MIS Final
a typical email privacy policy
1 defines legitimate email users and explains what happens to accounts after a person leaves the organization 2 explains backup procedures so users will know that at some point, even if a message is deleted from their computer 3 describes legitimate grounds for reading email and the process required before such action is performed 4 discourages sending junk email or spam to anyone who does not want to receive it 5 prohibits attempting to mail bomb a site. A mail bomb sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning 6 Informs users that the organization has no control over email once it it has been transmitted outside the organization
trends shaping our future
1 the worlds population will double in the next 40 years 2 people in developed countries are living longer 3 growth in information industries is creating a knowledge-dependent global society 4 the global economy is becoming more integrated 5 the economy and society are dominated by technology 6 pace of technological innovation is increasing 7time is becoming one of the most precious commodities
List and briefly describe the FIVE technology trends (as you learned during chapter 7 lecture and/or from your text book that will have the greatest impact on future business.
1) Digital Ink -- refers to technology that represents handwriting in its natural form. 2) Digital Paper-- any paper that is optimized for any type of digital printing 3)Televising --user and information devices to conduct all aspects of life seamlessly 4) Alternative Energy Resources -- wind, geothermal, and hydro-electric will account to large amount of energy used 5) Autonomic Computing -- a self-managing computing model
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. WHICH POLICY SHOULD THE COMPANY IMPLEMENT TO HELP ELIMINATE TO HELP ELIMINATE THIS PROBLEM?
AN INTERNET USE POLICY an information privacy policy a workplace monitoring policy an email privacy
Prepare for the future
Any organization that wants to compete in this hyperchanging world needs to make every effort to forecast the future.
Information Privacy Policy
Contains general principles regarding information privacy
what technologies are shaping our future
Digitial ink digital paper Teleliving alternate engery sources autonomic computing
Information security policies detail how an organization will implement the information security plan.
FALSE
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
FALSE
Explaining why understanding trends and new technologies can help an organization prepare for the future
Obtaining a broad view of emerging trends and new technologies as they relate to business can help an organization anticipate and prepare for the future. Organizations that can most effectively grasp the deep currents of technological evolution can use their knowledge to protect themselves against sudden and fatal technological obsolesce.
Biometrics is the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting.
TRUE
Social Media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
TRUE
Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
TRUE
Alternative Energy Sources
Wind geothermal, hydroelectric, solar, and other alternative energy sources will account for 30% for all energy use
Workplace Monitoring Policy
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
Information security
a broad term encompassing the protection of information from accidental or unintensional misuse by persons inside or outside an organization
radio paper
a dynamic high-resolution electronc display that combines a paperlike reading expirience with the ability to access information anytime, anywhere
Authentication
a method for confirming user's identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user
Autonomic Computing
a self-managing computing model named after, and patterned on, the human body's autonomic nervous system
gain confidence
a solid foundation of awareness about trends can provide an organization with the confidence to take risks
Understand a trend
analyzing the details within a trend can help separate truly significant developments from rapidy appearing and disappearing fads
digital paper
any paper that is optimized for any type of digital printing
unethical and illegal
are not always the same thing
Social Media Policy
companies can protect themselves by implementing a social media policy outlining the corporate guidelines or principles governing employee online communications
Computer Simulaton
complex systems can be modelled by means of mathematical equations and different scenarios can be run against the model to determine "what if" analysis
Ethical Computer Use Policy
contains general principles to guide computer user behavior
An internet use policy
contains general principles to guide the proper use of the Internet
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered
counterfeit ethical PIRATED SOFTWARE governance software
AN email privacy policy
details the extent to which email messages may be read by others.
What is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere?
digital ink radio paper digital paper electronic ink
generate ideas and identiy opportunites
find new ideas and innovations by tudying trends and analyzing publications
Historical analysis
historical events are studied to anticipte the outcome of current developments.
