EBK MANAGEMENT INFORMATION SYSTEMS
EBK MANAGEMENT INFORMATION SYSTEMS
16th Edition
ISBN: 9780135192047
Author: LAUDON
Publisher: VST
Expert Solution & Answer
Book Icon
Chapter 8, Problem 3RQ

Explanation of Solution

 General Controls:

  • The general controls govern the security, design, computer program usage and data file security throughout Information Technology (IT) infrastructure of organization.
  • It applies to all applications that are computerized, it consist of combination of software, hardware as well as manual procedures.
  • It creates an overall environment of control.

Types of general control:

  • Software controls:
    • It monitors usage of system software.
    • It prevents unauthorized access and usage of system software, software programs and computer programs.
  • Hardware controls:
    • It ensures physical security for computer hardware.
    • It checks for any malfunction in equipment.
    • It makes provision for back up as well as continued operation for maintaining constant service...

Explanation of Solution

Application Controls:

  • Application controls denote specific controls that are exclusive to each application.
  • It includes both manual as well as automated procedures.
  • It ensures that authorized data is been processed by application.

Types of application control:

  • Input controls:
    • It checks data for correctness as well as completeness while they go in system...

Explanation of Solution

Risk assessment function:

  • A risk assessment would determine risk level to firm if an explicit activity is not controlled properly.
  • The information assets value, vulnerability point, likely problem frequency and damage potential can be determined by business managers.
  • Controls could be added or adjusted to focus on greater risk areas.
  • Security risk analysis would involve determination of what is needed to be protected and the manner to protect.
  • It denotes an examining process for risks of firm and ranking for those risks by severity level...

Explanation of Solution

Security policy, Acceptable use policy and Identity management:

  • A security policy denotes ranking of information risks, identification of acceptable goals of security as well as identification of mechanism to achieve goals.
    • It drives policies that determine acceptable information resource usage of firm.
    • It determines access details of company’s information assets.
  • An acceptable use policy denotes acceptable uses of resources of firm and equipment for computing.
    • It includes desktop, laptop, wireless devices, Internet and telephones.
    • It clarifies privacy, responsibility of user as well as personal usage for company equipment policies...

Explanation of Solution

Information systems audit promoting control and security:

  • Information system auditing determines effectiveness of information system security as well as control.
  • A Management Information System (MIS) audit would ident...

Blurred answer
Students have asked these similar questions
(Short-answer) b. Continue from the previous question. Suppose part of the data you extracted from the data warehouse is the following.   Identify the missing values you think exist in the dataset. Use Column letter and Row number to refer to each missing value in the dataset. Please write down how you want to address each particular missing value (you can group them if they receive same treatment). For imputation, you do not need to calculate the exact imputed values but just describe what kind of value you want to use to impute.
Please original work Locate data warehousing solutions offered by IBM, Oracle, Microsoft, and Amazon Compare and contrast the capabilities of each solution and provide several names of some organizations that utilize each of these solutions. Please cite in text references and add weblinks
Need Help: Which of the following statements about confusion matrix is wrong A) Confusion matrix is a performance measure for probability prediction techniques B) Confusion matrix is derived based on classification rules with cut-off value 0.5 C) Confusion matrix is derived based on training partition to measure a model’s predictive performance D) None of the above
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education