Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1
Cyber Sciences & Terminologies
Topics Covered:
1. Terms Related to the Cyber Sciences
2. Meaning & role of Cyber related Sciences
Cyber Sciences? The Increasing Shape
Cyber is related to information technology. There are many objects/areas which are associated
with cyber. Most commonly we learned about the Cyber Cafe. Such as –
• Cyber café
• Cyber crime
• Cybernetics
• Cyber space
• Cyber hygiene
• Cyber warfare
• Cyber organism
• Cyber law
• Cyber attack
• Cyber culture
• Cyber age
• Cyber security
• Cyber forensic
However, among these areas within Cyber Sciences and Technologies few important and major
concerns are provided (herewith)—
Cyber Café
Cyber café is derived from the term ‘Café’ (which was originated from the term coffee) during
1990’s the increasing number of computers and allied products need initial the concept of
Simple
Easy to Understand
General Language
By Dr.
Internet Café. Thereafter, the concept of Cyber Café was emerged with merge bo
(shown in fig 1). In generally cyber café
• Use of Internet to the common people or licensed or registered members.
• Use of computer for documentation, official purpose, academic purpose, business and
personal purpose.
• To educate candidates towards the basic computer literacy and also other areas such as
Internet Literacy, Web Literacy, Network Literacy etc.
Cybernetics
Cybernetics is an important concept of controlling system using technology. It is very much
associated with physical, biological, social systems.
Cyber Warfare
Cyber warfare is an important concept in cyber world. It is about the use of
Crime and cyber related technologies to the state, nation and territories by other countries
Cyber Culture
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic
Internet Café. Thereafter, the concept of Cyber Café was emerged with merge bo
(shown in fig 1). In generally cyber café means the following attributes.
Use of Internet to the common people or licensed or registered members.
Use of computer for documentation, official purpose, academic purpose, business and
To educate candidates towards the basic computer literacy and also other areas such as
Internet Literacy, Web Literacy, Network Literacy etc.
Cybernetics is an important concept of controlling system using technology. It is very much
associated with physical, biological, social systems.
Cyber warfare is an important concept in cyber world. It is about the use of
nologies to the state, nation and territories by other countries
CISPG2202 / CISPG2305
Electronic Contents 2
Internet Café. Thereafter, the concept of Cyber Café was emerged with merge boarder context
Use of Internet to the common people or licensed or registered members.
Use of computer for documentation, official purpose, academic purpose, business and
To educate candidates towards the basic computer literacy and also other areas such as
Cybernetics is an important concept of controlling system using technology. It is very much
Cyber warfare is an important concept in cyber world. It is about the use of Computer and IT
nologies to the state, nation and territories by other countries.
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 3
Cyber culture is an important concept information/ society/ information age/ IT age/ Digital age
or more clearly Digital society. In this system individuals and common people are very much
associated with IT and digital (cyber products, tools and technologies). Cyber culture is apart
from this associated with application of IT in cultural affairs, rituals etc [3], [7].
Cyber Forensic
Cyber forensic is related to computer and IT forensic. It is a part of management science, law,
medical science and obviously information technology. Cyber forensic is also a part of forensic
science (digital forensic science). It is required for examining the affairs related to cyber-crime
and analysing data.
Cyber Laws and Act
Cyber Law is a concept and area which combined with information and communication
technology or IT with Legal Studies/ Law. Country wise Cyber law depends upon the situation
and jurisdiction. Cyber Law is also called as IT Law or Internet Law or ICT (Information and
Communication Technology) Law.
Cyber Crime
When the crime involves with computer and network, it is called as cyber-crime. This kind of
offense is mainly undertaken by an individual or group to an individual or group. Cyber-crime is
mainly related to internet crime. In recent past cyber-crime is also has a different form, it is
called cyber-crime.
Cyber Security
Cyber security is related to the cyber-crime and the forensic. It is required for preventing
unnecessary access from the third party. Cyber security is also related with the following areas –
• Computer Security
• IT Security.
• Information Security.
