C954 Flashcards-Section-Six

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

Child online protection act (COPA)

A law that protects minors from accessing inappropriate material on the internet

2
New cards

Epolicies

Policies and procedures that address the ethical use of computers and internet usage in the business environment

3
New cards

Cyberbullying

Threats negative remarks or defamatory comments transmitted via the internet or posted on a website

4
New cards

Threat

An act or object that poses a danger to assets

5
New cards

Click fraud

The abuse of pay per click pay per call and pay per conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser

6
New cards

Competitive click fraud

A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

7
New cards

Ethical computer-use policy

Contains general principles to guide computer user behavior

8
New cards

Bring your own device (BYOD)

A policy allows employees to use their personal mobile devices and computers to access enterprise data and applications

9
New cards

Information privacy policy

Contains general principles regarding information privacy

10
New cards

Fair information practices

A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

11
New cards

Acceptable use policy (AUP)

A policy that a user must agree to follow in order to be provided access to a network or to the internet

12
New cards

Nonrepudiation

A contractual stipulation to ensure that eBusiness participants do not deny their online actions

13
New cards

Internet use policy

Contains general principles to guide the proper use of the internet

14
New cards

Cybervanddalism

A problem that occurs when someone registers purposely misspelled variations of well known domain names

15
New cards

Website name stealing

The theft of a websites name that occurs when someone posing as a sites administrator changes the ownership of the domain name assigned to the website to another website owner

16
New cards

Internet censorship

Government attempts to control internet traffic thus preventing some material from being viewed by a country's citizens

17
New cards

Email privacy policy

Details the extent to which email messages may be read by others

18
New cards

Mail bomb

A massive amount of email to a specific person or system that can cause that user's server to stop functioning

19
New cards

Spam

Unsolicited email

20
New cards

Anti-spam policy

States that email users will not send unsolicited emails or spam

21
New cards

Opt-out

Receiving emails by choosing to deny permission to incoming emails

22
New cards

Opt-in

A user receives emails by choosing to allow permissions to incoming emails

23
New cards

Teergrubbing

Anti-spamming approach where the receiving computer launches a return attack against the spammer sending email messages back to the computer that originated the suspected spam

24
New cards

Social-media policy

Outlines the corporate guidelines or principles governing employee online communications

25
New cards

Social-media monitoring

The process of monitoring and responding to what is being said about a company individual product or brand

26
New cards

Physical security

Tangible protection such as alarms guards fireproof doors fences and vaults

27
New cards

Workplace MIS monitoring

Tracks activities of people using such measures as number of keystrokes error rate and number of transactions processed

28
New cards

Employee monitoring policy

Stating explicitly how when and where the company monitors it employees

29
New cards

Ediscovery

Refers to the ability of a company to identify search gather seize or export digital information in responding to a litigation audit investigation or information inquiry

30
New cards

Digital-rights management

A technological solution that allows publishers to control their digital media to discourage limit or prevent illegal copying and distribution

31
New cards

Counterfeit software

Software that is manufactured to look like the real thing and sold as such

32
New cards

Pirated software

The unauthorized use duplication distribution or sale of copyrighted software

33
New cards

Information ethics

Governs the ethical and moral issues arising from the development and use of information technologies as well as the creation collection duplication distribution and processing of information itself (with or without the aid of computer technologies)

34
New cards

Confidentiality

The assurance that messages and information are available only to those who are authorized to view them

35
New cards

Privacy

The right to be left alone when you want control your personal possessions and not to be observed without your consent

36
New cards

Patent

An exclusive right to use, sell, and license the use of an invention granted by a government to the inventor

37
New cards

Copyright

Legal protection for the expression of an idea, such as a song book or video game

38
New cards

Intellectual property

Intangible creative work that is embodied in physical form and includes copyrights trademarks and patents

39
New cards

Geoeconomic

The effects of geography on the economic realities of international business activities

40
New cards

Governance

Method or system of government for management or control

41
New cards

Compliance

The act of conforming, acquiescing, or yielding

42
New cards

Information Systems Audit and Control Association (ISACA)

An organization that sets guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives

43
New cards

Committee of Sponsoring Organizations (COSO)

Key for evaluating internal controls, such as Human Resources, logistics, information technology, risk, legal, marketing and sales operations, financial functions, procurement, and reporting

44
New cards

Capability Maturity Model Integration (CMMI) method

A process improvement approach that contains 22 process areas

45
New cards

Enterprise Architecture

Includes the plans for how an organization will build, deploy, use, and share it data processes and MIS assets

46
New cards

Deperimeterization

Occurs when an organization moves employees outside its firewall that a growing movement to change the way corporations address technology security

47
New cards

Transborder data flows (TDF)

When business data flows across international boundaries over the telecommunications networks of global information systems

48
New cards

Information privacy

Concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent information about them is communicated to others

49
New cards

Sustainable or Green MIS

Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment

50
New cards

Corporate social responsibility to society

Companies acknowledged responsibility to society

51
New cards

Clean computing

Refers to environmentally responsible use, manufacture, and disposal of technology products and computer equipment

52
New cards

Green Personal Computer (Green PC)

Built using environment friendly materials and designed to save energy

53
New cards

Ewaste

Refers to discarded, obsolete, or broken electronic devices

54
New cards

Sustainable MIS Disposal

Refers to the safe disposal of MIS assets at the end of their life cycle

55
New cards

Energy consumption

The amount of energy consumed by business processes and systems

56
New cards

Carbon emissions

The carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems

57
New cards

Typosquatting

A problem that occurs when someone registers purposely misspelled variations of well known domain names

58
New cards

Carbon emissions

Include the carbon dioxide and carbon monoxide in the atmosphere produced by business process and system

59
New cards

Grid computing

A collection of computers often geographically dispersed they are coordinated to solve a common problem

60
New cards

Smart grid

Delivers electronically using two way digital technology

61
New cards

Virtualization

The creation of a virtual rather than actual version of a computer resource such as operating system a server storage Device or Network resources

62
New cards

Storage Virtualization

Combines multiple network storage device so they appear to be the single stores device

63
New cards

Network Virtualization

Combines the physical resources such as servers processors and operating systems from the applications

64
New cards

System virtualization

The ability to present the resources of a single computer as if it is a collection of separate computers (vm) each with it own virtual CPUs network interfaces storage and operating system

65
New cards

Data center

A facility used to house management information systems and associated components such as telecommunications and storage systems

66
New cards

Multi tenancy

A single instance of a system serves multiple customers

67
New cards

Cloud fabric controller

An individual who monitors and provisions cloud resources similar to server administrator at an individual company

68
New cards

Cloud fabric

The software that makes the benefits of cloud computing possible such as multi tenancy

69
New cards

Public cloud

Promotes massive global industrywide applications offered to the general public

70
New cards

Private cloud

Serves only one customer or organization and can be located on the customers premises or off the customer's premises

71
New cards

Community cloud

Serves a specific community with common business models security requirements and compliance considerations

72
New cards

Hybrid cloud

Includes two or more private public or community clouds but each cloud remains separate and is only linked by technology that enable data and application portability

73
New cards

Cloud bursting

When a company uses it own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes

74
New cards

Utility computing

Offers a pay per use revenue model similar to metered service such as gas or electricity

75
New cards

Infrastructure as a service (IaaS)

Delivers hardware networking capabilities including the use of servers networking and storage over the cloud using a pay per use revenue model

76
New cards

Dynamic scaling

Means that the MIS Infrastructure can be automatically scaled up or down based on need requirements

77
New cards

Disaster recovery as a service (DRaaS)

Offers backup service that use cloud resources to protect applications and data from disruption cased by disaster

78
New cards

Data as a service DaaS

Facilitates the accessibility of business critical data in timely secure and affordable manner

79
New cards

Platform as a service PaaS

Supports the deployment of entire systems including hardware networking and application using a pay per use revenue model

80
New cards

Big data as a service BDaaS

Offers a cloud based big data service to help organizations analyze massive amounts of data to solve business dilemmas

81
New cards

Moore's Law

Refers to the computer chip performance per dollar doubling every 18 months

82
New cards

Upcycle

Reuses of refurbishes e-waste and creates a new product

83
New cards

Production management

Describes all the activities managers do to help companies create goods

84
New cards

Transformation process

The technical core especially in manufacturing organization the actual conversion of input and output

85
New cards

Value added

The term used to describe the difference between the cost of input and the value of price of output

86
New cards

Strategic business units SBUs

Consists of several stand alone businesses

87
New cards

Strategic planning

Focus on the long range planning such as plant size location and type process to be used

88
New cards

Materials requirement planning MRP system

Sales forecast to make sure that needed parts and materials are available at the right time and place in a specific company

89
New cards

Tactical planning

Focuses on producing goods and services as efficiently as possible within the strategic plan

90
New cards

Global inventory management system

Provides the ability to locate track and predict the movement of every component for material anywhere upstream or downstream in the supply chain

91
New cards

Operational planning and control OP&C

Deals with the day to day procedures for performing work including scheduling inventory and process management

92
New cards

Inventory management and control system

Provides control and disability to the status of individual items maintained in inventory

93
New cards

Transportation planning system

Tracks and analyze the movement of materials and products to ensure the delivery of materials and finished goods it is the right time the right place and lowest cost

94
New cards

Distribution management system

Coordinates the process of transporting materials from a manufacture to distribution centers to the final customer

95
New cards

International organization for standardization (ISO)

A non-governmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services