• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back



refers to the principles of right and wrong that individuals use to make choices that guide their behavior

Ethics

is a collection of principles intended to guide decisions to guide decision making by members of the organization

Code of Ethics

What is _____ is not necessarily ____

unethical; illegal

Responsibility


Accountability


Liability

Fundamental Tenets of Ethics

a tenet ethics in which you accept the consequences of your decisions and actions

Responsibility

a tenets of ethics that refers to determining who is responsible for actions that were taken

Accountability

a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems

Liability

1. Privacy


2. Accuracy


3. Property


4. Accessibility

The 4 categories ethical issues fall under

the legal right to left alone and to be free of unreasonable personal intrusion

Privacy

involve collecting, storing,. and disseminating information about individuals

Privacy issues

involve the authenticity, fidelity, and correctness of information that is collected and processed

Accuracy issues

involve the ownership and value of information

Property issues

revolve around who should have access to information and whether a fee should be paid for the access

Accessibility issues

the right to determine when, and to what extent, personal information can be gathered by and/or communicated to others

Information privacy

an electronic description of an individual and his or her habits

Digital Dossier

tracking people's activities with the aid of computers

Electronic Surveillance

Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.

Customer Intimacy

a model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it

Opt-In Model


a model of informed consent that permits a company to collect personal info until the customer specifically requests that the data not be collected

Opt-Out Model

are an organization's guidelines for protecting the privacy of its customers, clients, and employees

Privacy codes/policies

the process of forming digital dossier

Profiling

the ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

rights

refers to all of the processes and policies designed to protect an organization's info and info systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction

Information Security

is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company info such as passwords

Social Engineering

occurs when an unauthorized individual attempts to gain illegal access to organizational information

Espionage or trespass

occurs when an attacker either threatens to steal, or actually steals info from a company

Information Extortion

are deliberate acts that involve defecting an organization's Web site, possibly causing the organization to lose its image and experience a loss of confidence by its customers

Sabotage and vandalism

becoming a larger problem because computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage making it easier and more valuable to steal

Theft of equipment and information

is the deliberate assumption of another person's identity, usually to gain access to his or her financial info or to frame him or her for a crime

Identity theft

is a vital issue for ppl who make their livelihood in knowledge fields

Preventing compromises to intellectual property

occurs when malicious software penetrates an organization's computer system

Software attacks

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.

Virus

is clandestine software that is installed on your computer through duplicitous methods

Alien software

refers to a large-scale, distributed measurement and control systems, SCADA systems are used to monitor or control chemical, physical, and transport processes and attempts to compromise such a system in order to cause damage to the real-world processes that the system controls

Supervisory control and data acquisition

attackers use a target's computer systems, particularly through the internet, to cause physical real-world harm or severe disruption usually to carry out a political agenda

Cyberterrorism and Cyberwarfare

In _____, the organization purchases insurance as a means to compensate for any loss.

Risk Transference

controls that restrict unauthorized individuals from gaining access to a company's computer facilities

Physical Controls

controls that restrict unauthorized individuals from using information resources and are concerned with user identification

Access controls

Access controls involve _____ before _____.

authentication; authorization

controls that deal with the movement of data across networks

Communication controls

a repository of historical data that are organized by subject to support decision makers in the organization

Data warehouse

a low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department

Data-mart

an approach to managing info across an entire organization

Data governance

a method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance

Normalization

collection of definitions of data elements; data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use this data element

Data Dictionary

diverse, high-volume, high-velocity, information assets that require new forms of processing to enable enhanced decision making, insight discovery, and process optimization

Big Data

a person, place, thing, or event about which information is maintained in a record

Entity

each characteristic or quality describing a particular entity

Attribute

the identifier field or attribute that uniquely identifies a record

Primary Keys

an identifier field or attribute that has some identifying information but typically does not identify the file with complete accuracy

Secondary Key

the cumulative store of subjective or experiential learning, which is highly personal and hard to formalize

Tacit knowledge

the more objective, rational, and technical types of knowledge

Explicit knowledge

Bit – byte – field – record – file – database

Members of the Data Hierarchiy in order

represents the smallest unit of data a computer can process

Bit

represents a single character, and can be a symbol, number, or letter

Byte

a grouping of logically related characters into a word, a small group of words, or a complete number

Field

a grouping of logically related records

File

a grouping of logically related fields, describes an entity

Record

a group of logically related files that stores data and the associations among them

Database

_____ occurs when applications cannot access data associated with other applications.

Data isolation

_____ occurs when various copies of the data agree.

Data consistency

When data are normalized, attributes in the table depend only on the _____.

Primary key

What are the three distinct characteristics that distinguish big data from traditional data?

Volume, Velocity, and Variety

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

Freedom of speech; Privacy

the likelihood that a threat will occur

Risk

a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur

Risk Acceptance

the process in which an organization asses value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it

Risk Analysis

a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat

Risk Limitation

a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels

Risk management

a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan

Risk Mitigation