
Concept explainers
a)
Explanation of Solution
Acxiom’s privacy policy:
According to Acxiom, the privacy policies are to maintain and safeguard the data that are obtained about the customers. The company is concentrated towards the usage of data thus maintaining privacy of the customer information.
Reassured about the policy:
Yes, the policy of the Acxiom’s are reassured because they establish a standard global privacy policy principles listed below:
- The choices of access are being monitored...
b)
Explanation of Solution
Ten different products that Acxiom provide:
The below are the different products that “Acxiom” provide and they are:
- Marketing services.
- Advertising solutions
- Data solutions
- Infrastructure Management services...
c)
Explanation of Solution
Acxiom’s customer:
The below mentioned are the customer of Acxiom subjected to particular industry:
- Education
- Banking
- Insurance...
d)
Explanation of Solution
Type of Data that are to be collected to deliver the product to the customer:
Based on the data inferred from the question (b) and (c), type of data that are collected by the Acxiom are list...
e)
Explanation of Solution
Function of InfoBase:
The function of InfoBase is to store a large repository customer i...
f)
Explanation of Solution
Function of PersonicX:
The function of “PersonicX” is to perform a house-hold level segmentation operation along with the visualiz...
g)
Explanation of Solution
Limiting the marketing in order to avoid privacy outcry:
It is necessary to limit the marketing of the companies like Acxiom’s because the customer can be traumatized abo...
h)
Explanation of Solution
Necessity of law in governing the company:
There may be a chance of data that are collected being misused at the greater extend; in certain cases the data obtained needs to be taken care by an organization like Acxiom’...
i)
Explanation of Solution
Necessity of law that govern the type of data service that government agencies could buy from the companies:
The data obtained and gathered needs to be preserved and needed to be avoided ...

Want to see the full answer?
Check out a sample textbook solution
Chapter 5 Solutions
Using MIS (10th Edition)
- Capsim Team PowerPoint Presentations - Slide Title: Key LearningsWhat were the key learnings that you discovered as a team through your Capsim simulation?arrow_forwardWrite the SQL code that permits to implement the tables: Student and Transcript. NB: Add the constraints on the attributes – keys and other.arrow_forwardDraw an ERD that will involve the entity types: Professor, Student, Department and Course. Be sure to add relationship types, key attributes, attributes and multiplicity on the ERD.arrow_forward
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning




