Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
73 Cards in this Set
- Front
- Back
Ethics |
The principles and standards that guide our behavior toward other people |
|
Information Ethics |
Govern the ethical and moral issues that arise from IT, as well as creation, collection, distribution, and processing of information itself |
|
Intellectual Property |
Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents |
|
Copyright |
The legal protection afforded an expression of an idea, such as a song, book, or video game |
|
Pirated Software |
Unauthorized use, duplication, distribution, or sale of copyrighted software |
|
Counterfeit Software |
Software that is manufactured to look like the real thing and sold as such |
|
Digital Rights Mangement |
A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution |
|
Privacy |
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without consent |
|
Confidentiality |
The assurance that messages and information remain available only to those authorized to see it |
|
Information Ethics - Individuals form the only ethical component of MIS |
-copy, use, distribute data -search for sensitive information -create and spread viruses -hack into systems, steal information -employees destroy and steal information |
|
Ethics In Workplace |
-workplace monitoring is a concern for many employees -organizations can be held financially responsible for employees -dilemma= workplace puts itself at risk if it fails to monitor employees, however some people feel it is unethical |
|
Management Policies |
Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement` |
|
Ethical Computer Use Policy |
1) Cyberbullying- threats or defamatory comments over the internet 2) Threat- an act or object that poses a danger to assets 3) Click-fraud- the abuse of pay-per-click, pay-per-call, and pay-per-convo revenue models to increase costs for advertiser 4)Competitive click-fraud- a competitor or disgruntled employee increases a company's search advertising costs by clicking advertiser's link |
|
Information Privacy Policy |
Contains general principles regarding information privacy |
|
Acceptable Use Policy |
1) Requires a user to agree to follow it to be provided access 2) Nonrepudiation- clause stating cannot deny actions 3) Internet use policy- general principles to guide proper use on internet 4) Cybervandalism- electronic defacing of an existing website 5)Typosquatting- registers purposely misspelled variations of well-known domain names 6) Website name stealing- theft of a website's name that occurs when someone changes ownership to someone else 7) Internet censorship- government attempts to control internet traffic
|
|
Email Privacy Policy |
-The extent to which emails may be read by others 1) Mail bomb- sends massive amount of email to make it stop functioning 2) Spam- unsolicited email 3) Anti-spam policy- states email users will not send spam 4) opt out- get out of receiving incoming emails 5) Teergrubing- antispamming approach where receiver launches a return attack against spammer |
|
Social Media Policy |
Outlines corporate guidelines governing online employee communications |
|
Workplace Monitoring Policy |
1) Physical security- tangible protection 2) Workplace MIS monitoring- tracks people's activities 3) Employee monitoring policy- stating explicitly how, when, and where the company monitors its employees |
|
Information Security |
The protection of information from accidental or intentional misuse by people inside or outside the organization |
|
Downtime |
A period of time when the system is unavailable
How much will downtime cost your business? Financial performance, revenue, reputation, other expenses |
|
First Line of Defense - People |
1) Insiders- legitimate users who purposely or accidentally misuse their access to the environment and cause a business-affecting incident 2) Social Engineering- hackers use their social skills to trick people into revealing access credentials or other valuable information 3) Dumpster Diving- looking through people's trash to obtain information |
|
First Line of Defense - People (cont.) |
1) Information security policies- identify the rules required to maintain information security 2) Information security plan- details how an organization will implement the information security policies |
|
Second Line of Defense -Technology (People-Authentication and Authorization) |
Authentication- confirming an identity Authorization- giving someone permission
The most secure type of authentication involves- something the user knows or has, or something that is part of the user |
|
Second Line of Defense - Technology (Data- Prevention and Resistance) |
1) Content Filtering- when organizations use software that filters content to prevent transmission of unauthorized information 2) Encryption- scrambles information into alternative form that requires a key 3) Firewalls- hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings |
|
Second Line of Defense - Technology (Attack- Detection and response) |
If all else fails, an organization can use detect and response technologies to mitigate the damage
Intrusion Detection Software- full time monitoring tools that search for patterns in network traffic to ID intruders |
|
MIS Infrastructure |
The plans for how a firm will build, deploy, use and share its data, processes and MIS assets
1)Hardware- physical devices of computer 2)Software- set of instructions the hardware executes to carry out specific tasks 3)Network- a communications system created by linking two or more devices 4)Client- a computer designed to request information from a server 5)Server- a computer that provides information |
|
Supporting Operations |
Backup and recovery plan - an exact copy of a system's information is a backup / restoring is getting it back up and running (fault tolerance, failover, failback)
Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster
Business continuity plan - a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption (emergency and emergency preparedness) |
|
Supporting Change |
1) Accessibility - the varying levels that define what a user can access when operating a system 2) Availability- the time frames when the system is operational 3) Maintainability- how quickly a system can transform to support environmental changes 4) Portability- the ability to operate on different devices or software platforms 5) Reliability - ensures a system is providing accurate information 6) Scalability - describes how well a system can adapt to increased demands 7) Usability- describes how easy to learn and efficient a system is |
|
MIS and the Environment |
Moore's Law- the computer chip performance per dollar doubles every 18 months Sustainable MIS- describes the production, management, use, and disposal of technology in a "green" way Corporate Social Responsibility- companies acknowledged responsibility to society |
|
Increased Electronic Waste, Increased Energy Consumption, Increased Carbon Emissions |
Ewaste- discarded or broken electronic devices Energy consumption- the amount of energy used by business processes and systems Carbon Emissions- carbon dioxide and carbon monoxide produced by business processes and systems
|
|
Supporting the Environment |
Grid Computing- a collection of computers coordinated to solve a common problem Cloud Computing- a model for enabling access to a shared pool of computing resources that can be done anywhere with internet access Virtualized Computing- multiple virtual machines on one single computing device |
|
Benefits of High Quality Information |
-Information is everywhere -Employees must be able to obtain and analyze organizational information to make the right decisions -Successfully collecting, compiling, sorting, and analyzing information can provide tremendous insight into how an organization is performing |
|
Costs of Low Quality Information |
-Inability to accurately track customers -Difficulty identifying valuable customers -Inability to identify selling opportunities -Marketing to nonexistent customers -Difficulty tracking revenue -Inability to build strong customer relationships |
|
Characteristics of High Quality Information |
-Accurate -Complete -Consistent -Unique -Timely |
|
Database |
Maintains information about various types of objects, events, people, and places |
|
Database Advantages |
-Increased Flexibility -Increased Scalability and Performance -Reduced Information Redundance -Increased Information Integrity -Increased Information Security |
|
Increased Flexibility |
-Should handle changes quick and easy -Provide users with different views (1) Physical View- deals with the physical storage of information on a storage device (Multiple) Logical Views- focuses on how individual users logically access information to meet their own particular business needs |
|
Increased Scalability and Performance |
-Database must scale to meet increased demand, while maintaining acceptable performance levels 1) Scalability- how well a system responds to increased demands 2) Performance- measures how quickly a system performs a certain process or transaction
|
|
Reduced Data Redundancy |
-Databases reduce data redundancy - The same file in multiple places, creates inconsistancy |
|
Increased Information Integrity |
1) Information Integrity- measures the quality of information 2) Integrity Constraint- rules that help ensure the quality of information -relational integrity constraint: rules that enforce basic and fundamental information based constraints -business-critical integrity constraint: enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints
|
|
Increased Information Security |
Databases offer several security features: 1)Password- provides authentication for the user 2)Access-level- determines who has access to different types of information 3)Access Control- determines types of user access, such as read-only access |
|
Data-Driven Website |
An interactive website kept constantly updated and relevant to the needs of its customers using a database |
|
Data Driven Website Advantages |
-Easy to manage content -Easy to store large amounts of data -Easy to eliminate human errors |
|
Database Management Systems |
Software through which users and application programs interact with a database |
|
Data Warehouse |
-Primary purpose is to aggregate information throughout an organization into a single repository for decision-making purposes
A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks
|
|
Benefits of Data Warehousing |
