Chapter 4: Ethics and Information Security - MIS Business Concerns Flashcards
What is information ethics?
Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself.
What is digital trust?
The measure of consumer, partner, and employee confidence in an organization’s ability to protect and secure data and the privacy of individuals.
What is ediscovery (electronic discovery)?
The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, etc.
Which act was passed to protect minors from accessing inappropriate material on the Internet?
Child Online Protection Act COPA
What are Epolicies?
Policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
List 6 Epolicies.
- Ethical computer use policy
- Information privacy policy
- Acceptable use policy
- Email privacy policy
- Social media policy
- Workplace monitoring policy
What is an ethical computer use policy?
General principles to guide computer use behaviour (such as refraining from playing games during working hours)
What is click-fraud?
Abuse of pay-per-click, pay-per-call, etc revenue models by repeatedly clicking a link to increase charges or costs for the advertiser.
What is competitive click-fraud?
Done by a competitor or disgruntled employee to increase advertising costs.
Which epolicy is the most important?
Ethical computer use policy
What is data/web scraping?
Process of extracting large amounts of data from a website and saving it to a spreadsheet or computer.
What is the GDPR?
General Data Protection Regulation. The world’s strongest fair information practices in Europe. It is a legal framework that sets guidelines for the collection and processing of personal info of individuals within the EU.
What is an acceptable use policy?
Requires a user to agree to follow it to be provided access to corp information, information systems, and the Internet.
What is typosquatting?
Registering purposely misspelled variations of well-known domain names.
What is an email privacy policy?
The extent to which email messages may be read by others.
What is teergrubing?
Anti-spamming approach by which the receiving computer launches a return attack against a spammer, sending emails back to the computer that originated the spam.
What is the right to be forgotten?
European Commission’s proposal to create a sweeping individual privacy right allowing individuals to request to have all content that violates their privacy removed.
What is social media monitoring?
Process of monitoring and responding to what is said about a company, typically falls to the social media manager.
What is workplace MIS monitoring?
Tracks peoples activities by measures as number of keystrokes, error rate, number of transactions processed.
What is an employee monitoring policy?
States how, when, and where the company monitors its employees.
What are the 4 categories that make up the cost of downtime?
Financial performance, revenue, damaged reputation, other expenses.
What is the primary tool an organization can use to combat threats associated with downtime?
Information security
What are white-hat hackers?
Work at the request of the system owners to find system vulnerabilities and plug holes.
What are script kiddies/bunnies?
Find hacking code on the Internet and click-and-point their way into systems to cause damage and spread viruses
What are Crackers?
Hackers with criminal intent
What are Hactivists?
Have philosophical and political reasons for hacking
What is a bug bounty program?
Crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
What are botnets?
Malware that causes a collection of connected devices to be controlled by a hacker.
What is a worm and how is it different than a virus?
Worms spread themselves from file to file and computer to computer. Viruses must attach to something to spread, worms do not need to attach to anything.