information system +Privacy

Ace your homework & exams now with Quizwiz!

Information systems (IS)

**Design of the processes to develop, manage, and disseminate information to help meet organizational goals **Information theory Computing technology Business management Sociology **61st (12,900 degrees)

Information technology (IT)

**Implementation and management of the technology to develop, manage, and disseminate information **Programming languages Database design Networking and communications System administration **46th (17,978 degrees)

Computer Science (CS)

**Theory, design, and development of computing systems. **Programming languages Algorithms Data structures Computing architectures **37st (22,597 degrees)

spiral method

A modern approach to building information systems where each phase is done in sequence, then that sequence is repeated one or more times, with each phase done more thoroughly each time. Once a system is built, the system is deployed to clients or users. To maintain a system , a developer can update the deployed system . For example, after a mobile app is created and available for download, a developer may find bugs and update the app to fix those bugs or add new features, and make those updates available to users. An IS developer using the spiral method may use multiple iterations of the design cycle phases to build the same computer system.

Microcomputers, such as the MITS

Altair 8800, arrived in the mid-1970s. The Altair's popularity for both home and business use led to a wave of new microcomputers, referred to as personal computers by the general public. The personal computer (PC) was a smaller and cheaper computer, intended for use by one person at a time. Desktop personal computers included items such as a monitor and keyboard, providing users with an interactive interface. Popular PCs at the time included the Apple II and the IBM 5150. Soon PCs became more powerful than the original mainframes. The world also became more connected. Independent organizations, like CompuServe, implemented networks that transferred data over telephone lines called dial-up technology. By the 1980s, individuals and companies using dial-up technology could transfer large amounts of information to other cities and countries with the click of a button.

hidden information about a user's activities are stored in modern computer systems

An Internet connection transmits the sender's IP address along with the info the user sends, such as an email or a request to view a webpage. Websites and apps store the address, and other info like where a user's mouse spends time on a webpage. Many apps and devices, like TVs, tablets, and mobile phones, exchange information with the user knowing. For example, an app on a mobile phone may communicate location data back to a server, or a camera app may embed location information in an imageEXIF is a common image format that include metadata. Metadata refers to extra information that describes data, like location information for image data, or author information for a word processing document. Even when not on the Internet, everyday activities generate data. Going to the doctor, purchasing items with a credit card, or even turning on a TV may lead to data being recorded about a user. Data collected about someone can be used to infer even more about that person. Ex: A tweet saying a person is on vacation and a public record linking a person's name and address could be used to identify a good target for robbery.

protect privacy as searching capabilities improve.

Assume information will be available: Assume information will eventually be searchable and findable — even if the techniques aren't available today. Stay informed When they appear, read news stories about what kind of information can be made public. Keep in mind policies may change in the future. **Periodically check privacy settings for any app used. **Users should search regularly to see what information regarding the user is available for others to see. Choose apps used Only provide as much personal information as is needed. **Always assume information will become findable later. **Before providing information in a form — online or even paper — consider what the information is needed for.

Strategies to avoid others from listening.

Choose apps used Learn to recognize encryption technologies and use encryption technologies whenever possible. **Use a secure method to communicate any sensitive information. Ex: If a website offers an option where the URL begins with "https" rather than "http", use https. **Ensure apps use encryption to send email and private messages. Ex: For local email-client apps use TLS/SSL or PGP. Get the facts: Ensure encryption technology used is up-to-date. Encryption is regularly breached so improved protocols are often being developed. Ex: The more recent WPA2 wifi protocol is more secure than WPA, and similarly WPA is more secure than WEP. Keep account information secure: Keep passwords, PINs, and private keys secret. A user's password and PIN information is only needed by that user.

Strategies to protect a user's identity

Customize the technology: Use privacy tools such as Ghostery, Disconnect, or Privacy Badger to limit a websites' ability to track user activities. Choose apps: used Only provide as much personal information as is needed. *Always assume there is no anonymity, and therefore less privacy, when doing something electronically. *Before providing information in a form — online or even paper — consider what the information is needed for.

minimize a user's information footprint.

Customize the technology: check privacy settings on mobile apps, computer software, and online accounts. Settings that can typically be turned off: Location services, which provide GPS information about current location Metadata in images Sharing contact information with third parties Communicate about preferences: Check privacy status with companies. Banks, insurance providers, hospitals, and other companies are often legally bound to let users opt out of at least some types of data sharing. Choose apps used Delete online accounts not in use and remove content that is no longer needed.

Computer and information systems manager

Determine the computer technology goals for an organization and implement the information systems to meet those goals. Management positions may also require an MBA. Computer systems; finance and insurance; information; management of companies and enterprises; manufacturing $131,600

Many companies and employees have noticed some benefits of allowing telecommuting, including:

Fewer sick days and vacations: Before telecommuting, many employees would be forced to take a sick day or vacation to tend to family conflicts (sick child, doctor's appointment, etc.). Increase in productivity: By reducing or eliminating commuting time, employees are able to begin work earlier and be more productive throughout the day. Better work/life balance: Employees are often provided with schedule flexibility during the day, allowing employees to set hours for work and participate in other activities. More cost effective: Telecommuting cuts down on commuting, attire, and food costs for employees. Telecommuting can also save companies money by cutting down real estate space, energy usage, and employee relocation costs. Increases talent pool: Companies that allow telecommuting can hire employees that are not local to the area, thereby widening the net for potential hires.

Cloud computing EX

File storage: Dropbox, iCloud, Google Drive, Microsoft Office 365 Data processing & spreadsheets: Google Apps suite (Docs, Sheets, Slides, Forms), Microsoft Office 365 Developer tools: GitHub, BitBucket, Codeanywhere, Cloud9, JSFiddle Photo editing, drawing, and storage: Flickr, Adobe Creative Cloud, Google Photos Databases and business management: Salesforce.com Music streaming: Pandora Radio, Spotify, Tidal, Apple Music Video streaming; YouTube, Netflix, Hulu, Amazon Prime Video, Vimeo

Information system careers

IS careers exists in a variety of sectors including retail, finance, nonprofit, and government organizations.

Information systems degrees

IS degrees focus on the technologies used to develop, manage, and disseminate information to help meet organizational goals. IS programs are typically part of the School of Business or the School of Computing, and fall into three categories: computer, management, and business. Courses cover a number of topics including computing technology, business management, managerial communication, and sociology

Pascaline.

In 1642, Blaise Pascal invented a mechanical calculator The Pascaline became the first calculator to be used in a business setting. During the industrial age, and especially after the turn of the 20th century, computational technology became increasingly powerful and useful in business settings. Other discoveries and inventions, such as the telegram, phonograph, telephone, and electricity greatly impacted the future of computing and IS.

Disadvantages of telecommuting may include:

Isolation: Some employees may feel isolated from others and don't feel like they are part of the team. Diminished productivity: Employees may have trouble dealing with the distractions outside of the workplace resulting in reduced productivity or quality. Collaboration: Telecommuters cannot just walk across the office to brainstorm with peers or ask for help when needed. Communication: Email is a common method of communication, but can be a challenge because of the lack of vocal and facial cues, difficulty in describing complex assignments or ideas, and delayed communication. Video chat applications such as Skype and FaceTime can be used to improve communication, but cannot always match face-to-face interactions. Supervision: Executives and managers do not have direct oversight and may have difficulties ensuring employees are working the required hours, as most telecommuters don't clock in and out.

Cloud applications have advantages over local drive applications, including:

Little to no software installation: Many applications in the cloud run on remote servers and process or stream data in real-time, thus alleviating users from having to download large software programs that require significant amounts of disk space. Up-to-date software: Applications running on the cloud are the most recent releases. Lower cost: Some software applications are very expensive. For example, the Adobe Creative Suite 6 Master Collection, a drawing, photo, and video editing suite, once cost $2,599. Adobe Creative Cloud has moved to a subscription model that offers the same suite of applications for $50 a month, which is cheaper if only needed for a short time. Eliminates the need for physical media: To listen to music or watch videos on the computer, users could only play physical disks (CDs, DVDs) or media files on the local drive. Current applications like Netflix and Spotify allow users to stream videos and music in the respective online libraries. Access from many locations and devices: Cloud applications can be accessed by various user devices and from various locations.

Cloud storage has several advantages over storing files solely on a local computer drive:

Local storage is limited. Moving lesser-used files to cloud storage, such as large video files, can make room in local storage for more regularly-used files. Files on cloud storage can serve as a backup. A backup is a copy of a file kept in case the local version is accidentally damaged or lost. Files on cloud storage can be accessed by various user devices and from various locations.

Information can be manipulated or misinterpreted

Messages may be taken out of context and are often missing cues that convey the user's intent. Information may be shared with others who are not intended as the target audience, and may interpret the information according to their own expectations and viewpoints.

client-server architecture

Organizations using multiple computers to handle daily tasks began connecting the computers together to share company resources and collaborate. The process employed which let each user to log into a local area network (LAN) from their PC (the client) by connecting to a larger computer (the server). The servers gave users access to various resources on the company's network.

Network and computer systems administrator

Responsible for daily operation of an organization's computer networks. Computer systems; information; educational services; finance and insurance; administrative and support services $77,810

Information can be made public

Secure data storage can be compromised; user accounts could be hacked or the employees of a service can access user data from the back end. Private data from cell phones, email accounts, and computer hard drives can be subpoenaed and used in court.

Computer systems analyst

Study an organization's current computer systems and implement IS solutions to help the organization run more efficiently. Computer systems; finance and insurance; management of companies and enterprises; information; state and local government $85,800

systems development life cycle or SDLC

The SDLC phases include analysis, design, implementation, and testing. **The analysis phase determines the goals and requirements for a system. **The design phase determines the specifics of how to build a system. **The implementation phases builds the system according to the design. **The testing phase checks that the system functions properly and meets or exceeds the requirements.

contain personal information on the Internet

Think before posting: Be cautious of whom information is shared with. Information shared on the Internet can be duplicated. *Users do not have control over the duplicated information or the ability to erase the information. *Consider how the information will be interpreted by others who may not be the intended target audience. *Consider how a user's interests might change over time. Check app settings The default privacy settings on many apps is to share every type of information with the widest audience possible. *Limit sharing by update settings to "opt out". *Consider which groups of people information is shared with — then set sharing to include only those groups. Communicate about preferences: Check privacy status with companies. Banks, insurance providers, hospitals, and other companies are often legally bound to let users opt out of at least some types of data sharing.

negative consequences of online behavior.

Think before posting: Consider how the information may affect the user and others within the user's social circle. Formulate posts as positively as possible Keep in mind that information is easily misinterpreted Get the facts Check the source of the information before repeating or reacting to the information. Communicate about preferences Communicate: Get consent before sharing information about others Communicate preferences about the types of information others should (or should not) share Check app settings The default privacy settings on many apps is to share every type of information with the widest audience possible. Limit sharing by updating settings to "opt out" Consider which groups of people information is shared with — then set sharing to include only those groups

Strategies to protect user information

Think before posting: Consider if the information could harm the user if the information was made known to family, employers, or social connections **Get the facts: Before signing up for a "free" service, consider how the service makes money. **Think through user preferences for websites, apps, and services that share user data, including: How much user apps collect and record (including personal/contact information, posts, and metadata). How apps use collected data. Whether and under what circumstances apps share user data with third parties. **Communicate about preferences: Check privacy status. Pay attention to mail and email about privacy. If users don't respond, apps may share information by default.

information can be replicated

Websites are crawled, analyzed, and cached by search engines. Automatically backing up or mirroring information is a common practice. Other users frequently repost (retweeting, etc.) social-media content and forward email and text messages.

Information can be sold

Websites' privacy settings and copyright terms often change. Websites can collect and sell user information to other businesses.

protocols involving encryption.

Wi-Fi: WPA2 (Wi-Fi Protected Access II) WPA (Wi-Fi Protected Access) WEP (Wired Equivalent Privacy) Email: PGP (Pretty Good Privacy) SSL (Secure Sockets Layer) Web: HTTPS (HyperText Transfer Protocol Secure) File transfer SFTP (Secure File Transfer Protocol)

enterprise resource planning (ERP)

a software-based integrated management system that ran on a client-server architecture. ERP employed a central database and was able to keep track of business activities, such as finance, supply chain, and manufacturing, in real time.

waterfall method

build an information system via a waterfall method where each phase is done in sequence, entirely completing one phase before moving to the next phase. An IS developer has the following problem: Develop a computer system for a small charter school with 80 students that allows students to register for classes, send emails, and turn in classwork. Us ing the waterfall development method, the developer would follow the analysis, design, implementation, and testing phases, in that order.

Electronic Numerical Integrator And Computer (ENIAC)

built in 1946, was one of the first electronic computers used by the U.S. Army to calculate artillery firing tables. ENIAC was approximately 1000 times faster than previous electromagnetic computing machines. IBM and General Electric soon followed with the manufacture of large powerful computers known as mainframes, which were primarily used to organize large amounts of information. Initially, only governments, large companies, and universities were able to afford and use such advanced computing technology. In 1969, the Advanced Research Projects Agency Network (ARPANET) introduced a framework to transfer of information between educational and government organizations working together on joint projects, laying the foundation for the Internet. As computing technology became more prevalent, companies began to devise ways to better integrate technology within a business setting.

data mining

can analyze language usage, faces, locations, and other items to match a unique individual.

Phishing الخداع

emails fraudulently ask users to provide sensitive account information by posing as legitimate companies.

information system (IS

is a collection of hardware, software, and networks that people use to create, store, organize, and distribute information. The term IS (pronounced as separate letters) is often used in educational, organizational, and business settings. IS has three components: technology, people, and business/organization method.

EXIF

is a common image format that include metadata.

certification

is a process that ensures a person is proficient in a particular skill set. A company may require an applicant to have various certifications to ensure the applicant possesses the skills needed for a particular job. Certifications are provided by independent groups, such as CompTIA and SANS, as well as by technology companies, such as Microsoft, Cisco, and Intel.

Software as a service (Saas)

is a type of business model where users pay for a vendor's apps, which process and store data on the cloud.

Infrastructure as a service (IaaS)

is a type of business model where users pay to access computing resources such as servers, storage, and networking. Such services enable small companies to avoid some initial start-up costs, getting applications off of the ground faster, and requiring less in-house maintenance. AmazonWeb Services (AWS) is a popular example of an IaaS that provides users with direct access resources, and enables users to configure and scale the underlying system as needed. Netflix utilizes AWS as the underlying infrastructure to provide scalable, distributed streaming video services to consumers. Other IaaS examples include Cisco Metapod, Microsoft Azure, DigitalOcean, and Google Compute Engine.

Platform as a service (PaaS)

is a type of business model where users pay to access vendor's platforms or toolkits to develop and deploy new applications. Vendors reduce the complexity of building new systems and software by abstracting away many of the lower level server, storage, operating system, and networking details. Google App Engine is an example of a PaaS that enables users to build web and mobile apps, then once deployed, automatically scales the underlying infrastructures as needed. Other PaaS examples include AWS Elastic Beanstalk, Windows Azure, Heroku, and Force.com. Cloud computing services have exploded in popularity because of high computing power and the low cost of service. Companies have stated that productivity has improved due to using cloud applications.

Information technology

is often viewed as a subcomponent of information systems. Information systems focus on the management of the information itself, while information technology focuses on the underlying computing resources needed to facilitate the management of the information.

Cloud storage

is the storage of files on remotely-located servers, with those files being managed by apps via the web.

good practice

is thus to periodically check and update privacy settings, if possible, to limit unintentional information sharing.

cryptographic key مفتاح التشفير

is used by an algorithm to transform plaintext into ciphertext or ciphertext into plaintext. The stronger the encryption, the more computing resources are needed to break the encryption and access the user information.

Telecommuting

is where an employee works outside of the traditional office space, typically from a remote location such as home, a coffee shop, or hotel.

A television manufacturer in the 1960

may utilize MRP software, running on a set of mainframe computers at the company headquarters, to keep track of budgets, inventory, sales, payroll, contracts, etc. Mainframe computers are also used by the engineering and sales teams to perform large scale calculations. The people involved include the company's executives, designers, engineers, managers, factory employees, and sales and advertising representatives. Workers communicate using telephones and typewriters.

communication protocol

meaning the rules for transferring information among computers, often includes encryption.

Metadata

refers to extra information that describes data, like location information for image data, or author information for a word processing document.

Cloud computing

s a form of computing that provides users with processing resources, data, and storage on the Internet, available from any device with Internet access, in contrast to local processing and storage. Before cloud computing, files such as documents, pictures, songs, and videos, were stored on a local disk and applications to access or process those files were installed on a computer's local hard disk drive (HDD). Now, there are many Internet applications that are used for the same purposes. Examples include:

Encryption التشفير

scrambles plaintext into a cyphertext to prevent unauthorized users from accessing the information. Encryption is similar to writing a postcard using a secret code language, so that the information is not readable along the delivery route. While privacy and security are two different concepts, without security there is no privacy.

automation

using computers and machines to perform tasks once performed by a person, to cut costs and often increase production speed.

Materials requirements planning (MRP)

was developed in the late 1960s as a software-based business integration system method, which used computing technology to organize company manufacturing resources.

ommercial Internet use began in mid-1989

when CompuServe offered email service over the Internet. During the 1990s, more people bought PCs and gained access to the Internet. As a result, companies created website on the Internet to expand their reach to customers. Selling goods and services over the Internet is called electronic commerce, or e-commerce. 1994 and 1995 marked a turning point in e-commerce with the creation of Amazon.com (originally just a bookstore), AuctionWeb (now called eBay), and the web directory Yahoo!. By 2000, company websites and e-commerce were common. Large investments in e-commerce led to the dot-com bubble and the subsequent dot-com bust when many of the Internet-based companies failed.

offshoring

where company processes are performed overseas to take advantage of lower costs. For example, Nike has 161 factories in China. The combination of offshoring and automation has lead to a decline in American manufacturing jobs. China


Related study sets

Geology Final - Geologic Structure

View Set

ch5 analyzing the marketing environment

View Set

KNSFHP Addictive Behaviors study 3/3

View Set