Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 11.5, Problem 11.4ARQ
Explanation of Solution
User rights:
- Computer hardware and
programs that are required to perform your job proficiently.- User has the right to access all the resources like computer hardware and programs required, to complete his/her tasks successfully.
- Reliable network and internet connections:
- Users have the right to use the reliable network connection which means there will be no problems while using it.
- A secure computing environment:
- Organization should take care about the security issues of the user’s computer and files. It should ask users to take the actions required to protect the files, if required.
- Protection from viruses, worms, and other threats:
- It’s the organization’s duty to take care about the safety of the user’s files and computer. Thus, it is user’s right to have their files and computer protected from the viruses, worms, and other threats.
- Contribution to requirements for new system, features and functions:
- Users have the right to participate in the meetings conducted to discuss about the new system requirements. If not directly then through a delegate.
- Reliable systems development and maintenance:
- Users have a right to have reliable systems development and maintenance. They can experience schedule slippage for a month or 2 but need not face it for 6 months or more. This shows the incompetent systems development.
- Prompt attention to problems, concerns, and complaints:
- Users have the right to receive immediate response towards the problems and concerns from the organization. If not directly, then the users should be provided with some means through which they can report the issues or at least get their complaints registered in IS department.
- Properly prioritized problem fixes and resolutions:
- Users can have their problems get resolved with established priorities.
- Effective training:
- Users have the right to get trained in the organization so that they can perform the particular task they want to do. Organization should train the users in a format and on a schedule that is suitable for the user.
User responsibilities:
- Learn basic computer skills:
- Users have the responsibility to have the basic computer skills. They cannot expect hand-holding for basic operations.
- Learn standard techniques and procedures for the applications and use:
- Users should learn the techniques and procedures required to use the applications...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
MCQ1002: Choose the correct option in terms of Issues related to professional responsibility.
a.
Confidentiality
b.
Intellectual property rights
c.
Both a & b
Question 1
Which of the following correctly describes the difference between privacy and security?
Privacy is about the individual's control over sensitive information pertaining to the individual; security is about the methods used to provide control over information.
Privacy is about controlling access to personal information; security is about controlling access to company information.
None of the listed choices are correct.
Privacy and security refer to the sets of controls used to protect information.
Question 2
Extended service agreements which run for 3 more years require that Sifers-Grayson provide software maintenance and patches for SCADA systems sold more than fifteen years ago. The engineering workstations used to provide this support take up 500 sq ft of space in the R&D lab and, due to their reliance on Windows XP, present security vulnerabilities which need to…
Give some thought to how the GRANT statement could alter the security of intellectual property and explain the implications you see. When and how may one expect to reap the advantages of the numerous privileges available? If they don't give up their licenses, what are the chances they won't be able to work?
Chapter 11 Solutions
Using MIS (10th Edition)
Ch. 11.2 - Prob. 1MDQCh. 11.2 - Prob. 2MDQCh. 11.2 - Prob. 3MDQCh. 11.2 - Prob. 4MDQCh. 11.2 - Prob. 5MDQCh. 11.3 - Prob. 1EGDQCh. 11.3 - Prob. 2EGDQCh. 11.3 - Prob. 3EGDQCh. 11.3 - Prob. 4EGDQCh. 11.5 - Prob. 1SGDQ
Ch. 11.5 - Prob. 2SGDQCh. 11.5 - Prob. 3SGDQCh. 11.5 - Prob. 4SGDQCh. 11.5 - Prob. 11.1ARQCh. 11.5 - How do organizations plan the use of IS? Explain...Ch. 11.5 - Prob. 11.3ARQCh. 11.5 - Prob. 11.4ARQCh. 11.5 - Prob. 11.5ARQCh. 11 - Prob. 11.1UYKCh. 11 - Prob. 11.2UYKCh. 11 - Prob. 11.3UYKCh. 11 - Prob. 11.8CE11Ch. 11 - Prob. 11.11CS11Ch. 11 - Prob. 11.12CS11Ch. 11 - Prob. 11.13CS11Ch. 11 - Prob. 11.14CS11Ch. 11 - Prob. 11.15CS11Ch. 11 - Prob. 11.16CS11Ch. 11 - Prob. 11.17CS11Ch. 11 - Prob. 11.18MML
Knowledge Booster
Similar questions
- Explain how the GRANT declaration's results affect intellectual property rights. How does one get the multiple privileges granted, and what are their benefits? Are they likely to lose their licenses in the future?arrow_forwardUsing specific instances, describe the monetary benefits that may accrue to certain people or businesses from having patent rights. In addition, you should discuss what may be done to safeguard these privileges.arrow_forwardExplain what the GRANT declaration accomplishes and how it impacts the protection of intellectual property rights. When it comes to privileges, what are the many sorts that may be obtained? What are the odds that they will lose their licences in the future?arrow_forward
- Describe the goals of the GRANT declaration and how they affect the preservation of intellectual property rights. What other kinds of privileges are available to be acquired? What are the chances that they will eventually lose their licenses?arrow_forwardExplain the purpose of the GRANT declaration and how it impacts protection. What are the many kinds of privileges that may be obtained? What are the possibilities that they will lose their licenses?arrow_forwardExplain how the GRANT statement may affect the protection of intellectual property and what it can achieve. What are the many forms of access one may be granted, and how may one earn them? How likely is it that they will lose their privilege to drive in the future?arrow_forward
- Discuss the GRANT statement's consequences on intellectual property rights. What rewards may one anticipate from obtaining the different rights, and how does one do so? Will they have to give up their licenses?arrow_forwardPlease describe the capabilities of the GRANT declaration and its impact on the protection of intellectual property rights. How can one acquire the plethora of accessible rights, and what are the advantages of doing so? In the next years, what are the chances that they will be required to surrender their licenses?arrow_forwardDescribe the potential impacts that the GRANT statement may have, paying particular attention to how these effects may have an impact on the protection of intellectual property rights. How does one go about gaining the different privileges that are available, and what kind of rewards might one anticipate receiving as a result of doing so? How likely is it that they will be asked to give up their licenses at some point in the future?arrow_forward
- If the company intended to develop its own plan based on an unlicensed but copyrighteddocument, and if detection and prosecution for having violated the copyright was unlikely, would itstill be unethical to take that approacharrow_forwardDescribe the possible effects of the GRANT statement and how they affect the protection of intellectual property rights. What benefits might one expect from earning the various privileges on offer, and how does one go about doing so? What are the possibilities that they will eventually be required to renounce their licenses?arrow_forwardQ(2) Hi there, Please answer all the five multiple choice questions. No written explanation needed for all the questions. Thank you in advance. [6] Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles? A User rights reviews B. Incident management C. Risk based controls D. Annual loss expectancy [7] A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site were facing the wrong direction to capture the incident. The analyst ensures the cameras are turned to face the proper direction. Which of the following types of controls is being used? A. Detective B. Deterrent C. Corrective D. Preventive [8] A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following? A. Availability B. Integrity C. Confidentiality D. Fire…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education