Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 5, Problem 5.4UYK

a)

Explanation of Solution

Acxiom’s privacy policy:

According to Acxiom, the privacy policies are to maintain and safeguard the data that are obtained about the customers. The company is concentrated towards the usage of data thus maintaining privacy of the customer information.

Reassured about the policy:

Yes, the policy of the Acxiom’s are reassured because they establish a standard global privacy policy principles listed below:

  • The choices of access are being monitored...

b)

Explanation of Solution

Ten different products that Acxiom provide:

The below are the different products that “Acxiom” provide and they are:

  • Marketing services.
  • Advertising solutions
  • Data solutions
  • Infrastructure Management services...

c)

Explanation of Solution

Acxiom’s customer:

The below mentioned are the customer of Acxiom subjected to particular industry:

  • Education
  • Banking
  • Insurance...

d)

Explanation of Solution

Type of Data that are to be collected to deliver the product to the customer:

Based on the data inferred from the question (b) and (c), type of data that are collected by the Acxiom are list...

e)

Explanation of Solution

Function of InfoBase:

The function of InfoBase is to store a large repository customer i...

f)

Explanation of Solution

Function of PersonicX:

The function of “PersonicX” is to perform a house-hold level segmentation operation along with the visualiz...

g)

Explanation of Solution

Limiting the marketing in order to avoid privacy outcry:

It is necessary to limit the marketing of the companies like Acxiom’s because the customer can be traumatized abo...

h)

Explanation of Solution

Necessity of law in governing the company:

There may be a chance of data that are collected being misused at the greater extend; in certain cases the data obtained needs to be taken care by an organization like Acxiom’...

i)

Explanation of Solution

Necessity of law that govern the type of data service that government agencies could buy from the companies:

The data obtained and gathered needs to be preserved and needed to be avoided ...

Blurred answer
Students have asked these similar questions
What is meant by the phrase "protection of personal information"? What are the best five strategies to keep your personal data safe?
1. After reading the information presented in this module and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage. 2. After reading the information presented in this module and other sources, write a one-page paper that describes GDPR. Describe how businesses may benefit from this compliance. Research three companies that have been sued by the European Union. Which privacy issues were violated by each company? 3. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this module and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware.…
Give an example of a security breach for each of the six dimensions of e-commerce security identified in Chapter 5. For instance, what would be a privacy incident? (Please use the book. See book details, you can find it free online - eBook ISBN 13: 978-1-292-34321-1, E-Commerce 2021 Business, Technology, & Society by Kenneth C. Laudon and Carol Guercio Traver, Sixteenth Edition, Global Edition).  Have you ever been the victim of a data breach or cybercrime?  If not, what steps do you take to protect yourself online?  If yes, what changes have you made to your online behavior to reduce the incident from happening again?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning