MIS 180 Lecture Notes - Lecture 4: Keystroke Logging, Anti-Spam Techniques, Public-Key Cryptography
Document Summary
Information does not have ethics, people do: info does not care how it is used, it will not stop itself from sending spam, Monday, october 16, 2017 viruses, or highly-sensitive info: tools to prevent information misuse. Developing information management policies: organizations strive to build a corporate culture based on ethical principles that employees can understand and implement. Information privacy policy: the unethical use of info typically occurs unintentionally when it is used for new purposes, information privacy policy- contains general principles regarding info privacy. Email privacy policy: spam- unsolicited email, anti-spam policy- simply states that email users will not send unsolicited emails (or spam) Social media policy: outlines the corporate guidelines or principles governing employee online communications. Monday, october 16, 2017: web log, clickstream. Security threats caused by hackers and viruses: hacker- experts in technology who use their knowledge to break into computers and computer networks, either for pro t or just motivated by the challenge.