MIS Chapter 4 Review Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the relationship between adware and spyware?

Adware allows internet advertisers to display ads without consent of the computer users. Spyware is a class of adware that collects data about the user and transmits it over the internet without the users knowledge/permission.

Why is security a business issue, not just a technology issue?

Because when an employee is looking at things that are inappropriate it takes away from their work ethic and affects the business, so there has to be a breech in the business security to find out the problem and solve it. Also, when security is breached within or outside of a business, the business is affected. Important info saved by the business could be at risk.

How can a company participating in e business keep its information secure?

By creating policies which address information management along with the ethical use of computers and the Internet in the business environment.

What are the costs associated with downtime?

Costs of downtime are affected weekly, daily and hourly. Financial performance is affected as well as revenue, damage in reputation and other expenses like overtime, equipment rental, and travel expenses. (see book for more detail). Financial performance, revenue, damaged reputation, other expenses.

What are ethics and why are they important to a company?

Ethics are standards and principles that guide our behavior towards other people. This is important to companies because it sets guidelines and distinguishes between right and wrong behavior that people in a work place should have.

What is the relationship between hackers and viruses?

Hackers are experts who use their tech knowledge to break into computers and networks for profit or for a challenge. They gain info or plant viruses. Viruses are software written with malicious intent to cause annoyance or damage. Hackers can create and leave viruses causing massive computer damage.

What is the relationship between information management, governance, and compliance?

Information management examines resources of info and regulates definitions, uses,values and distribution ensuring it has the right info/data required to function/grow. Information Governance is the method of government for management/control. Information Compliance is the act of conforming, acquiescing or yielding info.

Why is ediscovery important to a company?

It allows a company to gather, search, seize information when responding to a litigation, audit, investigation. Its important because it shows how fast/appropriate a company responds to a request to obtain information for a specific reason. (usually legal)

What are the positive and negative effects associated with monitoring employees?

Positive effects of monitoring employees are: keeps employees focused during work hours, makes sure employees are ethical and legal, keep track of how efficient an employee is being, open communication.Negative effects of monitoring employees are: invades employees privacy, creates a disconnect between employee and management, employees feel they cant be trusted.

What are the reasons a company experiences downtime?

Power outages, natural disasters, network failures, corrupted data, hacker, vandalism, theft. A system may become unavailable due to weather, threats on security, emergency, animals (infestation), fire, water damage, hackers

What is the correlation between privacy and confidentiality?

Privacy is your right to be left alone when you want. Confidentiality is an assurance that information remains private to only authorized people.

What technologies can a company use to safeguard information?

Public key encryption uses public key and private key monitoring. Firewall:hardware and or software that guards a private network by analyzing incoming and outgoing info content. Content Filtering: uses software that filters content to prevent accidental malicious transmission of unauthorized info.

Why are e policies important to a company?

They are policies and procedures that address info management along with ethical use of computers at work and the internet in business environment. Any company that uses computers should implement epolicies for the safety and monitoring of the computers to ensure everyone is acting legally and ethically.


संबंधित स्टडी सेट्स

Global Sports and National Culture UIowa

View Set

A Game of Polo with a Headless Goat

View Set

Addiction and Substance-Related Disorders

View Set

Bontrager Ch 8 Cervical and Thoracic Spine Workbook

View Set

Straighterline Intro to Nutrition Quiz 2

View Set

Chapter 15: Product Use Testing, AB testing, Ab test, AB Testing, SaaS Key Terms, Saas Terminology, Market Sizing, SAAS metrics, Rob's Decode & Conquer +, Decode and Conquer, Product Metric Frameworks, Interview - Product design, Interview - Product...

View Set