MIS 180 Lecture Notes - Lecture 4: Keystroke Logging, Anti-Spam Techniques, Public-Key Cryptography

53 views7 pages

Document Summary

Information does not have ethics, people do: info does not care how it is used, it will not stop itself from sending spam, Monday, october 16, 2017 viruses, or highly-sensitive info: tools to prevent information misuse. Developing information management policies: organizations strive to build a corporate culture based on ethical principles that employees can understand and implement. Information privacy policy: the unethical use of info typically occurs unintentionally when it is used for new purposes, information privacy policy- contains general principles regarding info privacy. Email privacy policy: spam- unsolicited email, anti-spam policy- simply states that email users will not send unsolicited emails (or spam) Social media policy: outlines the corporate guidelines or principles governing employee online communications. Monday, october 16, 2017: web log, clickstream. Security threats caused by hackers and viruses: hacker- experts in technology who use their knowledge to break into computers and computer networks, either for pro t or just motivated by the challenge.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents