Term
Ethical responsibility of business professionals |
|
Definition
you have the responsibility to promote ethical uses of information technology in the workplace. |
|
|
Term
|
Definition
concerned with the numerous ethical questions that managers must confront as part of their daily business decisoin making |
|
|
Term
theories of ethical decision making |
|
Definition
stockholder theory: holds that managers are agents of the stockholders, and thier only ethical responsibility is to increase the profits of the business without violating the law
social contract theory: states that companies have ethical responsibilities to all members of society, which allows corporations to exist according to a socal contract
stakeholder theory: maintains that managers have an ethical respobsibility to manage a firm for the benefit of all its stakeholders, that is, all individuals and groups that have a stake in, or claim on, a company |
|
|
Term
|
Definition
the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk |
|
|
Term
|
Definition
those affected by the technology should understand and accept the risks |
|
|
Term
|
Definition
the benefits and burdens of the technology should be distributed fairly. THose who benefit should bear their fair share of the risks, and those who do not benefit should not suffer as significant increase in risk |
|
|
Term
|
Definition
even if judged acceptable by the other three ghuidelines, the technology must be implemented so as to avoid all unnecessary risk. |
|
|
Term
|
Definition
including the unauthorized use, access, modificatin, and destruction of hardware, software, data, or network resources. the unauthorized release of information. the unauthorized copying of software |
|
|
Term
|
Definition
is becoming one of the Net's growth businesses. Today, criminials are doing everything form stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorism. |
|
|
Term
|
Definition
the obsessive use of computers or the unauthorized access and use of networked computer systems |
|
|
Term
|
Definition
denial of service, scans, sniffer, spoofing, trojan horse, back doors, malicious applets, ware dialing, logie bombs, buffer overflwo, password crackers, social engineering, dumpster diving. |
|
|
Term
|
Definition
programs that covertly search individual packets of data as they pass through the internet, capturing apsswords or the entire contents. |
|
|
Term
|
Definition
computer crimes that involve the theft of money |
|
|
Term
|
Definition
|
|
Term
internet abuse in the workplace |
|
Definition
general e-mail abuses, unauthorized usage and access, copyright infringement/plagiarism, newsgroup postings, transmissin of confidential data, pornography, hacking, non-work-related download, leisure use of the internet, usage of external ISPs, moonlighting |
|
|
Term
|
Definition
sniffers help prevent this |
|
|
Term
|
Definition
can be called time and resource theft. (basically using the company computers to do stuff that you shouldnt) |
|
|
Term
website monitoring software |
|
Definition
monitor content, keystrokes, and time spent at the keyboard |
|
|
Term
|
Definition
unauthorized copying of software |
|
|
Term
|
Definition
it legally allows people to make a certain number of copies for use by their employees at a particular location |
|
|
Term
|
Definition
software that is not copyrighted |
|
|
Term
intellectual property theft |
|
Definition
occurs in the form of infringements of copyrighted materials, such as music, videos, images, articles, books, and such, which courts have deemed illegal |
|
|
Term
|
Definition
one of the most destructive examples of computer crime. it is a program code that cannot work without being inserted into another program |
|
|
Term
|
Definition
software that , while purporting to serve some useful function and often fultilling that function, also allows internet advertisers to display ads as banners and pop-up ads without the consent of the computer user. they can also collect info about the user and sent it over the internet. |
|
|
Term
|
Definition
an opt-in system automatically protects consumers who do not specifically allow data to be compiled about them. in the uS, opt-out is the default position, whereas in Europe, consumers must opt-in or their information cannot be used. |
|
|
Term
|
Definition
information about internet users is captured legitimately and automatically each time you visit a Web site or newsgroup as is recorded |
|
|
Term
|
Definition
when a persons physical profile or personal data has been used by profilng software to math them incorrectly or improperly with the wrong individuals. |
|
|
Term
|
Definition
the term used to describe laws intended to regulate activities over the internet or via the use of electronic data communications. it encompasses a wide variety of legal and political issues related to the internet and other communication technologies |
|
|
Term
|
Definition
the indiscriminate sending of unsolicited e-mail messages to many internet users. |
|
|
Term
|
Definition
the practice of sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup posting to other users on the internet or online services |
|
|
Term
|
Definition
computers are being used to monitor the productivity and behavior of millions of employees while they work |
|
|
Term
|
Definition
the goal of this practice is the accuracy, integrity, and safety of all information system processes and resources |
|
|
Term
|
Definition
it involves using special mathematical algorithms, to transform digital data into a scrambled code before they are transmitted, and then to decode the data when they are received. |
|
|
Term
|
Definition
it serves as a gatekeeper system that protects a company's intranets and other computer networks from intrusion by providing a filter and sate transfer point for access to and from the internet and other networks |
|
|
Term
denial of service attacks |
|
Definition
denial of service assaults ia the Internet depend on three layers of networked computer systesm; 1) the victim's website 2) the victim's internet service provider (ISP) and 3) the sites of "zombie" or slave computers that the cyber criminals commandeered |
|
|
Term
|
Definition
can be used to perform malicious tasks of one sort or another under remote direction |
|
|
Term
|
Definition
case study; the company watches people's emails and has it sent to the supervisor if a key word is said |
|
|
Term
|
Definition
|
|
Term
|
Definition
duplicate files of data or programs |
|
|
Term
|
Definition
programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction |
|
|
Term
|
Definition
using your voice or fingerprints to identify yourself electronically |
|
|
Term
|
Definition
a computer system can continue to operate even after a major system fialure if it has this capability |
|
|
Term
|
Definition
overwhelming a website with requests for service from captive computers |
|
|
Term
information system controls |
|
Definition
control totals, error signals, backup files, and security codes are examples. they are methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities |
|
|
Term
|
Definition
he presence of documentation that allows a transaction to be traced through all stages of its information processing |
|
|
Term
|
Definition
using internet monitoring software to block access to certain sites |
|
|
Term
|
Definition
using Internet monitoring software to only allow access to certain sites |
|
|
Term
|
Definition
is programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.[ |
|
|
Term
|
Definition
a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or the software developer |
|
|
Term
|
Definition
a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.[1] It uses flaws in Windows software and Dictionary attacks on administrator passwords to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors. |
|
|
Term
|
Definition
a Windows computer worm discovered in July 2010 that targets industrial software and equipment |
|
|