Deck 16: Information Security and Privacy in Human Resource Information Systems

ملء الشاشة (f)
exit full mode
سؤال
Information security breaches cost approximately ________ annually.

A)78 million
B)45 billion
C)17 billion
D)100 billion
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Three main goals of information security are to achieve confidentiality, integrity and availability within a HRIS.
سؤال
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
سؤال
Information security issues are solely the responsibility of the IT Department and IT managers.
سؤال
According to the text, approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A)25%
B)33%
C)75%
D)100%
سؤال
Cybercrime and security breaches cost firms an average of $ _______ annually.

A)15, 670
B)6, 990
C)833,000
D)77, 400
سؤال
Viruses, worms and trojans are common external security threats organization and often come in email attachments.
سؤال
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
سؤال
The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.

A)Canada
B)United States
C)European Union
D)South Korea
سؤال
The ISO/IEC 27002 security management process does NOT consist of

A)Administrative/procedural controls
B)Logical/technical controls
C)Physical controls
D)Strategic controls
سؤال
According to Austin and Darby (2003)it is estimated that security breaches (internal and external)affect _____ of all businesses every year.

A)15%
B)40%
C)75%
D)90%
سؤال
A hacker is defined as someone who accesses a computer or computer network unlawfully.
سؤال
_________ are best described as someone who accesses a computer or computer network unlawfully.

A)Hackers
B)Virus/worms/Trojans
C)Information thief
D)Disgruntled employees
سؤال
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
سؤال
Which of the following is considered a common security threat?

A)Human error
B)Damage by employees
C)Hackers
D)All of the above
سؤال
Which U.S.state enacted the Security Breach Notification Law? The law requires organizations to notify customers or employees when unencrypted personal information may be compromised, stolen or lost

A)New York
B)Massachusetts
C)California
D)Washington
سؤال
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as "the right to not be monitored".

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
سؤال
All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.
سؤال
The main goal(s)of information security is/are to achieve:

A)Confidentiality, and integrity
B)Integrity, and availability
C)Confidentiality, and availability
D)Confidentiality, integrity, and availability
سؤال
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A)Train users on how to securely use and handle the equipment, data, and software.
B)Make backup copies of data files and programs
C)Do not allow passwords to be shared.Change passwords frequently
D)Require employees to take sensitive material home with them so that it is not left at the office.
سؤال
Briefly list and describe the important goals/considerations of information security?
سؤال
Governments, at various levels, in most of the developed countries have enacted several laws and regulations to safeguard information security and data protection.Please list and briefly describe 3 such laws discussed in chapter 16 of the textbook.
سؤال
Information availability means that the individuals must be able to process and access personal information.
سؤال
ISO/IEC 27002 (ISO, 2000), is a security management process which focus of technological control of information.
سؤال
Confidential information must only be accessed, used, or disclosed by authorized users.
سؤال
Privacy is a human value consisting of four elements that refer to human rights, namely, solitude, anonymity, intimacy and reserve.
سؤال
What is meant by information security in HRIS?
سؤال
Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.
سؤال
Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.
سؤال
Please list and briefly describe the four elements of privacy..
سؤال
The value of information is rarely higher than the price of hardware and/or software being used to store that information.
سؤال
While they are relatively uncommon, security breaches can be costly for the organization.
سؤال
What are the information security and privacy considerations in the design, development and maintenance of HRIS?
سؤال
There are many threats to information security.Please describe five information security threats.
سؤال
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.
سؤال
Integrity of information means data must be created, modified, or deleted only by authorized users.
سؤال
If you were an HR manager how would you attempt to combat information security threats?
سؤال
Privacy is a universal concept that is viewed similarly in different cultures.
سؤال
What are some of the best practices for handling information in HRM/HRIS? Please state 5
best practices for handling information in HRM/HRIS
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Information Security and Privacy in Human Resource Information Systems
1
Information security breaches cost approximately ________ annually.

A)78 million
B)45 billion
C)17 billion
D)100 billion
C
2
Three main goals of information security are to achieve confidentiality, integrity and availability within a HRIS.
True
3
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
D
4
Information security issues are solely the responsibility of the IT Department and IT managers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
5
According to the text, approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A)25%
B)33%
C)75%
D)100%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cybercrime and security breaches cost firms an average of $ _______ annually.

A)15, 670
B)6, 990
C)833,000
D)77, 400
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
7
Viruses, worms and trojans are common external security threats organization and often come in email attachments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
8
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
9
The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.

A)Canada
B)United States
C)European Union
D)South Korea
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
10
The ISO/IEC 27002 security management process does NOT consist of

A)Administrative/procedural controls
B)Logical/technical controls
C)Physical controls
D)Strategic controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to Austin and Darby (2003)it is estimated that security breaches (internal and external)affect _____ of all businesses every year.

A)15%
B)40%
C)75%
D)90%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
12
A hacker is defined as someone who accesses a computer or computer network unlawfully.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
13
_________ are best described as someone who accesses a computer or computer network unlawfully.

A)Hackers
B)Virus/worms/Trojans
C)Information thief
D)Disgruntled employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is considered a common security threat?

A)Human error
B)Damage by employees
C)Hackers
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which U.S.state enacted the Security Breach Notification Law? The law requires organizations to notify customers or employees when unencrypted personal information may be compromised, stolen or lost

A)New York
B)Massachusetts
C)California
D)Washington
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
17
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as "the right to not be monitored".

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
18
All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
19
The main goal(s)of information security is/are to achieve:

A)Confidentiality, and integrity
B)Integrity, and availability
C)Confidentiality, and availability
D)Confidentiality, integrity, and availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A)Train users on how to securely use and handle the equipment, data, and software.
B)Make backup copies of data files and programs
C)Do not allow passwords to be shared.Change passwords frequently
D)Require employees to take sensitive material home with them so that it is not left at the office.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
21
Briefly list and describe the important goals/considerations of information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
22
Governments, at various levels, in most of the developed countries have enacted several laws and regulations to safeguard information security and data protection.Please list and briefly describe 3 such laws discussed in chapter 16 of the textbook.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
23
Information availability means that the individuals must be able to process and access personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
24
ISO/IEC 27002 (ISO, 2000), is a security management process which focus of technological control of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
25
Confidential information must only be accessed, used, or disclosed by authorized users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
26
Privacy is a human value consisting of four elements that refer to human rights, namely, solitude, anonymity, intimacy and reserve.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is meant by information security in HRIS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
28
Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
29
Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
30
Please list and briefly describe the four elements of privacy..
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
31
The value of information is rarely higher than the price of hardware and/or software being used to store that information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
32
While they are relatively uncommon, security breaches can be costly for the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are the information security and privacy considerations in the design, development and maintenance of HRIS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
34
There are many threats to information security.Please describe five information security threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
36
Integrity of information means data must be created, modified, or deleted only by authorized users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
37
If you were an HR manager how would you attempt to combat information security threats?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
38
Privacy is a universal concept that is viewed similarly in different cultures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
39
What are some of the best practices for handling information in HRM/HRIS? Please state 5
best practices for handling information in HRM/HRIS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.