Comprehensive and up-to-date, Using MIS shows students how organizations use information systems to solve business problems every day. The tenth edition now includes new content on David M. Boyle, Weber State University Using MIS 10, Using MIS has 15 available editions to buy at Alibris.
Kroenke, Randall J Click here for the lowest price! Paperback, , X VitalSourcehttps vitalsource. Using Mis Kroenke: Books eBay ebay. Kroenke, David M. Using MIS 10th Edition. For courses in MIS. Search this site. Class survey. Community Scavenger Hunt. My Favorite Place. Taiwan's Golden Age. This is yet another example of the tension that occurs between those who want more security for the greater good and are willing to sacrifice individual privacy versus those who feel that personal privacy should not be infringed upon for any reason.
The article mentions that encryption can be a tactic used to thwart employees from taking data with them. Explain how encryption can be used effectively in this context. Encryption can be used to render data inaccessible if it is taken off of a given machine and accessed elsewhere e. In this context, data can be encrypted on company servers so that it is accessible to employees but not accessible if it is removed off of those systems.
Setting up this type of encryption could reduce the motivation and likelihood that an employee would try to steal data and use it to secure a job elsewhere.
Chapter 8 - Digital is Forever 1. The article emphasizes that criminals and corporations both seek out the private information of Internet users for their own gains, but they are not the only ones trying to access your information. Do you think universities or future employers will attempt to access information about you when making admissions or hiring decisions? The purpose of this question is to help students recognize that privacy concerns are not centric to theft or commercial purposes, but are much more pervasive than many students may initially recognize.
You likely heard news reports about the iCloud and Sony breaches, both of which resulted in private photos and emails being shared with the masses on the Internet. However, can you recall hearing reports about the perpetrators being brought to justice?
If not, why do you think this is the case? To date there has been no indication that the perpetrators of either breach have been arrested or subsequently brought to justice. Aside from the fact that cyber criminals can be extremely difficult to track down, the legal system is still in many ways ineffective against the types of crimes that are perpetrated in cyberspace.
For both of these reasons, many cyber crimes go unpunished, thereby yielding a forum rich in opportunities and thus very attractive to cyber criminals. The Internet is not the only medium by which your privacy can be breached. Stolen or compromised devices can also be used to access your information, even if that information has been deleted. Search the web for information about recovering files and find out 1 whether or not deleting a file actually eliminates it from the memory of your device, and 2 if it can be recovered.
Tangible devices also present a medium by which privacy can be violated. When users delete a file on a computer many think that the file is permanently gone, but in actuality, the computer simply deletes the file pointing to that data on the hard drive but the data actually remain. File shredding utilities can be used to scramble free space on hard drives thereby rendering data formerly stored on the drive extremely difficult to recover.
Take a few minutes to reflect on your online habits. Do you have a tendency to send emails or post messages or images that could be perceived as offensive, inflammatory, or controversial in nature to others? If so, what could the end result of this behavior be?
The end result of such behavior could be more far-reaching than students initially think. Building on the answer to Question 1, poor behavior on the Internet can negatively impact any number of future opportunities or relationships, and all users should recognize that simply deleting content on a social media site does not actually delete that information forever.
It is possible that this information could be recovered, accessed, and distributed online at some point in the future. Chapter 9 - Semantic Security 1. In your own words, explain the difference between access security and semantic security. Access security concerns the authorized and authenticated control of access to data, systems, and networks. Semantic security concerns the unintended release of protected information through the release of a combination of reports or documents that are independently not protected.
Why do reporting systems increase the risk of semantic security problems? Reporting systems increase the risk of semantic security problems because information from two different reporting systems can be combined with publicly available information to produce, or calculate, confidential information.
This is a semantic security problem. What can an organization do to protect itself against accidental losses due to semantic security problems?
To protect themselves from accidental data losses, organizations should only release information to employees if it is necessary for them to complete their jobs. What legal responsibility does an organization have to protect against semantic security problems?
Organizations have a legal requirement to protect personally identifiable information PII they collect. Additional requirements apply to financial, medical, and tax just to name a few. Organizations must keep information secure when it is being stored, processed, or transmitted.
Suppose semantic security problems are inevitable. Do you see an opportunity for new products from insurance companies? If so, describe such an insurance product. If not, explain why. This could yield information about potential clients that might be susceptible to certain expensive medical conditions.
They could offer protection against a variety of information or identity theft incidents. Chapter 10 - Exhaustive Cheating 1. What other technologies now included in cars could pose a potential risk to users?
Based on the Volkswagen incident, are the technological advancements we have seen in the automotive industry worth these risks? A new technology that is now prominently featured in car advertisements is Internet access. However, numerous studies have demonstrated that cars with such capabilities can be accessed and compromised remotely.
For example, hackers have been able to demonstrate the ability to apply breaks, turn the stereo system on or off, and control other functions within the car without any direct access to the vehicle.
Take a few minutes to brainstorm other examples of systems or technologies that could be considered a black box. Try to identify some of the risks that may exist due to our inability to understand how these systems operate.
The technology used to manage the stock market is a perfect example of a black box. Very few people understand the technical components involved in managing all of the digital trading that takes place every day. A book was published several years ago Flash Boys which argued that the stock market is rigged because heavy-hitting trading firms were paying for maximized transaction speeds and taking advantage of their rapid access.
This lack of understanding of exactly how the trading system functions is a great example of a black box. Why do you think the stock price dropped so significantly even though it is a global brand with popular vehicles?
However, if mechanical parts of the car need to be modified or replaced, such a recall could pose a tremendous financial imposition on the company and jeopardize its financial viability. Alternatively, are you skeptical that computers will ever have the capability to pose any form of risk to end users? Be ready to explain your position. This question is intended to promote a lighthearted yet curiosity-inducing discussion on the potential AI capabilities of future systems.
Chapter 11 - Watching the Watchers 1. In what other contexts are audits conducted? Audits can be used in virtually every industry.
These audits can be further categorized into specialized audits, including financial, compliance, operations, investigative, and information systems. However, any type of organization can conduct an audit to ensure that the subject matter is free of misstatement.
Even research can be audited to ensure that data reported in a journal paper are not fabricated or tampered with. Define what a rootkit is and conduct a search online for examples of how rootkits have been used. Rootkits are malicious pieces of software that are used to gain unauthorized access to another system or piece of software.
Rootkits are often the basis for security breaches — a quick search of the Internet will likely identify numerous breaches in which rootkits were used to gain access to a corporate server or other type of system. Can you think of any other examples of how a function or task is split into multiple pieces or assigned to multiple individuals to prevent abuse of that function?
We can look to the military for numerous examples of separation of duties. Weapon systems are often broken into numerous components with various operators controlling the disparate modules of the system. For example, on a nuclear submarine, launch codes to deploy weapons requires authorization from numerous individuals.
This serves as a safety mechanism to prevent one individual from initializing a weapon without proper authorization. Take a moment to think about all of the different types of devices that you use on a daily basis.
How could these devices be compromised to invade your privacy? Is this risk of privacy invasion enough to make you stop using these devices? Looking around a random house or apartment would probably reveal numerous technologies that could be used to invade privacy.
Web cameras or baby monitors designed to keep an eye on members of the family can be hacked or more easily accessed if the user does not change the default security settings. New gaming consoles have built in microphones that are in standby mode continuously waiting for the voice prompt of a user to activate the system; if accessed by a nefarious actor these microphones could be used for other purposes.
Cellphones can also be compromised and people carry these devices with them everywhere; as cameras and microphones are ubiquitous on these devices they present a potential attack vector for invading privacy. The question students will have to consider: is are they willing to forego the benefits these devices provide to ensure the protection of their privacy? Responses will vary.
Chapter 12 - Psst. But, if in your absence, your roommate uses your computer to copy your MIS term project onto his flash drive, do you know? If so, how?
If not, why not? Some operating systems like Windows do have this feature. Others may not. Then the student would have to check the logs regularly for unauthorized access. That, of course, assumes that the student locks his or her computer each time they walk away from it. So, instead, suppose the person across the hall obtains the name of your computer and your logon name the name you enter when your computer starts.
She could surreptitiously watch you enter your password and learn it, too. When she finds your MIS term paper in one of your shared folders and copies it to her computer, do you know? In this case the student might have an intrusion detection system, or a data loss prevention DLP system running to catch these types of unauthorized actions, but this is very unlikely. How does the situation in question 2 differ from packet sniffing?
Which is easier? The situation in question 2 differs from packet sniffing in that situation 2 is the unauthorized access of a file stored on a file share, whereas packet sniffing is a type of man-in-the-middle attack where data are intercepted as they are being sent over a network. To steal the file from the shared folder the attacker would need authorized credentials, or use automated software that can take advantage of a vulnerability in the computer hosting the file.
To steal the paper using packet sniffing the attacker would have to have access to the network where the packet was being sent from, and the data connection would have to be unencrypted. This makes it difficult, but not impossible, to steal data being sent over networks. Is the scenario in question 2 possible at work? Does it matter if your employer has strong network security? What is the one thing you can do to protect yourself from the person in the cubicle down the hallway accessing your shared folders?
Yes, the situation in question 2 is likely in a work environment. Yes, if your employer has strong network security it would be much more difficult, but not impossible, to steal the file. Strong network security would be able to see who was accessing which network shares, and monitor the movement of data files. To protect yourself from these types of attacks you should encrypt your files, share your file shares with as few people as possible, and make sure your file shares are secured with strong credentials.
Now consider the suppliers in this guide who had their designs stolen. Will they know their designs were stolen? How will they find out? How will they know which designs were taken? How can they assess their damages? They may find out their files were stolen after the fact when a competitor produces a similar part without any research and development expenditures.
It will also be extremely difficult to access the damages of this data loss. If the files were key to their competitive advantage the loss of these files could be catastrophic.
A worm, and indeed it did, for all the companies that had such security. Companies with large, knowledgeable IS departments see Chapter 11 most likely will, but in this case hundreds did not. For small businesses with limited in-house technical expertise, the best option might be outsourcing their email function to a managed service provider.
Many managed service providers offer very reasonable rates for managing corporate email. They also have the technical expertise to stop these types of attacks. Search the Internet for the term industrial espionage. Find one example of espionage that has been conducted using malware. Summarize the problem and the damages.
What could the companies involved have done to avoid losses? Student responses to this question will vary. There are many examples of corporate espionage using malware. One famous attack occurred in when hackers stole nearly 70 million of customer accounts from Target Corp.
The malware was used to copy customer account information from point of sale POS systems and then send it to external servers. All Rights Reserved. Study Questions Q What are the two key characteristics of collaboration? Q What are the four primary purposes of collaboration? Q What are the requirements for a collaboration information system?
Q How can you use collaboration tools to improve team communication? Q How can you use collaboration tools to manage tasks? Q Which collaboration IS right for your team? People working together to achieve a common goal.
Feedback and iteration Cooperation lacks feedback and iteration loop. Importance of Effective Critical Feedback Q What are the two key characteristics of collaboration? Important Characteristics of a Collaborator Q What are the two key characteristics of collaboration? Giving Constructive Criticism Be specific. Offer suggestions. Avoid personal comments. Set positive goals. Accepting Constructive Criticism Question your emotions. Do not dominate. Demonstrate a commitment to the group.
Why is he picking apart my work? Constructive criticism: If there are four group members, you get one fourth of the time. Criteria for judging team success: 1. Successful outcome. Achieved objectives 2. Improve team capability over time. Meaningful and satisfying experience. Become informed. Set team authority. Set project scope and initial budget. Form team. Establish team roles, responsibilities, and authorities. Thorough coverage, a highly visual presentation, and increased problem solving from an author you trust.
Mechanics of Materials clearly and More results Your browser indicates if you've visited this linkBuy by Russell C. Mechanics of Materials clearly and thoroughly presents the theory and supports the More results Hibbeler More results Rent More resultsMechanics of Materials - SladerYour browser indicates if you've visited this linkSolutions in Mechanics of Materials More.
Spanish Latin French Mechanics of Materials, 9th Edition Mechanics of Materials, 9th Please provide a physical shipping addresshttps abebooks. More resultsSolution manual for Your browser indicates if you've visited this linkSolution manual for hibbeler sample. Solution manual for More resultsDoes anyone have a pdf copy of this textbook I've been looking online This item has been replaced by Mechanics of Materials, 10th Edition.
More resultsMechanics Materials edition eBayYour browser indicates if you've visited this linkFind great deals on eBay for Mechanics Materials edition. Shop with confidence. More results com: Your browser indicates if you've visited this link com:. Engineering Fluid Mechanics, 10th Edition Oct 10, Kindle Edition. More results R. Hibbler Study Your browser indicates if you've visited this linkCheck out all r. Summaries, past exams, lecture notes and more to help you study faster!
0コメント