Term
|
Definition
anything that can be documented, codified, achieved |
|
|
Term
|
Definition
websites that rely on user participation |
|
|
Term
|
Definition
an application that connects people by matching profile information |
|
|
Term
|
Definition
Specific keywords or phrases incorporated into website content for means of classification or taxonomy |
|
|
Term
|
Definition
gets brand out there, a free way of market research. |
|
|
Term
|
Definition
Blogs: online journal, wikis: website that allows users to add, remove, and change content, mashups: content from more than one source to create a new product or service. |
|
|
Term
|
Definition
Technology Dependence: breaches of privacy, security, power outages, internet goes out. Information Vandalism: Violations of copyright and plagiarism: |
|
|
Term
|
Definition
Based in "intelligent" web applications. Modern day web. (suri) |
|
|
Term
|
Definition
A component of web 2.0 that describes things in a way that computers can understand. |
|
|
Term
|
Definition
interact with government agencies and transactions online. |
|
|
Term
|
Definition
the ability to purchase goods and services through a wireless internet-enabled device |
|
|
Term
|
Definition
principles and standards that guide our behavior to ward other people |
|
|
Term
|
Definition
intangible element of business thats worth something |
|
|
Term
|
Definition
copied and sold like as if it was the original product |
|
|
Term
|
Definition
The right to be left alone when you want to be |
|
|
Term
|
Definition
the assurance that messages and information a available to those who are authorized to see them. |
|
|
Term
the only ethical part of mis |
|
Definition
|
|
Term
|
Definition
examines the organizational aspect of information |
|
|
Term
Ethical computer use policy |
|
Definition
general principles to guide computer user behavior |
|
|
Term
information privacy policy |
|
Definition
contains general principles regarding information privacy |
|
|
Term
(AUP) accepted use policy |
|
Definition
a user agrees to follow it to be provided access to corporate email, information systems, and the internet. |
|
|
Term
|
Definition
details the extent to which others can read emails. Company legally has the rights to read your email |
|
|
Term
|
Definition
|
|
Term
|
Definition
simply states that email users will not send unsolicited emails. |
|
|
Term
|
Definition
outlines the corporate guidelines or principles governing employee online communications |
|
|
Term
information technology monitoring |
|
Definition
tracks people's activities |
|
|
Term
|
Definition
legal protection afforded an expression of an idea |
|
|
Term
|
Definition
intangible creative work that is embodied in physical form an includes copyrights, trademarks, and patents. |
|
|
Term
|
Definition
an exclusive right to make, use, and sell an invention, and is granted by gov't to the inventor |
|
|
Term
|
Definition
the principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
messages and information remain available only to those authorized to view them. |
|
|
Term
|
Definition
govern the ethical and moral issues arising from the development and use of information technologies. |
|
|
Term
|
Definition
unauthorizes use, duplication, distribution of copyrighted software. |
|
|
Term
|
Definition
looks like the real thing and sold as such |
|
|
Term
Digital rights management |
|
Definition
technological solution that allows publishers to control their digital media to discourage illegal copying and distribution |
|
|
Term
|
Definition
examines the organizational resource of information and regulates it ensuring it has the types of data/information required to function and grow effectively. |
|
|
Term
|
Definition
a method of government for information management or control |
|
|
Term
|
Definition
the act of conforming, acquiescing, or yielding information |
|
|
Term
|
Definition
ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged |
|
|
Term
|
Definition
companies digital response to litigation |
|
|
Term
|
Definition
procedures that address information management along with the ethical use of computers and internet in business environment |
|
|
Term
Ethical computer use policy |
|
Definition
general principles to guide computer user behavior |
|
|
Term
information privacy policy |
|
Definition
general principles regarding information privacy |
|
|
Term
acceptable use policy (AUP) |
|
Definition
requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet. |
|
|
Term
|
Definition
a contractual stipulation to ensure that business participants do not deny (repudiate) their online actions. |
|
|
Term
|
Definition
general principles to guide the proper use of the internet |
|
|
Term
|
Definition
electronic defacing of an existing website |
|
|
Term
|
Definition
registering purposely misspelled variations of a well-known domain name |
|
|
Term
|
Definition
details the extent to which email messages may be read by others. |
|
|
Term
|
Definition
outlines the corporate guidelines or principles governing employee online communications |
|
|
Term
|
Definition
tracks peoples activities by such measures as number of keystrokes, error rate, and number of transactions processed |
|
|
Term
employee monitoring policy |
|
Definition
how, when, and where a company monitors its employees |
|
|
Term
|
Definition
period when the system is unavailable |
|
|
Term
|
Definition
encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. |
|
|
Term
|
Definition
hackers use their social skills to trick people into revealing access credentials or other valuable information. |
|
|
Term
information security plan |
|
Definition
details how firm will implement the information security policies |
|
|
Term
|
Definition
reroutes requests for legit websites to false websites |
|
|
Term
|
Definition
program that takes over a computer for the purpose of launching attacks on other computers |
|
|
Term
Authentication v authorization |
|
Definition
a method for confirming user's identities. v the process of providing a user with permission including access levels and abilities |
|
|
Term
|
Definition
small electronic devices that change a users password automatically |
|
|
Term
|
Definition
identifying a user based on physical characteristics such as fingerprint. iris, voice etc |
|
|
Term
|
Definition
scrambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
Public Key Encryption (PKE) |
|
Definition
firms send out public key and uses private key when encrypted info comes back to firm |
|
|
Term
|
Definition
hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings |
|
|
Term
|
Definition
use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals. |
|
|
Term
intrusion detection software (Ids) |
|
Definition
full-time monitoring that searches for intruders in network traffic |
|
|