Concept explainers
Case summary:
Person X is hired to lead a technical support team for a start-up business. The services provided by the company area data analysis, targeted market, and business consulting to auto dealers. At present, the company serves seven cities and they are planned to expand into 10 cities. It has flexible working hours and they encourage employees to work from home at least one day per week.
There has not been much of the technical support team at the company. Hence, they would contact an informal network of experts for hardware and software issues. An informal network of experts includes family, co-workers, and friends.
To determine: Whether there are additional data risks with employees working from home.
Want to see the full answer?
Check out a sample textbook solutionChapter 14 Solutions
Business Essentials (11th Edition)
- What security risks would a company need to consider when utilizing smartphone apps for work?arrow_forwardWhat threats do you see to the security of personal information? After that, we'll talk about the steps taken to protect ourselves from such threats.arrow_forwardIn order to effectively manage risks associated with information systems, it is necessary to first identify and then assess potential threats.arrow_forward
- What standards should organizations apply to help ensure information security? How can we help as employees? What steps can we take to protect our personal information from being missused?arrow_forwardData needs to be secured in three states: at rest, in use, and in motion. Select one state of data and describe its security challenges. What are some of the best practices securing data in that state?arrow_forwardWhat difficulties may arise as a result of the company's using a wide range of distinct types of information systems?What are some possible solutions to these problems?arrow_forward
- What are some best practices for managing the volume of information that a business encounters while maintaining privacy for employees, customers, and protecting of company data?arrow_forwardHow current is the field of information security management?arrow_forwardIdentify several personal characteristics needed to be successful in an information system career. Do you feel that you possess any of these characteristics?arrow_forward
- Analyze the legal and ethical implications of data privacy and security, and discuss the responsibilities of businesses to protect the personal information of their customers and employees.arrow_forwardWhat difficulties does the business encounter as a result of its usage of so many distinct information systems? Is there anything that can be done to remedy the situation?arrow_forwardWhat are the advantages and disadvantages in your opinion, of mass sending unsolicited email to a large number of people? Give an example from a real-world situation to support your response.arrow_forward