CIS3345:
Management Information Systems

Spring, 2015

New Chapter 13 References
[Home][Course Schedule][Evaluation Areas][Lecture Slides][Additional Coverage][Submission Forms]




Pseudonym: alpha
Website: http://web.whittier.edu/academic/business/duran/588/Security/frame.htm
Title: Security and Ethical Challenges
Date: 11/06/08
Time: 10:15:20 PM

Comments

It present the information in a power point wich is a good way to explain the topic.


Pseudonym: marmel
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Privacy and Legislation
Date: 11/17/08
Time: 12:02:22 PM

Comments

This article is an example of ethical challenges that arise in the Legislation branch of the government. The ethical problem covered in this article is privacy, which is one of the most inmportant problems in almost all businesses.


Pseudonym: AnG3LiTa
Website: http://en.wikipedia.org/wiki/Social_responsibility
Title: Social Responsibility
Date: 11/18/08
Time: 08:24:03 AM

Comments

In this website you will find information that will help enhance your understanding about social responsibility. It further talks about if a company can truly be social responsible..


Pseudonym: suncitygirl
Website: http://www.ebroadcast.com.au/lookup/encyclopedia/e-/E-mail_spam.html
Title: Spamming
Date: 11/18/08
Time: 04:13:26 PM

Comments

Now I know what spamming is! I really had no idea what it actually was but this helped.


Pseudonym: butterfly
Website: http://www.usdoj.gov/criminal/cybercrime/cclaws.html
Title: Computer Crime Legal Resources
Date: 11/19/08
Time: 04:11:43 PM

Comments

This website has links where you can look up cases, legal resources and learn about computer crime.


Pseudonym: aivaldes
Website: http://www.ed.uiuc.edu/wp/crime/hacking.htm
Title: Computer Hacking
Date: 11/20/08
Time: 02:58:46 PM

Comments

this website discuss all the issues about this topic.


Pseudonym: gymnast319
Website: http://www.microsoft.com/Piracy/
Title: Microsoft
Date: 11/20/08
Time: 09:57:45 PM

Comments

Helps to prevent Software piracy


Pseudonym: aild27
Website: http://www.wisegeek.com/what-are-the-primary-online-security-threats.htm
Title: Online security threats
Date: 11/23/08
Time: 12:29:53 AM

Comments

This is a good site because it gives you a list of threats to online transactions that can affect a business or a consumer.


Pseudonym: Hcobowler23
Website: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Title: The Difference Between a Computer Virus, Worm and Trojan Horse
Date: 11/23/08
Time: 06:06:26 PM

Comments

This article really explains the difference between these horrible enemies that harm our computers. After reading this article I believe I can better protect my PC from these harmful attackers.


Pseudonym: Pato
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Securyty and ethical changes important
Date: 11/24/08
Time: 08:42:07 AM

Comments

Security and ethical changes are important because it Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems


Pseudonym: sfleder
Website: http://en.wikipedia.org/wiki/Hacker_culture
Title: hacker
Date: 11/25/08
Time: 08:38:44 AM

Comments

this website provided valuable info. on what a hacker is and does and how to aviod them.


Pseudonym: shikamaru
Website: http://www.technewsworld.com/story/47833.html
Title: Study: Data Loss, Network Vulnerabilities Top Security Issues
Date: 11/25/08
Time: 10:01:09 AM

Comments

this is about how security loss is mounting and just becoming more of a hassle day to day.


Pseudonym: fishhead
Website: http://www.howstuffworks.com/question332.htm
Title: Howstuffworks.com great site on how stuff works (Smart Card)
Date: 11/25/08
Time: 10:06:32 AM

Comments

Love this web site it is a great way to find out how anything works it offers a good description of how a smart card works.


Pseudonym: staraurora
Website: http://www.web-miner.com/busethics.htm
Title: Business Ethics
Date: 11/25/08
Time: 12:02:01 PM

Comments

this website gives brief explaniations of business ethics as well as give links to different articles and newletters that discuss ethics in the businness world.


Pseudonym: dre2006
Website: http://www.ed.uiuc.edu/wp/crime-2002/hacking.htm
Title: Computer Hacking
Date: 11/25/08
Time: 02:26:47 PM

Comments

In this website computer hacking is discussed. It discusses issues, minimizing potential hackers, legal implications and it provides answers to fruequently asked questions. This is a very insightful website and easy to follow along.


Pseudonym: m_6_m
Website: http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm
Title: Definition and information on Trojan Horses
Date: 11/25/08
Time: 03:56:24 PM

Comments

Makes a great point in distinguishing between trojan horses and viruses


Pseudonym: orbital
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/25/08
Time: 05:47:31 PM

Comments

This websites explains what the Security and Ethical Challenges are, and how to understand them.


Pseudonym: Littlemissh
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 11/25/08
Time: 07:16:18 PM

Comments

This website gives you and introduction to computer viruses as well as history, origins, evolution, e-mail viruses , worms and how to protect your computer. Explains it very briefly but it is very informative.


Pseudonym: dragoneye05
Website: http://en.wikipedia.org/wiki/Biometrics
Title: Biometrics
Date: 11/26/08
Time: 01:36:30 PM

Comments

This website gives a detailed description of what biometrics is and what it does.


Pseudonym: cowboys82
Website: http://en.wikipedia.org/wiki/Ergonomics
Title: Ergonomics
Date: 11/26/08
Time: 05:36:23 PM

Comments

This site provides a good explanantion of ergonomics.


Pseudonym: Hangul07
Website: http://www.scu.edu/ethics/practicing/decision/framework.html
Title: A Framework for Thinking Ethically
Date: 11/26/08
Time: 07:21:07 PM

Comments

Each paragraph is short and sweet, straight to the point, but the entire article in general is never ending.


Pseudonym: supreme_eagle
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Information Technology - Security and Ethical Challenges
Date: 11/27/08
Time: 01:38:33 PM

Comments

Very informative site.


Pseudonym: Rockbourne
Website: Theories Used in IS Research: Stakeholder Theory
Title: http://www.istheory.yorku.ca/stakeholdertheory.htm
Date: 11/27/08
Time: 10:41:32 PM

Comments

I like the layout of the Website. It's structured to show and define what Stakeholder Theory is all about. Not too much stuff, but enough.


Pseudonym: Velia
Website: http://en.wikipedia.org/wiki/Social_contract_theory
Title: Social contract
Date: 11/28/08
Time: 11:31:21 AM

Comments

This website explains the definition of social contract theory. It gives you the overview, history, and criticism to this theory.


Pseudonym: sisqo :)
Website: http://www.answers.com/topic/social-engineering-political-science
Title: What is Social Engineering?
Date: 11/28/08
Time: 08:43:17 PM

Comments

This is a good website because it provides different answers to what Social Engineering is and what it does.


Pseudonym: jofinfo08
Website: http://www.scu.edu/ethics/practicing/focusareas/technology/
Title: The Markkula Center for Applied Ethics offers the following resources on current ethical issues in technology
Date: 11/28/08
Time: 09:49:01 PM

Comments

Very interesting articles on technology ethics


Pseudonym: jkep
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: Antivirus
Date: 11/29/08
Time: 09:27:05 PM

Comments

Explains in detail how the antivirus software works.


Pseudonym: THINKpink
Website: http://en.wikipedia.org/wiki/Firewall
Title: Explains what a firewall is.
Date: 11/30/08
Time: 08:06:08 PM

Comments

The website is very user friendly and gives plenty of information on firewalls and how to use them.


Pseudonym: earmas
Website: http://findarticles.com/p/articles/mi_m1387/is_3_49/ai_75278310
Title: Security and ethical challenges
Date: 12/01/08
Time: 11:21:50 AM

Comments

article on Information Ethics: The Duty, Privilege and Challenge of Educating Information Professionals - University of Pennsylvania


Pseudonym: london23
Website: http://www.abanet.org/buslaw/blt/2008-09-10/raether.shtml
Title: ethics security , and hacking
Date: 12/01/08
Time: 11:23:45 AM

Comments

Shows about how IT is being hacked into


Pseudonym: cuttie13
Website: http://www.google.com/search?q=Security+Management&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7DIUS_en
Title: Security management
Date: 12/01/08
Time: 11:56:30 AM

Comments

The website just gives you the definition of what security management is. I don't recommend it!!!!


Pseudonym: ONELOVE
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: Computer Crime
Date: 12/01/08
Time: 02:38:39 PM

Comments

Basic and good information on computer crime.


Pseudonym: incognito
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: Computer Crime Techniques. Information Theft and Theft of Proprietary Information
Date: 12/01/08
Time: 07:28:42 PM

Comments

Gives you a list of the most common computer crimes in our society. Also, a definition and examples of Computer Crimes and their legal implication.


Pseudonym: mavella
Website: http://www.stanford.edu/group/AIM/AIMPrograms/EventsArchives/wkshparchives/globalmgmt.html
Title: Not that long ago in Silicon Valley, the name of the game was technology. If you had the new technology first, you won. But things are more complicated these days.
Date: 12/02/08
Time: 08:24:35 AM

Comments

Even high-tech companies need to make better use of the very technology that their products make possible. In order to coordinate their widely distributed networks, they need to develop "bullet-proof" information systems that use the Internet to integrate all their manufacturing sites, including the virtual ones.


Pseudonym: mantastic
Website: http://www.anthrosource.net/doi/pdf/10.1525/an.2006.47.3.5?cookieSet=1
Title: Its a paper that was written by some analyst talking about the ethical challenges.
Date: 12/02/08
Time: 09:31:31 AM

Comments

Its a really good paper that explains everything in detail about how it has changed since 9-11.


Pseudonym: angel04
Website: http://www.referenceforbusiness.com/management/Comp-De/Corporate-Social-Responsibility.html
Title: CORPORATE SOCIAL RESPONSIBILITY
Date: 12/02/08
Time: 09:43:26 AM

Comments

it gives you the history, the arguments for and against corporate social responsibility, the stakeholder concept, and contemporary social issues


Pseudonym: volcom72
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: talks about the problems faced with internet and extranet securities
Date: 12/02/08
Time: 10:01:48 AM

Comments

helps provide an understanding of the many problems with security


Pseudonym: vitqb10
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 12/02/08
Time: 10:03:03 AM

Comments

I think that this document is a very helpful tool to understanding many of the ethical challenges in the world of computer systems.


Pseudonym: Cabinho
Website: http://www.pkirs.utep.edu/cis3345/submission%20forms/References/Chapter%2013.htm
Title: Enterprise and Global Managemente of Information Technology
Date: 12/02/08
Time: 10:14:35 AM

Comments

This lecture mentions the importance of business application of information technology and organizations.


Pseudonym: sithlord
Website: http://www.business-ethics.com/
Title: The online magazine of corporate responsibility
Date: 12/02/08
Time: 10:16:06 AM

Comments

You can subscribe to this magazine to obtain information on business ethics


Pseudonym: epff
Website: http://www.scu.edu/ethics/practicing/focusareas/technology/
Title: Technology Ethics
Date: 12/02/08
Time: 10:25:22 AM

Comments

You can learn a lot from this page...instantly motivates you to do good, not bad.


Pseudonym: Nacho
Website: http://ergonomics.about.com/od/repetitivestressinjuries/f/whatisctd.htm
Title: Ergonomics, and related issues
Date: 12/02/08
Time: 02:44:46 PM

Comments

Ergonomics, Cumulative Trauma Desorder, and Carpal Tunnel Syndrome explanations, relating common activities to these probles, and how to prevent them


Pseudonym: cc6967
Website: http://plato.stanford.edu/entries/ethics-computer/
Title: Computer and Information Ethics
Date: 12/02/08
Time: 04:25:07 PM

Comments

I was amazed at how informative this site was. It not only talked about general computer ethics, but it also had detailed information about various categories under computer ethics. I would highly recommend this site to anyone who needs a little more insight about computer ethics because the information goes hand in hand with the course.


Pseudonym: TRENte
Website: http://www.crime-research.org/news/05.05.2004/241/
Title: Computer Crime Research Center - What is hacking?
Date: 12/02/08
Time: 06:28:02 PM

Comments

Hacking is the unauthorized access and use of networked computer system. Here in this website we see that hacking is a felony in the United States and other countries. However an ethical hacker has authorization to probe the target.


Pseudonym: AAALV
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 12/02/08
Time: 10:35:23 PM

Comments

I did not like this website that much. All it gave was a very short overview of what business ethics was. It did not give the information i was looking for, therefore i would not recommend this website to other students.


Pseudonym: sox
Website: http://www.business-ethics.com/
Title: Business Ethics
Date: 12/03/08
Time: 12:44:58 PM

Comments

This site explains the importance of ethics needed in business.


Pseudonym: starfi
Website: http://www.whoswatchingcharlottesville.org/firewalls.html
Title: Firewalls: Your first line of defense
Date: 12/03/08
Time: 01:38:55 PM

Comments

This website describes in full what a firewall is, how a firewall works, how it protects you, and which type of firewall is best for you.


Pseudonym: rowdy101
Website: http://www.business-ethics.com/
Title: Business Ethics
Date: 12/03/08
Time: 02:09:14 PM

Comments

This actually a magazine that is devoted specifically to the topic business ethic issues. I liked it.


Pseudonym: swriddick95
Website: www.obscure.org
Title: It talked about the privacy issue with computer nowadays.
Date: 12/03/08
Time: 06:28:02 PM

Comments

insightful


Pseudonym: Hemingway
Website: http://www.law.duke.edu/journals/dltr/articles/2001dltr0026.html
Title: MONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY
Date: 12/03/08
Time: 07:38:07 PM

Comments

A very detailed article/research dealing with the status quo and the pros/cons of E-mail Monitoring in the Workplace.


Pseudonym: kojak4
Website: ttp://en.wikipedia.org/wiki/Dumpster_diving
Title: as stated by wikipedia-Dumpster diving is the practice of sifting through commercial or residential trash to find items that have been discarded by their owners, but which may be useful to the Dumpster diver. The practice of Dumpster diving is also known variously as urban foraging, binning, alley surfing, aggressive recycling, Curbing, D-mart, Dumpstering, garbaging, garbage picking, garbage gleaning, dumpster-raiding, dumpstering, dump-weaseling, tatting, skally-wagging, skipping, or trashing
Date: 12/03/08
Time: 08:43:16 PM

Comments

very helpful site. gives you the clear idea that you must learn to discard of yor info in a proper manner in which no one can have access to it and possibly steal your identity.


Pseudonym: windsor
Website: http://www.authorstream.com/Presentation/Stefanie-55086-Chap011-11-Chapter-Objectives-Security-Ethical-Challenges-Computer-Crime-as-Entertainment-ppt-powerpoint/
Title: Security and Ethical Challenges of e-Business
Date: 12/03/08
Time: 09:39:52 PM

Comments

This website provided a powerpoint right from a text book and with a lot of picture examples, gave a decent description of what security and ethical challenges of e-Business are.


Pseudonym: Maurice
Website: http://en.wikipedia.org/wiki/Ergonomics
Title: Ergonomics
Date: 12/03/08
Time: 09:47:10 PM

Comments

offers a good definition as well as a model on how a workplace is designed


Pseudonym: dannytenaglias
Website: http://www.microsoft.com/windowsxp/using/security/expert/honeycutt_spyware.mspx
Title: protect your computer
Date: 12/03/08
Time: 09:56:42 PM

Comments

basic information on keeping your computer safe from spyware and malware viruses


Pseudonym: qwertyuiop
Website: http://www.hackingalert.com/hacking-articles/password-hackers.php
Title: Are You Sure Your Password is Safe?
Date: 12/03/08
Time: 09:59:17 PM

Comments

Interesting! It is about hacking passwords, do you want to know how to do it?


Pseudonym: mlbclevfan
Website: http://en.wikipedia.org/wiki/Hack_(technology_slang)
Title: Hack (technology)
Date: 12/03/08
Time: 10:28:19 PM

Comments

An article outlining the history of hacking from the beginning to now.


Pseudonym: MEDDIE0074
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 12/03/08
Time: 10:41:05 PM

Comments

this web page contains all information required to get a knowledge of ethical aspects on the system information and almost all the concepts with diagrams and almost exactly the information provided by your book which you could use a good source to study


Pseudonym: pinkdancer06
Website: http://www.tekmom.com/tencommand/index.html
Title: THE TEN COMMANDMENTS FOR COMPUTER ETHICS
Date: 12/03/08
Time: 10:49:07 PM

Comments

this gives good rules for when using the computer


Pseudonym: Gia99
Website: http://plato.stanford.edu/entries/ethics-computer/
Title: Computer and Informations Systems
Date: 12/03/08
Time: 10:53:56 PM

Comments

This website offers information relating to computer usage and ethics. It begins with the foundation of ethics in computers and goes on to explain the reason why ethical guidelines have been implemented when dealing with information systems. Very informative article and useful in these times of great uncertainty.


Pseudonym: bush=mccain
Website: http://en.wikipedia.org/wiki/Ergonomics
Title: What is ergonomics?
Date: 12/03/08
Time: 11:26:24 PM

Comments

Ergonomics is the scientific discipline concerned with designing according to human needs, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.


Pseudonym: corvette
Website: ta.ba.ttu.edu/naveen/Fall%202008/chap11_Security%20and%20Ethics.ppt -
Title: Security and Ethical Challenges
Date: 12/03/08
Time: 11:45:03 PM

Comments

Ethical issues in the use of Information Technology. descrip.


Pseudonym: lawhereicome
Website: http://rf-web.tamu.edu/security/SECGUIDE/T3method/Theft.htm
Title: Description of comupter dumpster diving
Date: 12/04/08
Time: 01:05:41 AM

Comments

This article describes the difference between real dumpster diving and computer dumpster diving. It also points out that it is very similar and sticks to the old saying "ones man trash is anothers treasure"


Pseudonym: lfer
Website: http://www.schneier.com/blog/archives/2006/09/what_is_a_hacke.html
Title: schneier a good website
Date: 12/04/08
Time: 09:58:31 AM

Comments

it is an interesting website, that describes the real meaning of hacker


Pseudonym: charger13
Website: http://www.itsecurity.com/features/top-59-influencers-itsecurity-031407/
Title: A list of the most influential people in IT security
Date: 12/04/08
Time: 10:03:43 AM

Comments

This a list of the top 59 most influential people in IT security and it is pretty interesting to see what they contributed and how they helped the computer world.


Pseudonym: sox
Website: http://www.usdoj.gov/criminal/cybercrime/cclaws.html
Title: Computer Crime & Intellectual Property Section
Date: 12/04/08
Time: 11:12:36 AM

Comments

This web talks about and different computer crimes and laws that support the prosecution of these crimes.


Pseudonym: Solus
Website: http://csrc.nist.gov/
Title: Computer Security Division
Date: 12/04/08
Time: 11:30:49 AM

Comments

Great info. on current standards and laws dealing with computer security and the issues and challenges being dealt with in the 21-century.


Pseudonym: mrs.brooklyn
Website: http://law.freeadvice.com/intellectual_property/computer_law/computer_firewalls.htm
Title: What is a firewall - and what do proxies and socks got to do with them?
Date: 12/05/08
Time: 10:39:28 AM

Comments

Its very informative


Pseudonym: ae09
Website: http://www.spamlaws.com/virus-types.html
Title: Computer Virus: The Types of Viruses Out There
Date: 12/05/08
Time: 11:13:03 AM

Comments

This webpage gives the definition of a computer virus, all the existing types and the signs when computer infections exists. Short information but well-explained.


Pseudonym: Dumas
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 12/05/08
Time: 09:42:58 PM

Comments

A very complete essay discussing ethical and security challenges in Information Technology


Pseudonym: Dunkel
Website: www.wikipedia.com
Title: information about virus
Date: 12/05/08
Time: 11:53:49 PM

Comments

this website will show you the different classification of computer viruses, vectors, hosts, some ways in how to avoid the virus and more.


Pseudonym: eljuan
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: its a presentation on securty andethical challenges
Date: 12/07/08
Time: 02:48:02 PM

Comments

its a very helpful presentation in order to understand topics realted with security and ethical challenge


Pseudonym: bobby g
Website: http://www.webappsec.org/projects/whid/byyear_year_2008.shtml
Title: Web Application Security Consortium
Date: 12/07/08
Time: 09:17:20 PM

Comments

This site provides lists of some major hackng incidents that have taken place. They provide incidents from the year 1999 to 2008.


Pseudonym: Purple
Website: http://www.interhack.net/pubs/fwfaq/
Title: Internet Firewalls
Date: 12/08/08
Time: 11:02:00 AM

Comments

This site contains useful information regarding the most frequently asked questions about firewalls funstionality


Pseudonym: Aurich
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Privacy and Legislation
Date: 01/12/09
Time: 01:49:32 PM

Comments

Discusses the privacy laws that govern fair use of the internet and possible security vulnerabilities that might compromise that privacy.


Pseudonym: j-tweet
Website: http://www.informit.com/articles/article.aspx?p=26868
Title: Internetwork Security Defense
Date: 01/12/09
Time: 08:54:56 PM

Comments

Summary of the network security that controls the confidentiality, integrity, and availability of information. Very long story but very interesting.


Pseudonym: SkoolSux
Website: http://acct.tamu.edu/smith/ethics/ethics.htm
Title: Business and Accounting Ethics
Date: 01/12/09
Time: 11:08:19 PM

Comments

a paper on business ethics


Pseudonym: Maranon2
Website: http://www.frugalmarketing.com/dtb/ethical-profitability.shtml
Title: What is Ethical Profitability?
Date: 01/13/09
Time: 11:14:38 AM

Comments

Thought this article went well with the business ethics section of the lecture.


Pseudonym: Lady3312
Website: http://www.scu.edu/ethics/practicing/focusareas/business/
Title: Business Ethics
Date: 03/29/09
Time: 03:07:36 PM

Comments

This article offers articles and cases on business ethics.


Pseudonym: Tiki
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business Ethics
Date: 04/22/09
Time: 09:48:25 AM

Comments

Provides an overview of general business ethics and principals one should follow in the business world.


Pseudonym: Crackers
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: website with facts on Security and Ethical Challenges
Date: 04/28/09
Time: 12:27:42 AM

Comments

very good material on subject


Pseudonym: doever
Website: http://www.windowsecurity.com/articles/Analysis_of_Buffer_Overflow_Attacks.html
Title: Analysis of Buffer Overflow Attacks
Date: 04/28/09
Time: 10:15:21 AM

Comments

This website talks about Buffer overflow attacks and it attempts to explain the reason for the overflow. It shows some pretty good models to help you better understand what buffer overflow is.


Pseudonym: ninersfan
Website: http://www.free-av.com/
Title: AVIRA antivirus free download
Date: 04/28/09
Time: 01:50:05 PM

Comments

You can download a free copy of Avira's anti-virus software.


Pseudonym: cobalt1130
Website: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Title: The Difference Between a Computer Virus, Worm and Trojan Horse
Date: 04/29/09
Time: 09:15:07 AM

Comments

This article gave me a better understanding of the viruses and harmful applications that can dramatically effect a system. After reading this article i feel that i have a better understanding of what not to download and where not to go to protect my computer.


Pseudonym: cobalt1130
Website: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Title: The Difference Between a Computer Virus, Worm and Trojan Horse
Date: 04/29/09
Time: 09:15:14 AM

Comments

This article gave me a better understanding of the viruses and harmful applications that can dramatically effect a system. After reading this article i feel that i have a better understanding of what not to download and where not to go to protect my computer.


Pseudonym: spiDey
Website: http://en.wikipedia.org/wiki/Stockholder_theory
Title: Stockholder Theory
Date: 04/30/09
Time: 11:50:27 AM

Comments

Well-organized.


Pseudonym: Wolverine
Website: http://www.dmoz.org/Computers/Hacking/
Title: A hacking directory
Date: 04/30/09
Time: 12:01:16 PM

Comments

here you can find a lot of links of hacking information


Pseudonym: giva
Website: http://www.infotap.org/virusworminfo.asp
Title: Virus vs. Worm - What's the Difference?
Date: 05/01/09
Time: 08:25:59 PM

Comments

It just expanded on the information that was already given on the powerpoint.


Pseudonym: moka0108
Website: http://en.wikipedia.org/wiki/Ergonomics
Title: Ergonomics
Date: 05/01/09
Time: 09:11:12 PM

Comments

Another good definition and history behind it.


Pseudonym: jack daniel
Website: http://en.wikipedia.org/wiki/Dumpster_diving
Title: Dumpster diving
Date: 05/04/09
Time: 10:53:51 AM

Comments

The topic in this site contains excellent information about Dumpster diving and many refernces are given to validate its credibility.


Pseudonym: kim
Website: web.njit.edu/~jerry/CIS-677/Other-Notes/Ch11-ethics.ppt
Title: Security & Ethical Challenges
Date: 05/04/09
Time: 11:58:49 AM

Comments

This is in a power point format somewhat like the class power point with similar information. I dont feel that you learn any different than in class.


Pseudonym: gilardino
Website: http://pkirs.utep.edu/cis3345/submission%20forms/References/Chapter%2013.htm
Title: ch13
Date: 05/04/09
Time: 12:24:50 PM

Comments

333333333333333333333333333333333333333333


Pseudonym: miriam3536
Website: http://www.referenceforbusiness.com/encyclopedia/Sel-Str/Stakeholder-Theory.html
Title: Stakeholder Theory
Date: 05/04/09
Time: 01:07:18 PM

Comments

stakeholder theory defined


Pseudonym: iggytoni
Website: http://www.istheory.yorku.ca/stakeholdertheory.htm
Title: Stakeholder Theory
Date: 05/04/09
Time: 01:08:59 PM

Comments

Numerous views of Stakeholder Theory are presented in the literature though a key distinction can be drawn between the tenets of Stakeholder Theory and the conventional input-output model of the firm which see firms as converting investor


Pseudonym: puzzles
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Scribd
Date: 05/04/09
Time: 11:02:55 PM

Comments

This is an informative article/paper which talks about, in depth, security and ethical challenges.


Pseudonym: gilardino
Website: http://pkirs.utep.edu/cis3345/submission%20forms/References/Chapter%2013.htm
Title: ch 13
Date: 05/05/09
Time: 08:43:48 AM

Comments

1333333333133333333333333


Pseudonym: wewi
Website: http://www.fuzzy-logic.com/
Title: Fuzzy Logic for "Just Plain Folks" (Online tutorial, free for your personal use)
Date: 05/05/09
Time: 04:08:11 PM

Comments

This is an explanation of what fuzzy logic is, because I could not answer the question on the quiz, so here is something that could help you understand what this is. It is supposed to be a way of acting depending on the inputs that are normally variable since they are based on human behaviors, or weather or something lilke that, so the outputs will vary, like production, or even brakes or things like that. Very interesting


Pseudonym: wewi
Website: http://www.inc.com/magazine/20080401/in-spanish-its-un-equipo.html
Title: In Spanish, It's Un Equipo
Date: 05/05/09
Time: 04:19:58 PM

Comments

This is a story about an American guy that decided to go global and had some issues with the spanish culture. So I guess it's not only the IT that we should make use of when we want to make teams with people around the world, but also our own interpersonal relationship skills, and education.


Pseudonym: Ari Gold
Website: https://gfw.appspot.com/cybercrimeupdates/2009/01/britains-biggest-cyber-theft-of-45m.html
Title: Is a website where people can blog together and talk about recent events and whats going on in the world.
Date: 05/05/09
Time: 05:31:43 PM

Comments

The website has an article that talks about cyber theft and how one can aviod it.


Pseudonym: djchess_0090
Website: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1089513
Title: Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone - Privacy 1.0.
Date: 05/05/09
Time: 11:08:41 PM

Comments

As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as expressed in Dean Prosser's work Privacy, was created. Dean Prosser continued (or expanded) upon the concepts formulated by Warren and Brandeis, particularly in emphasizing the role of common law in protecting privacy.


Pseudonym: djchess_0090
Website: http://www.skepticfiles.org/new/bigtrash.htm
Title: Law enforcement officers have learned that trash
Date: 05/05/09
Time: 11:14:25 PM

Comments

officers contemplating a trash inspection must be cognizant of fourth amendment requirements to ensure the subsequent admissibility of any evidence obtained. Trash inspections that do not implicate fourth amendment privacy interests can be conducted without either a search warrant or any constitutionally required factual predicate.


Pseudonym: earp8
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 05/05/09
Time: 11:55:08 PM

Comments

This website provides an introduction to how computer viruses work. It also gives information about computer viruses origin, history, and how viruses have evolved over time. It also gives examples of viruses and worms.


Pseudonym: fjgaoh29
Website: http://www.securityfocus.com/infocus/1527
Title: Social Engineering
Date: 05/06/09
Time: 07:07:08 AM

Comments

This website is an excellent website to better understand the issues of social engineering. It starts with a true story then gives the definition and describes the tactics and how it attacks.


Pseudonym: ben
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 05/06/09
Time: 09:58:41 AM

Comments

Talks aboout the threats and defenses needed for the security of business information systems and the impact of social information technology


Pseudonym: winkwinksr.
Website: http://www.mhhe.com/business/mis/obrien/obrien4e/student/olc/chapterindex15.htm
Title: Managing IT: Security and Ethical Challenges
Date: 05/06/09
Time: 04:38:57 PM

Comments

Website answers questions and gives chances at online applications for security and ethical challenges


Pseudonym: totis
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 05/06/09
Time: 07:30:46 PM

Comments

This webpage desribes what is Business Ethics and the characteristics.


Pseudonym: tukis
Website: http://humanresources.about.com/od/businessethics/Business_Ethics.htm
Title: Business Ethics
Date: 05/06/09
Time: 07:31:23 PM

Comments

Human Resources professionals face business ethics choices and their consequences daily.


Pseudonym: Professor Chaos
Website: http://www.wiredsafety.org/safety/index.html
Title: world's largest online safety and help group
Date: 05/07/09
Time: 07:33:18 PM

Comments

This site gives you tips and includes forums on how you can spam, hacking and other online privacy issues.


Pseudonym: wilkai03
Website: http://www.ergonomics.org/
Title: Ergonomics
Date: 05/07/09
Time: 08:05:29 PM

Comments

Tells you different postures, and movements to solve joint problems


Pseudonym: zeta
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: Computer crime
Date: 05/08/09
Time: 05:59:22 PM

Comments

There is a page where you can lear a lot about the computer crime and the concequences


Pseudonym: bribona
Website: http://www.ebuddy.com/
Title: This is a messenger service web page.
Date: 05/13/09
Time: 04:45:36 PM

Comments

What is good about this page is that uses very little memory on the disk and also as it is very simple is hardly rejected from internet service even if its highly controlled.


Pseudonym: Rambo
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 05/22/09
Time: 11:04:48 AM

Comments

This site was very interesting and informative. The site discusses howw viruses work, how they start and goes into detail about the different types of viruses


Pseudonym: Scout
Website: http://academics.vmi.edu/psy_dr/social%20contract%20theory.htm
Title: Social Contract Theory
Date: 05/26/09
Time: 11:30:30 AM

Comments

Gives a brief history on Social Contract Theory. It's very interesting.


Pseudonym: jupitermoon
Website: http://www.scu.edu/ethics/practicing/focusareas/business/
Title: Business Ethics
Date: 05/26/09
Time: 11:45:40 AM

Comments

Articles, cases, and links on corporate governance, organizational ethics, creating an ethical culture, and global business ethics. Center staff and scholars work with executives from major companies to analyze real-world ethical issues in business and to develop innovative tools and programs to address them.


Pseudonym: mickey mouse
Website: http://www.answers.com/topic/stockholder-theory
Title: Stockholder Theory
Date: 05/26/09
Time: 01:01:01 PM

Comments

This site contains the definition and it goes into stating who was the person who came up with the stockholder theory. It is easy to understand and it is not to long.


Pseudonym: fbv
Website: http://www.aic.gov.au/stats/crime/cybercrime.html
Title: Crime and criminal justice statistics
Date: 05/26/09
Time: 02:57:48 PM

Comments

This website has facts, figures, and graphs of Australia's 2005 Cyber crime statistics.


Pseudonym: across_universe
Website: http://computer.howstuffworks.com/encryption.htm
Title: How Encryption Works
Date: 05/26/09
Time: 04:37:55 PM

Comments

Explains in detail what encryption is and how it works.


Pseudonym: milkshake
Website: http://dictionary.bnet.com/definition/stakeholder+theory.html
Title: stockholder theory
Date: 05/26/09
Time: 05:09:03 PM

Comments

This website gives you the definition and extra resources for the stockholder theory.


Pseudonym: Naimad
Website: http://www.sciencedaily.com/releases/2009/05/090511122614.htm
Title: Mathematical Advances Strengthen IT Security
Date: 05/26/09
Time: 06:59:57 PM

Comments

This website, presented by Science Daily, provides an article on security issues in the IT field. It talks about cyber crime and how businesses are dealing with this issue.


Pseudonym: mocosia*545
Website: http://www.usernomics.com/ergonomics.html
Title: Ergonomics
Date: 05/26/09
Time: 07:38:52 PM

Comments

The history about ergonomics and how it came about.


Pseudonym: Agent 007
Website: http://www.wisegeek.com/what-is-computer-hacking.htm
Title: What is Computer Hackiing?
Date: 05/27/09
Time: 10:02:09 AM

Comments

Provides description of what is not ethical and can be classified as computer hacking.


