Term
| Chief Information Officer(CIO) |
|
Definition
| responsible for overseeing all uses of information technology and ensuring that IT is aligned with the organization’s strategic initiatives |
|
|
Term
| Chief Executive Officer (CEO) |
|
Definition
| responsible for the success or failure of the company. The highest ranking corporate officer, this person is in charge of total management of an organization. |
|
|
Term
| Chief Technology Officer (CTO) |
|
Definition
| responsible for ensuring the accuracy, availability, reliability, speed and throughput of an organization’s information technology. |
|
|
Term
| Chief Privacy Officer (CPO) |
|
Definition
| responsible for ensuring the ethical and legal use of information within and organization. Required to understand the complex legal issues which surround the use of information, CPOs are lawyers by training. |
|
|
Term
| Chief Security Officer (CSO) |
|
Definition
| responsible for ensuring security of IT systems. CSOs develop strategies and IT safeguards against attacks from hackers, viruses and more. They are required to have detailed knowledge of networks and telecommunications. |
|
|
Term
| Chief Knowledge Officer (CKO) |
|
Definition
| responsible for collecting, maintaining, and distributing the organization’s knowledge. CKOs design programs and systems that make it easy for people to reuse knowledge. They constantly encourage employee contributions to keep the organization’s systems up-to-date. |
|
|
Term
|
Definition
| The principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
| the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent |
|
|
Term
| Primary Reasons Privacy issues reduce trust for Ebusiness |
|
Definition
1. Loss of personal privacy is a top concern for Americans in the 21st century 2. Among Internet users, 37 percent would be "a lot" more inclined to purchase a product on a website that had a privacy policy 3. Privacy/security is the number one factor that would convert Internet researchers into buyers |
|
|
Term
|
Definition
| a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
| refers to the extent of detail within the information(fine and detailed or coarse and abstract) |
|
|
Term
| Transactional Information |
|
Definition
| encompasses all of the information contained within a single business process or unit of work. |
|
|
Term
|
Definition
| encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. |
|
|
Term
|
Definition
| immediate, up-to-date information |
|
|
Term
|
Definition
| Provide real time information in response to query requests |
|
|
Term
|
Definition
| consists of the physical devices associated with a computer system |
|
|
Term
|
Definition
| the set of instructions that the hardware executes to carry out specific tasks |
|
|
Term
|
Definition
| an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data |
|
|
Term
| Central processing unit (CPU) (or microprocessor) |
|
Definition
| the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together |
|
|
Term
|
Definition
| interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions |
|
|
Term
| The Broad Functions of CIO |
|
Definition
- Manager -Leader -Communicator |
|
|
Term
|
Definition
| Intangible creative work that is embodied in physical form |
|
|
Term
|
Definition
| The legal protection afforded an expression of an idea, such as a song, video game, and some types of property documents |
|
|
Term
|
Definition
| In certain situations, it is legal to use copyrighted material |
|
|
Term
|
Definition
| The unauthorized use, duplication, distribution, or sale of copyrighted software |
|
|
Term
|
Definition
| Software that is manufactured to look like the real thing sold as such |
|
|
Term
| The basic categories of costs of Downtime |
|
Definition
| Financial Performance, Revenue, Damaged Reputation, Other Expenses |
|
|
Term
|
Definition
| Individual, Department, Enterprise |
|
|
Term
|
Definition
| Document, Presentation, Spreadsheet, Database |
|
|
Term
|
Definition
| Detail(Fine), Summary, Aggregate,(Coarse) |
|
|