Assignment 12-Dawood-OpX
doc
keyboard_arrow_up
School
Harrisburg University Of Science And Technology Hi *
*We aren’t endorsed by this school
Course
701
Subject
Information Systems
Date
Nov 24, 2024
Type
doc
Pages
5
Uploaded by ravindra1987
Running head: ASSIGNMENT
1
Week 12 Assignment
Dawood Ali
University of the Cumberlands
Operational Excellence (ITS-631-M51)
11/18/2023
ASSIGNMENT
2
Information Systems for Business and Beyond
Chapter 12
What does the term
information systems ethics
mean?
The ethics in information system focus on how the data is protected with integrity, and
shared with others.
What is Code of ethics mean?
Code of ethics talk about what moral principles one has to follow as way of doing
business with integrity. This code will be guiding principle for people to follow in
maintaining the right approach in doing things accordingly.
What is Intellectual Property.
Intellectual Property is defined as the right provided to the invention for the idea and has
certain rights/protection in certain jurisdictions. For example, Carrier has the IP on the
HVAC invention around cooling and heating.
What do you mean by Protections of the copyright?
Copyright is the legal authority provided to the original owner on the material and any
copy of this content can be termed as a violation. There will be a copyright violation fee
for the other party if there is any incident reported by the original owner.
What is fair use?
ASSIGNMENT
3
Fair use policy is how to ensure that any content or material is good to use or copy
without any legal challenges. For all the academic purposes, the fair use policy is used.
What level of protection for the patent filing?
For any patent, there are certain protections provided to the idea submitters from any
non-fair use (Caiza et al., 2019). The patent is often protected from the government and
USA offers the best rights to the patent owner for any infringements.
What does trademark protect?
A trademark is any logo or picture or phrase that is protected to ensure its usage is
controlled. All companies’ logos like Tesla, KFC, etc. are trademarks.
What does personally identifiable information mean?
Personal identifiable information (PIA) includes any information that can help to link
back to the person. This would include the social security number, which is unique for
each individual.
What is the protection offered by HIPAA, COPAA, and FERPA?
HIPAA is the regulation that provide protection on how the confidential medical data is
protected across the IT system. COPAA talks about how the information of children
under 13yrs are only used with consent from parents. FERPA protect student records
when shared across other systems.
How would you explain the concept of NORA?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ASSIGNMENT
4
NORA is the approach to collect large amount of data via aggregators and building
relationships to build user profiles accordingly.
What is GDPR and its implications?
GDPR is one of the best data privacy policies within the European Union jurisdiction.
The impact of this privacy framework is how the user data is protected for utilization and
result in high penalties for any violation in terms of non-compliance to GDPR.
Exercise 1
The purchase of the Windows Operating System is done via a CD and would need to
install this on the personal computer. There is a 16-digit license code that need to be
entered into the installation process. There are many cases where the license code can
be manipulated and random keys are generated using online websites at low cost. This
is very important to understand that license we get is only for per user and multiple user
is not allowed.
Exercise 2
There is an acceptable desktop policy for employees to follow in my organization. This
includes how the desktops need to clean the device for easy usage.
A clean desktop should not have any confidential data on the screen for others, the
folders should be organized to ensure data is properly documented, system
maintenance can be uniform for all the systems with desktop policy, and provide
guardrails for avoiding any tail gating of employees.
ASSIGNMENT
5
References
Caiza, J. C., Martín, Y. S., Guamán, D. S., Del Alamo, J. M., & Yelmo, J. C. (2019).
Reusable elements for the systematic design of privacy-friendly information
systems: A mapping study.
IEEE Access
,
7
, 66512-66535.
Zhang, J. F., Tan, J. W., & Wang, J. M. (2021). Privacy security in control
systems.
Science China Information Sciences
,
64
(176201), 1-176201.