mis 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Distributed Denial-of-Service Attack

- A Denial of Service (DoS) attack is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. - A Distributed Denial of Service (DDoS) launches a virus on a computer. - A DoS attack is carried out by one device whereas a DDoS attack uses many devices to slow down or crash a network.

Trojan

- A Trojan, sometimes called a Trojan horse, is a program that appears legitimate but executes an unwanted activity when activated. - Trojans are like viruses, but do not replicate themselves and are commonly found attached to free downloads and apps. - Trojans are often used to install key loggers or packet sniffers that can find passwords, destroy data, or bypass firewalls.

How Devices Become Infected With Viruses

- A computer virus works much the same as how a biological virus infects people. - A biological virus is spread from host to host, and the virus can replicate itself. - A computer virus works in much the same way. - Due to the nature of our always connected world, it is very easy for viruses to spread - Be aware that viruses do not only attack laptops and desktops. - Viruses can also attack mobile devices including smartphones and tablet computers.

Challenges Facing Internet Privacy: Cookies

- A cookie is a small text file of information created by websites you visit that your web browser stores on your hard disk. - When you revisit a website that uses cookies your browser will send the cookie to the Webserver that uses this information to customize and optimize your experience

Customer Relationship Management Software

- A customer relationship management (CRM) system seeks to manage a firm's interactions with customers using analytics and data analysis to identify the most valuable customers and target future customers. - By tracking consumer behavior, it strives to focus on the customer experience to attract and retain customers, with the goal of increasing sales, market share, and profit.

Individual Name

- A cyberattack is a deliberate misuse of computers and networks via the Internet. Cyberattacks use malicious code to modify the normal operations of a computer or network - Two Types of Attacks =aim to disable a target computer or prevent it from accessing a network or the Internet =designed to gain access to data stored on a device or to gain administrative privileges to a device

Database Management Systems (DBMS)

- A database management system (DBMS) is a computer program that is used to create, process, and administer a database. - Due to the complexities surrounding the DBMS development process, most organizations do not develop their own DBMS. - Organizations use DBMSs created by software vendors including Oracle, Microsoft, and IBM.

How DoS attacks are Launched

- A distributed denial-of-service (DoS) attack takes place when a hacker gains unauthorized access and control of a network of computers that are connected to the Internet. - A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie (also known as a bot). - A group of computers under the control of a hacker is referred to as a botnet. - When a botnet has been established, the hacker is able to direct each device via remote access

Firewall

- A firewall is hardware or software used to keep a computer secure from outside threats such as hackers and viruses. - Firewalls allow or block Internet traffic in and out of a network or computer. The most ideal firewall configuration consists of both hardware and software. - Personal software firewalls are typically included with the operating system and can be configured based on user preference. - Hardware based firewalls can be purchased as a stand-alone product but are often also included in broadband routers

Rootkit

- A rootkit is a type of malicious computer program that is designed to operate secretly in a device and allow unauthorized access by cybercriminals, enabling them to remotely control a computer. - Security Bypass =Many rootkits are designed to bypass security software that has been installed on a device which makes them extremely difficult to detect. =Security software often can catch and disable a rootkit when it has been installed - Undetected =Some rootkits go undetected for long periods of time. =When this occurs often the only remedy is to uninstall the computer's operating system and then reload it.

Measures Taken by Cybersecurity Personnel to Assess Risks and Protect Data

- According to NIST (National Institute of Standards Technology), cybersecurity personnel can take steps to ensure data and systems are protected. =the first thing that should take place is a cybersecurity risk assessment. NIST states that a cybersecurity risk assessment is about understanding, managing, controlling, and mitigating cyber risk across your organization =it is a crucial part of any organization's risk management strategy and data protection efforts =the primary purpose of a cybersecurity risk assessment is to help inform decision-makers and support proper risk responses =the assessment also provides an executive summary to help executives and directors make informed decisions about security - Risk can be calculated using the following calculation: Risk = Threat x Vulnerability x Asset

How Cybersecurity Teams Assess and Mitigate Risks to Computers and Computer Networks

- According to the National Institute for Standards Technology, once a cybersecurity risk assessment has been conducted and various questions have been answered, an organization will be able to decide what to protect. - This means IT security controls can be investigated and developed and then data security strategies to mitigate risk can be employed. - Before IT security control development can occur, the following questions must be answered: =What is the risk I am reducing? =Is this the highest priority security risk? =Am I reducing the risk in the most cost-effective way?

