Emtech

Cards (122)

  • Folksonomy is a method of categorizing and classifying using keywords, also known as hashtags.
  • Rich User Experience is a feature of web services that are dynamic and responsive to user's input.
  • User Participation is a feature where others are able to place content of their own.
  • Long tail is a business model where services are provided on demand, subscribing to a data plan that charges for the amount of time spent in the internet.
  • Software as service is a business model where services are subscribed to only when needed, rather than purchased.
  • Mass Participation is a feature of web services that allow for diverse information sharing through universal access.
  • Convergence is a trend in ICT, referring to technological advancement.
  • Social Media is a trend that involves creating, co-creating, modifying and exchanging generated content.
  • Social Networks are sites that allow you to connect with other people.
  • Bookmarking sites are used to store and manage links to various websites.
  • Tagging others is a feature of social media.
  • Social News
    Post their own news items or links to various websites. Create a tag to others
  • Media sharing
    Upload and share media
    (Twitter and purk)
  • Micro-blogging
    Short updates
  • Blogs and Forums
    Allow user to post their content
  • Mobile technology
    Smartphones, tablets, 4G LTE Networking
  • Assistive media
    Help people with visual and reading impairments
  • IOS
    Apple devices
  • Blackberry os

    Blackberry devices
  • Windows phone OS
    Closed source and propriety
  • Symbian os
    Nokia, original smartphone OS
  • Web OS
    Smart TV
  • Windows mobile OS
    Smartphones and pocket pc’s
  • Public cloud
    Allows systems and services to be easily accessible to the general public
  • Private cloud
    Accessible with in the organization
  • Community cloud
    Accessible by group of organizations
  • Hybrid cloud
    Mix of public and private cloud
  • Internet safety
    Online security/safety of people and their info
  • Confidentiality
    Data confidentiality
  • Integrity
    Data integrity
  • Availability
    System integrity
  • Unauthorized Disclosure 

    Not authorized entity gains access to data
  • Exposure
    Sensitive data to unauthorized entity
  • Interception
    Unauthorized entity accesses data b/w authorized sources and destinations
  • Inference
    Unauthorized entity indirectly accesses sensitive data by reasoning from by products of communication
  • Disruption
    Prevents correct operation of system services and functions
  • Deception
    authorized entity receiving false data and believing it to be true
  • Intrusion
    Unauthorized entity gains access to sensitive data by circumventing a system’s security protection
  • Incapacitation
    Prevent/interrupts system operation by disabling a system component
  • Obstruction
    Interrupts delivery of system services by hindering system operations