MIS Test 3
What are ethics and why are they important to a company?
As it becomes easier for people to copy everything from words and data to music and video, the ethical issues surrounding copyright infringement and the violation of IP rights are consuming the ebusiness world. Technology poses new challenges for our ethics Ethics- principles and standards that guide our behavior toward people
What technologies can a company use to safeguard information?
Authentication and authorization technologies such as biometrics and passwords can protect access. Prevention and resistance technologies such as antivirus software and encryption can protect data in transit. Detection and response technologies such as intrusion detection software can handle an attack if the infiltrator breeches the first two lines of defense
Example of authentication and authorization
Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user. Authorization is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space
How can CPR take advantage of other technological advances to improve security?
CPR can use RDIF to perform automatic inventory counts to determine if any inventory is missing
How are the functions of autonomic computing providing CPR with a competitive advantage?
CPR collaborated with IBM to deliver solutions that are both automated (they can control a definied process w/o human intervention and autonomic (they can sense and respond to conditions in accordance w/ business policies). As a result, IT employees can deliver consistent, reliable service levels at reduced costs since they collaborated with IBM using autonomic computing resources such as Tivoli Risk Manager, access manager, and identity manager
Identify the six epolicies organizations should implement to protect themselves
Ethical computer use policy, information privacy policy, acceptable use policy (AUP), email privacy policy, social media policy, employee monitoring policy
Describe the relationship between hackers and viruses
Hackers are experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by challenge. A virus is software written with malicious intent to cause annoyance or damage. Some hackers create and leave viruses causing massive computer damage.
Explain the ethical issues in the use of informational technology
Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies). Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes between competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or "correct" decision. For this reason, acting ethically and legally are not always the same.
What is the relationship between information management, governance, and compliance?
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively. Information governance is a method or system of government for information management or control. Information compliance is the act of conforming, acquiescing, or yielding information. All are required to ensure a corporation treats information correctly.
Describe the relationship between information security policies and an information security plan
Information security policies identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days. An information security plan details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan
How can a company participating in ebusiness keep its information secure?
Information security takes people and technology. Informing the people about security policies and security issues will help to ensure the information is safe. The company must also implement all of the security technologies from authentication to authorization and prevention and resistance
Examples of detection and response
Intrusion detection software (IDS) features full time monitoring tools that search for patterns in network traffic to identify intruders
Why are epolicies important to a company?
Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for informations. These policies set employee expectations about the organization's practices and standards and protect the organization from missue of computer systems and IT resources. If an organization's employees use computers at work, the organization should, at a minimum, implement epolicies. Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment
What is the correlation between privacy and confidentiality?
Privacy is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Privacy is related to confidentiality, which is the assurance that messages and information remain available only to those authorized to view them. Each time employees make a decision about a privacy issue, the outcome could sink the company
Trend analysis
a trend is examined to identify its nature, causes, speed of development, and potential impacts
Digital paper (electronic paper)
any paper that is optimized for any type of digital printing. Comes from pulp, flexible, information on the sheet can be altered thousands of times and not degrade over time replace displays. environment friendly
Primary information security areas
authentication and authorization, prevention and resistance, detection and response
Computer simulation
complex systems ie. US economy can be modeled by means of math equations and different scenarios can be run against the model to conduct what if analysis
Information privacy policy
contains general principles regarding information privacy
Ethical computer use policy
contains general principles to guide computer use behavior. For example, it might explicitly state that users should refrain from playing computer games during working hours (epolicy)
Example of prevention and resistance
content filtering occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security breach, a thief is unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings
Email privacy policy
details the extent to which email messages may be read by others
Tech shaping our future
digital ink, digital paper, teleliving, alternative energy sourcing, autonomic computing
What are the two fundamental building blocks that protect organizational information?
ethics and security
Reasons to watch trends
generate ideas and identify opportunities, identify early warning signs, gain confidence, beat competition, understand trend, balance strategic goals, understand the future of specific industries, prepare for the future
Potential business impact in population increase
global agriculture will be required to supply a lot of food, developed nations will find retirees will have to remain on the job to be competitive and continue economic growth, developed nations will increase immigration limits
Potential business impact of living longer in developed nations
global demand for elderly products and services increase, cost of health care increasing, pharmaceutical companies will be pushed for advances in geriatric medicine
Historical analysis
historical events are studied to anticipate the outcome of current developments
Social media policy
outlines the corporate guidelines or principles governing employee online communications
Acceptable use policy
policy that a user must agree to follow in order to be provided access to corporate email, information systems, and to the Internet
Autonomic computing
self managing computing model named after and patterned on the human body's autonomic nervous system building block of widespread computing, a computing model in which small, even invisible, computers will be all around us, communicating through interconnected networks computers will be able to self heal and self protect, will seek out ways to optimize computing, will require more computer automation
Employee monitoring policy
states explicitly how, when, and where the company monitors its employees
Digital ink (or electronic ink)
tech that digitally represents handwriting in its natural form. broad usage in many applications, point of sale signs, displays in mobile devices, electronic books radio paper: dynamic high res electronic display that combines a paperlike reading experience with the ability to access info anytime, anywhere. It is flexible and could be used to create an electronic book/newspaper with real pages
Potential business impact of pace of tech innovations increasing
time to get products and services to market is shortened by tech. products must capture their market quickly before competition copies them. Industries will face tighter competition based on new tech
Trend monitoring
trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers
Teleliving
using information devices and the Internet to conduct all aspects of life seamlessly, such as shopping, working, learning, playing, praying. interact with life size images, data, and text in their homes Virtual assistant: small program stored on PC tat monitors emails, messages, can help solve problems, writing letters, retrieving files, making phone calls Robotic salespeople will take on human appearances and have the ability to perform all tasks
Trend projection
when numerical data are available, a trend can be plotted to display changes through time and into the future
Alternative energy sources
wind, geothermal, hydroelectric, solar will increase by the end of the decade cost is dropping, deregulation of energy industry, decreasing reliance of oil will help reduce air and water pollution
Trends shaping our future
world population will double in the next 40 years, people in developed countries are living longer, growth in information industries is creating a knowledge-dependent global society, global economy is becoming more integrated, economy + society are dominated by tech, pace of tech innovation is increasing, time becoming most precious commodity
Which of the trends shaping our future will have the greatest impact on CPR's business
~ you make your own answer... also idk what CPR is? beyond like saving people who are drowning i'm thinking increased in population or developed nations' people are living longer
Which of the trends will have lest impact on CPR's business
~ yyour own answer maybe time being a precious commodity, you can just hire more people?
What other forms of advanced technology would you expect Progressive to deploy in the near future?
~~~ your choice, need justification for how Progressive will use the tech to make its business more efficient and effective
Which of the trends shaping our future will have the greatest/least impact on Progressive's business?
~~~~ again, your own response