Principles of Information Systems, Loose-Leaf Version
13th Edition
ISBN: 9781305971820
Author: Ralph Stair, George Reynolds
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 4DQ
Program Plan Intro
SWOT Matrix:
The internal assessment and external environment are been analyzed and frequently summarized into “Strengths, Weaknesses, Opportunities, Threats (SWOT)” matrix.
Usage of SWOT Matrix:
- The SWOT matrix denotes a simple way to illustrate the following points:
- What company is doing well?
- Where it could improve?
- What are available opportunities?
- What environmental factors are threats to organization?
- The internal assessment identifies most of strengths and weaknesses.
- The analysis of external environment uncovers most of threats and opportunities.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A recommended approach is that the people assigned to implement a risk management program should begin by studying the models presented earlier in this chapter and identifying what each offers to the envisioned process. Once the organization understands what each risk management model offers, it can adapt one that is a good fit for the specific needs at hand.
Which risk control strategy would you consider the most effective and why? When should the strategy be used and why should it not be used for all risks?
A. What conditions must be met to ensure that risk acceptance has been used properly?
B. Discuss the concept of an organisation’s competitive advantage against competitors and how it has evolved over the years with the ongoing development of the IT industry.
C. Explain why networking components need more examination from an information security perspective than from a systems development perspective. Why must this practice be periodically reviewed?
D. With the aid of a diagram, discuss the contingency planning hierarchy.
E. What is the DMZ? Discuss whether this is a good name for the function that this type of subnet performs.
After reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario.
Discussion Questions
Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?
How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?
Chapter 11 Solutions
Principles of Information Systems, Loose-Leaf Version
Ch. 11.1 - Prob. 1RQCh. 11.1 - Prob. 2RQCh. 11.1 - Prob. 1CTQCh. 11.1 - Prob. 2CTQCh. 11.2 - Prob. 1RQCh. 11.2 - Prob. 2RQCh. 11.2 - Prob. 1CTQCh. 11.2 - Prob. 2CTQCh. 11 - Prob. 1SATCh. 11 - Analysis of the internal assessment and external...
Ch. 11 - Prob. 3SATCh. 11 - Prob. 4SATCh. 11 - Prob. 5SATCh. 11 - Prob. 6SATCh. 11 - Prob. 7SATCh. 11 - Prob. 8SATCh. 11 - Prob. 9SATCh. 11 - Prob. 10SATCh. 11 - According to the Project Management Institute...Ch. 11 - Prob. 12SATCh. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - What is a core competency? Project scope? Project...Ch. 11 - Prob. 11RQCh. 11 - Identify and briefly describe the nine areas of...Ch. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 1DQCh. 11 - Prob. 2DQCh. 11 - Prob. 3DQCh. 11 - Prob. 4DQCh. 11 - Prob. 5DQCh. 11 - Prob. 6DQCh. 11 - Prob. 7DQCh. 11 - Prob. 8DQCh. 11 - Is there a difference between project time...Ch. 11 - Discuss the team dynamics for a highly effective...Ch. 11 - What sort of behaviors would indicate that the...Ch. 11 - Prob. 12DQCh. 11 - Prob. 13DQCh. 11 - How would you respond to a project team member who...Ch. 11 - Prob. 1PSECh. 11 - Prob. 3PSECh. 11 - Prob. 1TACh. 11 - Prob. 2TACh. 11 - Prob. 3TACh. 11 - Prob. 1WECh. 11 - Prob. 2WECh. 11 - Prob. 3WECh. 11 - Prob. 1CECh. 11 - Prob. 2CECh. 11 - Prob. 3CECh. 11 - Prob. 1CTQ1Ch. 11 - Prob. 2CTQ1Ch. 11 - Prob. 3CTQ1Ch. 11 - Prob. 1CTQ2Ch. 11 - Prob. 2CTQ2Ch. 11 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- Create a threat diagram that has at at least three items that are wrong with it. Identify all the items that are wrong with it, and explain what each symbol means.arrow_forwardWhich five risk-control strategies should be mentioned and quickly explained?arrow_forwardIs there a benefit to applying the Principle of Non-Repudiation in your organization? What are the drawbacks of this method? Without implementing the Principle of Non-Repudiation.arrow_forward
- How do you go about creating a threat model?arrow_forwardSuppose there is a big ABC organization which offers different products for their customers. When the said organization develops the different products for customers, then there is a possibility of different hazards, which may affect the process of development. What type of procedure and process should be follow by management department for risk management to avoid or mitigate the incoming risks, to produce better quality products at the end?arrow_forwardHandwritten and detailed explanation needed differentiate between: reactive vs proactive strategies ANswer must be handwrittenarrow_forward
- Risk reduction strategy(ies) is (are): Select one: a. Damage limitation b. Risk avoidance, Risk detection and removal, and Damage limitation c. Risk detection and removal d. Risk avoidancearrow_forwardCan you distinguish between inherent and control risk?arrow_forwardSelect one HIM function (e.g., coding, release of information, chart completion, transcription, filing/chart retrieval, document imaging, etc.). For this function, identify and describe one risk associated with this function. Elaborate on how each risk management principle could be applied to your identified risk: Risk assessment Risk mitigation Risk transference Risk avoidance Risk acceptance Describe your chosen risk in a sentence or two. Then provide one substantial and descriptive paragraph for each principle.arrow_forward
- Have you experienced scope creep in your development of a Risk Management Plan (or other policy)? If so, how did you handle it? If not, what actions would you have taken to control scope creep? (Remember, if you have not personally experienced this situation, please research a company or individual who has dealt with scope creep and provide a brief overview of their situation. Be sure to copy/paste the link from which you retrieved the information)arrow_forwardWhich of the following are stages of risk-based analysis Select one: a. Risk identification, analysis and classification, decompisition and reduction assessment are not the complete stages b. Risk identification, analysis and classification, decompisition and reduction assessment c. Risk decompisition and reduction assessment d. Risk identification, analysis and classificationarrow_forwardExplain the importance of reviewing historical documentation, including past risk assessments, business impact analyses, security policies and procedures, and incident reports, as a foundation for risk mitigation planning. How can analyzing past vulnerabilities and threats inform the identification of similar risks in the present? Discuss the trade-off between focusing on specific risks and vulnerabilities for individual systems and functions (narrow focus) versus taking a broader organizational perspective (broad focus) when planning risk mitigation strategies. Highlight the benefits and limitations of each approach.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Information Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning