Easy to compile
Increased richness
Increased reach
Improved content
What is Govern the ethical and moral issues arising from the development and use of information technologies?
what is a cookie?
small file deposited on a hard drive by a website that contains information about customers and their Web activities
The most secure type of authentication involves these three things
Something the user knows
Something the user has
Something that is part of the user
What is disruptive technology and three examples?
A new way of doing things that initially does not meet the needs of existing customers
Examples: steamboats, transistor radios and Intel's 8088 processor are all examples of this kind of technology.
What is the World Wide Web (www)?
uses html to create files that can be viewed using the Internet.
What is Personalization and an example?
Occurs when a company knows enough about a customer’s likes and dislikes that it can fashion offers more likely to appeal to that person
An example of this is when Amazon is able to create your own listing of recommended items based on your previous purchasing history
legal and ethical
illegal but ethical
legal but unethical
illegal and unethical
Content filtering
Prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading
What are the 4 website metrics to improve effectiveness? visitor metrics, exposure metrics, visit metrics, hit metrics.
visitor metrics, exposure metrics, visit metrics, hit metrics.
information management
information governance
information compliance
information secrecy
information property
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting, VERY COSTLY.
This is by far the best and most effective way to manage authentication
public key encryption (PKE)
type of prevention and resistance where information is encrypted
Web 1.0 is static and only allows users to read
Web 2.0 is interactive and allows users to change content
Web 3.0 uses intelligence applications, machine based learning.
B2B, B2C, C2B, C2C
ethical computer use
information privacy
acceptable use
email privacy
social media
workplace monitoring
the most ineffective form of authentication
a user ID and a password
Intrusion detection software
Features full-time monitoring tools that search for patterns in network traffic to identify intruders