Task 9: Impacts, app skills, PM (AIT)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Code of conduct (COC)

Set of guidelines outlining the rules, responsibilities and expectations of an org

Used to display expected behaviours from each employee

2
New cards

Code of conduct purpose

Behaviour - rely on it to ensure the behaviour and actions of each employee are up to a certain standard

Company values - clearly state the values of company, makes a public statement of what they stand for

3
New cards

Code of conduct in IT

Work hours

Employee email

Employee internet use

Employee privacy

Employers monitoring internet/computer use

4
New cards

Work hours

Required work hours should be documented (e.g., punctuality, max hours in week)

Work breaks (e.g., work for 8 hrs receive a 30min paid meal break)

Location of working hours (e.g., WFH arrangements)

5
New cards

Employee email use

Employer provides an email system for work purposes (e.g., don’t sign up for non work sites/services)

Should be used for work purposes only (e.g., some may be more lenient - send to friends/family)

6
New cards

Employee internet use

Employer provides internet use for work purposes

How much used by employees for private use will vary (e.g., download large files)

Represent company positively

What internet may and may not be used for stated in COC (e.g,, conduct activities that prevent effective work, download/use of copyright materials)

7
New cards

Employee privacy

Many companies have large amounts of private data that needs to be kept within the company (e.g., customer and employee info)

Everything to do with use of private data will be stated in COC (e.g., don’t store private data on personal devices)

Will relate to Privacy Act

8
New cards

Employer monitoring computer use

Keen to run business as efficiently as possible

Apps, monitoring software and tracking devices allow employers to do so

Impacts employee trust

9
New cards

Monitoring computer use purpose

Work output - if employees are often on internet for non work related activities, they are losing productive work time

Monitor progress - better help, assist them if any issues are identified

How private data is handled

Attendance and productivity if WFH

10
New cards

Internet censorship

Control of what can be accessed, published or viewed on the internet

May be carried out by govs or private orgs

11
New cards

How censorship is done

By controlling internet service providers (ISPs)

Users need to have a connection to the internet

ISPs serve as a gateway to the internet

Can censor areas of the internet or completely pull the plug on the internet if the gov orders them to

12
New cards

Censorship methods by ISPs and orgs

IP address blocking - block IP address of a website

Domain name filtering - block domain name of website

Keyword blocking/packet filtering - scan the URL for keywords and if they are found the address is blocked

13
New cards

Censorship purpose

Controversial topics

Illegal activities

Shut down free speech - to minimise or prohibit free speech

Prevent fake news/misinfo

14
New cards

Censorship negative impacts

Limits free speech and accessible info

Prohibit comms

Censoring info for edu/study purposes

News and current events - not knowing what happens around the world, one POV

15
New cards

Digital tech

Any electronic tool that can generate, store or process data

e.g., PC, smart watch, software, websites, game console

16
New cards

Global market

Market - place (virtually or physically) where goods and services are bought and sold

Global - across the world

17
New cards

Access global markets with digi tech

Online gaming services (local - EB Games) - Steam, PS Store

Online streaming services (local - Blockbuster) - Netflix, Stan, Disney+

E-commerce (local - shopping malls) - Amazon

Music streaming (local - JBHifi) - Spotify, YouTube Music

18
New cards

Impact of digi tech and global markets on:

Productivity

Knowledge

Accessing global markets

19
New cards
Cloud storage
e.g., Google Drive (free, then paid tiers), DropBox (paid)
20
New cards
Cloud computing
On-demand availability of computing resources (storage/processing power etc) as services over the internet
21
New cards
Cloud computing issues

Confidentiality of data

Availability of online apps

Level of accessibility

Sensitivity of docs

22
New cards
Availability of online apps
Apps that run on the cloud - Google Drive is an online storage app, Wix is an online app
23
New cards
Online apps advantages
Run through a web browser and use little processing power
24
New cards
Level of accessibility

Who can access the data

Complete access - go to website

Restricted access - log in (tiered levels of access - staff, admin)

25
New cards

Accessibility of data

More valuable the data is, more care needs to be taken to keep it safe - make inaccessible to people

Businesses need to use secure passwords and consider reliable/secure cloud storage services, levels of accessibility to protect data

26
New cards

Sensitive info

Data that can be used against a person/org

Level of harm that can be caused by its exposure

27
New cards
Personal sensitive data examples
Bank account details, health records, criminal records, sexual orientation, ethnic origin
28
New cards
Company sensitive data examples
Blueprints, designs, financial info, customer/client/employee data
29
New cards
Levels of sensitivity

Highly - must be protected from unauthorised access to safeguard the privacy or security of an individual or org (financial records, IP)

Medium - (emails and docs without confidential data)

Low - won't cause harm or issue when made public (public website content)

30
New cards
Confidentiality of data

Confidential - to be secret When we pass on private data to others, we have expectation that it'll be confidential

Sensitive docs shouldn't be accessed by unauthorised parties

31
New cards
Confidentiality of data considerations

People need to consider where they place confidential data due to security risks

- Cloud docs are located on servers of third party companies

- May not be as secure as storing data locally (HDD at home)

32
New cards

Service

What someone provides for you (e.g., internet service provider (ISP))

33
New cards

Service Level Agreement (SLA)

Written agreement between the service provider and the client that defines the quality of service expected from the service provider

34
New cards

SLA purpose

Service provider can cover themselves if something goes wrong - if internet down, possible periods of downtime may occur stated in SLA

Make it clear to both parties what to expect, avoiding unrealistic expectations

Keeps service providers accountable

35
New cards

SLA features

Types of services offered (exclusions)

Availability (length of contract, times available)

Penalties

Who service is between