Friday, April 2, 2010

Chapter Four - Ethics and Information Security

1. Explain the ethical issues surrounding technology:

The ethical issues surrounding technology comprise of:

Intellectual property -
This refers to an individual's rights which protects their efforts, skills and knowledge.

Fair use doctrine -
These are situations where you use someones property but you don;t make profits.

Pirated software - This refers to software in which is copyright being used illegally e.g. running desktops that are unlicensed.

Counterfeit software - This is where a software has been duplicated and sold so it looks like the original software i.e. claiming it as your own software.



2. Describe the relationship between an 'email privacy policy; and an 'internet use policy':

An email privacy policy is a corporate email system in which it can be checked and determines how the email system in an organisation is going to be used e.g. not allowing employees to send spam emails to colleagues. An internet use policy is a guide on how to use the internet.

3. Summarise the five steps to creating an information security plan:

The picture below in which I created provides the five steps in creating an information security plan:




4. What do the terms; authentication and authorisation mean, how do they differ, provide some examples of each of them:


Authentication is ensuring an individuals identity by them claiming who they say they are i.e. something the user is e.g. biometrics, something the user has e.g. smart or token cards and something the user knows e.g password. It differs to authorisation as authorisation means that you are giving someone you consent to do something that is allowing the right people to access the right areas in the internet e.g. a member in an organisation being part of the marketing group which allows them to access marketing resources.

5. What are the five main types of security risks, suggest one method to prevent the severity of risk:

The following are the five types of security risks and the mechanisms that should be put in place:

Human error - Standards of training

Technological Failure -
Robust systems, backups

Natural disaster -
Disaster recovery; all organisations should have a disaster recovery plan and in it should be things like a communication plan, location of backup data, business continuity etc.

Deliberate acts -
These could include hackers, disgruntled employees, viruses and spams

Management failures -
This is where there is no back up in place and there is a lack of documentation and a suggested method would be to have some support training for managers in place.





References:


Baltzan, Phillips, Lynch, Blakey. Business Driven Information Systems. 1st Australian/New Zealand Edition. Mc Graw Hill. 2010.

kerls1982's Channel 2009, YouTube, viewed 4 April 2010, http://www.youtube.com/watch?v=emv88g0LVbw

Thursday, April 1, 2010

Chapter 3 Questions: E-Commerce

What is an IP address? What is it's main function?

An IP address is where every computer is given a different number out of the whole world. The main function of an IP address is to allow computers to communicate with each other. An IP address is also referred to as Transmission Control Protocol or Internet Protocol.

What is Web 2.0? How does it differ from Web 1.0?

Web 2.0 is also known as a live web. This is where users join forces and establish their very own material. Web 1.0 however is a one way published web.

What is Web 3.0?


This is a new concept that changes a web into a database and is an evolutionary path to artificial intelligence. An example of this is through the use of tagging people in a photo.





Describe what different methods an organisation can use to access information:

An organisation can use the following to access information:

One method that a business can use to access information is through the organisation's intranet. This is a private section on the internet that only employees or employers can access if they wish to seek information or software applications. Another method is through using using portals as it is a webpage that combines many systems to appear on one page. A business can also use the extranet where it is likewise an intranet but allows other firms, appropriate groups and executive partners on the intranet to share certain types of data.

What is eBusiness? how does it differ from eCommerce?

This is where a business is done through the internet. Customer service and collaborating with business partners is also conducted, not just buying and selling goods. E-commerce refers to buying and selling goods over the internet.

List and describe the various eBusiness models:




List 3 metrics you would use if you were hired to assess the effectiveness and the efficiency of an eBusiness website:


1. Determine how long people spend on a site
2. Obtain demographic information
3. Utilise e-Business data to identify at what times people buy or sell
something over the internet so that the business can market.

Outline 2 opportunities and 2 challenges faced by companies doing business online:

Below is a chart illustrating both opportunities and challenges that companies could potentially face whilst doing business online.



References:

Baltzan, Phillips, Lynch, Blakey. Business Driven Information Systems. 1st Australian/New Zealand Edition. Mc Graw Hill. 2010.

davidEPN's Channel 2007, YouTube, viewed 4 April 2009, http://www.youtube.com/watch?v=bsNcjya56v8.

explainingcomputers' Channel 2007, YouTube, viewed 4 April 2009, http://www.youtube.com/watch?v=7BAXvFdMBWw&feature=fvw