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ----- and -----.
legal and confidential LEGAL AND ETHICAL legal and technical confidential and open
Autonomic Computing levels
level 1 BASIC level 2 MANAGED level 3 PREDICTIVE level 4 ADAPTIVE level 5 AUTONOMIC
Understand the future of specific industries
organizations must understand everything inside and outside their indusry
ePOLICIES
policies and procedures that address information management along with the ethical use of computers and the internet in the business environment
Digitial ink
refers to technology that digitally represents handwriting in its natural form
Teleliving
refers to using information devices and the Internet to conduct all aspects of life seamlessly includes shopping, working, learning, playing, healing, and even praying each year, four billion chips are embedded in everything from coffee makers to cadillacs
Acceptable use policy
requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.
identify early warning signals
scan the environment for potencil threats and risks
beat the competition
seeing what is coming before others can give an organization the lead time it requires to establish a foothold in the new market
Counterfeit software
software that is manufactured to look like the real thing and sold as such
identify the trends that will have the greatest impact on future business.
the following trends have the potencial to change our world, our future, and our lives: 1 World's population will double in the next 40 years 2 People in developed countries are living longer 3 Growth in information industries is creating a knowledge-dependent global society 4 the global economy is becoming more integrated 5 the economy and society are dominated by technology 6 Pace of technology innovation is increasing 7Time is becoming one of the most precious commodities
copyright
the legal protection afforded an expression of an idea, such as a song, book, or video game
Ethics
the principles and standards that guide or behavior toward other people
Social Media monitoring
the process of monitoring and responding to what is being said about a company, individual, product, or brand.
Authorization
the process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space.
PRivacy
the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Website Name Stealing
the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
balancing a strategic goals
thinking about the future is an antidote to a "profit now, worry later" mentality that can lead to trouble in the long term
trend monitoring
trends viewed as particaly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers
Trend Projection
when numericl data are available, a trend can be plotted to display changes through time and into the future
Copy machines made after 2002 all contain a hard drive that stores a copy of every document the machine has ever scanned, printed, copied, or faxed. If the hard drive is not erased or scrubbed when the copy machine is resold, all of that digital information is still maintained inside the machine. The Buffalo, New York, Police Sex Crimes Division recently sold several copy machines without scrubbing the hard drives. The hard drives yielded detailed domestic violence complaints and a list of wanted sex offenders. A machine from the Buffalo Police Narcotics Unit contained targets in a major drug raid, and a copier once used by a New York construction company stored 95 pages of pay stubs with names, addresses, and Social Security numbers. WHAT TYPES OF ETHICAL ISSUES AND INFORMATION SECURITY ISSUES ARE BEING VIOLATED?
PHISING AND HACKING
Why is security a business issue, not just a technology issue?
Security is a business issue not just a technology issue because it compromises the business's confidential information. It relates to technology because in technology you are able to implement things such as firewalls- to protect the companies information. Information and data are business enablers that enable the operations and productivity of a business which means that it should be protected by the company. A detailed information security policy would also increase the reputation of the business as it protects the confidentially of its customers details. Also companies could become victimized for cyber crime. An information security plan outlines protocols to be followed in case of a breach in the data which prevents further loss for the business of a whole. There are also intruders in companies networks where they hack them and have the ability to steal information and money. Even though information security seems like a highly technical issue it is the management's job to see the importance of security for the companies survival.
Copy machines made after 2002 all contain a hard drive that stores a copy of every document the machine has ever scanned, printed, copied, or faxed. If the hard drive is not erased or scrubbed when the copy machine is resold, all of that digital information is still maintained inside the machine. The Buffalo, New York, Police Sex Crimes Division recently sold several copy machines without scrubbing the hard drives. The hard drives yielded detailed domestic violence complaints and a list of wanted sex offenders. A machine from the Buffalo Police Narcotics Unit contained targets in a major drug raid, and a copier once used by a New York construction company stored 95 pages of pay stubs with names, addresses, and Social Security numbers. WHAT TYPES OF EPOLICIES COULD A COMPANY IMPLEMENT TO ENSURE THAT THESE SITUATIONS DO NOT OCCUR?
The company should implement epolicies such as the ethical computer use policy which contains general principles to guide computer-user behavior which can help businesses establish rules on how and what content should be assessed on an IT system. Also the information privacy policy which contains general principles regarding information privacy and this stops users from accessing information that is not relevant to their department or themselves.
Trend analysis
The examination of a trend to identify its nature, casues, speed of development, and potential impacts
Identify the technologies that will have the greatest impact on future business
The following technologies have the potential to change our world, our future, and our lives: 1) Digital Ink 2) Digital Paper 3) Teleliving 4) Alternative energy sources 5) Autonomic Computing
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
PIRATED software
The unauthorized use, duplication, distribution, or sale of copyrighted software