-Extend transformation of data into information -In 1990's, business executives became less concerned with day-to-day business operations and more concerned with overall business functions -The data warehouse provided the ability to support decision making without disrupting the day-to-day operations |
|
Extraction, Transformation, and Loading (ETL) |
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse |
|
Data Mart |
A subset of data warehouse information |
|
Multidimensional Analysis |
-Databases contain information in a series of two-dimensional tables -In a data warehouse and data mart, information is multidimensional, it contains layers of columns and rows 1) Dimension- a particular attribute of information 2) Cube- common term for the representation of multidimensional information |
|
Information Cleansing or Scrubbing |
An organization must maintain high quality data
Cleansing or Scrubbing- a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information |
|
Data Mining |
Process of analyzing data to extract information not offered by the raw data alone |
|
Data Mining Tools |
Use a variety of techniques to find patterns and relationships in large volumes of information
1)Classification-assigns records to to one of the predefined set of classes 2)Estimation- determines values for an unknown continuous variable behavior or estimated future value 3)Affinity Grouping- determines which things go together 4)Clustering- segments a heterogeneous population of records into a number of more homogeneous subgroups |
|
The Problem - Data Rich |
Data rich, information poor (Data Explosion) |
|
The Solution - Business Intelligence |
-Improving business decisions has direct impact on costs and revenue -reliable, consistent, understandable |
|
Business Analytics v. Business Intelligence |
Analytics covers all transaction data, new term that incorporates prediction |
|
Visual Business Intelligence (Analytics) |
1)Informing- accessing large amounts of data from different management information systems 2)Infographics- displays information graphically 3)Data Visualization- allows users to "see" or visualize data to transform information into a business perspective 4)Data Visualization Tools- sophisticated analysis techniques such as pie charts, controls, instruments, maps, etc. |
|
Network Basics |
Telecommunication System- enable the transmission of data over public or private networks
Network- a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate |
|
Comparing Telecommunication Technologies |
Faster? Harder to deal with? Most secure? Total value v. cost? |
|
Network Categories |
Local Area Network (LAN)- connects computers in close proximity Wide Area Network (WAN)- spans a large geographic area Metropolitan Area Network (MAN)- spans a city |
|
Network Access Technologies |
Bandwidth- maximum amount of data that can pass from one point to another in a unit of time
Bit- smallest element of data (0 or 1) Bit Rate- the of bit transferred or received per unit of time Modem- a device that enables a computer to transmit and receive data |
|
Benefits of a Connected World |
Networks offer many advantages for a business: -sharing resources -providing opportunities -reducing travel |
|
Sharing Resources |
Primary Resources for sharing include: -Intranet: restricted network that relies on internet technologies to provide an internet-like environment within a company for information sharing -Extranet: extension of an intranet that is available to only authorized outsiders, such as customers, partners, and suppliers -Virtual Private Network: the "private tunnels" secure network |
|
Challenges of a Connected World |
-Create a globally connected world, eliminating time and distance -make it possible to communicate in ways not previously imaginable -create challenges in security, social, political, and ethical issues |
|
Wireless Network Categories |
Personal Area Networks (PANs) Wireless Local Area Networks (WLANs) Wireless Metropolitan Area Networks (WMANs) Wireless Wide Area Networks (WWANs)
|
|
Personal Area Networks |
Provide communications over a short distance that is intended for use with devices that are owned and operated by a single user
ex: Bluetooth (wireless PAN technology) |
|
Wireless LAN |
WLAN- a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
ex. WIFI wireless fidelity |
|
Wireless MAN |
WMAN- a metropolitan area network that uses radio signals to transmit and receive data |
|
Worldwide Interoperability for Microwave Access |
(WiMax)- a communications technology aimed at providing high-speed wireless data over metropolitan area networks |
|
Wireless WAN |
WWAN- a wide area network that uses radio signals to transmit and receive data |
|
Business Applications of Wireless Networks |
Radio Frequency ID (RFID) GPS Geographic Information System GIS |
|
Radio Frequency ID |
RFID- uses electronic tags and labels to wirelessly identify objects over short distances |
|
Benefits of Business Mobility |
-enhance mobility -immediate data access -increase monitoring capabilities -improve workflow -mobile business opportunities -alternative to wiring |
|
Challenges of Business Mobility |
-protecting against theft -protecting wireless connections -preventing viruses on a mobile device -addressing privacy concerns with RFID and LBS |