Exam 15: HRIS Privacy and Security
Exam 1: A Brief History and Overview of Technology in HR35 Questions
Exam 2: Database Concepts and Applications in HRIS39 Questions
Exam 3: Systems Considerations in the Design of an HRIS: Planning for Implementations28 Questions
Exam 4: The Systems Development Life Cycle and HRIS Needs Analysis13 Questions
Exam 5: System Design and Acquisition32 Questions
Exam 6: Change Management and Implementation26 Questions
Exam 7: Cost Justifying HRIS Investments31 Questions
Exam 8: HR Administration and HRIS31 Questions
Exam 9: Talent Management32 Questions
Exam 10: Recruitment and Selection in an Internet Context37 Questions
Exam 11: Training and Development: Issues and HRIS Applications38 Questions
Exam 12: Performance Management, Compensation, Benefits, Payroll, and HRIS36 Questions
Exam 13: HRIS and International HRM37 Questions
Exam 14: HR Metrics and Workforce Analytics36 Questions
Exam 15: HRIS Privacy and Security28 Questions
Exam 16: HRIS and Social Media33 Questions
Exam 17: The Future of HRIS: Emerging Trends in HRM and IT24 Questions
Select questions type
Describe cyberterrorism and how to at least control its impact.
Free
(Essay)
4.8/5
(34)
Correct Answer:
•Cyberterrorism - leveraging of an information system,particularly via the Internet,is intended to cause physical,real-world harm or severe disruption of system infrastructure (Hinde,2003).A spy has high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information.
Which is NOT a symptom of spyware on an employee's computer?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
______ are best described as people who accesses a computer or computer network unlawfully.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
A
A hacker is defined as someone who accesses a computer or computer network unlawfully.
(True/False)
4.7/5
(36)
Which type of security threat is the most widespread,affecting almost 90% of companies?
(Multiple Choice)
4.9/5
(33)
According to the text,approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?
(Multiple Choice)
4.9/5
(47)
Which state has passed a law protecting employee records in private organizations?
(Multiple Choice)
4.9/5
(35)
Three main goals of information security are to achieve confidentiality, integrity, and availability within an HRIS.
(True/False)
4.9/5
(34)
All companies have been affected by computer-based fraud,such as data processing or data entry routines that are modified.
(True/False)
4.8/5
(41)
There are many threats to information security.Please describe five information security threats.
(Essay)
4.8/5
(46)
Which of the following is considered a common security threat?
(Multiple Choice)
4.8/5
(40)
Viruses and trojans are common external security threats to organizations and often come in e-mail attachments.
(True/False)
4.8/5
(44)
Which of the following is NOT a recommended privacy policy statement?
(Multiple Choice)
4.9/5
(28)
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least five best practices that were discussed in class,as well as in your textbook.
(Essay)
4.7/5
(35)
Briefly list and describe the important goals and considerations of information security.
(Essay)
4.9/5
(40)
The McCumber Cube for Data Privacy has three dimensions.Which of the following is NOT a dimension that is used to organize a privacy policy?
(Multiple Choice)
4.9/5
(44)
Which of the following is NOT considered a threat to security?
(Multiple Choice)
4.7/5
(32)
Which of the following is NOT considered a software threat to security?
(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 28
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)