Chapter 7.2 CIS

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

location-based services

applications that use location information to provide a service

3 primary areas of an enterprise mobility management strategy

1) mobile device management 2) mobile application management 3) mobile information management

3 security considerations

1) start with the right equipment 2) make security an ongoing process 3) understand that not all threats are purposeful

MDM device policies

BYOD, CYOD, and COPE

3 wireless business applications

RFID, GPS, GIS

latitude

Represents a north/south measurement of position

longitude

Represents an east/west measurement of position

geocache

A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find

accelerometer

A device that can measure the force of acceleration, whether caused by gravity or by movement

RFID accelerometer

A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

geocoin

A round coin-sized object uniquely numbered and hidden in geocache - for decoration

Global Positioning System (GPS)

A satellite-based navigation system providing extremely accurate position, time, and speed information - 24 global satellites

Mobile Device Management (MDM)

A security strategy compromised of products and services that offer remote support for mobile devices, such a smart phones, laptops, and tablet ex) passcode on corporate device

mobile application management (MAM)

A security strategy that administers and enforces corporate epolicies for applications on mobile devices - software delivery, licensing, and maintenance and can limit data leakage

mobile information management (MIM)

A security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it - limits sharing of corporate data - starts w encryption and password

RFID reader (RFID interrogator)

A transmitter/receiver that reads the contents of RFID tags in the area

progressive web application (PWA)

A website that looks and behaves as if it is a mobile application but it is just a normal website

digital divide

A worldwide gap giving advantage to those with access to technology

data in use (MIM characteristic)

Data that is currently being updated, processed, erased, accessed, or read by a system - actively moving thru parts of MIS infrastructure ex) RAM data, databases, CPU * vulnerable to attacks

Spatial data (geospatial data or geographic information)

Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more

asset tracking

Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention

fast data

The application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value

Estimated time of arrival (ETA)

The time of day of an expected arrival at a certain destination and is typically used for navigation applications

estimated time en route (ETE)

The time remaining before reaching a destination using the present speed and is typically used for navigation applications

geocoding

a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)

data in motion (MIM characteristic)

a stream of data that is moving or being transported between locations within or between computer systems -RAM

RFID tag

an electronic identification device that is made up of a chip and antenna

Enterprise Mobility Management (EMM)

an enterprisewide security strategy to enforce corporate policies while enabling employee use of mobile devices such a smart phones and tablets

dual persona technology

creates two completely separate user interfaces on the same device, one for work and one for personal use

passive RFID tags

do not have a power source - low cost items

Choose Your Own Device (CYOD)

employees choose a company approved and configured device -costs company money and no personal use allowed - complete control over security, reliability, and compatibility

company-issued, personally enabled (COPE)

employees provided with corporate devices - costs company money - partial control over security, reliability, and compatibility bc employees can use for personal use

Bring Your Own Device (BYOD)

employees use their own device - saves company money, no control over security, reliability, and compatibility

examples of when GIS would be used

finding what is nearby, routing info, sending info alerts, mapping densities, mapping quantities (where is the closest.....)

active RFID tags

have their own transmitter and a power source (typically a battery)

Containerization (sand boxing)

isolates corporate applications from personal applications on a device

GIS map automation

links business assets to a centralized system where they can be tracked and monitored over time

Edge matching (warping, rubber sheeting)

occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match

data at rest (MIM characteristic)

refers to all data in computer storage ex) corporate files on hard drive, files on external backup, files on server of storage area

mobile application development

set of processes and procedures involved in writing software for use on wireless devices

Geographic Information System (GIS)

stores, views, and analyzes geographic data, creating multidimensional charts or maps

IT consumerization

the blending of personal and business use of technology devices and applications

persuasive computing

the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end users need to interact with computers as computers ex) apple watch

cartography

the science and art of making an illustrated map or chart

semi-passive RFID tags

use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader

chipless RFID tags

use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip

Automatic vehicle location (AVL)

uses GPS tracking to track vehicles

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances


Set pelajaran terkait

Chapter 24: Management of Patients With Chronic Pulmonary Disease

View Set

AP Gov civil liberties practice questions

View Set

Money Creation & Monetary Policy

View Set

**MSN Ch17 Random Questions Nursing 3

View Set

Chapter 18 - The Circulatory System: Blood

View Set