Pseudonym: abe3344
Website: http://www.aptronix.com/fide/whatfuzzy.htm
Title: What is Fuzzy Logic
Date: 05/27/09
Time: 10:05:13 AM

Comments

A very brief, but concise explinationof Fuzzy Logic. It is short but very informative little article. I think it will be informative to the reader.


Pseudonym: Achilles
Website: http://en.wikipedia.org/wiki/Spamming
Title: Spamming
Date: 05/27/09
Time: 10:13:27 AM

Comments

Defines what spam is and what it can do to a computer.


Pseudonym: eXtreme
Website: http://en.wikipedia.org/wiki/Computer_ethics
Title: Computer Ethics
Date: 05/27/09
Time: 10:14:56 AM

Comments

This website gives you a definition of computer ethics and it gives a backgroung of it.


Pseudonym: apachurro
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 05/27/09
Time: 11:37:27 AM

Comments

The website describes what business ethics is and it gives several links about business law


Pseudonym: cowboys
Website: http://www.nature.com/nrg/journal/v6/n12/full/nrg1729.html?message=remove
Title: Protecting crop genetic diversity for food security: political, ethical and technical challenges
Date: 05/27/09
Time: 12:15:20 PM

Comments

The website is about general ethics and what goes on around the world. This is a very good website.


Pseudonym: bigbrown
Website: http://web.whittier.edu/academic/business/duran/588/Security/frame.htm
Title: Security and Ethical of E-Business
Date: 05/27/09
Time: 12:18:22 PM

Comments

A good source of information


Pseudonym: Abi
Website: http://www.bus.umich.edu/Academics/Departments/Cis/
Title: Department of Business Information Technology
Date: 05/27/09
Time: 12:32:39 PM

Comments

This article gives details about the Department of Business Information Technology.Through research and teaching, the Department creates new knowledge and a deeper understanding of the role of technology in business.


Pseudonym: apple
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 05/27/09
Time: 12:32:58 PM

Comments

it explains very well how business ethics is not solly about money and should be about doing the right thing while keeping interest on the companies goal


Pseudonym: Piggy
Website: http://articles.techrepublic.
Title: 10 ethical issues confronting IT managers
Date: 05/27/09
Time: 12:47:01 PM

Comments

Detailed breakdown and explianation of ethical issues managers confront.


Pseudonym: jmpajp
Website: http://courses.georgetown.edu/index.cfm?Action=View&CourseID=THEO-071
Title: Ethical Challenges/Modern Business
Date: 05/27/09
Time: 12:51:48 PM

Comments

This speaks of ethical challenges in modern business.


Pseudonym: fake name
Website: http://www.scu.edu/ethics/practicing/focusareas/business/
Title: Business Ethics
Date: 05/27/09
Time: 12:53:33 PM

Comments

I liked that this website offer free viewable videos that you can watch.


Pseudonym: FunGirl22
Website: http://www.scu.edu/ethics/practicing/focusareas/business/conference/presentations/business-ethics-history.html
Title: A History of Business Ethics
Date: 05/27/09
Time: 01:06:13 PM

Comments

Talks about the history of Business Ethics in detail.


Pseudonym: Baby Baluga
Website: http://www-03.ibm.com/security/wireless/conf/Final_Security.pdf
Title: Wireless e-business can't go on Air Without Security
Date: 05/27/09
Time: 01:08:44 PM

Comments

its a pdf file on security awareness


Pseudonym: Da Bawse 915
Website: http://www.cookiecentral.com/ccstory/cc3.htm
Title: Cookies and Internet Privacy
Date: 05/27/09
Time: 01:10:47 PM

Comments

Discusses Internet privacy and software issues.


Pseudonym: ajimmyjay
Website: http://plato.stanford.edu/entries/ethics-it-phenomenology/
Title: Phenomenological Approaches to Ethics and Information Technology
Date: 05/27/09
Time: 01:13:33 PM

Comments

Information technology is changing many aspects of human endeavor and existence. This is beyond doubt. What are contested are the social and ethical implications of these changes. The source of these contestations is the multiple ways in which one can conceptualize and interpret the information technology/society interrelationship


Pseudonym: ajimmyjay
Website: http://plato.stanford.edu/entries/ethics-it-phenomenology/
Title: Phenomenological Approaches to Ethics and Information Technology
Date: 05/27/09
Time: 01:13:37 PM

Comments

Information technology is changing many aspects of human endeavor and existence. This is beyond doubt. What are contested are the social and ethical implications of these changes. The source of these contestations is the multiple ways in which one can conceptualize and interpret the information technology/society interrelationship


Pseudonym: ajimmyjay
Website: http://plato.stanford.edu/entries/ethics-it-phenomenology/
Title: Phenomenological Approaches to Ethics and Information Technology
Date: 05/27/09
Time: 01:13:41 PM

Comments

Information technology is changing many aspects of human endeavor and existence. This is beyond doubt. What are contested are the social and ethical implications of these changes. The source of these contestations is the multiple ways in which one can conceptualize and interpret the information technology/society interrelationship


Pseudonym: lionheart108
Website: http://www.amjmedsci.com/pt/re/ajms/abstract.00000441-200111000-00001.htm;jsessionid=KdbM2nlFhDlp9qkQX5yPnBSJMMJ4P2xHCHv7hkFFNhLpPXKPSY8q!-1775402713!181195628!8091!-1
Title: Ethical Challenges in Community-Based Research.
Date: 05/27/09
Time: 02:00:16 PM

Comments

Here's an article about what ethical challenges the health community faces.


Pseudonym: Alloy08
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 05/27/09
Time: 02:29:17 PM

Comments

Discribes what a virus is and how it works


Pseudonym: cookiemonster
Website: http://ergonomics.about.com/od/ergonomicbasics/a/ergo101.htm
Title: Ergonomics Basics
Date: 05/27/09
Time: 03:13:32 PM

Comments

Definiton of ergonomics and were the word came from


Pseudonym: Ballet
Website: http://ebbf.org/blog/?tag=ethical-business-practices
Title: ethical business categories
Date: 05/27/09
Time: 03:23:03 PM

Comments

I liked this site because it is not too long, is gives examples and it even has a survey in it.


Pseudonym: hdomin33
Website: http://www.ed.uiuc.edu/wp/crime/hacking.htm
Title: Computer Hacking
Date: 05/27/09
Time: 05:29:03 PM

Comments

This website really goes into detail on how computer hacking works and the infringement on the privacy of others, and the damage that is caused to computer-based property such as files data bases,web pages or software.


Pseudonym: blumstng
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business ethics
Date: 05/27/09
Time: 06:09:19 PM

Comments

Short reading


Pseudonym: davinchi
Website: http://www.answers.com/topic/business-ethics
Title: BUSINESS ETHICS
Date: 05/27/09
Time: 06:10:29 PM

Comments

AS IT PROVIDES A DEFINTION IT ALSO PROVIDE US WITH A VIDEO TO FULLY UNDERSTAND THE CONCEPT


Pseudonym: Dolphin
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is business ethics?
Date: 05/27/09
Time: 07:20:55 PM

Comments

Defines what business ethics are


Pseudonym: DIESEL
Website: http://antivirus.about.com/od/whatisavirus/a/keylogger.htm
Title: What is a Keylogger Trojan?
Date: 05/27/09
Time: 07:23:45 PM

Comments

keyloggers record your keystrokes and send them to a file so you know everything that someone is typing...my ex put one of these on my computer - it was super annoying! :)


Pseudonym: Calanthe
Website: http://missecurity.wetpaint.com/
Title: Security and Ethical Challenges Home
Date: 05/27/09
Time: 07:52:01 PM

Comments

Has real world cases to read that are interesting to read.


Pseudonym: Lydia Deetz
Website: http://www.osha.gov/SLTC/ergonomics/index.html
Title: Safety and Health Topics Ergonomics
Date: 05/27/09
Time: 07:58:40 PM

Comments

On osha's website is shows that this government agency enforces ergonomics in the workplace.


Pseudonym: Midori
Website: http://www.webopedia.com/TERM/T/Trojan_horse.html
Title: Trojan horse
Date: 05/27/09
Time: 08:26:19 PM

Comments

It provides a very good definition, and explains what it does to the computer in very easy terms.


Pseudonym: >:]
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Common Hacking Tactics
Date: 05/27/09
Time: 08:31:56 PM

Comments

It provides a good description of each common hacking tactics.


Pseudonym: THEMILKMAN
Website: http://www.scu.edu/ethics/practicing/focusareas/business/ethics-human-resources.html
Title: Ethical Challenges in HR
Date: 05/27/09
Time: 09:22:01 PM

Comments

Even though the focus is on HR the article is very intersting in noting ethical challenges


Pseudonym: beamer740
Website: http://www.jmir.org/2001/2/e23/
Title: ethical Challenges of Medicine
Date: 05/27/09
Time: 10:22:37 PM

Comments

Knowledge and capabilities, particularly of a new technology or in a new area of study, frequently develop faster than the guidelines and principles needed for practitioners to practice ethically in the new arena


Pseudonym: al capone
Website: http://en.wikipedia.org/wiki/Internet_security
Title: Internet security
Date: 05/27/09
Time: 10:40:20 PM

Comments

Website describes what are anti-virus and anti-spyware software, as well as email security.


Pseudonym: Winston
Website: http://en.wikipedia.org/wiki/Fault-tolerant_system
Title: Fault-tolerant system
Date: 05/27/09
Time: 10:47:33 PM

Comments

A decent site that discusses fault tolerance and the requrements needed


Pseudonym: Rain
Website: http://www.kodiakschools.org/tec/Images/hsmsaup.pdf
Title: Standards for Ethical Use of Technology
Date: 05/27/09
Time: 10:54:34 PM

Comments

This website provides an example of standards for the ethical use of technology along with the rules for a district.


Pseudonym: Zaphernite
Website: http://www.messageone.com/email-security/challenges
Title: Email Security Challenges
Date: 05/27/09
Time: 10:58:09 PM

Comments

Gives an overview of security of emailing,and spam. Very Easy to read.


Pseudonym: cjg3
Website: http://www.ergonomics.org/
Title: Ergonomics
Date: 05/27/09
Time: 11:04:36 PM

Comments

A website that provides an extensive information about Ergonomics. easy to read.


Pseudonym: C&E
Website: https://fhict.fontys.nl/es/MScModules/Isom/Shared%20Documents/Literature/Primary%20texts/Management%20Information%20Systems%20-%20Laudon.pdf
Title: Management Information Systems
Date: 05/28/09
Time: 12:13:03 AM

Comments

scholarly articles for enterprise and blobal management of information technology


Pseudonym: C&E
Website: http://portal.acm.org/citation.cfm?id=503347
Title: Privacity and security: an ethical analysis
Date: 05/28/09
Time: 12:17:12 AM

Comments

scholarly articles for security and ethical challenges


Pseudonym: Svetunj_21
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: What is Business Ethics?
Date: 05/28/09
Time: 01:57:19 AM

Comments

On this site you can findthe information about what is Business Ethics, (is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment), also types of business ethics.


Pseudonym: DEPA
Website: http://www.securitydocs.com/library/3534
Title: WLAN Security Challenges
Date: 05/28/09
Time: 02:15:27 AM

Comments

Talks about the problems that security may have, and its challenges and some ways to attack them and prevent them,


Pseudonym: Amadrid
Website: www.businessethicsreport.com
Title: The Internet's Best Info About Business Ethics ... In the business environment, there are number of different ethical and moral dilemmas that may arise.
Date: 05/28/09
Time: 10:42:05 AM

Comments

An extended view of ethics in the business world through articles and testimonials from business executives around the world.


Pseudonym: ALadyD
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 05/28/09
Time: 10:58:02 AM

Comments

Security and Ethical Challenges lecture by Prof. Anatoly Sachenko.


Pseudonym: twin
Website: http://whitepapers.zdnet.co.uk/0,1000000651,260125851p,00.htm
Title: Ethical Hacking from ibm
Date: 05/28/09
Time: 11:11:00 AM

Comments

The explosive growth of the Internet has brought many good things: electronic commerce, easier to do global business and a lot more benefits for the human being, As with most technological advances, there is also a dark side: criminal hackers. we need to be on the watch for this type of online criminals.


Pseudonym: absae
Website: http://www.lums.lancs.ac.uk/ugmodules/MNGT314/
Title: Ethical Responsibility in Business
Date: 05/28/09
Time: 11:13:09 AM

Comments

The Lancaster University Management School website details information about their ethical responsibility. They give an overview, learning outcomes, teaching and learning strategy, module outlines and assessments.


Pseudonym: Adria_Gaucin
Website: http://www.securitydocs.com/library/3534
Title: WLAN Security Challenges
Date: 05/28/09
Time: 12:19:12 PM

Comments

TAKE A LOOK!!! This website is interesting becasue it provides an axtended summary about WLANS. It's good reading material for updating your knowlege.


Pseudonym: Itsgdmex
Website: http://managementhelp.org/ethics/ethxgde.htm
Title: About Ethics Management
Date: 05/28/09
Time: 12:38:25 PM

Comments

Complete Guide to Ethics Management: An Ethics Toolkit for Managers


Pseudonym: apink915
Website: http://en.wikipedia.org/wiki/Spam_(electronic)
Title: Spamming
Date: 05/28/09
Time: 11:02:59 PM

Comments

In this site Spamming is defined as the abuse of electronic messaging systems which includes most broadcast media, and digital delivery systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media.


Pseudonym: Mr.Anderson
Website: http://www.wisegeek.com/what-is-computer-hacking.htm
Title: What is Computer Hacking?
Date: 06/28/09
Time: 11:45:27 AM

Comments

computer hacking details what computer hacking is,what computer hacking is most common, and who are hackers? This site also provides a space where users can ask question and recieve awnsers. This site provides anti hacking sites and products. On a scale of 1-10 i rate this page a 8.


Pseudonym: ChickenSoup88
Website: http://www.securityfocus.com/infocus/1549
Title: Sniffers: What They Are and How to Protect Yourself
Date: 06/29/09
Time: 11:16:00 AM

Comments

When going through the slides for Chapter 13, I noticed the part in hacking and the different common tactics. I was interested in knowing more about what "Sniffer" is when it comes to protecting yourself. I found this website that does just that. It informs you on what "Sniffer" is and how it works. It also gives you an example on the site about what the data looks like and what to look for. It is an interesting site and one you should look at.


Pseudonym: boywonder
Website: http://en.wikipedia.org/wiki/Fuzzy_logic
Title: Fuzzy Logic
Date: 06/29/09
Time: 11:16:09 AM

Comments

The following website is a complete overview of the term "fuzzy logic" and how it affects its use in technology involving computers.


Pseudonym: Toby
Website: www.leasttern.com/Tech/ethics.safety.html
Title: Internet Law, Ethics and Safety
Date: 06/29/09
Time: 03:25:26 PM

Comments

This atricle is about safety issues, guidelines and the consequences of computer hacking.


Pseudonym: MJ14
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business ethics
Date: 06/29/09
Time: 09:36:34 PM

Comments

Business ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment. It applies to all aspects of business conduct and is relevant to the conduct of individuals and business organizations as a whole. Applied ethics is a field of ethics that deals with ethical questions in many fields such as medical, technical, legal and business ethics.


Pseudonym: D Mo
Website: http://www.istheory.yorku.ca/stakeholdertheory.htm
Title: Steakholder Theory
Date: 06/30/09
Time: 10:22:59 AM

Comments

This web-site is solely dedicated to steakholder theory and is a pretty easy chart form explanation of it.


Pseudonym: State Of Mind
Website: http://en.wikipedia.org/wiki/Stockholder_theory
Title: Stockholder theory
Date: 06/30/09
Time: 10:54:32 AM

Comments

The idea of the stockholder theory, some argue, is inconsistent with the idea of corporate social responsibility at the cost of the stakeholder. For example, a company donating services or goods to help those hurt in a natural disaster, in some ways, may be considered not taking action in the best interest of the shareholder.


Pseudonym: azuherib7
Website: http://www.securityfocus.com/infocus/1533
Title: Social Engineering Fundamentals, Part II: Combat Strategies
Date: 06/30/09
Time: 11:19:02 AM

Comments

This website explains briefly the goals of social engineering (hacking in general) that is to gain unauthorized access to systems or information in order to commit fraud, identity theft, etc.This website also gives some strategies to the companies so they can prevent social engineering. It explains some of the advantages of policies such as removing the responsibility of employees to make judgement calls regarding a hacker's requests. Policies help the employees make decisions, if the information requested is prohibited by the policy, the employee needs to deny the request.


Pseudonym: mcdeluca
Website: http://en.wikipedia.org/wiki/Denial-of-service_attack
Title: Denial of service
Date: 06/30/09
Time: 01:08:14 PM

Comments

enial of service is an attempt to make a computer resource unavailable to its intended users.


Pseudonym: nene
Website: http://en.wikipedia.org/wiki/Stockholder_theory
Title: stockholders theory
Date: 06/30/09
Time: 01:28:15 PM

Comments

it was a helpful site to understand this chapter


Pseudonym: pas09
Website: http://www.web-miner.com/busethics.htm
Title: Accrediting Board Endorses Stronger Focus on Ethics in Business-School Curriculums
Date: 06/30/09
Time: 04:00:02 PM

Comments

The Association to Advance Collegiate Schools of Business, the accrediting agency of business schools in the U.S., does not think so and has proposed changes to make the teaching of business ethics a top priority.


Pseudonym: mixologista
Website: http://www.managementhelp.org/ethics/ethics.htm
Title: Business Ethics: Managing Ethics in the Workplace and Social Responsibility
Date: 06/30/09
Time: 11:38:53 PM

Comments

This website provides many other different links concerning the issues of business ethics. The articles found are great.Topics such as, Various Perspectives Regarding Managing Ethics in the Workplace and social responsibility can be found here.


Pseudonym: aands
Website: http://infotech.indiatimes.com/articleshow/1090105.cms
Title: BPOs need cyber crime safeguardes
Date: 07/01/09
Time: 11:46:30 AM

Comments

A news about the problem we have from high-tech we have now days, and how does it effects over the world.


Pseudonym: Chevy
Website: http://en.wikipedia.org/wiki/Business_Ethics
Title: Business Ethics
Date: 07/01/09
Time: 01:28:36 PM

Comments

Found this information to be very informative.


Pseudonym: KYALVAREZ
Website: http://en.wikipedia.org/wiki/Social_engineering_(security)
Title: Social engineering (security)
Date: 07/01/09
Time: 01:29:12 PM

Comments

TALKS ABOUT HOW PEOPLE CAN BE MANIPULATED TO TELL PERSONAL AND IMPORTANT INFORMATION.


Pseudonym: Gely
Website: http://en.wikipedia.org/wiki/Flaming_(Internet)
Title: Flaming
Date: 07/01/09
Time: 03:17:02 PM

Comments

In this website we can find how flaming is used; who use flaming and the definition.


Pseudonym: MsPrettyPink
Website: https://www.dss.mil/GW/ShowBinary/DSS/index.html
Title: Defense Security Service
Date: 07/01/09
Time: 05:00:33 PM

Comments

This websites goes through several details on the services that the government provides for this type of security.


Pseudonym: dims87
Website: http://www.microsoft.com/security/antivirus/whatis.aspx
Title: What is a computer virus
Date: 07/01/09
Time: 06:00:31 PM

Comments

This is a security website by microsoft. It gives helpful information.


Pseudonym: Champignons
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business Ethics
Date: 07/01/09
Time: 07:21:24 PM

Comments

Business ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment.


Pseudonym: kaiosama
Website: http://en.wikipedia.org/wiki/Flaming_(Internet)
Title: Flaming (internet)
Date: 07/01/09
Time: 07:41:41 PM

Comments

this is a brief explanation of what flaming via internet is


Pseudonym: Pvespa
Website: http://www.usernomics.com/ergonomics.html
Title: Ergonomics
Date: 07/01/09
Time: 10:47:23 PM

Comments

This is an interesting site that give us more information about ergonomics. The site explains the history of ergonomics, what it is all about and provides many interesting links on the subject.


Pseudonym: hotwheels17
Website: http://jobfunctions.bnet.com/abstract.aspx?docid=81249
Title: business ethics
Date: 07/01/09
Time: 10:53:50 PM

Comments

Business ethics consists of a set of moral principles and values that govern the behavior of the organization with respect to what is right and what is wrong.


Pseudonym: piojobersuitero
Website: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=53391
Title: Putting the Ethics in E-Business
Date: 07/01/09
Time: 10:57:31 PM

Comments

This article by Tobias Zacharis talks about how companies are implementing ethical perspectives in their current business activities to satisfy the changes in the markets. Also it provides some examples of how this companies are implemeting these techniques.


Pseudonym: cjordan
Website: http://dictionary.bnet.com/definition/Business+Ethics.html
Title: Business Ethics
Date: 07/02/09
Time: 01:53:08 AM

Comments

talks about how business ethics is a system of moral principles applied in the commercial world.


Pseudonym: jmiguelv
Website: http://www.scribd.com/doc/396845/Developing-BusinessIT-Strategies
Title: developing business and IT strategies
Date: 07/02/09
Time: 02:28:20 AM

Comments

implementation of these new strategies in business IT world


Pseudonym: muzikgerl
Website: http://catb.org/esr/faqs/hacker-howto.html
Title: How To Become A Hacker
Date: 07/02/09
Time: 05:14:16 AM

Comments

Want to become a computer Hacker? Well this is the place for you. Learn the secrets to hacking any site. This is a site that is a great learning tool for how to prevent hacking of your own system.


Pseudonym: Pher
Website: http://en.wikipedia.org/wiki/Spoofing_attack
Title: Spoofing Attack
Date: 07/02/09
Time: 09:17:33 AM

Comments

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.


Pseudonym: nd<3
Website: http://www.happyhacker.org/defend/index.shtml
Title: Self defense against computer crime
Date: 07/02/09
Time: 09:56:24 AM

Comments

This website gives helpful tips on how to recognise computer crime and hacking


Pseudonym: minermaniac
Website: http://www.librariesanddirectories.com/index.php?page=resources&t=2&rid=rm3692
Title: information on computer crime
Date: 07/02/09
Time: 04:39:34 PM

Comments

look up cases


Pseudonym: GlenCoco
Website: http://dictionary.bnet.com/definition/stakeholder+theory.html
Title: Business Definition for: Stakeholder Theory
Date: 01/11/10
Time: 10:32:29 AM

Comments

Great website. Gave a great definition and explanation of what stakeholder theory is. It also gave additional resources on this topic, which was also very hopeful.


Pseudonym: CCLK
Website: http://www.technologystudent.com/designpro/ergo1.htm
Title: Ergonomic Factors
Date: 01/11/10
Time: 11:46:43 AM

Comments

What is Ergonomics? The study of people and their relationship with the environment around them. This website is ok, it also helps you understand how you will use ergonomics.


Pseudonym: redickrocks93
Website: http://www.misq.org/archivist/vol/no10/issue1/vol10no1mason.html
Title: Ethical issues in Information Technology
Date: 01/11/10
Time: 12:28:44 PM

Comments

This site lays out the four main ethical issues of the information age and different approaches to each of them as far as solutions.


Pseudonym: devastate44
Website: http://ergo.contourdesign.com/the-ergonomic-difference/what-is-ergonomics/
Title: Ergonomics
Date: 01/11/10
Time: 01:11:40 PM

Comments

How ergonomics can effect people who work on the computer.


Pseudonym: Pamachgri
Website: http://www.slideshare.net/engineerrd/security-and-ethical-challenges
Title: Security and Ethical Challenges
Date: 01/11/10
Time: 01:59:02 PM

Comments

I like the article because they explain it with sound and was very interesting


Pseudonym: Cosne
Website: http://management.about.com/od/businessethics/Business_Ethics.htm
Title: .Business Ethics
Date: 01/11/10
Time: 04:43:37 PM

Comments

Managers are occasionally faced with ethical dilemmas. These references can help us and our people understand the consequences of choices in business.


Pseudonym: Boomer
Website: http://edition.cnn.com/2000/TECH/computing/06/28/penetration.testing.idg/index.html
Title: How hackers do it
Date: 01/11/10
Time: 07:51:15 PM

Comments

Offers an interesting 'flip-side' to hackers and what they are and do.


Pseudonym: Eyore
Website: http://www.cwu.edu/~terilee/aup.html
Title: Acceptable and Ethical Use of University Information Technology Resources Policy
Date: 01/11/10
Time: 08:23:00 PM

Comments

the site gives a guidline of the ethical responsibilities of using IT


Pseudonym: Eeyore
Website: http://www.cwu.edu/~terilee/aup.html
Title: Acceptable and Ethical Use of University Information Technology Resources Policy
Date: 01/11/10
Time: 08:38:44 PM

Comments

the site gives a guidline of the ethical responsibilities of using IT


Pseudonym: 7773
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 01/12/10
Time: 10:01:34 AM

Comments

Good definition on business ethics. Provides a discussion blog for its users.


Pseudonym: Monk
Website: http://www.chiroweb.com/mpacms/dc/article.php?id=18078
Title: A Brief History of Computer Hacking
Date: 01/12/10
Time: 10:04:50 AM

Comments

Provides a quick guide on how hacking has evolved since the dawn of computers. From basic hacking of analog telephone signals to the latest hacking attacks in 2001 by Chinese hackers trying to infiltrate government websites.


Pseudonym: hilda1984
Website: www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: SECURITY AND ETHICAL CHALLENGES.
Date: 01/12/10
Time: 10:19:04 AM

Comments

Every business has the need to secure and provide the required information to their employees to comply and keep confidential information secure.


Pseudonym: Lilithwasfirst
Website: http://justiceharvard.org/
Title: A popular ethics class at Harvard opens to the world.
Date: 01/12/10
Time: 11:12:35 AM

Comments

Discuss, read articles and viewpoints, and watch ethical debates.


Pseudonym: Two4sun
Website: http://www.kaspersky.com/
Title: Home Computer Security - Antivirus
Date: 01/12/10
Time: 11:12:44 AM

Comments

This site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future.


Pseudonym: Two4sun
Website: http://www.kaspersky.com/
Title: Home Computer Security - Antivirus
Date: 01/12/10
Time: 11:12:50 AM

Comments

This site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future.


Pseudonym: Two4sun
Website: http://www.kaspersky.com/
Title: Home Computer Security - Antivirus
Date: 01/12/10
Time: 11:13:00 AM

Comments

This site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future.


Pseudonym: Two4sun
Website: http://www.kaspersky.com/
Title: Home Computer Security - Antivirus
Date: 01/12/10
Time: 11:13:05 AM

Comments

This site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future.


Pseudonym: Two4sun
Website: http://www.kaspersky.com/
Title: Home Computer Security - Antivirus
Date: 01/12/10
Time: 11:13:10 AM

Comments

This site assists in home defense against viruses on the computer. They have a lab that helps guide you in safe guarding your computer and a list on ways to protect it in the future.


Pseudonym: maxcat
Website: http://searchsecurity.techtarget.com/
Title: I seached I.T. Security and found this site that features security news,topics and whats new, secutity events,advice, mulitmedia and news.
Date: 01/12/10
Time: 11:13:24 AM

Comments

I found the website to be pretty knowledgeable about anything related to security issue in todays market place.


Pseudonym: tigris1004
Website: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Title: The Difference Between a Computer Virus, Worm and Trojan Horse
Date: 01/12/10
Time: 11:17:46 AM

Comments

Informative website that explains in detail the different types to programs that can damage your computer.


Pseudonym: yoski2
Website: http://business-ethics.com/
Title: Business Ethics
Date: 01/12/10
Time: 11:23:45 AM

Comments

Business Ethics


Pseudonym: Stx13b13
Website: http://support.microsoft.com/kb/129972
Title: Computer viruses: description, prevention, and recovery
Date: 01/12/10
Time: 11:27:54 AM

Comments

Very good website gives a detailed explanation of what a computer virus is. It gives you information on how they symptoms of a virus and info on the recovery.


Pseudonym: SJ313
Website: http://www.microsoft.com/security/worms/whatis.aspx
Title: Worms
Date: 01/12/10
Time: 11:32:46 AM

Comments

This website helped make the definition of a worm alot more clear. Glad I do all my window updates to prevent them.


Pseudonym: tokioprincess
Website: http://www.firewallguide.com/
Title: Home PC Firewall Guide
Date: 01/12/10
Time: 11:53:50 AM

Comments

Gives information on firewalls and the different types of firewalls. It explains how it can protect your computer for the type of protection that you want.


Pseudonym: murfman
Website: http://www.ussecurityawareness.org/highres/infosec-auditing.html
Title: I searched Auditing IT Securtiy and found this government website with topics on: secure your computer,personal security, disaster preparedness,homeland security, and Advanced topics such as Risk Management
Date: 01/12/10
Time: 12:08:11 PM

Comments

I would use this site again because it contains alot of information on basic and advanced security information.


Pseudonym: First_Flight
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 01/12/10
Time: 12:27:42 PM

Comments

The website provides very useful information relating to computer viruses. The webpage even includes advertisements of various antivirus software. The article provides the reader with an overview of what a computer virus is, how they evolved and certain types of viruses such as: worms, trojan horses, etc. There is even a computer gallery for anyone interested.


Pseudonym: Redhot02
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is business ethics?
Date: 01/12/10
Time: 12:43:19 PM

Comments

The intentions of this website is actually try to teach us how to implement ethics into the business side, and to obey the rules of the business ethics. It is also providing information on how to approach the different situations on the workplace.


Pseudonym: lesmom
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Information Technology Security and Ethical Challenges
Date: 01/12/10
Time: 12:57:09 PM

Comments

Good powerpoint on security and ethical challenges.


Pseudonym: llpr2101
Website: http://www.selfseo.com/story-17946.php
Title: Computer Security Ethics and Privacy
Date: 01/12/10
Time: 01:44:55 PM

Comments

This article talks about the importance a computer security risk of any action that could cause lost of information.


Pseudonym: philla_31
Website: http://www.cybercrime.gov/
Title: Computer Crime & Intellectual Property Section
Date: 01/12/10
Time: 02:22:20 PM

Comments

A website from the department of justice dedicated to posting articles and information on cybercrime.


Pseudonym: recardenas2
Website: http://www.microsoft.com/mscorp/safety/technologies/antiphishing/at_glance.mspx
Title: Microsoft Phishing Filter at a Glance
Date: 01/12/10
Time: 02:47:43 PM

Comments

Article based on one of the fastest growing threats on the Internet and a form of identity theft known as phising, pronounced fishing.


Pseudonym: FFSH
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Common Hacking Tactics
Date: 01/12/10
Time: 03:49:31 PM

Comments

The site is a easy to understand because it is a list of thirteen different methods of hacking tactics. Each tactic is explain and there is an example given for each tactic.


Pseudonym: ipraya
Website: seclists.org/basics/2002/Nov/471
Title: Security Basics: Reasons for using an external firewall
Date: 01/12/10
Time: 04:32:02 PM

Comments

how much extra protection can an external firewall give?


Pseudonym: icefox_1
Website: http://www.osix.net/modules/article/?id=179
Title: War dialing
Date: 01/12/10
Time: 04:37:51 PM

Comments

Website gives a basic understanding of War dialing


Pseudonym: icefox_1
Website: http://www.osix.net/modules/article/?id=179
Title: War dialing
Date: 01/12/10
Time: 04:44:06 PM

Comments

Gives basic idea of war dialing


Pseudonym: @irvriv
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: Ethical Challenges to the Information Profession
Date: 01/12/10
Time: 04:45:42 PM

Comments

This article talks about the ethical and security issues in information technology and it goes in much greater detail in subjects such as privacy and ethics.


Pseudonym: @irvriv
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: Ethical Challenges to the Information Profession
Date: 01/12/10
Time: 04:45:45 PM

Comments

This article talks about the ethical and security issues in information technology and it goes in much greater detail in subjects such as privacy and ethics.


Pseudonym: @irvriv
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: Ethical Challenges to the Information Profession
Date: 01/12/10
Time: 04:45:47 PM

Comments

This article talks about the ethical and security issues in information technology and it goes in much greater detail in subjects such as privacy and ethics.


Pseudonym: Tiburon
Website: http://www.businessweek.com/managing/content/may2009/ca20090519_540128.htm
Title: Business Ethics
Date: 01/12/10
Time: 05:08:16 PM

Comments

is a Article about ethics on business


Pseudonym: pfc freda
Website: http://humanresources.about.com/od/businessethics/a/integrity.htm
Title: All You Have Is Your Integrity: Why Leave Your Integrity to Chance?
Date: 01/12/10
Time: 05:16:52 PM

Comments

In this article we see some examples from right or wrong in business.


Pseudonym: aaharley
Website: http://managementhelp.org/ethics/ethxgde.htm
Title: Complete Guide to Ethics Management: an Ethics Toolkit for Managers
Date: 01/12/10
Time: 06:12:33 PM

Comments

The site has quite of few examples and tutorials on Ethics for managers


Pseudonym: Love_girl
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Common Hacking Tactics
Date: 01/12/10
Time: 06:52:25 PM

Comments

Lists the Common Hacking Tactics and their definitions.


Pseudonym: wisconsin88
Website: http://www.pcworld.com/article/116586/internet_tips_think_before_you_click_to_avoid_viruses_and_scams.html
Title: How to Avoid Virus'
Date: 01/12/10
Time: 07:28:35 PM

Comments

this is just a good informational site on how to avoid getting virus' since there are so many out there today.


Pseudonym: Mr.IneedanA
Website: http://www.crt.state.la.us/TOURISM/RESEARCH/LaTour/emind.pdf
Title: Business and Information Technology
Date: 01/12/10
Time: 08:14:30 PM

Comments

This web page provides an example of how business and information technology is being used in Louisiana's Department of Tourism.


Pseudonym: ABCDEFG21
Website: http://en.wikipedia.org/wiki/Buffer_overflow
Title: Buffer Overflow-Wikipedia
Date: 01/12/10
Time: 09:04:34 PM

Comments

It contains information on what buffer overflow is


Pseudonym: setnomleb
Website: http://www.topbits.com/trojan-horse-virus.html
Title: Trojan Horse Virus
Date: 01/12/10
Time: 09:10:13 PM

Comments

This website explains what a trojan horse virus is and how they enter a computer system.


Pseudonym: dcowboys0065
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Defintion
Date: 01/12/10
Time: 09:13:16 PM

Comments

Gives a good definition and example of business ethics


Pseudonym: Shogun
Website: http://www.beardbooks.com/beardbooks/the_limits_of_corporate_power.html
Title: The Limits of Corporate Power
Date: 01/12/10
Time: 09:23:20 PM

Comments

There are forces that serve to constrain the discretionary acts of business corporations. There are many ways in which these can be effectively handled.


Pseudonym: charms21
Website: http://www.microsoft.com/piracy/
Title: Protect Yourself from Piracy
Date: 01/12/10
Time: 09:44:27 PM

Comments

I liked how the website is set up in easy to read sections and was also very informative.


Pseudonym: mxm
Website: http://en.wikipedia.org/wiki/Information_Security
Title: Information Systems Security
Date: 01/12/10
Time: 10:15:46 PM

Comments

Overview of security systems that are applied to I.T. History and evolultion of security software is discussed.


Pseudonym: Austina
Website: http://www.computerworld.com/s/article/9001021/The_Top_5_Ways_to_Prevent_IP_Spoofing
Title: Top five ways to Prevent Spoofing
Date: 01/12/10
Time: 10:57:12 PM

Comments

Very interesting article. It explains the different types of spoofing attacks (blind spoofing, non-blind spoofing...). It also tell you how you could prevent spoofing.


Pseudonym: sunset38
Website: http://ndpr.nd.edu/review.cfm?id=1342
Title: Ethics of Information Technology and Business
Date: 01/12/10
Time: 10:58:54 PM

Comments

An article giving a summary of book in Ethics of Information Technology.


Pseudonym: expectations
Website: http://www.osix.net/modules/article/?id=632
Title: Common hacking techniques to be aware of
Date: 01/12/10
Time: 11:43:05 PM

Comments

I really liked this article because people a lot of times is not aware of the risk about using information in the computer, so the article talks about different scenarios to learn how to be almost safe with personal information.


Pseudonym: Timany
Website: http://www.spineuniverse.com/displayarticle.php/article1425.html
Title: Ergonomics: The Human Body and Injury Prevention
Date: 01/12/10
Time: 11:54:37 PM

Comments

This website is very informative, it describes what ergonomics is, and how to prevent injury.


Pseudonym: marieM
Website: http://www.securityfocus.com/infocus/1527
Title: Security Focus Social Engineering Fundamentals
Date: 01/13/10
Time: 12:13:41 AM

Comments

This website describes social engineering and hacker tactics.


Pseudonym: pjwero
Website: http://www.wisegeek.com/what-is-computer-hacking.htm
Title: What is computer hacking?
Date: 01/13/10
Time: 12:21:41 AM

Comments

Gives a big explanation about what a hacker is, and why does it does it. is a good informative webpage and it also explains how companies use their security softwares to prevent hacker from entering to their files.


Pseudonym: rayadita
Website: http://www.scribd.com/doc/16119371/CH13-Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 01/13/10
Time: 12:37:48 AM

Comments

ppt slides on ethical and security challenges in business


Pseudonym: rosebud
Website: http://ezinearticles.com/?Cyberethics-%28Information-System-Ethics%29&id=201522
Title: Defining Information System Ethics
Date: 01/13/10
Time: 12:38:03 AM

Comments

This web-site postulates that in order to address Cyberethics, one must define what ethics are, and their application to technology.


Pseudonym: violet
Website: http://www.iep.utm.edu/soc-cont/
Title: Social Contract Theory
Date: 01/13/10
Time: 01:51:41 AM

Comments

Social Contract Theory, nearly as old as philosophy itself, is the view that persons’ moral and/or political obligations are dependent upon a contract or agreement between them to form society


Pseudonym: Luscious
Website: http://en.wikipedia.org/wiki/Password_cracking
Title: Password Cracking
Date: 01/13/10
Time: 08:38:23 AM

Comments

This page tells you and gives you the concept of password cracking. There are so many types of password cracking and I was really impressed about that, and I think the webpage is very useful.


Pseudonym: ccopperpot3
Website: http://encyclopedia2.thefreedictionary.com/Ethical+business
Title: business ethics
Date: 01/13/10
Time: 08:44:03 AM

Comments

source may not be very reliable but website provides a definition of business ethics...quite short does not go in to much detail


Pseudonym: Good Luck 1
Website: http://www.windowsecurity.com/articles/Email-Spoofing.html
Title: Understanding E-mail Spoofing
Date: 01/13/10
Time: 09:04:45 AM

Comments

This article explains how the "bad guys" spoof return email addresses attempting to obtain personal info.


Pseudonym: noclasstoday
Website: http://www.channelnewsasia.com/stories/technologyfeatures/view/1030139/1/.html
Title: Is that the real or fake you online?
Date: 01/13/10
Time: 09:46:49 AM

Comments

this site brings up the questions of internet security, and your use


Pseudonym: acs_moon
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: book
Date: 01/13/10
Time: 10:52:27 AM

Comments

describes what legilative stapes are being taken


Pseudonym: @aorozco4
Website: http://plato.stanford.edu/entries/ethics-computer/
Title: Computer and Information Ethics
Date: 01/13/10
Time: 11:21:58 AM

Comments

This site talks of how information revolution has altered lifestyles.


Pseudonym: HGS
Website: http://www.article13.com/A13_OurPress.asp?strAction=GetPublication&PNID=397
Title: Corperate Social Responsibilities
Date: 01/13/10
Time: 11:42:46 AM

Comments

This is a 10 minute tutorial on corperate social responsibilities. Who knew you could learn so much in 10 minutes.


Pseudonym: MissBurberry
Website: http://www.enterweb.org/ethics.htm
Title: Ethical Resposibility
Date: 01/13/10
Time: 11:50:54 AM

Comments

This Website provides good business ethics


Pseudonym: 1224
Website: http://www.bkconnection.com/static/stakeholdertheoryPR.pdf
Title: Bonette-Koehlen
Date: 01/14/10
Time: 12:06:15 AM

Comments

This is a really good website because it really goes in detail on what stakeholder theory is.


Pseudonym: butzloffrost
Website: http://www.webopedia.com/didyouknow/internet/2004/virus.asp
Title: The Difference Between a Computer Virus, Worm and Trojan Horse
Date: 05/21/10
Time: 11:53:53 AM

Comments

A very helpful website establishing the differences between a virus, Trojan Horse, and worms. After reading this website I understood what the details of each of these malicious threats.


Pseudonym: peter
Website: http://www.business-marketing.com/store/article-businessethics.html
Title: Business ethics
Date: 05/21/10
Time: 03:41:08 PM

Comments

An article on business ethics and explains what it is and examples to think about


Pseudonym: yamel
Website: http://www.rbs2.com/ccrime.htm
Title: computer crime
Date: 05/22/10
Time: 02:24:36 PM

Comments

provides examples of computer crime


Pseudonym: fernandoduarte
Website: http://www.slideshare.net/engineerrd/security-and-ethical-challenges
Title: Security And Ethical Challenges
Date: 05/22/10
Time: 05:50:14 PM

Comments

-Computer crimes that exist in the present society are:- -Hacking -Cyber Theft -Unauthorized use at work -Software Piracy -Piracy of intellectual property -Computer viruses and worms


Pseudonym: Ida
Website: http://management.about.com/od/businessethics/Business_Ethics.htm
Title: Business ethics
Date: 05/24/10
Time: 12:07:42 PM

Comments

This website includes some of ethics dilemmas that a manger can faced and you can learn what will be the best choice to take in business. It is really interesting.


Pseudonym: fjteran
Website: http://www.iep.utm.edu/soc-cont/
Title: Social Contract Theory
Date: 05/24/10
Time: 10:45:03 PM

Comments

the site is an enyclopedia it has a broad number of topics and it is very easy to find information you really need in this site


Pseudonym: ai1102
Website: https://www.issa.org/
Title: Information Systems Security Association (ISSA)
Date: 05/24/10
Time: 11:11:05 PM

Comments

This is the main webpage of the ISSA and it contains many good articles and information.


Pseudonym: celecampos
Website: http://web.whittier.edu/academic/business/duran/588/Security/frame.htm
Title: Security and Ethical Challenges
Date: 05/25/10
Time: 10:00:17 AM

Comments

The above information was presented in a power point which is a good way to explain the topic.


Pseudonym: binnie333
Website: http://www.informationweek.com/825/ethics.htm;jsessionid=X3L2AJNWPZHZDQE1GHPCKHWATMY32JVN
Title: A question of ethics
Date: 05/25/10
Time: 11:11:07 AM

Comments

Talks about how ethics plays a large role in businesses and online privacy issues, etc.


Pseudonym: jess_rocha24
Website: http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1099349,00.html
Title: Hacker attack techniques and tactics: Understanding hacking strategies
Date: 05/25/10
Time: 11:49:42 AM

Comments

This website advices business to prevent hacker attacks in their organizations. It explains the hackers attack techniques and the way to avoid them.


Pseudonym: thedude89
Website: http://www.us-cert.gov/cas/tips/ST04-015.html
Title: Understanding Denial of Service Attacks
Date: 05/25/10
Time: 11:51:04 AM

Comments

Here is some good information about what denial of service attacks are.


Pseudonym: jatm
Website: http://business-ethics.com/
Title: Business ethics
Date: 05/25/10
Time: 11:55:27 AM

Comments

The Magazine of Corporate Responsibility


Pseudonym: ra7opez
Website: http://www.entrepreneur.com/tradejournals/article/184710901.html
Title: Exploring Internet abuse in the workplace: how can we maximize deterrence efforts?
Date: 05/25/10
Time: 03:42:56 PM

Comments

this is a well written extensive article regarding the abuse of exploring the internet while at work and discusses what is acceptable among other things


Pseudonym: thebluecar
Website: http://www.ethics.org/
Title: Ethics Resource Center
Date: 05/25/10
Time: 10:59:19 PM

Comments

This is a webiste for a center which focuses on teaching Ethics to other. Excellent resource center for those looking to see what new laws require in reference to ethics


Pseudonym: ancy
Website: http://web.whittier.edu/academic/business/duran/588/Security/frame.htm
Title: Security and Ethical Challenges
Date: 05/25/10
Time: 11:57:27 PM

Comments

Very nice information o this site !!


Pseudonym: oleyva4
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 05/26/10
Time: 10:33:33 AM

Comments

Good outline on the subject.


Pseudonym: chuyo
Website: http://en.wikipedia.org/wiki/Counter-insurgency
Title: Counter-insurgency
Date: 05/26/10
Time: 10:37:18 AM

Comments

on this page wikipedia has a section that talks about what I was interested. A lot of information about the same topic as in class


Pseudonym: tany89
Website: http://www.businessweek.com/managing/content/apr2010/ca20100420_479716.htm
Title: Business Ethics
Date: 05/26/10
Time: 10:39:00 AM

Comments

This article talks about how a company sees too easy to cover up an error instead of correcting it


Pseudonym: Woody
Website: http://faculty.deanza.edu/burkelarry/stories/storyReader$169
Title: Ethical Responsibility
Date: 05/26/10
Time: 10:52:42 AM

Comments

This website is from De Anza College and it gives Aristotles Principle of Responsibility.


Pseudonym: utrebor
Website: http://www.cmswire.com/cms/web-cms/how-they-hack-your-website-overview-of-common-techniques-002339.php
Title: How They Hack Your Website: Overview of Common Techniques
Date: 05/26/10
Time: 03:12:08 PM

Comments

Article briefly describes of some tools hackers are currently using to hack into websites, such as backdoor and sql injection.


Pseudonym: es ar tee pt
Website: http://www.privacyrights.org/fs/fs7-work.htm
Title: Privacy
Date: 05/26/10
Time: 06:40:36 PM

Comments

Privacy in the workplace


Pseudonym: raulalexjoey
Website: http://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html
Title: Ten Commandments of computer ethics
Date: 05/27/10
Time: 10:19:18 AM

Comments

Doing the "right" thing even when no one is watching; that has been my motto for many years throughout my life's journey. Sounds very simplistic, doesn't it. Well the "Ten Commandments of Computer Ethics" will certainly help in ensuring one is conscientious as one is thrown into the world of technology.


Pseudonym: mmoreno17
Website: http://en.wikipedia.org/wiki/Computer_virus
Title: Viruses
Date: 05/27/10
Time: 12:45:25 PM

Comments

A complete explanation of what viruses are and ways to avoid them.


Pseudonym: mdruiz_airam
Website: www.uteplibrary.edu/ lexusnexus
Title: A data base of UTEP
Date: 05/27/10
Time: 04:18:18 PM

Comments

Is a data base of UTEP


Pseudonym: nikki3742
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: Technology as a Threat to Privacy
Date: 05/27/10
Time: 10:48:58 PM

Comments

This site is a professors outline which goes over the concept, influence and relevance of the issue.


Pseudonym: Blanka
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges to the Information Profession
Date: 11/19/10
Time: 06:56:13 PM

Comments

We are currently living in an information age due to the development and use of technology. This creates the possibility of wider access to information. This bring up many questions about what privacy is and how we can be protected.


Pseudonym: Buttons
Website: http://technet.microsoft.com/en-us/library/dd441361(office.13).aspx
Title: Firewall Requirement for External User Access
Date: 11/20/10
Time: 12:27:22 PM

Comments

This website gives you how to fullfill the firewall requirements while still maintaing external use access.


Pseudonym: holydio58
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges to the Information
Date: 11/22/10
Time: 05:24:25 AM

Comments

The aim of this paper is to assess the impact of technology on the private lives of people


Pseudonym: cosmic
Website: http://www.net-security.org/article.php?id=947
Title: tips on how not to get hacked
Date: 11/23/10
Time: 09:33:33 AM

Comments

hints on how not to get hacked


Pseudonym: bettyb00p
Website: http://www.squidoo.com/CSR-ethicalbiz
Title: Corporate Social Responsibility and Ethical Business
Date: 11/23/10
Time: 12:40:11 PM

Comments

definition of various websites included here


Pseudonym: alix7
Website: http://hubpages.com/hub/what-is-ergonomics
Title: What is Ergonomics?
Date: 11/23/10
Time: 04:55:18 PM

Comments

This important article explains the definition and objectives of ergonomics. In addition to this, the article provides the ideal set-up for a workstation, such as the position of the employee´s hand in relation to the desk and computer


Pseudonym: hello kitty
Website: http://missecurity.wetpaint.com/page/Real+World+Case2
Title: Real World Case 2
Date: 11/23/10
Time: 05:06:14 PM

Comments

this article shows that 4 major retailers/companies had failures in data sercurity management: Lowes Home Improvement; Teledata Communications International (TCI); Bank of America (B of A); Choice Point


Pseudonym: BereM89
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: "Computer Security: Common Hacking Tactics"
Date: 11/24/10
Time: 10:25:33 AM

Comments

This article shows the effects and descriptions for some common hacking tactics.


Pseudonym: erjem89
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges to the Information Profession
Date: 11/24/10
Time: 06:12:04 PM

Comments

This site is paper done by a professor showing how technological changes can be threatening to privacy.


Pseudonym: viggo010
Website: http://www.ibm.com/developerworks/library/s-crack/
Title: Hacking techniques
Date: 11/24/10
Time: 08:39:57 PM

Comments

easy to read and interesitng information


Pseudonym: Ro
Website: http://www.informationweek.com/blog/main/archives/2008/06/startup_launche.html;jsessionid=JF20CTSIXLOIDQE1GHPSKHWATMY32JVN
Title: Startup Launches New Firewall Line
Date: 11/25/10
Time: 01:13:38 PM

Comments

This is an article about the current line of firewalls startup is selling. These firewalls are for midmarket and provide big improvements. One think I noted is the high price for firewalls, about $14,000.00 dlls per these models.


Pseudonym: Mickey Mouse
Website: http://www.us-cert.gov/cas/tips/ST04-015.html
Title: Understanding Denial-of-Service Attacks
Date: 11/25/10
Time: 04:39:25 PM

Comments

Website explains what denial of service attack is. In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. The website also tells us how to avoid being part of the problem and how we know if an attack is happening.


Pseudonym: haaa
Website: http://missecurity.wetpaint.com/
Title: Security and Ethical Challenges Home
Date: 11/25/10
Time: 04:47:57 PM

Comments

It is a good review for security and ethical challenges,it talks about Ethical and Societal Dimensions,Ethical Responsibility in Business and Security Management.


Pseudonym: apeguo
Website: http://plato.stanford.edu/entries/logic-fuzzy/
Title: What is Fuzzy logic?
Date: 11/25/10
Time: 06:46:44 PM

Comments

An article that explains and defines what is fuzzy logic.


Pseudonym: RINCON
Website: http://www.cio.com/article/631814/Denial_of_Service_Attacks_Meet_the_Cloud_4_Lessons
Title: Denial-of-Service Attacks Meet the Cloud: 4 Lessons
Date: 11/26/10
Time: 09:06:03 AM

Comments

This article provides some good information on denial of service attacks and how they are exploiting new weaknesses due to the ever increasing utilization of cloud services.


Pseudonym: Ricardo
Website: http://www.associatedcontent.com/article/1050061/top_5_health_problems_relating_to_computers.html?cat=5
Title: Top 5 Health Problems Relating to Computers
Date: 11/26/10
Time: 09:52:47 AM

Comments

This is a nice informative website where it tells you the top 5 health problems relating to computers.


Pseudonym: Student4
Website: http://www.microsoft.com/security/antivirus/whatis.aspx
Title: Computer viruses
Date: 11/26/10
Time: 12:24:58 PM

Comments

Lots of helpful tips to avoid getting viruses.


Pseudonym: malasinfonia
Website: http://www.saiglobal.com/compliance/knowledge-center/whitepapers/planning-enterprise-wide-ethics-programme.htm?gclid=CKnfgdfNv6UCFcVe7Aod5SRB6Q
Title: effective bussines ethics trainig
Date: 11/26/10
Time: 04:13:27 PM

Comments

interesting


Pseudonym: jcfan
Website: http://www2.safenet-inc.com/google/SRM/dk-antipiracy.asp?CID=GooUS&HBX_PK=computer%20piracy&HBX_OU=50&CMP=KNC-GoogleAdd&wcw=google&_kk=computer%20piracy&_kt=bc025014-4a60-4982-b5eb-37595db32e7a&gclid=CMv9m7rfv6UCFTRa7Aodo
Title: A website for anti-piracy
Date: 11/26/10
Time: 05:32:54 PM

Comments

Interesting


Pseudonym: zhiio.26
Website: http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
Title: What is Biometrics?
Date: 11/26/10
Time: 07:02:51 PM

Comments

Biometrics is referred as life measurement, and this term is related with the use of unique physiological characteristics to identify an individual according to this website. It also says that a biometric system can be either identification or verification.


Pseudonym: Damar
Website: http://www.enterweb.org/ethics.htm
Title: Business ethics
Date: 11/26/10
Time: 08:26:29 PM

Comments

This is a very complete website if you want to learn more about the ethical environment in the business world, and the what is the employee responsibility to be honest and not look for personal gain.


Pseudonym: Betty
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: Antivirus software
Date: 11/26/10
Time: 10:37:16 PM

Comments

The antivirus software is a set of utility programs that can look for and eradicate viruses, trojan horses and worms. Viruses attach all programs that exixst.


Pseudonym: Purple05
Website: http://www.docstoc.com/docs/19767087/Stockholder-Theory-vs-Stakeholder-Theory-A-Genuine-Opposition
Title: Stockholder Theory vs Stakeholder Theory A Genuine Opposition
Date: 11/26/10
Time: 11:13:47 PM

Comments

It is a powerpoint whi explains both theories and the differences between them.


Pseudonym: fox12rider
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: IT Ethical Issues
Date: 11/27/10
Time: 08:52:00 AM

Comments

This website gives a good description on IT ethical issues. It also advertises a book that will give the reader more information.


Pseudonym: poseidon316
Website: http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Spoofing/default.htm
Title: Internet Security Systems (spoofing)
Date: 11/27/10
Time: 02:21:53 PM

Comments

This website provides information about "spoofing". In addition it gives helpful tips on how to protect agaisnt "spoofing".


Pseudonym: AirenRenal
Website: http://www.webopedia.com/TERM/S/software_piracy.html
Title: Software Piracy
Date: 11/27/10
Time: 02:59:55 PM

Comments

What software piracy is in broader words


Pseudonym: Betty Boop
Website: http://recomparison.com/comparisons/100214/virus-vs-trojan-vs-worm/
Title: Virus vs, Trojan vs. Worm
Date: 11/27/10
Time: 04:23:00 PM

Comments

Definitions and differences


Pseudonym: sfbaker
Website: http://managementhelp.org/blogs/business-ethics/
Title: Bussiness Ethics
Date: 11/27/10
Time: 07:32:33 PM

Comments

Great explanation of business ethics and its effects on a business.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Virus
Title: virus
Date: 11/27/10
Time: 08:13:25 PM

Comments

a good example.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: busines ethics
Date: 11/27/10
Time: 08:14:16 PM

Comments

good web page


Pseudonym: pipo
Website: http://en.wikipedia.org/w/index.php?title=Special%3ASearch&search=stake+holder+theory
Title: stacke holder theory
Date: 11/27/10
Time: 08:15:21 PM

Comments

good web page


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: computer crime
Date: 11/27/10
Time: 08:16:03 PM

Comments

good web page.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Hacking
Title: hacking
Date: 11/27/10
Time: 08:16:52 PM

Comments

good web page


Pseudonym: sniffer
Website: http://en.wikipedia.org/wiki/Sniffer
Title: sniffer
Date: 11/27/10
Time: 08:17:39 PM

Comments

good web page.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Sniffer
Title: sniffer
Date: 11/27/10
Time: 08:18:07 PM

Comments

good web page.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Spoofing
Title: spoofing
Date: 11/27/10
Time: 08:18:50 PM

Comments

good web page.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Trojan_horse
Title: trojan horse
Date: 11/27/10
Time: 08:19:37 PM

Comments

good web page


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Back_door
Title: back door
Date: 11/27/10
Time: 08:20:21 PM

Comments

good web page.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Firewall
Title: firewall
Date: 11/27/10
Time: 08:22:10 PM

Comments

good web page.


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/War_dialing
Title: war dialing
Date: 11/27/10
Time: 08:22:52 PM

Comments

good web page


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Logic_bomb
Title: logic bomb
Date: 11/27/10
Time: 08:23:38 PM

Comments

good web page


Pseudonym: pipo
Website: http://en.wikipedia.org/wiki/Password_cracker
Title: password cracker
Date: 11/27/10
Time: 08:24:37 PM

Comments

good web page.


Pseudonym: won
Website: http://www.scu.edu/ethics/practicing/focusareas/business/
Title: Business Ethics
Date: 11/27/10
Time: 08:48:56 PM

Comments

Very good.


Pseudonym: 60cougars
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business ethics
Date: 11/28/10
Time: 10:29:48 AM

Comments

good website talks about the history and issues with business ethics


Pseudonym: Milan
Website: http://www.antivirusware.com/articles/computer-virus.htm
Title: What is a Computer Virus?
Date: 11/29/10
Time: 12:16:26 AM

Comments

I recommend thia site because it explains in great detail what a computer virus is and how to prevent it


Pseudonym: SHOPAHOLIC
Website: http://www.docstoc.com/docs/5734818/Internet-Security-and-Acceleration-(ISA)-Server-2006
Title: INTERNET SECURITY AND ACCELERATION (ISA) SERVER 2006
Date: 11/29/10
Time: 08:50:02 AM

Comments

TALKS ABOUT MICROSOFT'S SECURITY GUIDES FOR INTERNET SECURITY THAT WAS DEVELOPED "TO ENHANCE THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF SENSITIVE DEPARTMENT OF DEFENSE AUTOMATED INFORMATION SYSTEM"


Pseudonym: El Matador
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/29/10
Time: 09:18:10 AM

Comments

1. Identify several ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. 2.Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology. 3. Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology.


Pseudonym: Carina
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/29/10
Time: 03:55:17 PM

Comments

A helpful webpage that includes plenty of information about hacking, viruses, the social contract theory, and the stakeholder theory. The information provided is very easy to read.


Pseudonym: batrueba
Website: http://www.2dix.com/view/view.php?urllink=http://www.albany.edu/~goel/classes/spring2006/workshop/privacy.pdf&searchx=management%20challenge%20-%20Security%20and%20Ethical%20Challenges
Title: Privacy and Legislation
Date: 11/29/10
Time: 04:00:16 PM

Comments

Security and ethical challenges: Ethical responsibility of a business – computer crime ... management – internetworked security defenses


Pseudonym: radioactive
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: wikipedia
Date: 11/29/10
Time: 04:32:35 PM

Comments

it gives broad information about the several types of cyber crimes


Pseudonym: firebrand5
Website: http://finance.yahoo.com/news/Global-Leaders-of-Smart-Grid-prnews-1230795002.html?x=0
Title: Global Leaders of Smart Grid Interoperability Convene at Clasma's Annual Grid-Interop Conference
Date: 11/29/10
Time: 04:58:32 PM

Comments

This article talks about a conference that supports SmartGrid technology. SmartGrid technology employs power grids in combination with digital technology to provide better, more efficient use of energy and resources. This in turn will allow for reduced energy costs to the consumer, consumption of energy to decrease at peak or unnecessary times and create a more green environment, by reducing energy waste. Of the topics included in this years conference, Grid-Interop will be dealing with such issues as cyber security, information assurance, value of customer data and mass market connectivity. Interesting article but requires further research if you don't have previous knowledge of SmartGrid Technology.


Pseudonym: mglh
Website: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Title: The Difference between a Virus, Worm, and Trojan Horse.
Date: 11/29/10
Time: 06:03:49 PM

Comments

This site describes exactly what the title says. It also includes links to other definitions.


Pseudonym: kite22
Website: http://www.sdaitp.org/index.php?option=com_content&view=article&id=54&Itemid=64
Title: These standards expand on the Code of Ethics by providing specific statements of behavior in support of each element of the Code. They are not objectives to be strived for, they are rules that no true professional will violate.
Date: 11/29/10
Time: 06:17:17 PM

Comments

about AITP standard of professional conduct


Pseudonym: K. C. Browndog
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Privacy
Date: 11/29/10
Time: 08:15:13 PM

Comments

great pdf file discussing security and ethical challenges in information technology.


Pseudonym: Shina
Website: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212220,00.html
Title: Hacker
Date: 11/29/10
Time: 11:43:16 PM

Comments

This webpage gives some definitions of a hacker and what they do. It also mention some tools and techniques the hackers use to work.


Pseudonym: egmzlh
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: Computer Crime
Date: 11/30/10
Time: 09:37:54 AM

Comments

This article is about Cyber Crime. Some examples of cyber crime are spam, fraud, harassment, etc. There are many other links for further explanations.


Pseudonym: 1lpcanales
Website: http://www.slideshare.net/engineerrd/security-and-ethical-challenges
Title: Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems.
Date: 11/30/10
Time: 09:50:12 AM

Comments

Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.


Pseudonym: ilivac
Website: http://www.scribd.com/doc/4545675/Security-and-Ethical-Challenges-
Title: ethical challenges
Date: 11/30/10
Time: 10:00:04 AM

Comments

its a presentation similar to the one reviewed in class. it provides more details about security and ethical issues on a business environment


Pseudonym: Air Jordan
Website: http://tutor2u.net/business/strategy/business-ethics-issues.html
Title: ethical issues in business
Date: 11/30/10
Time: 10:05:39 AM

Comments

A short read about ethical issues in the work place.


Pseudonym: ceapod1015
Website: http://www.itsecurity.com/
Title: ITsecurity is a full of information for people seeking security related information.
Date: 11/30/10
Time: 10:39:38 AM

Comments

This is site is rather easy to use, and contains various links to helpful tools.


Pseudonym: Jollyngo
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/30/10
Time: 10:55:50 AM

Comments

A good page that show definitions and graphs that help to understand better!


Pseudonym: Majik8fx
Website: http://www.buzzle.com/articles/ethical-issues-in-business.html
Title: Ethical Issues in Business
Date: 11/30/10
Time: 11:47:40 AM

Comments

Demonstrates the varied issues of the structures of ethics within a corporation. Which methods work best for whichever categories of businesses from relationship building to fraud to minimum wages.


Pseudonym: jrodr655
Website: http://www.utm.edu/staff/jfieser/vita/research/Busbook.htm
Title: BUSINESS ETHICS
Date: 11/30/10
Time: 12:55:53 PM

Comments

good informtation of the topic with a lot of information


Pseudonym: Changoleon
Website: http://en.wikipedia.org/wiki/Fuzzy_logic
Title: Fuzzy logic
Date: 11/30/10
Time: 03:26:12 PM

Comments

Really good an useful info


Pseudonym: TooTall
Website: http://www.associatedcontent.com/article/2445056/corporate_social_responsibility_was.html?cat=3
Title: Corporate Social Responsibility: Was Milton Friedman Right?
Date: 12/01/10
Time: 10:50:06 AM

Comments

Just an article arguing points not that helpful.


Pseudonym: shelly
Website: http://www.abanet.org/tech/ltrc/research/ethics/
Title: Legal Ethics and Technology: Areas Where Technology Affects Ethics
Date: 12/01/10
Time: 10:55:07 AM

Comments

Not alot of information, just gives alot of links to other articles.


Pseudonym: basketball
Website: http://www.lums.lancs.ac.uk/ugmodules/MNGT314/
Title: Ethical Responsibility
Date: 12/01/10
Time: 12:18:15 PM

Comments

Better understanding on Ethical Responsibility...


Pseudonym: evylia
Website: http://www.webopedia.com/TERM/S/software_piracy.html
Title: software piracy
Date: 12/01/10
Time: 05:01:23 PM

Comments

i choose this page because it gives aood definition of what is software piracy and give good examples


Pseudonym: xpicti77
Website: http://technet.microsoft.com/en-us/library/cc700820.aspx
Title: Firewalls
Date: 12/01/10
Time: 06:05:40 PM

Comments

Worms and viruses target random computer systems. There are two types of firewalls: network and host-based. Most business require both to insure the best security.


Pseudonym: fceleste11
Website: http://www.business-marketing.com/store/article-businessethics.html
Title: Business Ethics
Date: 12/01/10
Time: 07:35:22 PM

Comments

This article is about what business ethics is about,it also gives you an example and it talks about how its changing and how ethics is becoming a priority.


Pseudonym: ange1
Website: http://www.seattlerobotics.org/encoder/mar98/fuz/fl_part1.html#WHAT IS FUZZY LOGIC?
Title: WHAT IS FUZZY LOGIC?
Date: 12/01/10
Time: 08:00:13 PM

Comments

In this context, FL is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded micro-controllers to large, networked, multi-channel PC or workstation-based data acquisition and control systems. It can be implemented in hardware, software, or a combination of both. FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics how a person would make decisions, only much faster.


Pseudonym: calle8
Website: http://www.ehow.com/facts_6965834_security-ethical-issues-information-systems.html
Title: It tells about Information System Basics, Security Issues and Ethical Issues
Date: 12/01/10
Time: 08:26:49 PM

Comments

very short expressions but a good introduction for someone who does not know about it


Pseudonym: DBMS21
Website: http://cisecurity.org/en-us/?route=default
Title: Center for Internet Security
Date: 12/01/10
Time: 08:27:29 PM

Comments

Center for Internet Security


Pseudonym: Hollywood
Website: http://www.wisegeek.com/what-are-the-primary-online-security-threats.htm
Title: Online security threats
Date: 12/01/10
Time: 10:28:20 PM

Comments

This is a good site because it gives you a list of threats to online transactions that can affect a business or a consumer.


Pseudonym: SHOPAHOLIC
Website: http://www.springerlink.com/content/t84607067267727h/fulltext.pdf
Title: Stakeholder theory is an important and commonly used framework for business ethics
Date: 12/01/10
Time: 10:42:45 PM

Comments

this webpage covers the moral of the stockholders


Pseudonym: Dino-Might!!
Website: http://www.us-cert.gov/cas/tips/ST04-015.html
Title: Understanding Denial-of-Service Attacks
Date: 12/01/10
Time: 11:47:33 PM

Comments

Information on Denial of Service attacks including indenitification, prevention and avoiding being part of the problem


Pseudonym: ram9849
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals
Title: Ethical issues for IT security professionals
Date: 12/01/10
Time: 11:49:48 PM

Comments

good website helpful


Pseudonym: Tesla
Website: http://www.us-cert.gov/cas/tips/ST04-015.html
Title: Denial of Service
Date: 12/02/10
Time: 01:18:06 AM

Comments

Talks about denial of service attacks and how to avoid being a part of them.


Pseudonym: liltweetaf
Website: http://www.businessnewsdaily.com/survey-finds-most-small-businesses-lax-on-internet-security-0752/
Title: Survey Finds Most Small Businesses Lax on Internet Security
Date: 12/02/10
Time: 01:49:54 AM

Comments

This is just a quick article I found on business security. I didn't find it astonishing but it was interesting to see some numbers being used to compare how business are managing to maintain some sort of security system.


Pseudonym: hamburger
Website: http://missecurity.wetpaint.com/
Title: threats and defenses against Information Technology safety
Date: 12/02/10
Time: 01:51:18 AM

Comments

interesting to read about the defenses for a change.


Pseudonym: lifeisgood
Website: http://dns.tmcnet.com/topics/internet-security/articles/122543-cyber-crime-more-prevalent-than-might-believe.htm
Title: DNS – Cyber Crime More Prevalent Than You Might Believe
Date: 12/02/10
Time: 02:18:05 AM

Comments

This website has good information about cyber crimes that is going on recently.


Pseudonym: QMB2010
Website: http://home.comcast.net/~nelson1397/stockstake.htm
Title: This website makes a comparison between the stockholder theory and the stakeholder theory.
Date: 12/02/10
Time: 03:05:12 AM

Comments

This website makes a comparison between the stockholder theory and the stakeholder theory.


Pseudonym: blah74
Website: http://www.allsteeloffice.com/NR/rdonlyres/3B6AC489-FC78-4B78-895A-0A5D8A9E888A/0/ErgoHandbook.pdf
Title: Ergonomics and Design: A reference Guide
Date: 12/02/10
Time: 03:12:58 AM

Comments

This website features a guide on how to design for best use by people.


Pseudonym: olak2934
Website: http://www.osha.gov/SLTC/ergonomics/
Title: Safety and Health: Ergonomics
Date: 12/02/10
Time: 05:57:04 AM

Comments

It provides you a definition and other links where you will find more information about ergonomics


Pseudonym: Greek Goddess
Website: http://money.howstuffworks.com/bartering.htm
Title: How Bartering Works
Date: 12/02/10
Time: 07:54:03 AM

Comments

Gives us an idea of how Bartering works.


Pseudonym: churchill
Website: http://www.osha.gov/SLTC/ergonomics/
Title: talks about ergonomics
Date: 12/02/10
Time: 07:56:45 AM

Comments

its a bit brief but offers an outreach link. [?]


Pseudonym: paris123
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: This website explains what business ethics is.
Date: 12/02/10
Time: 07:59:09 AM

Comments

Pretty good site. Decent definition.


Pseudonym: nanis
Website: http://www.buzzle.com/articles/types-of-computer-crimes.html
Title: Buzzle.com
Date: 12/02/10
Time: 09:54:13 AM

Comments

In this website I found information about the definition and the diferent types of computer crime such as hacking, phishing, cyberstalking and identity theft. Some of the computer crimes we saw in class are not mentioned on this website. In addition, another interesting website is the website of the US Department of Justice. Here you can find some examples and cases concerning computer crime and intellectual property. http://www.justice.gov/criminal/cybercrime/cc.html


Pseudonym: omgcisroxors
Website: http://www.infoworld.com/d/cloud-computing/can-cloud-computing-save-you-ddos-attacks-306
Title: Can cloud computing save you from DDoS attacks?
Date: 12/02/10
Time: 11:37:50 AM

Comments

A recent article that discuses what happened to wikileaks when it was under a DDoS attack and how they tried to remedy that situation.


Pseudonym: btomotors
Website: http://www.aitp.org/
Title: Association of Information Technology Professionals
Date: 12/02/10
Time: 11:52:36 AM

Comments

Is the website of the community of IT knowledge that enriches IT professions to it's full potential


Pseudonym: taxxygirl
Website: http://www.springerlink.com/content/1388-1957/12/4/
Title: Ethics and Information Technology Journal
Date: 12/02/10
Time: 12:34:50 PM

Comments

This website is really cool because it has all of the full text articles of the Ethics and Information Technology Journal since it first started in March 1999. It is interesting to see the currenct issues in IT ethics as well as the problems faced ten years ago!


Pseudonym: Shadowmyst
Website: http://en.wikipedia.org/wiki/Fault-tolerant_system
Title: Fault-tolerant system
Date: 12/02/10
Time: 05:45:17 PM

Comments

Defines Fault-tolerant systems and some about fault-tolerant design


Pseudonym: dmart
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: antivirus
Date: 12/02/10
Time: 09:07:08 PM

Comments

definition, history and more about antivirus, good source with full description


Pseudonym: pichu
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: what is business ethics?
Date: 12/02/10
Time: 11:05:53 PM

Comments

good explanation and website


Pseudonym: Tom Brady
Website: http://www.referenceforbusiness.com/encyclopedia/Sel-Str/Stakeholder-Theory.html
Title: what is stockholder theory?
Date: 12/02/10
Time: 11:06:41 PM

Comments

good website


Pseudonym: Ravens12
Website: http://technet.microsoft.com/en-us/library/cc700820.aspx
Title: Firewalls
Date: 12/02/10
Time: 11:19:58 PM

Comments

This website is part of larger webpage from Microsoft. It is also part of an online encyclopedia entitled Security TechCenter. The website details what a firewall is, today's threats, different types of firewalls (home vs. office vs. enterprise, etc.), and different firewall products. It is very easy to understand and is written for a casual user to understand.


Pseudonym: D&J
Website: http://www.pcstats.com/articleview.cfm?articleID=1450
Title: Beginners Guides: Firewalls and Internet security
Date: 12/02/10
Time: 11:20:47 PM

Comments

What I liked about this article is that is a guide of how firewalls work and how security on internet wotk


Pseudonym: Tyson
Website: http://en.wikipedia.org/wiki/Firewall_(computing)
Title: Details regarding what a firewall is and how it is used in a network.
Date: 12/02/10
Time: 11:58:21 PM

Comments

This article explained not only the purpose of a fiewall, but provided detailed information regarding the different types and generations of firewalls. First generation firewalls started monitoring packets, but couldnt really tell which packets were safe. Third generation firewalls are able to record and distinguish the start and end of each packet sent from the WAN into the LAN.


Pseudonym: Vjbarron
Website: http://www.trojan-horse.info/en/index.aspx
Title: Trojan Horse Site
Date: 12/03/10
Time: 10:34:18 AM

Comments

Great site on trojan horses


Pseudonym: Duccis
Website: http://elvis.rowan.edu/~hartley/Courses/ComputersAndSociety/Handouts/020Privacy.html
Title: Computer Privacy: Computer Profiling and Computer Matching
Date: 12/03/10
Time: 12:20:29 PM

Comments

threats to privacy of personal information: large databases, speed and power of search and analysis tools, detailed profiles, lost laptops, electronic ``conversations'' like Web transactions don't disappear when finished, unauthorized use, theft, leakage, ourselves unaware of risks


Pseudonym: PoxFlaza
Website: http://cisr.nps.edu/ethics/site_content/whatis.html
Title: education website
Date: 12/03/10
Time: 05:34:16 PM

Comments

explains what it ethics and how ethics and technology are tied into each other


Pseudonym: Dance21
Website: http://www.jstor.org/pss/3857692
Title: As we transition to the 21st century, it is useful to think about some of the most important challenges business and other organizations will face as the new millennium begins.
Date: 12/03/10
Time: 07:38:06 PM

Comments

Great article!


Pseudonym: J&M
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 12/03/10
Time: 11:39:11 PM

Comments

It explains very well the importance of business ethics and the meaning of it.


Pseudonym: Jesse James
Website: http://www.corporatejourney2u.com/business/current-ethical-issues-in-business.html
Title: Current Ethical Issues In Business
Date: 04/27/11
Time: 09:07:32 PM

Comments

This article covers different ethical issues in business from accounting to unethical business practices.


Pseudonym: dism
Website: http://archive.ifla.org/VII/s13/frbr/frbr1.htm
Title: Functional Requirements
Date: 04/28/11
Time: 02:03:58 PM

Comments

This website define functional requirement as " The purpose of this study is to delineate in clearly defined terms the functions performed by the bibliographic record with respect to various media, various applications, and various user needs. The study is to cover the full range of functions for the bibliographic record in its widest sense--i.e., a record that encompasses not only descriptive elements, but access points (name, title, subject, etc.), other "organizing" elements (classification, etc.), and annotations. The purpose of this study is to delineate in clearly defined terms the functions performed by the bibliographic record with respect to various media, various applications, and various user needs. The study is to cover the full range of functions for the bibliographic record in its widest sense--i.e., a record that encompasses not only descriptive elements, but access points (name, title, subject, etc.), other "organizing" elements (classification, etc.), and annotations."


Pseudonym: dism
Website: http://www.developer-resource.com/software-piracy.htm
Title: Software Piracy
Date: 04/28/11
Time: 02:22:19 PM

Comments

This website descirbe the definiton of software piracy explaninig diferent points of this topic and how it is affecting economic in the United States.


Pseudonym: yisuarez
Website: http://business-ethics.com/
Title: Business Ethics»
Date: 04/28/11
Time: 06:39:14 PM

Comments

Renault CEO Carlos Ghosn recently accused three of the company’s senior executives of selling corporate secrets to the Chinese.


Pseudonym: Lady Jane
Website: http://wordnetweb.princeton.edu/perl/webwn?s=encryption
Title: On the whole, wordnetweb.princeton.edu website show only the search word and the define term encrytion.
Date: 04/28/11
Time: 08:54:04 PM

Comments

According to wordnetweb.princeton.edu state encryption is the activity of converting data or information into code.


Pseudonym: Kalia
Website: http://ehs.okstate.edu/modules/ergo/What.htm
Title: What is Ergonomics?
Date: 04/28/11
Time: 09:20:27 PM

Comments

Shows how ergonomics is the way to make a job fit the person instead of the other way around. The main focus is the actual environment.


Pseudonym: magui101
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 04/28/11
Time: 10:15:14 PM

Comments

In this topic of Security and Challenges, using lecture outline, learning objectives, lecture notes, graphics, and clear-cut definitions and had concise lesson prepared by professor. Student should realize that information technology that had a beneficial effect as well as a negative effect in each of the areas listed.


Pseudonym: papayon
Website: http://maximumpcguides.com/windows-vista/the-complete-malware-prevention-protection-and-removal-guide/
Title: The Complete Malware Prevention, Protection, and Removal Guide
Date: 04/29/11
Time: 05:58:30 PM

Comments

just like the title says :)


Pseudonym: black&pink
Website: http://www.globalsecurity.org/security/systems/biometrics.htm
Title: Biometrics
Date: 04/30/11
Time: 06:13:32 PM

Comments

The homeland security webpage defines biometrics as the psycholocical aspects of a person, there are examples of them and it is lengthy but very informative.


Pseudonym: babas16
Website: http://www.webopedia.com/TERM/T/Trojan_horse.html
Title: Trojan horse
Date: 05/02/11
Time: 05:19:21 PM

Comments

" One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive."


Pseudonym: tesla
Website: http://www.computerworld.com/s/article/9216343/Sony_cuts_off_Sony_Online_Entertainment_service_after_hack
Title: One arcticle of the one of the biggest hacks of the decade done to Playstation Network.
Date: 05/02/11
Time: 08:10:16 PM

Comments

The Playstation Network (psn) was hacked last week by unknown hackers in the U.S. They hacked around 77 million playstation account user information.


Pseudonym: malm_2002
Website: http://www.wikihow.com/Hack-Ultimate-Tactics
Title: How to Hack Ultimate Tactics
Date: 05/04/11
Time: 11:31:47 AM

Comments

Here is how to hack UT its a fun thing to learn this can basically be done with any game if you put your mind to it and your imagination


Pseudonym: MikeyAM
Website: http://amgitsolutions.com/
Title: AMG Business IT Solutions
Date: 05/04/11
Time: 11:42:36 AM

Comments

This business provides information on security and ethical challenges.


Pseudonym: Tip
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 05/04/11
Time: 12:12:30 PM

Comments

This website contains an e-book written by Professor Anatoly Sachenko, describing the security and ethical challenges of Information Technology. He discussed about the threats and defenses needed for the performance and the security of business information system as well as the ethical implication and societal impacts of IT.


Pseudonym: sdominguez9
Website: http://www.webosroundup.com/2010/03/virus-defense-review/
Title: virus defense
Date: 05/04/11
Time: 03:01:30 PM

Comments

this page talks about how you can use and prevent virus. algo it gives you examples.


Pseudonym: sdavid
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Privacy and Legislation
Date: 05/05/11
Time: 12:09:32 PM

Comments

interesting


Pseudonym: yaibon
Website: Security and ethical challenges
Title: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Date: 05/05/11
Time: 02:14:10 PM

Comments

This chapter discusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology


Pseudonym: crde10
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Site has a video describing security and challenges
Date: 05/05/11
Time: 09:54:05 PM

Comments

Its a very interesting site


Pseudonym: Bittersweet
Website: http://www.cert.org/tech_tips/email_bombing_spamming.html
Title: E-mail Bombing and Spamming
Date: 05/05/11
Time: 11:08:50 PM

Comments

It gives a description on spamming and it also tell you how to detect it and things you can do to prevent spamming.


Pseudonym: smestrada3
Website: http://www.slideshare.net/gar_dev/organizational-planning-goal-setting
Title: organizational planning
Date: 05/06/11
Time: 03:12:36 AM

Comments

this website discusses in length organizatonal planning process and goal setting


Pseudonym: peace
Website: http://webliminal.com/Lrn-web09.html
Title: Legal Issues, Ethical Issues, Privacy and Security
Date: 05/06/11
Time: 10:44:58 AM

Comments

This report was very intresting


Pseudonym: sbeltran
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 05/06/11
Time: 06:13:01 PM

Comments

This article discusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology.


Pseudonym: Coe
Website: http://www.aitp.org/organization/about/conduct/conduct.jsp
Title: Standard of Conduct
Date: 05/06/11
Time: 10:48:44 PM

Comments

The standards of professional conduct created by AITP.


Pseudonym: DCar
Website: http://business-intelligence.bestmanagementarticles.com/a-38415-stockholder-vs-stakeholder--whom-should-we-please.aspx
Title: Stockholders theory
Date: 05/07/11
Time: 12:38:22 PM

Comments

I believe that the stockholders theory is important because at the end of the day, the only thing that business's want to do is make money. Thats why they started the business in the first place.


Pseudonym: RED
Website: http://pcworld.about.net/news/Apr102001id45764.htm
Title: Hacking's History
Date: 05/09/11
Time: 10:49:34 AM

Comments

The website provides intresting facts on the development of hacking and where it all began.


Pseudonym: cocktail
Website: http://ergonomics.about.com/od/ergonomicbasics/a/ergo101.htm
Title: clear definition and examples of ergonomics
Date: 05/09/11
Time: 12:24:06 PM

Comments

very interesting


Pseudonym: fashion
Website: http://www.business-ethics.org/
Title: I did not know the existance of this organization but I think it's important to promote the ethics in International or global business like this organization does. Their mission statement is: Fostering global business practices that promote equitable economic development, resource sustainability, and just forms of government.
Date: 05/09/11
Time: 12:36:16 PM

Comments

This website basically provides information about online ethichs which is very important for me to have a better understanding of it.


Pseudonym: It_G.O.D
Website: http://www.sans.org/security-resources/policies/
Title: this site explain and givews examples of internet security ands polociys
Date: 05/09/11
Time: 12:36:18 PM

Comments

this site explain and givews examples of internet security ands polociys


Pseudonym: Doddo
Website: http://www.nittanynetwork.com/computer-forensics-specialist/#more-1235
Title: Computer Forensics Specialists Explains how Cyber Crime Affects Customers and Enterprise.
Date: 05/09/11
Time: 10:07:16 PM

Comments

This is a web forum where computer forensics explains the common facts for committing cyber crime. They explain how this affect customers and the enterprise itself. It is important to mention that this forum, also, focuses not only in the relationship between Enterprise and Business, besides, it emphasizes the relation ship Employer-Employee. This main point is to protect external and internal transactions. Finally, the forum explains the common ways criminals hack computers.


Pseudonym: static69
Website: http://cpsr.org/issues/ethics/
Title: Technology and Ethics
Date: 05/11/11
Time: 05:01:36 PM

Comments

This site has a couple of links on news about technological ethics, ethical principles and a few other things.


Pseudonym: Aria
Website: http://ergonomics.about.com/od/ergonomicbasics/a/ergo101.htm
Title: What is an ergonomic?
Date: 05/11/11
Time: 06:49:04 PM

Comments

Ergonomics derives from two Greek words: ergon, meaning work, and nomoi, meaning natural laws, to create a word that means the science of work and a person’s relationship to that work.


Pseudonym: alesi624
Website: http://webliminal.com/Lrn-web09.html
Title: Security and Ethical Issues
Date: 05/11/11
Time: 08:22:01 PM

Comments

Its imporant to be aware of the different kinds of dangers one's privacy can be affected through technology. Different porgrams or viruses can harm your computer and even harm your security meaures such as personal identity information. It is wise to be informed on how to be protected by such threats and what you can do to not get them.


Pseudonym: AcesWild
Website: csrc.nist.gov/publications/nistpubs/800-35/NIST-SP800-35.pdf
Title: pdf detailing NIST standards for security information
Date: 05/12/11
Time: 11:40:11 AM

Comments

management, operational, and technical security services


Pseudonym: Chikis17
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business Ethics
Date: 05/12/11
Time: 10:16:59 PM

Comments

Talks about how a person should act in a business


Pseudonym: Azeliz
Website: http://plato.stanford.edu/entries/ethics-business/
Title: Business Ethics
Date: 05/12/11
Time: 11:18:28 PM

Comments

Information on business ethics


Pseudonym: 1234
Website: http://www.scribd.com/doc/4545675/Security-and-Ethical-Challenges-
Title: Identification of ethical issues in information technologies.
Date: 05/12/11
Time: 11:21:36 PM

Comments

Proposes steps to identify and execute strategies in It.


Pseudonym: 007cupcake
Website: http://www.google.com/search?hl=en&biw=1003&bih=572&q=security+and+ethical+challanges&aq=f&aqi=&aql=&oq=
Title: security and ethical challanges
Date: 05/13/11
Time: 08:07:20 AM

Comments

This website took me to a powerpoint that was very useful.


Pseudonym: GAMR
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 05/13/11
Time: 08:26:06 AM

Comments

talks about the ethical issues in the IT world


Pseudonym: celticfan1
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Lecture slides about security and ethical challanges in IT
Date: 05/13/11
Time: 09:07:24 AM

Comments

good webstie


Pseudonym: celticfan1
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Lecture slides about security and ethical challanges in IT
Date: 05/13/11
Time: 09:07:30 AM

Comments

good webstie


Pseudonym: Eris
Website: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/protect_your_network/index.html
Title: Small Business Computer Security Checklist
Date: 05/13/11
Time: 09:42:42 AM

Comments

Provides a helpful checklist of steps that can be taken to ensure the safety of business transactions online.


Pseudonym: bambino
Website: http://www.symantec.com/security_response/writeup.jsp?docid=2004-021914-2822-99
Title: Trojan Horse
Date: 05/13/11
Time: 11:29:25 AM

Comments

Provides specific information on trojan horses and other malicious internet criime.


Pseudonym: Goku
Website: http://en.wikipedia.org/wiki/Stockholder_theory
Title: Information on stockholder theory.
Date: 05/14/11
Time: 10:31:00 AM

Comments

Very informative.


Pseudonym: jdrummer23
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: Business Ethics
Date: 05/16/11
Time: 10:52:16 AM

Comments

Talks about Business Ethics


Pseudonym: Afrodita
Website: http://www.ehow.com/facts_6965834_security-ethical-issues-information-systems.html
Title: Security & Ethical Issues of Information Systems
Date: 05/17/11
Time: 12:19:57 PM

Comments

Information systems is a great tool for the development of technology and data sharing of an organization. It helps to plan and manage the functions of a business structure. But all of the data shared and access represent an ethical and security issue for the IT professionals. The information systems use hardware and software tools, the personal involved the flow of information. That is why the security and the way the systems are managed are so crucial. Some organizations hire professionals to keep the confidentiality of the information and secure their systems. Like passwords and access codes. This is made in order to prevent any intrusion like hackers, viruses and threats. The ethical part of managing the information is other relevant topic for any corporation. The most appropriate way to manage and pass the information and data collected of the enterprise and the customers have to be treating in a respectful and confidential way. Always keeping in mind the IT ethics codes.


Pseudonym: Teddy
Website: http://www.freebsd.org/doc/handbook/firewalls.html
Title: Firewalls
Date: 05/20/11
Time: 09:00:53 AM

Comments

This site talks about firewalls and the different types. It also mentions how they can help our system prevent the entry of a virus, etc.


Pseudonym: Kayy9
Website: http://typesofantivirus.com/
Title: Types of AntiVirus
Date: 05/21/11
Time: 10:25:49 PM

Comments

Explains what Antivirus is and the different types of antivirus softwares available.


Pseudonym: Kayyy9
Website: http://typesofantivirus.com/
Title: Types of Anti Virus
Date: 05/21/11
Time: 10:26:46 PM

Comments

Explains what Antivirus is and the many types of antivirus software programs available.


Pseudonym: Jessiesgirl
Website: http://www.informit.com/articles/article.aspx?p=26868&rll=1
Title: The website provides an article about internet securty defense overview.
Date: 05/24/11
Time: 11:15:41 AM

Comments

The article is interesting, but not that usefull.


Pseudonym: mavaldillez
Website: http://www.utm.edu/staff/jfieser/vita/research/Busbook.htm
Title: Business Ethics
Date: 05/24/11
Time: 02:12:03 PM

Comments

This site gives very detailed information as far as business ethics and all the certain concepts that go along with business ethics.


Pseudonym: Apod28
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 05/24/11
Time: 02:24:35 PM

Comments

I thought this website was very thorough in explaining this topic.


Pseudonym: maryta
Website: www.windowsecurity.com/.../Ethical-Issues-IT-Security-Professionals.html
Title: Security and Ethical Challenges
Date: 05/24/11
Time: 02:41:17 PM

Comments

Identify ethical issues in how the use of information technologies in business


Pseudonym: zoenatalia
Website: http://www.rbs2.com/ccrime.htm
Title: Definition of crimes and some examples
Date: 05/24/11
Time: 07:33:48 PM

Comments

This website give us history about how many time this crime had been existing. And also give us some examples of Computer crimes.


Pseudonym: 12mrk
Website: http://www.rafayhackingarticles.net/2011/05/facebook-dislike-button-beware-scam.html
Title: Facebook Dislike Button, Beware Scam Spreading
Date: 05/24/11
Time: 08:24:13 PM

Comments

Since almost the whole world is on Facebook, hackers are using it for the advantage of scamming and getting into other people's computers. Facebook is known to have a 'like' button on all posts. Scammers are creating a 'dislike' button and asking people to download the new code. Videos are also used to entice users to click on so that viruss' can start affecting their computer. Facebook has been getting a lot of heat recently on how it lacks more security.


Pseudonym: pollo
Website: http://www.howstuffworks.com/firewall.htm
Title: How Firewalls Work
Date: 05/24/11
Time: 09:52:32 PM

Comments

This website explains how firewalls work in protecting your computer. They keep out unauthorized internet users from intranet networks.


Pseudonym: aapoda56
Website: http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html
Title: Internetworks Security Defenses
Date: 05/25/11
Time: 12:11:43 AM

Comments

This website talks about the history of the security defenses. Good site.


Pseudonym: VW
Website: http://www.crime-research.org/news/05.05.2004/241/
Title: What is hacking?
Date: 05/25/11
Time: 10:36:41 AM

Comments

in this website we learn that hacking is a felony in the US.... but now always as there is also something known as ethical hacker which is not illegal but even condoned by companies/organizations


Pseudonym: MCB
Website: http://americanhistory.about.com/od/usconstitution/g/social_contract.htm
Title: Social Contract
Date: 11/03/11
Time: 10:16:48 PM

Comments

This website explains the basic concepts of social contract and its beginnings on American history.


Pseudonym: SweetNess
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 11/04/11
Time: 07:44:09 AM

Comments

Even though this site has a lot of ads it was very helpful!


Pseudonym: utdakid
Website: http://knowledge.wharton.upenn.edu/category.cfm?cid=11
Title: business ethics
Date: 11/07/11
Time: 05:21:45 PM

Comments

lot of information on emphasizing business ethics


Pseudonym: kcadena1
Website: http://www.slideshare.net/engineerrd/security-and-ethical-challenges
Title: This website provides slides with definitions and examples about this chapter.
Date: 11/12/11
Time: 04:27:26 PM

Comments

The slides in the websites provide detailed information that pertains to chapter 13.


Pseudonym: james
Website: http://www.ibm.com/ibm/responsibility/ibm_policies.shtml
Title: IBM Ethical Polices
Date: 11/13/11
Time: 04:39:25 PM

Comments

IBM has corporate policies that cover the following issues: Business conduct and ethicsReciprocityWorkforce diversityPoliticsWell-being and safetyData privacyDiverse business relationshipsEnvironmental affairsQualityGlobal employment standards.


Pseudonym: saida04
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Common Hacking Tactics
Date: 11/16/11
Time: 09:43:00 AM

Comments

Computer security is very important to all kind of business. This fact has been one of the most controversial problems around the world that directly affect important companies as well as individual internet users. In this web we can identify each of the most common tactics that hackers use and we may be able to identify by this basic description.


Pseudonym: abcdefg
Website: http://www.cybercitizenship.org/crime/crime.html
Title: What is CyberCrime?
Date: 11/16/11
Time: 10:26:34 AM

Comments

This is an informative site that helps one understand what is considered cyber crime. It mentions how often cyber crime is made nowadays.


Pseudonym: whitetigerep
Website: http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
Title: viruses
Date: 11/17/11
Time: 02:54:03 PM

Comments

describes different computer viruses and the difference between them


Pseudonym: Beauty28
Website: http://www.securingjava.com/chapter-four/
Title: Malicious Applet: Avoiding a Common Nuisance
Date: 11/17/11
Time: 06:50:22 PM

Comments

I didnt like how the website was structured it was very cluttered and kind of hard to read.


Pseudonym: Reckoner777
Website: http://www.cert.org/tech_tips/home_networks.html
Title: Home Network Security
Date: 11/17/11
Time: 07:05:31 PM

Comments

This sites provides information on network security as well as tips.


Pseudonym: zooly15
Website: http://en.wikipedia.org/wiki/Denial-of-service_attack
Title: Describes a DoS attack (Denial of Service)
Date: 11/17/11
Time: 08:50:02 PM

Comments

A DoS attack is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.


Pseudonym: Rita<3
Website: http://www.neurophys.wisc.edu/comp/faqs/howto4.html
Title: How to prevent computer viruses
Date: 11/17/11
Time: 10:21:36 PM

Comments

Great site give you the 411 of how you might be exposing your computer with our knowing.


Pseudonym: CX9
Website: http://winhelp2002.mvps.org/unwanted.htm
Title: Dealing with Unwanted Spyware and Parasites
Date: 11/18/11
Time: 02:51:08 PM

Comments

IT EXPLAINS HOW IT HAPPENED AND HOW TO FIX IT.


Pseudonym: chavez
Website: http://www.colorado.edu/geography/gcraft/notes/ethics/ethics_f.html
Title: Ethical Challenges
Date: 11/19/11
Time: 11:48:36 AM

Comments

Describes the ethical challenges faced in today's workplace environment, enjoy!


Pseudonym: Elizabeth
Website: http://www.networkworld.com/news/2011/012411-top-web-hacking-techniques.html
Title: Top 10 Web hacking techniques of 2010 revealed
Date: 11/19/11
Time: 12:13:40 PM

Comments

Discusses the main hacking techniques used during 2010.


Pseudonym: ravazquez
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Security and Ethical challenges
Date: 11/21/11
Time: 12:47:12 PM

Comments

this is a PDF format which shows the security and ethical challenges in IT


Pseudonym: Alecnoah1981
Website: http://www.justice.gov/criminal/cybercrime/
Title: Cyber Crime
Date: 11/21/11
Time: 10:00:25 PM

Comments

this web-site is available if you ever feel you have been a victom of Cyber crime


Pseudonym: venus831
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: Security and Ethical challenges
Date: 11/22/11
Time: 10:55:19 AM

Comments

this article provides information on hot technology could be a threat to pryvacy


Pseudonym: Poodle
Website: http://www.jstor.org/stable/10.2307/3857692
Title: The trends in the market and things might be in the near future.
Date: 11/22/11
Time: 10:59:22 AM

Comments

Talks about the future and how things are affected now. How things can be avoided and fixed in the future.


Pseudonym: INA
Website: http://es.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/22/11
Time: 12:30:18 PM

Comments

In this page, this long article explains ans talk about security ans ethical challenges. Everything related to e-business...helpfull when starting a business and also for those experience ones


Pseudonym: iluvtom
Website: http://www.ask.com/wiki/Legal_aspects_of_computing
Title: What is Cyber law?
Date: 11/22/11
Time: 04:39:12 PM

Comments

I wanted more information on Cyber law than the classroom discussion involved. Ask.com, certainly gave me that. This web site covered quite a few legal aspects of Cyber law: from history to creation as well as jurisdiction. I found the content extremely thorough.


Pseudonym: pepe10
Website: http://cybercrime.planetindia.net/trojans.htm
Title: trojan
Date: 11/22/11
Time: 04:42:29 PM

Comments

this is one of the best references if seen yet. shows how many ways someone can do bad stuff to your computer, it is very interesting how many ways and how easily someone can enter your computer


Pseudonym: luvbug01
Website: http://www.iep.utm.edu/soc-cont/
Title: Social Contract Theory
Date: 11/22/11
Time: 05:53:16 PM

Comments

This website explains in detail what social contract throry is as well as the views of others such as Socrates, John Locke and more.


Pseudonym: GDF1214
Website: http://en.wikipedia.org/wiki/Adware
Title: Adware
Date: 11/22/11
Time: 08:31:51 PM

Comments

Wikipedia like always makes things simple for me to understand. Adware is a software that displays advertisement to a computer. It is use to generate revenue to the author and it is harmless. It is also shareware, spyware of malware. Some programs have been created to detect and prevent spyware.Some examples of adware are: gator,dollarrevenue, and view point media player. Look at this page for more information.


Pseudonym: rolmedow
Website: http://corporatetrainingmaterials.com/Business_Ethics/index.asp?gclid=CKnDl_uozawCFW_DtgodZm4Upg
Title: business ethics
Date: 11/23/11
Time: 10:52:55 AM

Comments

Good business ethics are essential for the long-term success of an organization


Pseudonym: laika*
Website: http://web.whittier.edu/academic/business/duran/588/Security/frame.htm
Title: security and ethical challenges of e-business
Date: 11/23/11
Time: 11:01:23 AM

Comments

It is a slideshow presentation that contains lists of many possible viruses but it also has some precautions and solutions we might take.


Pseudonym: rasta
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and ethical challenges
Date: 11/23/11
Time: 12:40:43 PM

Comments

It is an overview over security and ethical challenges


Pseudonym: MAPLE
Website: http://en.wikipedia.org/wiki/Stakeholder_theory
Title: Stakeholder theory
Date: 11/23/11
Time: 01:03:00 PM

Comments

This is the web talking about Stakeholder theory's information


Pseudonym: zona
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: what-is-business-ethics
Date: 11/23/11
Time: 01:11:45 PM

Comments

good webpage to understand business ethics


Pseudonym: herman
Website: http://www.cfr.org/cybersecurity/cybertheft-us-economy/p25639
Title: Cybertheft and the US Economy
Date: 11/23/11
Time: 01:44:52 PM

Comments

An opinion article written in August illustrates how cyber theft may have immediate impacts on the US economy, and what government should do to counter this problem.


Pseudonym: rmaese
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical issues for IT security
Date: 11/23/11
Time: 01:47:41 PM

Comments

This website talked about different ethical dilemmas one might encounter when working as an IT. some issues included making copies of important documents versus just being able to read them. This article explained how it was worst to actually print something out rather than relying on one's memory.


Pseudonym: Lauriss4
Website: http://www.scribd.com/doc/396854/Enterprise-and-Global-Management-of-Information-Technology
Title: Enterprise & Global Management of IT
Date: 11/23/11
Time: 02:14:35 PM

Comments

emphasizes the impact of business applications of information technology on management and organizations, the components of information systems management, and the managerial implications of the use of information technology in global business.


Pseudonym: Lauriss4
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/23/11
Time: 02:17:51 PM

Comments

discusses the threats against, and defenses needed for the performance and security of business information systems, as well as the ethical implications and societal impacts of information technology.


Pseudonym: santo
Website: http://www.emeraldinsight.com/journals.htm?articleid=1462975&show=abstract
Title: Growth of the Internet and the number of online consumers and the protection rights.
Date: 11/23/11
Time: 04:17:37 PM

Comments

The Article talks us about the way companies use public information of the customers and avoid litigation from them


Pseudonym: nenonena
Website: http://www.policypatrol.com/email-monitoring-article.htm
Title: Is email monitoring legal?
Date: 11/23/11
Time: 09:28:54 PM

Comments

Good website about e-mail monitoring plus policies and laws. I found very interesting and would suggest reading this article if you're interested in computer/internet security


Pseudonym: Harley Quinn
Website: http://groups.able2know.org/philforum/topic/1721-1
Title: Stockholder vs. Stakeholder
Date: 11/23/11
Time: 10:14:37 PM

Comments

This Forum helped to better understand the difference between Stakeholder and Stockholder Theory.


Pseudonym: tequila01
Website: http://whatishacking.org/
Title: What is hacking?
Date: 11/24/11
Time: 12:15:55 PM

Comments

In this webpage explains very complete what is hacking.


Pseudonym: Superman
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 11/24/11
Time: 06:09:35 PM

Comments

Educational website that explains the issues on technical security systems.


Pseudonym: sas
Website: http://www.independent.co.uk/news/uk/crime/first-arrest-in-computer-hacking-investigation-6267732.html
Title: First arrest in computer hacking investigation
Date: 11/24/11
Time: 08:32:55 PM

Comments

THIS ARTICLE IS ABOUT A MAN THAT HACKED INTO COMPUTERS


Pseudonym: lizzy
Website: http://en.wikipedia.org/wiki/Stakeholder_theory
Title: Stockholder Theory
Date: 11/24/11
Time: 09:14:16 PM

Comments

This website helps me understand the meaning of stockholder theory and how to apply it in real life.


Pseudonym: schweiger
Website: http://technet.microsoft.com/en-us/library/cc700820.aspx
Title: Firewalls
Date: 11/24/11
Time: 09:50:54 PM

Comments

at first I thought firewalls were bad, like viruses but after going through them in class, i found out they are essential in keeping computers safe and secure


Pseudonym: amart819
Website: http://www.justice.gov/criminal/cybercrime/reporting.htm#cc
Title: How to report computer crime?
Date: 11/25/11
Time: 10:31:56 AM

Comments

Steps to follow when reporting computer hacking, fraud and other internet-related crime


Pseudonym: Batmannnn
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: Security and Ethical Challenges
Date: 11/25/11
Time: 01:51:24 PM

Comments

This is a popular slideshow on Security and Ethical Challenges of Information Technology.


Pseudonym: streetrock27
Website: http://hbswk.hbs.edu/item/1609.html
Title: Harvard Business School: Value Maximization and Stakeholder Theory
Date: 11/25/11
Time: 02:35:08 PM

Comments

Good article on stakeholder theory.


Pseudonym: christian.arrio
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: Security and ethical challenges
Date: 11/25/11
Time: 06:55:19 PM

Comments

Excellent website with a power point presentation


Pseudonym: Lilac
Website: http://www.spamlaws.com/types-of-cyber-crime.html
Title: Types of Cyber Crime
Date: 11/25/11
Time: 10:24:11 PM

Comments

An list of cyber crimes.


Pseudonym: Junior915
Website: http://oss.sagepub.com/content/32/4/473.short?rss=1&ssource=mfr
Title: Globalization and Stakeholder Theory
Date: 11/26/11
Time: 10:39:20 AM

Comments

This article explains how stakeholder theory can pose many challenges if a company decides to globalize and how the company can efficiently and effectively get to that point.


Pseudonym: Africa
Website: http://www.computerhope.com/vlist.htm
Title: Computer Hope
Date: 11/26/11
Time: 04:35:36 PM

Comments

Great information about computer viruses, its properties, and effects.


Pseudonym: germangirl
Website: http://kb.iu.edu/data/aehm.html
Title: What are viruses, worms, and Trojan horses?
Date: 11/26/11
Time: 07:26:27 PM

Comments

helpful information about how to deal with viruses


Pseudonym: coltRDZ
Website: http://www.justice.gov/criminal/cybercrime/cclaws.html
Title: Ciber Crime
Date: 11/26/11
Time: 07:26:40 PM

Comments

Provides federal codes for ciber crime. Good resource to get facts regarding ciber crime.


Pseudonym: darthgto
Website: http://www.buzzle.com/articles/what-is-computer-hacking.html
Title: What is computer hacking?
Date: 11/26/11
Time: 09:49:08 PM

Comments

This website describes in detail about computer hacking and its problems


Pseudonym: gn293662
Website: http://www.techradar.com/news/software/applications/how-computer-viruses-work-626829
Title: How computer viruses work
Date: 11/27/11
Time: 11:58:32 AM

Comments

Explanation as to how computer viruses operate on the computer. Very interesting.


Pseudonym: Waldo
Website: http://plato.stanford.edu/entries/ethics-business/
Title: Business Ethics
Date: 11/27/11
Time: 04:13:35 PM

Comments

In concept, business ethics is the applied ethics discipline that addresses the moral features of commercial activity


Pseudonym: Jax89
Website: http://gulfnews.com/business/easy-internet-access-behind-rise-in-cybercrime-experts-say-1.938811
Title: Easy internet access behind rise in cybercrime, experts say
Date: 11/27/11
Time: 07:02:35 PM

Comments

This article explains how "easy access" is the reason for all the cyber crime involved with the UAE.


Pseudonym: mgi852
Website: http://www.slideshare.net/infinityrulz/security-ethical-challenges13
Title: Security & Ethical Challenges13
Date: 11/27/11
Time: 07:35:35 PM

Comments

Provides details regarding security and ethical challenges.


Pseudonym: del sol
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: How Technology infringes on privacy
Date: 11/27/11
Time: 10:04:55 PM

Comments

Powerpoint presentation


Pseudonym: elitedemokid
Website: http://forums.techarena.in/antivirus-software/1383238.htm
Title: Compoments of a Virus
Date: 11/28/11
Time: 10:28:17 AM

Comments

Detailed information on how computer viruses work


Pseudonym: S.W. Erdnase
Website: http://articles.cnn.com/2011-08-15/tech/mafiaboy.hacker_1_mafiaboy-computer-hacker-hacker-community?_s=PM:TECH
Title: 'Mafiaboy'
Date: 11/28/11
Time: 12:43:45 PM

Comments

This guy hacked Yahoo!, eBay and E*TRADE need I say more.


Pseudonym: abcdefg
Website: http://plato.stanford.edu/entries/logic-fuzzy/
Title: Fuzzy logic
Date: 11/28/11
Time: 01:38:04 PM

Comments

The website describres what fuzzy logic is and how to use it


Pseudonym: Cristy
Website: http://www.securingjava.com/chapter-four/chapter-four-1.html
Title: What Is a Malicious Applet?
Date: 11/28/11
Time: 02:52:28 PM

Comments

How to protect Java and What Is a Malicious Applet.


Pseudonym: Repsol07
Website: http://landings.stopzilla.com/_legacy_landings/antivirus/antivirus_b.do.html?aid=10046&cid=virus
Title: viruses and worms in systems
Date: 11/28/11
Time: 07:39:28 PM

Comments

Viruses are vital as well as worms when they enter into a system due to the damage they can cause within a system


Pseudonym: Mr. Magpie
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: Security And Ethical Challenges Of Information Technology
Date: 11/28/11
Time: 09:56:11 PM

Comments

This website provides a very useful presentation on security and ethical challenges of information technology. The presentation is very detailed and easy to understand.


Pseudonym: Coheed29
Website: http://www.sciencedirect.com/science/article/pii/S0167404899800066
Title: Computer hacking and cyber terrorism: the real threats in the new millennium?
Date: 11/28/11
Time: 10:52:22 PM

Comments

Talks a little more about the real threats hacking and other cyber threats pose in a tech driven society.


Pseudonym: Coheed29
Website: http://dl.acm.org/citation.cfm?id=374122.374123
Title: Enablers and inhibitors of business-IT alignment
Date: 11/28/11
Time: 11:00:02 PM

Comments

Talks about the value IY can bring to a business.


Pseudonym: Matt
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: common hacking tactics
Date: 11/28/11
Time: 11:45:59 PM

Comments

good definitions


Pseudonym: MAVC
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: Security And Ethical Challenges Of Infornation Technology
Date: 11/29/11
Time: 09:41:34 AM

Comments

information given is like a second opinion on what was seen on class


Pseudonym: reorrantia
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: hacking as a computer crime
Date: 11/29/11
Time: 11:24:01 AM

Comments

describes all computer crimes including hacking


Pseudonym: coco22
Website: http://www.ijecbs.com/July2011/45.pdf
Title: security and ethical issues in it. an organizations perspective
Date: 11/29/11
Time: 12:26:08 PM

Comments

IT has not only connected the world at one single platform but it is also helping in the integration of various traditional societies into modern societies


Pseudonym: B-Diesel3102
Website: http://networking.anandsoft.com/advantages-of-hardware-firewalls.html
Title: Advantages and Disadvantages of firewalls
Date: 11/29/11
Time: 12:35:28 PM

Comments

Provides a good list about several advantages and disadvantages of using firewall security systems to monitor your software.


Pseudonym: somj3
Website: http://definitions.uslegal.com/c/computer-hacking/
Title: Computer Hacking Law and Legal Definition
Date: 11/29/11
Time: 12:36:38 PM

Comments

It provides with the definition of Hacking and several issues related to the legal side of it.


Pseudonym: Pikoky
Website: http://www.albany.edu/~goel/classes/spring2006/workshop/privacy.pdf
Title: Privacy and Legislation
Date: 11/29/11
Time: 03:39:40 PM

Comments

Great information on Privacy, and ethical issues


Pseudonym: bigeyes
Website: http://www.sophos.com/en-us/press-office/press-releases/2004/06/va_netskyhero.aspx
Title: Computer virus writer: "Netsky worm made me the hero of my class"
Date: 11/29/11
Time: 04:16:52 PM

Comments

Tells the story of the kid who dveloped the virus and how he became more and more popular as the virus became larger.


Pseudonym: Serg1386
Website: http://www.ijecbs.com/July2011/
Title: Security and ethical issues: an organizations perspective
Date: 11/29/11
Time: 05:56:20 PM

Comments

This site is a variety of documents containing information and insite on the different types of security and ethical issues in information systems


Pseudonym: Vicenza
Website: http://computer.howstuffworks.com/worst-computer-viruses.htm
Title: How Stuff Works "10 Worst Computer Viruses of All Time"
Date: 11/29/11
Time: 07:27:04 PM

Comments

This website talks about the worst viruses of all time.


Pseudonym: 321aed
Website: www.ijecbs.com/July2011/45.pdf
Title: International Journal of Enterprise Computing and Business
Date: 11/29/11
Time: 07:59:08 PM

Comments

its a great reading


Pseudonym: Kapustul
Website: https://www.privacyrights.org/fs/fs7-work.htm
Title: Workplace Privacy and Employee Monitoring
Date: 11/30/11
Time: 09:39:01 AM

Comments

This is a wonderful website to learn everything about compuer monitoring at the workplace since most employees are not aware what can and is being monitored.


Pseudonym: Enna
Website: web.njit.edu/~jerry/CIS-677/Other-Notes/Ch11-ethics.pp
Title: Security & Ethical Challenges
Date: 11/30/11
Time: 11:06:38 AM

Comments

PPT file that explain the security and Ethical Challenges


Pseudonym: NYSE
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: IT & CIS Security & Ethics Obstacles
Date: 11/30/11
Time: 11:23:04 AM

Comments

This article takes a look at a neglected area of most computer security professionals' training: how to deal with the ethical issues that can - and invariably do - crop up during the course of doing your job.


Pseudonym: LucyBird64
Website: http://www.springerlink.com/content/h12p7105585833j3/
Title: Springer Link Business Ethics
Date: 11/30/11
Time: 11:28:51 AM

Comments

PDF of Friedman's Stockholder Theory of Corporate Moral Responsibility


Pseudonym: Great Dane
Website: http://www.staffmonitoring.com/P32/abuse.htm
Title: Staff Monitoring Solutions
Date: 11/30/11
Time: 02:14:45 PM

Comments

This website defines Internet abuse and gives information about Internet workshops as a good place to let your employees know about what is acceptable and what isn’t. The website also explores problems that can be encountered with Internet monitoring, such as incomplete or inaccurate information and someone else accessing an employees computer.


Pseudonym: Sun City
Website: http://ezinearticles.com/?The-Purpose-of-Anti-Virus-Software&id=117602
Title: Ezine Articles
Date: 11/30/11
Time: 05:15:29 PM

Comments

For me this was a very helpful article. I am 21 years old and because I'm young most people will assume I understand everything related to the computer. The truth is that by reading this article now I feel more confident aboutn how anti-viruses really works. And I realize why is so important to update the anti-virus frequently


Pseudonym: Paco
Website: http://knol.google.com/k/norman-creaney/ethical-dilemmas-in-information/1hzaxtdr9c09g/44#
Title: Ethical Dilemmas in Information Technology
Date: 11/30/11
Time: 05:33:36 PM

Comments

interesting article on ethical dilemmas with respect to information technology


Pseudonym: 33love04
Website: http://www.injuredworker.org/osha_ergonomics.htm
Title: Ergonomics
Date: 11/30/11
Time: 05:40:39 PM

Comments

This website provides good insight about what ergonomics is and its purpose of the workplace. It also has other links you can look at relating to ergonomics.


Pseudonym: waffles
Website: http://www.infosecinstitute.com/courses/ethical_hacking_training.html
Title: INFOSEC INSTITUTE
Date: 11/30/11
Time: 06:06:30 PM

Comments

This website helps you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation.


Pseudonym: caleyva
Website: http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm
Title: Hacking
Date: 11/30/11
Time: 06:27:09 PM

Comments

what i'd like about this article is that they not only talk about the word hacking, but they also talk about the word cracking which some persons think is the same thing, how ever in this article the explain that to.


Pseudonym: Godfather
Website: http://en.wikipedia.org/wiki/Social_responsibility
Title: Social Responsibility
Date: 11/30/11
Time: 06:31:23 PM

Comments

The article covers social responsibility giving a definition and explanation


Pseudonym: eli2007
Website: http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html
Title: Sniffin' the Ether v2.0
Date: 11/30/11
Time: 06:37:18 PM

Comments

Everything about sniffer programs and how to detect and prevent them


Pseudonym: peke01
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Common hacking tactics
Date: 11/30/11
Time: 07:27:55 PM

Comments

This webpage gives examples of the common hacking tactics and a brief description of this tactics.


Pseudonym: dgarci07
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals
Title: It talks about why people in the technology field as in other fields should have ethical policies to not harm other personnel.
Date: 11/30/11
Time: 08:26:00 PM

Comments

It talks about why people in the technology field as in other fields should have ethical policies to not harm other personnel.


Pseudonym: gbrnboo
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 11/30/11
Time: 10:30:27 PM

Comments

This website briefly describes the ethical issues that people who work with information systems may encounter. Also, how being able to access someone else's information can be tempting but why you should relay on ethics to avoid legal problems.


Pseudonym: Alman R.
Website: https://www.owasp.org/index.php/Trojan_Horse
Title: The 7 Main Types of Trojan Horse
Date: 11/30/11
Time: 10:39:29 PM

Comments

Remote Access Trojan (RAT): Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. Data Sending Trojan: Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, and IM messages, and sends them back to the attacker. Destructive Trojan: Trojan horse designed to destroy data stored on the victim’s computer. Proxy Trojan: Trojan horse that uses the victim's computer as a proxy server, providing the attacker an opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet. FTP Trojan: This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim's computer using File Transfer Protocol. Security software disabler Trojan: This Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim's computer, and even to infect more than the computer. Denial-of-Service attack Trojan: Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim's computer.


Pseudonym: Alman R.
Website: http://www.ed.uiuc.edu/wp/copyright-2002/softwarepiracyfaqs.html
Title: Software piracy frequently asked questions
Date: 11/30/11
Time: 10:42:15 PM

Comments

explains many questions involving software piracy issues.


Pseudonym: Bugito
Website: http://computer.howstuffworks.com/worst-computer-viruses.htm
Title: Top Ten Viruses of all time
Date: 11/30/11
Time: 10:47:57 PM

Comments

Top ten viruses of all time and a brief history of each.


Pseudonym: tessers14
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 11/30/11
Time: 11:24:11 PM

Comments

Describes what computer viruses do to computers.


Pseudonym: Mgarc876
Website: http://www.hartnell.cc.ca.us/faculty/jlagier/internet/legal.htm
Title: Internet security
Date: 11/30/11
Time: 11:32:06 PM

Comments

Good site information is organized, clear.


Pseudonym: Nana
Website: http://www.ergotron.com/tabid/301/default.aspx
Title: Ergonomics
Date: 11/30/11
Time: 11:38:31 PM

Comments

Provides tips for a safe workplace


Pseudonym: Woody
Website: http://en.wikipedia.org/wiki/Logic_bomb
Title: Logic Bombs
Date: 11/30/11
Time: 11:55:58 PM

Comments

This web page helps you understand better what a logic bomb is.


Pseudonym: Poodle
Website: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/fora85&div=50&id=&page=
Title: Defines a global market and explains how it became a different type of commercialisng.
Date: 12/01/11
Time: 12:24:10 AM

Comments

It is very detailed and explains the meaning and difference of global market. Talks about the way it became separate from multinationalism.


Pseudonym: jaimelcx
Website: http://www.infohq.com/Computer/Spam/avoid-spam-hackers.htm
Title: Website about IT security.
Date: 12/01/11
Time: 02:39:41 AM

Comments

This website is about the way a person can protect their computers from hackers. It is very helpful and teaches you things like protecting your passwords and security information.


Pseudonym: Chuck Bass
Website: http://www.springerlink.com/content/h12p7105585833j3/Friedman's Stockholder Theory of Corporate Moral Responsibility
Title: Friedman's Stockholder Theory of Corporate Moral Responsibility this gives you an through example of how stockholders theory works in our day of age
Date: 12/01/11
Time: 07:24:40 AM

Comments

this shows the moral and ethical values that a business must have to our society


Pseudonym: enileucaj
Website: http://gbr.pepperdine.edu/2010/08/Creating-and-Sustaining-an-Ethical-Workplace-Culture/
Title: Creating and Sustaining an Ethical Workplace Culture
Date: 12/01/11
Time: 09:35:33 AM

Comments

This page give information about the steps to take when dealing with different behaviors and what is the ethical aproach.


Pseudonym: vega
Website: http://webliminal.com/Lrn-web09.html
Title: Legal Issues, Ethical Issues, Privacy, and Security
Date: 12/01/11
Time: 10:37:41 AM

Comments

This website is very useful because it describes all type of security and ethical challenges in a very brief and understandable manner. I absolutely recommend you read it!


Pseudonym: *a*a*
Website: http://0-www.jstor.org.lib.utep.edu/stable/25074740?&Search=yes&searchText=stakeholder&searchText=Business&searchText=ethics&searchText=analysis&list=hide&searchUri=%2Faction%2FdoBasicSearch%3FQuery%3DBusiness%2Bethics%2Band%2Bstakeholder%2Banalysis%26gw%3Djtx%26acc%3Don%26prq%3D%2528jstor.org%252Fpss%252F3857592%2529%26Search%3DSearch%26hp%3D25%26wc%3Don&prevSearch=&item=18&ttl=2581&returnArticleService=showFullText
Title: Business Ethics: A Helpful Hybrid in Search of Integrity
Date: 12/01/11
Time: 11:13:21 AM

Comments

business ethics should be more closely related to philosophy


Pseudonym: 5589
Website: http://www.justice.gov/criminal/cybercrime/
Title: This site deals with anything from copyright infringement to loss of identity.
Date: 12/01/11
Time: 12:41:55 PM

Comments

Helpful to overcome some of these security challenges that we come along with technology.


Pseudonym: bravodelta
Website: http://support.microsoft.com/kb/129972
Title: Discusses symptoms of computer viruses
Date: 12/01/11
Time: 02:24:01 PM

Comments

Discusses symptoms of computer viruses


Pseudonym: Lily
Website: http://web.whittier.edu/academic/business/duran/588/Security/frame.htm
Title: Security and Ethical Challenges
Date: 12/01/11
Time: 02:52:22 PM

Comments

This webpage is not interesting like other like i already read because are slides the problem is that there are lot of pages with kind of the same information the good part of that is that are special for students and you can find easy any question that you can have about the security and ethical challenges


Pseudonym: lacruzt
Website: http://es.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Business Security and Ethic Challanges
Date: 12/01/11
Time: 10:56:37 PM

Comments

a brief and concise presentation about nowadays business security and ethic challanges.


Pseudonym: jpc
Website: http://definitions.uslegal.com/c/cybertheft/
Title: Cybertheft Law & Legal Definition
Date: 12/02/11
Time: 04:00:18 AM

Comments

definition of cyber theft and some information on the law and legality of that issue


Pseudonym: boostzilla
Website: http://www.ibm.com/developerworks/library/s-crack/
Title: lists and descriibes common hacking tactics
Date: 12/04/11
Time: 07:00:32 PM

Comments

lists methods and common entry points, and also offers defense against hacking techniques


Pseudonym: cerezita
Website: http://en.wikipedia.org/wiki/Fuzzy_logic
Title: fuzzy logic
Date: 12/09/11
Time: 09:55:04 PM

Comments

it's wikipedia describing what is fuzzy logic


Pseudonym: Charbo
Website: http://www.ibm.com/developerworks/library/s-crack/
Title: IBM: Hacking Tatics
Date: 06/25/12
Time: 04:55:49 PM

Comments

The site gives information on the different methods hackers use and why they attack.


Pseudonym: Twiggy
Website: www.philadelphia.edu.jo/courses/MIS/Chap011.ppt
Title: Security and Ethical Challenges
Date: 06/29/12
Time: 02:49:02 AM

Comments

There is important information here in how security and ethical challenges arise in the businesses world.


Pseudonym: menitomex
Website: www.philadelphia.edu.jo/courses/MIS/Chap011.ppt
Title: What is Security and Ethical Challenges?
Date: 07/01/12
Time: 12:55:57 PM

Comments

Is about the ethical challenges that companies face with spyware, hackers, privacy concerns over intellectual property, etc


Pseudonym: ELOJ
Website: http://computer.howstuffworks.com/logic-bomb.htm
Title: Logic bombs
Date: 07/01/12
Time: 07:31:00 PM

Comments

An article completely dedicated to logic bombs which is one of the most common methods for hacking.


Pseudonym: Pyro22
Website: http://www.focus.com/fyi/top-10-most-famous-hackers-all-time/
Title: Top 10 Most Famous Hackers of All Time by IT Security Editors
Date: 07/01/12
Time: 08:56:28 PM

Comments

The website list 10 individuals that have hacked important government information and millions of dollars ...this shows us the importance of computer security


Pseudonym: lkiri
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Computer Security: Common Hacking Tactics
Date: 07/01/12
Time: 09:04:19 PM

Comments

It explains thirteen common hacking tactics.


Pseudonym: segtz
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: this is a long lecture about how the technology can affect the ethical challenges in our modern society.
Date: 07/02/12
Time: 05:34:36 PM

Comments

in my opinion this lecture is very interesting but there are many different ideas about this topic and for this reason is important try to avoid any kind of bias to understand the lecture.


Pseudonym: Beezy
Website: http://www.ehow.com/about_7228246_meaning-ethical-responsibility_.html
Title: Ethical Responsibility
Date: 07/02/12
Time: 07:11:36 PM

Comments

Explains ethical responsibilty


Pseudonym: gh0213
Website: http://www.hackpconline.com/
Title: computer hacking/ learn how to hack
Date: 07/03/12
Time: 12:45:46 PM

Comments

really interesting webpage, help for future references


Pseudonym: JuneBug4`
Website: http://computer.howstuffworks.com/logic-bomb.htm
Title: How does a logic bomb work?
Date: 07/03/12
Time: 02:30:18 PM

Comments

This website explains a logic bomb is and how can affect the world of technology?


Pseudonym: yesterworld
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals
Title: Ethical issues for IT security professionals
Date: 07/05/12
Time: 09:23:37 AM

Comments

The website explains what is an ethical issue on an IT environment and how to deal with it


Pseudonym: melow
Website: http://www.youtube.com/watch?v=bIRUaLcvPe8
Title: What is Stakeholder Theory? - R. Edward Freeman
Date: 11/26/12
Time: 10:35:15 AM

Comments

this video gives a great short and concise answer to what the Stakeholder theory is.


Pseudonym: xTWnQIwYZNBuYSYt
Website: http://www.facebook.com/
Title: PjgsUDjFfaORmGDw
Date: 11/29/12
Time: 12:50:50 AM

Comments

Thanks for that! It's just the asnewr I needed.


Pseudonym: VEGASROO
Website: http://ergonomics.about.com/od/ergonomicbasics/a/ergo101.htm
Title: What is Ergonomics?
Date: 11/29/12
Time: 09:45:05 AM

Comments

The website defines and explains ergonomics and related subjects


Pseudonym: london.love
Website: http://en.wikipedia.org/wiki/Intellectual_property
Title: Intellectual Property
Date: 11/29/12
Time: 10:40:33 PM

Comments

This text just goes into further detail about what entails the right of Intellectual Property. It explains how it came about, the way we are protected by it and the limitations.


Pseudonym: 3466
Website: http://www.ijecbs.com/July2011/45.pdf
Title: International Journal of Enterprise Computing and Business Systems
Date: 12/02/12
Time: 07:33:30 AM

Comments

SECURITY AND ETHICAL ISSUES IN IT: AN ORGANIZATION’S PERSPECTIVE


Pseudonym: Sakura19
Website: http://www83.homepage.villanova.edu/richard.jacobs/MPA%208300/theories/social%20contract.html
Title: Gives a quick overview of what social contract theory is and how it affects society
Date: 12/02/12
Time: 02:54:55 PM

Comments

I found this page to be informative in the position that social contract theory has in today's society and how it shapes individuals behaviors.


Pseudonym: passion rose
Website: http://cybercrime.planetindia.net/trojans.htm
Title: Trojans
Date: 12/02/12
Time: 08:26:56 PM

Comments

A good website about the many different types of Trojans such as password trojans, privilages-elevating trojans, key loggers, destructive trojans, joke programs etc.


Pseudonym: 24oas
Website: http://whatismyipaddress.com/hacking
Title: What is hacking?
Date: 12/03/12
Time: 11:12:41 AM

Comments

This website defines the meaning of hacking, and how it has become a big problem with computers. It also explains how it can affect your computer with viruses, worms, and others.


Pseudonym: grpink27
Website: http://computer.howstuffworks.com/napster3.htm
Title: Piracy Issues
Date: 12/03/12
Time: 11:25:31 AM

Comments

Since this chapter is about security and ethical challenges, I decided to find a website that talked about piracy. This site points out a few piracy issues.


Pseudonym: agent butters
Website: http://www.studymode.com/essays/Shareholder-Theory-140222.html
Title: stockholder theory
Date: 12/03/12
Time: 01:08:28 PM

Comments

good website


Pseudonym: agent butters
Website: http://www83.homepage.villanova.edu/richard.jacobs/MPA%208300/theories/social%20contract.html
Title: social theory contract
Date: 12/03/12
Time: 01:10:24 PM

Comments

good website very informative


Pseudonym: da_bowz
Website: www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 12/03/12
Time: 01:27:12 PM

Comments

Lengthy and detailed paper on ethics and crimes, and the defenses that are used against them.


Pseudonym: miners
Website: http://cybercrime.planetindia.net/trojans.htm
Title: Trojans
Date: 12/03/12
Time: 01:27:16 PM

Comments

Contains information of the history of cyber crimes. Gives you examples of how they are commited and even real crimes reported in the news.


Pseudonym: G.A.P.
Website: www.secureworks.com/resources/articles/other_articles/firewall-security/
Title: What is Firewall Security?
Date: 12/03/12
Time: 09:35:24 PM

Comments

In the world of computer firewall protection, a firewall refers to a network device which blocks certain kinds of network traffic, forming a barrier between a trusted and an untrusted network


Pseudonym: faith
Website: http://www.wbs.ac.za/download_files/alumni/Peter-Hawke-Stockholder-StakeholderTalk.pdf
Title: Stockholder Theory vs. Stakeholder
Date: 12/04/12
Time: 11:20:57 AM

Comments

this website is a powerpoint that helped me go in more detailed to what Stockholder Equity is and how it i applied to the business world


Pseudonym: jktubby
Website: http://en.wikipedia.org/wiki/Hacker_(computer_security)
Title: Hacker (computer security)
Date: 12/04/12
Time: 03:36:11 PM

Comments

One of the most interesting topics in computers is hacking. Though i have never done it or would try to do it, this topic should interest you. This article has so much information on it that, it is good for someone who really wants to know what hacking is. It kept me very informative and I would recommend people to read this whole article.


Pseudonym: Alrak.1
Website: http://www.brighthub.com/computing/smb-security/articles/38830.aspx
Title: The Top Ten Famous Computer Viruses
Date: 12/04/12
Time: 05:24:15 PM

Comments

this page have more viruses that we saw in class.


Pseudonym: 1219
Website: http://en.wikipedia.org/wiki/Social_engineering_(security)
Title: Social Engineering (security)
Date: 12/04/12
Time: 08:09:24 PM

Comments

Good website on the definition and other information on social engineering


Pseudonym: caj21
Website: http://reference.yourdictionary.com/word-definitions/Define-Ethics.html
Title: A Closer Look: Definition of Business Ethics
Date: 12/04/12
Time: 11:41:40 PM

Comments

Definition and examples of business ethics


Pseudonym: ChevyCorvette
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: Information Technology
Date: 12/05/12
Time: 11:00:47 AM

Comments

Well explained summary of current internet problems and future risks.


Pseudonym: amelie
Website: http://www.webroot.com/En_US/consumer/articles/computer-security-threats-hackers
Title: Computer Hackers and Predators
Date: 12/05/12
Time: 11:16:40 AM

Comments

This article talks about how computer hackers and predators can find you and harm you by hacking personal information from your computer and other things. I think this article was very informational and useful because it also explained how to protect yourself from these criminals and gave good tips on security on your computer.


Pseudonym: cera8
Website: http://technologizer.com/2012/01/23/why-history-needs-software-piracy/
Title: Why History Needs Software Piracy
Date: 12/05/12
Time: 11:25:16 AM

Comments

A very good article to read!


Pseudonym: Ducati
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology#btnPrevious
Title: Security and ethical challenge
Date: 12/05/12
Time: 11:37:10 AM

Comments

a power point about this chapter


Pseudonym: love3
Website: Wikipedia
Title: Friedman doctrine
Date: 12/05/12
Time: 11:39:23 AM

Comments

It gives a broad explanation of what stockholder theory consist of, how it can be used,and gives examples.


Pseudonym: 082411
Website: http://dornsife.usc.edu/dilemmas-and-case-studies/
Title: possibilities for ethical conflict exist in most fields, this section provides links to sites specifically geared towards providing you with materials relevant to your field.
Date: 12/05/12
Time: 11:55:52 AM

Comments

Gives a lot of good examples of ethic dilemmas and ethical challenges


Pseudonym: namtaB
Website: http://www.informit.com/articles/article.aspx?p=26868
Title: Internetwork Security Overview
Date: 12/05/12
Time: 02:30:51 PM

Comments

This article gives examples of computer systems and their security. It lists different ways that a businesses computer systems can be hacked and things you can do to prevent this. For companies it states that the main reason to have good security is to stop hackers from causing unwanted effects (which it then lists examples of). The article ends by stating that security measures need to be intensified due to the openness of today's communications.


Pseudonym: #!$@babydreamy
Website: http://www.ehow.com/facts_6965834_security-ethical-issues-information-systems.html
Title: Ethical and security issues in the Business world
Date: 12/05/12
Time: 02:40:08 PM

Comments

How and what security measures are taken by companies in 2012


Pseudonym: cmur3
Website: http://www.wto.org/english/tratop_e/trips_e/intel1_e.htm
Title: Intellectual Property Rights
Date: 12/05/12
Time: 02:42:17 PM

Comments

The definition of intellectual property rights direct from the World Trade Organization.


Pseudonym: 6663yeni
Website: http://www.youtube.com/watch?v=psHzxu8DBuE
Title: Stakeholder Theory: Past, Present and Future
Date: 12/06/12
Time: 12:00:47 AM

Comments

good explanation about Stakeholder Theory


Pseudonym: 6663yeni
Website: http://www.youtube.com/watch?v=psHzxu8DBuE
Title: Stakeholder Theory: Past, Present and Future
Date: 12/06/12
Time: 12:00:48 AM

Comments

good explanation about Stakeholder Theory


Pseudonym: siddaap18
Website: http://www.ehow.com/info_8483188_stockholder-theory-vs-stakeholder-theory.html
Title: stakeholder theory
Date: 12/06/12
Time: 09:38:05 AM

Comments

Good explanation


Pseudonym: ConradHilton
Website: http://sloanreview.mit.edu/the-magazine/2003-summer/44411/the-shareholders-vs-stakeholders-debate/
Title: The Shareholders vs. Stakeholders Debate
Date: 12/06/12
Time: 11:26:24 AM

Comments

"Should companies seek only to maximize shareholder value or strive to serve the often conflicting interests a=of all stakeholders?" Shareholder theory and the stakeholder theory are very odds when saying what is right. It is really interesting how they mention what is "right" but it isn't really explicit Therefore you have to know what each theory says and does not say.


Pseudonym: luly
Website: http://www.injuredworker.org/osha_ergonomics.htm
Title: Ergonomics
Date: 12/06/12
Time: 11:34:37 AM

Comments

The reason to have ergonomics in the workplace is pointed out and also its relationship to OSHA.


Pseudonym: Huasausky
Website: http://definitions.uslegal.com/c/computer-hacking/
Title: Computer Hacking Law & Legal Definitinion
Date: 12/06/12
Time: 05:27:49 PM

Comments

This site provides the hacking legal definition and gives all the legal terms about this topic.


Pseudonym: ag1508
Website: http://whatishacking.org/
Title: what is hacking
Date: 12/06/12
Time: 09:46:06 PM

Comments

hacking is practice of modifying documents from original´s creator


Pseudonym: alrok
Website: http://xtremediary.blogspot.com/2009/08/top-12-most-dangerous-virus.html
Title: Top 12 Most Dangerous Virus
Date: 12/06/12
Time: 09:54:00 PM

Comments

Description of the top 12 most dangerous internet viruses.


Pseudonym: Neto
Website: http://reviews.cleanmyspyware.com/what-is-the-definition-of-malware-spyware-adware-and-trojans
Title: What is the definition of malware, spyware, adware and trojans?
Date: 12/06/12
Time: 11:06:29 PM

Comments

This site give a basic concept about this terms, and even thought is not that much information it goes to the point.


Pseudonym: Dolcevita
Website: http://www.opensecurityarchitecture.org/cms/definitions/it-security-architecture
Title: Corporate social responsibility
Date: 12/06/12
Time: 11:58:29 PM

Comments

It explains how important is in business and how is used by companies.


Pseudonym: ch120308
Website: http://www.spamlaws.com/types-of-cyber-crime.html
Title: types of cyber crime
Date: 12/07/12
Time: 02:06:04 PM

Comments

cyber crimes are crimes where computers or networks are used or attacked. Many traditional crimes such as theft, blackmail, forgery, embezzlement and fraud today are all conducted on the internet. This site gives you 6 types of crime. Spam,or the unsolicited sending out of junk e-mails for commercial purposes, which is unlawful. Fraud refers to the fallacious misrepresentation of fact conveyed with an intention of inducing another to do or refrain from doing something that will ultimately lead to some major kind of loss. Obscene or offensive contents of some of the websites and other electronic communications over the net can be really distasteful, obscene or offensive for a variety of reasons. Harassment encompasses all the obscenities and derogatory comments directed towards a specific individual or individuals focusing for example on gender, race, religion, nationality, and sexual orientation. Drug traffickers use the Internet as a medium for trading their illegal substances by sending out enciphered e-mail and other Internet Technology. Cyber terrorism includes hacking into official websites or the crashing of official websites.


Pseudonym: Palomar
Website: http://videos.howstuffworks.com/computer/computer-security-videos.htm
Title: Security in the Computer
Date: 12/07/12
Time: 03:49:16 PM

Comments

The video shows what are some of the features of the anti-virus in Windows Vista


Pseudonym: Baybee2705
Website: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
Title: Ecoinfosec
Date: 12/07/12
Time: 07:16:43 PM

Comments

This paper written by Ross Anderson from the University of Cambridge focuses on the cost of computer (cyber) crime. It is an interesting paper because it brings to light the real cost of computer crimes to businesses and society.


Pseudonym: Mirka
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical issuess
Date: 12/07/12
Time: 10:38:29 PM

Comments

this article takes a look at a neglected area of most computer security professionals' training: how to deal with the ethical issues that can - and invariably do - crop up during the course of doing your job.


Pseudonym: Roselily
Website: http://www.ehow.com/facts_6053960_technology-code-ethics.html
Title: Technology code of ethics
Date: 12/08/12
Time: 12:28:59 PM

Comments

Very good website, goes over the technoloy ethics neede in the cyber world of people and coorporations, while talking about documentation,and obligations of the professional individual.


Pseudonym: chimis
Website: http://cybercrime.planetindia.net/trojans.htm
Title: Cyber crime
Date: 12/08/12
Time: 07:08:03 PM

Comments

Contains information of the history of cyber crime, some of the types, and examples.


Pseudonym: airJ
Website: http://www.mycrypto.net/encryption/how_encryption_works.html
Title: How Encryption Works
Date: 12/08/12
Time: 11:12:08 PM

Comments

Encryption is a fantastic way to protect yourself or your company from computer theft, by making your messages unreadable to others other than yourself.


Pseudonym: charlieflowers
Website: http://computer.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 12/09/12
Time: 11:40:37 PM

Comments

This website offers a history and explanation of how computer viruses work. It also covers how viruses have evolved and goes in depth on the different types of viruses from e-mail viruses to trojan horses and worms. It also offers advice on how to avoid getting infected and what you can do if you are infected.


Pseudonym: Aquiles Baesta
Website: http://www.fas.org/sgp/library/nispom/change_ch8.htm
Title: Enhance the security of Information Systems and Networks
Date: 12/10/12
Time: 10:23:53 AM

Comments

The website provides reasons of over the importance of having a safe system and explains the development of a secure network.


Pseudonym: Jacob45
Website: http://www.ehow.com/facts_6965834_security-ethical-issues-information-systems.html
Title: Ethical and Security Issues of Information Systems
Date: 12/10/12
Time: 11:03:42 AM

Comments

The website gives the basics and issues of what security and ethical issues are.


Pseudonym: laeinaudi
Website: http://en.wikipedia.org/wiki/Defense_Information_Systems_Agency
Title: Virus Defense Systems
Date: 12/10/12
Time: 08:42:00 PM

Comments

In the following reference you will be able to read substantial information of the U.S. Department of Defense Defense Information System Agency and the different types of data bases defenses they have to protect or monitor information via Internet.


Pseudonym: pajarita
Website: http://www.time.com/time/business/article/0,8599,1933796,00.html
Title: history of spam
Date: 12/11/12
Time: 01:23:20 AM

Comments

This article in the magazine "TIME" talks about how spamming has affected millions of internet users around the world, ever since 1978.


Pseudonym: MoMoBanks
Website: http://epic.org/privacy/ecpa/
Title: Electronic Communications Privacy Act (ECPA)
Date: 12/11/12
Time: 02:31:38 AM

Comments

This is a background description of the ECPA and how it includes the Wiretap Act, the Stored Communications Act, and the Pen-Register Act. It is an information page that gives the detail on what this Act includes and how it affects law enforcement and our privacy rights. It gives info on the interception and access of communications such as phone calls and emails.


Pseudonym: Pale1
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Scribd
Date: 12/11/12
Time: 10:12:12 AM

Comments

A document that outlines the issues with security and ethical challenges.


Pseudonym: eetc
Website: http://www.colorado.edu/geography/gcraft/notes/ethics/ethics_f.html
Title: New computer technologies for gathering, storing, manipulating, and communicating data are revolutionizing the use and spread of information. Along the way, they are also creating ethical dilemmas. The speed and efficiency of electronic information systems, which include local and global networks, databases, and programs for processing information, force people to confront entirely new rights and responsibilities in their use of information and to reconsider standards of conduct shaped before the advent of computers.
Date: 12/11/12
Time: 02:08:17 PM

Comments

For informational technology security and ethical challenges are both beneficial on the society and people. For example, to optimize the beneficial effects.


Pseudonym: Rondo
Website: http://www.ncbi.nlm.nih.gov/pubmedhealth/PMH0001469/
Title: Carpal Tunnel Syndrome
Date: 12/11/12
Time: 03:35:24 PM

Comments

The website talks about carpal tunnel syndrome


Pseudonym: s464
Website: http://www.informit.com/articles/article.aspx?p=26868
Title: internetwork security overview
Date: 12/11/12
Time: 03:45:51 PM

Comments

this website is an article discussing internetwork security defense.


Pseudonym: benji1224
Website: http://www.slideshare.net/engineerrd/security-and-ethical-challenges
Title: Security and Ethical Challenges
Date: 12/11/12
Time: 03:57:41 PM

Comments

This is a presentation with slides that shows and talks about the security in computers and how hacking has become a dangerous threat in the modern networks.


Pseudonym: Allday
Website: http://practicalaction.org/technology-justice
Title: technological justice
Date: 12/11/12
Time: 10:05:24 PM

Comments

a way to ensure that every one around the workd has access to the basic needs.


Pseudonym: Good lookin
Website: http://www.wbs.ac.za/download_files/alumni/Peter-Hawke-Stockholder-StakeholderTalk.pdf
Title: It debates between the stake holder and share holder.
Date: 12/12/12
Time: 09:05:31 AM

Comments

these series of slides demostrates the similes and contrast of a stockholder.


Pseudonym: Dgonzalez14
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 12/12/12
Time: 04:00:07 PM

Comments

Breaks down all the ethical issues that can possibly be encountered and how to deal with them. Interesting read


Pseudonym: Lady2Luv
Website: http://www.beyondidentitytheft.com/dumpster-diving.html
Title: dumpster diving
Date: 12/12/12
Time: 04:20:29 PM

Comments

I did not know how many people are d0ing this. but I did not know how many people actually do this and it is amazing what kind of information they find and get away with.


Pseudonym: emmendez2
Website: http://en.wikipedia.org/wiki/Association_of_Information_Technology_Professionals
Title: Association of Information Technology Professionals
Date: 12/13/12
Time: 09:11:05 AM

Comments

The Association of Information Technology Professionals (AITP) is a professional association that focuses on information technology education. The group is a non-profit national group, but its activities are performed by about 200 local chapters organized on a geographic basis, and a similar number of student chapters at college and universities.


Pseudonym: Batman
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Ethicsl Issues for IT Security Professionals
Date: 12/13/12
Time: 12:36:36 PM

Comments

The author of this article explains the issues relating to IT ethics. She uses the example of the "slipper slope" where people may start by doing things that don't seem unethical( like scanning other employees emails just for fun) to doing things that are completely unethical (like sending the email to the wrong person or making changes to such email)


Pseudonym: Mini.A
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: provides a slideshow of the chapter
Date: 12/13/12
Time: 03:17:11 PM

Comments

has a really cool slideshow about the whole chapter that includes definitions and other important information


Pseudonym: pya
Website: http://www.copyright.gov/docs/regstat052505.html
Title: Piracy of Intellectual Property
Date: 12/13/12
Time: 04:11:25 PM

Comments

This is a government page where it states everything that you have to know about the Piracy of Intellectual Property. Where it provides detail of the legal framework there has to be, as well, as how it should be enforced. Of course, it also gives some cases of the challenges that this is having with specific countries.


Pseudonym: Mr. Norris
Website: http://www.mediaite.com/online/pentagons-missile-defense-staff-warned-to-stop-surfing-porn-sites-at-work/
Title: Pentagon’s Missile Defense Staff Warned To Stop Surfing Porn Sites At Work
Date: 12/13/12
Time: 06:52:22 PM

Comments

Article gives creditability to the 90% of employees who surf recreational sites while at work. Plus you mentioned this in your lecture. I thought it was interesting how even the most professional of people aren't doing what is expected.


Pseudonym: Bert
Website: http://www.windowsecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: Window Security
Date: 12/13/12
Time: 07:02:15 PM

Comments

Security systems


Pseudonym: chiefitox
Website: http://www.allsands.com/health/diseases/trojanstrojanv_zjy_gn.htm
Title: Trojan Horse Virus: Facts And Prevention
Date: 12/13/12
Time: 08:24:59 PM

Comments

This posting is very useful to anybody who uses a computer. It describes what a trojan horse viruse is, what it can do, and how it operates. What is very useful is the prevention part of the article which baasically says what you should do to prevent your computer from getting infected. They are no brainer but somtimes it may skip our mind and the average user may not take the security warings serious. Also anti virus software is something everyone should have if they use the internet on a daily basis. Even when one is checking their e-mail they should know who the sender is and only download a run software from a credible source.


Pseudonym: dragonfly
Website: http://www.bu.edu/tech/security/firewalls/host/intro/
Title: How Firewalls Work
Date: 12/13/12
Time: 10:19:25 PM

Comments

Firewall definition and the different firewalls (host-based firewall and a network-based firewall).


Pseudonym: BlackMamba
Website: http://www.scribd.com/doc/4545675/Security-and-Ethical-Challenges-
Title: Security and Ethical Challenges
Date: 12/13/12
Time: 11:38:45 PM

Comments

This is a set of powerpoint slides about security and ethical challenges


Pseudonym: insanerasberry
Website: http://www.scribd.com/doc/4545675/Security-and-Ethical-Challenges-
Title: Security and Ethical Challenges
Date: 12/13/12
Time: 11:43:48 PM

Comments

Lecture on security and ethical challenges


Pseudonym: Jason Bourne
Website: http://computer.howstuffworks.com/virus5.htm
Title: The Making of a Computer Worm
Date: 12/14/12
Time: 03:04:26 AM

Comments

A very in-depth article explaining computer viruses and worms.


Pseudonym: fer040
Website: http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?pagewanted=all&_r=0
Title: Do We Need a New Internet?
Date: 12/14/12
Time: 03:27:43 AM

Comments

An article by the New York Times, "Do We Need a New Internet?" states that security experts and engineers are so concerned about the fragility of the internet, that some claim it is best to start over. These claims were made after a software program from Eastern Europe appeared and managed to break down one of the world's best cyber defenses. Conficker, the infamous software, has the power to infect computers and later combine them into a "supercomputer" that can be manipulated by the creators. At Stanford, experts are attempting to re-create a "new internet," after numerous and unfortunate incidents have portrayed how weak and insecure the internet can be.


Pseudonym: Shaggy
Website: http://highered.mcgraw-hill.com/sites/0073376760/student_view0/chapter13/
Title: Security and Ethical challenges
Date: 12/14/12
Time: 10:38:11 AM

Comments

"Ethical Responsibility in Business. Business and IT activities involve many ethical considerations. Basic principles of technology and business ethics can serve as guidelines for business professionals when dealing with ethical business issues that may arise in the widespread use of information technology in business and society. Examples include theories of corporate social responsibility, which outline the ethical responsibility of management and employees to a company’s stockholders, stakeholders, and society, and the four principles of technology ethic"


Pseudonym: Vd3725
Website: http://www.cert.org/tech_tips/email_bombing_spamming.html
Title: Email Bombing and Spamming
Date: 12/14/12
Time: 10:50:17 AM

Comments

This website provides an overview on the concepts and causes of spamming as well as on the alarming increasing rate of spams.


Pseudonym: kike
Website: http://www.webopedia.com/TERM/T/Trojan_horse.html
Title: What is a Trojan horse?
Date: 12/14/12
Time: 10:50:40 AM

Comments

This article helped me understand what a trojan horse refers to as far as IT is conners and be able to distinguish the difference form a virus and a trojan horse.


Pseudonym: zez763
Website: http://www.ergonomics.org/
Title: Defenition of ergonomics and attention to issues and solutions.
Date: 12/14/12
Time: 10:51:14 AM

Comments

It gives us the origin of the word ergonomics and its history. Following that it tell us that people are unaware of the problems of bad posture, joint and muscle functions. Furthermore it gives us the Alexander method which helps to make the connection between mind and body to correct our bad habits.


Pseudonym: squirt
Website: http://www.slideshare.net/infinityrulz/security-ethical-challenges13
Title: slideshare
Date: 12/14/12
Time: 10:55:54 AM

Comments

This website has over 60 powerpoint slides with almost all the information provided in class, but with the difference that I found this much more easy to understand Chapter 13 Security and Ethical Challenges


Pseudonym: KLEO15
Website: http://www.makeuseof.com/tag/5-common-tactics-hack-passwords/
Title: The 5 Most Common Tactics Used to Hack Passwords
Date: 12/14/12
Time: 01:47:09 PM

Comments

Discusses the top 5 ways in which hackers try and guess your password and the ways you can try and prevent that.


Pseudonym: teritap
Website: http://www.microsoft.com/security/pc-security/virus-whatis.aspx
Title: What is a computer virus?
Date: 12/14/12
Time: 02:22:15 PM

Comments

This website explains what is a computer virus and how it works


Pseudonym: alphaxi1893
Website: http://articles.washingtonpost.com/2012-06-19/world/35460741_1_stuxnet-computer-virus-malware
Title: U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say
Date: 12/17/12
Time: 09:05:43 PM

Comments

More information about Flame computer virus and it's role in trying to prevent terrorist attacks.


Pseudonym: Dallas Cowboys
Website: Site: http://www.wgsoftpro.com/pages/engpages/enolap.shtml
Title: Development of Database Management.
Date: 03/18/13
Time: 02:50:50 PM

Comments

It is the website of a company. The main goal is development and introduction of the existing solutions into a branch of database management systems that are primary for managing and accounting for all kinds of companies and corporations


Pseudonym: Sinigang
Website: http://istheory.byu.edu/wiki/Stakeholder_theory
Title: Stakeholder's Theory
Date: 03/20/13
Time: 10:01:39 AM

Comments

Numerous views of Stakeholder Theory are presented in the literature though a key distinction can be drawn between the tenets of Stakeholder Theory and the conventional input-output model of the firm which see firms as converting investor, supplier, and employee inputs into customer outputs (Donaldson and Preston, 1995). In contrast, Stakeholder theory argues that every legimate person or group participating in the activities of a firm do so to obtain benefits and that the priority of the interests of all legitimate stakeholders is not self-evident


Pseudonym: Lakers08
Website: http://searchsecurity.techtarget.com/definition/dumpster-diving
Title: What is dumpster diving?
Date: 04/11/13
Time: 01:11:55 PM

Comments

I didn't really understand what dumpster diving was for computers, so I found this short article that gives the definition of dumpster diving and gives an example. It helped my understand the meaning of dumpster diving.


Pseudonym: spidey
Website: http://www.technewsworld.com/story/47833.html
Title: Study of Data Loss, Network Vulnerabilities, and Top Security Issues
Date: 04/24/13
Time: 10:35:37 PM

Comments

I like this site because these issues occur often and they must be fixed. There is always security threats and data loss with computer use.


Pseudonym: karla23
Website: http://highered.mcgraw-hill.com/sites/0073376760/student_view0/chapter13/
Title: Security and Ethical Challenges
Date: 04/25/13
Time: 02:26:16 PM

Comments

This web page has a good and specific information about security and ethical challenges. You can grow your knowledge reading this article about this topic


Pseudonym: Theoretical
Website: http://www.brighthub.com/internet/security-privacy/articles/3437.aspx
Title: Encryption & Firewalls for Home Computer Use
Date: 04/25/13
Time: 06:45:43 PM

Comments

This article explains how encryption software works on a computer to help keep your data safe from getting stolen.


Pseudonym: 93nanis
Website: https://www.youtube.com/watch?v=a8hZQxWC3A8
Title: Viruses, Worms and Trojans...Oh my!
Date: 04/29/13
Time: 02:20:23 PM

Comments

This video shows an animated explanation of how viruses, worms, and trojan horses get to your computer and what they do.


Pseudonym: Duke1duke
Website: http://freegan.info/what-is-a-freegan/freegan-practices/urban-foraging/diving-and-the-law/
Title: Freegan.info
Date: 04/29/13
Time: 03:35:32 PM

Comments

helps you with a definition and backgrounds of it that can give you further depth of what ever term youre looking for


Pseudonym: paulinap5
Website: www.business-ethics.com
Title: Business Ethics
Date: 04/30/13
Time: 12:02:35 PM

Comments

An online magazine where you can find stories about companies dealing with business ethics.


Pseudonym: Sauce
Website: http://www.cnn.com/2008/BUSINESS/09/25/digital.ethics/
Title: Making ethical decisions is, after all, a common task now in the realm of personal technology.
Date: 04/30/13
Time: 03:31:07 PM

Comments

The ethics surrounding decision making with regards to technology


Pseudonym: rizoc0
Website: https://en.wikipedia.org/wiki/Human_factors_and_ergonomics
Title: Human factors and ergonomics
Date: 04/30/13
Time: 11:04:37 PM

Comments

This wiki page explains the study of designing equipment and devices that fit the human body and its cognitive abilities


Pseudonym: slizzy13
Website: http://www.slideshare.net/yuvarajyamaha168/module-8-security-and-ethical-challenges
Title: This is a slide show that talks about ch 13
Date: 05/01/13
Time: 09:43:36 AM

Comments

Great detailed content


Pseudonym: jade01
Website: http://www.ibe.org.uk/
Title: Institute of Business Ethics
Date: 05/03/13
Time: 12:31:04 PM

Comments

This site helps organizations by raising public awareness of the importance of doing business ethically


Pseudonym: Elvis
Website: http://www.bsa.org/anti-piracy/anti-piracy-agenda
Title: Anti-Piracy Agenda
Date: 05/03/13
Time: 12:44:26 PM

Comments

Informative website. It explains to you what it is, how it's enforced and what can be done about it. It even has a section regarding world wide piracy. Very good.


Pseudonym: D3luq
Website: http://en.wikipedia.org/wiki/Copyright_infringement_of_software
Title: The copyright infringement of software (often referred to as software piracy) refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind varies globally.
Date: 05/03/13
Time: 04:45:10 PM

Comments

Most countries extend copyright protections to software. Even the oldest legacy computer systems used today will not have their copyright expire until 2030. In the United States, copyright term has been extended many times over from the original term of 14 years with a single renewal allowance of 14 years, to the current term of the life of the author plus 70 years. If the work was produced under corporate authorship it may last 120 years after creation or 95 years after publication, whichever is less.


Pseudonym: dreamdrea7
Website: http://www.windowsecurity.com/articles-tutorials/misc_network_security/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 05/03/13
Time: 08:05:44 PM

Comments

Very good webpage with practical and important information on ethical issues for those in IT. Includes why ethical guidelines are needed as well examples of some issues along with real world applications.


Pseudonym: dali0525
Website: http://www.creum.umontreal.ca/IMG/pdf/Heath_Norman_final_preproof.pdf
Title: Stakeholder Theory, Corporate Governance and Public Management
Date: 05/05/13
Time: 02:26:19 PM

Comments

This website defines Stakeholder Theory along with Corporate Governance and Public Management and was later published in the Journal of business Ethics. It details all three theories and gives problem examples for each.


Pseudonym: 6sense
Website: http://www.wisegeek.com/what-are-the-issues-surrounding-computer-privacy.htm
Title: What Are the Issues Surrounding Computer Privacy?
Date: 05/05/13
Time: 08:32:06 PM

Comments

It talks about the issues sorrounding computer privacy, it talks about that computer privacy can change just as fast as technology is changing because just as fast as people adopt technology different issues of computer privacy change.It talks about people who adopt technology without them knowing have they steps traced,and should the government be the ones tracking information or businesses.


Pseudonym: SemperFi
Website: http://www.aitp.org/
Title: Welcome to AITP The premier network of information technology business professionals.
Date: 05/05/13
Time: 08:47:31 PM

Comments

Official website of AITP


Pseudonym: SemperFi
Website: http://www.aitp.org/
Title: Welcome to AITP The premier network of information technology business professionals.
Date: 05/05/13
Time: 08:47:58 PM

Comments

Official website of AITP


Pseudonym: Kumar
Website: http://www.independent.co.uk/news/business/comment/jim-armitage-hacking-exposes-shoddy-internet-engineering-8554671.html
Title: Jim Armitage: Hacking exposes shoddy internet engineering
Date: 05/06/13
Time: 01:20:19 AM

Comments

Its about how hackers slowed down the speed of the internet.


Pseudonym: SingSing
Website: http://www.osha.gov/SLTC/ergonomics/
Title: Safety and Health topics
Date: 05/06/13
Time: 10:59:16 AM

Comments

This website provides a great overview on what ergonomics is on behalf of the department of labor.


Pseudonym: Mariela
Website: ISSN (Online) : 2230- ISSN (Online) : 2230---8849
Title: International Journal of Enterprise Computing and B International Journal of Enterprise Computing and Business usiness Systems Systems
Date: 05/07/13
Time: 04:19:37 PM

Comments

Challenges, Ethics, Information System, Information Technology, Security


Pseudonym: peair
Website: http://informe.com/skurfit.com/
Title: Computer Viruses
Date: 05/07/13
Time: 07:20:29 PM

Comments

The websites provides answer form experts who know how to fix a computer virus


Pseudonym: Hobbit
Website: http://www.heritage.org/index/property-rights
Title: Property Rights
Date: 05/07/13
Time: 11:37:40 PM

Comments

In this page the author explains what property rights are and how they deal with equity.


Pseudonym: Karly
Website: http://www.nyu.edu/its/policies/sec_datasys.html
Title: These are some measures of security that every organization should take into account when running a business
Date: 05/08/13
Time: 10:36:42 AM

Comments

This article adresses any one who controls or works with a computer system like one for any university. the security measures are important and there are basic safety procedures anyone should take into account when operating such systems.


Pseudonym: scandigirl
Website: http://www.nytimes.com/2013/05/08/world/middleeast/syria-golan-heights-united-nations.html?ref=world
Title: U.S. and Russia Plan Conference Aimed at Ending Syrian War
Date: 05/08/13
Time: 11:00:33 AM

Comments

Russia and the United States announced that they would seek to convene an international conference within weeks aimed at ending the civil war in Syria, jointly intensifying their diplomatic pressure on the combatants to peacefully settle a conflict that has taken more than 70,000 lives and left millions displaced and desperate.


Pseudonym: enron
Website: http://www.time.com/time/world/article/0,8599,2053699,00.html
Title: Attack of the Love Bug
Date: 05/08/13
Time: 01:47:14 PM

Comments

This is great article detailing the virus called the "love Bug."


Pseudonym: mandres22
Website: http://hackingschoolfb.blogspot.com/2012/07/how-to-do-hacking-though-trojan-horse.html
Title: How to hack using a trojan horse
Date: 05/09/13
Time: 10:12:19 AM

Comments

basically explains how trojan horses are used and how to install and use them.


Pseudonym: vdelga36
Website: http://www.entrepreneur.com/encyclopedia/prototype#
Title: prototype
Date: 05/09/13
Time: 01:20:32 PM

Comments

The original model on which something was based or formed. It enables to test the funcionality of your design. You can test its performance, describe your product and.encourage others to use it.


Pseudonym: Alets
Website: http://ergonomics.about.com/od/ergonomicbasics/a/ergo101.htm
Title: ergonomics
Date: 05/10/13
Time: 12:38:31 AM

Comments

I understood better the definition of ergonomics in this website


Pseudonym: bolt987
Website: http://www.apa.org/about/gr/issues/workforce/ergonomics.aspx
Title: Ergonomics: The Science For Better Living and Working
Date: 05/12/13
Time: 05:11:20 PM

Comments

This website was very helpful in getting an quick overview of what ergonomics is. The science to it, how it got started and how it is used. Very helpful when trying to find brief history.


Pseudonym: wacho
Website: http://en.wikipedia.org/wiki/Intellectual_property
Title: intellectual property rights
Date: 06/12/13
Time: 03:12:43 PM

Comments

the best page to find this concept


Pseudonym: game of thrones fan
Website: http://www.businessweek.com/articles/2013-06-14/just-thinking-about-money-can-make-you-unethical
Title: Just Thinking About Money Can Make You Unethical
Date: 06/29/13
Time: 02:40:02 PM

Comments

Article from Business Week on Business Ethics


Pseudonym: SubsonicJoint
Website: http://us.norton.com/internet-security
Title: Norton Anti-Virus
Date: 07/01/13
Time: 04:49:01 AM

Comments

Number 1 internet security provider has a relevant article on how they try to keep out computers safe from fishing and other malicious hardware.


Pseudonym: bmisk80
Website: http://www.us-cert.gov/ncas/tips/ST04-015
Title: Understanding Denial-of-Service Attacks
Date: 07/01/13
Time: 06:27:26 PM

Comments

Article gives you a description of DoS attacks and how to avoid them.


Pseudonym: TeslaUTD
Website: http://www.escapistmagazine.com/news/view/94524-Arkham-Asylum-Pirates-Get-a-Gimpy-Batman
Title: Digital Rights Management
Date: 07/01/13
Time: 06:54:40 PM

Comments

This article talks about how video game developer is trying to fight piracy of their games. They're thinking of new a innovative ways to fighting piracy. I support what they are doing because they aren't necessarily condemning file sharing, rather they are providing gamers a new incentive paying for their games rather than illegally downloading their software.


Pseudonym: tia13
Website: http://lifehacker.com/5560443/whats-the-difference-between-viruses-trojans-worms-and-other-malware
Title: What is the difference between viruses, trojans, worms and other malware?
Date: 07/01/13
Time: 09:30:49 PM

Comments

The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared Some of the most famous worms include the ILOVEYOU worm, transmitted as an email attachment, which cost businesses 5.5 billion dollars in damage.


Pseudonym: ramos1
Website: https://en.wikipedia.org/wiki/Business_ethics
Title: Business ethics (also corporate ethics) is a form of applied ethics or professional ethics that examines ethical principles and moral or ethical problems that arise in a business environment. It applies to all aspects of business conduct and is relevant to the conduct of individuals and entire organizations.
Date: 07/01/13
Time: 10:11:08 PM

Comments

Helpful website. It gave the definition and examples of what business ethics are.


Pseudonym: McLovin_24
Website: http://www.howstuffworks.com/virus.htm
Title: How Computer Viruses Work
Date: 07/01/13
Time: 11:27:16 PM

Comments

This is a very thorough article about what computer viruses are and how they work. The article discusses the origins, history, evolution, the various types of viruses, and how to protect yourself from computer viruses. Awesome site the information was very useful.


Pseudonym: Spiffy9899
Website: http://www.forbes.com/sites/devinthorpe/2013/05/18/why-csr-the-benefits-of-corporate-social-responsibility-will-move-you-to-act/
Title: Why CSR? The Benefits Of Corporate Social Responsibility Will Move You To Act
Date: 07/02/13
Time: 12:09:00 AM

Comments

This a a great article pertaining to the benefits of CSR


Pseudonym: Amy1212/
Website: http://www.kaspersky.com/threats/what-is-a-trojan-virus
Title: Trojan Virus
Date: 07/02/13
Time: 10:24:26 AM

Comments

This website is very helpful because it explains what a Trojan virus is and what we can do to stop this kind of virus.


Pseudonym: reydrian
Website: http://www.economist.com/news/international/21579816-denial-service-attacks-over-internet-are-growing-easier-and-more-powerful-their
Title: Computer says no
Date: 07/02/13
Time: 11:20:12 AM

Comments

This article talks about the use of zombie computers to perform DDOS attacks and compromise system availability.


Pseudonym: 03192010
Website: http://www.microsoft.com/security/pc-security/virus-whatis.aspx
Title: What is a computer virus?
Date: 07/02/13
Time: 11:58:13 AM

Comments

A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.


Pseudonym: nopainnogain
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: Anti-Virus Software
Date: 07/02/13
Time: 12:11:42 PM

Comments

On this page, the history of anti-virus software is discussed. The very first one emerged in 1987. There are identification methods, issues of concern, and other methods also presented.


Pseudonym: a2dasj86
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals
Title: Ethical issues for IT security professionals
Date: 07/02/13
Time: 12:33:17 PM

Comments

It is important that upper management treats its employees fairly and with respect


Pseudonym: purpley
Website: http://www.iep.utm.edu/soc-cont/
Title: social contract theory
Date: 07/02/13
Time: 12:42:59 PM

Comments

it is a very complete page that talks about the social contract theory. also mentions Socrate's argument, the modern social theory and more.


Pseudonym: piki3497
Website: http://www.ibe.org.uk/
Title: Business Ethics
Date: 07/02/13
Time: 12:56:23 PM

Comments

The webpage is of an organization which dedicates itself to business ethics. It is possible for anyone to look into any topic of business ethics and find a respond.


Pseudonym: jordan99
Website: http://en.wikipedia.org/wiki/Ergonomics
Title: Human factors and ergonomics
Date: 07/02/13
Time: 01:47:31 PM

Comments

This is an easy to read/understand wikipedia sight on Ergonomics. It provides a detailled definition and examples of Ergonomics.


Pseudonym: 01Robina
Website: http://www.iss.net/security_center/advice/Underground/Hacking/default.htm
Title: hacking
Date: 07/02/13
Time: 03:25:29 PM

Comments

What exactly is hacking, and how to prevent them.


Pseudonym: Dorian32
Website: http://www.cga.ct.gov/2012/rpt/2012-R-0254.htm
Title: Penalties for hacking
Date: 07/02/13
Time: 04:09:28 PM

Comments

I think computer hacking is very complex and interesting but this shows how much time you can pay for hacking a computer.


Pseudonym: gelmon
Website: http://www.albany.edu/~goel/classes/fall2006/pdp/Privacy.pdf
Title: Privacy and Legislation
Date: 07/02/13
Time: 04:33:47 PM

Comments

This article is an example of ethical challenges that arise in the Legislation branch of the government. The ethical problem covered in this article is privacy, which is one of the most inmportant problems in almost all businesses.


Pseudonym: 01batman
Website: http://www.ehow.com/facts_5860930_definition-identity-cyber-theft.html
Title: Cybertheft
Date: 07/02/13
Time: 05:36:10 PM

Comments

If you give the definition and also gives you the purpose of this and the methods that I can be use.


Pseudonym: chago239
Website: http://www.slideshare.net/invincy/ethical-issues-in-business-10594388
Title: Ethical Issues in Business
Date: 07/02/13
Time: 07:08:09 PM

Comments

This website talks about what ethics, business ethics, and the importance of business ethics are.


Pseudonym: jmk1335
Website: http://www.combofix.org/what-is-trojan-horse-virus-and-how-to-remove-it-manually.php
Title: What is Trojan horse virus and how to remove it manually
Date: 07/02/13
Time: 09:04:26 PM

Comments

This was an enlightening read. I don't know much about computers, I know about viruses but I did not know how to manually delete them.


Pseudonym: SPIDERMAN26
Website: http://www.maxdev-turkey.com/protecting-business-against-trojan-horse-software-programs.html
Title: Protecting the Business Against Trojan Horse Software Programs
Date: 07/02/13
Time: 09:37:43 PM

Comments

This article explains how businesses can protect themselves from trojan horses


Pseudonym: gia1
Website: http://www.spamlaws.com/types-of-cyber-crime.html

Title: types of cyber crime
Date: 07/02/13
Time: 09:57:57 PM

Comments

Cyber crimes are crimes where computers or networks are used or attacked. Many traditional crimes such as theft, blackmail, forgery, embezzlement and fraud today are all conducted on the internet. This site gives you 6 types of crime. Spam,or the unsolicited sending out of junk e-mails for commercial purposes, which is unlawful. Fraud refers to the fallacious misrepresentation of fact conveyed with an intention of inducing another to do or refrain from doing something that will ultimately lead to some major kind of loss. Obscene or offensive contents of some of the websites and other electronic communications over the net can be really distasteful, obscene or offensive for a variety of reasons. Harassment encompasses all the obscenities and derogatory comments directed towards a specific individual or individuals focusing for example on gender, race, religion, nationality, and sexual orientation. Drug traffickers use the Internet as a medium for trading their illegal substances by sending out enciphered e-mail and other Internet Technology. Cyber terrorism includes hacking into official websites or the crashing of official websites.


Pseudonym: aslozoya
Website: http://whatismyipaddress.com/hacking
Title: Hacking
Date: 07/02/13
Time: 10:44:18 PM

Comments

This website provides good definitions and information to understand about hacking


Pseudonym: psmo22
Website: http://www.windowsecurity.com/articles-tutorials/misc_network_security/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 07/02/13
Time: 11:03:55 PM

Comments

everything high valuable in this world has a high risk of been stolen. fot IT, this is not exception. even though IT can be very secure, there is always a way to break in. another issue for IT is the ethical. whats right and whats wrong is a question that can be subjective to each person. this article will help us understand and maybe answer some of our questions.


Pseudonym: mariposa
Website: http://highered.mcgraw-hill.com/sites/0073376760/student_view0/chapter13/
Title: Security and Ethical Challenges
Date: 07/02/13
Time: 11:21:22 PM

Comments

This reference is good to understand the new security and ethical changes that have arrived with new technology. It is very clear and interesting to read.


Pseudonym: ghost602
Website: http://www.lexology.com/library/detail.aspx?g=bcf7422b-0274-4bb4-8c0a-8f26d74c7c92
Title: Best practices for internet security
Date: 07/02/13
Time: 11:27:25 PM

Comments

Web article about keeping information safe on the internet. Offers tips for best practices for home and public computers, password protection, email, and social networking.


Pseudonym: zianav2348
Website: http://highered.mcgraw-hill.com/sites/0073376760/student_view0/chapter13/
Title: Security and Ethical Challenges
Date: 07/02/13
Time: 11:27:36 PM

Comments

This article is not long and it gives definition and also important information is discuss.


Pseudonym: Girl325
Website: http://en.wikipedia.org/wiki/Information_security
Title: Information Security
Date: 07/03/13
Time: 12:29:10 AM

Comments

Defined information security and listed the issues associated with technology.


Pseudonym: vivian
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?pageNumber=1
Title: Ethical issues for IT security professionals
Date: 07/03/13
Time: 12:32:33 AM

Comments

gives ethical guidelines needes for people in the IT field or people who is creating their websites.


Pseudonym: Truly0221
Website: http://www.f-secure.com/v-descs/backdoor.shtml
Title: Your secruity our pride anytime anywhere any device: protecting the irrplaceable
Date: 07/03/13
Time: 08:16:39 AM

Comments

Sells software for all kinds of devices computers phone and more to prevent people mainly hackers and unwanted guests from being able to get into the device and files on there and take what isn't theirs.


Pseudonym: Charlie1427
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?pageNumber=1
Title: Ethical issues for IT strategies
Date: 07/03/13
Time: 11:12:58 AM

Comments

Associations and organizations for IT pros are beginning to address the ethical side of the job, but again, there is no requirement for IT security personnel to belong to those organizations.


Pseudonym: Lehan
Website: http://www.scu.edu/ethics/practicing/focusareas/business/
Title: Business Ethics Situations
Date: 07/03/13
Time: 12:27:59 PM

Comments

There are many ideal concepts that define what business ethics consists of. This website lets you understand the many choices that comes from business ethics and it gives you different situation which you may encounter yourself as a manager.


Pseudonym: Quesadilla8
Website: http://lexicon.ft.com/Term?term=stakeholder-theory
Title: Stakeholder theory
Date: 07/03/13
Time: 02:48:30 PM

Comments

The reference describes what is the stakeholder theory and gives some examples.


Pseudonym: SNCZDMR
Website: http://www.cert.org/homeusers/HomeComputerSecurity/
Title: Home Computer Security
Date: 07/04/13
Time: 10:55:33 PM

Comments

This website takes you step by step on what computer hacking is, how to prevent it, and how to secure your information. This was the only website that I found that actually took you step by step.


Pseudonym: sharkyboyept
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?taxonomyId=016
Title: Ethical issues for IT security professionals
Date: 11/07/13
Time: 12:42:55 PM

Comments

says privacy is a main issue


Pseudonym: dontay91
Website: http://www.computerworld.com/s/article/82908/Ten_ways_to_defend_against_viruses
Title: defend against viruses
Date: 11/18/13
Time: 10:02:10 AM

Comments

Keeping antivirus software up to date is critically important for all platforms, even if some of the operating systems, such as Macintosh and Linux, aren't as widely targeted by virus threats. But the key to ensuring that your network remains virus-free is something beyond the deployment of dependable antivirus solutions.


Pseudonym: juang7
Website: http://www.ehow.com/info_8483188_stockholder-theory-vs-stakeholder-theory.html
Title: Stockholder Theory Vs. Stakeholder Theory
Date: 11/19/13
Time: 07:11:45 PM

Comments

This website explain what are the stockholder and stakeholder theory, also it explains the relationship of the two theories with ethics and regulation


Pseudonym: pacman2010
Website: http://thrivenetworks.com/blog/2011/09/22/how-hackers-use-backdoors-to-access-a-network/
Title: How Hackers Use Backdoors to Access a Network
Date: 11/20/13
Time: 04:18:00 PM

Comments

This article goes into detail about how hackers actually intrude into networks via the back door method. I found it to be quite interesting and it motivated me to clean up my computer account info.


Pseudonym: sparrow28
Website: http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Title: Trojan Horse (Computing)
Date: 11/21/13
Time: 09:46:32 AM

Comments

Explains what the Trojan hacking program does to an operating system. Gives detailed information how it works and what it can do as well as what its current use is. As well as provides a small brief history description into how it got its name.


Pseudonym: acct_asd
Website: http://www.armor2net.com/knowledge/hackers_methods.htm
Title: The most common methods used by Hackers
Date: 11/21/13
Time: 12:28:08 PM

Comments

This website shows the most common methods used by intruders to gain control of home computers are demonstrated in this website. The website shows eight main ways of how hackers get confidential information.


Pseudonym: MissCarter28
Website: http://ehs.okstate.edu/modules/ergo/What.htm
Title: Ergonomics: What Is It?
Date: 11/23/13
Time: 10:20:13 PM

Comments

What does Ergonomics consist of? Find out!


Pseudonym: rattler2011
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: Antivirus Software
Date: 11/25/13
Time: 09:50:40 AM

Comments

Antivirus software helps to protect against uch as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Many anti virus software was developed in the late 1980s but later was limited to self-reproduction.


Pseudonym: a24ever
Website: http://en.wikipedia.org/wiki/Backdoor_(computing)
Title: Backdoor (computing)
Date: 11/25/13
Time: 03:43:42 PM

Comments

This website explains in great detail the meaning of backdoor. It gives you examples that are very easy to understand and ways to prevent this threat. It is a great article that helped me better understand the definition of a backdoor.


Pseudonym: mf0109
Website: http://www.c-s-i.org/cyber-crime/
Title: Cyber Crime
Date: 11/25/13
Time: 07:10:04 PM

Comments

This website defines cyber crime (computer crime) and describes the different types of cyber crimes which include phishing, hacking and stalking and/or harassment. It also provides several important tips on how to protect yourself.


Pseudonym: Jrodr622
Website: http://doit.ort.org/course/devinfosys/1.htm
Title: Security and ethical challenges
Date: 11/26/13
Time: 08:18:32 AM

Comments

This website is gives powerpoint slides that are good to reference with the class powerpoint slides. It provides a broader understanding of the material.


Pseudonym: darellano2
Website: http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm and http://kb.iu.edu/data/aehm.html
Title: What are viruses, worms, and Trojan horses?
Date: 11/26/13
Time: 08:54:05 AM

Comments

Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs. Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus. Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses. Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program. What’s a Trojan Horse virus? A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database.


Pseudonym: meagatron
Website: http://www.bitdefender.com/news/bitdefender-malware-and-spam-survey-finds-e-threats-adapting-to-online-behavioral-trends-1094.html
Title: BitDefender Malware and Spam Survey finds E-Threats Adapting to Online Behavioral Trends
Date: 11/26/13
Time: 09:17:27 AM

Comments

The article goes over how prevalent Trojan Horses have become recently and even noted that about 83% of all computer viruses are in the form of a Trojan Horse. One such virus called Downadup has been listed as having contaminated over 11 million computers worldwide. The people that create these viruses are seeking things like financial gain and even control of the entire computer. China, France, and the United States fell victim to malware the most frequently thereby ranking them as the top countries who also spread the most malware. Computer owners are asked to have a proactive security system in place because its not like cyber criminals are going to stop trying to find new ways to carry out their crimes from behind a desk.


Pseudonym: Bisu
Website: http://www.ijaser.com/articles/vol1issue12012/vol1issue1/JASER120009.pdf
Title: Modeling the risk factors in ergonomic processes in Brick kilns workers using Fuzzy Logic
Date: 11/26/13
Time: 09:40:23 AM

Comments

A basic article on Fuzzy Logic being used in a particular company.


Pseudonym: aggarcia44
Website: http://www.hackthissite.org/
Title: hack this site
Date: 11/26/13
Time: 09:50:53 AM

Comments

I was very surprised when I was reading this webpage because there are legal free training for hackers out there. This is for them to practice their skills. Shocking


Pseudonym: thatbackflip
Website: http://www.cdc.gov/niosh/docs/95-119/pdfs/95-119.pdf
Title: CTDs go by many different names: RSI's (repetitive strain injuries), WRMSD (work-related musculoskeletal disorders), as well as by the specific diagnoses.
Date: 11/26/13
Time: 10:35:20 AM

Comments

They are caused by ergonomic risk factors such as force, posture, repetition, vibration, and others. This is a fact sheet describing the main types of CTDs. These can be broken down as disorders that affect muscles, tendons, nerves, blood vessels, bones, or a combination of these.


Pseudonym: Taiedzi
Website: http://missecurity.wikifoundry.com/
Title: Security and Ethical Challenges
Date: 11/26/13
Time: 11:14:28 AM

Comments

Being ethical seems easy to say, most people think that they always act in an ethical manner. But now with technology it gets harder to act ethical. This webpage summarizes what are the challenges of being ethical, and the responsibilities in the business.


Pseudonym: LasiK
Website: http://www.ncpc.org/topics/intellectual-property-theft
Title: Intellectual Property Theft
Date: 11/26/13
Time: 11:18:58 AM

Comments

Data on and examples of intellectual Property Theft


Pseudonym: andres_iab88
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: Computer crime
Date: 11/26/13
Time: 11:46:28 AM

Comments

Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet.


Pseudonym: Airborne
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: what does Antivirus software do?
Date: 11/26/13
Time: 12:12:51 PM

Comments

this site provides a good understanding of how the software works


Pseudonym: BRUCEWAYNE
Website: http://www.2-spyware.com/adware-removal
Title: ADWARE INFO AND REMOVAL
Date: 11/26/13
Time: 12:13:24 PM

Comments

This page informs what adware is and how a computer gets infected. The site also informs of new adware that are out there and informs of ways that its infecting computers and what it does to a computer once its infected, and it informs how to remove the adware.


Pseudonym: 8kb24
Website: http://www.seattlerobotics.org/encoder/mar98/fuz/flindex.html
Title: Fuzzy Logic Tutorial
Date: 11/26/13
Time: 04:44:53 PM

Comments

This website gives a very detailed description of fuzzy logic. It foes through every aspect of it.


Pseudonym: camaro007
Website: http://www.brooklyneagle.com/articles/3-await-sentencing-role-massive-45-million-atm-cyber-theft-2013-11-13-183000
Title: 3 await sentencing for role in massive $45 million ATM cyber theft
Date: 11/26/13
Time: 05:38:48 PM

Comments

Cyber theft is a big problem in the United States and around the world. With technology advancing over the decades, it has become increasingly easy to perform an illegal act, such as steeling ones identity or their credit card information. Cyber theft is an illegal act that authorities have little control of, which makes it even harder to enforce and capture the persons who are responsible of these acts. I believe there is a need of awareness among users of the internet, in order for them to take higher precautions and avoid being the victims of these types of crimes. Also, it is the government’s duty to capture criminals involved in these acts, and prosecute them with an adequate punishment, such as those involved in the ATM cyber theft.


Pseudonym: mineroxd
Website: http://computer.howstuffworks.com/worst-computer-viruses7.htm
Title: 10 Worst Computer Viruses of All Time
Date: 11/26/13
Time: 05:54:48 PM

Comments

Computer viruses can be deadly to a computer because they can potentially destroy the computer. The Doom was one of the deadliest computer viruses there ever were. The virus spread rapidly through e-mail and it broke a record of becoming the most abundant virus amongst computers. This virus was also known as “Novarg” and it infected approximately two million computers back in 2004. The overall damage that this virus caused was about $38 billion. As we become more affiliated with technologies more viruses will come about and for that reason people should be prepare and have their computers protected with antivirus and firewalls.


Pseudonym: mft1
Website: http://www.windowsecurity.com/articles-tutorials/misc_network_security/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues for IT Security Professionals
Date: 11/26/13
Time: 09:26:29 PM

Comments

T security personnel often have access to much confidential data and knowledge about individuals’ and companies’ networks and systems that give them a great deal of power. That power can be abused, either deliberately or inadvertently. But there are no standardized training requirements for hanging out your shingle as an IT security consultant or in-house security specialist. Associations and organizations for IT pros are beginning to address the ethical side of the job, but again, there is no requirement for IT security personnel to belong to those organizations.


Pseudonym: ChargedGBH
Website: http://security.stackexchange.com/
Title: Information Security
Date: 11/26/13
Time: 09:57:08 PM

Comments

A forum for IT security experts.


Pseudonym: CAKRBC
Website: http://www.wisegeek.org/what-is-computer-hacking.htm
Title: What is Computer Hacking
Date: 11/27/13
Time: 10:02:27 AM

Comments

This website not only describes what hacking is but is goes into other things about it as well. It even describes anti hacking. It was a very interesting to read and I highly recommend it.


Pseudonym: MadridJet86
Website: www.windowsecurity.com
Title: Ethical Issues for IT security professionals
Date: 11/27/13
Time: 06:37:19 PM

Comments

very helpful to fully secure your computer from any type of harm from the cyber world.


Pseudonym: jcsydb
Website: http://plato.stanford.edu/entries/logic-fuzzy/
Title: Fuzzy logic
Date: 11/28/13
Time: 10:23:02 AM

Comments

Fuzzy logic in the narrow sense is symbolic logic with a comparative notion of truth developed fully in the spirit of classical logic (syntax, semantics, axiomatization, truth-preserving deduction, completeness, etc.; both propositional and predicate logic).


Pseudonym: japer
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: Security and Ethical Challenges
Date: 11/28/13
Time: 02:30:18 PM

Comments

A good page that show definitions and graphs that help to understand better!!!!


Pseudonym: vikk258809
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: Password theft
Date: 11/28/13
Time: 04:22:15 PM

Comments

It shows keypoints about the most important information in security and ethical challenges


Pseudonym: Raven
Website: http://usa.kaspersky.com/internet-security-center/threats/trojans
Title: What is the Trojan Virus?
Date: 11/28/13
Time: 08:32:35 PM

Comments

This website defines what a Trojan virus is. This website also give ways on which a Trojan virus can impact you and also ways to prevent them from affecting you. This website is useful to help you when you have a Trojan virus in your computer.


Pseudonym: natiger59
Website: http://www.pcworld.com/article/117557/article.html
Title: What you should know about firewalls
Date: 11/28/13
Time: 11:04:18 PM

Comments

This article discusses the basics of firewalls, how they are used, and what they do.


Pseudonym: Crisofora2
Website: http://www.pcmag.com/encyclopedia/term/43600/fuzzy-logic
Title: PC Magazine Encyclopedia
Date: 11/29/13
Time: 10:27:04 AM

Comments

The website is very simple, it has an easy access of searching words and other computer/technology terms.


Pseudonym: EagleEye25
Website: http://highered.mcgraw-hill.com/sites/007014494x/student_view0/chapter13/
Title: Security and Ethical Challenges
Date: 11/29/13
Time: 01:48:04 PM

Comments

This webpage is from an educational website so the information was helpful and was most of what was talked about in class.


Pseudonym: yoval21
Website: http://en.wikipedia.org/wiki/Hacking
Title: hacking in other words is "computer crime"
Date: 11/29/13
Time: 03:33:34 PM

Comments

on this site you will find the exact definition on hacking. know that you know what this means, you must we careful when putting personal information into the computer.


Pseudonym: Yassy
Website: http://computer.howstuffworks.com/security-channel.htm
Title: WHAT'S INSIDE: COMPUTER SECURITY
Date: 11/29/13
Time: 10:40:33 PM

Comments

More on security including authentication and Computer and internet security.


Pseudonym: cglbryan2
Website: http://www.howstuffworks.com/firewall.htm
Title: How Firewalls Work
Date: 11/30/13
Time: 01:53:44 PM

Comments

This website explains how firewalls work. A video and a image are on this website for further detailed information about firewalls.


Pseudonym: Aubrey31
Website: http://www.apple.com/iphone-5c/
Title: iphone c
Date: 11/30/13
Time: 06:59:46 PM

Comments

A6 chip so it doesn't drain your battery like the other i phones up to 6 hours more battery life


Pseudonym: GhostRider3
Website: http://en.wikipedia.org/wiki/Password_cracking
Title: Password cracking
Date: 11/30/13
Time: 08:17:17 PM

Comments

Password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. Preventative measures need to be taken in order to make sure one's password is safe.


Pseudonym: SHOWTIME32
Website: http://www.pcworld.com/article/117557/article.html
Title: What You Should Know About Firewalls
Date: 11/30/13
Time: 08:24:28 PM

Comments

This website just talks about the basic functions of a firewall. It describes the types of firewalls there are, what happens when you don't have a firewall set up and of course what happens when do install a firewall.


Pseudonym: SHOWTIME32
Website: http://www.pcworld.com/article/117557/article.html
Title: What You Should Know About Firewalls
Date: 11/30/13
Time: 08:24:28 PM

Comments

This website just talks about the basic functions of a firewall. It describes the types of firewalls there are, what happens when you don't have a firewall set up and of course what happens when do install a firewall.


Pseudonym: Super987
Website: http://www.technewsworld.com/story/73641.html
Title: The white house takes some action to make cyber laws.
Date: 12/01/13
Time: 03:25:26 PM

Comments

The white house takes some action to make cyber laws to stop cyber criminals. It is very similar to hacking.


Pseudonym: Dancer23
Website: http://www.fbi.gov/about-us/investigate/cyber
Title: Cyber Crime
Date: 12/01/13
Time: 03:35:14 PM

Comments

The FBI gives their side of cyber crime at this website.


Pseudonym: Peaches
Website: http://www.ehow.com/facts_6965834_security-ethical-issues-information-systems.html
Title: Security & Ethical Issues of Information Systems
Date: 12/01/13
Time: 07:30:57 PM

Comments

Information system security is so important to companies that many hire experts in the field to help secure their technology and information.


Pseudonym: Taco062
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Business Ethics
Date: 12/02/13
Time: 12:39:30 AM

Comments

This website can be useful for solving business dilemmas


Pseudonym: Walter White
Website: http://www.techopedia.com/definition/25600/cyberlaw
Title: techopedia
Date: 12/02/13
Time: 02:11:26 PM

Comments

The website describes cyberlaw's as laws that prevent large scale damage from cybercriminals.


Pseudonym: monstruo14
Website: http://www.techopedia.com/definition/10267/dumpster-diving
Title: TechoPedia
Date: 12/02/13
Time: 05:49:16 PM

Comments

This page is pretty much a glossary for technological terms. In this case, gives a broader and more detailed definition in order to understand what dumpster diving is


Pseudonym: JumpinJR
Website: http://en.wikipedia.org/wiki/Operations_management
Title: Operations Management
Date: 12/02/13
Time: 06:38:21 PM

Comments

Discusses operations management origin, operations management planning criteria, and organizations.


Pseudonym: JumpinJR
Website: http://www2.fiu.edu/~mizrachs/hackethic.html
Title: Modern Day Hackers
Date: 12/02/13
Time: 06:41:43 PM

Comments

A piece discussing what it means to be a hacker.


Pseudonym: victoria061711
Website: http://en.wikipedia.org/wiki/Information_ethics
Title: Information ethics
Date: 12/02/13
Time: 06:41:48 PM

Comments

THis site really explains ethical challenges and gives a better understanding.


Pseudonym: Whiteman
Website: http://metro.co.uk/2013/12/02/met-issues-top-tips-for-navigating-cyber-monday-the-busiest-online-shopping-day-of-the-year-4209144/
Title: Met issues top tips for navigating Cyber Monday – ‘the busiest online shopping day of the year’
Date: 12/02/13
Time: 08:18:56 PM

Comments

This website dealt with computer crime and how to protect your computer from these attacks. It laid out common threats, ways to spot a potential threat, and proper programs to help keep your computer safe. This was super relevant not only to the chapter, but also due to it being close to Cyber Monday.


Pseudonym: mhern754
Website: http://www.forbes.com/sites/thesba/2013/08/28/how-to-prevent-cyber-crime/
Title: Avoid Cyber Crime
Date: 12/02/13
Time: 09:20:26 PM

Comments

Good website on how to avoid crime online


Pseudonym: vccorrales
Website: http://www.us-cert.gov/ncas/tips/ST04-015
Title: Understanding Denial-of-Service Attacks
Date: 12/02/13
Time: 09:25:04 PM

Comments

In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.


Pseudonym: 275873
Website: http://www.referenceforbusiness.com/encyclopedia/Sel-Str/Stakeholder-Theory.html
Title: Stakeholder Theory
Date: 12/02/13
Time: 09:49:30 PM

Comments

This website clearly states the definition of the stakeholder theory. It goes beyond mentioning the duties of corporation managers and provides an ethical approach. It further explains why this theory is also in best interest if big corporations to follow.


Pseudonym: soccer_cr7
Website: http://en.wikipedia.org/wiki/Backdoor_%28computing%29
Title: Backdoor (computing)
Date: 12/02/13
Time: 10:48:13 PM

Comments

This website states the method by which a back door is used for.


Pseudonym: Sauce2408
Website: http://en.wikipedia.org/wiki/Business_ethics
Title: Information about business ethics.
Date: 12/03/13
Time: 09:13:25 AM

Comments

Good information and definition about business ethics.


Pseudonym: ABGiovanni11
Website: http://www.farmersrights.org/pdf/2006%20art.jea%20in%20nature,%20english.pdf
Title: Protecting crop genetic diversity for food security: political, ethical and technical challenges
Date: 12/03/13
Time: 09:24:43 AM

Comments

This article focuses on the security and ethical, and food, and shows the relationship between the two. How it has been playing in a important role in our lives.


Pseudonym: fifimine
Website: http://smallbusiness.chron.com/list-ethical-issues-business-55223.html
Title: List of Ethical Issues in Businness
Date: 12/03/13
Time: 09:25:28 AM

Comments

According to this article in businesses there are four kinds of issues: fundamental issues (integrity and trust),diversity issues (diversity force recruiting), decision-making issues (center on protecting employee and customer rights), compliance and governance issues (federal and state laws and safety regulations, fiscal and monetary reporting statutes and all applicable civil rights laws)


Pseudonym: fifimine
Website: http://www83.homepage.villanova.edu/richard.jacobs/MPA%208300/theories/social%20contract.html
Title: Social Contract Theory
Date: 12/03/13
Time: 09:31:54 AM

Comments

"Man was born free, but everywhere is in chains!" J. J. Rousseau (The Basic Political Writings, 1987, p. 49.)The theory of a social contract is a hypothesis explaining how society originates as well as the presumed relationship between its members, how they incur responsibilities, and their rights.


Pseudonym: niketw13
Website: http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
Title: Ethical Challenges
Date: 12/03/13
Time: 09:40:27 AM

Comments

This page is about technology being a threat to privacy which brings up ethical challenges along with it.


Pseudonym: gmora15
Website: http://www.theguardian.com/technology/hacking
Title: Hacking
Date: 12/03/13
Time: 12:57:52 PM

Comments

This website provides the most up to date news about hacking around the world


Pseudonym: rwelliott
Website: http://www.microsoft.com/security/online-privacy/prevent.aspx
Title: Protect your privacy on the Internet
Date: 12/03/13
Time: 02:10:15 PM

Comments

This website provides an overview of privacy issues, which exist on the internet. The website was set up by Microsoft and provides advice to internet user about how they can protect themselves against common threats online.


Pseudonym: jdd1214
Website: http://en.wikipedia.org/wiki/Stakeholder_theory
Title: Stakeholder Theory
Date: 12/03/13
Time: 04:19:50 PM

Comments

In class we didn't really go into depth, so I wanted to know more. On the website it explained the ethical responsibilities managers have. They are responsible for the overall protection of the stakeholders and must adhere by business ethics no matter what.


Pseudonym: JPots&Pans
Website: http://freegan.info/what-is-a-freegan/freegan-practices/urban-foraging/diving-and-the-law/
Title: Strategies for sustainable living beyond capitalism.
Date: 12/03/13
Time: 07:04:55 PM

Comments

The article explains dumpster diving and the law


Pseudonym: ABGiovanni11
Website: http://www.farmersrights.org/pdf/2006%20art.jea%20in%20nature,%20english.pdf
Title: Protecting crop genetic diversity for food security: political, ethical and technical challenges
Date: 12/04/13
Time: 12:30:28 PM

Comments

This article focuses on the security and ethical, and food, and shows the relationship between the two. How it has been playing in a important role in our lives.


Pseudonym: JB6CAJ3
Website: http://www.businessweek.com/articles/2013-03-05/protecting-privacy-on-the-internet
Title: Protecting Privacy on the internet
Date: 12/04/13
Time: 07:58:58 PM

Comments

This article discusses audits that are being conducted on various internet companies to verify that they are complying with their privacy policies, the Federal Trade Commission conducts various checks on the companies, and if policies are not being followed they can be subject to a fine.


Pseudonym: lizdrio
Website: http://philosophia.uncg.edu/node/315
Title: FREEMAN'S STAKEHOLDER THEORY
Date: 12/04/13
Time: 11:45:23 PM

Comments

This article goes into detail of Freeman's stakeholder theory and how it functions in society and in the work place.


Pseudonym: Zizou
Website: http://www.kaspersky.es/internet-security-center/threats/trojans
Title: Trojans
Date: 12/05/13
Time: 09:53:07 AM

Comments

This website was able to give me more detailed information about the Trojan virus.


Pseudonym: Gol.D.Roger
Website: http://www.soxlaw.com/
Title: The Sarbanes-Oxley Act 2002
Date: 12/05/13
Time: 10:35:42 AM

Comments

it gives more specific details on what this act consist and how it was constructed and applied. I was interested in more information about this act.


Pseudonym: knickerbockers4
Website: http://business-ethics.com/
Title: Business Ethics
Date: 12/05/13
Time: 09:15:55 PM

Comments

Talks about the importance of being ethic in business.


Pseudonym: sdbanda
Website: http://www.businessinsider.com/10-essential-data-security-measures-every-business-should-take-2010-6
Title: 10 essential data-security measures every business should take 2010
Date: 12/05/13
Time: 10:45:28 PM

Comments

This is an article from business insider that describes essential security measures that every business should take. It's a bit dated though, it's from 2010.


Pseudonym: Texan8
Website: http://plato.stanford.edu/entries/ethics-business/
Title: Business Ethics
Date: 12/05/13
Time: 11:22:31 PM

Comments

Business ethics is the discipline that addresses the moral features of commercial activity. There are five main points that this discipline covers. They are: the history of business ethics as an academic endeavor; the focus on the corporation in academic business ethics; the treatment of employment relation; the treatment of transnational issues; and the criticism of the focus and implicit methodology of academic business ethics.


Pseudonym: GLCF09
Website: http://www.microsoft.com/en-us/piracy/default.aspx
Title: Software Piracy
Date: 12/06/13
Time: 09:05:40 AM

Comments

information on software piracy and ways to protect yourself against it.


Pseudonym: JR
Website: http://whatishacking.org
Title: What is Hacking?
Date: 12/07/13
Time: 12:32:01 PM

Comments

More info on what it is hacking.


Pseudonym: kokeloke22
Website: http://en.wikipedia.org/wiki/Computer_crime
Title: Computer Crime
Date: 12/07/13
Time: 01:21:17 PM

Comments

Basic and good information on computer crime


Pseudonym: Monchepe
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?taxonomyId=016
Title: Ethical issues for IT security professionals
Date: 12/07/13
Time: 05:26:39 PM

Comments

Godd website about the ethical challenges of IT in the professional world.


Pseudonym: Monchepe
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?taxonomyId=016
Title: Ethical issues for IT security professionals
Date: 12/07/13
Time: 05:26:43 PM

Comments

Godd website about the ethical challenges of IT in the professional world.


Pseudonym: killerbee
Website: http://hackerhubz.blogspot.com/2009/10/all-types-of-hacking-techniques.html
Title: All Types Of Hacking Techniques.. 17 ways to bring accounts to your Mercy..
Date: 12/08/13
Time: 03:59:23 PM

Comments

I like this article it explains 17 ways which hackers can use to steal information from your computer, its very interesting.


Pseudonym: jplozoya30
Website: http://searchsecurity.techtarget.com/definition/dumpster-diving
Title: dumpster diving
Date: 12/09/13
Time: 04:53:27 PM

Comments

Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network.


Pseudonym: ayperez
Website: http://www.c-s-i.org/cyber-crime/
Title: cyber crime
Date: 12/09/13
Time: 11:21:17 PM

Comments

helps on learning and recognizing what cyber crime is


Pseudonym: Fraggle Tots
Website: http://www.computerweekly.com/news/2240174301/Top-10-cyber-crime-stories-of-2012
Title: Top 10 cyber crime stories of 2012
Date: 12/10/13
Time: 04:34:37 PM

Comments

The site gives the most important cyber crimes that occurred in 2012. Each cyber crime is given a brief description and the title is highlighted for a user to click on in order to go to the site with the complete article of the crime. The site is helpful for people to be aware of up and coming cyber crimes being committed and how to stop or avoid them.


Pseudonym: recasa
Website: http://www.investopedia.com/terms/b/business-ethics.asp
Title: Business Ethics
Date: 04/23/14
Time: 12:28:56 PM

Comments

Explains the business ethics and its importance


Pseudonym: markapple0507
Website: http://www.justice.gov/usao/briefing_room/cc/
Title: Cyber Crime
Date: 04/23/14
Time: 01:41:01 PM

Comments

This is a website from the US Department of Justice that is dedicated to fighting Cyber Crime. It defines it as : one of the greatest threats facing our country, and has enormous implications for our national security, economic prosperity, and public safety."


Pseudonym: SanAntonio
Website: http://www.secureworks.com/resources/articles/other_articles/ethics/
Title: Crossing the Line: Ethics for the Security Professional
Date: 04/28/14
Time: 09:39:27 AM

Comments

IT security and ethics is given a detailed look. It presents different ethical approachs and describes them. Ethics are then explain how they should be applied to IT.


Pseudonym: 170792lrsr
Website: http://www.dubberly.com/articles/what-is-systems-design.html
Title: What is Systems Design
Date: 04/29/14
Time: 10:46:51 AM

Comments

This website gives some insight of what systems design is and it also gives information about the history if it.


Pseudonym: 170792lrsr
Website: http://usa.kaspersky.com/internet-security-center/threats/trojans
Title: What is a Trojan Virus?
Date: 04/29/14
Time: 10:57:38 AM

Comments

This website gives some examples if what can happen to a computer if it got a Trojan Virus. It also gives several examples of how to prevent your computer from getting one.


Pseudonym: TinyTots
Website: http://www.examiner.com/article/stockholder-versus-stakeholder
Title: Stockholder VS Stakeholder
Date: 04/29/14
Time: 03:10:17 PM

Comments

This site gave a brief description on both theories as well as compare them. I thought it could go into a little more, or give better examples but it gives a small analysis on both.


Pseudonym: Sonnybrix
Website: http://www.thinking.net/Systems_Thinking/OverviewSTarticle.pdf
Title: New Computer Virus Hits the Borderland
Date: 04/30/14
Time: 11:32:43 AM

Comments

An article about a recent virus to hit the El Paso area.


Pseudonym: -Henry0924-
Website: https://www.osha.gov/SLTC/ergonomics/
Title: Safety and Health Topics
Date: 05/01/14
Time: 10:58:57 AM

Comments

OSHA website for ergonomics and prevention of musculoskeletal disorders in the workplace


Pseudonym: Shorty915
Website: http://markets.ft.com/research/Lexicon/Term?term=stakeholder-theory
Title: Definition of stakeholder theory
Date: 05/01/14
Time: 12:32:54 PM

Comments

The website simplifies the definition of what stakeholder theory is. After that the site provides the example of IBM's Smarter Planet Campaign in which IBM created value for the police department a.k.a the stakeholder by developing a computer system that combines all of the crime data more concisely.


Pseudonym: eanais88
Website: http://www.armor2net.com/knowledge/hackers_methods.htm
Title: The most common methods used by Hackers.
Date: 05/01/14
Time: 02:06:00 PM

Comments

Here we can find the methods used by hackers to access computer systems and some information.


Pseudonym: yaako23
Website: http://iphoneproj2011.wordpress.com/2011/04/19/the-theory-of-corporate-social-responsibility-and-the-challenges-it-faced-under-globalization/
Title: THE THEORY OF CORPORATE SOCIAL RESPONSIBILITY AND THE CHALLENGES IT FACED UNDER GLOBALIZATION
Date: 05/01/14
Time: 02:45:59 PM

Comments

The website provides a well definition for Corporate Social Responsibility (CSR), then it gives some background of how this idea was created. It also states some challenges that CSR has faced under the globalization such as; limitations of jurisdiction, no direct responsibility imposed on the purchasing firms, difficulties in auditing, and local factories' attitudes.


Pseudonym: James Franco
Website: http://www.examiner.com/article/stockholder-versus-stakeholder
Title: Stockholder versus Stakeholder
Date: 05/01/14
Time: 04:13:04 PM

Comments

This reference gives insight into the debate of Stockholder theory versus Stakeholder theory and which is better for business. It takes a look at both theories and gives a little history behind both theories. For example, it states that the "stockholder theory states that there is only one social responsibility of business: to use its resources to engage in activities designed to increase its profits so long as it operates without deception or fraud." Although "many firms still focus (mainly) on profits and pay attention to stakeholder needs only when pressured to do so." Thus which theory is better for business.


Pseudonym: vjimenez2
Website: http://computer.howstuffworks.com/ide4.htm
Title: Slave and Master How IDE Controllers Work
Date: 05/01/14
Time: 04:28:12 PM

Comments

After reading the chapter I was very curious about the the whole "zombie" computer thing. So I decided to research a bit of that and see what more I could find about the topic.


Pseudonym: Mockingjay
Website: http://www.examiner.com/article/stockholder-versus-stakeholder
Title: Stockholder versus Stakeholder
Date: 05/01/14
Time: 04:55:01 PM

Comments

This article highlights the differences centered around Stockholder and Stakeholder Theory. Author Maxwell Pinto lists the pros and cons accompanied by both theories and how they are applied to real and modern business situations.


Pseudonym: 7631mus50
Website: http://www.kbmanage.com/concept/security-and-ethical-challenges-of-it
Title: Knowledge brief
Date: 05/01/14
Time: 07:08:06 PM

Comments

Security and ethical challenges that pertain to the IT department.


Pseudonym: dareliari
Website: http://www.us-cert.gov/ncas/tips/ST04-015
Title: Understanding denial of service attacks
Date: 05/01/14
Time: 11:56:12 PM

Comments

This website gives a detailed description of denial of service and what you should do if it happens to you.


Pseudonym: Ailany06
Website: http://www.snc.edu/it/docs/spyware.html
Title: Spyware, Viruses, & other computer problems
Date: 05/02/14
Time: 11:20:59 AM

Comments

more interesting information


Pseudonym: scr2727
Website: http://www.examiner.com/article/stockholder-versus-stakeholder
Title: "Stockholder versus Stakeholder"
Date: 05/02/14
Time: 12:21:19 PM

Comments

In Chapter 13 I I was a bit confused on stockholders versus stakeholders and the theory behind it, so I decided to look more into it. I came across this website called the 'examiner' under business industry. The author of this site is Maxwell Pinto a Toronto business examiner who gave many examples on how they are different. He shows through Milton Freedman, Edward Freeman, and Immanuel Kant's point of views to let the reader decide for him or herself. In the site it had the debate clearly written and defined each topic at hand. Overall this site gave me more information so that I could continue my search and was a good start.


Pseudonym: OEOPT20O9
Website: http://computer-security-awareness.blogspot.com/2006/04/common-hacking-tactics.html
Title: Common Hacking Tactics
Date: 05/02/14
Time: 05:48:04 PM

Comments

Here it present a list of common hacking tactics, which i consider very important to know about.


Pseudonym: cd26493
Website: http://en.wikipedia.org/wiki/Fuzzy_logic
Title: fuzzy logic
Date: 05/04/14
Time: 12:30:58 PM

Comments

Fuzzy logic is a form of many-valued logic; it deals with reasoning that is approximate rather than fixed and exact. Compared to traditional binary sets (where variables may take on true or false values), fuzzy logic variables may have a truth value that ranges in degree between 0 and 1. Fuzzy logic has been extended to handle the concept of partial truth, where the truth value may range between completely true and completely false.[1] Furthermore, when linguistic variables are used, these degrees may be managed by specific functions. Irrationality can be described in terms of what is known as the fuzzjective. The term "fuzzy logic" was introduced with the 1965 proposal of fuzzy set theory by Lotfi A. Zadeh. Fuzzy logic has been applied to many fields, from control theory to artificial intelligence. Fuzzy logics had, however, been studied since the 1920s, as infinite-valued logics - notably by Łukasiewicz and Tarski.


Pseudonym: TX Trooper
Website: http://www.techrepublic.com/blog/it-security/#.
Title: Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.
Date: 05/04/14
Time: 03:53:54 PM

Comments

This is a good website to prevent hackers from getting into your computer by keeping up with the blogs and news this website provides.


Pseudonym: Marz
Website: http://markets.ft.com/research/Lexicon/Term?term=stakeholder-theory
Title: Stakeholder Theory
Date: 05/04/14
Time: 08:58:33 PM

Comments

This website explains the idea of stakeholder theory, which is to keep the interest of everyone involved in a business going toward the same direction. This idea adds much value to the goals of the business.


Pseudonym: zar23
Website: http://missecurity.wikifoundry.com
Title: Security and Ethical Challenges
Date: 05/04/14
Time: 10:25:21 PM

Comments

Gives a detailed summary where you can better understand all the information. The summery covers all the major points of the security and ethical challenges.


Pseudonym: Fierro8
Website: https://runbox.com/email-school/what-are-computer-viruses-and-how-to-protect-against-them/
Title: What are computer viruses, and how to avoid them
Date: 05/04/14
Time: 11:57:41 PM

Comments

This page shows you how you can protect yourself from virus or worms. It gives you Do's and Don't that can help you avoid a bad experience.


Pseudonym: happyguy
Website: http://computer.howstuffworks.com/logic-bomb.htm
Title: How does a logic bomb work
Date: 05/05/14
Time: 12:12:53 AM

Comments

Explains the theory and use of logic bombs


Pseudonym: Saman02
Website: http://www.webopedia.com/TERM/R/Rapid_Application_Development.html
Title: Application Development definition
Date: 05/05/14
Time: 09:29:31 AM

Comments

A brief definition of application development and key components. As well as some examples.


Pseudonym: grumpy_diver
Website: http://educatealll.wordpress.com/2014/05/03/computer-hacking-in-the-new-age-all-you-need-to-know-about-hacking-today/
Title: Computer Hacking in the New Age, All you Need to Know about Hacking Today
Date: 05/05/14
Time: 09:38:18 AM

Comments

This article discusses how hacking began and what it looks like today.


Pseudonym: Basketball21
Website: http://www.uhs.umich.edu/computerergonomics
Title: Computer Ergonomics: How to Protect Yourself from Strain and Pain
Date: 05/05/14
Time: 10:57:54 AM

Comments

I found this article based on ergonomics in computer design. This article explains ways to avoid back pains and other pains while working on a computer for long hours. It speaks of the way computer design has changed for more comfort. It also gives tips on how to set up your workstation for a more comfortable setting.


Pseudonym: princess13
Website: http://www.discovery.com/tv-shows/curiosity/topics/10-famous-hackers-hacks.htm
Title: 10 Famous Hackers and Hacks
Date: 05/05/14
Time: 11:22:30 AM

Comments

This website provides cases of famous hackers and hacking cases which shows some weaknesses of internet security and lack of ethics.


Pseudonym: coti
Website: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
Title: This page discusses the threats against, and defenses needed for the performance and security in businesses.
Date: 05/05/14
Time: 01:03:22 PM

Comments

Identify several ethical issues in how the use of information technologies in business affects employment,individuality, working conditions, privacy, crime, health, and solutions to societal problems


Pseudonym: duck04
Website: http://www.slideshare.net/ferumxxl/types-of-computer-crime
Title: Types of Computer Crime
Date: 05/05/14
Time: 11:01:10 PM

Comments

This website provides information on the different types of computer crime categories.


Pseudonym: jvizcar3
Website: https://www.securelist.com/en/threats/detect/viruses-and-worms
Title: Viruses and worms
Date: 05/06/14
Time: 11:38:55 AM

Comments

In this website you will find information that explain about viruses and worms in an easy way to understand.


Pseudonym: Megatron
Website: http://www.foxnews.com/tech/2014/05/02/how-to-protect-your-computer-from-viruses-and-hackers/
Title: How to protect your computer from viruses and hackers
Date: 05/06/14
Time: 08:52:03 PM

Comments

The article goes over the various methods on protecting a computer from viruses.


Pseudonym: belfortGOAT
Website: https://kb.iu.edu/data/aehm.html
Title: What are viruses, worms, and Trojan horses?
Date: 05/07/14
Time: 10:29:20 AM

Comments

This article details the basic as to what viruses, worms and Trojan horses are. It also gives resources and tips on how to avoid viruses and where to find current news on viruses.


Pseudonym: BAMBOO
Website: http://en.wikipedia.org/wiki/Stakeholder_theory
Title: Stakeholder Theory
Date: 05/07/14
Time: 11:35:08 AM

Comments

In this website I was able to understand ever better what Stakeholder theory means, which is a theory of organizational management and business ethics that addresses morals and values in managing an organization, and I learned many other things.


Pseudonym: 88qwerty
Website: http://www.ehow.com/info_8482153_ethical-issues-computer-hacking.html
Title: talks about not ethical procedures
Date: 05/07/14
Time: 05:06:49 PM

Comments

definition of hacking


Pseudonym: pvy
Website: http://www.newsday.com/business/technology/for-ceos-hacking-threat-a-new-source-of-constant-worry-1.7938363
Title: For CEOs, hacking threat a new source of constant worry
Date: 05/07/14
Time: 06:54:05 PM

Comments

A very recent article on how hacking has become a more common problem in corporations than before.


Pseudonym: CO12
Website: http://www.technewsworld.com/story/47833.html
Title: Data Loss, Network Vulnerabilities, Top security issues
Date: 05/08/14
Time: 08:09:50 AM

Comments

This website talks about the different security issues that are affecting computer technology and how it is threatening the data.


Pseudonym: brem92
Website: http://csrc.nist.gov/
Title: Computer Security Resource Center (CSRC)
Date: 05/08/14
Time: 06:25:53 PM

Comments

(CSRC) facilitates broad sharing of information security tools and practices


Pseudonym: mario7
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: used to prevent detect and remove bad softwares
Date: 05/08/14
Time: 06:55:34 PM

Comments

antivirus protect the computer of any malicious virus of other computers or webpages.


Pseudonym: villa175
Website: http://en.wikipedia.org/wiki/Ergonomics
Title: Human factors and Ergonomics
Date: 05/08/14
Time: 11:09:03 PM

Comments

Explains what ergonomics is and how the human factor can affect a persons overall health. It says where it can from and gives a history of it.


Pseudonym: TopFlight27
Website: http://computer.howstuffworks.com/worst-computer-viruses8.htm
Title: Worst Computer Viruses of All Time
Date: 05/08/14
Time: 11:41:45 PM

Comments

This website list the top 10 worst computer viruses. Sasser and Netsky were ranked number 3. It explains what the website is and how it ruins your entire computer. Sasser attacks computer through Microsoft windows while Netsky goes through your emails and Windows networks. My Doom made the list at 4 while the Kelz virus came in at 8.


Pseudonym: Andromeda17
Website: http://us.norton.com/cybercrime-definition
Title: What is Cybercrime?
Date: 05/09/14
Time: 02:25:51 AM

Comments

There are facts and types of cybercases. There are link on the side also that take you to the trojans and spyware and ore definitions.


Pseudonym: dv1429
Website: http://www.financialdirector.co.uk/financial-director/feature/2343445/physically-protecting-data-the-forgotten-it-security-problem
Title: Physically protecting data is important in our rapidly changing environment, since many more people now regularly access data that used to be in the hands of only a few.
Date: 05/09/14
Time: 02:28:49 AM

Comments

This article points out a new challenge facing IT directors. Now that large parts of an organization will have continuous access to much of the information that a company has at its disposal, old methods of keeping data secured are outdated.


Pseudonym: aesal91
Website: http://www.slideshare.net/paramalways/security-and-ethical-challenges-of-infornation-technology
Title: security and ethical challenges
Date: 05/09/14
Time: 10:16:44 AM

Comments

This website is basically a slide show showing information about ethical challenges when it comes to informational systems. It gives a brief overview on how to identify ethical issues in the environment and basically what to do in case of such issued. It is a very useful and informative slide presentation.


Pseudonym: aa44
Website: http://www.entrust.net/ssl-certificates/extended-validation.htm?SE=Google&Campaign=OPM%2B-%2BMarket%2BTerms%2B-%2BNET%2B-%2BComputers%2B-%2BUSA%2B-%2BENG%2B-%2BSearch&Adgroup=Secure%2BWebsite&cikw=%2Bsecure%20%2Bwebsite&MatchType=b&gclid=CI7dwpW2n74CFY3m7AodfjsA9A
Title: SecurityOn is the title of the website, the benefits that this website offers is cost-efficient method of securing servers in a multi-server environment
Date: 05/09/14
Time: 12:04:51 PM

Comments

this site offers a validation that provides customers with the highest degree of assurance for transactions with companies online along with cost-efficient methods.


Pseudonym: af90
Website: http://business-ethics.com
Title: Business Ethics The Magazine of Corporate Responsibility
Date: 05/09/14
Time: 12:46:10 PM

Comments

What I like about the site is that it includes recent polls and popular stories of business ethics. The website is the electronic copy of what the magazine by Michael Connor (business ethics guru) would be like.


Pseudonym: utepztmp9
Website: http://www.wisegeek.com/what-is-an-external-firewall.htm
Title: What Is an External Firewall?
Date: 05/09/14
Time: 01:39:24 PM

Comments

This web page explains what is an external firewall. First, it gives the definition, it gives the visual representation of the concept in the software, even though it is an intangible thing, it tells where it can be found within the computer. I t also compares it to other different softwares gives detailes description and its function.


Pseudonym: Karlaa7292
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?pageNumber=1
Title: Computer World
Date: 05/09/14
Time: 04:01:23 PM

Comments

Ethical issues for IT security professionals


Pseudonym: Radar O'Reilly
Website: http://www.iep.utm.edu/soc-cont/
Title: Social Contract Theory
Date: 05/09/14
Time: 08:25:01 PM

Comments

This website gives a thorough, very detailed explanation of Social Contract Theory with reputable references.


Pseudonym: KGA2014
Website: http://www.cert.org/tech_tips/home_networks.html
Title: Network Security
Date: 05/09/14
Time: 10:49:13 PM

Comments

Really good website, It explains information about network security and provides tips.


Pseudonym: cmarq101
Website: http://csrc.nist.gov/
Title: Computer Security Resource Center (CSRC)
Date: 05/10/14
Time: 10:08:37 AM

Comments

This website is about CSRC. This important security center makes more easy to share of information security tools and practices. CSRC provides a resource for information security standards and guidelines and support important services like companies, organizations,government, and colleges.


Pseudonym: gamma
Website: http://www.computerworld.com/s/article/304308/Ethics_in_IT_Dark_secrets_ugly_truths_and_little_guidance
Title: Ethics in IT: Dark secrets, ugly truths -- and little guidance
Date: 05/10/14
Time: 09:23:18 PM

Comments

This article shows the ugly side of unethical behavior in the IT industry. Reading about ethics can be very abstract, so I was glad to read about real-world experiences.


Pseudonym: Leon voss
Website: http://www.wisegeek.com/what-is-business-ethics.htm
Title: What is Business Ethics?
Date: 05/10/14
Time: 11:51:58 PM

Comments

Business ethics is the behavior that a business adheres to in its daily dealings with the world. The ethics of a particular business can be diverse. They apply not only to how the business interacts with the world at large, but also to their one-on-one dealings with a single customer.


Pseudonym: ZaAl
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: Antivirus software
Date: 05/11/14
Time: 11:40:19 AM

Comments

Antivirus software prevents,detect and remove malicious computer viruses which can cause drawbacks and impair a computer's performance.


Pseudonym: ano0630
Website: http://www.nysscpa.org/cpajournal/2004/704/perspectives/p16.htm
Title: Controlling Internet Use in the Workplace
Date: 05/11/14
Time: 09:05:01 PM

Comments

This article discusses strategies that businesses should take into consideration regarding internet use in the workplace in order to avoid security breaches, theft,viruses, and etc. Some strategies include: setting policies for internet use, monitoring internet activity with information assurance, and using firewalls. To maximize online security for the future an information assurance system is a smart investment.


Pseudonym: turyboii
Website: http://cybercrime.pl
Title: Trojans
Date: 05/12/14
Time: 12:10:54 AM

Comments

Contains information of the history of cyber crime, types, examples, news and cases mostly dealing with trojans.


Pseudonym: Jad8
Website: http://uk.norton.com/top-5-viruses/promo
Title: Norton Top Five Computer Viruses
Date: 05/12/14
Time: 10:38:52 AM

Comments

This is an interactive infographic that does a really good job of explaining the top five computer viruses to attack computers. It has a lot of great information and puts it in a cool format that makes it easy to understand.


Pseudonym: bk201
Website: http://www.pcworld.com/article/2153303/one-month-later-hundreds-of-thousands-of-servers-still-vulnerable-to-heartbleed.html
Title: PC World
Date: 05/12/14
Time: 12:03:23 PM

Comments

it is news about the virus heartbleed that had been a common topic on the systems community lately.


Pseudonym: H1993
Website: http://us.norton.com/cybercrime-definition
Title: Computer crime includes
Date: 05/12/14
Time: 01:49:10 PM

Comments

this site is really helpful for all the student I really like it


Pseudonym: Bntfalas6een
Website: http://redwardfreeman.com/stakeholder-management/
Title: Stakeholder Theory
Date: 05/12/14
Time: 01:51:46 PM

Comments

I really like this site it/s really helpful


Pseudonym: 951033
Website: http://en.wikipedia.org/wiki/Human_factors_and_ergonomics
Title: Human factors and ergonomics
Date: 05/13/14
Time: 04:23:06 PM

Comments

In essence it is the study of designing equipment and devices that fit the human body and its cognitive abilities. The two terms "human factors" and "ergonomics" are essentially synonymous.


Pseudonym: Fefe
Website: http://searchsecurity.techtarget.com/definition/dumpster-diving
Title: dumpster diving
Date: 05/13/14
Time: 07:46:58 PM

Comments

This website gives the definition of dumpster diving and explains how it can be harmful. It also explains how it can be prevented.


Pseudonym: Jrhernandez
Website: http://en.wikipedia.org/wiki/Antivirus_software
Title: Antivirus software
Date: 05/13/14
Time: 09:29:18 PM

Comments

It defines antivirus software, how it basically works. Its history and how it detects the viruses. It also gives us some issues of concern about the use of antiviruses.


Pseudonym: miniondave
Website: http://www.webmd.com/pain-management/carpal-tunnel/carpal-tunnel-syndrome-symptoms
Title: Carpal Tunnel Syndrome - Symptoms
Date: 05/14/14
Time: 12:50:40 AM

Comments

This article is very interesting, it informs us on the symptoms of carpal tunnel. This interests me a lot since my job requires me to be at the computer all day.


Pseudonym: Drywall85
Website: www.f-secure-campaigns.com/‎
Title: Online securtity
Date: 05/14/14
Time: 08:38:48 AM

Comments

Online security company.


Pseudonym: Xiit92
Website: http://www.fbi.gov/about-us/investigate/cyber
Title: FBI - Cyber Crime
Date: 05/15/14
Time: 10:22:13 AM

Comments

This is the FBI website so you can find anything you'd like about topics related to the FBI. In this case I looked for computer crime and this page shows and explains what cyber crime is and its many different facets, and how it can be presented. It gives advice on how to prevent it and how to deal with it once it already started.


Pseudonym: BabySquirrel
Website: http://missecurity.wikifoundry.com
Title: Security and Ethical Challenges Home
Date: 05/15/14
Time: 10:52:39 AM

Comments

The security and ethical issues of a firm can lead to job loss, health issues, and threats to the company. Information Technology strives to keep the morale of the company in mind when monitoring software and other technology. Companies also have to ensure their employees are being ethical when handling confidential company information.


Pseudonym: ccminie123
Website: http://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/#.
Title: 10 ethical issues confronting IT managers
Date: 05/15/14
Time: 10:52:25 PM

Comments

Talk about the most common ethical issues within IT management.


Pseudonym: 508254
Website: http://redwardfreeman.com/stakeholder-management/
Title: Stakeholder Management
Date: 05/16/14
Time: 10:54:02 AM

Comments

This website has multiple videos on the topic. It also provides links to book and the information is straight forward.


Pseudonym: zlatan
Website: http://www.insurancejournal.com/news/national/2014/06/09/331333.htm
Title: Cyber Theft, Already a $445 Billion Business, to Grow Bigger
Date: 07/13/14
Time: 08:26:33 PM

Comments

The article speaks on how the cyber theft is becoming a very lucrative business. Is basically warning many companies on how they are in risk because the cyber thiefs are becoming more sophisticated in their techniques to steal information and money from them.


Pseudonym: espno007
Website: http://www.catb.org/esr/faqs/hacker-howto.html
Title: How To Become A Hacker
Date: 07/28/14
Time: 11:11:22 AM

Comments

I found information on the link above that literally teaches you how to become a hacker. I am amazed on how you can easily find this information online.


Pseudonym: gordies
Website: www.businessdictionary.com/definition/cybertheft.htm
Title: Cyber Theft, Already a $445 Billion Business, to Grow Bigger
Date: 07/28/14
Time: 01:55:36 PM

Comments

Cyber Theft remains a growth industry. A $445 billion a year in trade. Here Stolen Secrets, Market Manipulation, Business Expense, Cost Estimates are some the topics well be in this website.


Pseudonym: seashell
Website: http://www.ergonomics.org.uk/learning/what-ergonomics/
Title: What is ergonomics?
Date: 07/28/14
Time: 09:01:20 PM

Comments

I wanted to know more about ergonomics because being at the computer too long is uncomfortable. This website tells what it is and why its good to know.


Pseudonym: asalaz51
Website: https://www.google.com/?gws_rd=ssl#q=+Security+and+Ethical+Challenges+
Title: Security and Ethical Challenges of Information Technology
Date: 07/29/14
Time: 12:56:08 AM

Comments

This site help me to understand the major concepts of Security and Ethical Challenges.


Pseudonym: Benito Juarez
Website: http://www.f-secure.com/v-descs/sasser.shtml
Title: Net-Worm:W32/Sasser
Date: 07/29/14
Time: 09:43:03 PM

Comments

Net-Worm:W32/Sasser refers to a small family of worms that spread to new hosts over the Internet by targeting the known MS04-011 (LSASS) vulnerability, which is caused by a buffer overrun in the Local Security Authority Subsystem Service, and will affect all machines that are: Running Windows XP or Windows 2000 Haven't been patched against this vulnerability Are connected to the Internet without a firewall This vulnerability has been addressed and patched. For more information, please refer to the Microsoft Bulletin (http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx for more details. Sign of infection is the existence of a file named 'C:\win.log' and frequent crashes of 'LSASS.EXE'. Sasser generates traffic on TCP ports 445, 5554 and 9996. Sasser was written in Visual C++; the first variant, Sasser.A, spreads in a single executable which is packed and protected with several envelopes. A later variant, Sasser.B, using the filename AVSERVE2.EX.


Pseudonym: Vietnamese
Website: http://www.oplin.lib.oh.us/content/information-technology-security-management
Title: information technology security management
Date: 07/30/14
Time: 09:56:21 AM

Comments

this web talk about the information technology IT. i explain the definition of information techonoly IT. i think this is a good site.


Pseudonym: lrodr40
Website: http://smallbusiness.chron.com/list-ethical-issues-business-55223.html
Title: List of ethical issues in business
Date: 07/30/14
Time: 10:03:39 AM

Comments

I really enjoy reading the list of ethical issues in business this website provides. I founded really interesting because it just doesn't give us the list but also gives example of them.


Pseudonym: marielymendoza
Website: http://www.scribd.com/doc/45506139/Security-and-Ethical-Challenges-in-MIS
Title: Security and Ethical Challenges
Date: 07/30/14
Time: 12:53:52 PM

Comments

This website explains how ethical issues are defined in the use of technologies in business. It also explains how it can be developed for a better environment in the business.


Pseudonym: miaama9
Website: http://www53.homepage.villanova.edu/james.borden/vsb1001/Goodpaster.pdf
Title: Business Ethics
Date: 07/30/14
Time: 12:55:13 PM

Comments

This scholarly article provides detail on all things related to business ethics. Included are simple definitions as well as complex issues in the real world.


Pseudonym: vch23
Website: http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?pageNumber=1
Title: Ethical issues for IT security professionals
Date: 07/30/14
Time: 01:17:57 PM

Comments

This article is very interesting because it explains Security Challenges in a very simple way.


Pseudonym: Watermelon
Website: https://www.boundless.com/business/business-ethics-and-social-responsibility/business-ethics/ethical-issues-within-a-business/
Title: Busiess issues within a business
Date: 07/30/14
Time: 02:19:37 PM

Comments

The website goes into what kind of unethical act exist in and surrounding a business. It also shows why it is not right to follow that unethical steps.


Pseudonym: jvill283
Website: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0CDkQFjAD&url=http%3A%2F%2Funesdoc.unesco.org%2Fimages%2F0021%2F002182%2F218273e.pdf&ei=pobZU6TFCvCm8QHLmYGQCA&usg=AFQjCNHHB78s0CdCglVgPQgLHY-PB6PBsA&sig2=QagaIeKAX9UcRyVqGtL0xQ
Title: Internet Privacy and Freedom of Expression
Date: 07/30/14
Time: 06:05:19 PM

Comments

Everything revolves around the Internet nowadays. Whether its Facebook, Twitter or any other social media, its always around. But how much privacy do we actually have? Once a picture is uploaded on any site, it can never be erased completely and it's out there forever. Next time, think first before you post partying pictures on the Web, it could cost you future jobs.


Pseudonym: mmedi06
Website: http://www.windowsecurity.com/articles-tutorials/misc_network_security/Ethical-Issues-IT-Security-Professionals.html
Title: Ethical Issues
Date: 07/30/14
Time: 10:29:57 PM

Comments

This article was excellent! It provided plenty of information as well as many key terms and examples. I recommend this article to anyone interested in ethical issues in IT.


Pseudonym: TC13
Website: http://rintintin.colorado.edu/~vancecd/phl306/share.pdf
Title: Stockholder Theory
Date: 07/31/14
Time: 11:39:20 AM

Comments

This website helps you better understand stockholder theory.


Pseudonym: jcdmb1019
Website: http://www.ergonomics.org/
Title: ergonomics
Date: 07/31/14
Time: 02:11:44 PM

Comments

I chose this site because it has a lot of information about ergonomics. I thought it was an interesting thing to look up and know more about.


Pseudonym: AA756
Website: http://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/
Title: technicalrepublic
Date: 07/31/14
Time: 03:46:08 PM

Comments

This website has ten of the most common ethical issues that IT managers come in conflict with.


Pseudonym: Marlene Terrazas
Website: http://www.ijecbs.com/July2011/45.pdf
Title: Security and Ethical issues in IT:An organization's perspective
Date: 07/31/14
Time: 05:34:27 PM

Comments

the article explains the concept an organization has regarding security and ethical issues


Pseudonym: phatlex
Website: http://resources.infosecinstitute.com/10-popular-password-cracking-tools/
Title: 10 most popular password crackers
Date: 07/31/14
Time: 08:43:59 PM

Comments

It explains what password cracking is and what the most popular tools their is to crack passwords.


Pseudonym: Isamara
Website: http://searchsecurity.techtarget.com/definition/email-spoofing
Title: What is email spoofing?
Date: 07/31/14
Time: 08:57:55 PM

Comments

An explanation of the term but very well explained.


Pseudonym: zlatan
Website: http://www.webopedia.com/TERM/S/software_piracy.html
Title: software piracy
Date: 07/31/14
Time: 09:09:27 PM

Comments

That software is only most if not all of the time for only one computer. When you buy a program you buy the license to use, you are not the owner. And people often use the software ilegally in other computers.


Pseudonym: jvill283
Website: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CDsQFjAA&url=http%3A%2F%2Fwww.thehackademy.net%2Fmadchat%2Fvxdevl%2Flibrary%2FIdentify%2520How%2520to%2520Protect%2520Your%2520Network%2520Against%2520Viruses.pdf&ei=ewTbU-v0J-np8AHjqYHoCQ&usg=AFQjCNHCveSwg4lF8f-LKiaeHC9yYAvUSQ&sig2=3UD8YCFCH2bXfyusSlpNIg&bvm=bv.72197243,d.b2U
Title: Identify How to Protect Your Network Against Viruses
Date: 07/31/14
Time: 09:18:11 PM

Comments

Viruses are a nightmare for anybody. They can only work once inserted into a program, then it is downhill from there. There are many anti-virus programs that can be installed in your device to make sure it doesn't crash. There are also many different types of viruses, some worse than others, which will then determine what needs to be done to remove them.


Pseudonym: strawberry
Website: http://www.infoworld.com/d/security/7-sneak-attacks-used-todays-most-devious-hackers-227557
Title: 7 sneak attacks used by today's most devious hackers
Date: 07/31/14
Time: 11:09:44 PM

Comments

This is a useful article that informs readers of hacking tricks used by others. I think this is very helpful for readers so that they know what to look out for so that they can protect themselves from dangerous hackers that can cause a lot of damage.


Pseudonym: Jak
Website: http://www.computerworld.com/s/article/91549/Is_hacking_ethical_
Title: Ethics and hacking
Date: 07/31/14
Time: 11:31:15 PM

Comments

This article covers very useful information about ethics in the it sector.


Pseudonym: Mickey19
Website: http://www.slideshare.net/luisa1971/security-ethical-challenges-9183597
Title: Security and Ethical Challenges
Date: 08/01/14
Time: 12:53:59 AM

Comments

This webpage was very helpful for me, because it contains a presentation with a very good explanation of what Security and Ethical Challenges is; and how exactly works.


Pseudonym: zoom24
Website: http://www.mba-strategy.com/must/cob302/COB302-Week08.pdf
Title: Security and Ethical Challenges
Date: 08/01/14
Time: 12:55:36 AM

Comments

This page help me understand how Security and Ethical Challenges works.


Pseudonym: sm2468&
Website: 3 Ways to Hack a Computer - wikiHow
Title: www.wikihow.com › ... › Internet › Internet Security
Date: 08/01/14
Time: 07:37:30 AM

Comments

The article talks about three ways to Hack a computer. They are: Getting past a long in password,getting remote access, and cracking a Wifi(WEP)password. Whats irronic about the article, is how much money is being spent in securing computers against hackers, yet the information on how to get started on hacking a computer is available the google.


Pseudonym: jl.delc
Website: http://www.cyberspacelaw.org
Title: [Learning Cyberlaw in Cyberspace]
Date: 08/01/14
Time: 10:56:16 AM

Comments

Although it is pretty simple how the webpage is organized, I found pretty accurate the explanations and definitions that they expose. The have modules in which they explain in detail what are they consist of.


Pseudonym: lebronjames
Website: http://smallbusiness.chron.com/major-ethical-issues-business-people-face-20900.html
Title: What Are the Major Ethical Issues Business People Face?
Date: 05/05/15
Time: 09:23:30 PM

Comments

Employee working conditions play a big role in ethical issues, because the environment the workers are kept reflects on their attitude towards others, along with how hard the task the employee is doing. Giving employees breaks while working on hard tasks can minimize the workers frustration and stop any further conflicts from happening.


Pseudonym: DJCTreyCinco
Website: https://www.freelock.com/newsletter/information-technology-business-big-picture
Title: Information Technology in Business: The big picture
Date: 05/14/15
Time: 10:06:20 PM

Comments

has good insight on the subject.