Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
32 Cards in this Set
- Front
- Back
Ethics
|
Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior
|
|
Information systems and ethics
|
1. Intense social change
2. threatening existing distributions of power, money, rights, and obligations •New kinds of crime |
|
Candidate ethical principles
Golden Rule Kant's Descartes |
GR: Do onto others
K: Categorical Imperative: If action not right categoricaly for all...not right for one. D: Rule of (REPEATIDLY) Change. If can't be taken REPEATIDLY not right at all |
|
Copyrights
|
Statutory grant
(Protects IP) From being copied for life of author plus 70 |
|
Intellectual Property (other terms)
Trade Secret Patents |
Trade Secret: Intellectual work or product belonging to business, not in the public domain
Patents: Grants creator of invention for 20 yrs |
|
Malicious Software
|
1 Viruses
2 Worms 3 Trogan horses 4 Spyware 5 Key Loggers |
|
1. Viruses
2. Worms 3. Trojan Horse 4. Spyware |
1 V: Rogue Software attaches itself to other programs or data files to be executed
2. W: Independent programs that copy themseleves from 1 computer to other computers over network 3 T Horses: Program that appears to be benign but then does something BAD 4. spyware: Small program installs surreptitously, monitors web activity and serves up advertising 5. Key: Records every keysroke...for passwords etc |
|
Computer crime
|
Any violations of criminal law that involve a KNOWLEDGE OF COMPUTER TECHNOLOGY for Perpetration
Investigation, or prosection Computer as target: data, access computer as instrument of crime. theft of trade secret, email for threat, harassment |
|
Identify Theft
Phishing Evil Twins Pharming |
Identify Theft: Personal info to impersonate
Phising: fake web site or emails look like leg business. Evil Twins: Wireless networks pretends to offer wifi to internet Pharming: Redirects to bogus webpage, even when correct URL typed in |
|
Hackers:
System Intrusions |
1 Theft of goods and information
2 System damage 3 Cybervandalism |
|
Hackers
Spoofing Sniffer Denial of services |
1. Spoofing: misrepresenting self. Fake email or masquerading
2. Sniffer: Eavesdropping programs 3. DOService: flooding server 4. DDOS: Distributed denial of service via bots, numerious computers |
|
Internal threats: Employees
|
1. Inside knowledge
2. Sloppy security procedures or user lack knowledge 3. Social Engineering: Tricking employees to reveal passwords by pretening legit |
|
General Controls...
Govern What? |
1. Design, security, and use of computer programs and data in IT
2. Combo of hardware software and manual procedures to create overall control enviornment |
|
Types of General Control
|
1 Software Control
2 Hardware C 3 Computer Operations C 4 Data security C 5. Implementation C 6 Admin Controls |
|
Risk assessment
Determines level of risk to firm if specific "activity" or "process" is not properly controlled. |
1. Types of threat
2. Probability of occurence during year 3. Potential losses, value of threat 4. Expected annual loss |
|
Security Policy (Identifies)
|
1. Ranks Information Risks
2. Acceptable security goals 3. Mechanisms for achieving goals. |
|
Security Policy drives other policies
|
AUP: Acceptable use Policy
Authorization Policy: Determining levels of user access |
|
1 Disaster recovery planning
2. Business continuity planning |
1 Plans for restoring service
2. Restoring operations after disaster Both plans identify critical systems and processes. Determine: max time system can be down and which systems restored 1st. |
|
Access Control
|
Policy/Procedures prevent IMPROPER access to systems by UNATHORIZED insiders and outsiders.
Authorization: Who? Authentication: Tokens, smart cars, biometric, psswrds |
|
Public key encryption
|
Sender encrypts with public key...its sent...recipient uses private key to decrypt
|
|
Enterprise Software
|
Enterprise level software is software which provides business logic support (predefined business processes) functionality for entire company
|
|
Value of Enterprise Systems
|
1 Increase Efficiency
2 Firmwide info for decision making 3 Rapid Responses to customer requests 4. Analytical tools to eval overall org performance |
|
The Supply Chain
|
Procure Raw Materials
Transform them into products Distribute products Upstream: Suppliers suppliers Downstream: org's processes responsible for delivering products |
|
(Supply Chain IT: inefficeines waste operating expenese)
JIT Safety Stock Bullwhip Effect |
JIT Components arrive and ship just in time
Saftety stock: Buffer Bullwhip effect: Info about demand distorted as it passes from entities in supply chain |
|
Push (stock) and
Pull (order) supply chains |
Push: (Build to Stock) Schedules based on best guesses
Pull: (Demand driven) Customer orders trigger events in supply chain |
|
Customer Relationship Management
|
1 Capture data
2 Consoldiate and analyze 3 Distribute customer info to various systems and accross enterprise 4 Provide single enterprise view of customer (Sales, marketing, Service) |
|
Business Value of CRM
|
1 Increased Customer Satisfaction
2 Reduce direct marketing costs 3 More effective marketing, lower costs for acquistion 4 Increasd sales revenue 5. Reduced Churn |
|
Why E-commerce is different
8 unique features |
1. Ubiquity: Web everywhere
2. Global reach: 3. Universal standards: 1 standards 4. Richenss: Video, audio |
|
Ecommerce different
8 unique features |
5.Interactivity: interaction with the user
6.Information density •itotal amount and quality of information available to all market participants 7.Personalization/Customization:permits modification of messages, goods 8.Social technology •User content generation and social networking |
|
Key Concepts of Ecommerce:1
Digital Markets Reduce |
Reduces:
1.Information asymmetry 2. Search costs 3. Transaction costs 4. Menu Costs |
|
Key Concepts of Ecommerce:2
Digital Markets enable |
Enable
1. Pricing: Dynamic, discrimination: sold diff prices 2. Dinintermediation |
|
Types of E-commerce
|
Pure Play modesl
clicks and mortar models |