Chapter 4 BIS 300
Popular in Management Information Systems
Popular in Information technology
verified elite notetaker
This 3 page Class Notes was uploaded by Keith Cubert on Sunday September 6, 2015. The Class Notes belongs to BIS 300 at Northern Kentucky University taught by Chad Allen Anderson in Fall 2015. Since its upload, it has received 319 views. For similar materials see Management Information Systems in Information technology at Northern Kentucky University.
Reviews for Chapter 4
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 09/06/15
BIS 300 Chapter 4 Three important concepts regarding the web and network privacy Acceptable use policies Accountability and nonrepudiation Acceptable use of policies Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance Accountability Refers to issues involving both the user s and the organization s responsibilities and liabilities Nonrepudiation Is a method for binding all the parties to a contract Because of Concerns about privacy hardware or software controls should be used to determine what personal information is provided on the web To minimize the invasion of privacy users and organizations should adhere to the following guidelines Conduct business only with Web sites with privacy policies that are easy to find read and understand Limit access to your personal information to those who have authorization Any organization creating maintaining using or disseminating records of personal data must ensure the data s reliability and take precautions to prevent misuse of the data Any data collection must have a stated purpose Organizations should keep collected information only as long as it is needed for the stated purpose There must be a way for people to prevent personal information that was gathered about them for one purpose from being used for other purposes or being disclosed to others without their consent Organizations should monitor data collection and entry and should use verification procedures to ensure data accuracy they should also collect only the data that is necessary Records kept on an individual should be accurate and up to date Organizations must correct or delete data when it is no longer needed for the stated purpose Users should be able to review their records and correct any inaccuracies The existence of record keeping systems storing personal data should not be kept secret Organizations must take all necessary measures to prevent unauthorized access to data and misuse of data Spam Is an unsolicited email sent for advertising purposes Statistics from email and spam 2012 o 433 number of email clients worldwide 0 1443 number of emails per day worldwide 0 69 spammed o 61 emails were considered unnecessary o 22 of email was malicious Cookies Small text files with unique ID tags that are embedded in a web browser and saved on the user s hard drive Log files Generated by Web server software Legal ega record a user s actIons on a web Site Ethical I H 1 You make two copies of a software unEthical I IV package you just brought and sell one to a friend legal and unethical BIS 300 Chapter 4 You make two copies of a software package you just bought for personal use in case the original software fails and you need a backup Ethical because you made a copy for your own use but its prohibited sometimes by other vendors A banker uses the information a client enters in a loan application to sell other financial products to this client Legal but unethical A credit card company sells its customers mailing addresses to its competitors Legal but unethical A supervisor fires a programmer who has intentionally spread viruses to the organizations network Supervisor s behavior is both legal and ethical Supervisor has a clear legal reason Code of ethics and professional conduct that includes the following general moral imperatives i ii iii iv v vi vii viii Contribute to society and human wellbeing Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patents Give proper credit for intellectual property Respect the privacy of others Honor confidentiality As a knowledge worker you should consider the following questions and statements before making a work related decision 1 2 3 4 5 5 7 8 gt gt Does this decision comply with my organizations values How will I feel about myself after making the decision If I know this decision is wrong I must not make it If I am not sure about this decision I must ask my supervisor before making it Is the decision right Is the decision fair How will I feel if somebody else makes this decision on my behalf Is the decision legal Would I want everyone to know about this decision after I make it Intellectual property Legal umbrella covering protections that involve copyrights trademarks trade secrets and patents for quotcreations of the mind developed by people or businesses Three ways a business can benefit from a patent in at least three ways 0 It can generate revenue by licensing its patent to others 0 It can use the patent to attract funding for further research and development 0 It can use the patent to keep competitors from entering certain market segments To avoid the following legal risks organizations should have an internet use policy 1 2 3 Risk 1 If employees download pornographic materials to their office computers over the corporate network the organization could be liable for harassment charges as well as infringement of privacy and even copyright laws Risk 2 Indecent email exchanges among employees can leave the corporation open to discrimination and sexual harassment charges Risk 3 Employees using the corporate network to download and distribute unlicensed software can leave the corporation open to serious charges of copyright infringement and other legal Issues BIS 300 Chapter 4 Cybersquatting Registering selling or using a domain name to profit from someone ese s trademark Digital divide Computers still are not affordable for many people The digital divide has implications for education Digital divide Computers still are not affordable for many people The digital divide has implications for education Virtual Organizations Networks or independent companies suppliers customers and manufacturers connected via information technologies so they can share skills and costs and have access to each others markets Advantages of virtual organizations include the following 0 Each participating company can focus on what it does best thus improving the ability to meet customers needs 0 Because skills are shared among participatingcompanies the cost of hiring additional employees isreduced 0 Companies can respond to customers faster and more efficiently o The time needed to develop new products is reduced 0 Products can be customized more to respond to customers needs Green Computing Involves the design manufacture use and disposal of computers servers and computing devices such as monitors printers storage devices and networking and communications equipment in such way that there is minimal impact on the environment Here are some ways that Green Computing can be achieved 0 Design products that last longer and are modular in design so certain parts can be upgraded without replacing the entire system 0 Design search engines and other computing routines that are faster and consume less energy 0 Replace several underutilized smaller servers with one larger server using a virtualization technique 0 Use computing devices that consume less energy and are biodegradable 0 Allow certain employees to work from their homes resulting in fewer cars on the roads 0 Replace actual face to face meetings with meetings over computer networks 0 Use video conferencing electronic meeting systems and groupware They reduce business travel as well 0 Use virtual world This technology can also reduce face to face meeting resulting in less travel 0 Use cloud computing as promoted by companies such as Amazon This platform can reduce energy consumption 0 Turn off idle PC s recycle computer related materials and encourage carpool and non motorized transportation for employees
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'