Week+3+Class



**Week 3 Agenda **
 * //A. In-class – //** **//Ethics and Information Security: MIS Business Concerns//**
 * Learning Objectives
 * Explain the ethical issues in the use of information technology. Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (Baltzan).
 * Identify the six e-policies organizations should implement to protect themselves.
 * Ethical computer use policy
 * Information privacy policy
 * Acceptable use policy
 * Email privacy policy
 * Social media policy
 * Workplace monitoring policy
 * Describe the relationships and differences between hackers and viruses.
 * Describe the relationship between information security policies and an information security plan.
 * Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

6:00 pm - Discussion Recap
 * Shipping costs
 * Appearance of website and ease of navigation
 * Return process
 * Size, fit, and feel of material
 * Color
 * <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%;">**Clickstream data** shows:
 * <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%;"> where and how customers are accessing the content of webpages, and this data allows for analysis of usage patterns.
 * <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%;">From this information a company can devise better navigation, choose sale items, place certain items in the forefront, and create incentives to improve the customer experience and loyalty.
 * <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%;">This data can also help them identify possible issues with a site. For example, if a trend shows a large percent of customers are searching for a specific item, yet none of them are making it to the cart or converting, that would signal the e-tailer to examine reasons for this.
 * <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%;">A detailed article about this can be found at [].

=== media type="youtube" key="Cg1x3_DIH4Y" width="425" height="315" align="center"

=== <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%;">How Online Retailers Can Reduce Returns and Increase Retention
 * <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 120%; line-height: 1.5;">Security online- Safe online shopping: 10 tips to avoid getting burned":

<span style="font-family: Tahoma,sans-serif; font-size: 12pt; line-height: 1.5;">6:30 pm - Tech in the News

<span style="font-family: Tahoma,sans-serif; font-size: 12pt;">7:00 pm - <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 15.6000003814697px;">Business Information Security & Ethics

<span style="font-family: Tahoma,Geneva,sans-serif; font-size: 15.6000003814697px;">7:30 pm - Security

<span style="font-family: Tahoma,Geneva,sans-serif; font-size: 15.6000003814697px;">8:30 pm - Viruses

<span style="font-family: Tahoma,sans-serif; font-size: 12pt; line-height: 1.5;">8:30 pm - Jeopardy Review ppt. & Activity

<span style="font-family: Tahoma,sans-serif; font-size: 12pt; line-height: 1.5;">9:00 pm - Group Projects