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 4
Cyber Crime
Cyber-crime is increasing day by day and thus security measurement also increasing in different
areas such as-
• Web Security
• Database Security
• Network Security
Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers,
research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1
Cyber Crime, Cyber Security & Cyber Laws
Topics Covered:
1. Basics of Cyber Crime
2. Tools and Technologies in Cyber Crime
3. Cyber Securities and Way
4. Cyber Laws: Basic & Need
Cyber Crime
When the crime involves with computer and network, it is called as cyber-crime. This kind of
offense is mainly undertaken by an individual or group to an individual or group. Cyber-crime is
mainly related to internet crime. In recent past cyber-crime is also has a different form, it is
called cyber-crime. Cyber-crime may have different target tools and technologies. Such as-
• Individual computer.
• Group of computer.
• Server/s.
• Database.
• Network.
• Website.
• Intranet/ extranet system etc.
There are many concerns which are fall under the Cyber and Internet Crime and among these
few major are include—
• Getting password by the illegal way by the email attachment is called phishing. It is an
important cyber crime and offense.
• Any kind of virus or malware attached file contents violation of cyber law world and thus
it is an offensive act.
Simple
Easy to Understand
General Language
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 2
• Use of content without the permission of the author or responsible person is called cyber
crime.
Cyber Security
Cyber security is related to the cyber-crime and the forensic. It is required for preventing
unnecessary access from the third party. Cyber security is also related with the following areas –
• Computer Security
• IT Security.
• Information Security.
Cyber-crime is increasing day by day and thus security measurement also increasing in different
areas such as-
• Web Security
• Database Security
• Network Security
Cyber Laws and Act
Cyber Law is a concept and area which combined with information and communication
technology or IT with Legal Studies/ Law. Country wise Cyber law depends upon the situation
and jurisdiction. Cyber Law is also called as IT Law or Internet Law or ICT (Information and
Communication Technology) Law. As Law formed and governed by the rules and regulation
thus it is passed and ensured by the controlling body, constitution, court or similar bodies. As far
as Cyber Law is concerned it is controlled by specific cyber security task force, police and anti
crime cell etc. In Information Technological Field, crime is an important issue and for managing
such crime various acts has been passed. The following are some of the directly and indirectly
related act may be useful for this purpose—
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 3
• Electronic Commission Privacy Act, 1986
• Federal Privacy Act, 1974
• Data Security Act, 2007
• Data Accountability & Trust Act
• Computer Fraud and Abuse Act, 1984
• Communication Act, 1996
• IT Act 200 etc
In India, Information Technology act was passed in the year 2000 and thereafter in 2005 another
important act was passed by the parliament. It is officially called as Right to Information (RTI)
Act. IT Act is an important act that was passed in the year 2000 by the President of India. It is
mainly undertaken due to increasing number of cyber crime and IT Crime. IT Act is applicable
throughout the nation for offence and crime management. In 2008 the IT Act was revised. Most
of the important portion of this act is under Section 66. Internationally among the laws and major
rules in respect of Cyber and IT Systems HIPPA and COPPA are important.
Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers,
research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over
phone at 07797700765 (From 11 AM to 3 PM IST)
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1
Information Privacy: Need & Roles
Topics Covered:
1. Information Privacy & Policies: Overview 2. Technologies in IT Project Management
Information Privacy & Policies: Overview Information privacy is responsible and works for the misuse of information as well as data of a
particular person or a kind of organization. Among the international player, Europe is an name
for taking necessary steps about information. Most of the countries as well as independent region
Europe and many in Latin America and the Caribbean, Asia, and Africa, have adopted data
protection laws due to its important and benefits. The United States has a comprehensive
information privacy law, but with some limitations. All over the world every organization has
information and in different forms and managing this information and its protection is important
and valuable. It is worthy that Europe and nearest nations have enacted different kind of data
protection laws for the disclosure as well as misuse of information. 80 + countries as well as
independent region in different continents now a days having this kind of laws and regulation.
Though important is the United States is noted for not having an extensive law but rather having
enacted different kind of but limited sectoral laws. The privacy laws of the United States deal
with several different legal concepts
Information Policy is actually deals with the phases that the information goes by way of
beginning with its creation. Information policy became an important study area and domain in
the late of 20th century during the transition of industrial to Information Society. The growing
and advanced Information Policy system has enhanced this is as a field of studies even in many
countries. In Information Policy, the laws and regulations related to the information and data is
most valuable. Information Policy is a broader field including the areas drawn from computer
security, information privacy, internet etc multitude of components. The Information Policy has
importance into different fields and it related with the Information Science in some extend. In
Information Law and Policy different subjects are covered which are helpful for the data
protection. The main reason for the need of Information Policy deals with the legal issues that
Simple
Easy to Understand
General Language
By Dr.
can be connecting with the advancement of technology.
Information Law and Privacy, United States is important and most valuable. In Data protection
and laws role of local government and central government both are important into their
respective situation. Data localization, regulation viz. HIPPA, COPPA et
valuable in most respect.
Fig 1: Information Governance Framework at a glance
Needs of information privacy
Privacy is a kind of secrecy of annearby themselves. Information privacy system is the concept and procedure for securing the information and content. It is important that something is private to a person or group andgenerally sometimes essentially special or sensitivethe security and a kind of concepts for using appropriate use and protection of information and contents. Privacy may also considered as physical security, the Data Protection Act, Europe itself says about the privacy principles of following ty
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic
can be connecting with the advancement of technology. Among the countries engaged
Information Law and Privacy, United States is important and most valuable. In Data protection
and laws role of local government and central government both are important into their
respective situation. Data localization, regulation viz. HIPPA, COPPA etc are also important and
Fig 1: Information Governance Framework at a glance
Needs of information privacy
a kind of secrecy of an individual or group to keep apart themselves, or information Information privacy system is the concept and procedure for securing the
information and content. It is important that something is private to a person or group andlly special or sensitive. The information privacy partially
and a kind of concepts for using appropriate use and protection of information and contents. Privacy may also considered as physical security, the Data Protection Act, Europe itself says about the privacy principles of following types (refer Fig: 2).
CISPG2202 / CISPG2305
Electronic Contents 2
Among the countries engaged in
Information Law and Privacy, United States is important and most valuable. In Data protection
and laws role of local government and central government both are important into their
c are also important and
Fig 1: Information Governance Framework at a glance
individual or group to keep apart themselves, or information Information privacy system is the concept and procedure for securing the
information and content. It is important that something is private to a person or group and it privacy partially deals with
and a kind of concepts for using appropriate use and protection of information and contents. Privacy may also considered as physical security, the Data Protection Act, Europe
By Dr.
Fig 2: The core Data protection principles at a glance (gov.uk)
Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic
Fig 2: The core Data protection principles at a glance (gov.uk)
The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.
clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
CISPG2202 / CISPG2305
Electronic Contents 3
Fig 2: The core Data protection principles at a glance (gov.uk)
The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers,
clarification you can contact at Email:[email protected] or over
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1
Business Informatics: Overview
Topics Covered:
1. Concept of Business Informatics
2. Characteristics of Business Informatics
3. Business Informatics: Smaller & Allied Field/ Nomenclature
4. Technologies & Stakeholders of Business Informatics
Business Informatics: Concepts
Business Informatics is about the applications and integration of Information Science and
Technology into Business and Management tools and techniques into the Business Systems. It is
also about combining the concept of Business and Technologies. The field is also called as
Business Information Science and in some countries as Business Information Systems. The areas
in current age are not only the tools and techniques but also a subject. Initially, the subject
treated as a concept and research areas and now this becomes a full-fledged subject in various
context. The area of Business Informatics is also increasing in recent past from technologies and
tools to conceptual management areas viz. IT Governance, IT Policy, IT Management,
Information Administration, and Information Management. In recent past, the concept of
technologies have been increased and several areas are included which are majorly part of
components of Information Technologies viz. Database Technology, Networking Technology,
Communication Technology etc. Among the latest areas Data Sciences play a lead role with the
components of Big Data Technologies powered by Data warehousing, Data Mining etc.
Business Informatics: Smaller & Allied Field/ Nomenclature
The world is changing rapidly and behind this change Computing and Information Technology
plays a leading role. Similarly, Management also plays a leading role for the development of any
kind of organization, institutions, and individuals. Both the concepts in an organizations and
institutions lead the growth of merged concept called Business Informatics. Internationally
universities are moving towards introducing new age, skill based, interdisciplinary and clustering
Simple
Easy to Understand
General Language
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 2
subjects and domains and Business Informatics is one of the important ones. Ideally, there are
variations in the related and allied domains and fields viz.
• Business Information Technology
• Business Information Systems
• Business Information Science/s
• Business Informatics etc .
Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1
Business Informatics: Technologies & Stakeholders
Topics Covered:
1. Technologies & Stakeholders of Business Informatics
Technologies & Stakeholders of Business Informatics
Among the technologies uses in the Business and Cooperates few important and concerns are
include Networking and Communication Technologies, Database Technologies etc. Among
these, few latest and emerging areas (which are required for promoting Business Systems and
Corporate houses) include Internet of Things (IoT), SEO and Digital Marketing, Big Data and
Analytics, Security Informatics and Information Assurance etc. The Big Data and its importance
are rising due to several issues. First of all, the increasing number of Data and contents and
required data in a right from and fight time to the right place.
Business Information Science is an important concept of modern Information Age. It is a
combination of business studies, Management Studies and Information Science and Technology.
Business Information Science deals with following tools, techniques, and technologies (refer fig:
1).
Simple
Easy to Understand
General Language
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 2
Fig: 1 The typical Areas of Business Information Science
• Business Intelligence
• Enterprise Resource Planning
• Business and Data Warehousing
• Search Engine Optimization
• Business Analytics.
Business Information Science is also called as business informatics (smaller than Business
Information Technology) in European countries. Business Information Science is associated with
the following as well.
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 3
• E-Business
• E-Commerce
• Digital Marketing / eMarketing
Business Informatics is also associated with the following areas (in respect of Management)-
• IT Governance
• IT Policy
• IT Management
• Information Administration
• Information Management.
Note: The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic Contents 1
Big Data Applications in Business Informatics
Topics Covered:
1. Concept of Business Informatics
2. Concept of Big Data
3. Big Data in Business Informatics
Business Informatics and Big Data
Business Informatics is very much close with the concepts of Business Information Technology
(which is smaller than Business Informatics and deals with the attributes and components of IT
only), Business Information Systems (which is broader than Business IT and deals with the IT
Management and System Analysis as a special focus). As far as Business Information Science is
concerned it is about technological and manual information solutions to the business. In
generally the following are treated as core components and stakeholders of Business
Informatics/IS—
• Content/Information
• Business and Corporate Houses
• Techniques
• Technology (IT & Computing mainly).
The Figure: 1 illustrate different areas required for the purpose of Business Informatics. It is
worthy to note that ideally Business Informatics should deals both manual information solutions
and technological and here among the manual tools and techniques important are include—
• Indexing Systems
• Abstracting Systems
• Documentation Systems
• Authority File
• Schematic Planning and Charts etc
Simple
Easy to Understand
General Language
By Dr.
Fig: 1 The stakeholders of
Note: The Contents authorship: Dr. P.K. Paul &research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
Technology
Paper / Course: CISPG2202 / CISPG2305
By Dr. P.K. Paul, MSc CIS 2nd Semester/ GE in CIS/ Electronic
The stakeholders of Business Information Science
The Contents authorship: Dr. P.K. Paul & Prepared from his own contents, papers, research and academic works itself.
For Any doubt and clarification you can contact at Email:[email protected] or over phone at 07797700765 (From 11 AM to 3 PM IST)
Business/ Corporates
Techniques
Management
Technology
Information
CISPG2202 / CISPG2305
Electronic Contents 2
Prepared from his own contents, papers,
For Any doubt and clarification you can contact at Email:[email protected] or over