ISYS 250 Lecture Notes - Lecture 4: Web Browser, Web Server, Typosquatting

98 views2 pages

Document Summary

Users should: conduct business only with web sites that have privacy policies, limit access to personal information to those with authorization. Make sure any data collection has a stated purpose: use veri cation procedures to ensure data accuracy. Small text les with unique id tags that are embedded in a web browser and saved on the user"s hard drive. Log les: record a user"s actions on a web site and are generated by web server software. Organizations can reduce unethical behavior of employees by developing and enforcing codes of ethics. Public information: posted by an organization or public agency, censored for public policy reasons. Private information: posted by a person, uncensored because of constitutional freedom of expression. Industrial property: inventions, trademarks, logos, and industrial designs. Copyrighted material: literary and artistic works, online materials such as web pages, html code, and computer graphics.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents