CIS3345:
Management Information Systems

Spring, 2015

Chapter 13 References
[Home][Course Schedule][Evaluation Areas][Lecture Slides][Additional Coverage][Submission Forms]

The sites listed below are the existing references to date. Recently submitted references are located under the new reference submissions. All Submissions are recorded here. If there are Duplicate submissions (of sites), all sets of comments are recorded. If the submitter wishes to give their name, it is noted.

Site: http://www.cs.cf.ac.uk/courses/bscis/whydegree.html
  • This site offers (very Briefly) some of the reasons why information systems are important and Why You Should Study a Subject like Information Systems.
Site: http://www.coba.usf.edu/departments/isds/grads/hungerford/gen_sys_theory.html
  • General Systems Theory
    These are some General Systems Theory notes from Bruce C. Hungerford's class at The University of South Florida. They are in outline form and apparently correspond to his lecture. A nice overview: They ask some basic questions and then provide the answer (Submitted by P. Kirs)
Site: http://science.kennesaw.edu/~mguimara/3600/ch1.ppt
  • Introductory Systems Analysis Concepts
    The link offers lecture slides prepared for the text Systems Analysis and Design by Dennis, Wixom, and Tegardem by the Publisher (John Wiley and Sons). The topics generally correspond to those covered in this class
Site: http://en.wikipedia.org/wiki/Antivirus_software
  • Wikipedia describes antivirus software as well as approaches of using it.
Site: http://en.wikipedia.org/wiki/Ergonomics
  • This is an easy to read/understand wikipedia sight on Ergonomics. It provides a detailled definition and examples of Ergonomics.
Site:  http://www.technewsworld.com/story/47833.html
  • Very interesting issues are addressed
Site: http://sixtyminutes.ninemsn.com.au/sixtyminutes/stories/2002_02_10/story_498.asp
 
  • Here it gives an idea of what hackers do. They can steal anything from you and ordinary people since big companies and government have found ways to protect thier computer systems; so easy targets are ordinary people. It even says that those with cameras on their computer can even watch you, the bad thing is that you don't even know or never know about it.

Site: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci815177,00.html
  • I liked the website because it not only gives you the definition but it also gives you tips to avoid having this problem.
Site: http://www.symantec.com/security_response/writeup.jsp?docid=2007-011917-1403-99
  • This website gives you a description of the Trojan virus and information of how to get rid of this virus from your computer.
Site: http://www.securitydocs.com/library/3534
  • Talks about the security challenges with different types of internet users.
Site: http://www.usdoj.gov/criminal/cybercrime/cclaws.html
  • I like this web site because it gives the opportunity to look up cases,legal resources, expands your knowledge a little more on computer crime!!
Site: http://www.criminaldefenseassociates.com/crimes/whitecollar
  • good place to learn about the illegal practices of theives on the internet
Site: http://www.appinonline.com/network.php
  • This website explains various hacking attempts, intrusion and tools available on internet. It also explains how to secure your systems from these attempts.
Site: http://www.tomw.net.au/2005/ethicsit.html
  • Summary of the problems rising for IT careers and ethical values
Site: http://www.wgsoftpro.com/pages/engpages/enolap.shtml
  • It is the website of a company. The main goal is development and introduction of the existing solutions into a branch of database management systems that are primary for managing and accounting for all kinds of companies and corporations
Site: http://en.wikipedia.org/wiki/Anti-virus_software
  • it is a nice site because you get to know your enemy
Site: http://csrc.nist.gov/
  • This website has a very informative glossary of computer security terms.

Site: http://www.microsoft.com/smallbusiness/resources/management/leadership_training/put_it_in_writing_your_business_has_ethics.mspx?xid=OVPI188
  • This website is very interesting it relates to business ethicts and how important it is for a business to have good business ethics to succeed. Along these lines this website recommends that businesses have a written code of ethics and a mission statement for all employees to live and follow. According to the latter a business without out an ethics code or vision of where it is headed, is doomed to fail.

Site: http://lef.csc.com/foundation/library/106/rp06.asp
  • Raises the awareness of the implications of computer security in the minds both of management and individual users

Site: http://www.howstuffworks.com/virus.htm
  • This website helps understand how computer virus work and how to protect against them.

Site: http://searchsecurity.techtarget.com/topics/0,295493,sid14_tax300000,00.html#
  • News, advice and commentary on legal and ethical topics such as CAN-SPAM, CALEA, information security legislation, vulnerability disclosure, intellectual property, electronic records and more.

Site: http://www.business-ethics.com/
  • Everything and anything is in this website can be useful for solving business dilemmas from corporate to a partnership business.

Site: http://www.campusactivism.org/html-resource/hackers/section6.html
  • The act of gaining access without legal authorization to a computer or computer network. A common method of hacking is to email someone a program that either automatically runs, or that runs when they click on an attachment. By doing this, it can install a program that will give you control of their computer.

Site: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=304308&pageNumber=1
  • This article in Computer World talks about the dilemmas IT professionals encounter and how different people handled them.

Site: http://portal.unesco.org/shs/en/ev.php-URL_ID=10581&URL_DO=DO_TOPIC&URL_SECTION=201.html
  • This webpage talks about how the Ethics of Science and Technology Programme was created in 1998 to give an ethical sence to technology and science with a democratic norm building.

Site: http://www.cert.org/homeusers/HomeComputerSecurity/
  • Home computers in recent years have been neglected when it comes to PC security. Hackers are moving from laptops to home PC's because of more modern wireless high speed internet connections which help hackers attack other PC's through you PC. When hackers create damage and steal vital information they use several PC's which makes it very difficult to pinpoint where the theft originated from.

Site: http://www.societyforbusinessethics.org/
  • This website have a forum for people to post blog about business ethics. They can help each other provide advise for business ethics.

Site:  http://www.ergonomics.org/
  • talks about what ergonomics is what its for, and ways to implement it.

Site: http://www.htmlgoodies.com/beyond/security/article.php/3473201
  • basics of firewall protection against mean computer nerds!

Site: http://www.aitp.org/
  • Association of Information Technology Professionals (AITP) official website.

Site: http://www.business-ethics.org/
 
  • I did not know the existance of this organization but I think it's important to promote the ethics in International or global business like this organization does. Their mission statement is: Fostering global business practices that promote equitable economic development, resource sustainability, and just forms of government.

Site: http://cybercrime.planetindia.net/trojans.htm
  • Contains information of the history of cyber crime, types, examples, news and cases as well!

Site: http://www.businessweek.com/managing/company/business_ethics/
  • the website provides some articles related to business ethics. sometimes accepting and learning from defeat can take you a long way!

Site: http://www.usernomics.com/ergonomics.html
  • Historically, Ergonomics was another name for Human Factors. Today, Ergonomics commonly refers to designing work environments for maximizing safety and efficiency.

Site: http://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
  • This is concise lesson prepared by a professor, introducing the topic of Security and Challenges, using lecture outline, learning objectives, lecture notes, graphics, and clear-cut definitions.

Site: http://www.inf.uni-konstanz.de/soft/teaching/ws05/seminar/Malicious_Applets.pdf
  • In depth information on malicious applets and how they can break privacy rules.

Site: http://www.business-ethics.com/
  • it lectures us of the big role a company has to play with ethic

Site:  http://news.bbc.co.uk/1/hi/sci/tech/994700.stm
  • Gives a timeline of infamous hacking cases in history. Found it interesting to see where "hacking" originated.

Site:
  •  

Site:
  •  

Site:
  •  

Site:
  •  

Site:
  •  

Site:
  •