Principles of Information Systems (MindTap Course List)
13th Edition
ISBN: 9781305971776
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 14, Problem 1SAT
Program Description Answer
Online time wasting costs US businesses more than “$85 billion” annually.
Hence, the correct answer is option “D”.
Expert Solution & Answer
Explanation of Solution
CyberLoafing:
- The aspect of cyber loafing denotes a non-productive application of
information system resources. - It is used to describe employee actions that use internet access at work for personal usages.
- It denotes actions that are for personal gains and not for legitimate work.
- The cyber loafing related activities are time consuming as well as costly.
Explanation for incorrect options:
a. $385 billion
Online time wasting costs US businesses more than $85 billion annually.
Hence, the option “A” is wrong.
b. $285 billion:
Online time wasting costs US businesses more than $85 billion annually.
Hence, the option “B” is wrong.
c. $185 million:
Online time wasting costs US businesses more than $85 billion annually.
Hence, the option “C” is wrong.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What issues arise when digitally sharing copywritten intellectual property, such as music, videos, photographs, books, and video game software takes place. What are the ethical considerations one that uses technology should be aware of?
A business needs to track _____ going into and out of its bank accounts.
Cybersecurity outline budget proposal for a small business of a cell phone/laptop repair shop. Provide $ detail on hardware components & software.
Chapter 14 Solutions
Principles of Information Systems (MindTap Course List)
Ch. 14.1 - What is the harm in nonproductive use of...Ch. 14.1 - Prob. 2RQCh. 14.1 - Do you think that it would help to involve a small...Ch. 14.1 - Prob. 2CTQCh. 14.2 - Prob. 1RQCh. 14.2 - Prob. 2RQCh. 14.2 - Prob. 1CTQCh. 14.2 - Prob. 2CTQCh. 14.3 - Prob. 1RQCh. 14.3 - Prob. 2RQ
Ch. 14.3 - Prob. 1CTQCh. 14.3 - Prob. 2CTQCh. 14.4 - Prob. 1RQCh. 14.4 - Prob. 2RQCh. 14.4 - Prob. 1CTQCh. 14.4 - Prob. 2CTQCh. 14 - Prob. 1SATCh. 14 - Prob. 2SATCh. 14 - Prob. 3SATCh. 14 - Prob. 4SATCh. 14 - Prob. 5SATCh. 14 - Prob. 6SATCh. 14 - Prob. 7SATCh. 14 - Prob. 8SATCh. 14 - Prob. 9SATCh. 14 - Prob. 10SATCh. 14 - Prob. 11SATCh. 14 - Prob. 12SATCh. 14 - Prob. 13SATCh. 14 - Prob. 14SATCh. 14 - Prob. 15SATCh. 14 - Prob. 16SATCh. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQCh. 14 - Prob. 11RQCh. 14 - Prob. 12RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 1PSECh. 14 - Prob. 1TACh. 14 - Imagine that your team has been hired to conduct a...Ch. 14 - Prob. 3TACh. 14 - Prob. 1WECh. 14 - Prob. 2WECh. 14 - Prob. 3WECh. 14 - Prob. 1CECh. 14 - Prob. 2CECh. 14 - Prob. 3CECh. 14 - Prob. 1CTQ1Ch. 14 - Prob. 2CTQ1Ch. 14 - Prob. 3CTQ1Ch. 14 - Prob. 1CTQ2Ch. 14 - Prob. 2CTQ2Ch. 14 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- Related to Cyber security riskarrow_forwardIdentity theft is one of the most widespread types of cybercrime, and it affects millions of people in different parts of the globe every single year. You should provide an explanation of how identity thieves gain your personal information by utilising the internet, as well as the preventive actions you should take to avoid having your identity stolen by criminals who engage in such activities.arrow_forwardIdentify and resolve online banking issues.arrow_forward
- The causes of cyber harassment are looked at, as well as how they affect society and how to stop cyber harassment.arrow_forwardIdentity theft is one of the most prevalent forms of cybercrime, affecting millions of people in various regions of the world each year. You should explain how identity thieves use the Internet to obtain your confidential information, as well as the precautions you should take to avoid having your identity taken by offenders who engage in such conduct.arrow_forwardThe act of committing crimes online may have a broad variety of repercussions. Investigating the problem in detail and coming up with solutions are both necessary steps in the fight against cybercrime.arrow_forward
- Describe the challenges governments and organizations face in addressing threats to transportation security.arrow_forwardWhat do you consider to be the most important cyber security legal issues? Elaboratearrow_forwardWhat are some of the privacy concerns that customers may have while purchasing on a social network such as Facebook, which already has access to a large amount of personal information?arrow_forward
- Employees who check their email while at work should pay special attention to any constraints that are placed on the policy or practice that directly impacts them, since this might have a negative impact on their jobs.arrow_forwardNO HANDWRITING NO SIMILARITY PLEASE WRITE A REPORT! Produce a report describing what cybercrimes have been committed in the past (Describe cybercrime, past, present and future.)arrow_forwardAre current legislations sufficient to protect children under the age of 16 from online harm? If not, what are some other measures Governments should considerarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningMicrosoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:Cengage
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage