Term
|
Definition
the legal protection afforded an expression of an idea (ex: song, book or video game) |
|
|
Term
|
Definition
is intangible creative work that is embodied in physical form and includes copyrights, trademarks & patents |
|
|
Term
|
Definition
the right to be left alone when you want to be, to have control over your personal possessions & not to be observed without your consent |
|
|
Term
|
Definition
the assurance that messages and information remain available only to those authorized to view them |
|
|
Term
|
Definition
govern the ethical & moral issues arising from the development & use of information technologies, as well as the creation, collection, duplication, distribution & processing of information itself |
|
|
Term
|
Definition
is the unauthorized use, duplication, distribution, or sale of copyrighted software |
|
|
Term
|
Definition
is software that is manufactured to look like the real thing & sold as such |
|
|
Term
|
Definition
examines the organizational resource of information and regulates is definitions, uses, value, & distribution ensuring it has the types of data/information required to function & grow effectively |
|
|
Term
|
Definition
a method or system of government for information management or control |
|
|
Term
|
Definition
the act of conforming, acquiescing, or yielding information |
|
|
Term
|
Definition
the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry |
|
|
Term
|
Definition
are policies and procedures that address information management along with the ethical use of computers & the internet in the business environment |
|
|
Term
Ethical Computer Use Policy |
|
Definition
contains general principles to guide computer user behavior |
|
|
Term
Acceptable Use Policy (AUP) |
|
Definition
requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet |
|
|
Term
|
Definition
a contractual stipulation to ensure that ebusiness participants do not deny their online actions |
|
|
Term
|
Definition
contains general principles to guide the proper use of the internet |
|
|
Term
|
Definition
details the extent to which email messages may be read by others |
|
|
Term
|
Definition
a massive amount of emails sent to a specific person or system that can cause that users server to stop functioning |
|
|
Term
|
Definition
|
|
Term
|
Definition
states that email users will not send unsolicited emails |
|
|
Term
Information Technology Monitoring |
|
Definition
tracks peoples activities by such measures as number of keystrokes, error rate, and number transactions processed |
|
|
Term
Employee Monitoring Policy |
|
Definition
stating explicitly how, when, and where the company monitors its employees |
|
|
Term
|
Definition
a period of time when a system in unavailable |
|
|
Term
|
Definition
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
experts in technology who use their knowledge to break into computers & computer networks, either for profit or just motivated by the challenge |
|
|
Term
|
Definition
software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
software that while purporting to serve some useful function and often fulfilling that function,also allows internet advertisers to display advertisements without the consent of the computer user |
|
|
Term
|
Definition
a special class of adware that collects data about the user & transmits it over the internet without the users knowledge or permission |
|
|
Term
|
Definition
legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident |
|
|
Term
|
Definition
hackers use their social skills to trick people into revealing access credentials or other valuable information |
|
|
Term
Information Security Policies |
|
Definition
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days |
|
|
Term
|
Definition
the forging of someones identity for the purpose of fraud |
|
|
Term
|
Definition
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails designed to look real |
|
|
Term
|
Definition
reroutes request for legitimate websites to false websites |
|
|
Term
|
Definition
a method for confirming users identities |
|
|
Term
|
Definition
the process of providing a user with permission including access levels & abilities such as file access, hours of access, & amount of allocated storage space |
|
|
Term
|
Definition
small electronic devices that change users passwords automatically |
|
|
Term
|
Definition
occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information |
|
|
Term
|
Definition
scrambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
Public Key Encryption (PKE) |
|
Definition
uses two keys: a public key that everyone can have and private key for only the recipient |
|
|
Term
|
Definition
is a trusted third party that validates user identities by means of digital certificates |
|
|
Term
|
Definition
is a data file that identifies or organizations online and is comparable to digital signature |
|
|
Term
|
Definition
hardware and/or software that guard a private network by analyzing incoming & outgoing information for the correct markings |
|
|
Term
|
Definition
scans and searches hard drives to prevent, detect, and remove known viruses, adware and spyware |
|
|
Term
Intrusion Detection Software (IDS) |
|
Definition
full-time monitoring tools that search for patterns in network traffic to identify intruders |
|
|
Term
|
Definition
includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets |
|
|
Term
|
Definition
a communications system created by linking two or more devices & establishing a standard methodology in which they can communicate |
|
|
Term
|
Definition
a computer designed to request information from a server |
|
|
Term
|
Definition
a computer dedicated to providing information in response to request |
|
|
Term
|
Definition
a person grounded in technology, fluent in business & able to provide the important bridge between MIS & the business |
|
|
Term
|
Definition
the ability for a system to respond to unexpected failures or system crashes as the backup system immediately & automatically takes over with no loss of service |
|
|
Term
|
Definition
a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, & if the primary server crashes, the users are automatically directed to the secondary server or backup server |
|
|
Term
|
Definition
occurs when the primary machine recovers & resumes operations, taking over form the secondary server |
|
|
Term
|
Definition
Remote Administration Tool |
|
|
Term
|
Definition
a logical collection of information, gathered from many different operational databases, that supports business analysis activities & decision-making tasks |
|
|
Term
|
Definition
contains a subset of data warehouse information |
|
|
Term
|
Definition
maintains information about various types of objects(inventory),events(transactions),people(employees), and places(warehouses) |
|
|
Term
Extraction-Transformation-Loading (ETL) |
|
Definition
a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions & loads it into a data warehouse |
|
|
Term
Entity Relationship Diagram (ERD) |
|
Definition
a way to diagram the relationships between tables in a database & describes the attributes/columns & keys in each table |
|
|
Term
|
Definition
analyzes such items as websites & checkout scanner information to detect customers buying behavior & predict future behavior by identifying affinities among customers choices of products & services |
|
|
Term
|
Definition
predictions based on time-series information |
|
|
Term
|
Definition
a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another & the different groups are as far apart as possible |
|
|
Term
|
Definition
refers to the extent of detail within the information(fine, detailed or coarse & abstract) |
|
|
Term
Transactional Information |
|
Definition
its primary purpose is to support daily operational tasks |
|
|
Term
|
Definition
its primary purpose is to support the performing of managerial analysis tasks |
|
|
Term
|
Definition
occurs when the same data element has different values |
|
|
Term
|
Definition
occurs when a system produces incorrect, inconsistent, or duplicate data |
|
|
Term
Data Base Management System (DBMS) |
|
Definition
creates, reads, updates, and deletes data in a database while controlling access & security |
|
|
Term
|
Definition
provides details about data |
|
|
Term
|
Definition
stores information about a person, place, thing, transaction, or event |
|
|
Term
|
Definition
refers to the safe disposal of MIS assets at the end of their life cycle |
|
|
Term
|
Definition
refers to discarded, obsolete, or broken electronic devices (ex: CD's DVD's, Thumb Drives, Printer Cartridges, Cells phones..) |
|
|
Term
|
Definition
which refers to the computer chip performance per dollar doubles every 18 months |
|
|
Term
|
Definition
a separate and fully equipped facility where the company can move immediately after a disaster and resume business |
|
|
Term
|
Definition
a separate facility that does not have any computer equipment but is a place where employees can move after a disaster |
|
|
Term
|
Definition
a separate facility with computer equipment that requires installation & configuration |
|
|
Term
Denial of Service Attack (DOS) |
|
Definition
floods a website with so many request for service that is slows down or crashes the site |
|
|
Term
Distributed Denial of Service attack (DDOS) |
|
Definition
multiple computers flood a website with request for service to slow it down or crash it |
|
|