How might foreign powers and/or terrorists use stolen data

Assignment Help Management Information Sys
Reference no: EM131848598

What Would You Do?

Use the five-step decision-making process discussed in Chapter 1 to analyzemeutreh measures vilowing situations and recommend a course of action.

1. You are the webmaster for a site that caters to young children. What as to ensure that your website does not violate the Children's Online Privacy protection tker- take

2. Your friend is going through a tough time with his current significant other and believes sil is cheating on him. He is aware of your technical prowess and has asked you to help him ie purchase and install a stalking app on her cell phone. What would you say?

3. You are a recent college graduate with only a year of experience with your employer. you were recently promoted to manager of email  services.

You are quite surprised to receive -a phone call at home on a Saturday from the Chief Financial Officer of the firm asking that you immediately delete all email from all email servers, including the archive and backup servers, that is older than six months. She states that the reason for her request Is that there have been an increasing number of complaints about the slowness of email services.

In addition, she says she is concerned about the cost of storing so much email. This does not sound right to you because you recently have taken several measures that have speeded up email services. An alarm goes off when you recall muted conversations in the lunchroom last week about an officer of the company passing along insider trader information to an executive at a hedge fund. What do you say to the Chief Financial Officer?

4. Your auto insurance company has offered you a 15 percent discount (roughly $200 per year) if you agree to let them install a sophisticated vehicle event data recorder (EDR) in your car. You have read over the terms of the agreement and discover that If you are involved in an accident, you must agree to let the data from the device be collected and analyzed by a third party accident investigation firm.

You must also agree to let findings from this analysis be used in a court of law. What questions would you want answered and what advice might you seek before deciding whether to accept this discount offer?

5. You are the general manager of a luxury car dealership. You are considering purchasing data from a data broker that collects data of high potential value to your dealership. In addition to providing a list of names, mailing addresses, and email addresses, the data i Include an approximate estimate of individuals' annual income based on the zip code in which they live, census data, and highest level of education achieved. Using the data provided by the broker, you could establish an estimated annual income for each person on the list to identify likely purchasers of your dealership's autos and then send smalls to those potential customers. List the advantages and disadvantages of such a marketing strategy. Would you recommend this means of promotion in this instance? Why or why not?

Case 1. Serious Data Breach at OPM

Critical Thinking Questions

1. Do you feel there should be some sort of redress for the 21 million people whose per¬sonal information was stolen even if they cannot prove actual monetary damages?

2. How might foreign powers and/or terrorists use the stolen data to mount intelligence operations against the United States?

3. Go online to do research on the steps OPM has taken to improve its cybersecurity? Are you satisfied with these actions? If not, what additional changes would you suggest?

Case 2. Time to Update the Electronic Communications Privacy Act?

Critical Thinking Questions

1. Do you believe that it is time to consider changes to the ECPA to bring it more in line with the Bill of Rights, or do you believe that concerns about terrorism and crime Justify efforts to revise the Bill of Rights?

2. Congress proposed legislation in both 2013 and 2015 to revise the ECPA; however, the changes never made it through the legislative process. Do research and write a brief summary explaining why no action was taken.

3. Why do you think media organizations would support Microsoft in its suits against the United States over the provisions of the ECPA?

Reference no: EM131848598

Questions Cloud

Explain the role of models-views and controllers : Explain the role of Models, Views and Controllers in an MVC Application. You may use diagram(s) to aid your explanation.
What will the operating cash flow : What will the operating cash flow be if output falls to 15,500 units?
Scada security incident example : Review example of a SCADA Security Incident and discuss the impacts to the business or organization suffering the incident. Use the following format to report
Painted and the price of the paint per gallon : Write web app in PHP that asks the user to enter the square feet of wall space to be painted and the price of the paint per gallon in a HTML fo?rm.
How might foreign powers and/or terrorists use stolen data : How might foreign powers and/or terrorists use the stolen data to mount intelligence operations against the United States?
What is the new degree of operating leverage : If units sold rise from 6,600 to 7,100, what will be the new operating cash flow? What is the new degree of operating leverage?
Open command prompt and type in ipconfig : 1. Open command prompt and type in ipconfig /displaydns a. Note- it is possible that your DNS record has a lot of entries- use Crtl-C to break the command
Write report on topic - Management Yesterday and Today : HI 6005: Management and Organisations in a Global Environment Research Paper Assignment. The final report on your topic- Management Yesterday and Today
Describe views on disease etiology : HE400 Multicultural Health - Provide three examples of three different cultures and describe their views on disease etiology - Describe the farmworkers

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd