click below
click below
Normal Size Small Size show me how
3.02
Manage this
Audit | process by which an organization's accounts and records are verified |
business continuity | an organization's ability to function during and after a disaster |
Compliance | fulling the requirements of the law |
consistency | stability ; regularity |
data | facts and figures |
data processing | converting facts and figures into useful information |
decision-making | choosing among alternatives |
hack | unauthorized access to a computer system |
information | data presented in a useful term |
information management | the process of accessing, processing, maintaining, evaluating, and disseminating knowledge. facts or data for the purpose of assisting business decision-making |
information overload | communication that is too much and/or comes too fast to process at one time |
management information system (MIS) | an integrated technology that assists with an organization's information management needs |
outsourcing | Acquiring assistance from outside organizations/consultants to obtain goods and services to accomplish business objectives or perform primary business activities |
proprietary information | private information that belongs to an organizations and cannot be released to the public |
Sarbanes-Oxley Act | A U.S regulation mandating the public business comply with specific accounting requirements |
spam | junk-email that the recipient did not request; also known as unsolicited commercial emails |
trade secret | undisclosed information within a particular business or industry |
viruses | computer programs that download to your computer or network without your permission ; programs designed to disrupt computer operations |
wireless network | a computer network connected with the use of wires or cables |