Information Systems-Decision Making

 1. Identify one cyberattack that occurred in the last 2 years. What caused the cyberattack? How did the cyberattack impact data loss, financial loss, cleanup cost, and the loss of reputation? If you were the manager of this company, what are some key steps you would have taken to prevent cyberattacks and enhance cybersecurity? Recommend information that should be in the cloud and describe which information should not be in the cloud. Be sure to include in your recommendation your thoughts on preventing cyberattacks, addressing security concerns, or strengthening network infrastructure. 2. You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases. These tools typically “track” user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad-blockers that block this type of communication. What constraints, if any, should be applied to this practice? If you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue, how might this affect your feelings toward the technology? 3. Customers use mobile devices for a wide range of shopping and commercial activities. Mobile devices are becoming an attractive way to pay for products or conduct banking. Select an organization with which you regularly do business but not one you have used in a previous discussion. o Describe the benefits this organization provides through its mobile computing options. o What risks most concern you in using this app? How would you mitigate these risks?

#Information #SystemsDecision #Making

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description ASSIGNMENT COVER SHEET Course name: Workplace Health Promotion Course number: PHC362 CRN: Assignment title or task: (You can write a

Description ASSIGNMENT COVER SHEET Course name: Workplace Health Promotion Course number: PHC362 CRN: Assignment title or task: (You can write a question) Explain how workplace health promotion programs improve productivity and enhance company image? (Support your answer with some examples). Student Name: Student ID: Submission Date: Instructor name: Grade: Out

Effective negotiations are designed with four key focus areas in mind: people, interests, options, and criteria (PIOC). Focusing on these four variables

Effective negotiations are designed with four key focus areas in mind: people, interests, options, and criteria (PIOC). Focusing on these four variables assists in reaching a successful negotiation outcome, a key deliverable for this milestone. Refer to Module One for information regarding PIOC. Discussions on possible ZOPA and BATNA agreements

Description Deliverable Length: 4-6 pages Section 5: National Protection and Preparedness This week, you will provide a comprehensive summary of the

Description Deliverable Length: 4-6 pages Section 5: National Protection and Preparedness This week, you will provide a comprehensive summary of the specific elements of the National Southwest Border Counternarcotics (NSWBCN) Strategy, offering an executive overview of the 10 chapters. In your assignment, identify the relevant supporting ligaments of the policy that

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote