Exam 12: Regulating and Managing Information Technology
Exam 1: The Corporation and Its Stakeholders52 Questions
Exam 2: Managing Public Issues and Stakeholder Relationships52 Questions
Exam 3: Corporate Social Responsibility and Citizenship52 Questions
Exam 4: Business in a Globalized World52 Questions
Exam 5: Ethics and Ethical Reasoning52 Questions
Exam 6: Organizational Ethics52 Questions
Exam 7: Businessgovernment Relations52 Questions
Exam 8: Influencing the Political Environment52 Questions
Exam 9: Sustainable Development and Global Business52 Questions
Exam 10: Managing for Sustainability52 Questions
Exam 11: The Role of Technology52 Questions
Exam 12: Regulating and Managing Information Technology52 Questions
Exam 14: Consumer Protection52 Questions
Exam 15: Employees and the Corporation52 Questions
Exam 16: Managing a Diverse Workforce52 Questions
Exam 17: Business and Its Suppliers52 Questions
Exam 18: The Community and the Corporation52 Questions
Exam 19: The Public and Corporate Reputation52 Questions
Select questions type
One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.
Free
(True/False)
4.7/5
(46)
Correct Answer:
True
Which of the following is true about the U.S.government's PRISM program?
Free
(Multiple Choice)
4.9/5
(48)
Correct Answer:
C
The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.
Free
(True/False)
4.7/5
(30)
Correct Answer:
True
The primary reason that governments try to keep pace with technology is to:
(Multiple Choice)
4.9/5
(38)
Discuss the motivations of cyber criminals.Explain the costs that cybercrime have on businesses,governments and individuals.
(Essay)
4.8/5
(33)
Which of these steps has the U.S.recently taken to counter cybercrime?
(Multiple Choice)
4.8/5
(30)
MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:
(Multiple Choice)
4.9/5
(19)
What have businesses done to manage personal information about their employees and customers? Identify a specific company that has taken action and discuss the results.
(Essay)
5.0/5
(41)
Discuss some of the interventions that different governments have taken to control information technology in their nations.How have these steps affected individual privacy rights as well as public security?
(Essay)
4.7/5
(32)
In 2014,the country with the highest percentage of unlicensed software users was Venezuela.
(True/False)
4.8/5
(33)
In 2013,North Korea opened Internet access to which group of people?
(Multiple Choice)
4.9/5
(35)
Downloading illegal files,spreading computer viruses,and stealing from online bank accounts is collectively referred to as:
(Multiple Choice)
4.7/5
(40)
This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:
(Multiple Choice)
4.8/5
(31)
How has the increase in information technology affected criminal activities globally?
(Multiple Choice)
4.7/5
(38)
The Center for Strategic and International Studies recently reported that the global costs of cybercrime run as high as $1 million.
(True/False)
4.9/5
(44)
Which of these actions have Western nations taken to fight cybercrime?
(Multiple Choice)
4.8/5
(42)
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:
(Multiple Choice)
4.8/5
(38)
Most U.S.state laws permit the monitoring of employees through:
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)