978-0078023163 Chapter B Part 3

subject Type Homework Help
subject Pages 9
subject Words 1637
subject Authors James McHugh, Susan McHugh, William Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Bonus B - Using Technology to Manage Information
B-31
2. Mobile employees can transmit their work from
anywhere (TELECOMMUTING).
3. ADVANTAGES OF TELECOMMUTING:
a. Telecommuting involves LESS TRAVEL
TIME and costs, and often increases
productivity.
b. It helps companies SAVE MONEY by retain-
ing valuable employees and by tempting ex-
perienced employees out of retirement.
c. Companies can get by with SMALLER,
LESS EXPENSIVE OFFICE SPACE.
d. Telecommuting enables men and women to
stay home with small children and is a boon
for WORKERS WITH DISABILITIES.
e. Telecommunication is most successful
among workers:
i. Who are self-starters
ii. Who don’t have home distractions
iii. Whose work doesn’t require face-to-face
interaction with coworkers
4. DISADVANTAGES OF TELECOMMUTING:
a. Extended long-distance work can give work-
ers a DISLOCATED FEELING of being left
out of the office loop.
b. Some feel a LOSS OF ENERGY that comes
through social interaction.
c. Often people working from home don’t know
Bonus B - Using Technology to Manage Information
B-32
Bonus B - Using Technology to Manage Information
B-33
WHEN TO TURN OFF THE WORK.
d. Some companies are using telecommuting
as a PART-TIME ALTERNATIVE.
e. The industry defines TELECOMMUTING as
working at home a minimum of two days a
week.
5. Electronic communication CAN NEVER RE-
PLACE HUMAN COMMUNICATION for creat-
ing enthusiasm and esprit de corps.
B. SECURITY ISSUES
1. Web-enabled smartphones and the 3G networks
they run on, social networks, online games, and
USB storage devices have become hackers’
targets.
2. “Secure” information is typically stolen by
a. Hackers who break into companies’ net-
works
b. Employees who steal it
c. Companies that lose it through negligence
3. Computer security today is more complicated
than in the past.
a. When information was processed in a main-
frame environment, the SINGLE DATA
CENTER was EASIER TO CONTROL.
b. Today computers are accessible in all areas
of the company and with other companies.
4. A VIRUS is a piece of programming code insert-
ed into other programming to cause some unex-
pected and, for the victim, usually undesirable
Bonus B - Using Technology to Manage Information
B-34
lecture enhancer B-8
HOME DEPOT’S MASSIVE SECURI-
TY SLIP UP
In 2014 Home Depot learned a hard lesson. After two security
breaches before a giant national breach, executives ignored ad-
vice to prevent it. (See the complete lecture enhancer on page
B.66 of this manual.)
Bonus B - Using Technology to Manage Information
B-35
event.
a. Viruses are spread by DOWNLOADING IN-
FECTED PROGRAMMING over the Internet
or by sharing an infected USB drive.
b. Some viruses are playful, but some can
erase data or crash a hard drive.
c. Software programs such as Norton’s AntiVi-
rus INOCULATE the computer so that it
doesn’t catch a known virus.
d. It is important to keep your ANTIVIRUS
PROTECTION PROGRAM UP-TO-DATE
and practice “safe computing.
7. Another online security threat is PHISHING, in
which a scammer sends an e-mail with a stolen
logo that makes the message look authentic.
a. Phishers use messages like “account activa-
tion required” to lure users.
b. Recipients who click on the link in the mes-
sage are sent to a phony site that tries to
gather personal information.
c. To avoid phishing scans, NEVER ACCESS
A WEBSITE THROUGH A LINK in an e-
mail message.
8. EXISTING LAWS do not address some Internet
issues such as:
a. Copyright and pornography laws
b. Intellectual property and contract disputes
c. Online sexual and racial harassment
Bonus B - Using Technology to Manage Information
B-36
lecture enhancer B-9
PASSWORD OVERLOAD
Passwords protect information, but too many passwords can
lead to decreased security. (See the complete lecture enhancer
on page B.66 of this manual.)
PPT B-41
Viruses and Phishing
VIRUSES and PHISHING
B-41
LO B-6
Virus -- A piece of programming code
inserted into other programming that
usually lies dormant until triggered;
then causes unexpected, undesired
events.
Phishing attempts to trick victims
into giving important information to
a bogus website.
PPT B-42
How to Protect Yourself Against
Phishing
HOW to PROTECT YOURSELF
AGAINST PHISHING
B-42
Source: Entrepreneur, May 2010.
LO B-6
Dont respond to emails requesting personal
information.
Keep your computer updated with anti-virus
software.
Never provide or verify personal information.
Never send sensitive personal information over e-
mail.
Check your monthly statements.
lecture enhancer B-10
WEB SHOPPING SAFELY
Here are a few tips to shop safely. (See the complete lecture
enhancer on page B.67 of this manual.)
PPT B-43
Laws and the Internet
LAWS and the INTERNET
B-43
LO B-6
Legal issues surrounding Internet use:
- Copyright
- Pornography
- Harassment
- Use of Internet for scams
Cybercrimes cost the U.S billions each year.
Bonus B - Using Technology to Manage Information
B-37
d. Crooked sales schemes
9. After September 11, 2001, security officers are
most concerned about CYBERTERRORISM.
a. An electronic attack on critical computers
could cripple the Internet.
b. Such an attack in 2002 demonstrated the In-
ternet’s vulnerabilities.
10. The Critical Infrastructure Protection Board was
created to IMPROVE THE SECURITY of Ameri-
ca’s critical infrastructure.
a. In order to do this, the agency needs the co-
operation of businesses.
b. However, many CIOs are reluctant to coop-
erate and reveal security breaches.
c. To encourage sharing of information, CON-
GRESS PASSED THE CRITICAL INFRA-
STRUCTURE INFORMATION ACT OF 2002
that makes critical infrastructure information
exempt from disclosure.
C. PRIVACY ISSUES
1. Your E-MAIL is no more private than a postcard.
a. Many U.S. companies legally scan employee
e-mail regularly.
b. Most e-mail travels over the Internet in UN-
ENCRYPTED PLAIN TEXT.
c. Some e-mail systems can ENCRYPT mes-
sages to keep them private.
Bonus B - Using Technology to Manage Information
B-38
PPT B-44
Cyberterrorism
CYBERTERRORISM
B-44
LO B-6
Cyberterrorism is the idea
that terrorist hackers
could shut down:
- Entire communications
- Money supply
- Electricity
- Transportation
PPT B-45
Privacy Issues in Technology
PRIVACY ISSUES in
TECHNOLOGY
B-45
LO B-6
E-mail can be snooped or information stolen.
Personal information stored can be stolen.
Site owners can share your information without
your permission.
Cookies -- Pieces of information, such as
registration data or user preferences, sent by a
website to a browser that the browser software is
supposed to save and send back to the server when
the user returns to the website.
Bonus B - Using Technology to Manage Information
B-39
2. As more and more PERSONAL INFORMATION
is stored in computers, people are able to ac-
cess those data legally and illegally, creating a
privacy nightmare.
a. The Internet allows Web surfers to access all
sorts of information about you.
b. Civil libertarians fight to keep certain kinds of
information available to the public.
c. Privacy advocates disagree and argue that
the Internet makes obtaining personal infor-
mation too easy.
3. Websites have gotten downright nosy by secret-
ly TRACKING USERS MOVEMENTS online.
a. Web surfers seem willing to swap personal
details for free access to online information.
b. Websites often send COOKIES to your
computer that stay on your hard drive.
c. COOKIES are pieces of information, such as
registration data or user preferences, sent
by a website over the Internet to a Web
browser that the browser software is ex-
pected to save and send back to the server
whenever the user returns to that site.
d. Some contain only your name and pass-
word.
e. Others TRACK YOUR MOVEMENTS
around the Web, letting companies blend
that information with their databases and tai-
Bonus B - Using Technology to Manage Information
B-40
Bonus B - Using Technology to Manage Information
B-41
lor the ads you receive accordingly.
f. Some software, known as SPYWARE, can
be installed on your computer without your
knowledge and infect your system.
g. Tim Berners-Lee, the researcher who in-
vented the World Wide Web, developed a
way to prevent you from receiving cookies
without your permission.
h. His PLATFORM FOR PRIVACY PREFER-
ENCES (P3) lets you decide how much in-
formation about yourself you are willing to
give away.
D. STABILITY ISSUES
1. INSTABILITY in technology also has a signifi-
cant impact on business.
2. The text uses the example of Hershey and the
disruptions to its Halloween candy delivery
caused by a computer system failure.
3. The blame for such problems is a combination of
computer error, human error, malfunctioning
software, and overly complex systems.
VII. TECHNOLOGY AND YOU
A. It may be occupational suicide to BE COMPUTER
ILLITERATE since most workers come in contact
with computers to some degree.
B. Information technology eliminates old jobs while
creating new ones.
Bonus B - Using Technology to Manage Information
B-42
critical thinking
exercise B-1
SPAM STATISTICS
A growing problem with electronic communication is spam,
unwanted e-mail messages. (See the complete exercise on page
B.69 of this manual.)
critical thinking
exercise B-2
EDUCATION ONLINE
Cant afford to go to MIT? Try the free website. (See the com-
plete exercise on page B.70 of this manual.)
Bonus B - Using Technology to Manage Information
B-43
C. It is up to you to learn the skills you need to be cer-
tain you arent left behind.
VIII. SUMMARY
Bonus B - Using Technology to Manage Information
B-44
test
prep
PPT B-46
Test Prep
TEST PREP
B-46
How has information technology changed the way
people work?
What management issues have been affected by
the growth of information technology?
page-pff
Bonus B - Using Technology to Manage Information
B-45
PowerPoint slide notes
PPT B-1
Chapter Title
Copyright © 2015 by the McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin
Using
Technology to
Manage
Information
BONUS CHAPTER B
PPT B-2
Learning Objectives
LEARNING OBJECTIVES
B-2
1. Outline the changing role of business
technology.
2. List the types of business information, identify
the characteristics of useful information, and
discuss how data are stored and analyzed.
3. Compare the scope of the Internet, intranets,
extranets, and virtual private networks and
explain how broadband technology enabled the
evolution to Web 2.0 and 3.0.
PPT B-3
Learning Objectives
LEARNING OBJECTIVES
B-3
4. Explain virtual networking and discuss the
benefits and drawbacks for cloud computing.
5. Evaluate the human resource, security, privacy,
and stability issues affected by information
technology.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.