1/61
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Ethics
The principles and standards that guide our behavior toward other people.
Confidentiality
Assurance that messages and information remain available only to those authorized to view them
Information Ethics
Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself or without the aid of computer technologies
Privacy
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
Copyright
The legal protection afforded an expression of an idea such as a song, book, or video game
Counterfeit Software
Software that is manufactured to look like the real thing and sold as such
Digital Rights Management
A technical solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying or distribution
Intellectual Property
Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
Patent
An exclusive right to make, use, and sell an invention and is granted by a govt to an inventor
Pirated Software
The unauthorized use, duplication, distribution, or sale of copyrighted software
Data Scrapping
(Web Scrapping) The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer.
Digital Trust
The measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individual
Ediscovery
Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
Child Online Protection Act
Passed to protect minors from accessing inappropriate material on the Internet.
Downtime
Refers to a period of time when a system is unavailable.
Cybersecurity
Malicious attempts to access or damage a computer system. Cyberattacks have the following attributes
Information Security
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Hackers
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge
Drive By Hacking
A computer attack by which an attacker accesses a wireless computer network or sends attack instructions without entering the office
or organization that owns the network
Ethical Hacker
A person who hacks into a computer system to find vulnerabilities to help a company test its security.
Bug Bounty Program
A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
Virus
Software written with malicious intent to cause annoyance or damage
Malware
Software that is intended to damage or disable computers and computer systems
Botnets
causes a collection of connected devices to be controlled by a hacker
Worm
Spreads itself not only from file to file but also from computer to computer
Adware
Software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Spyware
A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.
Ransomeware
A form of malicious software that infects your computer and asks for money.
Scareware
A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
Data Granularity
Refers to the extent of detail within the data
Transactional Data
Encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks
Analytical Data
Encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks.
Real time data
immediate, up-to-date data.
Real time systems
Provide real-time information in response to requests
Data Inconsistency
Occurs when the same data element has different values
ex. customer changes last name due to marriage so now the system has the 2 customers when there is only one
Data Integrity
A measure of the quality of data
can cause managers to consider the system reports invalid and make decisions based on other sources
Five Characteristics to High Quality Data
accuracy, completeness, consistency, timeliness, and uniqueness
Data gap analysis
Occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where data might be missing
Data Steward
Responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business
Data Governance
Refers to the overall management and security of company data
has a defined a policy that specifies who is accountable for various portions or aspects of the data
Master Data Management
gathering data and ensuring it has characteristics of high quality data including entities as customers, suppliers, products, etc.
Data Validation
tests and evaluations used to determine compliance with data governance polices to ensure correctness of data
ensure that every data value is correct and accurate
can control what data values go into a cell in excel like limitation of age for something
Database
Maintains data about various types of inventory, transactions, employees, and warehouses
Database management system
Creates, reads, updates, and deletes data in a database while controlling access and security.
Structured Query Language
Asks users to write lines of code to answer questions against a database.
Query by example
Helps users graphically design the answer to a question against a database
Relational Database
Stores data in the form of logically related, two-dimensional tables
Entity
Stores data about a person, place, thing, transaction, or event.
Attributes
The data elements associated with an entity
Ex. Entity would be Tracks the attribute would be track title or track length
Record
A collection of related data elements.
Each record in an entity occupies one row in its respective table.
Primary Key
A field (or group of fields) that uniquely identifies a given record in a table. Usually involved ID
Foreign Key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Physical View of data
Deals with the physical storage of data on a storage device.
Logical View of Data
Focuses on how individual users logically access data to meet their own particular business needs.
Data Latency
The time it takes for data to be stored or retrieved.
Data Redundancy
The duplication of data, or the storage of the same data in multiple places.
Business Rule
Defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer
Data Integrity
A measure of the quality of data
Integrity Constriants
Rules that help ensure the quality of data.
Identity Management
A broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
5 advantages of a relational database
-Increased flexibility
-Increased Data Integrity
-Increased scalability and performance
-Increased data security
-Reduced data redundance
4 primary traits of the value of data
-Data Type (transactional/analytical)
-Data Timeliness (real time)
-Data Quality (5 qualities)
-Data governance