Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 6, Problem 6.8CE6
a.
Explanation of Solution
Prevent the encroachment of SaaS (Software as a Service) on the business:
- Maximum number of the people believe that the cloud is the future.
- Sometime security with the cloud is questionable, but the people believe that it will improve, making people more comfortable with it as time goes on.
- The economics are enormous in favor of the SaaS providers...
b.
Explanation of Solution
Alternative ways for people can respond:
The alternative ways to prevent the encroachment of SaaS on the business is as follows:
- Goal advertising towards objects most probably to have physical control of their data, li...
c.
Explanation of Solution
Justification:
- One can believe that it would be in our best interest to use all three points. By offering unlimited data that obviously puts the people ahead of the curve because other cloud services provide limited data.
- By focusing more on reliability as opposed to looks one can guarante...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An organization dedicated to reduce spam tried to get
Internet Service Providers (ISP's) in Asian country to stop
spammers by protecting their mail servers. When this effort
was unsuccessful, the anti-spam organization put the
address of these ISP'son its “black list". Many ISP's in the
Philippines consulted the black list and refused to accept
email from the blacklisted ISP's. This action had two results.
First, the amount of spams received by the typical email user
in the Philippines dropped by 25 percent.
Second, ten of thousands of innocent computer users in the
East Asian country were unable to send email to friends and
business associates in the Philippines. Lifted from Lavina,
C.G. (2015). Social, Ethical, Legal and Professional Issues
in Computing with complete explanation of the Philippine.
Manila: Cybercrime Laws. Mindshapers Co., Inc
Answer the following questions.
1. Did the anti-spam organization do anything wrong?
2. Did the ISP's that refused to accept email from the…
Read the following scenario and answer the following questions.
The Softech team, led by Mr. Andrew (management team) needs to prepare a requirements documentation for an Online Ordering Books System (OOBS) by middle of December 2021. OOBS is a system that sells book directly to its customers by using secure internet commerce software. The main purpose of this system is to provide immediate feedback to customers. For example, after making an order, the customer may view information of their ordering status. This project is supposed to be completed within a month. In order to complete it, the development team needs to find out the requirements, the context information and additional information as well. All the communications with the client’s, named Nancy will be arranged by Ariana. Haikal (developer team) will also help on the development part. While Diana and Vin (tester team) will prepare the test cases and test results.
OOBS is a system that sells…
Read the following scenario and answer the following questions.
The Softech team, led by Mr. Andrew (management team) needs to prepare a requirements documentation for an Online Ordering Books System (OOBS) by middle of December 2021. OOBS is a system that sells book directly to its customers by using secure internet commerce software. The main purpose of this system is to provide immediate feedback to customers. For example, after making an order, the customer may view information of their ordering status. This project is supposed to be completed within a month. In order to complete it, the development team needs to find out the requirements, the context information and additional information as well. All the communications with the client’s, named Nancy will be arranged by Ariana. Haikal (developer team) will also help on the development part. While Diana and Vin (tester team) will prepare the test cases and test results.
OOBS is a system that sells…
Chapter 6 Solutions
Using MIS (10th Edition)
Ch. 6.3 - Prob. 1EGDQCh. 6.3 - Prob. 2EGDQCh. 6.3 - Prob. 3EGDQCh. 6.3 - Prob. 4EGDQCh. 6.3 - Prob. 5EGDQCh. 6.3 - Prob. 6EGDQCh. 6.3 - Prob. 7EGDQCh. 6.3 - Prob. 8EGDQCh. 6.3 - Prob. 9EGDQCh. 6.7 - Prob. 1QLQ
Ch. 6.7 - Prob. 2QLQCh. 6.7 - Prob. 3QLQCh. 6.7 - The article mentions that quantum computers will...Ch. 6.8 - Prob. 1SGDQCh. 6.8 - Prob. 2SGDQCh. 6.8 - Prob. 3SGDQCh. 6.8 - Prob. 4SGDQCh. 6.8 - Prob. 5SGDQCh. 6.8 - Prob. 6.1ARQCh. 6.8 - Prob. 6.2ARQCh. 6.8 - Prob. 6.3ARQCh. 6.8 - Prob. 6.4ARQCh. 6.8 - Prob. 6.5ARQCh. 6.8 - Prob. 6.6ARQCh. 6.8 - Prob. 6.7ARQCh. 6.8 - Prob. 6.8ARQCh. 6 - Prob. 6.1UYKCh. 6 - Prob. 6.2UYKCh. 6 - Prob. 6.3UYKCh. 6 - Prob. 6.4UYKCh. 6 - Prob. 6.5UYKCh. 6 - Prob. 6.6UYKCh. 6 - Prob. 6.7CE6Ch. 6 - Prob. 6.8CE6Ch. 6 - Prob. 6.9CE6Ch. 6 - Prob. 6.1CE6Ch. 6 - Prob. 6.11CE6Ch. 6 - Prob. 6.12CE6Ch. 6 - Prob. 6.14CS6Ch. 6 - Prob. 6.15CS6Ch. 6 - Prob. 6.16CS6Ch. 6 - Prob. 6.17CS6Ch. 6 - Prob. 6.18CS6Ch. 6 - Prob. 6.19CS6Ch. 6 - Prob. 6.2CS6Ch. 6 - Prob. 6.21MMLCh. 6 - Prob. 6.22MML
Knowledge Booster
Similar questions
- Are end-to-end data and connection encryption options possible? What is the benefit of this? Give an example of a case when encryption is beneficial.arrow_forwardA one-time-use credit card number is provided by various credit card issuers as an additional layer of security for electronic payments. When a customer connects to the credit-card company's Web site, they will get a one-time-use number. Make a case for the benefits of using a system like this in compared to the usage of normal credit card numbers. Discuss its pros and downsides in compared to other electronic payment systems that need authentication, as well as other payment methods.arrow_forwardHI there, thank you in advance. Please write the correct answer by answering True and False the following questions. Namny many thanks :) [1] The BIA results can be utilized in The risk assessment. [2] In a Cloud Computing Environment Customers should expect that the provider has no SPOFs within their facilities and architecture. [3] Risk can not only be reduced but also eliminated. [4] The cloud customer is always ultimately legally liable for any loss of data even if the cloud provider demonstrates negligence or malice. [5] Infrastructure as a service (IaaS) is the cloud model in which the cloud customer has the most responsibility and authority. [6] PII is a major component of regulatory compliance. [7] PaaS contains everything included in IaaS with the addition of OSs. [8] Public clouds are multitenant environmentsarrow_forward
- Suppose an organization uses a secure VPN to securelyconnect its sites over the Internet. Jim, a user in theorganization, uses the VPN to communicate with his boss,Mary. Describe one type of communication between Jim andMary which would not require use of encryption or othersecurity mechanism, and another type of communication which would require encryption or other security mechanisms. Please explain your answer.arrow_forwardMr. Emmanuel Kwame Andoh wants to start a mobile money vending business with 6 branches across the country. He wants to be able to have information on all the transactions that happens in any of his branches. He describes a typical daily activity per a worker as follows: A customer or a person walks in and requests to do either a withdrawal or a deposit. Then his worker would record the name and number of the person, the type of transaction and the amount involved in the transaction and the transaction reference number. Mr. Andoh provided all the information above and more to a database designer who simply supplied just the SQL script that would implement the system. But the designer did not explain how the system would work to Mr. Andoh. #below is the SQL Script: You can copy and paste to run create database pharmacy; use pharmacy; create table branch(id int(3) not null auto_increment primary key, name varchar(50) not null); create table transaction_type(id int(1) not null…arrow_forwardCaseSaudi Arabia is making a rapid progress in implementing computing solutions for facilitating its citizens and residents to use the electronic platforms and various mobile as well as web applications for various services. The users of those applications are required to take appropriate appointment or order for something of their choice while avoiding hustle, fatigue and long waiting hours. But at the same time, it requires addressing various information security related issues like communication security, authentication, privacy.Suppose that your company has won a contract to develop a mobile application for Saudi Arabia called “All- in-one-app” for providing all study related services in one application. In this case study, you are required to identify and judge such issues for your application and list the steps that you will take to ensure that you successfully fulfill the following requirements by following the ethical guidelines that you learned in corresponding topics in the…arrow_forward
- A network security design is necessary to increase the company's level of protection and security given that the majority of the company's business operations are handled by servers that are connected to a flat network. Because the network is so flat, this is the result of why it is that way. whenever there is an establishment of a demilitarized zone and whenever there is. If you had the ability to change anything about the current structure of the network, what components of it would you change?arrow_forwardThen, imagine that a company utilizes Kerberos to authenticate its users.What would happen if either the AS (authentication server) or TGS (ticket granting server) goes down in terms of security and service availability?arrow_forwardIn October 19, 2012, HSBC servers came under a denial of service (DoS) attack which affected a number of HSBC websites around the world. The London-based banking giant said in a statement, "This denial of service attack did not affect any customer data, but did prevent customers using HSBC online services, including internet banking." a) Explain how the objective of DoS differs from other types of network attacks b) How the DoS attack is carried out? c) How the Dos attack works? d) As an expert in computer security, explain the challenges in identifying the real attacker who launched the DDOS attack against HSBC website. e) Discuss the relationship between DDOS attack and Botnetarrow_forward
- eCabs is a newly created taxi service company that provides online booking for clients in the Lusaka province. eCabs has considered developing a simple website for an online booking System with the capability to enable clients access from their mobile devices and to book for a trip. At the time of their first booking, clients should be able to enter their details into an online form, along with their credit card details. However, clients can also have an account with eCabs and for any subsequent bookings, they can log in to their own account and make a booking for a taxi. They need to be able to enter their trip origin and destination. The system will give them an estimate of cost according to their trip description. Assuming you have been assigned to design and develop the system for eCabs. You are given three weeks to come up with a blueprint of the system design and present the design to a team of consultants. The online booking System should be able to perform a number of…arrow_forwardAn electronic gadget distibutor company Low Yatt Seng is based in Alor Setar, Kedah sells its products in north, north-west, and western region of Malaysia. They have sales units at Penang, Kuala Lumpur, and Johor Bahru. The CEO of the company wants the latest sales information to measure the sales performance and to take corrective actions if required. He has requested the report as follows: January February March Units RM Units RM Units RM Penang Digital Camera 5 2500 3 500 Mobiles Phones 3 1500 16 8000 6 3000 Pen Drives 4 800 16 800 6 1000 Kuala Lumpur Digital Camera 3 500 Mobiles Phones 3 1500 Pen Drives 4 450 9 450 15 750 Johor Bahru Digital Camera 3 500 Mobiles Phones 3 1500 Pen Drives 4 450 9 450 15 750 TOTAL 26 6500 50 2100 40 6500…arrow_forwardEimi the manager of Company XYZ is having a big trouble since the company is continuously being targeted by a hacker named Rei using 1 poli DDOS Botnet malware. Eimi then choose one of the most unsolicited solution of all, she hired hackers in order to improve the cyber security of the company. Do you think this is a good solution for the company? * Yes, Eimi considers the idea that one way to test and improved the cyber security is to hire ethical hackers that would pinpoint the weakness and flawed of the system thereby strategically improving the cyber security the company as well No, Hiring hackers in order the improve the cyber security is a bad thing. All hackers are bad that is why they are called hackers Yes, By doing so Eimi addresses the concern of improving the knowledge and information security competency of the users thereby protecting them from psychological manipulative techniques that would compromise information using DDOS Botnet Malware No, Hiring hackers is dangerous…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning