Term
|
Definition
| anything that can be documented, codified, achieved |
|
|
Term
|
Definition
| websites that rely on user participation |
|
|
Term
|
Definition
| an application that connects people by matching profile information |
|
|
Term
|
Definition
| Specific keywords or phrases incorporated into website content for means of classification or taxonomy |
|
|
Term
|
Definition
| gets brand out there, a free way of market research. |
|
|
Term
|
Definition
| Blogs: online journal, wikis: website that allows users to add, remove, and change content, mashups: content from more than one source to create a new product or service. |
|
|
Term
|
Definition
Technology Dependence: breaches of privacy, security, power outages, internet goes out. Information Vandalism: Violations of copyright and plagiarism: |
|
|
Term
|
Definition
| Based in "intelligent" web applications. Modern day web. (suri) |
|
|
Term
|
Definition
| A component of web 2.0 that describes things in a way that computers can understand. |
|
|
Term
|
Definition
| interact with government agencies and transactions online. |
|
|
Term
|
Definition
| the ability to purchase goods and services through a wireless internet-enabled device |
|
|
Term
|
Definition
| principles and standards that guide our behavior to ward other people |
|
|
Term
|
Definition
| intangible element of business thats worth something |
|
|
Term
|
Definition
| copied and sold like as if it was the original product |
|
|
Term
|
Definition
| The right to be left alone when you want to be |
|
|
Term
|
Definition
| the assurance that messages and information a available to those who are authorized to see them. |
|
|
Term
| the only ethical part of mis |
|
Definition
|
|
Term
|
Definition
| examines the organizational aspect of information |
|
|
Term
| Ethical computer use policy |
|
Definition
| general principles to guide computer user behavior |
|
|
Term
| information privacy policy |
|
Definition
| contains general principles regarding information privacy |
|
|
Term
| (AUP) accepted use policy |
|
Definition
| a user agrees to follow it to be provided access to corporate email, information systems, and the internet. |
|
|
Term
|
Definition
| details the extent to which others can read emails. Company legally has the rights to read your email |
|
|
Term
|
Definition
|
|
Term
|
Definition
| simply states that email users will not send unsolicited emails. |
|
|
Term
|
Definition
| outlines the corporate guidelines or principles governing employee online communications |
|
|
Term
| information technology monitoring |
|
Definition
| tracks people's activities |
|
|
Term
|
Definition
| legal protection afforded an expression of an idea |
|
|
Term
|
Definition
| intangible creative work that is embodied in physical form an includes copyrights, trademarks, and patents. |
|
|
Term
|
Definition
| an exclusive right to make, use, and sell an invention, and is granted by gov't to the inventor |
|
|
Term
|
Definition
| the principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
| messages and information remain available only to those authorized to view them. |
|
|
Term
|
Definition
| govern the ethical and moral issues arising from the development and use of information technologies. |
|
|
Term
|
Definition
| unauthorizes use, duplication, distribution of copyrighted software. |
|
|
Term
|
Definition
| looks like the real thing and sold as such |
|
|
Term
| Digital rights management |
|
Definition
| technological solution that allows publishers to control their digital media to discourage illegal copying and distribution |
|
|
Term
|
Definition
| examines the organizational resource of information and regulates it ensuring it has the types of data/information required to function and grow effectively. |
|
|
Term
|
Definition
| a method of government for information management or control |
|
|
Term
|
Definition
| the act of conforming, acquiescing, or yielding information |
|
|
Term
|
Definition
| ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged |
|
|
Term
|
Definition
| companies digital response to litigation |
|
|
Term
|
Definition
| procedures that address information management along with the ethical use of computers and internet in business environment |
|
|
Term
| Ethical computer use policy |
|
Definition
| general principles to guide computer user behavior |
|
|
Term
| information privacy policy |
|
Definition
| general principles regarding information privacy |
|
|
Term
| acceptable use policy (AUP) |
|
Definition
| requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet. |
|
|
Term
|
Definition
| a contractual stipulation to ensure that business participants do not deny (repudiate) their online actions. |
|
|
Term
|
Definition
| general principles to guide the proper use of the internet |
|
|
Term
|
Definition
| electronic defacing of an existing website |
|
|
Term
|
Definition
| registering purposely misspelled variations of a well-known domain name |
|
|
Term
|
Definition
| details the extent to which email messages may be read by others. |
|
|
Term
|
Definition
| outlines the corporate guidelines or principles governing employee online communications |
|
|
Term
|
Definition
| tracks peoples activities by such measures as number of keystrokes, error rate, and number of transactions processed |
|
|
Term
| employee monitoring policy |
|
Definition
| how, when, and where a company monitors its employees |
|
|
Term
|
Definition
| period when the system is unavailable |
|
|
Term
|
Definition
| encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. |
|
|
Term
|
Definition
| hackers use their social skills to trick people into revealing access credentials or other valuable information. |
|
|
Term
| information security plan |
|
Definition
| details how firm will implement the information security policies |
|
|
Term
|
Definition
| reroutes requests for legit websites to false websites |
|
|
Term
|
Definition
| program that takes over a computer for the purpose of launching attacks on other computers |
|
|
Term
| Authentication v authorization |
|
Definition
| a method for confirming user's identities. v the process of providing a user with permission including access levels and abilities |
|
|
Term
|
Definition
| small electronic devices that change a users password automatically |
|
|
Term
|
Definition
| identifying a user based on physical characteristics such as fingerprint. iris, voice etc |
|
|
Term
|
Definition
| scrambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
| Public Key Encryption (PKE) |
|
Definition
| firms send out public key and uses private key when encrypted info comes back to firm |
|
|
Term
|
Definition
| hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings |
|
|
Term
|
Definition
| use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals. |
|
|
Term
| intrusion detection software (Ids) |
|
Definition
| full-time monitoring that searches for intruders in network traffic |
|
|