Managing Information Technology
558 Part IV • The Information Management System Recent IS research has also identified the importance of not only an IS departme ...
Chapter 13 • Leading the Information Systems Function 559 7.Describe how a company policy could minimize a specific business ris ...
560 Part IV • The Information Management System Managing Information Technology, 6th ed. Upper Saddle River, NJ: Pearson Prentic ...
561 As industrial economies move toward information-based economies, their information on products and customers become more val ...
Computer Virus: a small unit of code that invades a computer program or file. When the invaded program is executed or the file i ...
Chapter 14 • Information Security 563 Customer Data Theft at TJX TJX Companies is a $17 billion retailer with more than 2,500 re ...
FIGURE 14.2 Security Technologies by OSI Layer 564 Part IV • The Information Management System Layer #1: Perimeter Layer (web se ...
Chapter 14 • Information Security 565 The Chief Security Officer Role Because of new laws and increased security risks, many org ...
566 Part IV • The Information Management System Information Asset Goal Vulnerability Single Loss Expectancy (SLE) Annual Occurre ...
Chapter 14 • Information Security 567 Information Asset Goal Annualized Expected Losses (AEL) Actions Annualized Cost of Actions ...
568 Part IV • The Information Management System Law Date Enacted Purpose Penalties Health Insurance Portability and Accountabili ...
Chapter 14 • Information Security 569 changes in information that would affect financial reporting and SOX requirements. Gramm-L ...
570 Part IV • The Information Management System Security policies should be written at a high level, and should state what is, a ...
Chapter 14 • Information Security 571 intranet, with e-mails sent to employees about policy changes or totally new security poli ...
572 Part IV • The Information Management System the date a request is made. Tiered penalties (e.g., uninten- tional disclosures ...
Chapter 14 • Information Security 573 organization faces. All digital liability management must be based upon risk analysis. Thi ...
574 Part IV • The Information Management System Discussion Questions 1.Do you think the acts of hackers should be punished the s ...
575 As we have seen, information technology (IT) is becoming a core resource for organizations in today’s global economy and is ...
Ideally, the law should reflect the best interests of soci- ety as a whole, but there is always controversy on what best serves ...
Chapter 15 • Social, Ethical, and Legal Issues 577 be affected. If one or more of the stakeholders might be harmed, there is lik ...
«
25
26
27
28
29
30
31
32
33
34
»
Free download pdf