menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

Think of four threats to the information system of a hospital emergency room. Evaluate their likelihood for the three factors in the case (motive, means, and opportunity) as low, medium, or high. For each threat, unless it scored low on all three, suggest a way to reduce at least one factor that you rated as medium or high.

BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168

Solutions

Chapter
Section
BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168
Chapter 12.8, Problem 2DQ
Textbook Problem
1 views

Think of four threats to the information system of a hospital emergency room. Evaluate their likelihood for the three factors in the case (motive, means, and opportunity) as low, medium, or high. For each threat, unless it scored low on all three, suggest a way to reduce at least one factor that you rated as medium or high.

Explanation of Solution

Threats to the information system of a Hospital Emergency room:

 MeansMotivesOpportunityEffectiveness
Cyber attackAttacking hospital network for gaining unauthorized access. To gain access to hospital network for illegal activities.It can be considered as a threat and not an opportunity in case of a hospital network.It is low and it occurs very rarely.
Hacking the dataHacking of patient’s sensitive information regarding illness.Hacking the sensitive information of patients such as illness details, SSN and date of birth...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 12 Solutions

Principles of Information Systems (MindTap Course List)
Show all chapter solutions
add
Ch. 12 - Which of the following people ultimately benefit...Ch. 12 - The ______ is a key member and the leader of the...Ch. 12 - The term ______ refers to the translation of...Ch. 12 - Traditional systems development encourages end...Ch. 12 - The systems investigation phase follows...Ch. 12 - During systems investigation, the feasibility of...Ch. 12 - _______ is a technique used during the systems...Ch. 12 - The individual who plans and leads a JAD session...Ch. 12 - Feasibility analysis is typically done during...Ch. 12 - Data modeling is most often accomplished through...Ch. 12 - Good user interface design integrates concepts and...Ch. 12 - The _______ objective for an information system...Ch. 12 - Any potential change in system requirements that...Ch. 12 - Distinguish between project stakeholders and...Ch. 12 - What is the purpose of a project steering team?...Ch. 12 - What is the purpose of IS planning? What are the...Ch. 12 - Identify three typical reasons to initiate a...Ch. 12 - Identify three advantages and three disadvantages...Ch. 12 - Describe what is involved in feasibility analysis.Ch. 12 - What is the purpose of systems analysis? Identify...Ch. 12 - Define the different types of feasibility that the...Ch. 12 - What is the result or outcome of systems analysis?...Ch. 12 - What is a data-flow diagram? How is it used in the...Ch. 12 - Identify and briefly describe five system...Ch. 12 - What is the make-versus-buy decision? Briefly...Ch. 12 - What is the Pareto principle and how does it apply...Ch. 12 - What is the role of the compliance department?Ch. 12 - Explain the purpose of a hot site. What is the...Ch. 12 - What is a performance evaluation test? How is it...Ch. 12 - What personality characteristics should an...Ch. 12 - You have been appointed to a special team to...Ch. 12 - Why is it important for business managers to have...Ch. 12 - Your company wants to develop or acquire a new...Ch. 12 - Discuss three reasons why aligning overall...Ch. 12 - You are the chief information officer for a...Ch. 12 - How can NTUs use of formal IS governance help it...Ch. 12 - What lessons can other higher education...Ch. 12 - What procedures did NTU take to implement IS...Ch. 12 - Suppose NTU, instead of arising from a recent...Ch. 12 - Why did Honeywell turn to Kovair for help? What...Ch. 12 - The ALM software is intended to help companies...Ch. 12 - Honeywell reported that it increased team...Ch. 12 - This case is based in part on information from...Ch. 12 - Why is the quality of the systems analysis report...Ch. 12 - Why are all forms of feasibility considerations...Ch. 12 - Why is the quality of the systems analysis report...Ch. 12 - Why do you think Jon felt the need to travel to...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What is stream processing, and why is it sometimes necessary?

Database Systems: Design, Implementation, & Management

What is a honeypot? How is it different from a honeynet?

Principles of Information Security (MindTap Course List)

What is an entity?

A Guide to SQL

Define an attribute, and provide three examples.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

Describe the BI framework. Illustrate the evolution of BI.

Database Systems: Design, Implementation, & Management

Present Example 6.3 in Chapter 6 using the format discussed in Section 4.2. Divide the example problem into Giv...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

In the formula 40D=T,what do T and D represent?

Precision Machining Technology (MindTap Course List)

Determine the resultant of the line loads acting on the beam.

International Edition---engineering Mechanics: Statics, 4th Edition

Repeat Problem 2-1 without the possibility of rain accumulation on the roof.

Steel Design (Activate Learning with these NEW titles from Engineering!)

What is the life span of an optical disc? (387)

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

Wattage can be described as___________.

Welding: Principles and Applications (MindTap Course List)