Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Question 1. Social media sites result in loss of personal information because

  • sites lack appropriate tools to prevent security fraud.
  • hackers spend more time working to penetrate the sites.
  • users are not careful and share inappropriate business or personal information.
  • Wikileaks is publishing social media site information.

 

Question 2. Information systems

  • pose traditional ethical situations in new manners.
  • raise new ethical questions.
  • raise the same ethical questions created by the Industrial Revolution.
  • raise ethical questions primarily related to information rights and obligations.

 

Question 3.  The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

  • due process.
  • accountability.
  • courts of appeal.
  • the judicial system.

Question 4. The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

  • liability.
  • due process.
  • courts of appeal.
  • FOI appeals.

 

Question 5. Immanuel Kant's Categorical Imperative states that

  • if an action cannot be taken repeatedly, then it is not right to be taken at any time.
  • one should take the action that produces the least harm or incurs the least cost.
  • one can put value in rank order and understand the consequences of various courses of action.
  • if an action is not right for everyone to take, it is not right for anyone to take.

 

Question 6. The ethical "no free lunch" rule states that

  • if an action cannot be taken repeatedly, then it is not right to be taken at any time.
  • one should take the action that produces the least harm or incurs the least cost.
  • one can put values in rank order and understand the consequences of various courses of action.
  • everything is owned by someone else, and that the creator wants compensation for this work.

 

Question 7. European privacy protection is _____ than in the United States.

  • less far-reaching
  • less liable to laws
  • much less stringent
  • much more stringent

 

Question 8. Intellectual property can best be described as

  • intangible property created by individuals or corporations.
  • unique creative work or ideas.
  • tangible property created from a unique idea.
  • the manifestation of an intangible idea.

 

Question 9. It is not feasible for companies to produce error-free software because

  • any programming code is susceptible to error.
  • it is not possible to create perfect software on a large scale.
  • errors can be introduced in the maintenance stage of development.
  • any software of any complexity will have errors.

 

Question 10. The practice of spamming has been growing because

  • it is unregulated.
  • it is good advertising practice and brings in many new customers.
  • it helps pay for the Internet.
  • it is so inexpensive and can reach so many people.

 

Question 11.  Which of the five moral dimensions of the information age does spamming raise?

  • Quality of life
  • System quality
  • Accountability and control
  • Information rights and obligations

 

Question 12. Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to

  • security.
  • controls.
  • benchmarks.
  • algorithms.

 

Question 13. Security challenges posed by the communications between layers in a client/server environment are

  • line taps and denial of service attacks.
  • tapping, sniffing, and message alteration.
  • computer viruses, line taps, and loss of machine.
  • vandalism, theft and fraud, and line taps.

 

Question 14. Phishing involves

  • redirecting users to a fraudulent website even when the user has typed in the correct address in the Web browser.
  • pretending to be a legitimate business' representative in order to garner information about a security system.
  • pretending that attached information is from a business associate, or directing users to fake websites.
  • Using e-mails for threats and harassment.

 

Question 15. Evil twins are

  • Trojan horses that appears to the user to be legitimate commercial software applications.
  • E-mail messages that mimic the e-mail message of a legitimate business.
  • Fraudulent websites that mimic a legitimate business's website.
  • bogus wireless networks that look legitimate to users.

 

Question 16.  The HIPAA Act of 1996

  • requires financial institutions to ensure the security of customer data.
  • specifies best practices in information systems security and control.
  • imposes responsibility on companies and management to safeguard the accuracy of financial information.
  • outlines medical security and privacy rules.

 

Question 17. Financial institutions are required to ensure the security and confidentiality of customer data through the

  • Investor Protection Act.
  • Financial Services Modernization Act of 1999.
  • Financial Security Act of 1997.
  • Personal Security and Confidentiality Act of 1986.

 

Question 18. Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

  • are usually embedded in legacy systems that are easy to access.
  • are not secure because the technology to secure them did not exist at the time the files were created.
  • have the potential to be accessed by large numbers of people and by groups outside of the organization.
  • are frequently available on the Internet.

 

Question 19. The vulnerability inherent in wireless networking is due to

  • use of the SSIDs.
  • broken encryption or users who do not set up secure systems.
  • the lack of robust encryption capabilities.
  • the lack of protection against war driving.

 

Question 20. Statement ranking information risks are included in a(n)

  • security policy.
  • AUP.
  • risk assessment.
  • business impact analysis.

 

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M91424408
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Business Management

Dscuss the resource-based view of competitive advantage

Discuss the resource-based view of competitive advantage. What are the characteristics of resources that may yield sustainable competitive advantage? Describe the role that Information systems can play in creating sustai ...

Auburn creed i believe that this is a practical world and

Auburn Creed: I believe that this is a practical world and that I can count only on what I earn. Therefore, I believe in work, hard work. I believe in education, which gives me the knowledge to work wisely and trains my ...

Can you please tell me the difference in content between an

Can you please tell me the difference in content between an executive summary, an informative abstract, and an introduction?

Research and discuss three web-service apis in android and

Research and discuss three web-service API's in Android and identify the features associated which each.

Bull draft a one-two sentence personal definition of

• Draft a one-two sentence personal definition of leadership. Base your definition on what you have encountered, as well as on what you have already know about leadership. • Discuss the statements: "Leadership is everybo ...

A committee of 3 persons is selected at random from a group

A committee of 3 persons is selected at random from a group of 5 mathematicians and 8 physicists. What is the probabilty that at least one is a mathematician.

Lookout mountain which overlooks the tennessee river valley

Lookout Mountain, which overlooks the Tennessee River Valley near Chattanooga, Tennessee, was of great strategic importance during the Civil War. Today, some of the artillery used in the war remain at the park located on ...

Ways to ensure that information was shared efficiently and

Ways to ensure that information was shared efficiently and effectively within the team. Explain why these strategies will be particularly effective when coming up with innovative ideas to solve workplace issues.

How do you evaluate the implementation of the strategic

How do you evaluate the implementation of the strategic plan? Please, explain.

Hey can someone give me super detailed answer as to why

Hey can someone give me super detailed answer as to why neoclassical economic theory could not have emerged prior to 1860s? Like I get that neoclassical economy focuses more heavily on mathematical part of economy but wh ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As