Principles of Information Systems (MindTap Course List)
13th Edition
ISBN: 9781305971776
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 9, Problem 3WE
Explanation of Solution
Pros of sharing the data:
- Social network members could know about the new trending brands by sending emails.
- Sending suggestions for the searched product to the customer.
- It increases the sales and reduces the marketing costs...
Explanation of Solution
Reaction of social network members when their data is being shared:
When the data is being shared, the social network members may feel like that their privacy is being ruined...
Explanation of Solution
Conditions under legitimate use of social network member data:
- The social network member accepts shari...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Conduct Internet research to find instances of a social network that allows a large national shop to mine its data to learn more about its members and produce targeted direct mailings and emails to promote its items.What are the benefits and drawbacks of sharing such information?When members of social networks find that their data is being shared, how do they react?Under what circumstances, in your opinion, is this a legitimate use of social network member data?
Do you know anybody who has been the victim of online bullying or harassment? When you initially learned about the issue, what did you think? Specifically, how did you get to the conclusion that this individual had been the subject of bullying before you became involved?
In the present era, what are the federal regulations that govern the protection of personal information and the reaction to data breaches?
Chapter 9 Solutions
Principles of Information Systems (MindTap Course List)
Ch. 9.1 - Prob. 1RQCh. 9.1 - Prob. 2RQCh. 9.1 - Prob. 1CTQCh. 9.1 - Prob. 2CTQCh. 9.2 - Prob. 1RQCh. 9.2 - Prob. 2RQCh. 9 - Prob. 1SATCh. 9 - Prob. 2SATCh. 9 - Prob. 3SATCh. 9 - Prob. 4SAT
Ch. 9 - Prob. 5SATCh. 9 - A(n) _______________________ is a measure that...Ch. 9 - Prob. 7SATCh. 9 - Prob. 8SATCh. 9 - Prob. 9SATCh. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQCh. 9 - Prob. 11RQCh. 9 - Prob. 12RQCh. 9 - Prob. 1DQCh. 9 - Prob. 2DQCh. 9 - Prob. 3DQCh. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 1PSECh. 9 - Prob. 3PSECh. 9 - Prob. 1TACh. 9 - Prob. 2TACh. 9 - Prob. 3WECh. 9 - Prob. 1CECh. 9 - Prob. 2CECh. 9 - Prob. 3CECh. 9 - Prob. 1CTQ1Ch. 9 - Prob. 2CTQ1Ch. 9 - Prob. 3CTQ1Ch. 9 - Prob. 1CTQ2Ch. 9 - Prob. 2CTQ2Ch. 9 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- Identity theft, in which private information is stolen, is a major concern for organizations and individuals alike. Let's say you manage the data for a huge company that has made its massive database available online. How would you avoid identity theft if you were in charge of a company's data storage system?arrow_forwardWhat Is false sharing?arrow_forwardHi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format: Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forward
- As the world becomes more interconnected through the Internet and social media platforms, what are the implications of the vast amount of data being collected and analyzed by tech companies, and how can individuals and society as a whole strike a balance between utilizing this data for beneficial purposes like personalized services and targeted advertising, while safeguarding user privacy and preventing potential misuse or manipulation of data for malicious intent?arrow_forwardAs you read in Chapter 11, Facebook is one of many online companies that employ databases. In 2011, Facebook announced that it was adding a new feature—facial recognition. Photos added to a Facebook post or wall are often tagged. When a person is tagged in a photo, the person is identified and a link is created to that user’s Facebook account. To make this job easier, Facebook is using facial recognition software to identify people in the photos. Critics of this say that this is an invasion of privacy. Research the debate online. Write a short paper discussing the implications this could have on a Facebook user’s privacy. Please use these sources: https://www.pcworld.com/article/485206/facebook_on_face_recognition_sorry_we_screwed_up.html https://www.pcworld.com/article/485225/facebook_photo_tagging_a_privacy_guide.html#tk.hp_pop https://abcnews.go.com/Technology/facebook-facial-recognition-feature-raises-eyebrows/story?id=13792666arrow_forwardWhat methods are available to improve data privacy?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning