ISQS exam 2
1. What is the overarching goal of AI? (See the AI: A textbook definition section in the article.)
Its goal is to enable the development of computers that are able to do things normally done by people -- in particular, things associated with people acting intelligently.
1. According to the article: "What many people often do not understand is that what is ________ is not always _________."
Legal, ethical
1. According to the video, what are some of the statistics for cyber attacks and data breaches?
Only 50% of cyber-attacks are successful.
1. What did research out of Oxford suggest about how many jobs may be automated by machines?
That 1 and every 2 jobs will be automated by machines.
1. This article describes IoT as "a pretty simple concept." What definition of IoT does the article provide in describing this concept?
The Internet of Things, or "IoT" for short, is about extending the power of the internet beyond computers and smartphones to a whole range of other things, processes, and environments. taking all the things in the world and connecting them to the internet
1. What does the article suggest is the "real power of the Internet of Things"?
The real power of IoT arises when things can both collect information act on it.
1. How does the Internet of Things work?
There are censors in everything around us that tell us what is going on and what needs to be fixed if something is wrong.
Creative Commons
is a nonprofit organization that provides legal tools for artists and authors. The tools offered make it simple to license artistic or literary work for others to use or distribute in a manner consistent with the author's intentions. Creative Commons licenses are indicated with the symbol
Trademark
is a word, phrase, logo, shape or sound that identifies a source of goods or services. For example, the Nike "Swoosh," the Facebook "f", and Apple's apple (with a bite taken out of it) are all trademarked
1. What does the term ethics mean?
"a set of moral principles" or "the principles of conduct governing an individual or a group."
1. What are the key challenges the article suggests need to be addressed to create a health AI ecosystem?
1. BIAS BUILT INTO DATA 2. AI-INDUCED BIAS 3. TEACHING AI HUMAN RULES 4. EVALUATING CASES OF SUSPECTED AI BIAS
1. What does Carlos Sandrea, VP and head of mobile at MediaMath, suggest about new technologies and their impact on mobile?
New technologies will continue to lay fertile ground for more consumer engagement, but, at the same time, the proliferation of touch points will increase the complexity of delivering a coherent consumer journey," "Mobile will become the predominant media channel and will be defined beyond our smartphones to include wearables, connected cars, VR-power devices, and chatbots."
1. Determine the most common sources for cyber attacks?
Our data and personal information
1. What does the article suggest that "proactively establishing a set of professional ethics" might do for you?
can help you navigate the complex interactions and relationships encountered in the workplace. After all, at work you have relationships with co-workers, employers, customers, clients, users, and the community.
1. IoT is a "significant driver" of what? Why?
of big-data analytics projects because it allows companies to create vast data sets and analyse them. Giving a manufacturer vast amounts of data about how its components behave in real-world situations can help them to make improvements much more rapidly, while data culled from sensors around a city could help planners make traffic flow more efficiently.
1. "Mounting evidence" suggests "that using a smartphone, or even hearing one ring or vibrate," does what regarding concentration, reasoning, and performance?
produces a welter of distractions that makes it harder to concentrate on a difficult problem or job. The division of attention impedes reasoning and performance
1. In your own words, define information systems ethics.
the study of the ethical issues arising out of the use and development of electronic technologies
AUP is
this policy outlines what is allowed and what is not allowed while someone is using the organization's services . Examples are "Borrowing" someone else's login ID and password is prohibited. · Using the provided access for commercial purposes, such as hosting your own business website, is not allowed. · Sending out unsolicited email to a large group of people is prohibited.
Intellectual property is
"property (as an idea, invention, or process) that derives from the work of the mind or intellect."[4] This could include creations such as song lyrics, a computer program, a new type of toaster, or even a sculpture.
1. What are the three categories that an IoT device can be put into?
1. Collecting and Sending Information 2. Receiving and Acting on Information 3. Doing Both
1. According to the article, how many hours per day does the average person spend interacting with his or her smartphone?
5 hours per day
1. What are some of the other applications for blockchain technologies mentioned on the website besides cryptocurrencies (i.e., see the "Blockchain in Action" section)?
A blockchain can help buyers quickly establish that a ticket (and its seller) can be trusted. The owner is given a private key, which is a hash of the address data. A smart contract is a piece of computer code that describes a transaction step by step. It can connect to multiple blockchains, tracking multiple assets, so it can swap those assets as needed to execute the transaction. But digitally-issued identification via blockchain could be a more secure mechanism.
1. What are the parts of a successful cyber security approach and what does it involve?
A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. A unified threat management system can automate integrations across select Cisco Security products and accelerate key security operations functions: detection, investigation, and remediation.
1. Differentiate between data and AI-induced biases.
After all, data give AI sustenance, including its ability to learn at rates far faster than humans. However, the data that AI systems use as input can have built-in biases, despite the best efforts of AI programmers.
_________________ was the cryptocurrency blockchain was initially created to support?
Bitcoin
1. What are the security best-practices the article mentions?
Lock all devices. Get in the habit of doing this every time you leave your desk. For Windows users, press and hold the Windows key, then press the "L" key. For Mac users, press Control + Shift + Eject (or the Power key) at the same time. Lock your docs. Store all of your documents in a locked cabinet, rather than leaving sensitive information hanging around your desk. Before leaving for the day, stow important documents into a safe or locked cabinet. Properly discard info. When you're throwing away or getting rid of documents and files, make sure you're shredding them and discarding them appropriately
1. According to the article, what has become a major weak point for an organization's information security, and what number backs this up?
Reports have shown that as much as 90% of cyberattacks are caused by human behavior. That being said, all businesses must employ some sort of cybersecurity training for team members to understand their responsibilities, learn how to protect sensitive information, and recognize signs of malicious threats.
1. What are some benefits of SDLC? Likewise, what are some pitfalls?
SDLC done right can allow the highest level of management control and documentation. Developers understand what they should build and why. All parties agree on the goal upfront and see a clear plan for arriving at that goal. Everyone understands the costs and resources required. Several pitfalls can turn an SDLC implementation into more of a roadblock to development than a tool that helps us. Failure to take into account the needs of customers and all users and stakeholders can result in a poor understanding of the system requirements at the outset
1. What is the Internet of Things (IoT)? What does the article suggest can be "transformed into an IoT device"? What does the article also suggest are not considered IoT devices?
The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. it's possible to turn anything, from something as small as a pill to something as big as an aeroplane A smartwatch or a fitness band or other wearable device might be counted as an IoT device
1. According to the article, which emerging technologies are redefining mobile technology? In what ways are each of these technologies redefining mobile?
Voice will have the largest impact on mobile design, according to Tom Anderson, GM of mobile at TripleLift. Indeed, mobile voice has an advantage over other voice-enabled home devices, because the phone hardly ever leaves its owner's side. Immersive Realities VR Facial Recognition Facial recognition already has made its way into both Apple and Android devices and onto platforms such as Facebook, which uses the technology to, for example, suggest photo tags and protect users from strangers using their photos.
1. What are the most common SDLC models, according to the reading? What are some of the key features of each?
Waterfall Model This SDLC model is the oldest and most straightforward. With this methodology, we finish one phase and then start the next. Each phase has its own mini-plan and each phase "waterfalls" into the next. The biggest drawback of this model is that small details left incomplete can hold up the entire process. Agile Model The Agile SDLC model separates the product into cycles and delivers a working product very quickly. This methodology produces a succession of releases. Iterative Model This SDLC model emphasizes repetition. Developers create a version very quickly and for relatively little cost, then test and improve it through rapid and successive versions. One big disadvantage here is that it can eat up resources fast if left unchecked. V-Shaped Model An extension of the waterfall model, this SDLC methodology tests at each stage of development. As with waterfall, this process can run into roadblocks. Big Bang Model This high-risk SDLC model throws most of its resources at development and works best for small projects. It lacks the thorough requirements definition stage of the other methods. Spiral Model The most flexible of the SDLC models, the spiral model is similar to the iterative model in its emphasis on repetition. The spiral model goes through the planning, design, build and test phases over and over, with gradual improvements at each pass.
Do not track is
a technology and policy proposal that enables users to opt out of tracking by websites they do not visit, including analytics services, advertising networks, and social platforms
Patents
are another important form of intellectual property protection. A patent creates protection for someone who invents a new product or process Examples of patents are · circuit designs in semiconductors; · prescription drug formulas; · firearms; · locks; · plumbing; · engines; · coating processes; and business processes
According to the definition provided in the article, "artificial intelligence is a sub-field of
computer science
1. Identify the objectives for those working on building AI-based systems? (See the Strong AI, weak AI and everything in between section in the article.)
in that any result can be used to not only build systems that think but also to explain how humans think as well.
Copyright
is the protection given to songs, computer programs, books, and other creative works. Examples are Who can make copies of the work. · Who can make derivative works from the original work. · Who can perform the work publicly. · Who can display the work publicly. · Who can distribute the work.
1. What is social engineering, and what tactics do hackers use when attempting a social engineering attack?
is the psychological manipulation of people into performing actions or divulging confidential information. They try to gain your trust and make their story more relevant. They want to trick you into doing something. First tactic is phishing. Second is malware, can take your passwords and even watch you. Third is credential harvesting. Last one is Phone Phishing.
A hash function
takes the information in each block and uses it to create the hash—a unique string of characters
1. Why are phishing and social engineer attacks so successful?
Because they appear to come from a credible source, deceiving the end user into thinking it's a piece of communication they can trust. Tell-tale signs of a phishing attempt include typos, links containing a string of random numbers and letters, an odd sense of urgency, or just generally something feeling off about the information being requested.
1. What is the brief history of IoT, and what technologies helped to bring about IoT as we know it today?
The idea of adding sensors and intelligence to basic objects was discussed throughout the 1980s and 1990s (and there are arguably some much earlier ancestors), but apart from some early projects -- including an internet-connected vending machine -- progress was slow simply because the technology wasn't ready
1. What happens when our brains "grow dependent" on smartphones?
The intellect weakens
1. What is the software/ system development life cycle (SDLC)?
refers to a methodology with clearly defined processes for creating high-quality software. in detail, the SDLC methodology focuses on the following phases of software development: · Requirement analysis · Planning · Software design such as architectural design · Software development · Testing · Deployment is a process that produces software with the highest quality and lowest cost in the shortest time possible
1. What skills and competencies should a software developer have, according to this reading?
Creativity and innovation: Yours should be the minds behind new software capabilities, even when others say it can't be done. Interpersonal and communication skills: You won't be working in a void. This job often involves collaboration with a team, and you'll have to be able to concisely and clearly communicate instructions to others. Analytical skills: You'll have to match improvements and creations to users' and clients' needs. Concentration and focus: Software development involves numerous and minute interlocking pieces. You can't be prone to distraction if you want to be successful. Problem-solving skills: Software developers need to be able to solve the problems that occur during the development process.
1. What are some tools to help prevent cyber attacks? Are they sufficient to help prevent the modern cyber attack? Why or why not? If not, what else can help?
Cyber self-defense strategy
1. What is cyber security?
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
1. What are some of the ways the article suggests will help you to create a better relationship with your mobile device? Consider and state how these suggestions will help you specifically (if at all)?
Delete social media apps from your phone. Disable notifications, including those for email. "Do Not Disturb While Driving"
1. What is cyber self-defence, what are its tactics (understand the specifics here), and what is the cyber self-defense golden rule?
Don't click! Use strong passwords Don't Use same passwords Stop using passwords Patch yourself "trust, but verify"
1. Is data privacy an issue for IoT? Why or why not?
One recent survey found that four out of five companies would be unable to identify all the IoT devices on their network. Badly installed IoT products could easily open up corporate networks to attack by hackers, or simply leak data. It might seem like a trivial threat but imagine if the smart locks at your office refused to open one morning or the smart weather station in the CEO's office was used by hackers to create a backdoor into your network.
1. In your own words, what does a software developer do?
Software developers are the creative minds behind software programs, and they have the technical skills to build those programs or to oversee their creation by a team. They create software that enables users to perform specific tasks on computer devices. Those tasks might involve playing a game, watching a movie, writing a business letter, or building a spreadsheet. Specialized software is created or customized for virtually every profession, industry, and government department
1. What does ethics have to do with information systems and information technologies?
The introduction of new technology can have a profound effect on human behavior. New technologies give us capabilities that we did not have before, which in turn create environments and situations that have not been specifically addressed in an ethical context.
1. What is a blockchain "at its heart"? In what ways are blockchains used for more than just the "movement of money"?
a blockchain is a record of transactions, like a traditional ledger. These transactions can be any movement of money, goods or secure data—a purchase at a supermarket, for example, or the assignment of a government ID number.
1. Identify and define the SDLC stages/ best practices listed in this reading.
1. Identify the Current Problems "What are the current problems?" This stage of the SDLC means getting input from all stakeholders, including customers, salespeople, industry experts, and programmers. Learn the strengths and weaknesses of the current system with improvement as the goal. 2. Plan "What do we want?" In this stage of the SDLC, the team determines the cost and resources required for implementing the analyzed requirements. It also details the risks involved and provides sub-plans for softening those risks. 3.Design "How will we get what we want?" This phase of the SDLC starts by turning the software specifications into a design plan called the Design Specification. All stakeholders then review this plan and offer feedback and suggestions. 4. Build "Let's create what we want." At this stage, the actual development starts. It's important that every developer sticks to the agreed blueprint. Also, make sure you have proper guidelines in place about the code style and practices. 5. Code Test "Did we get what we want?" In this stage, we test for defects and deficiencies. We fix those issues until the product meets the original specifications 6. Software Deployment "Let's start using what we got." At this stage, the goal is to deploy the software to the production environment so users can start using the product.
1. Summarize the key findings for the research/ studies listed in the article.
A 2015 Journal of Experimental Psychology study , involving 166 subjects, found that when people's phones beep or buzz while they're in the middle of a challenging task, their focus wavers, and their work gets sloppier--whether they check the phone or not. Another 2015 study, which involved 41 iPhone users and appeared in the Journal of ComputerMediated Communication, showed that when people hear their phone ring but are unable to answer it, their blood pressure spikes, their pulse quickens, and their problemsolving skills decline. The researchers recruited 520 undergraduate students at UCSD and gave them two standard tests of intellectual acuity. One test gauged "available cognitive capacity," a measure of how fully a person's mind can focus on a particular task. The second assessed "fluid intelligence," a person's ability to interpret and solve an unfamiliar problem. The only variable in the experiment was the location of the subjects' smartphones. Some of the students were asked to place their phones in front of them on their desks; others were told to stow their phones in their pockets or handbags; still others were required to leave their phones in a different room. The results were striking. In both tests, the subjects whose phones were in view posted the worst scores, while those who left their phones in a different room did the best. The students who kept their phones in their pockets or bags came out in the middle. As the phone's proximity increased, brainpower decreased.
1. Fundamentally, how does blockchain technology work (make sure you include concepts such as blocks, hash, etc. in your explanation)?
A blockchain needs to do two things: gather and order data into blocks, and then chain them together securely using cryptography.
1. What is the "DevOps movement"?
Developers are now responsible for more and more steps of the entire development process. We also see the value of shifting left. When development and Ops teams use the same toolset to track performance and pin down defects from inception to the retirement of an application, this provides a common language and faster handoffs between teams.
1. What are the duties and responsibilities of a software developer listed in this reading?
Developers can work in systems software or in applications such as those for mobile devices, but their duties are similar in many cases.1 Develop and test software to meet consumers' and clients' needs. Recommend and develop upgrades for existing applications. Create models and diagrams to show programmers the code needed for applications. Monitor quality and performance of applications through testing and maintenance. Document all work for future reference.
1. What kinds of tasks do machines do well at? Conversely, what kinds of tasks do humans do well at (generally)?
Humans can solve problems we have never seen before where as machines need data to learn and solve
1. What does this article suggest is the reason why we need professional ethics?
IT professionals to act in an ethical manner in the performance of our work duties. To inadvertently do otherwise risks losing the trust of our students, faculty, staff, communities, and the general public. Without such trust I have difficulty imagining how IT professionals can continue to perform their duties effectively.
1. Differentiate between "strong AI", "weak AI", and the "in-between" AI. In this regard, also differentiate between IBM's Deep Blue and Watson systems. Also, what is the "important takeaway" the article mentions?
In between is systems that are informed or inspired by human reasoning, These systems use human reasoning as a guide, but they are not driven by the goal to perfectly model it. IBM deep blue is a system that was a master chess player, but certainly did not play in the same way that humans do. IBM Watson is Watson builds up evidence for the answers it finds by looking at thousands of pieces of text that give it a level of confidence in its conclusion. It combines the ability to recognize patterns in text with the very different ability to weigh the evidence that matching those patterns provides.
1. At its very core, what does machine learning do? As suggested in the talk, what are some example tasks where machine learning is used?
It allows machines to learn from data and mimike some things that humans can do. Somethings it can do is sort the mail, they can grade highschool essays, they disnosgned a eye dieses,
1. Differentiate between "narrow AI" and "general AI".
Narrow AI is applied to a single task such as a chatbot, virtual assistant or self-driving car. General AI is is the hypothetical ability of an intelligent agent to understand or learn any intellectual task that a human being can
1. What should a solid security awareness training program cover?
Similarly, employees should be using best practices when it comes to passwords they're creating, especially for passwords used to access IT environments This may be less obvious to employees, but they should be wary of network connections used outside of their home or work. Even if data on their device is encrypted, it's not necessary that a connected network transfers that data in an encrypted format, which opens the door to many different vulnerabilities
1. How big is the Internet of Things? What are some of the estimates regarding its growth (i.e., what are the numbers)?
Tech analyst company IDC predicts that in total there will be 41.6 billion connected IoT devices by 2025, or "things." Another tech analyst, Gartner, predicts that the enterprise and automotive sectors will account for 5.8 billion devices this year, up almost a quarter on 2019
1. What does the article suggest is the "takeaway definition" of IoT? Also, what does the article suggest as to why IoT matters?
The Internet of Things, or IoT, is about extending the power of internet connectivity beyond computers to a whole range of other things, processes, and environments. Those connected, smarter, things are used to gather information, send information, or both. IoT provides businesses and people better insight into and control over objects and environments that are currently beyond the reach of the internet. By doing so, IoT helps businesses and people to be more connected to the world around them and to do more meaningful, higher-level work.
Privacy is
The ability to maintain our privacy has eroded substantially in the past decades, due to information systems
1. What does the article suggest are the main business benefits to IoT?
The benefits of the IoT for business depend on the particular implementation; agility and efficiency are usually top considerations. The idea is that enterprises should have access to more data about their own products and their own internal systems, and a greater ability to make changes as a result.
1. What are the main aims of cyber attacks?
These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
NORA is
This process of collecting large quantities of a variety of information and then combining it to create profiles of individuals is known