Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 11.5, Problem 11.4ARQ
Explanation of Solution
User rights:
- Computer hardware and
programs that are required to perform your job proficiently.- User has the right to access all the resources like computer hardware and programs required, to complete his/her tasks successfully.
- Reliable network and internet connections:
- Users have the right to use the reliable network connection which means there will be no problems while using it.
- A secure computing environment:
- Organization should take care about the security issues of the user’s computer and files. It should ask users to take the actions required to protect the files, if required.
- Protection from viruses, worms, and other threats:
- It’s the organization’s duty to take care about the safety of the user’s files and computer. Thus, it is user’s right to have their files and computer protected from the viruses, worms, and other threats.
- Contribution to requirements for new system, features and functions:
- Users have the right to participate in the meetings conducted to discuss about the new system requirements. If not directly then through a delegate.
- Reliable systems development and maintenance:
- Users have a right to have reliable systems development and maintenance. They can experience schedule slippage for a month or 2 but need not face it for 6 months or more. This shows the incompetent systems development.
- Prompt attention to problems, concerns, and complaints:
- Users have the right to receive immediate response towards the problems and concerns from the organization. If not directly, then the users should be provided with some means through which they can report the issues or at least get their complaints registered in IS department.
- Properly prioritized problem fixes and resolutions:
- Users can have their problems get resolved with established priorities.
- Effective training:
- Users have the right to get trained in the organization so that they can perform the particular task they want to do. Organization should train the users in a format and on a schedule that is suitable for the user.
User responsibilities:
- Learn basic computer skills:
- Users have the responsibility to have the basic computer skills. They cannot expect hand-holding for basic operations.
- Learn standard techniques and procedures for the applications and use:
- Users should learn the techniques and procedures required to use the applications...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain how the GRANT statement could affect the protection of intellectual property. What are the benefits of gaining the various types of access, and what is the procedure for doing so? When looking forward many years, what are the odds that they will be asked to surrender their licenses?
Draw a sequence diagram for the “Apply for Leave” use case: Employers need to login into thesystem using correct username and password, input the start and end date of the asking for leave,and then submit the request to the leader of the department. The leader approve the request or not. Ifthe leader approve the request, the request will be submitted to the HR to process. HR will decidewhether to approve the request according to the regulation of the company, and then send the finaldecision to employers and Accounting staffs.
Draw an ER diagram that captures
the following information: A book
identified by (unique Id number, a
title and one or more authors), A
library identified by (unique name
and adders), A borrower has a name
and a unique ID code. The library
service may own several copies of a
given book. A borrower can have
many books on loan, but each copy
of a book can only be on loan to one
borrower. A borrower could borrow
the same book on several occasions,
but it is assumed that each such loan
will take place on a different date. *
Chapter 11 Solutions
Using MIS (10th Edition)
Ch. 11.2 - Prob. 1MDQCh. 11.2 - Prob. 2MDQCh. 11.2 - Prob. 3MDQCh. 11.2 - Prob. 4MDQCh. 11.2 - Prob. 5MDQCh. 11.3 - Prob. 1EGDQCh. 11.3 - Prob. 2EGDQCh. 11.3 - Prob. 3EGDQCh. 11.3 - Prob. 4EGDQCh. 11.5 - Prob. 1SGDQ
Ch. 11.5 - Prob. 2SGDQCh. 11.5 - Prob. 3SGDQCh. 11.5 - Prob. 4SGDQCh. 11.5 - Prob. 11.1ARQCh. 11.5 - How do organizations plan the use of IS? Explain...Ch. 11.5 - Prob. 11.3ARQCh. 11.5 - Prob. 11.4ARQCh. 11.5 - Prob. 11.5ARQCh. 11 - Prob. 11.1UYKCh. 11 - Prob. 11.2UYKCh. 11 - Prob. 11.3UYKCh. 11 - Prob. 11.8CE11Ch. 11 - Prob. 11.11CS11Ch. 11 - Prob. 11.12CS11Ch. 11 - Prob. 11.13CS11Ch. 11 - Prob. 11.14CS11Ch. 11 - Prob. 11.15CS11Ch. 11 - Prob. 11.16CS11Ch. 11 - Prob. 11.17CS11Ch. 11 - Prob. 11.18MML
Knowledge Booster
Similar questions
- Using Table 11.4 as an example, create two alternative access plans. Use the following assumptions: a. There are 8,000 employees. b. There are 4,150 female employees. c. There are 370 employees in area code 615. d. There are 190 female employees in area code 615.arrow_forwardQuestion 28 In --, access is allowed based on specific characteristics of a person, resource, or environment. Discretionary Access Control Attribute-Based Access Control Rule-Based Access Control Role-Based Access Controlarrow_forwardExplain what the GRANT declaration accomplishes and how it impacts the protection of intellectual property rights. When it comes to privileges, what are the many sorts that may be obtained? What are the odds that they will lose their licences in the future?arrow_forward
- Draw the ER diagram of the following requirements: A City Hall wants to manage the members of its entertainment centers. Each center has an address, a district, a unique name. Each center offers several animations. An animation is provided by only one center. Each animation has a unique name and semi-annual cost. A member has a unique id, name (first, middle, last), several contact phone numbers and an address. A member may enroll only in one center and the date of registration is maintained. The member can practice many animation activities.arrow_forwardBased on Figure Q5, construct a complete Entity Relationship Diagram (ERD). State the business rules. Q5 The MySejahtera application is developed by the Government of Malaysia to assist in monitoring the spread of the COVID- 19 epidemic in the country. It also helps users perform self -health assessments. Every citizen needs to register for membership in the MySejahtera application. A user id will be generated to be used to access the MySejahtera system. Each id shall keep a profile. Dependent of that citizen also use the same MySejahtera ID. MySejahtera shall keep information of Vaccine records and Completed records for each citizen. FIGURE Q5arrow_forwardPlease explain what the GRANT declaration is capable of achieving and how it has an effect on the protection of intellectual property rights. How does one go about acquiring the many various types of privileges that are available, and what are the benefits of doing so? In the years to come, what are the possibilities that they will be obliged to hand up their licenses?arrow_forward
- Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revoked?arrow_forwardPlease elaborate on the potential benefits of the GRANT statement and how it affects the security of intellectual property. What are the requirements for obtaining the numerous rights that may be obtained, and what are the advantages of doing so? How likely is it that they will lose their licences in the next years?arrow_forwardIt would be extremely helpful if you could explain the key differences between integrity constraints and authorization constraints.arrow_forward
- Read the following statement and its supporting reason and answer the question that follows: Statement/Assertion: Technical writers integrate headings and highlighting features within the technical documents. Reason: This is done to communicate large amounts of quantifiable information. What is the correct option regarding the above statement/assertion and reason? O a. Both Statement/Assertion and Reason are true and the Reason is the correct explanation of the above Statement/Assertion O b. Statement/Assertion is false but reason is true O c. Both Statement /Assertion and Reason are true and the Reason is not the correct explanation of the abovė Statement/Assertion O d. Statement/Assertion is true but Reason is falsearrow_forwardPlease describe the three guiding principles that govern integrity; I'd really appreciate it. It would be beneficial if you could explain why each rule is being enforced in addition to the regulation itself.arrow_forwardBook title: Cybersecurity Essentials - Charles J. BrooksChapter 1 - Infrastructure security in the Real world From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category. 1. Policy creation sample ofmanaging access to authorized devices and resources based on the following items (NIST PR.AC-1). 2. Method creation sample of controlling physical access to secured assets (NIST PR.AC-2). 3. Action plan creation sample of informing and training general employees (NIST PR.AT-1). 4. Plan sample of helping privileged users understand their job roles and responsibilities (NIST PR.AT-2). (Refer to screenshot for reference)arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning