COSC 205 - MIS Chapter 9 - 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

natural disasters

#1 threat to hardware infrastructure

vanity metric

A measure that appears to show some result but does not provide useful information for making decisions.

defining system goals and scope

Dentoin Pharmaceuticals requires an information system to support its new assembly line. The management has assigned a team of ten members to plan this project. Which of the following will be the first major task for this team?

systems analysts

Information systems professionals who understand both business and technology

false

T/F - business process, information systems, and applications have the same characteristics and components

true

T/F - maintaining alignment between information systems direction with organizational strategy is a continuing process

False

T/F - mobile users click ads less often than PC users

False

T/F - most emails and IMs are protected by encryption

False

T/F - once the contract for outsourcing ends, it is very easy to exit from the vendor

True

T/F - removing and disabling cookies present an excellent example of the trade-off between improved security and cost

true

T/F - symmetric encryption is simpler and much faster than asymmetric encryption

true

T/F - the activities in a business process often involve information systems

True

T/F - the general belief of social media providers is that the users wouldn't mind the small loss privacy if they got the service for free

application

a combination of hardware, software, and data components that accomplishes a set of requirements

create diseconomies of scale

according to Brook's Law, adding more people to a late project will

Trojan Horse

bad code disguised by good code

packet-filtering firewalls

can filter both inbound and outbound traffic

Threat

circumstance or people that have the potential to cause harm

business function

claire cosmetics chose a human resources consulting agency to handle its human resources needs for the next 7 years. This is an example of _____ outsourcing

Folksonomy

classification created by users (hashtags)

Breach

confirmed disclosure

encryption

data made secure

Exposure

form of possible loss or harm to information system

Logic bomb

happens when an update comes out and there is a vulnerability that isn't caught by the company (time between when a company releases an update and when they can fix it)

Hacking

illegal access

breach

incident that results in a confirmed disclosure of data

Sniffing

intercepting computer information and usually through entering password on unsecured network

geofencing

location service that allows applications to know when a user has crossed a specific location and then triggers an automated action

Geofencing

location triggers a push notification

Botnet

mass hack

Virus

needs a host

Social capital

number of relationships x strength of relationships x entity resources

Incident

possible data comprised

peer to peer support causes loss of control

primary risk of social media

Control

protective measure; action, device, procedure, technique that reduces vulnerability

social media provider

provide platforms that enable the creation of social networks

probability X loss

risk assessment equation

Fast response from business Customer assisting customer Customer expectations are heard Might be an influencer

social media Advantages to consumer

Can test new products and ideas inexpensively and get feedback Learn a lot about your customer Identify problem quickly Create better marketing campaigns/brand awareness

social media benefits to business

Worm

stand alone bad program that gets into computer system, doesn't need a host

Salami

taking a little bit of data from a lot of people

critical path

the sequence of activities that determine the earliest date by which the project can be completed

Defenders of belief Seekers of the truth (share a common problem)

types of SMIS users

trojan horses

viruses that masquerade as useful programs or files

Vulnerability

weakness in a security system

the number of relationships in a social network, by the strength of those relationships, and by the number of resources controlled by those related

what factors are included to determine the value of social capital?

cost, schedule, technical, and organizational feasibility

which of the following are dimensions of feasibility?

setting IS priorities

which of the following is a function of the steering committee for the information systems department?

investigating new information systems

which of the following is a function of the technology office in an organization's information systems department?

an employee inadvertently installing an old database on top of the current one

which of the following is considered a threat caused by human error?

the operations group monitors user experience and responds to user problems

which of the following statements is true of the information systems department?

because they lost 98 million customer accounts

why did Target create a new C-level security position?


Set pelajaran terkait

Linear Algebra Exam 2 - Terms and Concepts

View Set

Health Assessment- PrepU Chapter 15 Assessing Head and Neck

View Set

Health Insurance Policy Provisions, Clauses, & Riders

View Set

Lab 7 Pre-Reading Joints Connect

View Set

Chapter 15: Implementation and Evaluation

View Set

difference between heliocentric and geocentric models

View Set

chapter 1 a and p review questions

View Set

PSY 873 Organizational Psychology Final

View Set

ELA Praxis (5039) - Methods of Persuasion & Fallacies

View Set