Essentials of MIS (12th Edition)
12th Edition
ISBN: 9780134238241
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem 7DQ
Program Plan Intro
Behavioral targeting
Behavioral targeting is referred as following an individual history of browsing behavior on different web sites.
- The target is to tracking the user interests and intentions that revealing them to advertisements.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Assessment:
1. What are the negative implications of Illegal Pyramiding to an individual?
2. What are the negative implications of illegal pyramiding to the economy?
3. What are the negative implications of Illegal Pyramiding to the Society?
4. (In your own opinion) Why do people, having heard of major cases of pyramiding schemes in the
past, still get ensnared on the same trap by these fraudsters?
5. If you get invited by a friend to join a network where you are most probably doubting the
legitimacy, how would you tell him/her that you refuse to join?
1. What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk?
2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?
3. There are a number of professional organizations for computer security. Search for two organizations and share the websites and descriptions of those organizations. Share that information here:4. Choose two of the US federal agencies listed in Chapter 3 that deal with computer/cybercrime. List at least three differences, in terms of reach or responsibility, between the two organizations.
Explain Cyber Bullying vs. Cyber Stalking with real world example?
Chapter 4 Solutions
Essentials of MIS (12th Edition)
Knowledge Booster
Similar questions
- Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?arrow_forwardSocial engineering provides criminals with a means to trick unsuspecting victims into revealingpersonal information. The topic of the question in this section is social engineering. This questionwill require you to conduct additional research.Design an A4-size poster which can be used to create awareness about the dangers of socialengineering. Address the following aspects in your poster:• What is social engineering?• Statistics on the prevalence of social engineering in South Africa.• Three examples of how social engineering takes place.• Three measures an individual can take to avoid becoming a victim of social engineering.• Steps an individual can take if one finds oneself a victim of social engineering.arrow_forwardConduct Internet research to find instances of a social network that allows a large national shop to mine its data to learn more about its members and produce targeted direct mailings and emails to promote its items.What are the benefits and drawbacks of sharing such information?When members of social networks find that their data is being shared, how do they react?Under what circumstances, in your opinion, is this a legitimate use of social network member data?arrow_forward
- A ride sharing app has decided to promote a new category of cab drivers by tweaking the app so that customers are first prioritized to these set of drivers before others. However, they decide to make a full disclosure regarding this to their customers at the time of accepting the booking. Cab drivers have a right to reject a rider, but a small penalty is levied on customers through a small additional charge for accepting a cab from a different category.What are the key ethical issues that you anticipate? If you were working for the ride sharing app, would you have handled this requirement differently?arrow_forwardWhat kind of an influence does mining data have on individuals' right to privacy and safety?arrow_forwardAs the world becomes more interconnected through the Internet and social media platforms, what are the implications of the vast amount of data being collected and analyzed by tech companies, and how can individuals and society as a whole strike a balance between utilizing this data for beneficial purposes like personalized services and targeted advertising, while safeguarding user privacy and preventing potential misuse or manipulation of data for malicious intent?arrow_forward
- While SMIS are presented as a benefit to businesses and consumers, they also have a dark side. Instructions: Read the attached article titled “The Case for Investigating Facebook” by David N. Cicilline, a member of the House of Representatives and chairman of the House Subcommittee on Antitrust, Commercial and Administrative Law, and discuss.arrow_forward"Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning Please: Don't use Chatgptarrow_forwardlegal aspect of cybersecurity ScarJo Services, Inc. is a New York company allowing customers from around theworld to set up sight-seeing tours of cities where Scarlet Johansson has filmedmemorable scenes in film. One day, ScarJo gets an email from “Liev Kieturakis,” whoclaims to have used ScarJo’s services last year and wants all of his information deletedfrom ScarJo’s databases pursuant to GDPR. Which of the following should be ScarJo’sfirst response to Liev?A. Confirm receipt of request.B. Seek authentication that Liev is a ScarJo customer.C. Erase all information related to Liev within 30 days.D. Deny Liev’s request.arrow_forward
- Alert dont submit AI generated answer.arrow_forwardWhat kind of an impact can mining data have on people's right to personal privacy and safety?arrow_forwardIn recommender systems, usually, implicit feedback comprises a _______ matrix, while explicit feedback comprises a _______ matrix. dense, sparse sparse, densearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning