Description
I have management information system class and i need someone to read the attached which is two pages and then there are four case study questions need to answer.
(Each question must be at less half page) with no plagiarism..
Screen Shot 2015-06-16 at 1.52.20 AM.pngScreen Shot 2015-06-16 at 1.52.38 AM.png
Screen Shot 2015-06-16 at 1.52.53 AM.png
Screen Shot 2015-06-16 at 1.53.26 AM.png
Unformatted Attachment Preview
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Awesome! Perfect study aid.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Resolving Performance Problems with the Network
Assignment: Resolving Performance Problems with the NetworkXYZ Inc. has a small office with 80 users in California. The of ...
Resolving Performance Problems with the Network
Assignment: Resolving Performance Problems with the NetworkXYZ Inc. has a small office with 80 users in California. The office employs a file and print server that caters to user requests.Recently users have complained that it takes a lot of time to retrieve files from the server. In addition users have also complained that at times it takes a while to service print requests.A network administrator of XYZ Inc. says that this is occurring because the network is not functioning at performance levels. What do you think are some possibilities for the cause of the problem? If making assumptions, please state what those assumptions are. What do you think would be possible solutions? Include a drawing of the topology that should be used and what types of networks you propose would work here and the accompanying justification. submit a report to the Dropbox as a 3- to 5-page MS Word document named ITS1101_W4_A2_LastName_FirstInitial.docx. Your report will describe the possible causes of the problem and the possible solutions. Make sure to cite your work using APA.
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s anal ...
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s analysis of maintaining the accuracy of customers’ personal information and indicate aspects of their post that effectively address the issues of maintaining personal information accurately. Suggest additional issues not considered in their initial post. Support your suggestions and recommendations with evidence from your sources.
#1. Zackary
Data governance is a term that is used to describe the policies that a business or entity implements in order to maintain and ensure accuracy of collected data. “Data governance means that enterprises have a high quality of data management through all phases of the data lifecycle” (Watts, 2020). There are many reasons why maintaining the accuracy of customers’ personal information is important to both our business and the customer’s privacy. One of these reasons is that many companies use client demographic (and other) information to inform large business decisions with data analytics. “Advanced Analytics is required for complex tasks such as prediction, customer centricity, personalization and cross-channel attribution” (Odoscope).
As far as privacy concerns go, having incorrect customer data can lead to major consequences. One instance of this was when the U.S. government accidentally detained a mother and daughter because their records had mistakenly labeled them as “armed and dangerous” (EPIC). The mother was able to sue the government because of their lack of compliance with the Privacy Act (EPIC).
A more business-related consequence would be that inaccurate client information can lead to failed audits, legal repercussions, and data leaks. If the company has the incorrect address on file for a client, and they send out some personal information, that information is now in the hands of an unknown party. Another example would be if a client were to claim that an employee was acting unethically or illegally, but there are no accurate records of the company’s transactions with that client, there could be a lengthy legal battle. Also when a company is audited, having proof of accurate information can prevent suspicion of altered files. “An audit trail can be very useful as evidence to show that the records have been properly managed, thereby helping prove that no unauthorized alteration of the record or its associated metadata has occurred during the record’s life” (Griffy-Brown, 2005).
#2. Colmcilla
Explain the importance of maintaining the accuracy of customers’ personal information.
From the perspective of the company, the customer database is how we reach out to the people who give us money. Maintaining the accuracy of that database only makes sense so that we can contact those people to keep giving us money. Once a customer moves address or telephone number, and we lose the opportunity to influence them through direct marketing, we lose our opportunity to influence the customer towards us.
Explain how maintaining accurate personal information affects the privacy of a company’s customers.
Failing to maintain accurate personal information affects the privacy of a company’s customers because inaccuracies can lead to crossing entities and inadvertently releasing data to an incorrect source. As explained by Gupta and Schneider (2018), the opportunity for data associated with one entity to be sent to another entity with similar characteristics is high, and becomes higher as an organization accumulates more data.
Explain the ramifications on a customer’s privacy when an organization poorly maintains customer information.
Confidential customer data can be incorrectly released to the wrong person. For example, in a pharmacy database, if there are several “John Smith” entities, and one uses a blood pressure medicine, the pharmacy may send targeted coupons from the manufacturer of the drug. But, if the pharmacy fails to maintain accurate information on all of their John Smith entities, the wrong John Smith may receive the coupon, and now knows that some other John Smith is on blood pressure medicine. This is a violation of the customer’s HIPAA privacy rights.
For #3 and #4 here are the requirements:
Evaluate your peer’s Employee Privacy section language. Suggest at least one additional element for their language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.
Your responses should be a minimum of 200 words.
#3. Oyindamola
Many organizations have developed policies on the use of IT in the workplace in order to protect against employee abuses that reduce worker productivity or that exposes the employee to harassment lawsuits based on studies conducted that 60 to 80 percent of employees’ time online has nothing to do with work (Reynolds, 2015). For the purpose of this assignment, I researched the company Entrata Employee handbook under the section “Workplace Security & Monitoring” (p. 23-24) that addresses digital work activities and communication. The Entrata handbook states below:
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training.
Computers furnished to employees are the property of the company; therefore, computer usage and files may be monitored or accessed.
The monitoring of phones and conversations is well stated and with reasons why it is been done while the monitoring or accessing of computers is just mentioned without stating why it may be accessed or monitored for. As an employee, I would like to know what is been monitored, why and the consequences when violations occur.
Employee Privacy Section (in my own words)
We value our employees and the time and effort put into getting your job done but, in the process, we have observed reduced productivity and would like to inform you of the company’s expectations while using devices and its monitoring policy.
“Any devices (phone, computer, laptop, iPads, tablets), software and tools provided by the company for conducting work should be used for work related purposes only. These devices are being monitored and recorded and could be accessed at any time to improve productivity, training and conduct disciplinary action. Using work devices for nonwork related could lead to several internal and external implications which may put the brand’s reputation and risk. Any immoral, unethical, or non-business related misconduct could lead to disciplinary action up to and including termination of employment”.
I believe the employee privacy section I created includes the why, what and how the company intends to monitor employees digital work activities and consequences for failing to comply.
#4. Keona
Large companies have created Code of Conducts, Policy Manuals and/ or Employee Handbooks in order set guidelines and expectations for every aspect of the business (Reynolds, 2015). Dress codes, attendance, role expectations, company privacy, and even emails or work cell phone usage will all be included in those documents. Entrata is a property management software company. The software is used to assist property owners, property managers and residents to renewal offers, residential transaction and many other areas of residential management. They assist in marketing, management, leasing, and residents (Inc).
Entrata has about 15 different sections in their employee handbook. There is a section labeled Workplace Etiquette and a subsection labeled Use of Communication Systems. In this section Entrata example that all electronic communication including but not limited to e-mails, telephones, cellphone etc. should be used for company use only. Voicemails and emails are maintained by company and it their property. It is also noted that company paid computers can only be used for company related business. It is also noted that all messages are monitored. Even if a message is deleted, it can be recovered using a backup system (Inc). Unlike some other companies, Entrata has a password override system and has been it clear in the employee handbook that personal passwords used within in the company is also company property.
Even though Entrata makes it clear what data they own. I believe they should actually have company issued equipment for all areas of business for better monitoring. The verbiage would be some similar to: Depending on the role and needs, company issues equipment (cellphone, computers, laptops, etc.) will issued and monitored regularly.
18 pages
Research
The fact that we live in the age of information, has revolutionized how we view data and information. the increased use of ...
Research
The fact that we live in the age of information, has revolutionized how we view data and information. the increased use of technology has simplified ...
Homeland Security Risks / Intellegence Community
5 page paper-APA formatHomeland Security Use the US-CERT and other similar resources to discuss the vulnerabilities and ex ...
Homeland Security Risks / Intellegence Community
5 page paper-APA formatHomeland Security Use the US-CERT and other similar resources to discuss the vulnerabilities and exploits that might have been used by the attackers. Explore the resources for risk mitigation and provide the risk, response, and risk mitigation steps that should be taken if an entity suffers the same type of attack. US critical infrastructure-power—water, oil and natural gas, military systems, financial systems—have become the target of cyber and physical attacks as more critical infrastructure systems are integrated with the Internet and other digital controls systems. The lesson learned in defending and mitigating cyberattacks is that no entity can prevent or resolve cyberattacks on its own. Collaboration and information sharing is key for success and survival.This is a group exercise, representing collaboration across all sectors, to support and defend US critical infrastructure. In the working world, a team like this would include some agencies, some industrial partners, and some private sector corporations. Each organization has different strengths and skills, different access to information, and different authorities to report to. When the sectors work together and leverage resources and skills, the result is that everyone benefits from the defense and protection of US IT infrastructure. In your teams, you can model the same collaboration, leveraging each other's expertise, sharing each other's knowledge, teaching each other, and providing contributions specific to your role in the scenario.Provide an overview of the life cycle of a cyber threat. Explain the different threat vectors that cyber actors use, and provide a possible list of nation-state actors that have targeted the US financial services industry before. Review this threat response and recovery resource and use what you learned from the resource to provide or propose an analytical method in which you are able to detect the threat, identify the threat, and perform threat response and recovery. Identify the stage of the cyber threat life cycle where you would observe different threat behaviors. Include ways to defend against the threat, and protect against the threat. Intelligence Community Provide intelligence on the nation-state actor, their cyber tools, techniques, and procedures. Leverage available threat reporting such as from FireEye, Mandiant, and other companies and government entities that provide intelligence reports. Also include the social engineering methods used by the nation-state actor and their reasons for attacking US critical infrastructure.
SUNYOW Keeping the Student Information Secure Every Time Response Discussion
Assignment:In your responses to your peers..Explain whether you agree or disagree with the decision that your peer has mad ...
SUNYOW Keeping the Student Information Secure Every Time Response Discussion
Assignment:In your responses to your peers..Explain whether you agree or disagree with the decision that your peer has made, and provide a rationalePEER # 1For the discussion this week I chose to follow scenario two. I feel it is beyond important to keep the student information secure at all costs. My supervisor just basically blowing it off because of a lack of funding and also using the staffing changes as another excuse is just, well inexcusable. I would try to explain again to my supervisor the importance of keeping the student information secure. If this did not work I would then bring this to the attention of someone higher in the organization. If the student information were to get out, it could potentially lead to identity theft for students which in turn could lead to the institution losing not only students but also it could lead to massive financial loss from multiple sources, not just students but also alumni donors. PEER # 2 Hello everyone, my name is Camilo, Cam for short, and I have selected scenario 2 for this week's discussion. In this scenario, there are several legal and ethical issues to consider. The main concern is that student information is not being properly protected which can bring legal issues to the institution. Another concern is that management was already aware of the vulnerability and is okay with allowing it to continue which is just unethical. If I were in this situation I would express what legal issues could arise from allowing this vulnerability to continue and if I did not get the reaction I was satisfied with I would go to upper management. It does not make sense to say something is "not in the budget" that can actually cause the institution to close their doors if they cannot afford the financial loss from a lawsuit.
Similar Content
Computer Security Incident Response Team Discussion
How would you build a CSIRT? What are the components to building an effective team?
...
Final System Report
This assignment gives you the opportunity to explain and justify a system proposal to gain approval to proceed with the pr...
JNTU Computer Science Discussion
Hello,Please answer the following questions and add references at the end of the document Ethical HackingTask: Discussionw...
Resort Security Design
It asks you to design a user interface for resort security. You can assume one main screen with four pop-up or dialog-box ...
NEC Cloud Computing Discussion
Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental ...
ITS 834 University of the Cumberlands Penetration Testing and Cyberattacks Paper
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilitie...
Computer Network Task
An Intrusion Prevention System (IPS) is a network security device which is automated and is used to respond to and monitor...
Module 5 Discussion Forum Its 442
As a security strategy, the structure through which a company aims to fulfill its data security requirements is formalized...
Discuss The Difficulties Of Performing Backups In Organizations That Have A 24
Backup and recovery strategies might be tried intermittently, however your surroundings is continually evolving. New busin...
Related Tags
Book Guides
Calypso
by David Sedaris
Murder on the Orient Express
by Agatha Christie
The Restless Wave
by John McCain
Siddhartha
by Hermann Hesse
The 5 Love Languages
by Gary Chapman
Things That Matter
by Charles Krauthammer
To the Lighthouse
by Virginia Woolf
The Secret Life of Bees
by Sue Monk Kidd
Principles - Life and Work
by Ray Dalio
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Resolving Performance Problems with the Network
Assignment: Resolving Performance Problems with the NetworkXYZ Inc. has a small office with 80 users in California. The of ...
Resolving Performance Problems with the Network
Assignment: Resolving Performance Problems with the NetworkXYZ Inc. has a small office with 80 users in California. The office employs a file and print server that caters to user requests.Recently users have complained that it takes a lot of time to retrieve files from the server. In addition users have also complained that at times it takes a while to service print requests.A network administrator of XYZ Inc. says that this is occurring because the network is not functioning at performance levels. What do you think are some possibilities for the cause of the problem? If making assumptions, please state what those assumptions are. What do you think would be possible solutions? Include a drawing of the topology that should be used and what types of networks you propose would work here and the accompanying justification. submit a report to the Dropbox as a 3- to 5-page MS Word document named ITS1101_W4_A2_LastName_FirstInitial.docx. Your report will describe the possible causes of the problem and the possible solutions. Make sure to cite your work using APA.
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s anal ...
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s analysis of maintaining the accuracy of customers’ personal information and indicate aspects of their post that effectively address the issues of maintaining personal information accurately. Suggest additional issues not considered in their initial post. Support your suggestions and recommendations with evidence from your sources.
#1. Zackary
Data governance is a term that is used to describe the policies that a business or entity implements in order to maintain and ensure accuracy of collected data. “Data governance means that enterprises have a high quality of data management through all phases of the data lifecycle” (Watts, 2020). There are many reasons why maintaining the accuracy of customers’ personal information is important to both our business and the customer’s privacy. One of these reasons is that many companies use client demographic (and other) information to inform large business decisions with data analytics. “Advanced Analytics is required for complex tasks such as prediction, customer centricity, personalization and cross-channel attribution” (Odoscope).
As far as privacy concerns go, having incorrect customer data can lead to major consequences. One instance of this was when the U.S. government accidentally detained a mother and daughter because their records had mistakenly labeled them as “armed and dangerous” (EPIC). The mother was able to sue the government because of their lack of compliance with the Privacy Act (EPIC).
A more business-related consequence would be that inaccurate client information can lead to failed audits, legal repercussions, and data leaks. If the company has the incorrect address on file for a client, and they send out some personal information, that information is now in the hands of an unknown party. Another example would be if a client were to claim that an employee was acting unethically or illegally, but there are no accurate records of the company’s transactions with that client, there could be a lengthy legal battle. Also when a company is audited, having proof of accurate information can prevent suspicion of altered files. “An audit trail can be very useful as evidence to show that the records have been properly managed, thereby helping prove that no unauthorized alteration of the record or its associated metadata has occurred during the record’s life” (Griffy-Brown, 2005).
#2. Colmcilla
Explain the importance of maintaining the accuracy of customers’ personal information.
From the perspective of the company, the customer database is how we reach out to the people who give us money. Maintaining the accuracy of that database only makes sense so that we can contact those people to keep giving us money. Once a customer moves address or telephone number, and we lose the opportunity to influence them through direct marketing, we lose our opportunity to influence the customer towards us.
Explain how maintaining accurate personal information affects the privacy of a company’s customers.
Failing to maintain accurate personal information affects the privacy of a company’s customers because inaccuracies can lead to crossing entities and inadvertently releasing data to an incorrect source. As explained by Gupta and Schneider (2018), the opportunity for data associated with one entity to be sent to another entity with similar characteristics is high, and becomes higher as an organization accumulates more data.
Explain the ramifications on a customer’s privacy when an organization poorly maintains customer information.
Confidential customer data can be incorrectly released to the wrong person. For example, in a pharmacy database, if there are several “John Smith” entities, and one uses a blood pressure medicine, the pharmacy may send targeted coupons from the manufacturer of the drug. But, if the pharmacy fails to maintain accurate information on all of their John Smith entities, the wrong John Smith may receive the coupon, and now knows that some other John Smith is on blood pressure medicine. This is a violation of the customer’s HIPAA privacy rights.
For #3 and #4 here are the requirements:
Evaluate your peer’s Employee Privacy section language. Suggest at least one additional element for their language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.
Your responses should be a minimum of 200 words.
#3. Oyindamola
Many organizations have developed policies on the use of IT in the workplace in order to protect against employee abuses that reduce worker productivity or that exposes the employee to harassment lawsuits based on studies conducted that 60 to 80 percent of employees’ time online has nothing to do with work (Reynolds, 2015). For the purpose of this assignment, I researched the company Entrata Employee handbook under the section “Workplace Security & Monitoring” (p. 23-24) that addresses digital work activities and communication. The Entrata handbook states below:
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training.
Computers furnished to employees are the property of the company; therefore, computer usage and files may be monitored or accessed.
The monitoring of phones and conversations is well stated and with reasons why it is been done while the monitoring or accessing of computers is just mentioned without stating why it may be accessed or monitored for. As an employee, I would like to know what is been monitored, why and the consequences when violations occur.
Employee Privacy Section (in my own words)
We value our employees and the time and effort put into getting your job done but, in the process, we have observed reduced productivity and would like to inform you of the company’s expectations while using devices and its monitoring policy.
“Any devices (phone, computer, laptop, iPads, tablets), software and tools provided by the company for conducting work should be used for work related purposes only. These devices are being monitored and recorded and could be accessed at any time to improve productivity, training and conduct disciplinary action. Using work devices for nonwork related could lead to several internal and external implications which may put the brand’s reputation and risk. Any immoral, unethical, or non-business related misconduct could lead to disciplinary action up to and including termination of employment”.
I believe the employee privacy section I created includes the why, what and how the company intends to monitor employees digital work activities and consequences for failing to comply.
#4. Keona
Large companies have created Code of Conducts, Policy Manuals and/ or Employee Handbooks in order set guidelines and expectations for every aspect of the business (Reynolds, 2015). Dress codes, attendance, role expectations, company privacy, and even emails or work cell phone usage will all be included in those documents. Entrata is a property management software company. The software is used to assist property owners, property managers and residents to renewal offers, residential transaction and many other areas of residential management. They assist in marketing, management, leasing, and residents (Inc).
Entrata has about 15 different sections in their employee handbook. There is a section labeled Workplace Etiquette and a subsection labeled Use of Communication Systems. In this section Entrata example that all electronic communication including but not limited to e-mails, telephones, cellphone etc. should be used for company use only. Voicemails and emails are maintained by company and it their property. It is also noted that company paid computers can only be used for company related business. It is also noted that all messages are monitored. Even if a message is deleted, it can be recovered using a backup system (Inc). Unlike some other companies, Entrata has a password override system and has been it clear in the employee handbook that personal passwords used within in the company is also company property.
Even though Entrata makes it clear what data they own. I believe they should actually have company issued equipment for all areas of business for better monitoring. The verbiage would be some similar to: Depending on the role and needs, company issues equipment (cellphone, computers, laptops, etc.) will issued and monitored regularly.
18 pages
Research
The fact that we live in the age of information, has revolutionized how we view data and information. the increased use of ...
Research
The fact that we live in the age of information, has revolutionized how we view data and information. the increased use of technology has simplified ...
Homeland Security Risks / Intellegence Community
5 page paper-APA formatHomeland Security Use the US-CERT and other similar resources to discuss the vulnerabilities and ex ...
Homeland Security Risks / Intellegence Community
5 page paper-APA formatHomeland Security Use the US-CERT and other similar resources to discuss the vulnerabilities and exploits that might have been used by the attackers. Explore the resources for risk mitigation and provide the risk, response, and risk mitigation steps that should be taken if an entity suffers the same type of attack. US critical infrastructure-power—water, oil and natural gas, military systems, financial systems—have become the target of cyber and physical attacks as more critical infrastructure systems are integrated with the Internet and other digital controls systems. The lesson learned in defending and mitigating cyberattacks is that no entity can prevent or resolve cyberattacks on its own. Collaboration and information sharing is key for success and survival.This is a group exercise, representing collaboration across all sectors, to support and defend US critical infrastructure. In the working world, a team like this would include some agencies, some industrial partners, and some private sector corporations. Each organization has different strengths and skills, different access to information, and different authorities to report to. When the sectors work together and leverage resources and skills, the result is that everyone benefits from the defense and protection of US IT infrastructure. In your teams, you can model the same collaboration, leveraging each other's expertise, sharing each other's knowledge, teaching each other, and providing contributions specific to your role in the scenario.Provide an overview of the life cycle of a cyber threat. Explain the different threat vectors that cyber actors use, and provide a possible list of nation-state actors that have targeted the US financial services industry before. Review this threat response and recovery resource and use what you learned from the resource to provide or propose an analytical method in which you are able to detect the threat, identify the threat, and perform threat response and recovery. Identify the stage of the cyber threat life cycle where you would observe different threat behaviors. Include ways to defend against the threat, and protect against the threat. Intelligence Community Provide intelligence on the nation-state actor, their cyber tools, techniques, and procedures. Leverage available threat reporting such as from FireEye, Mandiant, and other companies and government entities that provide intelligence reports. Also include the social engineering methods used by the nation-state actor and their reasons for attacking US critical infrastructure.
SUNYOW Keeping the Student Information Secure Every Time Response Discussion
Assignment:In your responses to your peers..Explain whether you agree or disagree with the decision that your peer has mad ...
SUNYOW Keeping the Student Information Secure Every Time Response Discussion
Assignment:In your responses to your peers..Explain whether you agree or disagree with the decision that your peer has made, and provide a rationalePEER # 1For the discussion this week I chose to follow scenario two. I feel it is beyond important to keep the student information secure at all costs. My supervisor just basically blowing it off because of a lack of funding and also using the staffing changes as another excuse is just, well inexcusable. I would try to explain again to my supervisor the importance of keeping the student information secure. If this did not work I would then bring this to the attention of someone higher in the organization. If the student information were to get out, it could potentially lead to identity theft for students which in turn could lead to the institution losing not only students but also it could lead to massive financial loss from multiple sources, not just students but also alumni donors. PEER # 2 Hello everyone, my name is Camilo, Cam for short, and I have selected scenario 2 for this week's discussion. In this scenario, there are several legal and ethical issues to consider. The main concern is that student information is not being properly protected which can bring legal issues to the institution. Another concern is that management was already aware of the vulnerability and is okay with allowing it to continue which is just unethical. If I were in this situation I would express what legal issues could arise from allowing this vulnerability to continue and if I did not get the reaction I was satisfied with I would go to upper management. It does not make sense to say something is "not in the budget" that can actually cause the institution to close their doors if they cannot afford the financial loss from a lawsuit.
Earn money selling
your Study Documents