The following study guide is meant to help you prepare for the final exam. This material is for your practice and review only. You will not be asked to turn in your responses to the questions and activities below. As you work through these study guides, take note of your confidence level with the material. Ask yourself if you feel comfortable with your grasp of these topics, and take the suggestions for resources to re-watch or re-read seriously before proceeding to the final exam.
A. Technology has provided the gateway to connecting people through the network society.
B. According to Friedman, the third era of globalization introduced the graphical user interface of the personal computer, the build-out of the Internet infrastructure during the dot com boom, and software to automate and integrate business processes.
To prepare for the final exam, read the specific technologies Friedman noted in the third era of globalization under “The world is flat” in Chapter 11 of Information Systems for Business and Beyond.
A. SMTP, HTML, and TCP/IP are Internet protocols that became standards widely used by everyone during the late 1990s.
B. Workflow software is software that allows people to work together easily and allows the integration of different software packages and databases according to Friedman.
C. Globalization 1.0, 2.0, and 3.0 are the three eras of globalization according to Friedman. Provide a definition for each era of globalization.
Definitions of the three eras of globalization may be found in the section labeled “The World is Flat” in Chapter 11. How do your definitions of each era compare to what the textbook says?
A. Infrastructure differences, labor laws and regulations, legal restrictions, language, customs, and preferences all present challenges companies must be aware of in the latest era of globalization.
B. Advantages of globalization include the ability to operate 24 hours a day, the ability to locate expertise and labor globally, and a larger market to distribute and sell products to.
C. Should new business owners stay local or expand globally as they grow their business? What are the pros and cons of each approach?
Read about the advantages and disadvantages of globalization in “The Global Firm” in Chapter 11 to understand the considerations businesses must include in a globalization plan.
A. An attempt to remedy the digital divide issue was the One Laptop per Child effort which was designed to empower children in developing countries by issuing technology they otherwise would have been unable to access.
B. Jakob Nielsen noted there are actually three factors at play in the digital divide: an economic divide, a usability divide, and an empowerment divide.
C. What do each of these three factors of the digital divide mean to you? How does each contribute to there being a digital divide?
Read “The Digital Divide,” “One Laptop per Child,” and “A New Understanding of the Digital Divide” in Chapter 11 to prepare for the final exam. Review the task you completed for 6.1.3 Bridging the Digital Divide.
A. A code of ethics outlines acceptable behaviors for professional or social groups and is agreed to by all members of the group.
B. What are possible results of violating the Code of Ethics and Professional Conduct of the Association for Computing Machinery (ACM)?
Read “Information Systems Ethics” and “Code of Ethics” in Chapter 12 of Information Systems for Business and Beyond to prepare for the final exam. Then, review the text you read in 6.2.1 Wikibooks: Introduction to Computer Information Systems: “Ethics.”
A. Under the ACM code of ethics, nobody should use someone else’s computer system, software, or data without consent.
B. Individuals should not design or implement a system that deliberately or inadvertently demeans an individual or group.
C. Organizational leaders are responsible to ensure their computer systems enhance, not degrade, the quality of working life for employees.
Read the section “Code of Ethics” in Chapter 12, which explains the ACM code of ethics in more detail. You will want to be confident in your understanding of ethics in information systems before you attempt the final exam.
6g.1. Digital technologies have influenced the domain of intellectual property. Intellectual property is much more difficult to defend in today’s digital world.
A. Intellectual property is any idea, invention, or process that derives from someone else’s work or intellect.
B. Intellectual property laws are written to protect tangible results of an idea. (If you think of a song in your head, you need to actually write it down in order to protect it.)
C. Intellectual property laws offer protection that give people an incentive to release their creative ideas.
D. How can you protect your inventions or ideas in the event someone hacks into your computer and steals them?
Read the section “Intellectual Property” in Chapter 12 to prepare for the final exam and discover ways intellectual property protect ideas.
A. Copyright helps content creators retain their rights over their work and helps them answer questions about who can make copies of it, who can make derivative works from it, who can share it and how, and more.
B. Sometimes a work is owned by a publisher who has an agreement with the author.
Read the sections “Copyright,” “Obtaining Copyright Protection,” and “Fair Use” in Chapter 12 to prepare for the final exam.
A. After obtaining a patent, the inventor has protection from others infringing on their patent.
B. A patent holder can exclude others from making, using, offering for sale, or selling the invention throughout the US or importing the invention into the US.
C. What is the limit of time a patent can protect someone’s invention?
Read “Patent” and “Obtaining Patent Protection” in Chapter 12 to prepare for the exam.
A. Two types of trademarks exist: a common-law trademark and registered trademark.
B. Much like with a copyright, a trademark protects an individual or organization if it is used in the normal course of business.
C. Do trademarks ever expire or need to be re-registered?
D. Can companies legally use a similar logo or phrase that already has trademark protection?
Read “Trademark” in Chapter 12 to help prepare for the final exam.
A. Personally identifiable information is information that can be used to establish a person’s identity. This includes such information as name, social security number, place of birth, medical records, and mother’s maiden name.
B. Information entered in online forms, our tagged location in social media, and other information are susceptible to monitoring and can be aggregated to create a profile of someone.
Read “Privacy,” “Personally Identifiable Information,” and “Non-Obvious Relationship Awareness” in Chapter 12 to prepare for the final exam. Revisit Gry Hasselbalch Lapenta and Rikke Frank Jorgensen’s “Youth, privacy, and online media: Framing the right to privacy in public policy-making” to reflect how one’s expectations of privacy have changed in the past few generations.
A. The first trend of the future of information systems is the ever-expanding globalization that closes the gap between countries through the Internet.
B. Through the advent of Web 2.0 and e-commerce, information systems use has expected to be able to modify their experiences to meet personal tastes.
C. What current trends in information systems technology were only a faint idea just a few years ago?
Read “Global,” “Social,” “Personal,” “Mobile,” “Wearable,” and “Printable” in Chapter 13 of Information Systems for Business and Beyond to get a better sense of these future trends. Revisit the article “A tour through Mary Meeker’s 2016 Internet trends report,” which you read in subunit 6.3.1, to see how Mary Meeker presented her research on current and upcoming trends in Internet technologies.
Unit 6 Vocabulary List
This vocabulary list includes terms that might help you answer some of the review items above and some terms you should be familiar with to be successful in completing the final exam for the course.