Adware

- Adware is software that collects the user's web browsing history. - Functions of Adware: =surface advertisements on a digital device =forward your search history and requests to advertising and social media sites =collect a variety of marketing and online behavioral data about you

AI Chatbots

- An AI chatbot is a computer program that incorporates artificial intelligence (AI) and natural language processing (NLP) to interpret user-provided questions and provide automated responses, thus simulating human conversation. - These programs use deep learning to enable more accurate responses over time. - Many of the AI chatbots in use today utilize natural language understanding (NLU) to understand the users' needs better. - Once the need is determined, they use AI to identify what the user is trying to accomplish. - This methodology allows the software to develop a granular knowledge base that increases accuracy in provided responses. - Popular AI Chatbots include: =ChatGPT =Caktus AI =AI-Powered Bing

Elements of Executive Information System Software

- An EIS should be oriented to meet the specific needs of the executive and will vary based upon the executive's depart mentor area of responsibility. - Traditionally, EIS software has been designed to focus on operations, finance, marketing, and human resources management. - Another element of an EIS is the ability to communicate throughout the executive's department or area of responsibility. - The final element of any EIS is the software infrastructure supporting the system. =while many firms have moved this software to the Cloud using a SaaS type platform, some organizations prefer to keep the software in-house using the firm's servers and network

Executive Information System Software

- An executive information system (EIS), sometimes referred to as an executive support system (ESS), is a version of decision support system (DSS), or business intelligence (BI) software designed to expressly meet the needs of senior corporate executives of larger companies or corporations. - The key element of any EIS is a highly intuitive user interface, often referred to as the dashboard

Four Steps to Protecting Your Digital Privacy (cont.)

- Antivirus software is used scan files to identify and remove computer viruses and other malicious programs. - Two of the most common techniques are using signature-based detection and heuristic-based detection =signature-based detection capitalizes on the fact that viruses are created with a specific set of data and instructions that constitute its signature =antivirus programs look for these signatures to find and remove the virus =heuristic-based detection attempts to detect new malware by examining files for suspicious characteristics without an exact signature match =other techniques include behavioral detection and Cloud-based detection

Human Approach to Decision Making

- Cognitive systems use a decision-making approach like that used by humans to analyze large data sets to make decisions. - These systems use natural language processing (NLP) to read and process text like a human. =NLP is the study and application of programming techniques that allow computers to understand spoken words and text that are inputted by humans. =It breaks down statements and sentences by analyzing them for grammar, structure, and relationships within the words. =Using algorithms and linguistic models, the eventual outcome is the comprehension of the intent of the language, which can be used to draw inferences. =Through this process, cognitive computing systems continually learn and adapt, allowing them to increase their analytical abilities.

Protecting Your Privacy

- Completely safeguarding your information privacy in the digital era is essentially impossible. - However, there are steps that you should take that significantly reduce your risks. 1. Exercise good password habits. 2. Incorporate antivirus protection. 3. Practice safe browsing and safe online purchasing techniques. 4. Monitor your credit report and, if necessary, place restrictions or stops on your credit

Data Integrity

- Data integrity means the database is reliable, accurate, and aligned to the goals of the organization. - Data centralization is critical in increasing data integrity: =when data is centralized, it means it is stored in only one place =when multiple lists and data sources are maintained, information can become inconsistent leading to decreased data integrity

Data Mining Information

- Data mining is a means of analyzing data that can help organizations find patterns and relationships within data sets. - Key Ideas about Data Mining: =While data mining is a powerful tool, it does not replace the need to have an intimate knowledge of the organization, the data that is produced, and analytical methods employed to turn data into information =Data mining assists businesses in uncovering information that maybe hidden in data sets =Predictive information and relationships that are produced from data mining are not causal relationships =Data mining yields probabilities, not exact answers

Data Scrubbing

- Data scrubbing (data cleansing) includes the detection of errors in data sets and the removal/correction of these mistakes to ensure an organization's data are valid. - Examples of data errors data scrubbing can resolve include: =elimination of duplicate database records =correcting misspellings =correcting incorrect names and address =fixing syntax issues - Specialized data-scrubbing software is commonly used to conduct automatic surveys of data files and data sets.

How to Structure Data Visualizations to Ensure Data Is Appropriately Represented

- Data visualizations are tools used to convey a variety of data and information in a meaningful and efficient way. - Data visualization: =Is the graphical and structured representation of data. =Makes it easier to see the results and conclusions ascertained from data analysis - When designing data visualizations, there are several best practices that can be applied to ensure effective development and interpretation. =Define the purpose =Design visualizations designed for the target audience =Include all data =Format data visualizations =Use color (when appropriate)

Differences Between a Database and a DBMS

- Database: a database is a collection of tables, relationships, and metadata - DBMS: a DBMS is a software program designed to organize and administer a database

Encouraging Ethical Information Technology Behavior in the Workplace

- Ethical, visible managers that lead by example are of paramount importance. - Once appropriate standard shave been established, businessowners and network administrators must publish the standards, provide employee appropriate computer usage instruction, monitor employee computer behavior and periodically review the policies to ensure their continued viability

Major Categories of Executive Information System Software

- Executive information systems (EIS) software is usually tailored to meet the needs of the specific organization and the executive's role in the firm. - Generally, these needs fall into five major categories: =operations management =financial management =Marketing =human resources management (HRM) =supply chain management (SCM)

How Do White Hat Hackers Attempt to Infiltrate Data Networks?

- In organizational settings and network environments, white hat hackers often provide penetration (pen) testing services. - Penetration testing involves activities where white hat hackers are paid to hack into private networks and applications. =their goal is to find gaps in network security and to test security defenses =after the penetration activities conclude, reports are submitted that identify weaknesses and remediation - White hat hackers use the same techniques and tools that are used by illegitimate hackers

Cookies: Types, Risks, and Management

- In the settings area of each browser you should consider deleting cookies, blocking and customizing your cookie settings, and deciding from which sites you want to allow cookies. - Session cookies are small text files that are stored in temporary memory such as random access memory (RAM) or a cache. =are lost when the web browser is closed - Persistent cookies are stored on the hard drive and are not lost when the web browser is closed. =are only lost if they are designed with an expiration date

Five Dimensions of Ethical Behavior

- Information Privacy Rights: this category of ethical dilemmas involves the rights of individuals and organizations to privacy - Intellectual Privacy Rights: refers to creative works such as artwork, literary works, inventions, music, and images using patents, trademarks, and copyrights to protect intellectual property - Control and Accountability: examines how individuals or corporations can be held accountable in case of violations of privacy or intellectual property rights - Establishing Quality Standards: refers to determining what constitutes proper levels of protection of digital information - Quality of Life: as it relates to the digital age refers to ensuring that technological advancements do not detract from one's quality of life

How are Firewalls Used to Protect Data?

- Large organizations often utilize a system of complex firewalls to protect their networks. - These firewalls can be configured to prevent unauthorized access to networks from outside the organization and to prevent employees from sending or transmitting sensitive data. - Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system.

Ransomware

- Malware that makes a computer's data inaccessible until a ransom is paid. - Ransomware Attack 1. Ransomware typically encrypts the victim's data files. 2. A message offers to decrypt the files if the victim makes a ransom payment to the perpetrator. 3. Payment is made via a means that is difficult to trace, such as Bitcoin or prepaid cards. 4. Once payment is made, the perpetrator may or may not send a decrypting code that allows the victim to open their data files again. Another version of ransomware threatens to make the victim's personal files public unless the ransom is paid. 5. The damaging software makes a computer's data inaccessible until a ransom payment is made.

Opt-in and Opt-out

- Opt-in and opt-out refers to common methods of gaining consumer permission to access their information or track their behavior. - Some of these, unscrupulously take advantage of consumer naiveté. =when downloading a game or software onto a device, you may notice a checkbox asking if you agree to Terms of Use and the site's Privacy Policy =the Terms of Use may also permit the site's owner to track your browsing and share this information with third-parties

E-Commerce Timeline

- Organizations that wish to develop an e-commerce presence should execute an analysis of the phases needed - The creation of an e-commerce timeline can be beneficial in allowing an organization to visualize the various steps needed to create a presence in the e-commerce business landscape. - Development of an e-commerce strategy for a start-up: Phase 1: Planning = actions: Determine vision for web presence = measurement: Did you compile information about costs, needs, wants? Phase 2: Web Development = actions: Web site storyboard, design strategies, determine web hosting needs, build the site = measurement: Do you have a website design and implementation plan? Phase 3: Implementation = actions: Develop search engine optimization (SEO) strategy, identify potential advertisers and sponsors, develop keywords and tags. = measurement: Do you have a functional website? Phase 4: Media Plan - actions: Conduct research about which social media platforms best reach your target audiences = measurement: Do you have are searched and logical social media plan? Phase 5: Social Media Implementation = actions: Create a social media presence. Develop content for various sites. = measurement: Have you established a social media presence using a variety of sites? Phase 6: Mobile Platform & Implementation = actions: Create a plan for deploying content and e-commerce activities via mobile platforms being accessed via smartphones and other devices. = measurement: Have you created a plan for reaching customers via mobile devices?

E-Commerce Personalization/Customization

- Personalization is the ability of organizations to craft marketing messages directed and product/service offerings toward specific target markets. - Customization is the adjustment of an organization's product or service offerings based on an individual's preferences or past buying behavior - E-commerce allows organizations to collect and analyze data about a customer's past purchases and engagement behavior to create personalized and customized offerings that are directly targeted to the individual.

Privacy

- Privacy is your right to control what happens with personal information about you. - Internet privacy is the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the Internet. - Managers must protect the online privacy of employees and organization stakeholders.

Ransomware

- Ransomware is malware that makes a computer's data inaccessible until a ransom is paid. =it usually invades a computer in a Trojan Horse, in a legitimate looking email or with a worm in a networked computer - How Ransomware Works 1. Ransomware typically encrypts the victim's data files. A message offers to decrypt the files if the victim makes a ransom payment to the perpetrator. 2. Payment is made via a means that is difficult to trace such as Bitcoin or with prepaid credit cards. 3. Once payment is made the perpetrator may or may not send a decrypting code that allows the victim to open the data files again.

Referential Integrity

- Referential integrity is the accuracy and consistency of data within a table relationship in a database. In relational databases, two or more tables can be linked using a relationship. - The creation of relationships is achieved using: =a primary key value (in the primary or parent table) =foreign keys (in associated tables)

Relational Databases

- Relational databases organize data into tables based on structured data groupings. - Relational databases use links called relationships between tables: =tables are used to hold information about the objects to be represented in the database =information in tables is stored in rows called records or objects, and columns called fields. These relationships define how the data in the tables are related =a common field that is included in both tables is used to create the relationship =rows among multiple tables can be made related using foreign keys =data can be accessed in many ways without reorganizing the database tables themselves

Structured Query Language (SQL)

- Structured Query Language (SQL), pronounced "ess-que-el," is: =used for human interface and communication with relational databases =considered the standard language - SQL uses user-generated lines of code (statements) to answer questions against the database. - Most relational databases use SQL, but most also have proprietary extensions that allow for customized interactivity.

Supply Chain Management System Software

- Supply chain management (SCM) systems provide the software needed to ensure the efficient flow of goods and services from the initial extraction of raw materials all the way to customer distribution and receipt of payment. - Essentially, SCM assists managers in anticipating issues, such as increased demand or production slowdowns, so they can quickly institute accommodations.

Ethical Concerns: The Internet

- The Internet provides an incredible platform for research and creativity - For example, online viewers watch approximately 400,000 years of video every day. - Each day Internet users make over 1 billion Google searches =unfortunately, this technological explosion also created techniques such as Deepfake, and encourages extremely insular information streams =this often makes it difficult to distinguish between basic fact and fiction =also, with so much financial and personal data available online, the incidences of identity theft and frauds such as wire-wire and ransomware attacks have also proliferated

The Elements of Supply Chain Management Software

- The components of a supply chain management (SCM) system depend on the product provided. - Complex organizations, such as major retail outlets or automobile manufacturing and distribution, require comprehensive SCM systems with a significant number of elements, whereas a doughnut shop may not require an SCM system for anything other than its local suppliers

Data Visualization

- The graphical and structured representation of data. - Makes it easier to see the results and conclusions ascertained from data analysis.

The Impact of AI on Decision Support Systems

- The model of a decision support system (DSS), or business intelligence (BI) system, typically adapts its processes based on the degree of accuracy of each prior decision. - In this respect most DSSs can be considered to have a type of artificial intelligence.

How Do DBMS Solve File Management Issues? (cont.)

- The use of a DBMS makes it is easier to secure data and information. - DBMS allows for the creation of access constraints so that only authorized users can access the data. - Users are assigned a different set of access rules; this helps to protect data and users from identity theft, data leaks, and the misuse of data.

General Data Protection Regulation (GDPR)

- This law regulates how companies protect the personal data of citizens of the European Union (EU). The law includes several key privacy and data protection requirements with which organizations must comply. - These requirements include: =requiring the consent of subjects for data processing =anonymizing collected data to protect privacy =providing notifications of data breaches =safe handling of data across country borders =requiring that certain companies appoint a data protection officer to oversee GDPR compliance

Basic Ethical Principles

- When facing an ethical dilemma, particularly regarding information technology and individual privacy or intellectual property rights, having a practical knowledge of the five basic principles of ethical decision making can be beneficial. - These five principles include: =the principle of moral rights =the principle of virtue =the principle of distributive justice =the universalist principle =the utilitarian principle

White Hat Hackers

- White hat hackers are non-malicious computer security experts who test the security measures of an organization's information systems to ensure they are protected against malicious intrusions. =these ethical hackers execute a variety of tasks designed to test the security of an organization's IT infrastructure =white hat hackers are often hired as consultants to expose weaknesses in a network's firewalls - TASKS =penetration testing and vulnerability testing (testing the vulnerability of networks and systems to intrusions and attacks) =testing in-place security systems (testing current systems and processes against security threats)

AI Detection Software

- With the rise of ChatGPT and other AI chatbots, educators and business professionals are faced with ensuring that submitted work is unique, authentic, and not generated by AI. - To counter the risk of plagiarism several AI content detector software tools are being released. =AI Text Classifier by OpenAI: Developed by the company that created ChatGPT. It examines whether a human or computer made text. =GPTZero: Designed to analyze written text and determine the probability that AI may have generated all or part of the text. =Turnitin AI Writing Detection Model: Plagiarism detection software used in many learning management systems (LMS), including Canvas. In addition to plagiarism detection, it also features AI detection.

Opt-in and Opt-out Example

A checkbox may ask if you want to receive news and updates or participate in surveys from the site. - if the box is already checked by default, this is called an opt-out mechanism - with an opt-in feature you must check the box to agree

How Devices Become Infected With Viruses (cont.)

A computer virus attacks a digital device using a series of actions. = The virus arrives-The virus arrives via email attachment, file download, or by visiting a website that has been infected. = Virus activation-An action such as running or opening a file activates the virus. =once activated, the virus copies itself into files and other locations on your computer = The virus spreads-The infection spreads to other computers via infected email, files, or contact with infected web sites = The virus payload is released-The payload or the component of a virus that executes the malicious activity hits the computer and other infected devices.

Four Steps to Protecting Your Digital Privacy

A strong password is usually your first line of defense in safeguarding your digital privacy. - the best way to keep your Internet logins safe is to use a strong password and to never use the same password twice - this would be very difficult to do on your own, so experts suggest using password management software to keep your passwords safe =a typical password manager installs as a browser plug-in to handle password seizure and repeat =when you log in to a secure site, the password management software offers to save your identification =when you return to that site, it will automatically complete the login using your saved information, but will regenerate a new password for the next login

Cybersecurity Exploits

An exploit is the means through which a system vulnerability can be used by a hacker to execute a malicious activity on a system. - includes specific code, command sequences, and open-source exploit kits that are designed to take advantage of software vulnerability or a flaw in system security - allows for an intruder to remotely access a network to gain unwarranted privileges to move deeper into the organization's network

Types of Cybersecurity Breaches

Breaches occur when a hacker gains unauthorized access to an organization's systems, data, and information. - Viruses: Software that infects computers and is created using computer code. - Spyware: Software that collects information about a person's Internet surfing habits and behaviors. - Impersonation: A social engineering tool in which a hacker plays the role of someone the target knows or would likely trust, thereby fooling them into sharing important information - Distributed Denial of Service (DDOS) attack: A cyberattack to make a computer or online service unavailable to its users. It's usually accomplished by flooding the resource with nonsensical or superfluous requests from multiple sources across the web

Cookies: Types, Risks, and Management (cont.)

Cookies pose many potential privacy risks. - websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. - websites can use cookies to track your surfing behavior and use this information to create specific user profiles - corporate and government entities can use cookies to monitor your surfing behavior Managing cookies is an important part of safe and efficient web browsing. - determine what cookie settings are appropriate for your browser use and privacy protection - be aware that cookie settings must be adjusted in each browser you use

Individual Name (cont.)

Cyberattacks Include: - Pharming and phishing - Spamming and spoofing - Trojans and viruses - Identity theft - DoS and DDoS attacks

How Do DBMS Solve File Management Issues?

Data redundancy is the duplication of data: -data redundancy can lead to higher storage fees and inefficient access times Data redundancy often leads to inconsistent data, to illustrate: =if you are managing the data of a gym, let's say the customer needs to change their address =in a file management system, customer data is stored twice =if all the address data is not changed in each record, data inconsistency will occur

E-Commerce Personalization/Customization (cont.)

E-Commerce Personalization Creates Marketing Messages That Contain: - an individual's name - interests - past purchase or interaction behavior

Various Types of E-Commerce Transactions

E-commerce is any transaction that occurs online via the Internet. - Consumer-to-Consumer (C2C): Online marketplaces where one consumer sells to another consumer. eBay, Craigslist, and parts of Amazon allow for C2C transactions. - Consumer-to-Business (C2B): Consumers are able to provide service to businesses often through a bidding or auction type of system - Consumer-to-Administration (C2A): Allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university.

First and Third Party Cookies

First-Party Cookies - First-party cookies are created by a website you visit and keep track of your personal preferences and the current web browsing session. Third-Party Cookies - Third-party cookies are created by a website other than the one you are currently visiting and are used to track your surfing habits. - Third-party cookies are considered an invasion of privacy.

Machine Learning

Machine learning uses data and algorithms to emulate the way humans learn. - These systems improve their accuracy gradually through a continual process of learning. - Machine learning relies on human interaction and input to assist in creating learning. - AI can learn from machine learning models created by inputs and analysis of anticipated outputs.

How Are Ransomware Attacks Launched?

Methods of Attack - Phishing is commonly executed through email messages. Illegitimate file attachments are included in what appears to be a legitimate email message - Built-in social engineering software that tricks a user into allowing administrative access to crucial data. Some ransomware attacks are designed to take advantages of poor security controls and do not require a user to give administrative access.

The Functions of Customer Relationship Management Software

Most customer relationship management (CRM) software helps to organize three main functions: marketing, sales, and customer service. - Marketing incorporates the acquisition of potential marketing leads, segmenting the market, and targeting promotions, such as advertisements, to create a lasting relationship with customers. - Sales involves pricing, managing marketing lead contacts, and organizing sales activities. - Customer service encompasses responding to customers' questions, managing returns, and managing customer contacts to improve customer relationships

Rootkit (cont.)

Take the following steps to defend against rootkits. = Don't ignore software updates-it is important to make sure that your operating system and antivirus software are up to date. = Be aware of phishing emails-phishing messages are designed to trick the user into providing sensitive information or downloading illegitimate software. Be cautious of email messages and file attachments. = Watch out for drive-by downloads-a drive-by download occurs when you visit an illegitimate website that automatically downloads malware onto a device. = hackers have also been known to implant code into a legitimate website which can then execute an automatic download

AI Chatbots Ethics

Transparency: - Covers the consequences of interacting with the software, including information privacy and security, data collection, data usage, and site ownership. - Includes providing information to the user that informs them that they are interacting with a chatbot. Chatbot Identity and Persona: - Traditionally, female identities have been used for chatbots that fill assistant-type roles. - This fashion could negatively reinforce gender stereotypes. Proper Communication: - How the software handles abusive language and generates controversial content should be considered. - How the chatbot is designed to respond to instances where there are mental health issues should be addressed. Accurate Data Representation: - Users of AI chatbots should take precautions to ensure that the data and information that is returned are accurate

Introduction to Artificial Intelligence (AI)

What is AI? - AI is the study and application of processes that combine computer and data science to enable computer-assisted or automated problem-solving. - Sub-fields of AI include machine learning and deep learning.


Set pelajaran terkait

Exocytosis & Endocytosis (module 16-17)

View Set

Disorders of Neuromuscular Function

View Set

The End of The Western Roman Empire

View Set

Biology Chapter 12 Review Questions

View Set

Ch.4&5 Quiz Sports injury management

View Set

psychology of human development chapter 9.

View Set