Introduction to Organizational Information Systems
22 Questions
1 Views

Introduction to Organizational Information Systems

Created by
@ReachableHeliotrope6282

Questions and Answers

What is the main reason why individuals hack into computer systems?

To steal information

What is the primary goal of information security?

To protect organizational information from intentional or accidental misuse

What is the term used to describe a period of time when a system is unavailable?

Downtime

What is considered intellectual capital in an organization?

<p>Organizational information</p> Signup and view all the answers

Who is responsible for the ethical use of information?

<p>People</p> Signup and view all the answers

What is the term used to describe the protection of information from intentional or accidental misuse?

<p>Information security</p> Signup and view all the answers

What is the primary focus of information ethics?

<p>Governance of moral issues arising from information technologies</p> Signup and view all the answers

Which of the following is NOT an example of a business issue related to information ethics?

<p>Data backup and recovery</p> Signup and view all the answers

What is the primary concern of privacy in the context of information ethics?

<p>Both a and b</p> Signup and view all the answers

What is the term for the unauthorized use or reproduction of software?

<p>Counterfeit software</p> Signup and view all the answers

What is the role of individuals in the context of information ethics?

<p>All of the above</p> Signup and view all the answers

What is the primary goal of a black-hat hacker?

<p>To break into computers and networks for personal gain</p> Signup and view all the answers

What is the assurance that messages and information are available only to those who are authorized to view them?

<p>Confidentiality</p> Signup and view all the answers

What type of software is written with malicious intent to cause annoyance or damage?

<p>Malware</p> Signup and view all the answers

What is an example of a unplanned downtime source?

<p>Burst pipe</p> Signup and view all the answers

What is the primary goal of digital rights management?

<p>To protect intellectual property rights</p> Signup and view all the answers

What is the term for the principles and standards that guide our behavior toward other people?

<p>Ethics</p> Signup and view all the answers

Who is an expert in technology that uses their knowledge to break into computers and networks for profit?

<p>Black-hat hacker</p> Signup and view all the answers

What is the term for a hacker who develops malware for fun or to prove a point?

<p>Script kiddie</p> Signup and view all the answers

What is the primary difference between a virus and a worm?

<p>A virus requires user interaction to spread, while a worm does not</p> Signup and view all the answers

What is an example of a type of malware that demands payment in exchange for restoring access to data?

<p>Ransomware</p> Signup and view all the answers

Who is an expert in technology that uses their knowledge to break into computers and networks to identify vulnerabilities?

<p>White-hat hacker</p> Signup and view all the answers

Study Notes

Information Ethics

  • Ethics are the principles and standards that guide our behavior toward other people.
  • Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
  • Business issues related to information ethics include copyright, counterfeit software, digital rights management, intellectual property, patent, and pirated software.

Privacy and Confidentiality

  • Privacy is a major ethical issue, referring to the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
  • Confidentiality is the assurance that messages and information are available only to those who are authorized to view them.

Individuals and MIS

  • Individuals form the only ethical component of Management Information Systems (MIS).
  • Individuals copy, use, and distribute software, search organizational databases for sensitive and personal information, create and spread viruses, hack into computer systems to steal information, and destroy and steal information.

Acting Ethically and Legally

  • Acting ethically and legally are not always the same.

Information Misuse

  • Information does not care how it is used, it will not stop itself from sending spam, viruses, or highly-sensitive information.
  • Tools to prevent information misuse include information management, information governance, information compliance, information secrecy, and information property.

Protecting Intellectual Assets

  • Organizational information is intellectual capital that must be protected.
  • Information security is the protection of information from accidental or intentional misuse by persons inside or outside an organization.
  • Downtime refers to a period of time when a system is unavailable.

Sources of Unplanned Downtime

  • Sources of unplanned downtime include bomb threat, burst pipe, chemical spill, construction, corrupted data, earthquake, electrical short, epidemic, equipment failure, evacuation, explosion, fire, flood, fraud, frozen pipe, hail, hurricane, ice storm, insects, lightning, network failure, plane crash, power outage, power surge, rodents, sabotage, smoke damage, snowstorm, static electricity, strike, terrorism, theft, tornado, train derailment, vandalism, vehicle crash, virus, water damage, and wind.

Security Threats

  • Hacker is an expert in technology who uses their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
  • Types of hackers include black-hat hacker, cracker, cyberterrorist, hactivist, script kiddies or script bunnies, and white-hat hacker.
  • Virus is software written with malicious intent to cause annoyance or damage, which can include worm, malware, adware, spyware, ransomware, and scareware.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Learn about the ethical issues in the information age, information security, and the difference between hackers and viruses.

Use Quizgecko on...
Browser
Browser