This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: technostress) Information asymmetry Internet technology (Infrastructure) Intranets and its benefits Just-in-time model Logistics M-commerce Moral Dimensions of the Information Systems Patent Privacy Property rights Pull-based model Pushed-based model Re-intermediation Smart cards Stored value payment system Supply Chain / Execution systems System vulnerability and abuse (Hackers and Computer Crimes, Identity theft, Computer crimes, Internal threats, and Information Systems Controls) Establishing a Framework for Security and Control Threats against information systems Trade secret Websites (What information do they gather, how they use it, how they use personalization)...
View Full Document
This note was uploaded on 03/31/2011 for the course ACT 1122 taught by Professor Asd during the Spring '11 term at Troy.
- Spring '11