ADMS 2511 Lecture Notes - Lecture 2: Business Continuity Planning, Data Center, Car Dealership

65 views7 pages

Document Summary

Protect intellectual property production (copyright and patents) Make something that is difficult to copy. Innovation - make it different: bargaining power of suppliers. Use of the internet - for choices want to be able to get access to greatest amount of suppliers: bargaining power of customers. Internet - need to make a customer oriented site (crm) - use of internet to go from one end of sales cycle to other end. Allow customers to build their own products. Apple online you can add components to create a system specifically for you: rivalry among existing firms. Examine it ethical issues, practice ethical analysis and identity theft. Explain main threats and risks to it security. Describe the control layers used to categorize operational practices. Relate it threats and risks to mitigation (i. e. controls) What is unethical is not necessarily illegal. If it is illegal it is most likely unethical. Identity theft could occur is information is not kept private.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions