MIS Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

a typical email privacy policy

1 defines legitimate email users and explains what happens to accounts after a person leaves the organization 2 explains backup procedures so users will know that at some point, even if a message is deleted from their computer 3 describes legitimate grounds for reading email and the process required before such action is performed 4 discourages sending junk email or spam to anyone who does not want to receive it 5 prohibits attempting to mail bomb a site. A mail bomb sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning 6 Informs users that the organization has no control over email once it it has been transmitted outside the organization

trends shaping our future

1 the worlds population will double in the next 40 years 2 people in developed countries are living longer 3 growth in information industries is creating a knowledge-dependent global society 4 the global economy is becoming more integrated 5 the economy and society are dominated by technology 6 pace of technological innovation is increasing 7time is becoming one of the most precious commodities

List and briefly describe the FIVE technology trends (as you learned during chapter 7 lecture and/or from your text book that will have the greatest impact on future business.

1) Digital Ink -- refers to technology that represents handwriting in its natural form. 2) Digital Paper-- any paper that is optimized for any type of digital printing 3)Televising --user and information devices to conduct all aspects of life seamlessly 4) Alternative Energy Resources -- wind, geothermal, and hydro-electric will account to large amount of energy used 5) Autonomic Computing -- a self-managing computing model

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. WHICH POLICY SHOULD THE COMPANY IMPLEMENT TO HELP ELIMINATE TO HELP ELIMINATE THIS PROBLEM?

AN INTERNET USE POLICY an information privacy policy a workplace monitoring policy an email privacy

Prepare for the future

Any organization that wants to compete in this hyperchanging world needs to make every effort to forecast the future.

Information Privacy Policy

Contains general principles regarding information privacy

what technologies are shaping our future

Digitial ink digital paper Teleliving alternate engery sources autonomic computing

Information security policies detail how an organization will implement the information security plan.

FALSE

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

FALSE

Explaining why understanding trends and new technologies can help an organization prepare for the future

Obtaining a broad view of emerging trends and new technologies as they relate to business can help an organization anticipate and prepare for the future. Organizations that can most effectively grasp the deep currents of technological evolution can use their knowledge to protect themselves against sudden and fatal technological obsolesce.

Biometrics is the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting.

TRUE

Social Media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

TRUE

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

TRUE

Alternative Energy Sources

Wind geothermal, hydroelectric, solar, and other alternative energy sources will account for 30% for all energy use

Workplace Monitoring Policy

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

Information security

a broad term encompassing the protection of information from accidental or unintensional misuse by persons inside or outside an organization

radio paper

a dynamic high-resolution electronc display that combines a paperlike reading expirience with the ability to access information anytime, anywhere

Authentication

a method for confirming user's identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user

Autonomic Computing

a self-managing computing model named after, and patterned on, the human body's autonomic nervous system

gain confidence

a solid foundation of awareness about trends can provide an organization with the confidence to take risks

Understand a trend

analyzing the details within a trend can help separate truly significant developments from rapidy appearing and disappearing fads

digital paper

any paper that is optimized for any type of digital printing

unethical and illegal

are not always the same thing

Social Media Policy

companies can protect themselves by implementing a social media policy outlining the corporate guidelines or principles governing employee online communications

Computer Simulaton

complex systems can be modelled by means of mathematical equations and different scenarios can be run against the model to determine "what if" analysis

Ethical Computer Use Policy

contains general principles to guide computer user behavior

An internet use policy

contains general principles to guide the proper use of the Internet

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered

counterfeit ethical PIRATED SOFTWARE governance software

AN email privacy policy

details the extent to which email messages may be read by others.

What is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere?

digital ink radio paper digital paper electronic ink

generate ideas and identiy opportunites

find new ideas and innovations by tudying trends and analyzing publications

Historical analysis

historical events are studied to anticipte the outcome of current developments.

