Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 10.5, Problem 1EGDQ
Program Plan Intro
U.S. privacy law:
The U.S. government maintains the individual records regarding financial institutions, bank record, and government records.
- This law is defined in the year of 1974 and it is named as “Privacy Act of 1974”. But the data given by customer to online retailer is not protected by the U.S. privacy law.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Hi, I need help witht the following HW..
Recent changes in privacy laws have disallowed organizations from usingSocial Security numbers to identify individuals unless certain restrictionsare satisfied. As a result, most U.S. universities cannot use SSNs as primarykeys (except for financial data). In practice, Student_id, a unique identifierassigned to every student, is likely to be used as the primary key rather thanSSN since Student_id can be used throughout the system.a. Some database designers are reluctant to use generated keys (also knownas surrogate keys) for primary keys (such as Student_id) because they areartificial. Can you propose any natural choices of keys that can be used toidentify the student record in a UNIVERSITY database?b. Suppose that you are able to guarantee uniqueness of a natural key thatincludes last name. Are you guaranteed that the last name will not changeduring the lifetime of the database? If last name can change, what solu tions can you propose for…
Is there a precise explanation of what the noun "privacy" means? Create a list of the top five things you can do to protect the confidentiality of your personal information.
INSTRUCTIONS: Conduct some independent research using scholarly or practitioner resources that will answer the following statements below. Exercises: 1. Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication. 2. What are some of the latest advances in encryption technologies? 3. What are some of the password policy you have encountered? Do you have to change passwords every so often? What are the minimum requirements for a password? 4. How are you doing on keeping your own information secure?
Chapter 10 Solutions
Using MIS (10th Edition)
Ch. 10.4 - Prob. 1NFBQCh. 10.4 - Prob. 2NFBQCh. 10.4 - Prob. 3NFBQCh. 10.4 - Prob. 4NFBQCh. 10.4 - Prob. 5NFBQCh. 10.4 - Prob. 6NFBQCh. 10.5 - Prob. 1EGDQCh. 10.5 - Prob. 2EGDQCh. 10.5 - Prob. 3EGDQCh. 10.5 - Prob. 4EGDQ
Ch. 10.5 - Prob. 5EGDQCh. 10.5 - Prob. 6EGDQCh. 10.5 - Prob. 7EGDQCh. 10.9 - Prob. 1SGDQCh. 10.9 - Prob. 2SGDQCh. 10.9 - Prob. 3SGDQCh. 10.9 - Prob. 4SGDQCh. 10.9 - Prob. 10.1ARQCh. 10.9 - Prob. 10.2ARQCh. 10.9 - Prob. 10.3ARQCh. 10.9 - Prob. 10.4ARQCh. 10.9 - Prob. 10.5ARQCh. 10.9 - Prob. 10.6ARQCh. 10.9 - Prob. 10.7ARQCh. 10.9 - Prob. 10.8ARQCh. 10.9 - Prob. 10.9ARQCh. 10 - Prob. 10.1UYKCh. 10 - Prob. 10.2UYKCh. 10 - Prob. 10.3UYKCh. 10 - Prob. 10.4CE10Ch. 10 - Prob. 10.5CE10Ch. 10 - Prob. 10.6CE10Ch. 10 - Prob. 10.7CE10Ch. 10 - Prob. 10.8CS10Ch. 10 - Prob. 10.9CS10Ch. 10 - Prob. 10.1CS10Ch. 10 - Prob. 10.11CS10Ch. 10 - Prob. 10.12CS10Ch. 10 - Prob. 10.13CS10Ch. 10 - Prob. 10.14CS10Ch. 10 - Prob. 10.15MMLCh. 10 - Prob. 10.16MML
Knowledge Booster
Similar questions
- How do you think about the Data Privacy Act? Advantages and disadvantagesarrow_forwardAnswer each as shortly yet concisely as possible....... 1. Use examples to show what is false negative and what is false positive. 2. Password is the most common authentication method. Is it strong authentication? Discuss the pros and cons of password authentication.3. Give at least three examples of authentication used in your school, workplace, or daily life. Which authentication category does each of them belong to? 4. How are authentication and authorization alike and how are they different. What is the relationship between the two? Please explain using example(s). 5. Use example(s) to explain one of the access control models (MAC, DAC, RBAC, Rule-based AC, and ABAC). 6. Discuss the difference between a Telnet and a SSH. 7. Give two examples on where Kerberos authentication is used. 8. Discussion the differences between Windows file permissions and UNIX/Linux file permissions. 9. Discuss the pros and cons of fingerprint authentication. 10. Use example(s) to show why multi-factor…arrow_forwardYou shouldn't put your faith in any databases that could include your private information. How often, if at all, are you allowed to make a request to each database in order to get physical copies of your data records, and do you have that right? What kind of concerns do you have about the potential invasion of your privacy if you use the internet?arrow_forward
- Please help with the following: Provide a acceptance test to the following user story As an employee, I want to be able to delete a blog post so that I can maintain only relevant posts Given that they are logged in as an employee when trying to delete a blog post then they would be able to remove irrelevant information from it. <?>arrow_forwardIn addition to the IRS, the state's Bureau of Motor Vehicles, and Equifax, many more entities may have access to your personal information (see chart below). You may get answers to your questions by visiting the websites of these organisations. How are the databases' data retrieved? Data may be printed from any database, even your own. Is it possible to correct an error in your data? What concerns do you have concerning the privacy of these databases?arrow_forwardWhat is the definition of privacy? Do you know how to keep your personal information secure? Make a list of five methods.arrow_forward
- You are asked to do some research, and write a report that answers the following questions about Digital Fingerprinting: You should tackle the following points: What is Digital Fingerprinting and for what purposes is it used? How does the fingerprinting algorithm work? Describe its principle of operation. Certain steps are followed to reach the desired result- either block, delete or authorize usage of content. Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism. List two common Fingerprinting Algorithms. Report Writing: You should follow the following guidelines while writing your report: Your report should be between 400 and 500 words in length. Ensure that your report has an appropriate structure and writing style. Your report…arrow_forwardYou are asked to do some research, and write a report that answers the following questions about Digital Fingerprinting: You should tackle the following points: What is Digital Fingerprinting and for what purposes is it used? How does the fingerprinting algorithm work? Describe its principle of operation. Certain steps are followed to reach the desired result- either block, delete or authorize usage of content. Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism. List two common Fingerprinting Algorithms.arrow_forwardThe number of cases of identity theft has risen sharply in the past three years as a result of a security breach involving personal data. Do you know how to protect yourself against identity theft? A excellent approach to explain your argument is using an example.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you