Copyright

Effects & Impact of Technology Flashcards

Effects & Impact of Technology Flashcards
1/20 (missed) 0 0
Create Your Account To Continue Studying

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access
Ergonomics
The science of fitting the work to the person rather than forcing employees to adapt to the work
Got it
One benefit of job design

Motivate employees

Improve productivity of employees and managers

Got it
Data tampering

1) Entering false or fraudulent data into a computer

2) Changing or deleting existing data

Got it
Cracker
Someone that breaks into a computer for a malicious purpose
Got it
Sabotage of computer resources
An intentional computer threat where computer resources are made unusable
Got it
Data theft
An intentional computer threat where private data is stolen and used maliciously
Got it
Denial of service attack
An intentional computer threat that overloads the network and prevents authorized use.
Got it
Computer virus
An intentional computer threat that infects a computer without the user's knowledge.
Got it
Spyware
Intrusive technology that infects a computer with peer-to-peer file swapping software without the user's consent.
Got it
Employee Internet Management (EIM) software
Software used to filter and monitor employees' Internet usage.
Got it
20 cards in set

Flashcard Content Overview

Technology impacts our daily lives in ways never before seen. From monitoring our use of technology in the workforce, to protecting our individual identities, to safeguarding our intellectual property, technology has changed the way we operate in the global world. In this flashcard set, you will review the effects and impacts of technology on computer security, including the basics of employee monitoring software, and intentional computer threats. Additionally, you will review the impact technology has had on employment, and how it is used to increase employee motivation and health. Lastly, you will learn how technology, particularly ease of access to private information, affects traditional concept of intellectual property and the growing movement towards open source software.

Front
Back
Employee Internet Management (EIM) software
Software used to filter and monitor employees' Internet usage.
Spyware
Intrusive technology that infects a computer with peer-to-peer file swapping software without the user's consent.
Computer virus
An intentional computer threat that infects a computer without the user's knowledge.
Denial of service attack
An intentional computer threat that overloads the network and prevents authorized use.
Data theft
An intentional computer threat where private data is stolen and used maliciously
Sabotage of computer resources
An intentional computer threat where computer resources are made unusable
Cracker
Someone that breaks into a computer for a malicious purpose
Data tampering

1) Entering false or fraudulent data into a computer

2) Changing or deleting existing data

One benefit of job design

Motivate employees

Improve productivity of employees and managers

Ergonomics
The science of fitting the work to the person rather than forcing employees to adapt to the work
Globalization
The increasing movement of goods, services, and capital across international borders.
Downsizing
Reducing the number of employees in an organization in order to cut operating costs
Third party cookies
Data collection process to track and collect data on Internet usage.
Trademark
Legal protection of a company's unique logo, phrase, name, or symbol that identifies its product or service.
Intellectual property
Intangible or non-physical right to property that results from original thought, such as art, writings, or inventions.
Open source software
Software freely distributed with accessible source code making it much easier to access valuable information.
Moodle
An open source software
Closed source
Software that is distributed for a price and the source code is not accessible.
E-commerce
Electronic commerce; buying and selling products over the Internet
Mobile commerce
M-Commerce; using smartphones, tablets and other mobile devices to buy and sell products over the Internet.

To unlock this flashcard set you must be a Study.com Member.
Create your account

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member

Already a member? Log In

Support