MIS 2321 University of the Incarnate Word Assignment

Anonymous
timer Asked: Feb 6th, 2019
account_balance_wallet $20

Question Description

1. After reading the information presented in this chapter and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage.

2. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this chapter and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware.

3. An Internet company in Northern California is receiving frequent requests from employees who want to telecommute. The company’s CTO wants to be flexible and accommodate as many employees as possible. At the same time, the CTO wants to achieve productivity goals and keep to a minimum any legal issues that may arise from this new work alternative. After reading the information presented in this chapter and other sources, create a one-page document that includes three guidelines that telecommuters need to follow and three guidelines that the company needs to follow to achieve both personal and organizational objectives. What are three examples of information technologies that could help this company monitor these telecommuters?

Unformatted Attachment Preview

UNIVERSITY OF THE INCARNATE WORD H-E-B SCHOOL OF BUSINESS AND ADMINISTRATION MIS 2321- 01 FALL 2018 INTRODUCTION TO INFORMATION SYSTEMS TR 7:30 - 8:45 (GB -212) INSTRUCTOR : SV QUIZ (C-3) https://play.kahoot.it/#/k/b267f000-1c09-4e51-9b33-7d3a3583766c Green Computing & the ways Information Privacy & methods for it can improve the quality of improving the privacy of the environment information Information Systems Issues that effect organization CHAPTER 4 : PERSONAL, LEGAL, ETHICAL, & ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS Privacy of e-mail, data collections issues & censorship Principals of Intellectual Ethical issues related to Property & issues related to Information Technology the infringement of Intellectual Property Information Privacy & methods for improving the Privacy What is Privacy? https://www.youtube.com/watch?v=zsboDBMq6vo Data Exploitation https://www.youtube.com/watch?v=8CKJtfLV6HU Privacy issues of information • Employers search social networking sites for background information on applicants • Monitoring systems are adopted by employers to check employee performance • Healthcare organizations, financial institutions, legal firms, and online-ordering firms gather personal data and enter it in databases • Several federal laws regulate the collecting and using of information on people and corporations • Narrow in scope and contain loopholes Data Protection https://www.youtube.com/watch?v=VUae3XgIZVU Social Media Privacy awareness. https://www.youtube.com/watch?v=UhhYSrUHnao GDPR https://www.youtube.com/watch?v=j6wwBqfSk-o Privacy of e-mail, data collections issues & censorship ✴ Spam: Unsolicited e-mail sent for advertising purposes Privacy issues by email ✴ Sent in bulk using automated mailing software ✴ Ease of access ✴ Individuals ✴ Any e-mails sent on company-owned computers are the property of an organization https://www.youtube.com/watch?v=HfS_2oXVch0 Censorship Data Collections should assume that others have access to their messages ✴ Two commonly used technologies for data collection are log files and cookies. ✴ Sometimes users give incorrect information on purpose. ✴ If the information isn’t accurate, the result could be identity misrepresentation. ✴ Therefore, data collection on the Internet must be used and interpreted with caution Ethical issues related to Information Technology ✴ Ethics and ethical decision making involve the moral guidelines people or organizations follow in dealing with others. ✴ In essence, ethics means doing the right thing, and its meaning can vary in different cultures and even from person to person. ✴ Determining what’s legal or illegal is usually clear, but drawing a line between what’s ethical and unethical is more difficult The ethical problem with Facebook's emotional experiment https://www.youtube.com/watch?v=r1rOYKhcQlg CNET looks at the ethical issues of Facebook’s controversial experiment, which was published in an academic journal and funded by the government Principals of Intellectual Property & issues related to the infringement of Intellectual Property ✴ Cybercrime, cyberfraud, identity theft, and intellectual property theft are on the rise. ✴ Many experts believe management can ✴ reduce employees’ unethical behavior by developing and enforcing codes of ethics. ✴ Many associations promote ethically responsible use of information systems and ✴ technologies and have developed codes of ethics for their members. Intellectual property is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses. Cybersquatting is registering, selling, or using a domain name to profit from someone else’s trademark TV white space closes digital divide in Kenya https://www.youtube.com/watch?v=QYl5LFQG1RY With more than 4 billion people in the world lacking internet access, Mawingu hopes to provide a solution. The company uses TV white space, or the gaps in between TV channels, to deliver fast, affordable and reliable connectivity to rural areas in Kenya. Now villages, schools, farms, and local residents are able to use the power of the internet to pursue passions, advance their education, and better understand the world. Information Systems Issues that effect organization ✴Information technologies have a direct effect on the nature of jobs. ✴Telecommuting or virtual work, for example, as enabled some people to perform their jobs from home. ✴With telecommunications technology, a worker can send and receive data ✴to and from the main office, and organizations can use the best and most cost-effective ✴human resources in a large geographical region. ✴Information technology is also creating virtual organizations, which are networks of independent ✴companies, suppliers, customers, and manufacturers. ✴These networks are connected via information technology and can share skills and costs. ✴Ergonomics experts believe using better-designed furniture as well as flexible keyboards, ✴correct lighting, special monitors for workers with vision problems, and so ✴forth can resolve many health-related problems. Green Computing & the ways it can improve the quality of the environment What does Green Computing does? ✴ Promotes ✴ Involves a sustainable environment and consumes the least amount of energy the design, manufacture, use, and disposal of computers, servers, and computing devices with minimal impact on the environment ✴ Requires cooperation of both private and public sectors Ways to Achieve Green Computing? ✴ Designing ✴ Parts products that last longer and are modular in design can be upgraded without replacing the entire system ✴ Designing search engines and computing routines that are faster and consume less energy ✴ Replacing underutilized smaller servers with one large server using a virtualization technique ✴ Using computing devices that consume less energy and are biodegradable ✴ Allowing certain employees to work from their homes to reduce carbon footprints ✴ Conducting meetings over computer networks to reduce business travel ✴ Encouraging ✴ Turning carpool and non-motorized transportation for employees off idle PCs and recycling computer-related materials ...
Purchase answer to see full attachment

Tutor Answer

Robyn1994
School: UC Berkeley

Attached.

Running head: INFORMATION

1

Information
Name
Institution
Date

INFORMATION

2
Recommendations to Improve the Privacy of E-mail

To implement SSL (secure sockets layer) or Transport Layer Security (TLS), this
enhances security between the computer of the user and that of the receiver when sending
e-mails. TLS should be used in improving the encryption services of the e-mails on both
ends to avoid any person accessing and reading the emails.
The computers should be installed with antivirus software to make sure that the emails are protected from corrupted files. The software should be improved to make sure
that it can offer enough protection in case of external attack. In case external attacks are
launched, then the e-mails will be protected as well as other contents in the computer.
When one is receiving sensitive e-mails, then it is necessary to consider
encryptions such as OpenPGP. On can also consider breaking sensitive information into
two parts and it is then sent as two separate emails. It is a way of ensuring that the
information is not understood in case it gets to unscrupulous people (Zhao, Bennett,
Fourney, Thompson, Williams, Troy & Dumais, 2018).
It is essential to avoid opening an email...

flag Report DMCA
Review

Anonymous
Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors