MIS Test 3

Ace your homework & exams now with Quizwiz!

What are ethics and why are they important to a company?

As it becomes easier for people to copy everything from words and data to music and video, the ethical issues surrounding copyright infringement and the violation of IP rights are consuming the ebusiness world. Technology poses new challenges for our ethics Ethics- principles and standards that guide our behavior toward people

What technologies can a company use to safeguard information?

Authentication and authorization technologies such as biometrics and passwords can protect access. Prevention and resistance technologies such as antivirus software and encryption can protect data in transit. Detection and response technologies such as intrusion detection software can handle an attack if the infiltrator breeches the first two lines of defense

Example of authentication and authorization

Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user. Authorization is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space

How can CPR take advantage of other technological advances to improve security?

CPR can use RDIF to perform automatic inventory counts to determine if any inventory is missing

How are the functions of autonomic computing providing CPR with a competitive advantage?

CPR collaborated with IBM to deliver solutions that are both automated (they can control a definied process w/o human intervention and autonomic (they can sense and respond to conditions in accordance w/ business policies). As a result, IT employees can deliver consistent, reliable service levels at reduced costs since they collaborated with IBM using autonomic computing resources such as Tivoli Risk Manager, access manager, and identity manager

Identify the six epolicies organizations should implement to protect themselves

Ethical computer use policy, information privacy policy, acceptable use policy (AUP), email privacy policy, social media policy, employee monitoring policy

Describe the relationship between hackers and viruses

Hackers are experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by challenge. A virus is software written with malicious intent to cause annoyance or damage. Some hackers create and leave viruses causing massive computer damage.

Explain the ethical issues in the use of informational technology

Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies). Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes between competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or "correct" decision. For this reason, acting ethically and legally are not always the same.

What is the relationship between information management, governance, and compliance?

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively. Information governance is a method or system of government for information management or control. Information compliance is the act of conforming, acquiescing, or yielding information. All are required to ensure a corporation treats information correctly.

Describe the relationship between information security policies and an information security plan

Information security policies identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days. An information security plan details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan

How can a company participating in ebusiness keep its information secure?

Information security takes people and technology. Informing the people about security policies and security issues will help to ensure the information is safe. The company must also implement all of the security technologies from authentication to authorization and prevention and resistance

Examples of detection and response

Intrusion detection software (IDS) features full time monitoring tools that search for patterns in network traffic to identify intruders

Why are epolicies important to a company?

Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for informations. These policies set employee expectations about the organization's practices and standards and protect the organization from missue of computer systems and IT resources. If an organization's employees use computers at work, the organization should, at a minimum, implement epolicies. Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment

What is the correlation between privacy and confidentiality?

Privacy is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Privacy is related to confidentiality, which is the assurance that messages and information remain available only to those authorized to view them. Each time employees make a decision about a privacy issue, the outcome could sink the company

Trend analysis

a trend is examined to identify its nature, causes, speed of development, and potential impacts

Digital paper (electronic paper)

any paper that is optimized for any type of digital printing. Comes from pulp, flexible, information on the sheet can be altered thousands of times and not degrade over time replace displays. environment friendly

Primary information security areas

authentication and authorization, prevention and resistance, detection and response

Computer simulation

complex systems ie. US economy can be modeled by means of math equations and different scenarios can be run against the model to conduct what if analysis

Information privacy policy

contains general principles regarding information privacy

Ethical computer use policy

contains general principles to guide computer use behavior. For example, it might explicitly state that users should refrain from playing computer games during working hours (epolicy)

Example of prevention and resistance

content filtering occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security breach, a thief is unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

Email privacy policy

details the extent to which email messages may be read by others

Tech shaping our future

digital ink, digital paper, teleliving, alternative energy sourcing, autonomic computing

What are the two fundamental building blocks that protect organizational information?

ethics and security

Reasons to watch trends

generate ideas and identify opportunities, identify early warning signs, gain confidence, beat competition, understand trend, balance strategic goals, understand the future of specific industries, prepare for the future

Potential business impact in population increase

global agriculture will be required to supply a lot of food, developed nations will find retirees will have to remain on the job to be competitive and continue economic growth, developed nations will increase immigration limits

Potential business impact of living longer in developed nations

global demand for elderly products and services increase, cost of health care increasing, pharmaceutical companies will be pushed for advances in geriatric medicine

Historical analysis

historical events are studied to anticipate the outcome of current developments

Social media policy

outlines the corporate guidelines or principles governing employee online communications

Acceptable use policy

policy that a user must agree to follow in order to be provided access to corporate email, information systems, and to the Internet

Autonomic computing

self managing computing model named after and patterned on the human body's autonomic nervous system building block of widespread computing, a computing model in which small, even invisible, computers will be all around us, communicating through interconnected networks computers will be able to self heal and self protect, will seek out ways to optimize computing, will require more computer automation

Employee monitoring policy

states explicitly how, when, and where the company monitors its employees

Digital ink (or electronic ink)

tech that digitally represents handwriting in its natural form. broad usage in many applications, point of sale signs, displays in mobile devices, electronic books radio paper: dynamic high res electronic display that combines a paperlike reading experience with the ability to access info anytime, anywhere. It is flexible and could be used to create an electronic book/newspaper with real pages

Potential business impact of pace of tech innovations increasing

time to get products and services to market is shortened by tech. products must capture their market quickly before competition copies them. Industries will face tighter competition based on new tech

Trend monitoring

trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers

Teleliving

using information devices and the Internet to conduct all aspects of life seamlessly, such as shopping, working, learning, playing, praying. interact with life size images, data, and text in their homes Virtual assistant: small program stored on PC tat monitors emails, messages, can help solve problems, writing letters, retrieving files, making phone calls Robotic salespeople will take on human appearances and have the ability to perform all tasks

Trend projection

when numerical data are available, a trend can be plotted to display changes through time and into the future

Alternative energy sources

wind, geothermal, hydroelectric, solar will increase by the end of the decade cost is dropping, deregulation of energy industry, decreasing reliance of oil will help reduce air and water pollution

Trends shaping our future

world population will double in the next 40 years, people in developed countries are living longer, growth in information industries is creating a knowledge-dependent global society, global economy is becoming more integrated, economy + society are dominated by tech, pace of tech innovation is increasing, time becoming most precious commodity

Which of the trends shaping our future will have the greatest impact on CPR's business

~ you make your own answer... also idk what CPR is? beyond like saving people who are drowning i'm thinking increased in population or developed nations' people are living longer

Which of the trends will have lest impact on CPR's business

~ yyour own answer maybe time being a precious commodity, you can just hire more people?

What other forms of advanced technology would you expect Progressive to deploy in the near future?

~~~ your choice, need justification for how Progressive will use the tech to make its business more efficient and effective

Which of the trends shaping our future will have the greatest/least impact on Progressive's business?

~~~~ again, your own response


Related study sets

Permit test (there are 25 questions in the test and 40 in total)

View Set

Microbiology metabolic pathways study I

View Set

Chp 46: #2 Assessment of Eye and Vision

View Set

Adding and Subtracting Fractions - Practice, Adding and Subtracting Fractions, Adding Fractions Unlike Denominators, Fractions, Adding and Subtracting Fractions, Adding Fractions, Subtracting Fractions

View Set