FINAL CSIS150

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Contingent work

1 / 97

flashcard set

Earn XP

Description and Tags

98 Terms

1

Contingent work

A job situation in which a worker does not have an explicit or implicit contract for long-term employment

New cards
2

Gig economy

Refers to a work environment in which temporary positions are common and organizations contract with independent workers for short-term engagements.

New cards
3

Intellectual property

Describes works of the mind that are distinct and owned or created by a single person or group. (Art, Music, Books)

New cards
4

Copyright

The exclusive right to distribute, display, perform, or reproduce an original work in copies, or to prepare derivative works based on the work.

New cards
5

Copyright infringement

A violation of the rights secured by the owner of a copyright.

New cards
6

Fair use doctrine

Allows portions of copyrighted materials to be used without permission

New cards
7

Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008

Increased trademark and copyright enforcement and substantially increased penalties for infringement

New cards
8

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

Established minimum levels of protection that each government must provide to the intellectual property of all WTO members

New cards
9

Forms Of Intellectual Property

Copyright, Patent, Trade Secret

New cards
10

Digital Millennium Copyright Act (1998)

Implements the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty

New cards
11

Patent

A grant of a property right issued by the U.S. Patent and Trademark Office (USPTO) to an inventor

New cards
12

Patent infringement

Unauthorized use of another’s patent

New cards
13

Leahy-Smith America Invents Act (2011)

Enacted a major change in patent law; changed U.S. patent system from a “first-to-invent” to a “first-inventor-to-file” system.

New cards
14

Software patent

Protects a feature, function, or process embodied in instructions executed on a computer.

New cards
15

Trade secret

Business information that has the following qualities.

New cards
16

Uniform Trade Secrets Act (UTSA)

Established uniformity across the states in area of trade secret law.

New cards
17

Economic Espionage Act (EEA) of 1996

Imposes penalties for the theft of trade secrets

New cards
18

Defend Trade Secrets Act of 2016

Amended the EEA to create a federal civil remedy for trade secret misappropriation

New cards
19

Nondisclosure clause

Part of an employment contract that specifically prohibits an employee from revealing company secrets

New cards
20

Noncompete agreement

Part of an employment contract that prohibits an employee from working for any competitors for a period of time

New cards
21

Plagiarism

The act of stealing someone’s ideas or words and passing them off as one’s own.

New cards
22

Reverse engineering

The process of taking something apart in order to understand it, build a copy of it, or improve it.

New cards
23

Competitive intelligence

Legally obtained information gathered to help a company gain an advantage over rivals.

New cards
24

Cybersquatter

An individual or company that registers domain names for famous trademarks or company names to which they have no connection.

New cards
25

Trademark

A logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from another’s.

New cards
26

Intellectual property

Describes works of the mind that are distinct and owned or created by a single person or group.

New cards
27

Patent

A grant of property right issued by the USPTO that permits its owner to exclude the public from making, using, or selling a protected invention.

New cards
28

Open source code

Any program whose source code is made available for use or modification, as users or other developers see fit.

New cards
29

High-quality software systems

Easy to learn and use; perform quickly and efficiently, meet users’ needs; and operate safely and reliably, with minimal system downtime.

New cards
30

Software defect

Any error that, if not removed, could cause a software system to fail to meet its users’ needs.

New cards
31

Software quality

The degree to which a software product meets the needs of its users

New cards
32

Quality management

Defining, measuring, and refining the quality of products and the development process

New cards
33

Business information system

A set of interrelated components that collects and processes data and disseminates the output

New cards
34

Decision support system (DSS)

Used to improve decision making

New cards
35

Product liability

The liability of manufacturers, sellers, lessors, and others for injuries caused by defective products.

New cards
36

Strict liability

The defendant is held responsible for injury, regardless of negligence or intent.

New cards
37

Contributory negligence

Plaintiffs’ own actions contributes to their injuries

New cards
38

Warranty

Assures buyers or lessees that a product meets certain standards of quality

New cards
39

Breach of warranty

Buyer or lessee can sue the seller or lessor if the product fails to meet the terms of its warranty.

New cards
40

Software development methodology

Standard, proven work process that enables controlled progress while developing high-quality software.

New cards
41

Waterfall system development model

A sequential, multistage system development process in which development of the next stage cannot begin until the results of the current stage are approved.

New cards
42

Agile development

A methodology under which a system is developed in iterations (often called sprints) lasting from one to four weeks.

New cards
43

Quality assurance (QA)

Methods within the development process designed to guarantee reliable operation of a product.

New cards
44

Dynamic testing

Entering test data and comparing the results with the expected results in a process.

New cards
45

Black-box testing

Views the software unit as a device that has expected input and output behaviors but whose internal workings are unknown

New cards
46

White-box testing

Treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

New cards
47

Static testing

Software-testing technique in which software is tested without actually executing the code

New cards
48

Unit testing

Individual components of code (subroutines, modules, and programs) are tested.

New cards
49

Integration testing

Software units are combined into an integrated subsystem and tested to ensure the linkages among the various subsystems work.

New cards
50

System testing

Various subsystems are combined to test the entire system.

New cards
51

User acceptance testing

Trained end users conduct independent testing

New cards
52

CMMI models

Collections of best practices that help organizations improve processes

New cards
53

Best practice

A method that has consistently shown results superior to those achieved with other means

New cards
54

CMMI-Development (CMMI-DEV)

Frequently used to assess and improve software development processes.

New cards
55

Safety-critical system

A system whose failure may cause injury or death

New cards
56

System safety engineer

Has responsibility for system’s safety; uses a logging and monitoring system to track hazards from a project’s start to its finish.

New cards
57

Reliability

A measure of the rate of failure in a system that would render it unusable over its expected lifetime.

New cards
58

Annualized rate of occurrence (ARO):

An estimate of the probability that this event will occur over the course of a year.

New cards
59

Single loss expectancy (SLE)

The estimated loss that would be incurred if the event happens.

New cards
60

Annualized loss expectancy

The estimated loss from this risk over the course of a year.

New cards
61

Risk management

The process of identifying, monitoring, and limiting risks to a level that an organization is willing to accept; the level of risk that remains after managing risk is called residual risk.

New cards
62

ISO 9001 family of standards

A set of standards that serves as a guide to quality products, services, and management; updated every five years.

New cards
63

Failure mode and effects analysis (FMEA)

A technique used to develop ISO 9001-compliant quality systems • Evaluates reliability and determines the effects of system and equipment failures.

New cards
64

Failure mode

Describes how a product or process could fail to perform the functions described by the customer.

New cards
65

Labor productivity

A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services.

New cards
66

Artificial intelligence

An interdisciplinary field in which experts ponder philosophical issues such as the nature of the human mind and the ethics of creating objects gifted with human-like intelligence.

New cards
67

Artificial intelligence systems

The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning, reasoning, and self-correction

New cards
68

Machine learning

A type of artificial intelligence (AI) involving computer programs that can learn and improve their performance with experience.

New cards
69

Robotics

A branch of engineering involving the development and manufacture of mechanical or computer devises that perform tasks that require a high degree of precision or are tedious/hazardous for humans.

New cards
70

Natural language processing

An aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate “natural” languages, such as English.

New cards
71

Electronic medical record (EMR)

A collection of health related information on an individual that is created and consulted by staff within a single healthcare organization

New cards
72

Electronic health record (EHR)

A comprehensive view of a patient’s complete medical history designed to be shared with providers from more than one organization

New cards
73

Personal health record (PHR)

Those portions of the EHR routinely shared with the patient, such as contact information, health provider information, medication history, and test results.

New cards
74

Health information exchange (HIE)

The process of sharing patient-level electronic health information between different organizations

New cards
75

Clinical decision support (CDS)

A process and set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information.

New cards
76

Telehealth

Employs electronic information processing and telecommunications

New cards
77

Telemedicine

Involves providing medical care to people at a location different from the healthcare providers.

New cards
78

Store-and-forward telemedicine

Involves acquiring data, images, and video from a patient and transmitting everything to a medical specialist for later evaluation.

New cards
79

Live telemedicine

Requires the presence of patients and healthcare providers at different sites at the same time; often involves a video conference link between two sites.

New cards
80

Remote monitoring (home monitoring)

Involves ongoing measurement of an individual’s vital signs, and the transmission of this data to a healthcare provider.

New cards
81

Social media

Web-based communication tools that enable people to interact in online communities where they can share ideas, messages, images, audio, and video.

New cards
82

Social networking platform

Creates an online community of Internet users that breaks down barriers created by time, distance, and cultural differences.

New cards
83

Social network marketing

The use of social networks to communicate and promote the benefits of products and services.

New cards
84

Cost per thousand impressions (CPM)

Billed at a flat rate per 1,000 impressions (a measure of the number of times an ad is displayed)—whether or not it was clicked

New cards
85

Cost per click

Billed on a per click basis; no charge when an ad is displayed but not clicked on

New cards
86

Earned media

Refers to the media exposure an organization gets through press and social media mentions, positive online ratings and reviews, tweets and retweets, and reposts (or “shares”).

New cards
87

Social shopping platforms

Combine two highly popular online activities—shopping and social networking.

New cards
88

Cyberabuse

Any form of mistreatment, both physical and mental, based on the use of an electronic communications device, that causes harm and distress to others

New cards
89

Cyberbullying

A form of cyberabuse in which the abusive behavior is humiliating, hurtful, intimidating, malicious, or otherwise offensive to an individual or group of individual and causes substantial emotional distress.

New cards
90

Cyberstalking

A form of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior that is directed by one person against another and that causes fear and distress in the victim

New cards
91

Independent contractor

An individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement.

New cards
92

H-1B visa

A temporary work visa granted by the U.S. Citizenship and Immigration Services (USCIS) for people who work in specialty occupations.

New cards
93

Outsourcing

A long-term business arrangement in which a company contracts for services with an outside organization with expertise in a specific function.

New cards
94

Offshore outsourcing

A form of outsourcing in which services are provided by an organization whose employees are in a foreign country.

New cards
95

Whistle-blowing

An effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by an organization.

New cards
96

False Claims Act

Established during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army.

New cards
97

Qui tam provision

Allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors.

New cards
98

Green computing

Concerned with the efficient and environmentally responsible manufacture, operation, and disposal of IT-related products, including laptops, smartphones.

New cards

Explore top notes

note Note
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8100 people
Updated ... ago
4.8 Stars(53)
note Note
studied byStudied by 122 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 391 people
Updated ... ago
4.1 Stars(7)
note Note
studied byStudied by 645 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard21 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard132 terms
studied byStudied by 36 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard77 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard71 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard79 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)