ADMN 3300H Chapter Notes - Chapter 9: Intellectual Rights, Phishing, Credit Card Fraud

59 views6 pages

Document Summary

Policy areas: data policy covers protocols about access, acceptability, stewardship, and control. Intellectual rights policy normally any intellectual property developed by an individual during the course of his/her employment belongs to the firm: workers" rights policy includes monitoring, personal information, private versus public information. The challenge of technology: ethical issues facing internet usage: The volunteer censoring of internet search information: origin is investigation of internet companies (google, microsoft, and yahoo!) and relationship with chinese government in 2006, all companies self-censored access restrictions in order to retain access to. Technology-based fraud: auction and retail schemes consumers send money but nothing gets delivered thousands of dollars a month, but first has to pay an upfront fee, business opportunity (cid:523)(cid:498)work at home(cid:499)(cid:524) schemes individuals can earn. Internet attacks: cyber terrorism, the use of computer technology to commit terrorism crimes, some industries may be more vulnerable than others, defense contractors, medical and health care companies, ex.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents