Preview

Itm 309 Exam Two Note

Powerful Essays
Open Document
Open Document
6414 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itm 309 Exam Two Note
Page 1 of 15

ITM 309 Fall 2010 Exam Two Review Outline – November 3, 2010

Ethics and Information Security – Chapter 4 1. Business Ethics
Ethics – the principles and standards that guide our behavior toward other people  Issues affected by technology advances: 1) Intellectual property- Intangible creative work that is embodied in physical form 2) Copyright- The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents 3) Fair use doctrine- In certain situations, it is legal to use copyrighted material 4) Pirated software- The unauthorized use, duplication, distribution, or sale of copyrighted software 5) Counterfeit software- Software that is manufactured to look like the real thing and sold as such  Privacy is a major ethical issue 1) Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent 2) Confidentiality – the assurance that messages and information are available only to those who are authorized to view them

2.


BW: Ethics 101 for Interns
Ethics in the Workplace: 1) Workplace monitoring is a concern for many employees 2) Organizations can be held financially responsible for their employees’ actions 3) The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical IT and Ethics (Individuals form the only ethical component of Information Technology): 1) Individuals copy, use , and distribute software 2) Search organizational databases for sensitive and personal information 3) Individuals create and spread viruses 4) Individuals hack into computer systems to steal information 5) Employees destroy and steal information



3.

Security Management Planning and Lines of Defense

Information Security – the protection of information from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Samuel Aggor CSC 1100 3/3/16 Assignment 5 Problem 1 a. Output: 3.94 b. Output: 6.67 c. Output: 15.00 d. Output: -35.00 e. Output: 0 Problem 2 a. Output: 62 b. Output: 20160 c. Output: 20 213837312 d. Output: 1 Problem 3 a. Func1 has two parameters. Func1 is an integer function. b. Func2 has three parameters. Func2 is a double function.…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3. Analyze or determine the year of release for all CD’s or DVD’s in collection.…

    • 137 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    uiuc fshn 120 exam 1

    • 10249 Words
    • 41 Pages

    What is the term for an imitation treatment that has no known physical effect or therapeutic value on the subjects in a research study?…

    • 10249 Words
    • 41 Pages
    Good Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Exam Paper Afin253

    • 3460 Words
    • 14 Pages

    SEAT NUMBER: ……….… ROOM: .………………. FAMILY NAME.………….....…………………………. This question paper must be returned. Candidates are not permitted to remove any part of it from the examination room. OTHER NAMES…………….…………………..…….. STUDENT NUMBER………….………..……………..…

    • 3460 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    Exercise 1-9 Final Exam

    • 1831 Words
    • 8 Pages

    can phone in or mail in your exam. If you’re unable to take the exam…

    • 1831 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several roles within the health information management (HIM) profession. A HIM professional gathers, preserves, evaluates and guard’s personal health information within many different health care settings. One of the most important duties in regards to a HIM professional is ensuring compliance and upholding the current regulations in the health care industry. This paper will take a closer look at the specifics of what a HIM professional does to ensure compliance as well as the importance of education and certifications that many employers are now requiring for potential candidates in the HIM field.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment BBAC 101 2 1

    • 722 Words
    • 9 Pages

    This assignment must be submitted online (Turn-it-in) and also in person (a hard copy). It is no longer possible to submit assessment via email (absolutely not acceptable).…

    • 722 Words
    • 9 Pages
    Good Essays
  • Good Essays

    PSYC 321 exam 2 notes

    • 2090 Words
    • 9 Pages

    b. Closed ended questions: a directive interview style and requires short concise answers from the Client, such as multiple choice and “Yes or No”, it has advantages though because the therapist can gather specific information, reduces bias due to clinical judgment and its easier to administer…

    • 2090 Words
    • 9 Pages
    Good Essays
  • Good Essays

    According to Trevino and Nelson (2007), “Managers care about ethics in part because they face the thorny problem of how to prevent and manage unethical behavior in their ranks.” Unethical behaviors, such as posting information about the safety of the company on a personal blog and ultimately hacking into someone else’s personal computer and…

    • 741 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 201 Level 2

    • 504 Words
    • 3 Pages

    Share information, ask and reply to questions, keep up to date of any changes, feedback, build team work, be professional, makes a better atmosphere, better customer service and may prevent mistakes.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Employee monitoring has emerged as a necessity and yet as a very controversial issue due to the widespread use of technology. Employee monitoring is the act of watching and monitoring employees' actions during working hours using employer equipment/property. This phrase can be a little scary as an employee, where is the line? The restroom is their property; thankfully there are employers who know their boundaries. Legally employers are continuing to monitor their employees. The only issue that seems to be addressed is how much they can monitor them.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The idea of employee rights involves many complex issues. An employee’s right to a workplace free of discrimination and harmful environmental factors is obvious. Yet, other issues surrounding privacy, personal expression, and communication monitoring are not as clear-cut. While employees may feel that they have the right to express their opinions and use business communications while working, not only may they be fooling themselves but they are acting in a way that is unethical. While businesses do not have the right to control employee behaviors outside of the workplace, they do have the right to monitor and control communications and employee actions during paid time. As such, employees have the right to reasonable expectations in terms of communication, yet cannot (within limits) ethically demand a right to privacy, private communication, or personal expression while they are utilizing business property or on business time. Workplace privacy has been a hot issue in the last decade, as more and more workplaces incorporate email and Internet-use into the office environment. Many employees now use email and the Internet daily, not to mention the telephone (Nord, McCubbins, & Nord, 2006). With high volumes of communicatio…

    • 917 Words
    • 4 Pages
    Good Essays