W9 Business Intelligence and Business analytics Flashcards
Explain what is
Ethic and
the components of ethics
The principles of right and wrong Based on Their behaviour Morals Components: Responsibilities: accepting consequence Accountability, Liability
Explain what is
Responsible Computing/ Ethical Dilemmas and
what is the manager’s role
Using unethical IS strategy to attain a competitive advantage.
STEPS
1) assess ethical view
2) overrides business view with ethical view
3) implement
Discuss the difference between Ethics and law
Ethics: Principle of right versus wrong Based on Their behaviour Morals Law: Rules set by court/ legislature Based on laws
Explain the different ethical views
Utilitarian approach: > Good or < Harm
Right Approach: >Protect rights/morals
Fairness Approach: treat all humans equal
Common good approach: respect and compassion for all others
Identify all the different steps in the Ethical decision framework
1) Recognise an ethical issue
2) Get the facts
3) Evaluate alternative actions
4) Make a Decisions and Test It
5) Act and Reflect on the Outcome of Decisions
Define what is
privacy and
information privacy
Privacy: right to be alone, individual control their privacy Definition of information privacy: Right to collect and To what extent
Identify and define the 4 different ethical issues
Privacy Issue: collecting, storing and analysing of individuals
Choice (desired level),
Consent,
Control (over settings)
Accuracy Issue:
Accuracy,
Deal with inaccuracy
Property Issue: Ownership of information
how data is collected, stored, used, shared
Accessibility Issue: Who has access to the information and how much
Access, protection,
avoid harm who attain data
Identify different privacy issues and related issue with
Electronic Surveillance and
Web2.0 and privacy
Electronic surveillance.
Data->Advantage
Web 2.0 and privacy:
misuse of information to harm others
Define Privacy policies and codes
Guidelines to protect privacy of others Data collection: Legitimate purpose, not in excess, consent Data Accuracy: verified, current, disagreement = disclose Data confidentiality: no authorised, no 3rd party, data is maintained
Explain what is the manager role when dealing with privacy issues
Implement controls highlighted be PAPA Implement best practices Culture of moral responsibility Process Governance (identify security risk) Avoid decoupling Deter thieves Respect customer privacy
Define what is
IS security and
IS security management
IS Security: risk of crime activity, hazards, damage/loss
IS Security Management: Process and policies
Identifying the threats: The different dangers
Identifying the exposure: the damage done
Identifying the vulnerability: % of harm from a threat
Identify the 5 Trending factor result in increasing vulnerability
Interconnected business environment
Accessible computing (computer now are easy to steal)
Ease of hacking: hack can be downloaded
International crime: Cybercrime
Lack of management support: Employees are not following security procedures
Identify different
external and
internal threats
External:
Internet attacks,
natural/
man made disasters
Internal:
Employees (misuse of power/info, duplication, human error)
System/software (failure, info leak, unauthorised software)
Hardware: Unauthorised access, software/physical attacks
Identify different Intentional attacks
PHYSICAL THEFT or ATTACK Espionage or trespass, Identify Theft Theft of equipment or information Information extortion SOFTWARE Software attack malicious software, Alien software (adware, spyware, spamware, cookies and track cookies) Cyberterrorism and cyber warfare OTHER Sabotage or vandalism, Supervisory Control and Data Acquisition Attacks (SCADA)
Identify
different unintentional attacks and
different threats
Human errors: Laziness THREATS: Senior, HR, IS Social engineering: Tricking THREATS: Impersonations, tailgating, shoulder surfing lack of security controls: Lack of updates