Free Essay

Week 7 Checkpoint 7 Internet Privacy

In:

Submitted By rockit103
Words 326
Pages 2
Internet Privacy

William A. Black

XBIS/219

Week 7 Checkpoint 7

Prof. John Brooks

Explain how your expectations for Internet privacy differ for the following situations: Accessing the web at home, at work, and in a public setting, such as a library computer lab or Wi–Fi zone. What is the basis for your expectations? Is it legal to use your neighbors’ wireless Internet signal? Is it ethical? Explain your reasoning.

In our lives we are subject to privacy invasion through the electronic retrieval of our personal information which may be duplicated and misused. At home, I find that I carry the expectation that my own personal information is safeguarded. This is because I take steps when I am working on my own system to ensure my privacy by securing my information with my own anti-virus software and through the use of passwords and ids for access.

I find that at work I should be able to carry these same expectations; since the company should be using particular caution to safeguard employee information. The web should not be accessed during work for any purpose outside of work requirements. This is often not true. Your information is constantly at risk in both environments due to hacking and information abuse.

There are settings that put you at risk more than others. These include the local library and any Wi-Fi zone. These give greater access opportunities to many more people than either work or home environments. We should carry similar expectations into all settings since our only possible source of information protection comes from our own efforts to use reliable sources and networks.

Systems can be unprotected through either unintentional or intentional means. Your best protection is gaining as much knowledge as possible on the subject of information security and making use of what you learn in this study. A network should never be used without the owner’s permission. Accessing a network without permission constitutes theft.

Similar Documents

Premium Essay

Sylabus

...contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (2nd ed.). Hoboken, NJ: Wiley. All electronic materials are available on the student website. |Week One: Overview of Information Systems...

Words: 2308 - Pages: 10

Premium Essay

Xcom Syllabus

...|[pic] |Syllabus | | |Axia College/College of Humanities | | |XCOM/285 Version 2 | | |Essentials of Managerial Communication | Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course introduces students to the foundations of communication in a business setting. Students are exposed to various topics related to interpersonal and group communication within the context of applications in an office or virtual setting. Students will develop skills in forms of written communication, including memos, e-mails, business letters, and reports. Communication ethics and cross-cultural communications are also explored. Upon completing the course, students will have an awareness of their personal communication style and be able to identify areas of further exploration of communication as a business skill. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: ...

Words: 1987 - Pages: 8

Premium Essay

Internet Databases

...Week 7 Checkpoint Internet Databases There is a growing trend in the United States in which many health care facilities have begun to use electronic medical records systems. This is but one step away from a program currently being formed in the State of Florida to provide an Internet-based information network where health care providers could share patient information. (Keller, Amy: Online Access.) The benefits of such a program would be such things as instant access for any health care provider within the state (or even eventually the entire country) to a patient’s entire medical history. Admissions, discharges, lab results, radiology reports, and even prescription information would be available to health care facilities through the system. The concerns for this type of program are things like security and privacy. How could this information be protected? Proponents of this system state that making the system secure is easily addressed. Another issue is funding. Such a system is costly to put in place. A third concern is that in the United States only a small percentage of health care facilities currently use an electronic method of keeping patient data. The ultimate goal would be to greatly increase that percentage so that all patients could have their data accessible through the Internet data base. In my opinion, the benefits of such a program would far outweigh any potential concerns. Imagine if a person were far from home on a vacation and became involved in a serious...

Words: 358 - Pages: 2

Premium Essay

Wgu Itsecurity Capstone

...Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data,...

Words: 9337 - Pages: 38

Premium Essay

Nt2640

...some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static, and RIP-2 Routes 44 Unit 5: IP Troubleshooting and EIGRP 53 Unit 6: Subnet Design 62 Unit 7: Advanced IP Routing Topics and OSPF 69 Unit 8: Advanced IP Topics 79 Unit 9: LANs 88 Unit 10: WANs 98 Unit 11: Course Review and Final Examination 107 COURSE SUPPORT...

Words: 22068 - Pages: 89

Premium Essay

Business Writing Portfolio

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 2065 - Pages: 9

Premium Essay

Employee Surveillance and Testing

..."Employee Surveillance and Testing" Please respond to the following: Argue for or against the practice of electronic employee surveillance at work. Provide specific examples to support your argument. What laws, if any, may be violated by such practices? Employers want to be sure their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring. New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications. One company offers technology that claims to provide insight into individual employee behavior based on the trail of "digital footprints" created each day in the workplace. This behavioral modeling technology can piece together all of these electronic records to provide behavior patterns that employers may utilize to evaluate employee performance and conduct. For example, it might look for word patterns, changes in language or style, and communication patterns between individuals. Recent surveys have found that a majority of employers monitor their employees. They are motivated by concern over litigation...

Words: 3354 - Pages: 14

Premium Essay

Modifying Administrative System

...Contents Before you begin vii Topic 1: Plan for the new or modified administrative system 1 1A Identify the requirements of the administrative system 2 1B Obtain quotations from the suppliers/developers of systems 10 1C Select a system supplier or developer 14 Summary17 Learning checkpoint 1: Plan for the new or modified administrative system 18 Topic 2: Implement the new or modified administrative system 23 2A Identify and develop implementation strategies 24 2B Encourage staff to participate in the implementation process 29 2C Implement the system 32 2D Define and communicate procedures for using the system 35 2E Provide training and support on the use of the system 38 2F Deal with contingencies to ensure minimal impact on users 42 Summary46 Learning checkpoint 2 : Implement the new or modified administrative system 47 Topic 3: Monitor the administrative system 51 3A Monitor the system’s use, security and output 52 3B Modify the system to meet changing needs 57 3C Identify further modifications and notify users 61 3D Monitor staff training needs  63 Summary65 Learning checkpoint 3: Monitor the administrative system 66 Final assessment 69 Assessment information and scope Are you ready for assessment? Final assessment overview Assessment plan Final assessment tasks Record of outcome 70 71 72 73 74 101 Unit release 1 (Aspire Version 1.1) © Aspire Training...

Words: 5743 - Pages: 23

Premium Essay

Business Memos

...Business Writing Portfolio Natasha Allan XCOM/285 Essentials of Managerial Communication University of Phoenix Reflection Reflecting back on the Essentials of Managerial Communication and the last nine weeks, there have been several key points that will benefit writing skills in the workplace. The most important lesson learned is how to tailor a message for the audience which will receive it. A manager must know how to approach an audience be it an employee, a member of management or a customer. Each audience may need to be informed of the same information, but the way a manager presents the information to each should be different. A manager should also be aware of ethics and personal privacy when writing. It is easy for a manager to inadvertently create a problem for the company by doing something considered unethical by some or by invading an employee’s privacy. This course helped to understand how a manager should consider ethics and privacy when writing. This course also covered the considerations a manager must give an audience when deciding how much the audience knows about the subject matter. A manager does not need to assume the audience knows more information than it does, but he must also not bore an audience with subject matter the audience already knows. Lastly, a manager must keep in mind formality of documentation. A memo should be a more formal document than an e-mail. An e-mail to a fellow employee can be more informal than an e-mail to someone...

Words: 2890 - Pages: 12

Premium Essay

Molson Canada Social Media Marketing

...Molson Canada: Social Media Marketing K603 Table of Contents Executive Summary……………………………………………………………... I. Key Issues……………………………………………………………………... II. Analysis………………………………………………………………………. III. Alternatives & Recommendation……………………………………………. IV. Implementation……………………………………………………………… 2 3 4 7 9 References………………………………………………………………………... 16 1 Executive Summary Molson Canada has been facing negative reactions their recent social media marketing initiative, Cold Shots Campus Challenge. Parties claimed that this Facebook contest promoted irresponsible drinking behaviours among university students. As a result, Molson pulled the contest one week before the scheduled deadline. Now, Molson must evaluate the use of social media, specifically Facebook, in its marketing strategy. The available alternatives are to revamp the Facebook initiative, to focus on static webpages or to focus on traditional marketing strategies. The recommendation is to revamp the Facebook initiative over a period of three months with ongoing monitors and checkpoints. The projected cost of this recommendation is $75,500 initially, with recurrent annual costs of $36,000 per year. The advantage of this recommendation is that it can be easily expanded to include other types of social media, such as micro blogging, video sharing, photo sharing and online forums if the response to this project is positive. 2 I. Key Issues Molson Canada faces four key issues moving forward from November 2007. The...

Words: 3320 - Pages: 14

Premium Essay

Windows 10 Introduction

... Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing Services Editorial Production: S4Carlisle Publishing Services Copyeditor: Roger LeBlanc Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 48336 - Pages: 194

Free Essay

Syllabus

...301: INTRODUCTION TO INFORMATION SYSTEMS Section 0601 Mon, Wed 5:00PM - 6:15PM (VMH 1412) Section 0701 Mon 7:00PM - 9:40PM (VMH 1303) Instructor: David J McCue Teaching Assistant: -djmccue@rhsmith.umd.edu 0000 Van Munching Hall Mobile phone: (571) 212-9300 Office Hrs: Wednesday 6:30 PM – 7:30 PM and By Appointment NA Description This course integrates management concepts and information systems and technology. We will discuss how information systems are used for competitive advantage. We will learn how information systems are used by successful marketers, accountants, and finance and operations executives and more. Because our readings are online and current, we will learn how key business theories explain and enable what is happening today in business when information systems are being used. We will learn how to apply management concepts to understand the opportunities created by, and threats arising from, the effective use of information systems. We will discuss how to analyze and design information systems for business and how those systems are used in different businesses and business functions. We will cover the use of spreadsheets and databases for analysis and decision making. We will learn about key technologies such as telecommunications. Course Perspective When you read a business publication website such as the Wall Street Journal, Fortune, Business Week, or even a general publication such as the Washington Post or the New York Times, you will see a large number...

Words: 4524 - Pages: 19

Free Essay

Syllabus

...301: INTRODUCTION TO INFORMATION SYSTEMS Section 0601 Mon, Wed 5:00PM - 6:15PM (VMH 1412) Section 0701 Mon 7:00PM - 9:40PM (VMH 1303) Instructor: David J McCue Teaching Assistant: -djmccue@rhsmith.umd.edu 0000 Van Munching Hall Mobile phone: (571) 212-9300 Office Hrs: Wednesday 6:30 PM – 7:30 PM and By Appointment NA Description This course integrates management concepts and information systems and technology. We will discuss how information systems are used for competitive advantage. We will learn how information systems are used by successful marketers, accountants, and finance and operations executives and more. Because our readings are online and current, we will learn how key business theories explain and enable what is happening today in business when information systems are being used. We will learn how to apply management concepts to understand the opportunities created by, and threats arising from, the effective use of information systems. We will discuss how to analyze and design information systems for business and how those systems are used in different businesses and business functions. We will cover the use of spreadsheets and databases for analysis and decision making. We will learn about key technologies such as telecommunications. Course Perspective When you read a business publication website such as the Wall Street Journal, Fortune, Business Week, or even a general publication such as the Washington Post or the New York Times, you will see a large number...

Words: 4524 - Pages: 19

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Fdsaf

...Managing Human Resources What Do I Need to Know? Introduction After reading this chapter, you should be able to: Imagine trying to run a business where you have to replace every employee two or three times a year. If that sounds chaotic, you can sympathize with the challenge facing Rob Cecere when he took the job of regional manager for a group of eight Domino’s Pizza stores in New Jersey. In Cecere’s region, store managers were quitting after a few months on the job. The lack of consistent leadership at the store level contributed to employee turnover rates of up to 300 percent a year (one position being filled three times in a year). In other words, new managers constantly had to find, hire, and train new workers—and rely on inexperienced people to keep customers happy. Not surprisingly, the stores in Cecere’s new territory were failing to meet sales goals. Cecere made it his top goal to build a stable team of store managers who in turn could retain employees at their stores. He held a meeting with the managers and talked about improving sales, explaining, “It’s got to start with people”: hiring good people and keeping them on board. He continues to coach his managers, helping them build sales and motivate their workers through training and patience. In doing so, he has the backing of Domino’s headquarters. When the company’s current chief executive, David Brandon, took charge, he was shocked by the high employee turnover (then 158 percent...

Words: 12409 - Pages: 50