This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: controls: General Controls, Administrative Controls, S/W controls, H/W controls, computer operations controls, data security controls, implementation controls, processing controls, O/P controls message integrity mobile phones [other mobile technologies] moral dimensions of the information age patent personalization/customization of web sites procurement pull based model push based model reintermediation repetitive stress injury responsibility Social engineering smart cards stored value payments Supply chain, up stream and downstream activities, Supply chain management Supply chain, planning systems, execution systems technostress threats against information systems trade secret trademark Trojan horse ubiguitous Virus WiFi vulnerabilities wireless networks, vulnerabilities of wireless networks worm...
View Full Document
This note was uploaded on 07/19/2011 for the course IS 3300 taught by Professor Pettey during the Spring '08 term at Troy.
- Spring '08