Chapter 7.2 CIS
location-based services
applications that use location information to provide a service
3 primary areas of an enterprise mobility management strategy
1) mobile device management 2) mobile application management 3) mobile information management
3 security considerations
1) start with the right equipment 2) make security an ongoing process 3) understand that not all threats are purposeful
MDM device policies
BYOD, CYOD, and COPE
3 wireless business applications
RFID, GPS, GIS
latitude
Represents a north/south measurement of position
longitude
Represents an east/west measurement of position
geocache
A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
accelerometer
A device that can measure the force of acceleration, whether caused by gravity or by movement
RFID accelerometer
A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
geocoin
A round coin-sized object uniquely numbered and hidden in geocache - for decoration
Global Positioning System (GPS)
A satellite-based navigation system providing extremely accurate position, time, and speed information - 24 global satellites
Mobile Device Management (MDM)
A security strategy compromised of products and services that offer remote support for mobile devices, such a smart phones, laptops, and tablet ex) passcode on corporate device
mobile application management (MAM)
A security strategy that administers and enforces corporate epolicies for applications on mobile devices - software delivery, licensing, and maintenance and can limit data leakage
mobile information management (MIM)
A security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it - limits sharing of corporate data - starts w encryption and password
RFID reader (RFID interrogator)
A transmitter/receiver that reads the contents of RFID tags in the area
progressive web application (PWA)
A website that looks and behaves as if it is a mobile application but it is just a normal website
digital divide
A worldwide gap giving advantage to those with access to technology
data in use (MIM characteristic)
Data that is currently being updated, processed, erased, accessed, or read by a system - actively moving thru parts of MIS infrastructure ex) RAM data, databases, CPU * vulnerable to attacks
Spatial data (geospatial data or geographic information)
Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
asset tracking
Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
fast data
The application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value
Estimated time of arrival (ETA)
The time of day of an expected arrival at a certain destination and is typically used for navigation applications
estimated time en route (ETE)
The time remaining before reaching a destination using the present speed and is typically used for navigation applications
geocoding
a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
data in motion (MIM characteristic)
a stream of data that is moving or being transported between locations within or between computer systems -RAM
RFID tag
an electronic identification device that is made up of a chip and antenna
Enterprise Mobility Management (EMM)
an enterprisewide security strategy to enforce corporate policies while enabling employee use of mobile devices such a smart phones and tablets
dual persona technology
creates two completely separate user interfaces on the same device, one for work and one for personal use
passive RFID tags
do not have a power source - low cost items
Choose Your Own Device (CYOD)
employees choose a company approved and configured device -costs company money and no personal use allowed - complete control over security, reliability, and compatibility
company-issued, personally enabled (COPE)
employees provided with corporate devices - costs company money - partial control over security, reliability, and compatibility bc employees can use for personal use
Bring Your Own Device (BYOD)
employees use their own device - saves company money, no control over security, reliability, and compatibility
examples of when GIS would be used
finding what is nearby, routing info, sending info alerts, mapping densities, mapping quantities (where is the closest.....)
active RFID tags
have their own transmitter and a power source (typically a battery)
Containerization (sand boxing)
isolates corporate applications from personal applications on a device
GIS map automation
links business assets to a centralized system where they can be tracked and monitored over time
Edge matching (warping, rubber sheeting)
occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match
data at rest (MIM characteristic)
refers to all data in computer storage ex) corporate files on hard drive, files on external backup, files on server of storage area
mobile application development
set of processes and procedures involved in writing software for use on wireless devices
Geographic Information System (GIS)
stores, views, and analyzes geographic data, creating multidimensional charts or maps
IT consumerization
the blending of personal and business use of technology devices and applications
persuasive computing
the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end users need to interact with computers as computers ex) apple watch
cartography
the science and art of making an illustrated map or chart
semi-passive RFID tags
use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader
chipless RFID tags
use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
Automatic vehicle location (AVL)
uses GPS tracking to track vehicles
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances