1/94
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Child online protection act (COPA)
A law that protects minors from accessing inappropriate material on the internet
Epolicies
Policies and procedures that address the ethical use of computers and internet usage in the business environment
Cyberbullying
Threats negative remarks or defamatory comments transmitted via the internet or posted on a website
Threat
An act or object that poses a danger to assets
Click fraud
The abuse of pay per click pay per call and pay per conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
Competitive click fraud
A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
Ethical computer-use policy
Contains general principles to guide computer user behavior
Bring your own device (BYOD)
A policy allows employees to use their personal mobile devices and computers to access enterprise data and applications
Information privacy policy
Contains general principles regarding information privacy
Fair information practices
A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy
Acceptable use policy (AUP)
A policy that a user must agree to follow in order to be provided access to a network or to the internet
Nonrepudiation
A contractual stipulation to ensure that eBusiness participants do not deny their online actions
Internet use policy
Contains general principles to guide the proper use of the internet
Cybervanddalism
A problem that occurs when someone registers purposely misspelled variations of well known domain names
Website name stealing
The theft of a websites name that occurs when someone posing as a sites administrator changes the ownership of the domain name assigned to the website to another website owner
Internet censorship
Government attempts to control internet traffic thus preventing some material from being viewed by a country's citizens
Email privacy policy
Details the extent to which email messages may be read by others
Mail bomb
A massive amount of email to a specific person or system that can cause that user's server to stop functioning
Spam
Unsolicited email
Anti-spam policy
States that email users will not send unsolicited emails or spam
Opt-out
Receiving emails by choosing to deny permission to incoming emails
Opt-in
A user receives emails by choosing to allow permissions to incoming emails
Teergrubbing
Anti-spamming approach where the receiving computer launches a return attack against the spammer sending email messages back to the computer that originated the suspected spam
Social-media policy
Outlines the corporate guidelines or principles governing employee online communications
Social-media monitoring
The process of monitoring and responding to what is being said about a company individual product or brand
Physical security
Tangible protection such as alarms guards fireproof doors fences and vaults
Workplace MIS monitoring
Tracks activities of people using such measures as number of keystrokes error rate and number of transactions processed
Employee monitoring policy
Stating explicitly how when and where the company monitors it employees
Ediscovery
Refers to the ability of a company to identify search gather seize or export digital information in responding to a litigation audit investigation or information inquiry
Digital-rights management
A technological solution that allows publishers to control their digital media to discourage limit or prevent illegal copying and distribution
Counterfeit software
Software that is manufactured to look like the real thing and sold as such
Pirated software
The unauthorized use duplication distribution or sale of copyrighted software
Information ethics
Governs the ethical and moral issues arising from the development and use of information technologies as well as the creation collection duplication distribution and processing of information itself (with or without the aid of computer technologies)
Confidentiality
The assurance that messages and information are available only to those who are authorized to view them
Privacy
The right to be left alone when you want control your personal possessions and not to be observed without your consent
Patent
An exclusive right to use, sell, and license the use of an invention granted by a government to the inventor
Copyright
Legal protection for the expression of an idea, such as a song book or video game
Intellectual property
Intangible creative work that is embodied in physical form and includes copyrights trademarks and patents
Geoeconomic
The effects of geography on the economic realities of international business activities
Governance
Method or system of government for management or control
Compliance
The act of conforming, acquiescing, or yielding
Information Systems Audit and Control Association (ISACA)
An organization that sets guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives
Committee of Sponsoring Organizations (COSO)
Key for evaluating internal controls, such as Human Resources, logistics, information technology, risk, legal, marketing and sales operations, financial functions, procurement, and reporting
Capability Maturity Model Integration (CMMI) method
A process improvement approach that contains 22 process areas
Enterprise Architecture
Includes the plans for how an organization will build, deploy, use, and share it data processes and MIS assets
Deperimeterization
Occurs when an organization moves employees outside its firewall that a growing movement to change the way corporations address technology security
Transborder data flows (TDF)
When business data flows across international boundaries over the telecommunications networks of global information systems
Information privacy
Concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent information about them is communicated to others
Sustainable or Green MIS
Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment
Corporate social responsibility to society
Companies acknowledged responsibility to society
Clean computing
Refers to environmentally responsible use, manufacture, and disposal of technology products and computer equipment
Green Personal Computer (Green PC)
Built using environment friendly materials and designed to save energy
Ewaste
Refers to discarded, obsolete, or broken electronic devices
Sustainable MIS Disposal
Refers to the safe disposal of MIS assets at the end of their life cycle
Energy consumption
The amount of energy consumed by business processes and systems
Carbon emissions
The carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems
Typosquatting
A problem that occurs when someone registers purposely misspelled variations of well known domain names
Carbon emissions
Include the carbon dioxide and carbon monoxide in the atmosphere produced by business process and system
Grid computing
A collection of computers often geographically dispersed they are coordinated to solve a common problem
Smart grid
Delivers electronically using two way digital technology
Virtualization
The creation of a virtual rather than actual version of a computer resource such as operating system a server storage Device or Network resources
Storage Virtualization
Combines multiple network storage device so they appear to be the single stores device
Network Virtualization
Combines the physical resources such as servers processors and operating systems from the applications
System virtualization
The ability to present the resources of a single computer as if it is a collection of separate computers (vm) each with it own virtual CPUs network interfaces storage and operating system
Data center
A facility used to house management information systems and associated components such as telecommunications and storage systems
Multi tenancy
A single instance of a system serves multiple customers
Cloud fabric controller
An individual who monitors and provisions cloud resources similar to server administrator at an individual company
Cloud fabric
The software that makes the benefits of cloud computing possible such as multi tenancy
Public cloud
Promotes massive global industrywide applications offered to the general public
Private cloud
Serves only one customer or organization and can be located on the customers premises or off the customer's premises
Community cloud
Serves a specific community with common business models security requirements and compliance considerations
Hybrid cloud
Includes two or more private public or community clouds but each cloud remains separate and is only linked by technology that enable data and application portability
Cloud bursting
When a company uses it own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes
Utility computing
Offers a pay per use revenue model similar to metered service such as gas or electricity
Infrastructure as a service (IaaS)
Delivers hardware networking capabilities including the use of servers networking and storage over the cloud using a pay per use revenue model
Dynamic scaling
Means that the MIS Infrastructure can be automatically scaled up or down based on need requirements
Disaster recovery as a service (DRaaS)
Offers backup service that use cloud resources to protect applications and data from disruption cased by disaster
Data as a service DaaS
Facilitates the accessibility of business critical data in timely secure and affordable manner
Platform as a service PaaS
Supports the deployment of entire systems including hardware networking and application using a pay per use revenue model
Big data as a service BDaaS
Offers a cloud based big data service to help organizations analyze massive amounts of data to solve business dilemmas
Moore's Law
Refers to the computer chip performance per dollar doubling every 18 months
Upcycle
Reuses of refurbishes e-waste and creates a new product
Production management
Describes all the activities managers do to help companies create goods
Transformation process
The technical core especially in manufacturing organization the actual conversion of input and output
Value added
The term used to describe the difference between the cost of input and the value of price of output
Strategic business units SBUs
Consists of several stand alone businesses
Strategic planning
Focus on the long range planning such as plant size location and type process to be used
Materials requirement planning MRP system
Sales forecast to make sure that needed parts and materials are available at the right time and place in a specific company
Tactical planning
Focuses on producing goods and services as efficiently as possible within the strategic plan
Global inventory management system
Provides the ability to locate track and predict the movement of every component for material anywhere upstream or downstream in the supply chain
Operational planning and control OP&C
Deals with the day to day procedures for performing work including scheduling inventory and process management
Inventory management and control system
Provides control and disability to the status of individual items maintained in inventory
Transportation planning system
Tracks and analyze the movement of materials and products to ensure the delivery of materials and finished goods it is the right time the right place and lowest cost
Distribution management system
Coordinates the process of transporting materials from a manufacture to distribution centers to the final customer
International organization for standardization (ISO)
A non-governmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services