Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 5.8, Problem 3SGDQ
Explanation of Solution
Technology tension that prevail between the security and convenience:
The technological tensions that prevail between the security and convenience are the security policies that abide with the students who pursue course in a university.
Every student who pursue course in an institution needs to be registered to access and process the course content.
The security tension that prevails with the students is that changing passwords regularly that should satisfy the organization password setting rules.
The above mentioned scenario is a safety measures that are to be followed in regular fashion to have a proper security and it is not likely to be a great challenging task...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Most hackers start their careers breaking into computer systems as teenagers. What can we as a community of computer professionals do to reduce the temptation to become a hacker? What is the difference between a white hat hacker and a black hat hacker? Is there such a thing as a gray hat hacker?
Security, crime, privacy, social interactions, and even government are just some of the many subjects explored by the field of computer ethics. Is it really important, in your opinion, that chief information officers (CIOs) make ethical computing a priority when it comes to safeguarding confidential data?
To what extent do you think it's fair that users give up certain personal information in return for access to low-cost or no-cost software? Can they be held responsible for the information they collect and how they utilize it? Always be prepared to argue for your position. Does your assertion have any kind of evidence supporting it?
Chapter 5 Solutions
Using MIS (10th Edition)
Ch. 5.2 - Prob. 1EGDQCh. 5.2 - Prob. 2EGDQCh. 5.2 - Prob. 3EGDQCh. 5.2 - Prob. 4EGDQCh. 5.2 - Prob. 5EGDQCh. 5.2 - Prob. 6EGDQCh. 5.2 - Prob. 7EGDQCh. 5.2 - Consider the adage Never ask a question for which...Ch. 5.3 - Prob. 1SAQCh. 5.3 - Prob. 2SAQ
Ch. 5.3 - Prob. 3SAQCh. 5.3 - Prob. 4SAQCh. 5.8 - Prob. 1SGDQCh. 5.8 - Prob. 3SGDQCh. 5.8 - Prob. 4SGDQCh. 5.8 - Prob. 5.1ARQCh. 5.8 - Prob. 5.2ARQCh. 5.8 - Prob. 5.3ARQCh. 5.8 - Prob. 5.4ARQCh. 5.8 - How are data models used for database development?...Ch. 5.8 - Prob. 5.6ARQCh. 5.8 - Prob. 5.7ARQCh. 5.8 - Prob. 5.8ARQCh. 5 - Draw an entity-relationship diagram that shows the...Ch. 5 - Consider the relationship between Adviser and...Ch. 5 - Prob. 5.3UYKCh. 5 - Prob. 5.4UYKCh. 5 - Study Figure 5-28 to understand the entities and...Ch. 5 - Working with your team, develop a list of seven...Ch. 5 - Modify the E-R model in Figure 5-28 to include a...Ch. 5 - Discuss the advantages and disadvantages of the...Ch. 5 - Transform the data model in Figure 5-28 into a...Ch. 5 - Prob. 5.1CE5Ch. 5 - Fill your database with sample data. Because you...Ch. 5 - Prob. 5.12CE5Ch. 5 - Explain why a one-table database could be stored...Ch. 5 - Prob. 5.14CS5Ch. 5 - Examine the columns in Figure 5-33. Name three...Ch. 5 - Prob. 5.16CS5Ch. 5 - Prob. 5.17CS5Ch. 5 - Explain the statement A database is an abstraction...Ch. 5 - Prob. 5.19CS5Ch. 5 - Prob. 5.2MMLCh. 5 - Prob. 5.21MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Some of the various domains that computer ethics explores include security, criminality, privacy, social relationships, and even governance. Do you believe it is critical for CIOs to make computer ethics a top concern when it comes to protecting sensitive information?arrow_forwardBoth business and government were concernedwith security long before the need for computer-relatedsecurity was recognized. They always have been interested in the physical protection of assets through means such as ,locks, barriers, and guards. The introduction of computerprocessing, large databases, and communication networks hasincreased the need for security. For many people, securitymeans preventing unauthorized access, such as preventing ahacker from breaking into your computer. Security is morethan that, however. It also includes being able to recover fromtemporary service problems (e.g. a circuit breaks) or fromnatural disasters (e.g. fire, earthquake).You are required to address the following three Security Goals:(a) Confidentiality (b) Integrity and (c) Availability.arrow_forwardThe use of cloud computing has the potential to have profound implications for society. Is it possible to summarise his relationship to computers and his historical background in just a few sentences? Another advantage is the fact that it is risk-free.arrow_forward
- Secondly, in your own words, please identify and briefly describe THREE different computer settings that are pertinent to our subject.arrow_forwardMany everyday objects such as amusement park rides, cars, elevators, and ovens, etc. that you might not normally associated with a computer or information system, in fact, are today. There are obvious benefits, but are there risks as well? For instance, would you feel more or less comfortable riding on a roller coaster that was computer controlled? Or would you feel safe enough riding a Tesla using its auto-drive feature? Do the benefits of computerizing an increasing number of everyday objects outweigh the potential risks? Why or why not?arrow_forwardHow would you go about determining what originally led to the computer issue?arrow_forward
- In today’s technologically advanced society, is there really privacy? Based on your own personal experiences with social media (Facebook, Twitter, Tik Tok, Instagram, or Snapchat), do you feel that individuals should be held accountable for their actions outside of the workplace? Is it possible that, due to the technological advances in smart phones, tablets, and other communication devices, workplace and personal privacy have meshed together to a point that what was once personal space is now fair game in the hiring and firing practices?arrow_forwardThe usage of computers and information systems is now prevalent in many common items such as amusement park rides, automobiles, elevators, and ovens, among other things, that you would not usually connect with computers or information systems. There are certain advantages, but are there any dangers as well? If, for example, you were riding a roller coaster that was computer controlled, would you feel more or less at ease? Alternatively, would you feel secure enough traveling in a Tesla with the auto-drive function turned on? What are the advantages and disadvantages of computerizing a growing number of daily objects? Do the potential benefits outweigh the risks? What is the reason for this or why is it not?arrow_forwardIn your own words, please name and quickly explain THREE distinct computer settings that relate to our discussion.arrow_forward
- Asking, "What kind of security was most often utilized in the early days of computers?"arrow_forwardConduct a literature/online search to locate an event where there was a problem (i.e. something "went wrong") as a direct result of the personal health information existing in an electronic format. In your initial post, answer the following: Briefly, what was the situation? What industry documented steps or best practices can/should be taken to avoid such an event from happening again in the future?arrow_forwardIn recent years, the Internet has become a vital medium for the free exchange of ideas. The spread of hate speech is facilitated by numerous individuals and organizations using social media platforms like Facebook and Twitter. In online discussion groups, should free speech remain untamed? Should there be a zero-tolerance policy for hate speech on social media?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning