Operation excellence Operational Excellence Week 12 Assignment

Operation excellence

Operational Excellence



Week 12 Assignment

Information Systems for Business and Beyond Questions:

·
Chapter 12 – study questions 1-11, Exercise 1, 2




(Chapter 12 | 288)

What does the term information systems ethics mean?

2. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?

3. What does the term intellectual property mean? Give an example.

4. What protections are provided by a copyright? How do you obtain one?

5. What is fair use?

6. What protections are provided by a patent? How do you obtain one?

7. What does a trademark protect? How do you obtain one?

8. What does the term personally identifiable information mean? 9

. What protections are provided by HIPAA, COPPA, and FERPA?

10. How would you explain the concept of NORA?

11. What is GDPR and what was the motivation behind this regulation?
1 Page

Exercise

1. Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.

2. Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important.
2 Page

**Remember the APA cover page and the references (if required) do not count towards the page length**

Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment.  The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.

Textbook (attached)

Title: Information Technology and Organizational Learning

ISBN: 9781351387583

Authors: Arthur M. Langer

Publisher: CRC Press

Publication Date: 2017-10-17

Edition: 3rd ED.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can