Result in loss of personal information

Assignment Help Business Management
Reference no: EM13854650

Question 1. Social media sites result in loss of personal information because

  • sites lack appropriate tools to prevent security fraud.
  • hackers spend more time working to penetrate the sites.
  • users are not careful and share inappropriate business or personal information.
  • Wikileaks is publishing social media site information.

 

Question 2. Information systems

  • pose traditional ethical situations in new manners.
  • raise new ethical questions.
  • raise the same ethical questions created by the Industrial Revolution.
  • raise ethical questions primarily related to information rights and obligations.

 

Question 3.  The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

  • due process.
  • accountability.
  • courts of appeal.
  • the judicial system.

Question 4. The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

  • liability.
  • due process.
  • courts of appeal.
  • FOI appeals.

 

Question 5. Immanuel Kant's Categorical Imperative states that

  • if an action cannot be taken repeatedly, then it is not right to be taken at any time.
  • one should take the action that produces the least harm or incurs the least cost.
  • one can put value in rank order and understand the consequences of various courses of action.
  • if an action is not right for everyone to take, it is not right for anyone to take.

 

Question 6. The ethical "no free lunch" rule states that

  • if an action cannot be taken repeatedly, then it is not right to be taken at any time.
  • one should take the action that produces the least harm or incurs the least cost.
  • one can put values in rank order and understand the consequences of various courses of action.
  • everything is owned by someone else, and that the creator wants compensation for this work.

 

Question 7. European privacy protection is _____ than in the United States.

  • less far-reaching
  • less liable to laws
  • much less stringent
  • much more stringent

 

Question 8. Intellectual property can best be described as

  • intangible property created by individuals or corporations.
  • unique creative work or ideas.
  • tangible property created from a unique idea.
  • the manifestation of an intangible idea.

 

Question 9. It is not feasible for companies to produce error-free software because

  • any programming code is susceptible to error.
  • it is not possible to create perfect software on a large scale.
  • errors can be introduced in the maintenance stage of development.
  • any software of any complexity will have errors.

 

Question 10. The practice of spamming has been growing because

  • it is unregulated.
  • it is good advertising practice and brings in many new customers.
  • it helps pay for the Internet.
  • it is so inexpensive and can reach so many people.

 

Question 11.  Which of the five moral dimensions of the information age does spamming raise?

  • Quality of life
  • System quality
  • Accountability and control
  • Information rights and obligations

 

Question 12. Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to

  • security.
  • controls.
  • benchmarks.
  • algorithms.

 

Question 13. Security challenges posed by the communications between layers in a client/server environment are

  • line taps and denial of service attacks.
  • tapping, sniffing, and message alteration.
  • computer viruses, line taps, and loss of machine.
  • vandalism, theft and fraud, and line taps.

 

Question 14. Phishing involves

  • redirecting users to a fraudulent website even when the user has typed in the correct address in the Web browser.
  • pretending to be a legitimate business' representative in order to garner information about a security system.
  • pretending that attached information is from a business associate, or directing users to fake websites.
  • Using e-mails for threats and harassment.

 

Question 15. Evil twins are

  • Trojan horses that appears to the user to be legitimate commercial software applications.
  • E-mail messages that mimic the e-mail message of a legitimate business.
  • Fraudulent websites that mimic a legitimate business's website.
  • bogus wireless networks that look legitimate to users.

 

Question 16.  The HIPAA Act of 1996

  • requires financial institutions to ensure the security of customer data.
  • specifies best practices in information systems security and control.
  • imposes responsibility on companies and management to safeguard the accuracy of financial information.
  • outlines medical security and privacy rules.

 

Question 17. Financial institutions are required to ensure the security and confidentiality of customer data through the

  • Investor Protection Act.
  • Financial Services Modernization Act of 1999.
  • Financial Security Act of 1997.
  • Personal Security and Confidentiality Act of 1986.

 

Question 18. Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

  • are usually embedded in legacy systems that are easy to access.
  • are not secure because the technology to secure them did not exist at the time the files were created.
  • have the potential to be accessed by large numbers of people and by groups outside of the organization.
  • are frequently available on the Internet.

 

Question 19. The vulnerability inherent in wireless networking is due to

  • use of the SSIDs.
  • broken encryption or users who do not set up secure systems.
  • the lack of robust encryption capabilities.
  • the lack of protection against war driving.

 

Question 20. Statement ranking information risks are included in a(n)

  • security policy.
  • AUP.
  • risk assessment.
  • business impact analysis.

 

Reference no: EM13854650

Questions Cloud

Comments by twiggy forrest regarding iron ore production : Consider the iron ore production industry, and assume that there are just two producers, FM and BHP. Initially assume that both firms are identical in terms of their production costs. If the two firms can cooperate, what should they do in order to..
Identify the most complex user-system interaction : Identify the most complex user-system interaction (input/response couplet) within the normal flow (ie the step with the most number of side effects, or most complex internal logic), and produce an operation contract for that input-response couplet..
Implement the factorial function in the io monad : Use imperative-style programming to implement the factorial function in the IO monad. In other words, create and initialize variables (references) using newIORef, modify their values using a while loop with ,readIORef and writeIORef, then have th..
What is effect of stock dividend on corporations stockholder : What is the effect of a stock dividend on a corporation's stockholders' equity accounts? Which would you rather receive as a stockholder - a cash dividend or a stock dividend? Why?
Result in loss of personal information : Question 1. Social media sites result in loss of personal information because
Determine the federal income tax for 2013 : Determine the Federal income tax for 2013 for the Deans on a joint return - Under the divorce decree, John was obligated to pay alimony and child support?
Determine the effect of adrians gross income : What would be the tax consequences of each of the alternatives assuming that Fran currently deducts the mortgage interest on her tax return -  Determine the effect of Adrians gross income for 2014 & 2015.
Implementation for energy policy in the city of kelsey : Analyze the steps of agenda setting, policy formulation, and policy implementation for the energy policy presented in the City of Kelsey - Evaluate factors that may influence agenda setting, policy formulation, and policy implementation for the ene..
What is purpose of monastaries according to charlemagne? : What is purpose of monastaries according to Charlemagne?

Reviews

Write a Review

Business Management Questions & Answers

  Strategies and performance of a business

Strategies and Performance of a Business - How would you analyze whether a strategy has failed or whether the corresponding action plans were ineffective?

  How to characterize best buys competitive strategy

"Best Buy" competes aggressively on price with rivals like Costco Wholesale, Sam's Club, Wal-Mart also Target however, is also know by consumers for its first rate consumer service.

  Build a motel for slumber motels corporation

Rite and Bilt Contractors Inc. agrees to build a motel for Slumber Motels Corporation. The project proceeds according to plan, however before it is done, Slumber tells Rite and Bilt to quit. Rite and Bilt may recover

  Impact of organizational behavior on organization success

how the study and application of organizational behavior concepts can contribute to organizational success.

  Teams make conclusions that can dramatically affect company

Teams make conclusions that can dramatically affect companies. To make effective adoptions, teams can select from several decision-making strategies.

  Displays their frequencies of occurrence over a six-month

Displays their frequencies of occurrence over a six-month period and What technique might you use to graphically show the causes of customer dissatisfaction?

  Explain what cultural environment will staff of that company

Explain what cultural environment will staff of that company encounter in the workplace in each of the countries?

  Calculate the company''s z-score

Find the monetary statements for a publicly traded company as well as calculate the company's z-score. Identify approximately 100 words whether you think the company is at risk for financial failure based upon its z-score as well as other factors ..

  Operations management - ltv case

Did the venture succeed? Were the peons or the big wigs right? In either case, briefly describe WHY the eventual result happened. Was this a good example of the principles of Operations Management properly applied?

  Justify why a crm system is important

Justify why a CRM system is important to your business and its future growth.

  Research and development project for organization

Describe the market research you do when you go to buy a car.(This includes what publications (if any) you look at; websites you visit; etc.)

  Organizational environment steady evolving

With the culture of today's organizational environment steady evolving, a contemporary approach to public management has replaced the historic theories once prevalent before. The purpose of management is to accomplish aims and objectives to ensure th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd