Solutions for Experiencing MIS, 5th Canadian Edition by David M. Kroenke (All Chapters included)
4 views 0 purchase
Course
Experiencing MIS 5ce by Kroenke
Institution
Acadia University (
)
Complete Solutions Manual for Experiencing MIS, 5th Canadian Edition by David M. Kroenke, Andrew Gemino, Peter Tingling ; ISBN13: 9780136963004...(Full Chapters included and organized in reverse order from Chapter 12 to 1)...1.The Importance of MIS
2.Business Processes and Decision Making
3.Pr...
Experiencing MIS, 5th Canadian
Edition by David M. Kroenke
Complete Chapter Solutions Manual
are included (Ch 1 to 12)
** Immediate Download
** Swift Response
** All Chapters included
,Table of Contents are given below
1.The Importance of MIS
2.Business Processes and Decision Making
3.Productivity, Innovation, and Strategy
4.Hardware and Software
5.Database and Content Management
6.The Cloud
7.Organizations and Information Systems
8.Decision Making and Business Intelligence
9.Social Networking, Ecommerce, and the Web
10.Acquiring Information Systems through Projects
11.Structure, Governance, and Ethics
12.Managing Information Security and Privacy
,Solutions Manual organized in reverse order, with the last chapter displayed first, to ensure that all
chapters are included in this document. (Complete Chapters included Ch12-1)
CHAPTER 12
MANAGING INFORMATION SECURITY AND PRIVACY
CHAPTER OVERVIEW
We saved the security management chapter until the very end of the book. Not because it
is unimportant, but rather because students must have a good idea of organizations and
the technology available in organizations to understand the threat. We decided to start
this chapter with a brief mention of personal privacy and identity theft. The reason we did
that was to try to engage the student in understanding why security is important. In the
section below, we describe a discussion exercise that you might use to start the security
discussion. We believe it is important for students to internalize the threat before they are
able to consider how to better manage the threat.
The focus of the chapter is on corporate security relating to information technology. The
students learn about the various threats and how companies try to decrease or eliminate
risks and threats. We think it is important for the students to understand that system users
are an important part of the security of the systems. We like to draw attention to the
section on “Developing a Safe Password” to show them that the systems are only as
secure as the people who use the systems. This shows that every employee is responsible
for security (not just the IT services people)
There are three cases that can be used to illustrate the threats to systems. The MIS in Use
12 case describes how a professor responds when a student asks for access to the
Instructor’s Resources for a textbook being used in class. Another case focuses on
privacy and the federal government and a final case considers phishing and the dangers
it represents. These cases provide lots of opportunity to discuss potential threats. Since
some students are not aware of these threats, it is important to mention these threats in
the lecture.
When talking about security, we like to use the analogy to the “Bear Story” which goes
as follows:
Two people are camping in the forest. They have their boots and clothing on, ready to
go for a hike when they both see, in the distance, a grizzly bear that captures their
scents and begins to quickly move their way. One of the campers immediately kicks
off his boots and jams his feet into his running shoes. The other camper looks at him
and says “Why are you putting on running shoes? You can’t outrun a grizzly!” The
first camper responds: “I don’t have to outrun the grizzly. I just have to outrun you.”
And off he goes…
What the story helps to illustrate is that security does not (and in practical terms cannot)
be perfect. What security measures have to do is to make it harder to impact your
organization than other organizations. You have to make it more difficult to hack into
129
, Instructor’s Manual for Kroenke/Gemino/Tingling, Experiencing MIS, Fifth Canadian Edition
your company than other companies. The chapter provides information about how this
can be accomplished. The important message in the lecture is that often the largest impact
on security is taking care of the simple things such as ensuring employees create
reasonable passwords and having employees knowledgeable enough so that they do not
give ID’s and passwords over the phone. Oh yeah, and lock the door on the way out.
Discussion Exercises for this Lecture
We like to use this exercise at the start of the security class. This exercise is listed as the
collaborative exercise for Chapter 12. We suggest that you use it in class to talk about
security. The general idea goes like this:
“You and your friend are going to a pancake breakfast at a restaurant. In the next
four minutes, come up with as many ideas as you can for getting away with eating
and not paying for the pancake breakfast.”
The most important idea is to get people brainstorming as many ideas as possible. At the
end of the 4 minutes, ask groups to list out their ideas. It should be relatively easy to get
to 10 or 12 ideas.
So what’s the point? After you have collected the ideas and praised your students for
their great work, remind the students that they spent only 4 minutes to create these ideas
and for something worth about $10.
Now get them to ask themselves, how many ideas could you generate if your task was to
find a way to someone’s personal identity. That is the real threat of security. Some very
bright people, perhaps people from halfway across the globe, are looking for a way to
access your information. How can you keep them out? And remember, they will be back
once they learn something new.
We find this exercise does well to wake students up to the pressure that can be applied to
organizations and the IS department charged with securing access and security.
STUDY QUESTIONS
Q12-1 What is identity theft?
Q12-2 What is PIPEDA?
Q12-3 What types of security threats do organizations face?
Q12-4 How can technical safeguards protect against security threats?
Q12-5 How can data safeguards protect against security threats?
Q12-6 How can human safeguards protect against security threats?
Q12-7 What is disaster preparedness?
Q12-8 How should organizations respond to security incidents?
130
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller mizhouubcca. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $29.49. You're not tied to anything after your purchase.