click below
click below
Normal Size Small Size show me how
302 Manage these Key
Manage This
audit | Process by which organizations accounts and records are verified |
Business continuity | An organization ability to function during and after a disaster |
Compliance | Fulfilling the requirements of the law |
Consistency | Stability; regularly |
data | facts and figures |
data processing | Converting facts and figures into useful information |
Decision making | Choosing among alternatives |
hack | Unauthorized access in a computer system |
information overload | Communication that is too much and or comes too fast to process at one time |
Management information system | An integrated technology that assists with an organizations information management needs |
Outsourcing | Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities |
Proprietary information | Private information that belongs to an organization and cannot be released to the public |
Sarbanes-Oxley Act | A U.S. regulation mandating that public businesses comply with specific accounting requirements |
Spam | Junk emails that the recipient did not request; also known as unsolicited commercial email |
Trade secret | Undisclosed information within particular business or industry |
Viruses | Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations |
Wireless network | A computer network connected without the use of wires or cables |
information | data presented in useful form |
information management | The process of accessing processing maintaining evaluating and dissemination knowledge facts or data for the purpose of assisting business decision making |