This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: technostress) Information asymmetry Internet technology (Infrastructure) Intranets and its benefits Just-in-time model Logistics M-commerce Moral Dimensions of the Information Systems Patent Privacy Property rights Pull-based model Pushed-based model Re-intermediation Smart cards Stored value payment system Supply Chain / Execution systems System vulnerability and abuse (Hackers and Computer Crimes, Identity theft, Computer crimes, Internal threats, and Information Systems Controls) Establishing a Framework for Security and Control Threats against information systems Trade secret Websites (What information do they gather, how they use it, how they use personalization)...
View Full Document
- Spring '11
- computer vision syndrome, Information systems controls, Data security controls, Churn rate Controls, Systems Enterprise Systems