Monday, April 27, 2009

1. cyber terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.

2.
perpetrator
- The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.

3. cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.


Sources: http://thefreedictionary.com, www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html,

Sunday, April 19, 2009

Yes.......!!!!!!because it is introduce students to the heightened expectations for corporate social responsibility (CSR) and its global drivers, including sustainable development and the increased pressure on corporations from regulators, shareholders, consumers and political processes. This subject presents CSR from the perspective of corporate opportunity and provides students with an understanding of how to assess the impact of CSR on business strategy, culture, operations and corporate performance. CSR is examined from the perspective of risk management, as a risk mitigation device, and also as an opportunity for the development of new products, markets and business models.

IT tools and applications of Supply Chain Management (SCM) are the focus of this subject. Designed from the perspective of the general manager (who must integrate supplier relations, production and factory floor, operations, financial and human dimensions of the enterprise), this subject examines the processes within the value chain of the company. Students learn how the competitiveness, cost structure and manageability of a firm's operations and markets can be improved through automation, using information and telecommunications networking technologies. Topics include fundamentals of matching supply with demand, incentive alignment and implementation challenges and analytical techniques for supply-chain management. The implementation of Enterprise Resource Planning (ERP) systems is also discussed.

Wednesday, April 15, 2009

The Ten Commandments of Computer Ethics

Written by the Computer Ethics Institute
by the Computer Ethics Institute
  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Computer Ethics Institute

Contact: Stuart Allen
sallen (at) computerethicsinstitute.org