What are
Easy to compile
Increased richness
Increased reach
Improved content
What is Govern the ethical and moral issues arising from the development and use of information technologies?
The most secure type of authentication involves these three things
Something the user knows
Something the user has
Something that is part of the user
legal and ethical
illegal but ethical
legal but unethical
illegal and unethical
Content filtering
Prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading
What are website metrics to improve effectiveness?
information management
information governance
information compliance
information secrecy
information property
This is by far the best and most effective way to manage authentication
Web 1.0 is static and only allows users to read
Web 2.0 is interactive and allows users to change content
Web 3.0 uses intelligence applications, machine based learning.
B2B, B2C, C2B, C2C
ethical computer use
information privacy
acceptable use
email privacy
social media
workplace monitoring
the most ineffective form of authentication
a user ID and a password
Features full-time monitoring tools that search for patterns in network traffic to identify intruders
Intrusion detection software