CIS3345: |
New Chapter 13
References Pseudonym: alpha CommentsIt present the information in a power point wich is a good way to explain the topic. Pseudonym: marmel CommentsThis article is an example of ethical challenges that arise in the Legislation branch of the government. The ethical problem covered in this article is privacy, which is one of the most inmportant problems in almost all businesses. Pseudonym: AnG3LiTa CommentsIn this website you will find information that will help enhance your understanding about social responsibility. It further talks about if a company can truly be social responsible.. Pseudonym: suncitygirl CommentsNow I know what spamming is! I really had no idea what it actually was but this helped. Pseudonym: butterfly CommentsThis website has links where you can look up cases, legal resources and learn about computer crime. Pseudonym: aivaldes Commentsthis website discuss all the issues about this topic. Pseudonym: gymnast319 CommentsHelps to prevent Software piracy Pseudonym: aild27 CommentsThis is a good site because it gives you a list of threats to online transactions that can affect a business or a consumer. Pseudonym: Hcobowler23 CommentsThis article really explains the difference between these horrible enemies that harm our computers. After reading this article I believe I can better protect my PC from these harmful attackers. Pseudonym: Pato CommentsSecurity and ethical changes are important because it Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems Pseudonym: sfleder Commentsthis website provided valuable info. on what a hacker is and does and how to aviod them. Pseudonym: shikamaru Commentsthis is about how security loss is mounting and just becoming more of a hassle day to day. Pseudonym: fishhead CommentsLove this web site it is a great way to find out how anything works it offers a good description of how a smart card works. Pseudonym: staraurora Commentsthis website gives brief explaniations of business ethics as well as give links to different articles and newletters that discuss ethics in the businness world. Pseudonym: dre2006 CommentsIn this website computer hacking is discussed. It discusses issues, minimizing potential hackers, legal implications and it provides answers to fruequently asked questions. This is a very insightful website and easy to follow along. Pseudonym: m_6_m CommentsMakes a great point in distinguishing between trojan horses and viruses Pseudonym: orbital CommentsThis websites explains what the Security and Ethical Challenges are, and how to understand them. Pseudonym: Littlemissh CommentsThis website gives you and introduction to computer viruses as well as history, origins, evolution, e-mail viruses , worms and how to protect your computer. Explains it very briefly but it is very informative. Pseudonym: dragoneye05 CommentsThis website gives a detailed description of what biometrics is and what it does. Pseudonym: cowboys82 CommentsThis site provides a good explanantion of ergonomics. Pseudonym: Hangul07 CommentsEach paragraph is short and sweet, straight to the point, but the entire article in general is never ending. Pseudonym: supreme_eagle CommentsVery informative site. Pseudonym: Rockbourne CommentsI like the layout of the Website. It's structured to show and define what Stakeholder Theory is all about. Not too much stuff, but enough. Pseudonym: Velia CommentsThis website explains the definition of social contract theory. It gives you the overview, history, and criticism to this theory. Pseudonym: sisqo :) CommentsThis is a good website because it provides different answers to what Social Engineering is and what it does. Pseudonym: jofinfo08 CommentsVery interesting articles on technology ethics Pseudonym: jkep CommentsExplains in detail how the antivirus software works. Pseudonym: THINKpink CommentsThe website is very user friendly and gives plenty of information on firewalls and how to use them. Pseudonym: earmas Commentsarticle on Information Ethics: The Duty, Privilege and Challenge of Educating Information Professionals - University of Pennsylvania Pseudonym: london23 CommentsShows about how IT is being hacked into Pseudonym: cuttie13 CommentsThe website just gives you the definition of what security management is. I don't recommend it!!!! Pseudonym: ONELOVE CommentsBasic and good information on computer crime. Pseudonym: incognito CommentsGives you a list of the most common computer crimes in our society. Also, a definition and examples of Computer Crimes and their legal implication. Pseudonym: mavella CommentsEven high-tech companies need to make better use of the very technology that their products make possible. In order to coordinate their widely distributed networks, they need to develop "bullet-proof" information systems that use the Internet to integrate all their manufacturing sites, including the virtual ones. Pseudonym: mantastic CommentsIts a really good paper that explains everything in detail about how it has changed since 9-11. Pseudonym: angel04 Commentsit gives you the history, the arguments for and against corporate social responsibility, the stakeholder concept, and contemporary social issues Pseudonym: volcom72 Commentshelps provide an understanding of the many problems with security Pseudonym: vitqb10 CommentsI think that this document is a very helpful tool to understanding many of the ethical challenges in the world of computer systems. Pseudonym: Cabinho CommentsThis lecture mentions the importance of business application of information technology and organizations. Pseudonym: sithlord CommentsYou can subscribe to this magazine to obtain information on business ethics Pseudonym: epff CommentsYou can learn a lot from this page...instantly motivates you to do good, not bad. Pseudonym: Nacho CommentsErgonomics, Cumulative Trauma Desorder, and Carpal Tunnel Syndrome explanations, relating common activities to these probles, and how to prevent them Pseudonym: cc6967 CommentsI was amazed at how informative this site was. It not only talked about general computer ethics, but it also had detailed information about various categories under computer ethics. I would highly recommend this site to anyone who needs a little more insight about computer ethics because the information goes hand in hand with the course. Pseudonym: TRENte CommentsHacking is the unauthorized access and use of networked computer system. Here in this website we see that hacking is a felony in the United States and other countries. However an ethical hacker has authorization to probe the target. Pseudonym: AAALV CommentsI did not like this website that much. All it gave was a very short overview of what business ethics was. It did not give the information i was looking for, therefore i would not recommend this website to other students. Pseudonym: sox CommentsThis site explains the importance of ethics needed in business. Pseudonym: starfi CommentsThis website describes in full what a firewall is, how a firewall works, how it protects you, and which type of firewall is best for you. Pseudonym: rowdy101 CommentsThis actually a magazine that is devoted specifically to the topic business ethic issues. I liked it. Pseudonym: swriddick95 Commentsinsightful Pseudonym: Hemingway CommentsA very detailed article/research dealing with the status quo and the pros/cons of E-mail Monitoring in the Workplace. Pseudonym: kojak4 Commentsvery helpful site. gives you the clear idea that you must learn to discard of yor info in a proper manner in which no one can have access to it and possibly steal your identity. Pseudonym: windsor CommentsThis website provided a powerpoint right from a text book and with a lot of picture examples, gave a decent description of what security and ethical challenges of e-Business are. Pseudonym: Maurice Commentsoffers a good definition as well as a model on how a workplace is designed Pseudonym: dannytenaglias Commentsbasic information on keeping your computer safe from spyware and malware viruses Pseudonym: qwertyuiop CommentsInteresting! It is about hacking passwords, do you want to know how to do it? Pseudonym: mlbclevfan CommentsAn article outlining the history of hacking from the beginning to now. Pseudonym: MEDDIE0074 Commentsthis web page contains all information required to get a knowledge of ethical aspects on the system information and almost all the concepts with diagrams and almost exactly the information provided by your book which you could use a good source to study Pseudonym: pinkdancer06 Commentsthis gives good rules for when using the computer Pseudonym: Gia99 CommentsThis website offers information relating to computer usage and ethics. It begins with the foundation of ethics in computers and goes on to explain the reason why ethical guidelines have been implemented when dealing with information systems. Very informative article and useful in these times of great uncertainty. Pseudonym: bush=mccain CommentsErgonomics is the scientific discipline concerned with designing according to human needs, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance. Pseudonym: corvette CommentsEthical issues in the use of Information Technology. descrip. Pseudonym: lawhereicome CommentsThis article describes the difference between real dumpster diving and computer dumpster diving. It also points out that it is very similar and sticks to the old saying "ones man trash is anothers treasure" Pseudonym: lfer Commentsit is an interesting website, that describes the real meaning of hacker Pseudonym: charger13 CommentsThis a list of the top 59 most influential people in IT security and it is pretty interesting to see what they contributed and how they helped the computer world. Pseudonym: sox CommentsThis web talks about and different computer crimes and laws that support the prosecution of these crimes. Pseudonym: Solus CommentsGreat info. on current standards and laws dealing with computer security and the issues and challenges being dealt with in the 21-century. Pseudonym: mrs.brooklyn CommentsIts very informative Pseudonym: ae09 CommentsThis webpage gives the definition of a computer virus, all the existing types and the signs when computer infections exists. Short information but well-explained. Pseudonym: Dumas CommentsA very complete essay discussing ethical and security challenges in Information Technology Pseudonym: Dunkel Commentsthis website will show you the different classification of computer viruses, vectors, hosts, some ways in how to avoid the virus and more. Pseudonym: eljuan Commentsits a very helpful presentation in order to understand topics realted with security and ethical challenge Pseudonym: bobby g CommentsThis site provides lists of some major hackng incidents that have taken place. They provide incidents from the year 1999 to 2008. Pseudonym: Purple CommentsThis site contains useful information regarding the most frequently asked questions about firewalls funstionality Pseudonym: Aurich CommentsDiscusses the privacy laws that govern fair use of the internet and possible security vulnerabilities that might compromise that privacy. Pseudonym: j-tweet CommentsSummary of the network security that controls the confidentiality, integrity, and availability of information. Very long story but very interesting. Pseudonym: SkoolSux Commentsa paper on business ethics Pseudonym: Maranon2 CommentsThought this article went well with the business ethics section of the lecture. Pseudonym: Lady3312 CommentsThis article offers articles and cases on business ethics. Pseudonym: Tiki CommentsProvides an overview of general business ethics and principals one should follow in the business world. Pseudonym: Crackers Commentsvery good material on subject Pseudonym: doever CommentsThis website talks about Buffer overflow attacks and it attempts to explain the reason for the overflow. It shows some pretty good models to help you better understand what buffer overflow is. Pseudonym: ninersfan CommentsYou can download a free copy of Avira's anti-virus software. Pseudonym: cobalt1130 CommentsThis article gave me a better understanding of the viruses and harmful applications that can dramatically effect a system. After reading this article i feel that i have a better understanding of what not to download and where not to go to protect my computer. Pseudonym: cobalt1130 CommentsThis article gave me a better understanding of the viruses and harmful applications that can dramatically effect a system. After reading this article i feel that i have a better understanding of what not to download and where not to go to protect my computer. Pseudonym: spiDey CommentsWell-organized. Pseudonym: Wolverine Commentshere you can find a lot of links of hacking information Pseudonym: giva CommentsIt just expanded on the information that was already given on the powerpoint. Pseudonym: moka0108 CommentsAnother good definition and history behind it. Pseudonym: jack daniel CommentsThe topic in this site contains excellent information about Dumpster diving and many refernces are given to validate its credibility. Pseudonym: kim CommentsThis is in a power point format somewhat like the class power point with similar information. I dont feel that you learn any different than in class. Pseudonym: gilardino Comments333333333333333333333333333333333333333333 Pseudonym: miriam3536 Commentsstakeholder theory defined Pseudonym: iggytoni CommentsNumerous views of Stakeholder Theory are presented in the literature though a key distinction can be drawn between the tenets of Stakeholder Theory and the conventional input-output model of the firm which see firms as converting investor Pseudonym: puzzles CommentsThis is an informative article/paper which talks about, in depth, security and ethical challenges. Pseudonym: gilardino Comments1333333333133333333333333 Pseudonym: wewi CommentsThis is an explanation of what fuzzy logic is, because I could not answer the question on the quiz, so here is something that could help you understand what this is. It is supposed to be a way of acting depending on the inputs that are normally variable since they are based on human behaviors, or weather or something lilke that, so the outputs will vary, like production, or even brakes or things like that. Very interesting Pseudonym: wewi CommentsThis is a story about an American guy that decided to go global and had some issues with the spanish culture. So I guess it's not only the IT that we should make use of when we want to make teams with people around the world, but also our own interpersonal relationship skills, and education. Pseudonym: Ari Gold CommentsThe website has an article that talks about cyber theft and how one can aviod it. Pseudonym: djchess_0090 CommentsAs technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as expressed in Dean Prosser's work Privacy, was created. Dean Prosser continued (or expanded) upon the concepts formulated by Warren and Brandeis, particularly in emphasizing the role of common law in protecting privacy. Pseudonym: djchess_0090 Commentsofficers contemplating a trash inspection must be cognizant of fourth amendment requirements to ensure the subsequent admissibility of any evidence obtained. Trash inspections that do not implicate fourth amendment privacy interests can be conducted without either a search warrant or any constitutionally required factual predicate. Pseudonym: earp8 CommentsThis website provides an introduction to how computer viruses work. It also gives information about computer viruses origin, history, and how viruses have evolved over time. It also gives examples of viruses and worms. Pseudonym: fjgaoh29 CommentsThis website is an excellent website to better understand the issues of social engineering. It starts with a true story then gives the definition and describes the tactics and how it attacks. Pseudonym: ben CommentsTalks aboout the threats and defenses needed for the security of business information systems and the impact of social information technology Pseudonym: winkwinksr. CommentsWebsite answers questions and gives chances at online applications for security and ethical challenges Pseudonym: totis CommentsThis webpage desribes what is Business Ethics and the characteristics. Pseudonym: tukis CommentsHuman Resources professionals face business ethics choices and their consequences daily. Pseudonym: Professor Chaos CommentsThis site gives you tips and includes forums on how you can spam, hacking and other online privacy issues. Pseudonym: wilkai03 CommentsTells you different postures, and movements to solve joint problems Pseudonym: zeta CommentsThere is a page where you can lear a lot about the computer crime and the concequences Pseudonym: bribona CommentsWhat is good about this page is that uses very little memory on the disk and also as it is very simple is hardly rejected from internet service even if its highly controlled. Pseudonym: Rambo CommentsThis site was very interesting and informative. The site discusses howw viruses work, how they start and goes into detail about the different types of viruses Pseudonym: Scout CommentsGives a brief history on Social Contract Theory. It's very interesting. Pseudonym: jupitermoon CommentsArticles, cases, and links on corporate governance, organizational ethics, creating an ethical culture, and global business ethics. Center staff and scholars work with executives from major companies to analyze real-world ethical issues in business and to develop innovative tools and programs to address them. Pseudonym: mickey mouse CommentsThis site contains the definition and it goes into stating who was the person who came up with the stockholder theory. It is easy to understand and it is not to long. Pseudonym: fbv CommentsThis website has facts, figures, and graphs of Australia's 2005 Cyber crime statistics. Pseudonym: across_universe CommentsExplains in detail what encryption is and how it works. Pseudonym: milkshake CommentsThis website gives you the definition and extra resources for the stockholder theory. Pseudonym: Naimad CommentsThis website, presented by Science Daily, provides an article on security issues in the IT field. It talks about cyber crime and how businesses are dealing with this issue. Pseudonym: mocosia*545 CommentsThe history about ergonomics and how it came about. Pseudonym: Agent 007 CommentsProvides description of what is not ethical and can be classified as computer hacking. Pseudonym: abe3344 CommentsA very brief, but concise explinationof Fuzzy Logic. It is short but very informative little article. I think it will be informative to the reader. Pseudonym: Achilles CommentsDefines what spam is and what it can do to a computer. Pseudonym: eXtreme CommentsThis website gives you a definition of computer ethics and it gives a backgroung of it. Pseudonym: apachurro CommentsThe website describes what business ethics is and it gives several links about business law Pseudonym: cowboys CommentsThe website is about general ethics and what goes on around the world. This is a very good website. Pseudonym: bigbrown CommentsA good source of information Pseudonym: Abi CommentsThis article gives details about the Department of Business Information Technology.Through research and teaching, the Department creates new knowledge and a deeper understanding of the role of technology in business. Pseudonym: apple Commentsit explains very well how business ethics is not solly about money and should be about doing the right thing while keeping interest on the companies goal Pseudonym: Piggy CommentsDetailed breakdown and explianation of ethical issues managers confront. Pseudonym: jmpajp CommentsThis speaks of ethical challenges in modern business. Pseudonym: fake name CommentsI liked that this website offer free viewable videos that you can watch. Pseudonym: FunGirl22 CommentsTalks about the history of Business Ethics in detail. Pseudonym: Baby Baluga Commentsits a pdf file on security awareness Pseudonym: Da Bawse 915 CommentsDiscusses Internet privacy and software issues. Pseudonym: ajimmyjay CommentsInformation technology is changing many aspects of human endeavor and existence. This is beyond doubt. What are contested are the social and ethical implications of these changes. The source of these contestations is the multiple ways in which one can conceptualize and interpret the information technology/society interrelationship Pseudonym: ajimmyjay CommentsInformation technology is changing many aspects of human endeavor and existence. This is beyond doubt. What are contested are the social and ethical implications of these changes. The source of these contestations is the multiple ways in which one can conceptualize and interpret the information technology/society interrelationship Pseudonym: ajimmyjay CommentsInformation technology is changing many aspects of human endeavor and existence. This is beyond doubt. What are contested are the social and ethical implications of these changes. The source of these contestations is the multiple ways in which one can conceptualize and interpret the information technology/society interrelationship Pseudonym: lionheart108 CommentsHere's an article about what ethical challenges the health community faces. Pseudonym: Alloy08 CommentsDiscribes what a virus is and how it works Pseudonym: cookiemonster CommentsDefiniton of ergonomics and were the word came from Pseudonym: Ballet CommentsI liked this site because it is not too long, is gives examples and it even has a survey in it. Pseudonym: hdomin33 CommentsThis website really goes into detail on how computer hacking works and the infringement on the privacy of others, and the damage that is caused to computer-based property such as files data bases,web pages or software. Pseudonym: blumstng CommentsShort reading Pseudonym: davinchi CommentsAS IT PROVIDES A DEFINTION IT ALSO PROVIDE US WITH A VIDEO TO FULLY UNDERSTAND THE CONCEPT Pseudonym: Dolphin CommentsDefines what business ethics are Pseudonym: DIESEL Commentskeyloggers record your keystrokes and send them to a file so you know everything that someone is typing...my ex put one of these on my computer - it was super annoying! :) Pseudonym: Calanthe CommentsHas real world cases to read that are interesting to read. Pseudonym: Lydia Deetz CommentsOn osha's website is shows that this government agency enforces ergonomics in the workplace. Pseudonym: Midori CommentsIt provides a very good definition, and explains what it does to the computer in very easy terms. Pseudonym: >:] CommentsIt provides a good description of each common hacking tactics. Pseudonym: THEMILKMAN CommentsEven though the focus is on HR the article is very intersting in noting ethical challenges Pseudonym: beamer740 CommentsKnowledge and capabilities, particularly of a new technology or in a new area of study, frequently develop faster than the guidelines and principles needed for practitioners to practice ethically in the new arena Pseudonym: al capone CommentsWebsite describes what are anti-virus and anti-spyware software, as well as email security. Pseudonym: Winston CommentsA decent site that discusses fault tolerance and the requrements needed Pseudonym: Rain CommentsThis website provides an example of standards for the ethical use of technology along with the rules for a district. Pseudonym: Zaphernite CommentsGives an overview of security of emailing,and spam. Very Easy to read. Pseudonym: cjg3 CommentsA website that provides an extensive information about Ergonomics. easy to read. Pseudonym: C&E Commentsscholarly articles for enterprise and blobal management of information technology Pseudonym: C&E Commentsscholarly articles for security and ethical challenges Pseudonym: Svetunj_21 CommentsOn this site you can findthe information about what is Business Ethics, (is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment), also types of business ethics. Pseudonym: DEPA CommentsTalks about the problems that security may have, and its challenges and some ways to attack them and prevent them, Pseudonym: Amadrid CommentsAn extended view of ethics in the business world through articles and testimonials from business executives around the world. Pseudonym: ALadyD CommentsSecurity and Ethical Challenges lecture by Prof. Anatoly Sachenko. Pseudonym: twin CommentsThe explosive growth of the Internet has brought many good things: electronic commerce, easier to do global business and a lot more benefits for the human being, As with most technological advances, there is also a dark side: criminal hackers. we need to be on the watch for this type of online criminals. Pseudonym: absae CommentsThe Lancaster University Management School website details information about their ethical responsibility. They give an overview, learning outcomes, teaching and learning strategy, module outlines and assessments. Pseudonym: Adria_Gaucin CommentsTAKE A LOOK!!! This website is interesting becasue it provides an axtended summary about WLANS. It's good reading material for updating your knowlege. Pseudonym: Itsgdmex CommentsComplete Guide to Ethics Management: An Ethics Toolkit for Managers Pseudonym: apink915 CommentsIn this site Spamming is defined as the abuse of electronic messaging systems which includes most broadcast media, and digital delivery systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media. Pseudonym: Mr.Anderson Commentscomputer hacking details what computer hacking is,what computer hacking is most common, and who are hackers? This site also provides a space where users can ask question and recieve awnsers. This site provides anti hacking sites and products. On a scale of 1-10 i rate this page a 8. Pseudonym: ChickenSoup88 CommentsWhen going through the slides for Chapter 13, I noticed the part in hacking and the different common tactics. I was interested in knowing more about what "Sniffer" is when it comes to protecting yourself. I found this website that does just that. It informs you on what "Sniffer" is and how it works. It also gives you an example on the site about what the data looks like and what to look for. It is an interesting site and one you should look at. Pseudonym: boywonder CommentsThe following website is a complete overview of the term "fuzzy logic" and how it affects its use in technology involving computers. Pseudonym: Toby CommentsThis atricle is about safety issues, guidelines and the consequences of computer hacking. Pseudonym: MJ14 CommentsBusiness ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment. It applies to all aspects of business conduct and is relevant to the conduct of individuals and business organizations as a whole. Applied ethics is a field of ethics that deals with ethical questions in many fields such as medical, technical, legal and business ethics. Pseudonym: D Mo CommentsThis web-site is solely dedicated to steakholder theory and is a pretty easy chart form explanation of it. Pseudonym: State Of Mind CommentsThe idea of the stockholder theory, some argue, is inconsistent with the idea of corporate social responsibility at the cost of the stakeholder. For example, a company donating services or goods to help those hurt in a natural disaster, in some ways, may be considered not taking action in the best interest of the shareholder. Pseudonym: azuherib7 CommentsThis website explains briefly the goals of social engineering (hacking in general) that is to gain unauthorized access to systems or information in order to commit fraud, identity theft, etc.This website also gives some strategies to the companies so they can prevent social engineering. It explains some of the advantages of policies such as removing the responsibility of employees to make judgement calls regarding a hacker's requests. Policies help the employees make decisions, if the information requested is prohibited by the policy, the employee needs to deny the request. Pseudonym: mcdeluca Commentsenial of service is an attempt to make a computer resource unavailable to its intended users. Pseudonym: nene Commentsit was a helpful site to understand this chapter Pseudonym: pas09 CommentsThe Association to Advance Collegiate Schools of Business, the accrediting agency of business schools in the U.S., does not think so and has proposed changes to make the teaching of business ethics a top priority. Pseudonym: mixologista CommentsThis website provides many other different links concerning the issues of business ethics. The articles found are great.Topics such as, Various Perspectives Regarding Managing Ethics in the Workplace and social responsibility can be found here. Pseudonym: aands CommentsA news about the problem we have from high-tech we have now days, and how does it effects over the world. Pseudonym: Chevy CommentsFound this information to be very informative. Pseudonym: KYALVAREZ CommentsTALKS ABOUT HOW PEOPLE CAN BE MANIPULATED TO TELL PERSONAL AND IMPORTANT INFORMATION. Pseudonym: Gely CommentsIn this website we can find how flaming is used; who use flaming and the definition. Pseudonym: MsPrettyPink CommentsThis websites goes through several details on the services that the government provides for this type of security. Pseudonym: dims87 CommentsThis is a security website by microsoft. It gives helpful information. Pseudonym: Champignons CommentsBusiness ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment. Pseudonym: kaiosama Commentsthis is a brief explanation of what flaming via internet is Pseudonym: Pvespa CommentsThis is an interesting site that give us more information about ergonomics. The site explains the history of ergonomics, what it is all about and provides many interesting links on the subject. Pseudonym: hotwheels17 CommentsBusiness ethics consists of a set of moral principles and values that govern the behavior of the organization with respect to what is right and what is wrong. Pseudonym: piojobersuitero CommentsThis article by Tobias Zacharis talks about how companies are implementing ethical perspectives in their current business activities to satisfy the changes in the markets. Also it provides some examples of how this companies are implemeting these techniques. Pseudonym: cjordan Commentstalks about how business ethics is a system of moral principles applied in the commercial world. Pseudonym: jmiguelv Commentsimplementation of these new strategies in business IT world Pseudonym: muzikgerl CommentsWant to become a computer Hacker? Well this is the place for you. Learn the secrets to hacking any site. This is a site that is a great learning tool for how to prevent hacking of your own system. Pseudonym: Pher CommentsIn the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Pseudonym: nd<3 CommentsThis website gives helpful tips on how to recognise computer crime and hacking Pseudonym: minermaniac Commentslook up cases Pseudonym: GlenCoco CommentsGreat website. Gave a great definition and explanation of what stakeholder theory is. It also gave additional resources on this topic, which was also very hopeful. Pseudonym: CCLK CommentsWhat is Ergonomics? The study of people and their relationship with the environment around them. This website is ok, it also helps you understand how you will use ergonomics. Pseudonym: redickrocks93 CommentsThis site lays out the four main ethical issues of the information age and different approaches to each of them as far as solutions. Pseudonym: devastate44 CommentsHow ergonomics can effect people who work on the computer. Pseudonym: Pamachgri CommentsI like the article because they explain it with sound and was very interesting Pseudonym: Cosne CommentsManagers are occasionally faced with ethical dilemmas. These references can help us and our people understand the consequences of choices in business. Pseudonym: Boomer CommentsOffers an interesting 'flip-side' to hackers and what they are and do. Pseudonym: Eyore Commentsthe site gives a guidline of the ethical responsibilities of using IT Pseudonym: Eeyore Commentsthe site gives a guidline of the ethical responsibilities of using IT Pseudonym: 7773 CommentsGood definition on business ethics. Provides a discussion blog for its users. Pseudonym: Monk CommentsProvides a quick guide on how hacking has evolved since the dawn of computers. From basic hacking of analog telephone signals to the latest hacking attacks in 2001 by Chinese hackers trying to infiltrate government websites. Pseudonym: hilda1984 CommentsEvery business has the need to secure and provide the required information to their employees to comply and keep confidential information secure. Pseudonym: Lilithwasfirst CommentsDiscuss, read articles and viewpoints, and watch ethical debates. Pseudonym: Two4sun CommentsThis site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future. Pseudonym: Two4sun CommentsThis site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future. Pseudonym: Two4sun CommentsThis site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future. Pseudonym: Two4sun CommentsThis site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future. Pseudonym: Two4sun CommentsThis site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future. Pseudonym: maxcat CommentsI found the website to be pretty knowledgeable about anything related to security issue in todays market place. Pseudonym: tigris1004 CommentsInformative website that explains in detail the different types to programs that can damage your computer. Pseudonym: yoski2 CommentsBusiness Ethics Pseudonym: Stx13b13 CommentsVery good website gives a detailed explanation of what a computer virus is. It gives you information on how they symptoms of a virus and info on the recovery. Pseudonym: SJ313 CommentsThis website helped make the definition of a worm alot more clear. Glad I do all my window updates to prevent them. Pseudonym: tokioprincess CommentsGives information on firewalls and the different types of firewalls. It explains how it can protect your computer for the type of protection that you want. Pseudonym: murfman CommentsI would use this site again because it contains alot of information on basic and advanced security information. Pseudonym: First_Flight CommentsThe website provides very useful information relating to computer viruses. The webpage even includes advertisements of various antivirus software. The article provides the reader with an overview of what a computer virus is, how they evolved and certain types of viruses such as: worms, trojan horses, etc. There is even a computer gallery for anyone interested. Pseudonym: Redhot02 CommentsThe intentions of this website is actually try to teach us how to implement ethics into the business side, and to obey the rules of the business ethics. It is also providing information on how to approach the different situations on the workplace. Pseudonym: lesmom CommentsGood powerpoint on security and ethical challenges. Pseudonym: llpr2101 CommentsThis article talks about the importance a computer security risk of any action that could cause lost of information. Pseudonym: philla_31 CommentsA website from the department of justice dedicated to posting articles and information on cybercrime. Pseudonym: recardenas2 CommentsArticle based on one of the fastest growing threats on the Internet and a form of identity theft known as phising, pronounced fishing. Pseudonym: FFSH CommentsThe site is a easy to understand because it is a list of thirteen different methods of hacking tactics. Each tactic is explain and there is an example given for each tactic. Pseudonym: ipraya Commentshow much extra protection can an external firewall give? Pseudonym: icefox_1 CommentsWebsite gives a basic understanding of War dialing Pseudonym: icefox_1 CommentsGives basic idea of war dialing Pseudonym: @irvriv CommentsThis article talks about the ethical and security issues in information technology and it goes in much greater detail in subjects such as privacy and ethics. Pseudonym: @irvriv CommentsThis article talks about the ethical and security issues in information technology and it goes in much greater detail in subjects such as privacy and ethics. Pseudonym: @irvriv CommentsThis article talks about the ethical and security issues in information technology and it goes in much greater detail in subjects such as privacy and ethics. Pseudonym: Tiburon Commentsis a Article about ethics on business Pseudonym: pfc freda CommentsIn this article we see some examples from right or wrong in business. Pseudonym: aaharley CommentsThe site has quite of few examples and tutorials on Ethics for managers Pseudonym: Love_girl CommentsLists the Common Hacking Tactics and their definitions. Pseudonym: wisconsin88 Commentsthis is just a good informational site on how to avoid getting virus' since there are so many out there today. Pseudonym: Mr.IneedanA CommentsThis web page provides an example of how business and information technology is being used in Louisiana's Department of Tourism. Pseudonym: ABCDEFG21 CommentsIt contains information on what buffer overflow is Pseudonym: setnomleb CommentsThis website explains what a trojan horse virus is and how they enter a computer system. Pseudonym: dcowboys0065 CommentsGives a good definition and example of business ethics Pseudonym: Shogun CommentsThere are forces that serve to constrain the discretionary acts of business corporations. There are many ways in which these can be effectively handled. Pseudonym: charms21 CommentsI liked how the website is set up in easy to read sections and was also very informative. Pseudonym: mxm CommentsOverview of security systems that are applied to I.T. History and evolultion of security software is discussed. Pseudonym: Austina CommentsVery interesting article. It explains the different types of spoofing attacks (blind spoofing, non-blind spoofing...). It also tell you how you could prevent spoofing. Pseudonym: sunset38 CommentsAn article giving a summary of book in Ethics of Information Technology. Pseudonym: expectations CommentsI really liked this article because people a lot of times is not aware of the risk about using information in the computer, so the article talks about different scenarios to learn how to be almost safe with personal information. Pseudonym: Timany CommentsThis website is very informative, it describes what ergonomics is, and how to prevent injury. Pseudonym: marieM CommentsThis website describes social engineering and hacker tactics. Pseudonym: pjwero CommentsGives a big explanation about what a hacker is, and why does it does it. is a good informative webpage and it also explains how companies use their security softwares to prevent hacker from entering to their files. Pseudonym: rayadita Commentsppt slides on ethical and security challenges in business Pseudonym: rosebud CommentsThis web-site postulates that in order to address Cyberethics, one must define what ethics are, and their application to technology. Pseudonym: violet CommentsSocial Contract Theory, nearly as old as philosophy itself, is the view that persons’ moral and/or political obligations are dependent upon a contract or agreement between them to form society Pseudonym: Luscious CommentsThis page tells you and gives you the concept of password cracking. There are so many types of password cracking and I was really impressed about that, and I think the webpage is very useful. Pseudonym: ccopperpot3 Commentssource may not be very reliable but website provides a definition of business ethics...quite short does not go in to much detail Pseudonym: Good Luck 1 CommentsThis article explains how the "bad guys" spoof return email addresses attempting to obtain personal info. Pseudonym: noclasstoday Commentsthis site brings up the questions of internet security, and your use Pseudonym: acs_moon Commentsdescribes what legilative stapes are being taken Pseudonym: @aorozco4 CommentsThis site talks of how information revolution has altered lifestyles. Pseudonym: HGS CommentsThis is a 10 minute tutorial on corperate social responsibilities. Who knew you could learn so much in 10 minutes. Pseudonym: MissBurberry CommentsThis Website provides good business ethics Pseudonym: 1224 CommentsThis is a really good website because it really goes in detail on what stakeholder theory is. Pseudonym: butzloffrost CommentsA very helpful website establishing the differences between a virus, Trojan Horse, and worms. After reading this website I understood what the details of each of these malicious threats. Pseudonym: peter CommentsAn article on business ethics and explains what it is and examples to think about Pseudonym: yamel Commentsprovides examples of computer crime Pseudonym: fernandoduarte Comments-Computer crimes that exist in the present society are:- -Hacking -Cyber Theft -Unauthorized use at work -Software Piracy -Piracy of intellectual property -Computer viruses and worms Pseudonym: Ida CommentsThis website includes some of ethics dilemmas that a manger can faced and you can learn what will be the best choice to take in business. It is really interesting. Pseudonym: fjteran Commentsthe site is an enyclopedia it has a broad number of topics and it is very easy to find information you really need in this site Pseudonym: ai1102 CommentsThis is the main webpage of the ISSA and it contains many good articles and information. Pseudonym: celecampos CommentsThe above information was presented in a power point which is a good way to explain the topic. Pseudonym: binnie333 CommentsTalks about how ethics plays a large role in businesses and online privacy issues, etc. Pseudonym: jess_rocha24 CommentsThis website advices business to prevent hacker attacks in their organizations. It explains the hackers attack techniques and the way to avoid them. Pseudonym: thedude89 CommentsHere is some good information about what denial of service attacks are. Pseudonym: jatm CommentsThe Magazine of Corporate Responsibility Pseudonym: ra7opez Commentsthis is a well written extensive article regarding the abuse of exploring the internet while at work and discusses what is acceptable among other things Pseudonym: thebluecar CommentsThis is a webiste for a center which focuses on teaching Ethics to other. Excellent resource center for those looking to see what new laws require in reference to ethics Pseudonym: ancy CommentsVery nice information o this site !! Pseudonym: oleyva4 CommentsGood outline on the subject. Pseudonym: chuyo Commentson this page wikipedia has a section that talks about what I was interested. A lot of information about the same topic as in class Pseudonym: tany89 CommentsThis article talks about how a company sees too easy to cover up an error instead of correcting it Pseudonym: Woody CommentsThis website is from De Anza College and it gives Aristotles Principle of Responsibility. Pseudonym: utrebor CommentsArticle briefly describes of some tools hackers are currently using to hack into websites, such as backdoor and sql injection. Pseudonym: es ar tee pt CommentsPrivacy in the workplace Pseudonym: raulalexjoey CommentsDoing the "right" thing even when no one is watching; that has been my motto for many years throughout my life's journey. Sounds very simplistic, doesn't it. Well the "Ten Commandments of Computer Ethics" will certainly help in ensuring one is conscientious as one is thrown into the world of technology. Pseudonym: mmoreno17 CommentsA complete explanation of what viruses are and ways to avoid them. Pseudonym: mdruiz_airam CommentsIs a data base of UTEP Pseudonym: nikki3742 CommentsThis site is a professors outline which goes over the concept, influence and relevance of the issue. Pseudonym: Blanka CommentsWe are currently living in an information age due to the development and use of technology. This creates the possibility of wider access to information. This bring up many questions about what privacy is and how we can be protected. Pseudonym: Buttons CommentsThis website gives you how to fullfill the firewall requirements while still maintaing external use access. Pseudonym: holydio58 CommentsThe aim of this paper is to assess the impact of technology on the private lives of people Pseudonym: cosmic Commentshints on how not to get hacked Pseudonym: bettyb00p Commentsdefinition of various websites included here Pseudonym: alix7 CommentsThis important article explains the definition and objectives of ergonomics. In addition to this, the article provides the ideal set-up for a workstation, such as the position of the employee´s hand in relation to the desk and computer Pseudonym: hello kitty Commentsthis article shows that 4 major retailers/companies had failures in data sercurity management: Lowes Home Improvement; Teledata Communications International (TCI); Bank of America (B of A); Choice Point Pseudonym: BereM89 CommentsThis article shows the effects and descriptions for some common hacking tactics. Pseudonym: erjem89 CommentsThis site is paper done by a professor showing how technological changes can be threatening to privacy. Pseudonym: viggo010 Commentseasy to read and interesitng information Pseudonym: Ro CommentsThis is an article about the current line of firewalls startup is selling. These firewalls are for midmarket and provide big improvements. One think I noted is the high price for firewalls, about $14,000.00 dlls per these models. Pseudonym: Mickey Mouse CommentsWebsite explains what denial of service attack is. In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. The website also tells us how to avoid being part of the problem and how we know if an attack is happening. Pseudonym: haaa CommentsIt is a good review for security and ethical challenges,it talks about Ethical and Societal Dimensions,Ethical Responsibility in Business and Security Management. Pseudonym: apeguo CommentsAn article that explains and defines what is fuzzy logic. Pseudonym: RINCON CommentsThis article provides some good information on denial of service attacks and how they are exploiting new weaknesses due to the ever increasing utilization of cloud services. Pseudonym: Ricardo CommentsThis is a nice informative website where it tells you the top 5 health problems relating to computers. Pseudonym: Student4 CommentsLots of helpful tips to avoid getting viruses. Pseudonym: malasinfonia Commentsinteresting Pseudonym: jcfan CommentsInteresting Pseudonym: zhiio.26 CommentsBiometrics is referred as life measurement, and this term is related with the use of unique physiological characteristics to identify an individual according to this website. It also says that a biometric system can be either identification or verification. Pseudonym: Damar CommentsThis is a very complete website if you want to learn more about the ethical environment in the business world, and the what is the employee responsibility to be honest and not look for personal gain. Pseudonym: Betty CommentsThe antivirus software is a set of utility programs that can look for and eradicate viruses, trojan horses and worms. Viruses attach all programs that exixst. Pseudonym: Purple05 CommentsIt is a powerpoint whi explains both theories and the differences between them. Pseudonym: fox12rider CommentsThis website gives a good description on IT ethical issues. It also advertises a book that will give the reader more information. Pseudonym: poseidon316 CommentsThis website provides information about "spoofing". In addition it gives helpful tips on how to protect agaisnt "spoofing". Pseudonym: AirenRenal CommentsWhat software piracy is in broader words Pseudonym: Betty Boop CommentsDefinitions and differences Pseudonym: sfbaker CommentsGreat explanation of business ethics and its effects on a business. Pseudonym: pipo Commentsa good example. Pseudonym: pipo Commentsgood web page Pseudonym: pipo Commentsgood web page Pseudonym: pipo Commentsgood web page. Pseudonym: pipo Commentsgood web page Pseudonym: sniffer Commentsgood web page. Pseudonym: pipo Commentsgood web page. Pseudonym: pipo Commentsgood web page. Pseudonym: pipo Commentsgood web page Pseudonym: pipo Commentsgood web page. Pseudonym: pipo Commentsgood web page. Pseudonym: pipo Commentsgood web page Pseudonym: pipo Commentsgood web page Pseudonym: pipo Commentsgood web page. Pseudonym: won CommentsVery good. Pseudonym: 60cougars Commentsgood website talks about the history and issues with business ethics Pseudonym: Milan CommentsI recommend thia site because it explains in great detail what a computer virus is and how to prevent it Pseudonym: SHOPAHOLIC CommentsTALKS ABOUT MICROSOFT'S SECURITY GUIDES FOR INTERNET SECURITY THAT WAS DEVELOPED "TO ENHANCE THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF SENSITIVE DEPARTMENT OF DEFENSE AUTOMATED INFORMATION SYSTEM" Pseudonym: El Matador Comments1. Identify several ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. 2.Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology. 3. Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology. Pseudonym: Carina CommentsA helpful webpage that includes plenty of information about hacking, viruses, the social contract theory, and the stakeholder theory. The information provided is very easy to read. Pseudonym: batrueba CommentsSecurity and ethical challenges: Ethical responsibility of a business – computer crime ... management – internetworked security defenses Pseudonym: radioactive Commentsit gives broad information about the several types of cyber crimes Pseudonym: firebrand5 CommentsThis article talks about a conference that supports SmartGrid technology. SmartGrid technology employs power grids in combination with digital technology to provide better, more efficient use of energy and resources. This in turn will allow for reduced energy costs to the consumer, consumption of energy to decrease at peak or unnecessary times and create a more green environment, by reducing energy waste. Of the topics included in this years conference, Grid-Interop will be dealing with such issues as cyber security, information assurance, value of customer data and mass market connectivity. Interesting article but requires further research if you don't have previous knowledge of SmartGrid Technology. Pseudonym: mglh CommentsThis site describes exactly what the title says. It also includes links to other definitions. Pseudonym: kite22 Commentsabout AITP standard of professional conduct Pseudonym: K. C. Browndog Commentsgreat pdf file discussing security and ethical challenges in information technology. Pseudonym: Shina CommentsThis webpage gives some definitions of a hacker and what they do. It also mention some tools and techniques the hackers use to work. Pseudonym: egmzlh CommentsThis article is about Cyber Crime. Some examples of cyber crime are spam, fraud, harassment, etc. There are many other links for further explanations. Pseudonym: 1lpcanales CommentsCyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases. Pseudonym: ilivac Commentsits a presentation similar to the one reviewed in class. it provides more details about security and ethical issues on a business environment Pseudonym: Air Jordan CommentsA short read about ethical issues in the work place. Pseudonym: ceapod1015 CommentsThis is site is rather easy to use, and contains various links to helpful tools. Pseudonym: Jollyngo CommentsA good page that show definitions and graphs that help to understand better! Pseudonym: Majik8fx CommentsDemonstrates the varied issues of the structures of ethics within a corporation. Which methods work best for whichever categories of businesses from relationship building to fraud to minimum wages. Pseudonym: jrodr655 Commentsgood informtation of the topic with a lot of information Pseudonym: Changoleon CommentsReally good an useful info Pseudonym: TooTall CommentsJust an article arguing points not that helpful. Pseudonym: shelly CommentsNot alot of information, just gives alot of links to other articles. Pseudonym: basketball CommentsBetter understanding on Ethical Responsibility... Pseudonym: evylia Commentsi choose this page because it gives aood definition of what is software piracy and give good examples Pseudonym: xpicti77 CommentsWorms and viruses target random computer systems. There are two types of firewalls: network and host-based. Most business require both to insure the best security. Pseudonym: fceleste11 CommentsThis article is about what business ethics is about,it also gives you an example and it talks about how its changing and how ethics is becoming a priority. Pseudonym: ange1 CommentsIn this context, FL is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded micro-controllers to large, networked, multi-channel PC or workstation-based data acquisition and control systems. It can be implemented in hardware, software, or a combination of both. FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics how a person would make decisions, only much faster. Pseudonym: calle8 Commentsvery short expressions but a good introduction for someone who does not know about it Pseudonym: DBMS21 CommentsCenter for Internet Security Pseudonym: Hollywood CommentsThis is a good site because it gives you a list of threats to online transactions that can affect a business or a consumer. Pseudonym: SHOPAHOLIC Commentsthis webpage covers the moral of the stockholders Pseudonym: Dino-Might!! CommentsInformation on Denial of Service attacks including indenitification, prevention and avoiding being part of the problem Pseudonym: ram9849 Commentsgood website helpful Pseudonym: Tesla CommentsTalks about denial of service attacks and how to avoid being a part of them. Pseudonym: liltweetaf CommentsThis is just a quick article I found on business security. I didn't find it astonishing but it was interesting to see some numbers being used to compare how business are managing to maintain some sort of security system. Pseudonym: hamburger Commentsinteresting to read about the defenses for a change. Pseudonym: lifeisgood CommentsThis website has good information about cyber crimes that is going on recently. Pseudonym: QMB2010 CommentsThis website makes a comparison between the stockholder theory and the stakeholder theory. Pseudonym: blah74 CommentsThis website features a guide on how to design for best use by people. Pseudonym: olak2934 CommentsIt provides you a definition and other links where you will find more information about ergonomics Pseudonym: Greek Goddess CommentsGives us an idea of how Bartering works. Pseudonym: churchill Commentsits a bit brief but offers an outreach link. [?] Pseudonym: paris123 CommentsPretty good site. Decent definition. Pseudonym: nanis CommentsIn this website I found information about the definition and the diferent types of computer crime such as hacking, phishing, cyberstalking and identity theft. Some of the computer crimes we saw in class are not mentioned on this website. In addition, another interesting website is the website of the US Department of Justice. Here you can find some examples and cases concerning computer crime and intellectual property. http://www.justice.gov/criminal/cybercrime/cc.html Pseudonym: omgcisroxors CommentsA recent article that discuses what happened to wikileaks when it was under a DDoS attack and how they tried to remedy that situation. Pseudonym: btomotors CommentsIs the website of the community of IT knowledge that enriches IT professions to it's full potential Pseudonym: taxxygirl CommentsThis website is really cool because it has all of the full text articles of the Ethics and Information Technology Journal since it first started in March 1999. It is interesting to see the currenct issues in IT ethics as well as the problems faced ten years ago! Pseudonym: Shadowmyst CommentsDefines Fault-tolerant systems and some about fault-tolerant design Pseudonym: dmart Commentsdefinition, history and more about antivirus, good source with full description Pseudonym: pichu Commentsgood explanation and website Pseudonym: Tom Brady Commentsgood website Pseudonym: Ravens12 CommentsThis website is part of larger webpage from Microsoft. It is also part of an online encyclopedia entitled Security TechCenter. The website details what a firewall is, today's threats, different types of firewalls (home vs. office vs. enterprise, etc.), and different firewall products. It is very easy to understand and is written for a casual user to understand. Pseudonym: D&J CommentsWhat I liked about this article is that is a guide of how firewalls work and how security on internet wotk Pseudonym: Tyson CommentsThis article explained not only the purpose of a fiewall, but provided detailed information regarding the different types and generations of firewalls. First generation firewalls started monitoring packets, but couldnt really tell which packets were safe. Third generation firewalls are able to record and distinguish the start and end of each packet sent from the WAN into the LAN. Pseudonym: Vjbarron CommentsGreat site on trojan horses Pseudonym: Duccis Commentsthreats to privacy of personal information: large databases, speed and power of search and analysis tools, detailed profiles, lost laptops, electronic ``conversations'' like Web transactions don't disappear when finished, unauthorized use, theft, leakage, ourselves unaware of risks Pseudonym: PoxFlaza Commentsexplains what it ethics and how ethics and technology are tied into each other Pseudonym: Dance21 CommentsGreat article! Pseudonym: J&M CommentsIt explains very well the importance of business ethics and the meaning of it. Pseudonym: Jesse James CommentsThis article covers different ethical issues in business from accounting to unethical business practices. Pseudonym: dism CommentsThis website define functional requirement as " The purpose of this study is to delineate in clearly defined terms the functions performed by the bibliographic record with respect to various media, various applications, and various user needs. The study is to cover the full range of functions for the bibliographic record in its widest sense--i.e., a record that encompasses not only descriptive elements, but access points (name, title, subject, etc.), other "organizing" elements (classification, etc.), and annotations. The purpose of this study is to delineate in clearly defined terms the functions performed by the bibliographic record with respect to various media, various applications, and various user needs. The study is to cover the full range of functions for the bibliographic record in its widest sense--i.e., a record that encompasses not only descriptive elements, but access points (name, title, subject, etc.), other "organizing" elements (classification, etc.), and annotations." Pseudonym: dism CommentsThis website descirbe the definiton of software piracy explaninig diferent points of this topic and how it is affecting economic in the United States. Pseudonym: yisuarez CommentsRenault CEO Carlos Ghosn recently accused three of the company’s senior executives of selling corporate secrets to the Chinese. Pseudonym: Lady Jane CommentsAccording to wordnetweb.princeton.edu state encryption is the activity of converting data or information into code. Pseudonym: Kalia CommentsShows how ergonomics is the way to make a job fit the person instead of the other way around. The main focus is the actual environment. Pseudonym: magui101 CommentsIn this topic of Security and Challenges, using lecture outline, learning objectives, lecture notes, graphics, and clear-cut definitions and had concise lesson prepared by professor. Student should realize that information technology that had a beneficial effect as well as a negative effect in each of the areas listed. Pseudonym: papayon Commentsjust like the title says :) Pseudonym: black&pink CommentsThe homeland security webpage defines biometrics as the psycholocical aspects of a person, there are examples of them and it is lengthy but very informative. Pseudonym: babas16 Comments" One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive." Pseudonym: tesla CommentsThe Playstation Network (psn) was hacked last week by unknown hackers in the U.S. They hacked around 77 million playstation account user information. Pseudonym: malm_2002 CommentsHere is how to hack UT its a fun thing to learn this can basically be done with any game if you put your mind to it and your imagination Pseudonym: MikeyAM CommentsThis business provides information on security and ethical challenges. Pseudonym: Tip CommentsThis website contains an e-book written by Professor Anatoly Sachenko, describing the security and ethical challenges of Information Technology. He discussed about the threats and defenses needed for the performance and the security of business information system as well as the ethical implication and societal impacts of IT. Pseudonym: sdominguez9 Commentsthis page talks about how you can use and prevent virus. algo it gives you examples. Pseudonym: sdavid Commentsinteresting Pseudonym: yaibon CommentsThis chapter discusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology Pseudonym: crde10 CommentsIts a very interesting site Pseudonym: Bittersweet CommentsIt gives a description on spamming and it also tell you how to detect it and things you can do to prevent spamming. Pseudonym: smestrada3 Commentsthis website discusses in length organizatonal planning process and goal setting Pseudonym: peace CommentsThis report was very intresting Pseudonym: sbeltran CommentsThis article discusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology. Pseudonym: Coe CommentsThe standards of professional conduct created by AITP. Pseudonym: DCar CommentsI believe that the stockholders theory is important because at the end of the day, the only thing that business's want to do is make money. Thats why they started the business in the first place. Pseudonym: RED CommentsThe website provides intresting facts on the development of hacking and where it all began. Pseudonym: cocktail Commentsvery interesting Pseudonym: fashion CommentsThis website basically provides information about online ethichs which is very important for me to have a better understanding of it. Pseudonym: It_G.O.D Commentsthis site explain and givews examples of internet security ands polociys Pseudonym: Doddo CommentsThis is a web forum where computer forensics explains the common facts for committing cyber crime. They explain how this affect customers and the enterprise itself. It is important to mention that this forum, also, focuses not only in the relationship between Enterprise and Business, besides, it emphasizes the relation ship Employer-Employee. This main point is to protect external and internal transactions. Finally, the forum explains the common ways criminals hack computers. Pseudonym: static69 CommentsThis site has a couple of links on news about technological ethics, ethical principles and a few other things. Pseudonym: Aria CommentsErgonomics derives from two Greek words: ergon, meaning work, and nomoi, meaning natural laws, to create a word that means the science of work and a person’s relationship to that work. Pseudonym: alesi624 CommentsIts imporant to be aware of the different kinds of dangers one's privacy can be affected through technology. Different porgrams or viruses can harm your computer and even harm your security meaures such as personal identity information. It is wise to be informed on how to be protected by such threats and what you can do to not get them. Pseudonym: AcesWild Commentsmanagement, operational, and technical security services Pseudonym: Chikis17 CommentsTalks about how a person should act in a business Pseudonym: Azeliz CommentsInformation on business ethics Pseudonym: 1234 CommentsProposes steps to identify and execute strategies in It. Pseudonym: 007cupcake CommentsThis website took me to a powerpoint that was very useful. Pseudonym: GAMR Commentstalks about the ethical issues in the IT world Pseudonym: celticfan1 Commentsgood webstie Pseudonym: celticfan1 Commentsgood webstie Pseudonym: Eris CommentsProvides a helpful checklist of steps that can be taken to ensure the safety of business transactions online. Pseudonym: bambino CommentsProvides specific information on trojan horses and other malicious internet criime. Pseudonym: Goku CommentsVery informative. Pseudonym: jdrummer23 CommentsTalks about Business Ethics Pseudonym: Afrodita CommentsInformation systems is a great tool for the development of technology and data sharing of an organization. It helps to plan and manage the functions of a business structure. But all of the data shared and access represent an ethical and security issue for the IT professionals. The information systems use hardware and software tools, the personal involved the flow of information. That is why the security and the way the systems are managed are so crucial. Some organizations hire professionals to keep the confidentiality of the information and secure their systems. Like passwords and access codes. This is made in order to prevent any intrusion like hackers, viruses and threats. The ethical part of managing the information is other relevant topic for any corporation. The most appropriate way to manage and pass the information and data collected of the enterprise and the customers have to be treating in a respectful and confidential way. Always keeping in mind the IT ethics codes. Pseudonym: Teddy CommentsThis site talks about firewalls and the different types. It also mentions how they can help our system prevent the entry of a virus, etc. Pseudonym: Kayy9 CommentsExplains what Antivirus is and the different types of antivirus softwares available. Pseudonym: Kayyy9 CommentsExplains what Antivirus is and the many types of antivirus software programs available. Pseudonym: Jessiesgirl CommentsThe article is interesting, but not that usefull. Pseudonym: mavaldillez CommentsThis site gives very detailed information as far as business ethics and all the certain concepts that go along with business ethics. Pseudonym: Apod28 CommentsI thought this website was very thorough in explaining this topic. Pseudonym: maryta CommentsIdentify ethical issues in how the use of information technologies in business Pseudonym: zoenatalia CommentsThis website give us history about how many time this crime had been existing. And also give us some examples of Computer crimes. Pseudonym: 12mrk CommentsSince almost the whole world is on Facebook, hackers are using it for the advantage of scamming and getting into other people's computers. Facebook is known to have a 'like' button on all posts. Scammers are creating a 'dislike' button and asking people to download the new code. Videos are also used to entice users to click on so that viruss' can start affecting their computer. Facebook has been getting a lot of heat recently on how it lacks more security. Pseudonym: pollo CommentsThis website explains how firewalls work in protecting your computer. They keep out unauthorized internet users from intranet networks. Pseudonym: aapoda56 CommentsThis website talks about the history of the security defenses. Good site. Pseudonym: VW Commentsin this website we learn that hacking is a felony in the US.... but now always as there is also something known as ethical hacker which is not illegal but even condoned by companies/organizations Pseudonym: MCB CommentsThis website explains the basic concepts of social contract and its beginnings on American history. Pseudonym: SweetNess CommentsEven though this site has a lot of ads it was very helpful! Pseudonym: utdakid Commentslot of information on emphasizing business ethics Pseudonym: kcadena1 CommentsThe slides in the websites provide detailed information that pertains to chapter 13. Pseudonym: james CommentsIBM has corporate policies that cover the following issues: Business conduct and ethicsReciprocityWorkforce diversityPoliticsWell-being and safetyData privacyDiverse business relationshipsEnvironmental affairsQualityGlobal employment standards. Pseudonym: saida04 CommentsComputer security is very important to all kind of business. This fact has been one of the most controversial problems around the world that directly affect important companies as well as individual internet users. In this web we can identify each of the most common tactics that hackers use and we may be able to identify by this basic description. Pseudonym: abcdefg CommentsThis is an informative site that helps one understand what is considered cyber crime. It mentions how often cyber crime is made nowadays. Pseudonym: whitetigerep Commentsdescribes different computer viruses and the difference between them Pseudonym: Beauty28 CommentsI didnt like how the website was structured it was very cluttered and kind of hard to read. Pseudonym: Reckoner777 CommentsThis sites provides information on network security as well as tips. Pseudonym: zooly15 CommentsA DoS attack is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. Pseudonym: Rita<3 CommentsGreat site give you the 411 of how you might be exposing your computer with our knowing. Pseudonym: CX9 CommentsIT EXPLAINS HOW IT HAPPENED AND HOW TO FIX IT. Pseudonym: chavez CommentsDescribes the ethical challenges faced in today's workplace environment, enjoy! Pseudonym: Elizabeth CommentsDiscusses the main hacking techniques used during 2010. Pseudonym: ravazquez Commentsthis is a PDF format which shows the security and ethical challenges in IT Pseudonym: Alecnoah1981 Commentsthis web-site is available if you ever feel you have been a victom of Cyber crime Pseudonym: venus831 Commentsthis article provides information on hot technology could be a threat to pryvacy Pseudonym: Poodle CommentsTalks about the future and how things are affected now. How things can be avoided and fixed in the future. Pseudonym: INA CommentsIn this page, this long article explains ans talk about security ans ethical challenges. Everything related to e-business...helpfull when starting a business and also for those experience ones Pseudonym: iluvtom CommentsI wanted more information on Cyber law than the classroom discussion involved. Ask.com, certainly gave me that. This web site covered quite a few legal aspects of Cyber law: from history to creation as well as jurisdiction. I found the content extremely thorough. Pseudonym: pepe10 Commentsthis is one of the best references if seen yet. shows how many ways someone can do bad stuff to your computer, it is very interesting how many ways and how easily someone can enter your computer Pseudonym: luvbug01 CommentsThis website explains in detail what social contract throry is as well as the views of others such as Socrates, John Locke and more. Pseudonym: GDF1214 CommentsWikipedia like always makes things simple for me to understand. Adware is a software that displays advertisement to a computer. It is use to generate revenue to the author and it is harmless. It is also shareware, spyware of malware. Some programs have been created to detect and prevent spyware.Some examples of adware are: gator,dollarrevenue, and view point media player. Look at this page for more information. Pseudonym: rolmedow CommentsGood business ethics are essential for the long-term success of an organization Pseudonym: laika* CommentsIt is a slideshow presentation that contains lists of many possible viruses but it also has some precautions and solutions we might take. Pseudonym: rasta CommentsIt is an overview over security and ethical challenges Pseudonym: MAPLE CommentsThis is the web talking about Stakeholder theory's information Pseudonym: zona Commentsgood webpage to understand business ethics Pseudonym: herman CommentsAn opinion article written in August illustrates how cyber theft may have immediate impacts on the US economy, and what government should do to counter this problem. Pseudonym: rmaese CommentsThis website talked about different ethical dilemmas one might encounter when working as an IT. some issues included making copies of important documents versus just being able to read them. This article explained how it was worst to actually print something out rather than relying on one's memory. Pseudonym: Lauriss4 Commentsemphasizes the impact of business applications of information technology on management and organizations, the components of information systems management, and the managerial implications of the use of information technology in global business. Pseudonym: Lauriss4 Commentsdiscusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology. Pseudonym: santo CommentsThe Article talks us about the way companies use public information of the customers and avoid litigation from them Pseudonym: nenonena CommentsGood website about e-mail monitoring plus policies and laws. I found very interesting and would suggest reading this article if you're interested in computer/internet security Pseudonym: Harley Quinn CommentsThis Forum helped to better understand the difference between Stakeholder and Stockholder Theory. Pseudonym: tequila01 CommentsIn this webpage explains very complete what is hacking. Pseudonym: Superman CommentsEducational website that explains the issues on technical security systems. Pseudonym: sas CommentsTHIS ARTICLE IS ABOUT A MAN THAT HACKED INTO COMPUTERS Pseudonym: lizzy CommentsThis website helps me understand the meaning of stockholder theory and how to apply it in real life. Pseudonym: schweiger Commentsat first I thought firewalls were bad, like viruses but after going through them in class, i found out they are essential in keeping computers safe and secure Pseudonym: amart819 CommentsSteps to follow when reporting computer hacking, fraud and other internet-related crime Pseudonym: Batmannnn CommentsThis is a popular slideshow on Security and Ethical Challenges of Information Technology. Pseudonym: streetrock27 CommentsGood article on stakeholder theory. Pseudonym: christian.arrio CommentsExcellent website with a power point presentation Pseudonym: Lilac CommentsAn list of cyber crimes. Pseudonym: Junior915 CommentsThis article explains how stakeholder theory can pose many challenges if a company decides to globalize and how the company can efficiently and effectively get to that point. Pseudonym: Africa CommentsGreat information about computer viruses, its properties, and effects. Pseudonym: germangirl Commentshelpful information about how to deal with viruses Pseudonym: coltRDZ CommentsProvides federal codes for ciber crime. Good resource to get facts regarding ciber crime. Pseudonym: darthgto CommentsThis website describes in detail about computer hacking and its problems Pseudonym: gn293662 CommentsExplanation as to how computer viruses operate on the computer. Very interesting. Pseudonym: Waldo CommentsIn concept, business ethics is the applied ethics discipline that addresses the moral features of commercial activity Pseudonym: Jax89 CommentsThis article explains how "easy access" is the reason for all the cyber crime involved with the UAE. Pseudonym: mgi852 CommentsProvides details regarding security and ethical challenges. Pseudonym: del sol CommentsPowerpoint presentation Pseudonym: elitedemokid CommentsDetailed information on how computer viruses work Pseudonym: S.W. Erdnase CommentsThis guy hacked Yahoo!, eBay and E*TRADE need I say more. Pseudonym: abcdefg CommentsThe website describres what fuzzy logic is and how to use it Pseudonym: Cristy CommentsHow to protect Java and What Is a Malicious Applet. Pseudonym: Repsol07 CommentsViruses are vital as well as worms when they enter into a system due to the damage they can cause within a system Pseudonym: Mr. Magpie CommentsThis website provides a very useful presentation on security and ethical challenges of information technology. The presentation is very detailed and easy to understand. Pseudonym: Coheed29 CommentsTalks a little more about the real threats hacking and other cyber threats pose in a tech driven society. Pseudonym: Coheed29 CommentsTalks about the value IY can bring to a business. Pseudonym: Matt Commentsgood definitions Pseudonym: MAVC Commentsinformation given is like a second opinion on what was seen on class Pseudonym: reorrantia Commentsdescribes all computer crimes including hacking Pseudonym: coco22 CommentsIT has not only connected the world at one single platform but it is also helping in the integration of various traditional societies into modern societies Pseudonym: B-Diesel3102 CommentsProvides a good list about several advantages and disadvantages of using firewall security systems to monitor your software. Pseudonym: somj3 CommentsIt provides with the definition of Hacking and several issues related to the legal side of it. Pseudonym: Pikoky CommentsGreat information on Privacy, and ethical issues Pseudonym: bigeyes CommentsTells the story of the kid who dveloped the virus and how he became more and more popular as the virus became larger. Pseudonym: Serg1386 CommentsThis site is a variety of documents containing information and insite on the different types of security and ethical issues in information systems Pseudonym: Vicenza CommentsThis website talks about the worst viruses of all time. Pseudonym: 321aed Commentsits a great reading Pseudonym: Kapustul CommentsThis is a wonderful website to learn everything about compuer monitoring at the workplace since most employees are not aware what can and is being monitored. Pseudonym: Enna CommentsPPT file that explain the security and Ethical Challenges Pseudonym: NYSE CommentsThis article takes a look at a neglected area of most computer security professionals' training: how to deal with the ethical issues that can - and invariably do - crop up during the course of doing your job. Pseudonym: LucyBird64 CommentsPDF of Friedman's Stockholder Theory of Corporate Moral Responsibility Pseudonym: Great Dane CommentsThis website defines Internet abuse and gives information about Internet workshops as a good place to let your employees know about what is acceptable and what isn’t. The website also explores problems that can be encountered with Internet monitoring, such as incomplete or inaccurate information and someone else accessing an employees computer. Pseudonym: Sun City CommentsFor me this was a very helpful article. I am 21 years old and because I'm young most people will assume I understand everything related to the computer. The truth is that by reading this article now I feel more confident aboutn how anti-viruses really works. And I realize why is so important to update the anti-virus frequently Pseudonym: Paco Commentsinteresting article on ethical dilemmas with respect to information technology Pseudonym: 33love04 CommentsThis website provides good insight about what ergonomics is and its purpose of the workplace. It also has other links you can look at relating to ergonomics. Pseudonym: waffles CommentsThis website helps you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. Pseudonym: caleyva Commentswhat i'd like about this article is that they not only talk about the word hacking, but they also talk about the word cracking which some persons think is the same thing, how ever in this article the explain that to. Pseudonym: Godfather CommentsThe article covers social responsibility giving a definition and explanation Pseudonym: eli2007 CommentsEverything about sniffer programs and how to detect and prevent them Pseudonym: peke01 CommentsThis webpage gives examples of the common hacking tactics and a brief description of this tactics. Pseudonym: dgarci07 CommentsIt talks about why people in the technology field as in other fields should have ethical policies to not harm other personnel. Pseudonym: gbrnboo CommentsThis website briefly describes the ethical issues that people who work with information systems may encounter. Also, how being able to access someone else's information can be tempting but why you should relay on ethics to avoid legal problems. Pseudonym: Alman R. CommentsRemote Access Trojan (RAT): Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. Data Sending Trojan: Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, and IM messages, and sends them back to the attacker. Destructive Trojan: Trojan horse designed to destroy data stored on the victim’s computer. Proxy Trojan: Trojan horse that uses the victim's computer as a proxy server, providing the attacker an opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet. FTP Trojan: This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim's computer using File Transfer Protocol. Security software disabler Trojan: This Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim's computer, and even to infect more than the computer. Denial-of-Service attack Trojan: Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim's computer. Pseudonym: Alman R. Commentsexplains many questions involving software piracy issues. Pseudonym: Bugito CommentsTop ten viruses of all time and a brief history of each. Pseudonym: tessers14 CommentsDescribes what computer viruses do to computers. Pseudonym: Mgarc876 CommentsGood site information is organized, clear. Pseudonym: Nana CommentsProvides tips for a safe workplace Pseudonym: Woody CommentsThis web page helps you understand better what a logic bomb is. Pseudonym: Poodle CommentsIt is very detailed and explains the meaning and difference of global market. Talks about the way it became separate from multinationalism. Pseudonym: jaimelcx CommentsThis website is about the way a person can protect their computers from hackers. It is very helpful and teaches you things like protecting your passwords and security information. Pseudonym: Chuck Bass Commentsthis shows the moral and ethical values that a business must have to our society Pseudonym: enileucaj CommentsThis page give information about the steps to take when dealing with different behaviors and what is the ethical aproach. Pseudonym: vega CommentsThis website is very useful because it describes all type of security and ethical challenges in a very brief and understandable manner. I absolutely recommend you read it! Pseudonym: *a*a* Commentsbusiness ethics should be more closely related to philosophy Pseudonym: 5589 CommentsHelpful to overcome some of these security challenges that we come along with technology. Pseudonym: bravodelta CommentsDiscusses symptoms of computer viruses Pseudonym: Lily CommentsThis webpage is not interesting like other like i already read because are slides the problem is that there are lot of pages with kind of the same information the good part of that is that are special for students and you can find easy any question that you can have about the security and ethical challenges Pseudonym: lacruzt Commentsa brief and concise presentation about nowadays business security and ethic challanges. Pseudonym: jpc Commentsdefinition of cyber theft and some information on the law and legality of that issue Pseudonym: boostzilla Commentslists methods and common entry points, and also offers defense against hacking techniques Pseudonym: cerezita Commentsit's wikipedia describing what is fuzzy logic Pseudonym: Charbo CommentsThe site gives information on the different methods hackers use and why they attack. Pseudonym: Twiggy CommentsThere is important information here in how security and ethical challenges arise in the businesses world. Pseudonym: menitomex CommentsIs about the ethical challenges that companies face with spyware, hackers, privacy concerns over intellectual property, etc Pseudonym: ELOJ CommentsAn article completely dedicated to logic bombs which is one of the most common methods for hacking. Pseudonym: Pyro22 CommentsThe website list 10 individuals that have hacked important government information and millions of dollars ...this shows us the importance of computer security Pseudonym: lkiri CommentsIt explains thirteen common hacking tactics. Pseudonym: segtz Commentsin my opinion this lecture is very interesting but there are many different ideas about this topic and for this reason is important try to avoid any kind of bias to understand the lecture. Pseudonym: Beezy CommentsExplains ethical responsibilty Pseudonym: gh0213 Commentsreally interesting webpage, help for future references Pseudonym: JuneBug4` CommentsThis website explains a logic bomb is and how can affect the world of technology? Pseudonym: yesterworld CommentsThe website explains what is an ethical issue on an IT environment and how to deal with it Pseudonym: melow Commentsthis video gives a great short and concise answer to what the Stakeholder theory is. Pseudonym: xTWnQIwYZNBuYSYt CommentsThanks for that! It's just the asnewr I needed. Pseudonym: VEGASROO CommentsThe website defines and explains ergonomics and related subjects Pseudonym: london.love CommentsThis text just goes into further detail about what entails the right of Intellectual Property. It explains how it came about, the way we are protected by it and the limitations. Pseudonym: 3466 CommentsSECURITY AND ETHICAL ISSUES IN IT: AN ORGANIZATION’S PERSPECTIVE Pseudonym: Sakura19 CommentsI found this page to be informative in the position that social contract theory has in today's society and how it shapes individuals behaviors. Pseudonym: passion rose CommentsA good website about the many different types of Trojans such as password trojans, privilages-elevating trojans, key loggers, destructive trojans, joke programs etc. Pseudonym: 24oas CommentsThis website defines the meaning of hacking, and how it has become a big problem with computers. It also explains how it can affect your computer with viruses, worms, and others. Pseudonym: grpink27 CommentsSince this chapter is about security and ethical challenges, I decided to find a website that talked about piracy. This site points out a few piracy issues. Pseudonym: agent butters Commentsgood website Pseudonym: agent butters Commentsgood website very informative Pseudonym: da_bowz CommentsLengthy and detailed paper on ethics and crimes, and the defenses that are used against them. Pseudonym: miners CommentsContains information of the history of cyber crimes. Gives you examples of how they are commited and even real crimes reported in the news. Pseudonym: G.A.P. CommentsIn the world of computer firewall protection, a firewall refers to a network device which blocks certain kinds of network traffic, forming a barrier between a trusted and an untrusted network Pseudonym: faith Commentsthis website is a powerpoint that helped me go in more detailed to what Stockholder Equity is and how it i applied to the business world Pseudonym: jktubby CommentsOne of the most interesting topics in computers is hacking. Though i have never done it or would try to do it, this topic should interest you. This article has so much information on it that, it is good for someone who really wants to know what hacking is. It kept me very informative and I would recommend people to read this whole article. Pseudonym: Alrak.1 Commentsthis page have more viruses that we saw in class. Pseudonym: 1219 CommentsGood website on the definition and other information on social engineering Pseudonym: caj21 CommentsDefinition and examples of business ethics Pseudonym: ChevyCorvette CommentsWell explained summary of current internet problems and future risks. Pseudonym: amelie CommentsThis article talks about how computer hackers and predators can find you and harm you by hacking personal information from your computer and other things. I think this article was very informational and useful because it also explained how to protect yourself from these criminals and gave good tips on security on your computer. Pseudonym: cera8 CommentsA very good article to read! Pseudonym: Ducati Commentsa power point about this chapter Pseudonym: love3 CommentsIt gives a broad explanation of what stockholder theory consist of, how it can be used,and gives examples. Pseudonym: 082411 CommentsGives a lot of good examples of ethic dilemmas and ethical challenges Pseudonym: namtaB CommentsThis article gives examples of computer systems and their security. It lists different ways that a businesses computer systems can be hacked and things you can do to prevent this. For companies it states that the main reason to have good security is to stop hackers from causing unwanted effects (which it then lists examples of). The article ends by stating that security measures need to be intensified due to the openness of today's communications. Pseudonym: #!$@babydreamy CommentsHow and what security measures are taken by companies in 2012 Pseudonym: cmur3 CommentsThe definition of intellectual property rights direct from the World Trade Organization. Pseudonym: 6663yeni Commentsgood explanation about Stakeholder Theory Pseudonym: 6663yeni Commentsgood explanation about Stakeholder Theory Pseudonym: siddaap18 CommentsGood explanation Pseudonym: ConradHilton Comments"Should companies seek only to maximize shareholder value or strive to serve the often conflicting interests a=of all stakeholders?" Shareholder theory and the stakeholder theory are very odds when saying what is right. It is really interesting how they mention what is "right" but it isn't really explicit Therefore you have to know what each theory says and does not say. Pseudonym: luly CommentsThe reason to have ergonomics in the workplace is pointed out and also its relationship to OSHA. Pseudonym: Huasausky CommentsThis site provides the hacking legal definition and gives all the legal terms about this topic. Pseudonym: ag1508 Commentshacking is practice of modifying documents from original´s creator Pseudonym: alrok CommentsDescription of the top 12 most dangerous internet viruses. Pseudonym: Neto CommentsThis site give a basic concept about this terms, and even thought is not that much information it goes to the point. Pseudonym: Dolcevita CommentsIt explains how important is in business and how is used by companies. Pseudonym: ch120308 Commentscyber crimes are crimes where computers or networks are used or attacked. Many traditional crimes such as theft, blackmail, forgery, embezzlement and fraud today are all conducted on the internet. This site gives you 6 types of crime. Spam,or the unsolicited sending out of junk e-mails for commercial purposes, which is unlawful. Fraud refers to the fallacious misrepresentation of fact conveyed with an intention of inducing another to do or refrain from doing something that will ultimately lead to some major kind of loss. Obscene or offensive contents of some of the websites and other electronic communications over the net can be really distasteful, obscene or offensive for a variety of reasons. Harassment encompasses all the obscenities and derogatory comments directed towards a specific individual or individuals focusing for example on gender, race, religion, nationality, and sexual orientation. Drug traffickers use the Internet as a medium for trading their illegal substances by sending out enciphered e-mail and other Internet Technology. Cyber terrorism includes hacking into official websites or the crashing of official websites. Pseudonym: Palomar CommentsThe video shows what are some of the features of the anti-virus in Windows Vista Pseudonym: Baybee2705 CommentsThis paper written by Ross Anderson from the University of Cambridge focuses on the cost of computer (cyber) crime. It is an interesting paper because it brings to light the real cost of computer crimes to businesses and society. Pseudonym: Mirka Commentsthis article takes a look at a neglected area of most computer security professionals' training: how to deal with the ethical issues that can - and invariably do - crop up during the course of doing your job. Pseudonym: Roselily CommentsVery good website, goes over the technoloy ethics neede in the cyber world of people and coorporations, while talking about documentation,and obligations of the professional individual. Pseudonym: chimis CommentsContains information of the history of cyber crime, some of the types, and examples. Pseudonym: airJ CommentsEncryption is a fantastic way to protect yourself or your company from computer theft, by making your messages unreadable to others other than yourself. Pseudonym: charlieflowers CommentsThis website offers a history and explanation of how computer viruses work. It also covers how viruses have evolved and goes in depth on the different types of viruses from e-mail viruses to trojan horses and worms. It also offers advice on how to avoid getting infected and what you can do if you are infected. Pseudonym: Aquiles Baesta CommentsThe website provides reasons of over the importance of having a safe system and explains the development of a secure network. Pseudonym: Jacob45 CommentsThe website gives the basics and issues of what security and ethical issues are. Pseudonym: laeinaudi CommentsIn the following reference you will be able to read substantial information of the U.S. Department of Defense Defense Information System Agency and the different types of data bases defenses they have to protect or monitor information via Internet. Pseudonym: pajarita CommentsThis article in the magazine "TIME" talks about how spamming has affected millions of internet users around the world, ever since 1978. Pseudonym: MoMoBanks CommentsThis is a background description of the ECPA and how it includes the Wiretap Act, the Stored Communications Act, and the Pen-Register Act. It is an information page that gives the detail on what this Act includes and how it affects law enforcement and our privacy rights. It gives info on the interception and access of communications such as phone calls and emails. Pseudonym: Pale1 CommentsA document that outlines the issues with security and ethical challenges. Pseudonym: eetc CommentsFor informational technology security and ethical challenges are both beneficial on the society and people. For example, to optimize the beneficial effects. Pseudonym: Rondo CommentsThe website talks about carpal tunnel syndrome Pseudonym: s464 Commentsthis website is an article discussing internetwork security defense. Pseudonym: benji1224 CommentsThis is a presentation with slides that shows and talks about the security in computers and how hacking has become a dangerous threat in the modern networks. Pseudonym: Allday Commentsa way to ensure that every one around the workd has access to the basic needs. Pseudonym: Good lookin Commentsthese series of slides demostrates the similes and contrast of a stockholder. Pseudonym: Dgonzalez14 CommentsBreaks down all the ethical issues that can possibly be encountered and how to deal with them. Interesting read Pseudonym: Lady2Luv CommentsI did not know how many people are d0ing this. but I did not know how many people actually do this and it is amazing what kind of information they find and get away with. Pseudonym: emmendez2 CommentsThe Association of Information Technology Professionals (AITP) is a professional association that focuses on information technology education. The group is a non-profit national group, but its activities are performed by about 200 local chapters organized on a geographic basis, and a similar number of student chapters at college and universities. Pseudonym: Batman CommentsThe author of this article explains the issues relating to IT ethics. She uses the example of the "slipper slope" where people may start by doing things that don't seem unethical( like scanning other employees emails just for fun) to doing things that are completely unethical (like sending the email to the wrong person or making changes to such email) Pseudonym: Mini.A Commentshas a really cool slideshow about the whole chapter that includes definitions and other important information Pseudonym: pya CommentsThis is a government page where it states everything that you have to know about the Piracy of Intellectual Property. Where it provides detail of the legal framework there has to be, as well, as how it should be enforced. Of course, it also gives some cases of the challenges that this is having with specific countries. Pseudonym: Mr. Norris CommentsArticle gives creditability to the 90% of employees who surf recreational sites while at work. Plus you mentioned this in your lecture. I thought it was interesting how even the most professional of people aren't doing what is expected. Pseudonym: Bert CommentsSecurity systems Pseudonym: chiefitox CommentsThis posting is very useful to anybody who uses a computer. It describes what a trojan horse viruse is, what it can do, and how it operates. What is very useful is the prevention part of the article which baasically says what you should do to prevent your computer from getting infected. They are no brainer but somtimes it may skip our mind and the average user may not take the security warings serious. Also anti virus software is something everyone should have if they use the internet on a daily basis. Even when one is checking their e-mail they should know who the sender is and only download a run software from a credible source. Pseudonym: dragonfly CommentsFirewall definition and the different firewalls (host-based firewall and a network-based firewall). Pseudonym: BlackMamba CommentsThis is a set of powerpoint slides about security and ethical challenges Pseudonym: insanerasberry CommentsLecture on security and ethical challenges Pseudonym: Jason Bourne CommentsA very in-depth article explaining computer viruses and worms. Pseudonym: fer040 CommentsAn article by the New York Times, "Do We Need a New Internet?" states that security experts and engineers are so concerned about the fragility of the internet, that some claim it is best to start over. These claims were made after a software program from Eastern Europe appeared and managed to break down one of the world's best cyber defenses. Conficker, the infamous software, has the power to infect computers and later combine them into a "supercomputer" that can be manipulated by the creators. At Stanford, experts are attempting to re-create a "new internet," after numerous and unfortunate incidents have portrayed how weak and insecure the internet can be. Pseudonym: Shaggy Comments"Ethical Responsibility in Business. Business and IT activities involve many ethical considerations. Basic principles of technology and business ethics can serve as guidelines for business professionals when dealing with ethical business issues that may arise in the widespread use of information technology in business and society. Examples include theories of corporate social responsibility, which outline the ethical responsibility of management and employees to a company’s stockholders, stakeholders, and society, and the four principles of technology ethic" Pseudonym: Vd3725 CommentsThis website provides an overview on the concepts and causes of spamming as well as on the alarming increasing rate of spams. Pseudonym: kike CommentsThis article helped me understand what a trojan horse refers to as far as IT is conners and be able to distinguish the difference form a virus and a trojan horse. Pseudonym: zez763 CommentsIt gives us the origin of the word ergonomics and its history. Following that it tell us that people are unaware of the problems of bad posture, joint and muscle functions. Furthermore it gives us the Alexander method which helps to make the connection between mind and body to correct our bad habits. Pseudonym: squirt CommentsThis website has over 60 powerpoint slides with almost all the information provided in class, but with the difference that I found this much more easy to understand Chapter 13 Security and Ethical Challenges Pseudonym: KLEO15 CommentsDiscusses the top 5 ways in which hackers try and guess your password and the ways you can try and prevent that. Pseudonym: teritap CommentsThis website explains what is a computer virus and how it works Pseudonym: alphaxi1893 CommentsMore information about Flame computer virus and it's role in trying to prevent terrorist attacks. Pseudonym: Dallas Cowboys CommentsIt is the website of a company. The main goal is development and introduction of the existing solutions into a branch of database management systems that are primary for managing and accounting for all kinds of companies and corporations Pseudonym: Sinigang CommentsNumerous views of Stakeholder Theory are presented in the literature though a key distinction can be drawn between the tenets of Stakeholder Theory and the conventional input-output model of the firm which see firms as converting investor, supplier, and employee inputs into customer outputs (Donaldson and Preston, 1995). In contrast, Stakeholder theory argues that every legimate person or group participating in the activities of a firm do so to obtain benefits and that the priority of the interests of all legitimate stakeholders is not self-evident Pseudonym: Lakers08 CommentsI didn't really understand what dumpster diving was for computers, so I found this short article that gives the definition of dumpster diving and gives an example. It helped my understand the meaning of dumpster diving. Pseudonym: spidey CommentsI like this site because these issues occur often and they must be fixed. There is always security threats and data loss with computer use. Pseudonym: karla23 CommentsThis web page has a good and specific information about security and ethical challenges. You can grow your knowledge reading this article about this topic Pseudonym: Theoretical CommentsThis article explains how encryption software works on a computer to help keep your data safe from getting stolen. Pseudonym: 93nanis CommentsThis video shows an animated explanation of how viruses, worms, and trojan horses get to your computer and what they do. Pseudonym: Duke1duke Commentshelps you with a definition and backgrounds of it that can give you further depth of what ever term youre looking for Pseudonym: paulinap5 CommentsAn online magazine where you can find stories about companies dealing with business ethics. Pseudonym: Sauce CommentsThe ethics surrounding decision making with regards to technology Pseudonym: rizoc0 CommentsThis wiki page explains the study of designing equipment and devices that fit the human body and its cognitive abilities Pseudonym: slizzy13 CommentsGreat detailed content Pseudonym: jade01 CommentsThis site helps organizations by raising public awareness of the importance of doing business ethically Pseudonym: Elvis CommentsInformative website. It explains to you what it is, how it's enforced and what can be done about it. It even has a section regarding world wide piracy. Very good. Pseudonym: D3luq CommentsMost countries extend copyright protections to software. Even the oldest legacy computer systems used today will not have their copyright expire until 2030. In the United States, copyright term has been extended many times over from the original term of 14 years with a single renewal allowance of 14 years, to the current term of the life of the author plus 70 years. If the work was produced under corporate authorship it may last 120 years after creation or 95 years after publication, whichever is less. Pseudonym: dreamdrea7 CommentsVery good webpage with practical and important information on ethical issues for those in IT. Includes why ethical guidelines are needed as well examples of some issues along with real world applications. Pseudonym: dali0525 CommentsThis website defines Stakeholder Theory along with Corporate Governance and Public Management and was later published in the Journal of business Ethics. It details all three theories and gives problem examples for each. Pseudonym: 6sense CommentsIt talks about the issues sorrounding computer privacy, it talks about that computer privacy can change just as fast as technology is changing because just as fast as people adopt technology different issues of computer privacy change.It talks about people who adopt technology without them knowing have they steps traced,and should the government be the ones tracking information or businesses. Pseudonym: SemperFi CommentsOfficial website of AITP Pseudonym: SemperFi CommentsOfficial website of AITP Pseudonym: Kumar CommentsIts about how hackers slowed down the speed of the internet. Pseudonym: SingSing CommentsThis website provides a great overview on what ergonomics is on behalf of the department of labor. Pseudonym: Mariela CommentsChallenges, Ethics, Information System, Information Technology, Security Pseudonym: peair CommentsThe websites provides answer form experts who know how to fix a computer virus Pseudonym: Hobbit CommentsIn this page the author explains what property rights are and how they deal with equity. Pseudonym: Karly CommentsThis article adresses any one who controls or works with a computer system like one for any university. the security measures are important and there are basic safety procedures anyone should take into account when operating such systems. Pseudonym: scandigirl CommentsRussia and the United States announced that they would seek to convene an international conference within weeks aimed at ending the civil war in Syria, jointly intensifying their diplomatic pressure on the combatants to peacefully settle a conflict that has taken more than 70,000 lives and left millions displaced and desperate. Pseudonym: enron CommentsThis is great article detailing the virus called the "love Bug." Pseudonym: mandres22 Commentsbasically explains how trojan horses are used and how to install and use them. Pseudonym: vdelga36 CommentsThe original model on which something was based or formed. It enables to test the funcionality of your design. You can test its performance, describe your product and.encourage others to use it. Pseudonym: Alets CommentsI understood better the definition of ergonomics in this website Pseudonym: bolt987 CommentsThis website was very helpful in getting an quick overview of what ergonomics is. The science to it, how it got started and how it is used. Very helpful when trying to find brief history. Pseudonym: wacho Commentsthe best page to find this concept Pseudonym: game of thrones fan CommentsArticle from Business Week on Business Ethics Pseudonym: SubsonicJoint CommentsNumber 1 internet security provider has a relevant article on how they try to keep out computers safe from fishing and other malicious hardware. Pseudonym: bmisk80 CommentsArticle gives you a description of DoS attacks and how to avoid them. Pseudonym: TeslaUTD CommentsThis article talks about how video game developer is trying to fight piracy of their games. They're thinking of new a innovative ways to fighting piracy. I support what they are doing because they aren't necessarily condemning file sharing, rather they are providing gamers a new incentive paying for their games rather than illegally downloading their software. Pseudonym: tia13 CommentsThe term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared Some of the most famous worms include the ILOVEYOU worm, transmitted as an email attachment, which cost businesses 5.5 billion dollars in damage. Pseudonym: ramos1 CommentsHelpful website. It gave the definition and examples of what business ethics are. Pseudonym: McLovin_24 CommentsThis is a very thorough article about what computer viruses are and how they work. The article discusses the origins, history, evolution, the various types of viruses, and how to protect yourself from computer viruses. Awesome site the information was very useful. Pseudonym: Spiffy9899 CommentsThis a a great article pertaining to the benefits of CSR Pseudonym: Amy1212/ CommentsThis website is very helpful because it explains what a Trojan virus is and what we can do to stop this kind of virus. Pseudonym: reydrian CommentsThis article talks about the use of zombie computers to perform DDOS attacks and compromise system availability. Pseudonym: 03192010 CommentsA computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Pseudonym: nopainnogain CommentsOn this page, the history of anti-virus software is discussed. The very first one emerged in 1987. There are identification methods, issues of concern, and other methods also presented. Pseudonym: a2dasj86 CommentsIt is important that upper management treats its employees fairly and with respect Pseudonym: purpley Commentsit is a very complete page that talks about the social contract theory. also mentions Socrate's argument, the modern social theory and more. Pseudonym: piki3497 CommentsThe webpage is of an organization which dedicates itself to business ethics. It is possible for anyone to look into any topic of business ethics and find a respond. Pseudonym: jordan99 CommentsThis is an easy to read/understand wikipedia sight on Ergonomics. It provides a detailled definition and examples of Ergonomics. Pseudonym: 01Robina CommentsWhat exactly is hacking, and how to prevent them. Pseudonym: Dorian32 CommentsI think computer hacking is very complex and interesting but this shows how much time you can pay for hacking a computer. Pseudonym: gelmon CommentsThis article is an example of ethical challenges that arise in the Legislation branch of the government. The ethical problem covered in this article is privacy, which is one of the most inmportant problems in almost all businesses. Pseudonym: 01batman CommentsIf you give the definition and also gives you the purpose of this and the methods that I can be use. Pseudonym: chago239 CommentsThis website talks about what ethics, business ethics, and the importance of business ethics are. Pseudonym: jmk1335 CommentsThis was an enlightening read. I don't know much about computers, I know about viruses but I did not know how to manually delete them. Pseudonym: SPIDERMAN26 CommentsThis article explains how businesses can protect themselves from trojan horses Pseudonym: gia1 CommentsCyber crimes are crimes where computers or networks are used or attacked. Many traditional crimes such as theft, blackmail, forgery, embezzlement and fraud today are all conducted on the internet. This site gives you 6 types of crime. Spam,or the unsolicited sending out of junk e-mails for commercial purposes, which is unlawful. Fraud refers to the fallacious misrepresentation of fact conveyed with an intention of inducing another to do or refrain from doing something that will ultimately lead to some major kind of loss. Obscene or offensive contents of some of the websites and other electronic communications over the net can be really distasteful, obscene or offensive for a variety of reasons. Harassment encompasses all the obscenities and derogatory comments directed towards a specific individual or individuals focusing for example on gender, race, religion, nationality, and sexual orientation. Drug traffickers use the Internet as a medium for trading their illegal substances by sending out enciphered e-mail and other Internet Technology. Cyber terrorism includes hacking into official websites or the crashing of official websites. Pseudonym: aslozoya CommentsThis website provides good definitions and information to understand about hacking Pseudonym: psmo22 Commentseverything high valuable in this world has a high risk of been stolen. fot IT, this is not exception. even though IT can be very secure, there is always a way to break in. another issue for IT is the ethical. whats right and whats wrong is a question that can be subjective to each person. this article will help us understand and maybe answer some of our questions. Pseudonym: mariposa CommentsThis reference is good to understand the new security and ethical changes that have arrived with new technology. It is very clear and interesting to read. Pseudonym: ghost602 CommentsWeb article about keeping information safe on the internet. Offers tips for best practices for home and public computers, password protection, email, and social networking. Pseudonym: zianav2348 CommentsThis article is not long and it gives definition and also important information is discuss. Pseudonym: Girl325 CommentsDefined information security and listed the issues associated with technology. Pseudonym: vivian Commentsgives ethical guidelines needes for people in the IT field or people who is creating their websites. Pseudonym: Truly0221 CommentsSells software for all kinds of devices computers phone and more to prevent people mainly hackers and unwanted guests from being able to get into the device and files on there and take what isn't theirs. Pseudonym: Charlie1427 CommentsAssociations and organizations for IT pros are beginning to address the ethical side of the job, but again, there is no requirement for IT security personnel to belong to those organizations. Pseudonym: Lehan CommentsThere are many ideal concepts that define what business ethics consists of. This website lets you understand the many choices that comes from business ethics and it gives you different situation which you may encounter yourself as a manager. Pseudonym: Quesadilla8 CommentsThe reference describes what is the stakeholder theory and gives some examples. Pseudonym: SNCZDMR CommentsThis website takes you step by step on what computer hacking is, how to prevent it, and how to secure your information. This was the only website that I found that actually took you step by step. Pseudonym: sharkyboyept Commentssays privacy is a main issue Pseudonym: dontay91 CommentsKeeping antivirus software up to date is critically important for all platforms, even if some of the operating systems, such as Macintosh and Linux, aren't as widely targeted by virus threats. But the key to ensuring that your network remains virus-free is something beyond the deployment of dependable antivirus solutions. Pseudonym: juang7 CommentsThis website explain what are the stockholder and stakeholder theory, also it explains the relationship of the two theories with ethics and regulation Pseudonym: pacman2010 CommentsThis article goes into detail about how hackers actually intrude into networks via the back door method. I found it to be quite interesting and it motivated me to clean up my computer account info. Pseudonym: sparrow28 CommentsExplains what the Trojan hacking program does to an operating system. Gives detailed information how it works and what it can do as well as what its current use is. As well as provides a small brief history description into how it got its name. Pseudonym: acct_asd CommentsThis website shows the most common methods used by intruders to gain control of home computers are demonstrated in this website. The website shows eight main ways of how hackers get confidential information. Pseudonym: MissCarter28 CommentsWhat does Ergonomics consist of? Find out! Pseudonym: rattler2011 CommentsAntivirus software helps to protect against uch as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Many anti virus software was developed in the late 1980s but later was limited to self-reproduction. Pseudonym: a24ever CommentsThis website explains in great detail the meaning of backdoor. It gives you examples that are very easy to understand and ways to prevent this threat. It is a great article that helped me better understand the definition of a backdoor. Pseudonym: mf0109 CommentsThis website defines cyber crime (computer crime) and describes the different types of cyber crimes which include phishing, hacking and stalking and/or harassment. It also provides several important tips on how to protect yourself. Pseudonym: Jrodr622 CommentsThis website is gives powerpoint slides that are good to reference with the class powerpoint slides. It provides a broader understanding of the material. Pseudonym: darellano2 CommentsMacro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs. Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus. Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses. Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program. What’s a Trojan Horse virus? A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. Pseudonym: meagatron CommentsThe article goes over how prevalent Trojan Horses have become recently and even noted that about 83% of all computer viruses are in the form of a Trojan Horse. One such virus called Downadup has been listed as having contaminated over 11 million computers worldwide. The people that create these viruses are seeking things like financial gain and even control of the entire computer. China, France, and the United States fell victim to malware the most frequently thereby ranking them as the top countries who also spread the most malware. Computer owners are asked to have a proactive security system in place because its not like cyber criminals are going to stop trying to find new ways to carry out their crimes from behind a desk. Pseudonym: Bisu CommentsA basic article on Fuzzy Logic being used in a particular company. Pseudonym: aggarcia44 CommentsI was very surprised when I was reading this webpage because there are legal free training for hackers out there. This is for them to practice their skills. Shocking Pseudonym: thatbackflip CommentsThey are caused by ergonomic risk factors such as force, posture, repetition, vibration, and others. This is a fact sheet describing the main types of CTDs. These can be broken down as disorders that affect muscles, tendons, nerves, blood vessels, bones, or a combination of these. Pseudonym: Taiedzi CommentsBeing ethical seems easy to say, most people think that they always act in an ethical manner. But now with technology it gets harder to act ethical. This webpage summarizes what are the challenges of being ethical, and the responsibilities in the business. Pseudonym: LasiK CommentsData on and examples of intellectual Property Theft Pseudonym: andres_iab88 CommentsComputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Pseudonym: Airborne Commentsthis site provides a good understanding of how the software works Pseudonym: BRUCEWAYNE CommentsThis page informs what adware is and how a computer gets infected. The site also informs of new adware that are out there and informs of ways that its infecting computers and what it does to a computer once its infected, and it informs how to remove the adware. Pseudonym: 8kb24 CommentsThis website gives a very detailed description of fuzzy logic. It foes through every aspect of it. Pseudonym: camaro007 CommentsCyber theft is a big problem in the United States and around the world. With technology advancing over the decades, it has become increasingly easy to perform an illegal act, such as steeling ones identity or their credit card information. Cyber theft is an illegal act that authorities have little control of, which makes it even harder to enforce and capture the persons who are responsible of these acts. I believe there is a need of awareness among users of the internet, in order for them to take higher precautions and avoid being the victims of these types of crimes. Also, it is the government’s duty to capture criminals involved in these acts, and prosecute them with an adequate punishment, such as those involved in the ATM cyber theft. Pseudonym: mineroxd CommentsComputer viruses can be deadly to a computer because they can potentially destroy the computer. The Doom was one of the deadliest computer viruses there ever were. The virus spread rapidly through e-mail and it broke a record of becoming the most abundant virus amongst computers. This virus was also known as “Novarg” and it infected approximately two million computers back in 2004. The overall damage that this virus caused was about $38 billion. As we become more affiliated with technologies more viruses will come about and for that reason people should be prepare and have their computers protected with antivirus and firewalls. Pseudonym: mft1 CommentsT security personnel often have access to much confidential data and knowledge about individuals’ and companies’ networks and systems that give them a great deal of power. That power can be abused, either deliberately or inadvertently. But there are no standardized training requirements for hanging out your shingle as an IT security consultant or in-house security specialist. Associations and organizations for IT pros are beginning to address the ethical side of the job, but again, there is no requirement for IT security personnel to belong to those organizations. Pseudonym: ChargedGBH CommentsA forum for IT security experts. Pseudonym: CAKRBC CommentsThis website not only describes what hacking is but is goes into other things about it as well. It even describes anti hacking. It was a very interesting to read and I highly recommend it. Pseudonym: MadridJet86 Commentsvery helpful to fully secure your computer from any type of harm from the cyber world. Pseudonym: jcsydb CommentsFuzzy logic in the narrow sense is symbolic logic with a comparative notion of truth developed fully in the spirit of classical logic (syntax, semantics, axiomatization, truth-preserving deduction, completeness, etc.; both propositional and predicate logic). Pseudonym: japer CommentsA good page that show definitions and graphs that help to understand better!!!! Pseudonym: vikk258809 CommentsIt shows keypoints about the most important information in security and ethical challenges Pseudonym: Raven CommentsThis website defines what a Trojan virus is. This website also give ways on which a Trojan virus can impact you and also ways to prevent them from affecting you. This website is useful to help you when you have a Trojan virus in your computer. Pseudonym: natiger59 CommentsThis article discusses the basics of firewalls, how they are used, and what they do. Pseudonym: Crisofora2 CommentsThe website is very simple, it has an easy access of searching words and other computer/technology terms. Pseudonym: EagleEye25 CommentsThis webpage is from an educational website so the information was helpful and was most of what was talked about in class. Pseudonym: yoval21 Commentson this site you will find the exact definition on hacking. know that you know what this means, you must we careful when putting personal information into the computer. Pseudonym: Yassy CommentsMore on security including authentication and Computer and internet security. Pseudonym: cglbryan2 CommentsThis website explains how firewalls work. A video and a image are on this website for further detailed information about firewalls. Pseudonym: Aubrey31 CommentsA6 chip so it doesn't drain your battery like the other i phones up to 6 hours more battery life Pseudonym: GhostRider3 CommentsPassword cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. Preventative measures need to be taken in order to make sure one's password is safe. Pseudonym: SHOWTIME32 CommentsThis website just talks about the basic functions of a firewall. It describes the types of firewalls there are, what happens when you don't have a firewall set up and of course what happens when do install a firewall. Pseudonym: SHOWTIME32 CommentsThis website just talks about the basic functions of a firewall. It describes the types of firewalls there are, what happens when you don't have a firewall set up and of course what happens when do install a firewall. Pseudonym: Super987 CommentsThe white house takes some action to make cyber laws to stop cyber criminals. It is very similar to hacking. Pseudonym: Dancer23 CommentsThe FBI gives their side of cyber crime at this website. Pseudonym: Peaches CommentsInformation system security is so important to companies that many hire experts in the field to help secure their technology and information. Pseudonym: Taco062 CommentsThis website can be useful for solving business dilemmas Pseudonym: Walter White CommentsThe website describes cyberlaw's as laws that prevent large scale damage from cybercriminals. Pseudonym: monstruo14 CommentsThis page is pretty much a glossary for technological terms. In this case, gives a broader and more detailed definition in order to understand what dumpster diving is Pseudonym: JumpinJR CommentsDiscusses operations management origin, operations management planning criteria, and organizations. Pseudonym: JumpinJR CommentsA piece discussing what it means to be a hacker. Pseudonym: victoria061711 CommentsTHis site really explains ethical challenges and gives a better understanding. Pseudonym: Whiteman CommentsThis website dealt with computer crime and how to protect your computer from these attacks. It laid out common threats, ways to spot a potential threat, and proper programs to help keep your computer safe. This was super relevant not only to the chapter, but also due to it being close to Cyber Monday. Pseudonym: mhern754 CommentsGood website on how to avoid crime online Pseudonym: vccorrales CommentsIn a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. Pseudonym: 275873 CommentsThis website clearly states the definition of the stakeholder theory. It goes beyond mentioning the duties of corporation managers and provides an ethical approach. It further explains why this theory is also in best interest if big corporations to follow. Pseudonym: soccer_cr7 CommentsThis website states the method by which a back door is used for. Pseudonym: Sauce2408 CommentsGood information and definition about business ethics. Pseudonym: ABGiovanni11 CommentsThis article focuses on the security and ethical, and food, and shows the relationship between the two. How it has been playing in a important role in our lives. Pseudonym: fifimine CommentsAccording to this article in businesses there are four kinds of issues: fundamental issues (integrity and trust),diversity issues (diversity force recruiting), decision-making issues (center on protecting employee and customer rights), compliance and governance issues (federal and state laws and safety regulations, fiscal and monetary reporting statutes and all applicable civil rights laws) Pseudonym: fifimine Comments"Man was born free, but everywhere is in chains!" J. J. Rousseau (The Basic Political Writings, 1987, p. 49.)The theory of a social contract is a hypothesis explaining how society originates as well as the presumed relationship between its members, how they incur responsibilities, and their rights. Pseudonym: niketw13 CommentsThis page is about technology being a threat to privacy which brings up ethical challenges along with it. Pseudonym: gmora15 CommentsThis website provides the most up to date news about hacking around the world Pseudonym: rwelliott CommentsThis website provides an overview of privacy issues, which exist on the internet. The website was set up by Microsoft and provides advice to internet user about how they can protect themselves against common threats online. Pseudonym: jdd1214 CommentsIn class we didn't really go into depth, so I wanted to know more. On the website it explained the ethical responsibilities managers have. They are responsible for the overall protection of the stakeholders and must adhere by business ethics no matter what. Pseudonym: JPots&Pans CommentsThe article explains dumpster diving and the law Pseudonym: ABGiovanni11 CommentsThis article focuses on the security and ethical, and food, and shows the relationship between the two. How it has been playing in a important role in our lives. Pseudonym: JB6CAJ3 CommentsThis article discusses audits that are being conducted on various internet companies to verify that they are complying with their privacy policies, the Federal Trade Commission conducts various checks on the companies, and if policies are not being followed they can be subject to a fine. Pseudonym: lizdrio CommentsThis article goes into detail of Freeman's stakeholder theory and how it functions in society and in the work place. Pseudonym: Zizou CommentsThis website was able to give me more detailed information about the Trojan virus. Pseudonym: Gol.D.Roger Commentsit gives more specific details on what this act consist and how it was constructed and applied. I was interested in more information about this act. Pseudonym: knickerbockers4 CommentsTalks about the importance of being ethic in business. Pseudonym: sdbanda CommentsThis is an article from business insider that describes essential security measures that every business should take. It's a bit dated though, it's from 2010. Pseudonym: Texan8 CommentsBusiness ethics is the discipline that addresses the moral features of commercial activity. There are five main points that this discipline covers. They are: the history of business ethics as an academic endeavor; the focus on the corporation in academic business ethics; the treatment of employment relation; the treatment of transnational issues; and the criticism of the focus and implicit methodology of academic business ethics. Pseudonym: GLCF09 Commentsinformation on software piracy and ways to protect yourself against it. Pseudonym: JR CommentsMore info on what it is hacking. Pseudonym: kokeloke22 CommentsBasic and good information on computer crime Pseudonym: Monchepe CommentsGodd website about the ethical challenges of IT in the professional world. Pseudonym: Monchepe CommentsGodd website about the ethical challenges of IT in the professional world. Pseudonym: killerbee CommentsI like this article it explains 17 ways which hackers can use to steal information from your computer, its very interesting. Pseudonym: jplozoya30 CommentsDumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Pseudonym: ayperez Commentshelps on learning and recognizing what cyber crime is Pseudonym: Fraggle Tots CommentsThe site gives the most important cyber crimes that occurred in 2012. Each cyber crime is given a brief description and the title is highlighted for a user to click on in order to go to the site with the complete article of the crime. The site is helpful for people to be aware of up and coming cyber crimes being committed and how to stop or avoid them. Pseudonym: recasa CommentsExplains the business ethics and its importance Pseudonym: markapple0507 CommentsThis is a website from the US Department of Justice that is dedicated to fighting Cyber Crime. It defines it as : one of the greatest threats facing our country, and has enormous implications for our national security, economic prosperity, and public safety." Pseudonym: SanAntonio CommentsIT security and ethics is given a detailed look. It presents different ethical approachs and describes them. Ethics are then explain how they should be applied to IT. Pseudonym: 170792lrsr CommentsThis website gives some insight of what systems design is and it also gives information about the history if it. Pseudonym: 170792lrsr CommentsThis website gives some examples if what can happen to a computer if it got a Trojan Virus. It also gives several examples of how to prevent your computer from getting one. Pseudonym: TinyTots CommentsThis site gave a brief description on both theories as well as compare them. I thought it could go into a little more, or give better examples but it gives a small analysis on both. Pseudonym: Sonnybrix CommentsAn article about a recent virus to hit the El Paso area. Pseudonym: -Henry0924- CommentsOSHA website for ergonomics and prevention of musculoskeletal disorders in the workplace Pseudonym: Shorty915 CommentsThe website simplifies the definition of what stakeholder theory is. After that the site provides the example of IBM's Smarter Planet Campaign in which IBM created value for the police department a.k.a the stakeholder by developing a computer system that combines all of the crime data more concisely. Pseudonym: eanais88 CommentsHere we can find the methods used by hackers to access computer systems and some information. Pseudonym: yaako23 CommentsThe website provides a well definition for Corporate Social Responsibility (CSR), then it gives some background of how this idea was created. It also states some challenges that CSR has faced under the globalization such as; limitations of jurisdiction, no direct responsibility imposed on the purchasing firms, difficulties in auditing, and local factories' attitudes. Pseudonym: James Franco CommentsThis reference gives insight into the debate of Stockholder theory versus Stakeholder theory and which is better for business. It takes a look at both theories and gives a little history behind both theories. For example, it states that the "stockholder theory states that there is only one social responsibility of business: to use its resources to engage in activities designed to increase its profits so long as it operates without deception or fraud." Although "many firms still focus (mainly) on profits and pay attention to stakeholder needs only when pressured to do so." Thus which theory is better for business. Pseudonym: vjimenez2 CommentsAfter reading the chapter I was very curious about the the whole "zombie" computer thing. So I decided to research a bit of that and see what more I could find about the topic. Pseudonym: Mockingjay CommentsThis article highlights the differences centered around Stockholder and Stakeholder Theory. Author Maxwell Pinto lists the pros and cons accompanied by both theories and how they are applied to real and modern business situations. Pseudonym: 7631mus50 CommentsSecurity and ethical challenges that pertain to the IT department. Pseudonym: dareliari CommentsThis website gives a detailed description of denial of service and what you should do if it happens to you. Pseudonym: Ailany06 Commentsmore interesting information Pseudonym: scr2727 CommentsIn Chapter 13 I I was a bit confused on stockholders versus stakeholders and the theory behind it, so I decided to look more into it. I came across this website called the 'examiner' under business industry. The author of this site is Maxwell Pinto a Toronto business examiner who gave many examples on how they are different. He shows through Milton Freedman, Edward Freeman, and Immanuel Kant's point of views to let the reader decide for him or herself. In the site it had the debate clearly written and defined each topic at hand. Overall this site gave me more information so that I could continue my search and was a good start. Pseudonym: OEOPT20O9 CommentsHere it present a list of common hacking tactics, which i consider very important to know about. Pseudonym: cd26493 CommentsFuzzy logic is a form of many-valued logic; it deals with reasoning that is approximate rather than fixed and exact. Compared to traditional binary sets (where variables may take on true or false values), fuzzy logic variables may have a truth value that ranges in degree between 0 and 1. Fuzzy logic has been extended to handle the concept of partial truth, where the truth value may range between completely true and completely false.[1] Furthermore, when linguistic variables are used, these degrees may be managed by specific functions. Irrationality can be described in terms of what is known as the fuzzjective. The term "fuzzy logic" was introduced with the 1965 proposal of fuzzy set theory by Lotfi A. Zadeh. Fuzzy logic has been applied to many fields, from control theory to artificial intelligence. Fuzzy logics had, however, been studied since the 1920s, as infinite-valued logics - notably by Łukasiewicz and Tarski. Pseudonym: TX Trooper CommentsThis is a good website to prevent hackers from getting into your computer by keeping up with the blogs and news this website provides. Pseudonym: Marz CommentsThis website explains the idea of stakeholder theory, which is to keep the interest of everyone involved in a business going toward the same direction. This idea adds much value to the goals of the business. Pseudonym: zar23 CommentsGives a detailed summary where you can better understand all the information. The summery covers all the major points of the security and ethical challenges. Pseudonym: Fierro8 CommentsThis page shows you how you can protect yourself from virus or worms. It gives you Do's and Don't that can help you avoid a bad experience. Pseudonym: happyguy CommentsExplains the theory and use of logic bombs Pseudonym: Saman02 CommentsA brief definition of application development and key components. As well as some examples. Pseudonym: grumpy_diver CommentsThis article discusses how hacking began and what it looks like today. Pseudonym: Basketball21 CommentsI found this article based on ergonomics in computer design. This article explains ways to avoid back pains and other pains while working on a computer for long hours. It speaks of the way computer design has changed for more comfort. It also gives tips on how to set up your workstation for a more comfortable setting. Pseudonym: princess13 CommentsThis website provides cases of famous hackers and hacking cases which shows some weaknesses of internet security and lack of ethics. Pseudonym: coti CommentsIdentify several ethical issues in how the use of information technologies in business affects employment,individuality, working conditions, privacy, crime, health, and solutions to societal problems Pseudonym: duck04 CommentsThis website provides information on the different types of computer crime categories. Pseudonym: jvizcar3 CommentsIn this website you will find information that explain about viruses and worms in an easy way to understand. Pseudonym: Megatron CommentsThe article goes over the various methods on protecting a computer from viruses. Pseudonym: belfortGOAT CommentsThis article details the basic as to what viruses, worms and Trojan horses are. It also gives resources and tips on how to avoid viruses and where to find current news on viruses. Pseudonym: BAMBOO CommentsIn this website I was able to understand ever better what Stakeholder theory means, which is a theory of organizational management and business ethics that addresses morals and values in managing an organization, and I learned many other things. Pseudonym: 88qwerty Commentsdefinition of hacking Pseudonym: pvy CommentsA very recent article on how hacking has become a more common problem in corporations than before. Pseudonym: CO12 CommentsThis website talks about the different security issues that are affecting computer technology and how it is threatening the data. Pseudonym: brem92 Comments(CSRC) facilitates broad sharing of information security tools and practices Pseudonym: mario7 Commentsantivirus protect the computer of any malicious virus of other computers or webpages. Pseudonym: villa175 CommentsExplains what ergonomics is and how the human factor can affect a persons overall health. It says where it can from and gives a history of it. Pseudonym: TopFlight27 CommentsThis website list the top 10 worst computer viruses. Sasser and Netsky were ranked number 3. It explains what the website is and how it ruins your entire computer. Sasser attacks computer through Microsoft windows while Netsky goes through your emails and Windows networks. My Doom made the list at 4 while the Kelz virus came in at 8. Pseudonym: Andromeda17 CommentsThere are facts and types of cybercases. There are link on the side also that take you to the trojans and spyware and ore definitions. Pseudonym: dv1429 CommentsThis article points out a new challenge facing IT directors. Now that large parts of an organization will have continuous access to much of the information that a company has at its disposal, old methods of keeping data secured are outdated. Pseudonym: aesal91 CommentsThis website is basically a slide show showing information about ethical challenges when it comes to informational systems. It gives a brief overview on how to identify ethical issues in the environment and basically what to do in case of such issued. It is a very useful and informative slide presentation. Pseudonym: aa44 Commentsthis site offers a validation that provides customers with the highest degree of assurance for transactions with companies online along with cost-efficient methods. Pseudonym: af90 CommentsWhat I like about the site is that it includes recent polls and popular stories of business ethics. The website is the electronic copy of what the magazine by Michael Connor (business ethics guru) would be like. Pseudonym: utepztmp9 CommentsThis web page explains what is an external firewall. First, it gives the definition, it gives the visual representation of the concept in the software, even though it is an intangible thing, it tells where it can be found within the computer. I t also compares it to other different softwares gives detailes description and its function. Pseudonym: Karlaa7292 CommentsEthical issues for IT security professionals Pseudonym: Radar O'Reilly CommentsThis website gives a thorough, very detailed explanation of Social Contract Theory with reputable references. Pseudonym: KGA2014 CommentsReally good website, It explains information about network security and provides tips. Pseudonym: cmarq101 CommentsThis website is about CSRC. This important security center makes more easy to share of information security tools and practices. CSRC provides a resource for information security standards and guidelines and support important services like companies, organizations,government, and colleges. Pseudonym: gamma CommentsThis article shows the ugly side of unethical behavior in the IT industry. Reading about ethics can be very abstract, so I was glad to read about real-world experiences. Pseudonym: Leon voss CommentsBusiness ethics is the behavior that a business adheres to in its daily dealings with the world. The ethics of a particular business can be diverse. They apply not only to how the business interacts with the world at large, but also to their one-on-one dealings with a single customer. Pseudonym: ZaAl CommentsAntivirus software prevents,detect and remove malicious computer viruses which can cause drawbacks and impair a computer's performance. Pseudonym: ano0630 CommentsThis article discusses strategies that businesses should take into consideration regarding internet use in the workplace in order to avoid security breaches, theft,viruses, and etc. Some strategies include: setting policies for internet use, monitoring internet activity with information assurance, and using firewalls. To maximize online security for the future an information assurance system is a smart investment. Pseudonym: turyboii CommentsContains information of the history of cyber crime, types, examples, news and cases mostly dealing with trojans. Pseudonym: Jad8 CommentsThis is an interactive infographic that does a really good job of explaining the top five computer viruses to attack computers. It has a lot of great information and puts it in a cool format that makes it easy to understand. Pseudonym: bk201 Commentsit is news about the virus heartbleed that had been a common topic on the systems community lately. Pseudonym: H1993 Commentsthis site is really helpful for all the student I really like it Pseudonym: Bntfalas6een CommentsI really like this site it/s really helpful Pseudonym: 951033 CommentsIn essence it is the study of designing equipment and devices that fit the human body and its cognitive abilities. The two terms "human factors" and "ergonomics" are essentially synonymous. Pseudonym: Fefe CommentsThis website gives the definition of dumpster diving and explains how it can be harmful. It also explains how it can be prevented. Pseudonym: Jrhernandez CommentsIt defines antivirus software, how it basically works. Its history and how it detects the viruses. It also gives us some issues of concern about the use of antiviruses. Pseudonym: miniondave CommentsThis article is very interesting, it informs us on the symptoms of carpal tunnel. This interests me a lot since my job requires me to be at the computer all day. Pseudonym: Drywall85 CommentsOnline security company. Pseudonym: Xiit92 CommentsThis is the FBI website so you can find anything you'd like about topics related to the FBI. In this case I looked for computer crime and this page shows and explains what cyber crime is and its many different facets, and how it can be presented. It gives advice on how to prevent it and how to deal with it once it already started. Pseudonym: BabySquirrel CommentsThe security and ethical issues of a firm can lead to job loss, health issues, and threats to the company. Information Technology strives to keep the morale of the company in mind when monitoring software and other technology. Companies also have to ensure their employees are being ethical when handling confidential company information. Pseudonym: ccminie123 CommentsTalk about the most common ethical issues within IT management. Pseudonym: 508254 CommentsThis website has multiple videos on the topic. It also provides links to book and the information is straight forward. Pseudonym: zlatan CommentsThe article speaks on how the cyber theft is becoming a very lucrative business. Is basically warning many companies on how they are in risk because the cyber thiefs are becoming more sophisticated in their techniques to steal information and money from them. Pseudonym: espno007 CommentsI found information on the link above that literally teaches you how to become a hacker. I am amazed on how you can easily find this information online. Pseudonym: gordies CommentsCyber Theft remains a growth industry. A $445 billion a year in trade. Here Stolen Secrets, Market Manipulation, Business Expense, Cost Estimates are some the topics well be in this website. Pseudonym: seashell CommentsI wanted to know more about ergonomics because being at the computer too long is uncomfortable. This website tells what it is and why its good to know. Pseudonym: asalaz51 CommentsThis site help me to understand the major concepts of Security and Ethical Challenges. Pseudonym: Benito Juarez CommentsNet-Worm:W32/Sasser refers to a small family of worms that spread to new hosts over the Internet by targeting the known MS04-011 (LSASS) vulnerability, which is caused by a buffer overrun in the Local Security Authority Subsystem Service, and will affect all machines that are: Running Windows XP or Windows 2000 Haven't been patched against this vulnerability Are connected to the Internet without a firewall This vulnerability has been addressed and patched. For more information, please refer to the Microsoft Bulletin (http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx for more details. Sign of infection is the existence of a file named 'C:\win.log' and frequent crashes of 'LSASS.EXE'. Sasser generates traffic on TCP ports 445, 5554 and 9996. Sasser was written in Visual C++; the first variant, Sasser.A, spreads in a single executable which is packed and protected with several envelopes. A later variant, Sasser.B, using the filename AVSERVE2.EX. Pseudonym: Vietnamese Commentsthis web talk about the information technology IT. i explain the definition of information techonoly IT. i think this is a good site. Pseudonym: lrodr40 CommentsI really enjoy reading the list of ethical issues in business this website provides. I founded really interesting because it just doesn't give us the list but also gives example of them. Pseudonym: marielymendoza CommentsThis website explains how ethical issues are defined in the use of technologies in business. It also explains how it can be developed for a better environment in the business. Pseudonym: miaama9 CommentsThis scholarly article provides detail on all things related to business ethics. Included are simple definitions as well as complex issues in the real world. Pseudonym: vch23 CommentsThis article is very interesting because it explains Security Challenges in a very simple way. Pseudonym: Watermelon CommentsThe website goes into what kind of unethical act exist in and surrounding a business. It also shows why it is not right to follow that unethical steps. Pseudonym: jvill283 CommentsEverything revolves around the Internet nowadays. Whether its Facebook, Twitter or any other social media, its always around. But how much privacy do we actually have? Once a picture is uploaded on any site, it can never be erased completely and it's out there forever. Next time, think first before you post partying pictures on the Web, it could cost you future jobs. Pseudonym: mmedi06 CommentsThis article was excellent! It provided plenty of information as well as many key terms and examples. I recommend this article to anyone interested in ethical issues in IT. Pseudonym: TC13 CommentsThis website helps you better understand stockholder theory. Pseudonym: jcdmb1019 CommentsI chose this site because it has a lot of information about ergonomics. I thought it was an interesting thing to look up and know more about. Pseudonym: AA756 CommentsThis website has ten of the most common ethical issues that IT managers come in conflict with. Pseudonym: Marlene Terrazas Commentsthe article explains the concept an organization has regarding security and ethical issues Pseudonym: phatlex CommentsIt explains what password cracking is and what the most popular tools their is to crack passwords. Pseudonym: Isamara CommentsAn explanation of the term but very well explained. Pseudonym: zlatan CommentsThat software is only most if not all of the time for only one computer. When you buy a program you buy the license to use, you are not the owner. And people often use the software ilegally in other computers. Pseudonym: jvill283 CommentsViruses are a nightmare for anybody. They can only work once inserted into a program, then it is downhill from there. There are many anti-virus programs that can be installed in your device to make sure it doesn't crash. There are also many different types of viruses, some worse than others, which will then determine what needs to be done to remove them. Pseudonym: strawberry CommentsThis is a useful article that informs readers of hacking tricks used by others. I think this is very helpful for readers so that they know what to look out for so that they can protect themselves from dangerous hackers that can cause a lot of damage. Pseudonym: Jak CommentsThis article covers very useful information about ethics in the it sector. Pseudonym: Mickey19 CommentsThis webpage was very helpful for me, because it contains a presentation with a very good explanation of what Security and Ethical Challenges is; and how exactly works. Pseudonym: zoom24 CommentsThis page help me understand how Security and Ethical Challenges works. Pseudonym: sm2468& CommentsThe article talks about three ways to Hack a computer. They are: Getting past a long in password,getting remote access, and cracking a Wifi(WEP)password. Whats irronic about the article, is how much money is being spent in securing computers against hackers, yet the information on how to get started on hacking a computer is available the google. Pseudonym: jl.delc CommentsAlthough it is pretty simple how the webpage is organized, I found pretty accurate the explanations and definitions that they expose. The have modules in which they explain in detail what are they consist of. Pseudonym: lebronjames CommentsEmployee working conditions play a big role in ethical issues, because the environment the workers are kept reflects on their attitude towards others, along with how hard the task the employee is doing. Giving employees breaks while working on hard tasks can minimize the workers frustration and stop any further conflicts from happening. Pseudonym: DJCTreyCinco Commentshas good insight on the subject. |