Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 11.5, Problem 11.5ARQ
Explanation of Solution
Changes and developments that will have an effect on an organization’s management of IS (
- Organizations will shift their internal hardware infrastructure into the cloud.
- Companies will keep some data in their own privately controlled servers for the sake of safety.
- Use of mobile devices will increase at workplaces as they will become more powerful, cheaper and will provide dynamic and game like experiences.
- Organization will develop BYOD (Bring Your Own Device) policies that will help them meet their needs and strategies and at the same time IoT (Internet of Things) will offer the opportunity for innovation in operations, manufacturing and chain management.
- Organizational knowledge management will use social media as a key component in projects.
- The change which is going to be like a revolution is, CIO (Chief information officer) will become a fully-fledged member of the executive suite, and IS will be the key component to fetch competitive advantage.
Mobile devices and IoT:
- In 2027, mobile devices will be used in the workplaces as it will become cheaper, more powerful, with dynamic and game like user experiences.
- By developing BYOD policies, Organizations will encourage the employees to bring their own devices to work.
- Internet of things (IoT) will simultaneously provide more opportunities for innovation in operations, manufacturing and supply chain management.
- As it can be seen that workers will be bringing their own computing devices which will be equally powerful as any computer they have at work, organization will have to develop the restrictive BYOD policies to meet organizational needs and strategies.
- Even after that the security of the data will be in risk as workers will have their own devices and access to all the organizational documents.
- In the starting years, BYOD policies may help in maintaining control but after a while, it will lead to competitive disadvantage.
- Workers will access the network using whatever hardware they have and whatever they happen to be. Even if the employees are unable to do so, their competitors will.
Loss of data control is inevitable:
It has been observed that since the time world is experiencing the advancement in technology, there has been advancement in the ways to lose the data...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
You must analyze a controversial issue within your professional field and prepare a position paper.The target audience is your immediate supervisor who has asked you to research the issue and present a position for the organization.
a. Define an issue (controversial issue or industry topic) that is relevant within the field you have chosen to pursue for your career. Potential topics focused upon your major are provided below;
IT Security ( Risk Management):
Outsourcing risk
Whether to pay the ransom for Ransomware
Multi-cloud security
Provide research on the background of the issue, discussing the merits of each side of the issue. You must summarize information from a minimum of two authoritative sources, providing appropriate references for your sources of information. The sources may include newspapers, books, magazines, news portals, databases, online libraries, websites, blogs, etc.
Your sources may also include interviews with appropriate individuals from the…
Identify cyber risks and their potential impact on the firm. Assess the impact of a recent cyber incident on sales, earnings, or brand. Separate Disaster Recovery from Business Continuity and Incident Response. Please express and defend your point of view. Please answer those three questions completely, eliminating any links or small details.
Task 2: Cybersecurity tolls and applications can encompass a body of technologies, processes, structures, and practices used to protect networks, computers, programs, and data from unauthorized access or damage. Consider yourself as a senior manager in an organization; how to create a cyber-security culture within the workplace in your organization.
Chapter 11 Solutions
Using MIS (10th Edition)
Ch. 11.2 - Prob. 1MDQCh. 11.2 - Prob. 2MDQCh. 11.2 - Prob. 3MDQCh. 11.2 - Prob. 4MDQCh. 11.2 - Prob. 5MDQCh. 11.3 - Prob. 1EGDQCh. 11.3 - Prob. 2EGDQCh. 11.3 - Prob. 3EGDQCh. 11.3 - Prob. 4EGDQCh. 11.5 - Prob. 1SGDQ
Ch. 11.5 - Prob. 2SGDQCh. 11.5 - Prob. 3SGDQCh. 11.5 - Prob. 4SGDQCh. 11.5 - Prob. 11.1ARQCh. 11.5 - How do organizations plan the use of IS? Explain...Ch. 11.5 - Prob. 11.3ARQCh. 11.5 - Prob. 11.4ARQCh. 11.5 - Prob. 11.5ARQCh. 11 - Prob. 11.1UYKCh. 11 - Prob. 11.2UYKCh. 11 - Prob. 11.3UYKCh. 11 - Prob. 11.8CE11Ch. 11 - Prob. 11.11CS11Ch. 11 - Prob. 11.12CS11Ch. 11 - Prob. 11.13CS11Ch. 11 - Prob. 11.14CS11Ch. 11 - Prob. 11.15CS11Ch. 11 - Prob. 11.16CS11Ch. 11 - Prob. 11.17CS11Ch. 11 - Prob. 11.18MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Discussion Forum - Unit 7 Activity 1 TASK A: Discuss the following questions, identifying possible reasons and motives for the users at both sides of the spectrum: Discuss why users try to break into other user's computers and information systems Discuss why users create viruses. Discuss who owns electronic mail systems, and why they do TASK B: Answer the question posed in the Panama Papers Vignette - Was it wrong to hack and leak the Panama Papers? What technology issues led to the security breach in the Panama Papers case. What is the possible business impact of this security breach for the law firm and its customers? What should the law firm do in the future to avoid similar incidents? TASK C: What is the difference between a business continuity plan and a disaster recovery plan?arrow_forwardCan i please get help with this question: This is all the information needed for the question...I would really appreciate the help..You can just google the sites yourself you dont have to use the link SOURCES TO HELP WITH QUESTION. Review some of the recent threat reports from the key relevant sources such as: You can type the reports listed below into google to get the articles. IC3 2020 CRIME REPORT: AND ASEAN CYBER THREAT ASSESSMENT 2021 INTERPOL: QUESTION identify any additional new threat vectors that you found from these recent surveys. (What were the main threat vectors, which were continuing trends and which were new ).arrow_forwardHow did the popular subjects and trends associated with cybercrime arise, and what are they? Please explain where you acquired the information if you want me to deliver an appropriate answer.arrow_forward
- 1. BYOD has been used by many organizations. Note some of the risks of users accessing networks with personal devices. Be sure to explain ways to avoid the risks. 2. Complete Case Project 10-1. Identify the MDM tool from your comparison that you would recommend for your school or workplace. 3. Internet of Things (IoT) devices are everywhere now but they're often the source of security concerns. Do some research into IoT and discuss what precautions (if any) you take before bringing IoT devices into your home. Lastly, how do BYOD and IoT differ? How are they the same?arrow_forwardDefine the GDPR. Justify the need for the GDPR. Review the GDPR’s key principles. Research an organization that violated the GDPR. Describe the specifics of the violation, including the violator, the GDPR principles that were violated, the impact on consumers, and the remedy that was applied. Compare and contrast an existing U.S. initiative that protects citizens’ privacy with the GDPR. Review foundational cybersecurity concepts and the federal, state, and local cyber defense partners/structures.arrow_forwardNearly a decade has passed since the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.arrow_forward
- Objectives Explore the career opportunities for cybersecurity professionals. Explore the career requirements for cybersecurity professionals. Part 1: Exploring Cybersecurity Jobs Part 2: Cybersecurity Job Requirements Background / Scenario The cyber world is full of dangers and threats to individuals, organizations, and countries. These perils have resulted in a major demand for individuals with the knowledge, skills, credentials, and ethics to protect our people and systems. In this lab, you will explore the types of jobs available, job titles, job requirements, and credentials required by the cybersecurity industry. The Internet is full of job search websites that can provide you with information about careers in cybersecurity. Many of these websites are job search sites called job aggregators. This means that they collect job postings from many other sites and organizations. In part one, you will explore three of the world’s most popular job aggregator websites. In part two, you…arrow_forwardA security policy is developed by senior management to assign certain responsibilities and mandate certain requirements, which are usually aligned with the agency's mission.A new policy was just created to prohibit peer-to-peer software downloads, as they are illegal and may bring malicious content to the workplace. The security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. Explain how you would handle this situation. What would you do to enforce the policy?arrow_forwardSecurity policies are established by senior management in order to assign specific duties and mandate certain criteria, which are typically linked with the purpose of the organization. It has recently been announced that a new policy has been implemented to ban peer-to-peer software downloads, which are unlawful and may introduce harmful material into the workplace. Employees were defying the regulation, according to the security officer, who saw that they continued to download peer-to-peer software despite the prohibition. Explain your approach to dealing with this issue. What steps would you take to ensure that the policy is followed?arrow_forward
- Explain why it is important to recognise cyber threats and how they may damage your business. Analyze and explain a recent cyber-attack and its impact on the company's revenue, profit, or brand. Examine the similarities, differences, and overlaps between disaster recovery, business continuity, and incident response. Please express and defend your point of view. Could you please write the answers to those three questions completely, without any links or small details?arrow_forwardIdentity theft is one of the most widespread types of cybercrime, and it affects millions of people in different parts of the globe every single year. You should provide an explanation of how identity thieves gain your personal information by utilising the internet, as well as the preventive actions you should take to avoid having your identity stolen by criminals who engage in such activities.arrow_forwardInitiatives in which professionals in the field of cyber security may choose to join in order to encourage changeInitiatives in which professionals in the field of cyber security may choose to join in order to encourage changearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning