Business Essentials (11th Edition)
11th Edition
ISBN: 9780134129969
Author: Ronald J. Ebert, Ricky W. Griffin
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 14, Problem 14.23EE
Summary Introduction
Given scenario:
The given situation explains the privacy policy of a company which monitors its employee’s internet and email usage behavior. A person working in a biotechnology company has been promoted to a first-line manager at a local store. The top-level official explains that the company monitors its employee’s internet usage behavior to avoid sharing of confidential information and trade secrets.
To determine: The actions to be taken when an employee is found spends more time on non-work related searches.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What standards should organizations apply to help ensure information security? How can we help as employees?
What steps can we take to protect our personal information from being missused?
What risks will arise from this?
How does management ensure that information is being accessed only by authorized and relevant employees?
You have a duty to learn about the most important problems that can happen with information systems and the ways that your company has found to be the most effective at minimising the effects of these kinds of problems.
Chapter 14 Solutions
Business Essentials (11th Edition)
Ch. 14 - Prob. 14.1QRCh. 14 - Prob. 14.2QRCh. 14 - Prob. 14.3QRCh. 14 - Prob. 14.4QRCh. 14 - Prob. 14.5QRCh. 14 - Prob. 14.6QACh. 14 - Prob. 14.7QACh. 14 - Prob. 14.8QACh. 14 - Prob. 14.9AECh. 14 - Prob. 14.10AE
Ch. 14 - Prob. 14.11ACh. 14 - Prob. 14.12ACh. 14 - Prob. 14.13ACh. 14 - Prob. 14.14ACh. 14 - Prob. 14.15ACh. 14 - Prob. 14.16TECh. 14 - Prob. 14.17TECh. 14 - Prob. 14.18TECh. 14 - Prob. 14.19TECh. 14 - Prob. 14.20TECh. 14 - Prob. 14.21EECh. 14 - Prob. 14.22EECh. 14 - Prob. 14.23EECh. 14 - Prob. 14.24CCh. 14 - Prob. 14.25CCh. 14 - Prob. 14.26CCh. 14 - Prob. 14.27CCh. 14 - Prob. 14.28CCh. 14 - Prob. 14.29CCh. 14 - Prob. 14.30CCh. 14 - Prob. 14.31CCh. 14 - Prob. 14.32CCh. 14 - Prob. 14.33C
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, management and related others by exploring similar questions and additional content below.Similar questions
- Do IT professionals face moral dilemmas while deciding whether or not to encrypt their work emails?arrow_forwardWhy is information security a management problem? What can management do that technology cannot?arrow_forwardWhat should a company do when it comes to notifying citizens/customers of a data breach?arrow_forward
- What are some best practices for managing the volume of information that a business encounters while maintaining privacy for employees, customers, and protecting of company data?arrow_forwardIdentify several personal characteristics needed to be successful in an information system career. Do you feel that you possess any of these characteristics?arrow_forwardWhat are the advantages and disadvantages in your opinion, of mass sending unsolicited email to a large number of people? Give an example from a real-world situation to support your response.arrow_forward
- If you have social media accounts, are you careful about what you post? Would you give your login and password to a company or agency? Why or why not As an employee, can you legally be terminated for what you post on your site? Are there any laws protecting you for what you post? Why or why not?arrow_forwardPlease original work Data mining techniques can be used to monitor your buying habits,what you view on the Internet and on television, where you go, what you eat, the medical care you receive, etc. The government, military, and corporations all use data mining techniques today. This presents numerous privacy and ethical concerns. Please provide a scholarly reference and confer about the ethics of data mining. Who should own your data?arrow_forwardHow can businesses ensure that they are collecting and using personalized data in a transparent and secure way that respects individuals' privacy rights? 500 wordsarrow_forward
- What are some of the challenges and opportunities for the Information and Communications Technology profession over the next few decades and which skills would a new professional need to develop to ensure career success.arrow_forwardWhy is data integrity such a critical issue in business?arrow_forwardAssuming you have been entrusted with developing an E-commerce web site for a newly constructed boutique hotel, what kinds of digital payments would you need for your e-commerce site? What would be the key features of each existing payment system and offer examples of where they are utilized. How can you ensure that your e-commerce environment is well-protected against a variety of possible security threats? Give specific instances to demonstrate your pointarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you