17
Paper / Course: CISPG2202 / CISPG2305 By Dr. P.K. Paul, MSc CIS 2 nd Semester/ GE in CIS/ Electronic Contents 1 Cyber Sciences & Terminologies Topics Covered: 1. Terms Related to the Cyber Sciences 2. Meaning & role of Cyber related Sciences Cyber Sciences? The Increasing Shape Cyber is related to information technology. There are many objects/areas which are associated with cyber. Most commonly we learned about the Cyber Cafe. Such as – Cyber café Cyber crime Cybernetics Cyber space Cyber hygiene Cyber warfare Cyber organism Cyber law Cyber attack Cyber culture Cyber age Cyber security Cyber forensic However, among these areas within Cyber Sciences and Technologies few important and major concerns are provided (herewith)— Cyber Café Cyber café is derived from the term ‘Café’ (which was originated from the term coffee) during 1990’s the increasing number of computers and allied products need initial the concept of Simple Easy to Understand General Language

Cyber Sciences & Terminologies

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1

Cyber Sciences & Terminologies

Topics Covered:

1. Terms Related to the Cyber Sciences

2. Meaning & role of Cyber related Sciences

Cyber Sciences? The Increasing Shape

Cyber is related to information technology. There are many objects/areas which are associated

with cyber. Most commonly we learned about the Cyber Cafe. Such as –

• Cyber café

• Cyber crime

• Cybernetics

• Cyber space

• Cyber hygiene

• Cyber warfare

• Cyber organism

• Cyber law

• Cyber attack

• Cyber culture

• Cyber age

• Cyber security

• Cyber forensic

However, among these areas within Cyber Sciences and Technologies few important and major

concerns are provided (herewith)—

Cyber Café

Cyber café is derived from the term ‘Café’ (which was originated from the term coffee) during

1990’s the increasing number of computers and allied products need initial the concept of

Simple

Easy to Understand

General Language

By Dr.

Internet Café. Thereafter, the concept of Cyber Café was emerged with merge bo

(shown in fig 1). In generally cyber café

• Use of Internet to the common people or licensed or registered members.

• Use of computer for documentation, official purpose, academic purpose, business and

personal purpose.

• To educate candidates towards the basic computer literacy and also other areas such as

Internet Literacy, Web Literacy, Network Literacy etc.

Cybernetics

Cybernetics is an important concept of controlling system using technology. It is very much

associated with physical, biological, social systems.

Cyber Warfare

Cyber warfare is an important concept in cyber world. It is about the use of

Crime and cyber related technologies to the state, nation and territories by other countries

Cyber Culture

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic

Internet Café. Thereafter, the concept of Cyber Café was emerged with merge bo

(shown in fig 1). In generally cyber café means the following attributes.

Use of Internet to the common people or licensed or registered members.

Use of computer for documentation, official purpose, academic purpose, business and

To educate candidates towards the basic computer literacy and also other areas such as

Internet Literacy, Web Literacy, Network Literacy etc.

Cybernetics is an important concept of controlling system using technology. It is very much

associated with physical, biological, social systems.

Cyber warfare is an important concept in cyber world. It is about the use of

nologies to the state, nation and territories by other countries

CISPG2202 / CISPG2305

Electronic Contents 2

Internet Café. Thereafter, the concept of Cyber Café was emerged with merge boarder context

Use of Internet to the common people or licensed or registered members.

Use of computer for documentation, official purpose, academic purpose, business and

To educate candidates towards the basic computer literacy and also other areas such as

Cybernetics is an important concept of controlling system using technology. It is very much

Cyber warfare is an important concept in cyber world. It is about the use of Computer and IT

nologies to the state, nation and territories by other countries.

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 3

Cyber culture is an important concept information/ society/ information age/ IT age/ Digital age

or more clearly Digital society. In this system individuals and common people are very much

associated with IT and digital (cyber products, tools and technologies). Cyber culture is apart

from this associated with application of IT in cultural affairs, rituals etc [3], [7].

Cyber Forensic

Cyber forensic is related to computer and IT forensic. It is a part of management science, law,

medical science and obviously information technology. Cyber forensic is also a part of forensic

science (digital forensic science). It is required for examining the affairs related to cyber-crime

and analysing data.

Cyber Laws and Act

Cyber Law is a concept and area which combined with information and communication

technology or IT with Legal Studies/ Law. Country wise Cyber law depends upon the situation

and jurisdiction. Cyber Law is also called as IT Law or Internet Law or ICT (Information and

Communication Technology) Law.

Cyber Crime

When the crime involves with computer and network, it is called as cyber-crime. This kind of

offense is mainly undertaken by an individual or group to an individual or group. Cyber-crime is

mainly related to internet crime. In recent past cyber-crime is also has a different form, it is

called cyber-crime.

Cyber Security

Cyber security is related to the cyber-crime and the forensic. It is required for preventing

unnecessary access from the third party. Cyber security is also related with the following areas –

• Computer Security

• IT Security.

• Information Security.

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 4

Cyber Crime

Cyber-crime is increasing day by day and thus security measurement also increasing in different

areas such as-

• Web Security

• Database Security

• Network Security

Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers,

research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1

Cyber Crime, Cyber Security & Cyber Laws

Topics Covered:

1. Basics of Cyber Crime

2. Tools and Technologies in Cyber Crime

3. Cyber Securities and Way

4. Cyber Laws: Basic & Need

Cyber Crime

When the crime involves with computer and network, it is called as cyber-crime. This kind of

offense is mainly undertaken by an individual or group to an individual or group. Cyber-crime is

mainly related to internet crime. In recent past cyber-crime is also has a different form, it is

called cyber-crime. Cyber-crime may have different target tools and technologies. Such as-

• Individual computer.

• Group of computer.

• Server/s.

• Database.

• Network.

• Website.

• Intranet/ extranet system etc.

There are many concerns which are fall under the Cyber and Internet Crime and among these

few major are include—

• Getting password by the illegal way by the email attachment is called phishing. It is an

important cyber crime and offense.

• Any kind of virus or malware attached file contents violation of cyber law world and thus

it is an offensive act.

Simple

Easy to Understand

General Language

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 2

• Use of content without the permission of the author or responsible person is called cyber

crime.

Cyber Security

Cyber security is related to the cyber-crime and the forensic. It is required for preventing

unnecessary access from the third party. Cyber security is also related with the following areas –

• Computer Security

• IT Security.

• Information Security.

Cyber-crime is increasing day by day and thus security measurement also increasing in different

areas such as-

• Web Security

• Database Security

• Network Security

Cyber Laws and Act

Cyber Law is a concept and area which combined with information and communication

technology or IT with Legal Studies/ Law. Country wise Cyber law depends upon the situation

and jurisdiction. Cyber Law is also called as IT Law or Internet Law or ICT (Information and

Communication Technology) Law. As Law formed and governed by the rules and regulation

thus it is passed and ensured by the controlling body, constitution, court or similar bodies. As far

as Cyber Law is concerned it is controlled by specific cyber security task force, police and anti

crime cell etc. In Information Technological Field, crime is an important issue and for managing

such crime various acts has been passed. The following are some of the directly and indirectly

related act may be useful for this purpose—

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 3

• Electronic Commission Privacy Act, 1986

• Federal Privacy Act, 1974

• Data Security Act, 2007

• Data Accountability & Trust Act

• Computer Fraud and Abuse Act, 1984

• Communication Act, 1996

• IT Act 200 etc

In India, Information Technology act was passed in the year 2000 and thereafter in 2005 another

important act was passed by the parliament. It is officially called as Right to Information (RTI)

Act. IT Act is an important act that was passed in the year 2000 by the President of India. It is

mainly undertaken due to increasing number of cyber crime and IT Crime. IT Act is applicable

throughout the nation for offence and crime management. In 2008 the IT Act was revised. Most

of the important portion of this act is under Section 66. Internationally among the laws and major

rules in respect of Cyber and IT Systems HIPPA and COPPA are important.

Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers,

research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over

phone at 07797700765 (From 11 AM to 3 PM IST)

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1

Information Privacy: Need & Roles

Topics Covered:

1. Information Privacy & Policies: Overview 2. Technologies in IT Project Management

Information Privacy & Policies: Overview Information privacy is responsible and works for the misuse of information as well as data of a

particular person or a kind of organization. Among the international player, Europe is an name

for taking necessary steps about information. Most of the countries as well as independent region

Europe and many in Latin America and the Caribbean, Asia, and Africa, have adopted data

protection laws due to its important and benefits. The United States has a comprehensive

information privacy law, but with some limitations. All over the world every organization has

information and in different forms and managing this information and its protection is important

and valuable. It is worthy that Europe and nearest nations have enacted different kind of data

protection laws for the disclosure as well as misuse of information. 80 + countries as well as

independent region in different continents now a days having this kind of laws and regulation.

Though important is the United States is noted for not having an extensive law but rather having

enacted different kind of but limited sectoral laws. The privacy laws of the United States deal

with several different legal concepts

Information Policy is actually deals with the phases that the information goes by way of

beginning with its creation. Information policy became an important study area and domain in

the late of 20th century during the transition of industrial to Information Society. The growing

and advanced Information Policy system has enhanced this is as a field of studies even in many

countries. In Information Policy, the laws and regulations related to the information and data is

most valuable. Information Policy is a broader field including the areas drawn from computer

security, information privacy, internet etc multitude of components. The Information Policy has

importance into different fields and it related with the Information Science in some extend. In

Information Law and Policy different subjects are covered which are helpful for the data

protection. The main reason for the need of Information Policy deals with the legal issues that

Simple

Easy to Understand

General Language

By Dr.

can be connecting with the advancement of technology.

Information Law and Privacy, United States is important and most valuable. In Data protection

and laws role of local government and central government both are important into their

respective situation. Data localization, regulation viz. HIPPA, COPPA et

valuable in most respect.

Fig 1: Information Governance Framework at a glance

Needs of information privacy

Privacy is a kind of secrecy of annearby themselves. Information privacy system is the concept and procedure for securing the information and content. It is important that something is private to a person or group andgenerally sometimes essentially special or sensitivethe security and a kind of concepts for using appropriate use and protection of information and contents. Privacy may also considered as physical security, the Data Protection Act, Europe itself says about the privacy principles of following ty

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic

can be connecting with the advancement of technology. Among the countries engaged

Information Law and Privacy, United States is important and most valuable. In Data protection

and laws role of local government and central government both are important into their

respective situation. Data localization, regulation viz. HIPPA, COPPA etc are also important and

Fig 1: Information Governance Framework at a glance

Needs of information privacy

a kind of secrecy of an individual or group to keep apart themselves, or information Information privacy system is the concept and procedure for securing the

information and content. It is important that something is private to a person or group andlly special or sensitive. The information privacy partially

and a kind of concepts for using appropriate use and protection of information and contents. Privacy may also considered as physical security, the Data Protection Act, Europe itself says about the privacy principles of following types (refer Fig: 2).

CISPG2202 / CISPG2305

Electronic Contents 2

Among the countries engaged in

Information Law and Privacy, United States is important and most valuable. In Data protection

and laws role of local government and central government both are important into their

c are also important and

Fig 1: Information Governance Framework at a glance

individual or group to keep apart themselves, or information Information privacy system is the concept and procedure for securing the

information and content. It is important that something is private to a person or group and it privacy partially deals with

and a kind of concepts for using appropriate use and protection of information and contents. Privacy may also considered as physical security, the Data Protection Act, Europe

By Dr.

Fig 2: The core Data protection principles at a glance (gov.uk)

Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic

Fig 2: The core Data protection principles at a glance (gov.uk)

The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.

clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

CISPG2202 / CISPG2305

Electronic Contents 3

Fig 2: The core Data protection principles at a glance (gov.uk)

The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers,

clarification you can contact at Email:[email protected] or over

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1

Business Informatics: Overview

Topics Covered:

1. Concept of Business Informatics

2. Characteristics of Business Informatics

3. Business Informatics: Smaller & Allied Field/ Nomenclature

4. Technologies & Stakeholders of Business Informatics

Business Informatics: Concepts

Business Informatics is about the applications and integration of Information Science and

Technology into Business and Management tools and techniques into the Business Systems. It is

also about combining the concept of Business and Technologies. The field is also called as

Business Information Science and in some countries as Business Information Systems. The areas

in current age are not only the tools and techniques but also a subject. Initially, the subject

treated as a concept and research areas and now this becomes a full-fledged subject in various

context. The area of Business Informatics is also increasing in recent past from technologies and

tools to conceptual management areas viz. IT Governance, IT Policy, IT Management,

Information Administration, and Information Management. In recent past, the concept of

technologies have been increased and several areas are included which are majorly part of

components of Information Technologies viz. Database Technology, Networking Technology,

Communication Technology etc. Among the latest areas Data Sciences play a lead role with the

components of Big Data Technologies powered by Data warehousing, Data Mining etc.

Business Informatics: Smaller & Allied Field/ Nomenclature

The world is changing rapidly and behind this change Computing and Information Technology

plays a leading role. Similarly, Management also plays a leading role for the development of any

kind of organization, institutions, and individuals. Both the concepts in an organizations and

institutions lead the growth of merged concept called Business Informatics. Internationally

universities are moving towards introducing new age, skill based, interdisciplinary and clustering

Simple

Easy to Understand

General Language

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 2

subjects and domains and Business Informatics is one of the important ones. Ideally, there are

variations in the related and allied domains and fields viz.

• Business Information Technology

• Business Information Systems

• Business Information Science/s

• Business Informatics etc .

Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1

Business Informatics: Technologies & Stakeholders

Topics Covered:

1. Technologies & Stakeholders of Business Informatics

Technologies & Stakeholders of Business Informatics

Among the technologies uses in the Business and Cooperates few important and concerns are

include Networking and Communication Technologies, Database Technologies etc. Among

these, few latest and emerging areas (which are required for promoting Business Systems and

Corporate houses) include Internet of Things (IoT), SEO and Digital Marketing, Big Data and

Analytics, Security Informatics and Information Assurance etc. The Big Data and its importance

are rising due to several issues. First of all, the increasing number of Data and contents and

required data in a right from and fight time to the right place.

Business Information Science is an important concept of modern Information Age. It is a

combination of business studies, Management Studies and Information Science and Technology.

Business Information Science deals with following tools, techniques, and technologies (refer fig:

1).

Simple

Easy to Understand

General Language

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 2

Fig: 1 The typical Areas of Business Information Science

• Business Intelligence

• Enterprise Resource Planning

• Business and Data Warehousing

• Search Engine Optimization

• Business Analytics.

Business Information Science is also called as business informatics (smaller than Business

Information Technology) in European countries. Business Information Science is associated with

the following as well.

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 3

• E-Business

• E-Commerce

• Digital Marketing / eMarketing

Business Informatics is also associated with the following areas (in respect of Management)-

• IT Governance

• IT Policy

• IT Management

• Information Administration

• Information Management.

Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1

Big Data Applications in Business Informatics

Topics Covered:

1. Concept of Business Informatics

2. Concept of Big Data

3. Big Data in Business Informatics

Business Informatics and Big Data

Business Informatics is very much close with the concepts of Business Information Technology

(which is smaller than Business Informatics and deals with the attributes and components of IT

only), Business Information Systems (which is broader than Business IT and deals with the IT

Management and System Analysis as a special focus). As far as Business Information Science is

concerned it is about technological and manual information solutions to the business. In

generally the following are treated as core components and stakeholders of Business

Informatics/IS—

• Content/Information

• Business and Corporate Houses

• Techniques

• Technology (IT & Computing mainly).

The Figure: 1 illustrate different areas required for the purpose of Business Informatics. It is

worthy to note that ideally Business Informatics should deals both manual information solutions

and technological and here among the manual tools and techniques important are include—

• Indexing Systems

• Abstracting Systems

• Documentation Systems

• Authority File

• Schematic Planning and Charts etc

Simple

Easy to Understand

General Language

By Dr.

Fig: 1 The stakeholders of

Note: The Contents authorship: Dr. P.K. Paul &research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

Technology

Paper / Course: CISPG2202 / CISPG2305

By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic

The stakeholders of Business Information Science

The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.

For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)

Business/ Corporates

Techniques

Management

Technology

Information

CISPG2202 / CISPG2305

Electronic Contents 2

Prepared from his own contents, papers,

For Any doubt and clarification you can contact at Email:[email protected] or over