Fundamentals of Information Systems
9th Edition
ISBN: 9781337097536
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 10, Problem 4DQ
Program Plan Intro
Mention if the banks sharing our information with others financial institutes who advise us with different services should be prohibited or is it useful in some situations.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Computer Science
You have been asked to help one of the data analysts who is working in your team. The data analyst has all the right data in place and upon exploring the data, you find out that there are lots of missing values.
What are some of the ways you would use to address this problem?
Please explain the merits and demerits of each approach?
Do you think that the strategies you are using to tackle this issue are related to the ways you will use to feed your data to a specific algorithm to build a statistical/machine learning/deep learning model? Why or Why not?
Namira is a young researcher, who’s recently conducting a study on the impact of the pandemic on mental health. For this study, Namira will need a huge amount of data that needs to be processed and she also does not want the information to be influenced by personal bias. Namira’s co-researcher suggested that she should collect information through an information collection method that will collect information on this specific topic from interested people to make her work easier. Namira took her co-researcher’s advice and successfully collected and stored the information in her device to start her research work. As the research was regarding people’s mental health, the collected information was sensitive and highly confidential. One day, Namira received an email from her co-researcher with an email attachment. Upon asking her co-researcher, Namira got to know that her co-researcher never sent any sort of email, it could be a malware-infected email attachment from someone disguised as a…
What are the many risks that you must take into account when developing a strategy for protecting your MIS's data?
Chapter 10 Solutions
Fundamentals of Information Systems
Ch. 10 - Prob. 1LOCh. 10 - Prob. 2LOCh. 10 - Prob. 3LOCh. 10 - Prob. 4LOCh. 10 - Prob. 5LOCh. 10 - Prob. 6LOCh. 10 - Prob. 7LOCh. 10 - Prob. 8LOCh. 10 - What is the harm in nonproductive use of...Ch. 10 - Prob. 1.2RQ
Ch. 10 - Prob. 1.1CTQCh. 10 - Prob. 1.2CTQCh. 10 - Prob. 2.1RQCh. 10 - Prob. 2.2RQCh. 10 - Prob. 2.1CTQCh. 10 - Prob. 2.2CTQCh. 10 - Prob. 3.1RQCh. 10 - Prob. 3.2RQCh. 10 - Prob. 3.1CTQCh. 10 - Prob. 3.2CTQCh. 10 - Prob. 4.1RQCh. 10 - Prob. 4.2RQCh. 10 - Prob. 4.1CTQCh. 10 - Prob. 4.2CTQCh. 10 - Prob. 1SATCh. 10 - Prob. 2SATCh. 10 - Prob. 3SATCh. 10 - Prob. 4SATCh. 10 - Prob. 5SATCh. 10 - Prob. 6SATCh. 10 - Prob. 7SATCh. 10 - Prob. 8SATCh. 10 - Prob. 9SATCh. 10 - Prob. 10SATCh. 10 - Prob. 11SATCh. 10 - Prob. 12SATCh. 10 - Prob. 13SATCh. 10 - Prob. 14SATCh. 10 - Prob. 15SATCh. 10 - Prob. 16SATCh. 10 - Prob. 1RQCh. 10 - Prob. 2RQCh. 10 - Prob. 3RQCh. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Prob. 7RQCh. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQCh. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 4DQCh. 10 - Prob. 5DQCh. 10 - Prob. 6DQCh. 10 - Prob. 7DQCh. 10 - Prob. 8DQCh. 10 - Prob. 9DQCh. 10 - Prob. 10DQCh. 10 - Prob. 1PSECh. 10 - Prob. 2PSECh. 10 - Prob. 1WECh. 10 - Prob. 2WECh. 10 - Prob. 3WECh. 10 - Prob. 1CECh. 10 - Prob. 2CECh. 10 - Prob. 3CECh. 10 - Prob. 1.1CSCh. 10 - Prob. 1.2CSCh. 10 - Prob. 1.3CSCh. 10 - Prob. 2.1CSCh. 10 - Prob. 2.2CSCh. 10 - Prob. 2.3CS
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Question 1 Janet, after years of working as a hairdresser and as a makeup artist, decided to go into business for herself. Over time the business has grown into a spa and beauty retreat and she now employs a few staff. With her growing operation, she has identified the need to implement a computerized accounting information system. In order to have a system that meets her needs exactly and also to save cost, she has asked you to create a simple, customized solution for her business. Her immediate need is for a customer sales information system, so that is what you will now create. With customer service being so important to Janet, her customers tend to become regulars and she wants to maintain a record of each customer’s contact information and preferences so that the spa will know what is important to the customer without having to be told each visit. The customer information that Janet considers important to maintain is the full name, cellphone number, favorite treatment, and special…arrow_forwardWhat is the implication to you of learning the confidentiality of data information? How will you apply it now?arrow_forwardWhat specific dangers do you encounter in trying to keep your data safe? Next, we'll have a look at several potential solutions to this problem.arrow_forward
- It's important to understand what "dirty data" is, and where it might be found.arrow_forwardJanet, after years of working as a hairdresser and as a makeup artist, decided to go into business for herself. Over time the business has grown into a spa and beauty retreat and she now employs a few staff. With her growing operation she has identified the need to implement a computerized accounting information system. In order to have a system that meets her needs exactly and also to save cost, she has asked you to create a simple, customized solution for her business. Her immediate need is for a customer sales information system, so that is what you will now create.With customer service being so important to Janet, her customers tend to become regulars and she wants to maintain a record of each customer’s contact information and preferences so that the spa will know what is important to the customer without having to be told each visit. The customer information that Janet considers important to maintain is the full name, cellphone number, favourite treatment, and special…arrow_forwardWhat types of published data does porter recommend should be collected?arrow_forward
- What level of confidence do you have in the safety of your data?arrow_forwardTake some time to research a particularly useful data analysis software in criminal justice field. Will you use Excel entirely? Will you work with database software on a regular basis (such as SQL or Microsoft Access)? Will you need to perform data analysis (in Excel, SPSS, Python, or R)? What types of problems will you need to solve on a daily basis? How might the ability to visualize data be used effectively in your role? Please write a reflection guided by these questions.arrow_forwardPlease I want a short answer, thanks.arrow_forward
- Big data has become a buzzword in the accounting profession, but like other trending topics such as blockchain, AI and machine learning, it’s one that CPAs really need to understand. Agree or Disagree? How has big data affected the accounting profession? What are the professionals doing about this impact?arrow_forwardThink about the information stored at the Social Security Administration, the Department of Revenue, the Department of Motor Vehicles, and Equifax. Learn more about these groups and their services by visiting their respective websites. What information is stored in various databases? Can you print out your information from each database? Can mistakes in records be corrected? What worries do you have concerning the security of these databases?arrow_forwardCorporate data confidentiality: why? What abuses might occur without confidentiality controls? Confidentiality measures might minimize or eliminate what crimes?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L