks (PANs)


Wireless Local Area Networks (WLANs)


Wireless Metropolitan Area Networks (WMANs)


Wireless Wide Area Networks (WWANs)


Personal Area Networks

Provide communications over a short distance that is intended for use with devices that are owned and operated by a single user



ex: Bluetooth (wireless PAN technology)

Wireless LAN

WLAN- a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet



ex. WIFI wireless fidelity

Wireless MAN

WMAN- a metropolitan area network that uses radio signals to transmit and receive data

Worldwide Interoperability for Microwave Access

(WiMax)- a communications technology aimed at providing high-speed wireless data over metropolitan area networks

Wireless WAN

WWAN- a wide area network that uses radio signals to transmit and receive data

Business Applications of Wireless Networks

Radio Frequency ID (RFID)


GPS


Geographic Information System GIS

Radio Frequency ID

RFID- uses electronic tags and labels to wirelessly identify objects over short distances

Benefits of Business Mobility

-enhance mobility


-immediate data access


-increase monitoring capabilities


-improve workflow


-mobile business opportunities


-alternative to wiring

Challenges of Business Mobility

-protecting against theft


-protecting wireless connections


-preventing viruses on a mobile device


-addressing privacy concerns with RFID and LBS