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ----- and -----.

legal and confidential LEGAL AND ETHICAL legal and technical confidential and open

Autonomic Computing levels

level 1 BASIC level 2 MANAGED level 3 PREDICTIVE level 4 ADAPTIVE level 5 AUTONOMIC

Understand the future of specific industries

organizations must understand everything inside and outside their indusry

ePOLICIES

policies and procedures that address information management along with the ethical use of computers and the internet in the business environment

Digitial ink

refers to technology that digitally represents handwriting in its natural form

Teleliving

refers to using information devices and the Internet to conduct all aspects of life seamlessly includes shopping, working, learning, playing, healing, and even praying each year, four billion chips are embedded in everything from coffee makers to cadillacs

Acceptable use policy

requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.

identify early warning signals

scan the environment for potencil threats and risks

beat the competition

seeing what is coming before others can give an organization the lead time it requires to establish a foothold in the new market

Counterfeit software

software that is manufactured to look like the real thing and sold as such

identify the trends that will have the greatest impact on future business.

the following trends have the potencial to change our world, our future, and our lives: 1 World's population will double in the next 40 years 2 People in developed countries are living longer 3 Growth in information industries is creating a knowledge-dependent global society 4 the global economy is becoming more integrated 5 the economy and society are dominated by technology 6 Pace of technology innovation is increasing 7Time is becoming one of the most precious commodities

copyright

the legal protection afforded an expression of an idea, such as a song, book, or video game

Ethics

the principles and standards that guide or behavior toward other people

Social Media monitoring

the process of monitoring and responding to what is being said about a company, individual, product, or brand.

Authorization

the process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

PRivacy

the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

Website Name Stealing

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner

balancing a strategic goals

thinking about the future is an antidote to a "profit now, worry later" mentality that can lead to trouble in the long term

trend monitoring

trends viewed as particaly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers

Trend Projection

when numericl data are available, a trend can be plotted to display changes through time and into the future

Copy machines made after 2002 all contain a hard drive that stores a copy of every document the machine has ever scanned, printed, copied, or faxed. If the hard drive is not erased or scrubbed when the copy machine is resold, all of that digital information is still maintained inside the machine. The Buffalo, New York, Police Sex Crimes Division recently sold several copy machines without scrubbing the hard drives. The hard drives yielded detailed domestic violence complaints and a list of wanted sex offenders. A machine from the Buffalo Police Narcotics Unit contained targets in a major drug raid, and a copier once used by a New York construction company stored 95 pages of pay stubs with names, addresses, and Social Security numbers. WHAT TYPES OF ETHICAL ISSUES AND INFORMATION SECURITY ISSUES ARE BEING VIOLATED?

PHISING AND HACKING

Why is security a business issue, not just a technology issue?

Security is a business issue not just a technology issue because it compromises the business's confidential information. It relates to technology because in technology you are able to implement things such as firewalls- to protect the companies information. Information and data are business enablers that enable the operations and productivity of a business which means that it should be protected by the company. A detailed information security policy would also increase the reputation of the business as it protects the confidentially of its customers details. Also companies could become victimized for cyber crime. An information security plan outlines protocols to be followed in case of a breach in the data which prevents further loss for the business of a whole. There are also intruders in companies networks where they hack them and have the ability to steal information and money. Even though information security seems like a highly technical issue it is the management's job to see the importance of security for the companies survival.

Copy machines made after 2002 all contain a hard drive that stores a copy of every document the machine has ever scanned, printed, copied, or faxed. If the hard drive is not erased or scrubbed when the copy machine is resold, all of that digital information is still maintained inside the machine. The Buffalo, New York, Police Sex Crimes Division recently sold several copy machines without scrubbing the hard drives. The hard drives yielded detailed domestic violence complaints and a list of wanted sex offenders. A machine from the Buffalo Police Narcotics Unit contained targets in a major drug raid, and a copier once used by a New York construction company stored 95 pages of pay stubs with names, addresses, and Social Security numbers. WHAT TYPES OF EPOLICIES COULD A COMPANY IMPLEMENT TO ENSURE THAT THESE SITUATIONS DO NOT OCCUR?

The company should implement epolicies such as the ethical computer use policy which contains general principles to guide computer-user behavior which can help businesses establish rules on how and what content should be assessed on an IT system. Also the information privacy policy which contains general principles regarding information privacy and this stops users from accessing information that is not relevant to their department or themselves.

Trend analysis

The examination of a trend to identify its nature, casues, speed of development, and potential impacts

Identify the technologies that will have the greatest impact on future business

The following technologies have the potential to change our world, our future, and our lives: 1) Digital Ink 2) Digital Paper 3) Teleliving 4) Alternative energy sources 5) Autonomic Computing

Biometrics

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

PIRATED software

The unauthorized use, duplication, distribution, or sale of copyrighted software


संबंधित स्टडी सेट्स

Chapter 8Fedeal tax considerations for life insurance and annuties

View Set

U.S Government - Unit One: The History of Civics and Government

View Set

Ch 16 - Child & Adolescent Health

View Set

Chapter 1- Becoming a Public Speaker (Quiz)

View Set

Gerunds, infinitive, and participle

View Set