Chapter 4 MIS flashcards by anki gpt

1
Q

What are ethics in the context of information systems?

A

Principles guiding behavior in the use of technology and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is digital trust?

A

Confidence in an organization’s ability to protect data and ensure privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of an ethical computer use policy?

A

To guide user behavior and ensure responsible use of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is click-fraud?

A

Illegally increasing advertising costs by repeatedly clicking a link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an information privacy policy?

A

A document outlining how personal data is collected, used, and protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the General Data Protection Regulation (GDPR)?

A

A legal framework governing the use and protection of personal data in the EU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an acceptable use policy (AUP)?

A

A policy that users must agree to follow in order to access systems or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cyberbullying?

A

Transmitting threats or defamatory remarks through the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are spam and anti-spam policies?

A

Unsolicited emails; policies prevent the sending of spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social media monitoring?

A

Tracking and responding to what is being said about a company online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is workplace MIS monitoring?

A

Tracking employees’ activities, such as keystrokes or transactions, in the workplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is information security?

A

Protecting information from misuse by insiders or outsiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are black-hat hackers?

A

Hackers who break into systems for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a denial-of-service (DoS) attack?

A

An attack that floods a system with requests, preventing legitimate access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three primary security areas?

A

Authentication, prevention, and resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing?

A

Fraudulent attempts to obtain personal information through deceptive emails.

17
Q

What is biometrics?

A

Authentication through physical characteristics, like fingerprints or voice.

18
Q

What is a firewall?

A

A security measure that blocks unauthorized access to or from a network.

19
Q

What is encryption?

A

Converting information into a code to prevent unauthorized access.

20
Q

What is intrusion detection software?

A

Tools that monitor network traffic for patterns of unauthorized access.