C954 - Section 6: Global Information Systems and Information Ethics

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

geoeconomics

The effects of geography on the economic realities of international business activities

2
New cards

employee monitoring policy

stating explicitly how, when, and where the company monitors its employees

3
New cards

e-discovery

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

4
New cards

digital rights management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

5
New cards

counterfeit software

software that is manufactured to look like the real thing and sold as such

6
New cards

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

7
New cards

information ethics

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation of practices that govern employee conduct

8
New cards

confidentiality

Confidentiality is one of the components of the CIA Triad, which also includes integrity and availability

9
New cards

Child Online Protection Act (COPA)

A law that protects minors from accessing inappropriate material on the Internet.

10
New cards

e-policies

policies and procedures that address the ethical use of computers and the internet in the business environment

11
New cards

cyberbullying

Threats, negative remarks, or defamatory comments transmitted via the Internet or posted on a website.

12
New cards

threat

an act or object that poses a danger to assets

13
New cards

click fraud

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser

14
New cards

competitive click fraud

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

15
New cards

ethical computer-use policy

contains general principles to guide computer user behavior

16
New cards

bring your own device (BYOD)

policy allows employees to use their personal mobile devices and computers to access enterprise data and applications within policy guidelines

17
New cards

information privacy policy

contains general principles regarding information privacy

18
New cards

fair information practices

a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

19
New cards

acceptable use policy (AUP)

A policy that a user must agree to follow in order to be provided access to a network or to the internet

20
New cards

nonrepudiation

A contractual stipulation to ensure that ebusiness participants do not deny their online actions

21
New cards

internet use policy

contains general principles to guide the proper use of the internet

22
New cards

cybervandalism

a problem that occurs when someone registers purposely misspelled variations of well-known domain names

23
New cards

website name stealing

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner

24
New cards

internet censorship

government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens

25
New cards

email privacy policy

Identifies the personal data your organization collects (i.e., email addresses, first names, last names), how the data can be used, and if the information can be shared with third parties

26
New cards

mail bomb

sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning

27
New cards

spam

unsolicited email

28
New cards

social media policy

Outlines the corporate guidelines or principles governing employee online communications

29
New cards

social media

The means of people interacting online, where they can create, share, and exchange information and ideas in virtual communities and networks

30
New cards

anti-spam policy

Simply states that email users will not send unsolicited emails (or spam)

31
New cards

opt out

choosing to deny permissions to incoming emails

32
New cards

opt in

Choosing to allow permissions to receive incoming emails

33
New cards

teergrubing

an anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

34
New cards

physical security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

35
New cards

information technology infrastructure library (ITIL)

ITIL is a set of best practice, processes, dating back to the United Kingdom in 1989, for delivering IT services to an organization's customers. ITIL has its foundations in IT, but its principles are easily used within facilities or HR departments

36
New cards

ITIL Service Strategy

Service Strategy is the first volume in the IT infrastructure library; it aligns both business and information technology (IT) goals and customer needs. In addition to relating to the other four core volumes, it focuses each element of the service life cycle on the customer outcome.

37
New cards

privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

38
New cards

patent

an exclusive right to use, sell, and license the use of an invention granted by a government to the inventor

39
New cards

copyright

legal protection for material such as a song, book, or video game

40
New cards

intellectual property

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

41
New cards

governance

a method or system for controlling or managing resources

42
New cards

Information System Audit and Control Association (IASACA)

An organization that sets guidelines and supports tools for IT governance that are accepted worldwide. These same tools are generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives

43
New cards

Committee of Sponsoring Organizations (COSO)

Key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting.

44
New cards

Capability Maturity Model Integration (CMMI) method

A process improvement approach that contains 22 process areas

45
New cards

enterprise architecture

includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets

46
New cards

de-parameterization

This occurs when an organization moves employees outside its firewall. It is a growing movement that changes the way corporations address technology security.

47
New cards

corporate social responsibility to society

Companies acknowledging their responsibility to society