Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 2, Problem 2MBD
Explanation of Solution
Types of sensitive data found in organizations:
Sensitive Information:
In a business or organization, sensitive information is the data that must be protected from unauthorized access to safeguard the privacy or security of the organization.
The types of sensitive information found in organization are mentioned below:
- Human resource data: The human resource data sets are the data and information based on human resource management system and is sensitive information.
- Competitive data: Organizations have data and analysis based on their competitive peers and rivals which are sensitive.
- Strategic data: Organizations have data and analysis based on their various strategies such as market growth, value and product marketing which are sensitive.
- Pricing data: Organizations have data and analysis based on their various strategies on market price and product price which are sensitive.
- New Product development data: Organizations have data and analysis based on the new products to be developed and marketed which are sensitive.
- Marketing data: Organizations have data and analysis based on their various strategies based on marketing which are sensitive.
- Finance data: Organizations have data and analysis based on their various financial deals which are sensitive.
- Employee salary data: The salary of the employees present in an organization is sensitive.
- Customer data: The customer data present in an organization is sensitive.
Not everyone in an organization should have access to sensitive information as keeping sensitive data safe is a key priority for digital companies and policies for data sharing and data capture can help mitigate the issues of data security...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Why is it preferable to work from the top down when it comes to the safety of one's data?
In the earliest days of computers, how did individuals make sure that the information they stored was secure?
Because today's computers are so powerful, this is why it's happening. Are there any
explanations for the rise of computers in schools over the last few decades, and if so, what
data supports it?
Chapter 2 Solutions
Business Driven Technology
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- How can scientists in the field of computer science guarantee the reliability of their data?arrow_forwardThis is because modern computers have such an astounding capacity for processing data. What changes that have occurred over the course of the last few decades have led to a rise in the pervasiveness of the use of computers in educational settings, and how can this be shown to be the case?arrow_forwardIf you work in computer science, what are the advantages of clean data?arrow_forward
- Understanding "dirty data" and its sources is crucial.arrow_forwardTo what extent may health informatics specialists provide assistance in standardizing health data?arrow_forwardThe usage of computers and information systems is now prevalent in many common items such as amusement park rides, automobiles, elevators, and ovens, among other things, that you would not usually connect with computers or information systems. There are certain advantages, but are there any dangers as well? If, for example, you were riding a roller coaster that was computer controlled, would you feel more or less at ease? Alternatively, would you feel secure enough traveling in a Tesla with the auto-drive function turned on? What are the advantages and disadvantages of computerizing a growing number of daily objects? Do the potential benefits outweigh the risks? What is the reason for this or why is it not?arrow_forward
- Databases need different search phrases than the internet. They vary greatly. How are inquiries framed and results returned different and similar?arrow_forwardHow has data storage progressed throughout history? Data storage devices have required less privacy because of software-based user authentication. Data storage devices have become increasingly smaller. Data sharing has replaced data storage as a business strategy. Data storage has evolved to be entirely digital.arrow_forwardWhat is selective bias during data collection?arrow_forward
- I was wondering if you had any suggestions for methods that may be utilized to track the movement of data.arrow_forwardIn addition to forums, newsletters, blogs, and IM, it would be great if you could include an explanation of social networking, online discussion groups, chat rooms, mailing lists, podcasts, RSS feeds, webinars, and email lists. To what extent do these innovations improve the efficiency with which one does online research?arrow_forwardOne of the most noticeable examples of ICT in use today is the internet. You must offer sufficient proof to support every claim you make.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning