Exam 12: Regulating and Managing Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.

Free
(True/False)
4.7/5
(46)
Correct Answer:
Verified

True

Which of the following is true about the U.S.government's PRISM program?

Free
(Multiple Choice)
4.9/5
(48)
Correct Answer:
Verified

C

The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.

Free
(True/False)
4.7/5
(30)
Correct Answer:
Verified

True

The primary reason that governments try to keep pace with technology is to:

(Multiple Choice)
4.9/5
(38)

Discuss the motivations of cyber criminals.Explain the costs that cybercrime have on businesses,governments and individuals.

(Essay)
4.8/5
(33)

Which of these steps has the U.S.recently taken to counter cybercrime?

(Multiple Choice)
4.8/5
(30)

MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:

(Multiple Choice)
4.9/5
(19)

What have businesses done to manage personal information about their employees and customers? Identify a specific company that has taken action and discuss the results.

(Essay)
5.0/5
(41)

Discuss some of the interventions that different governments have taken to control information technology in their nations.How have these steps affected individual privacy rights as well as public security?

(Essay)
4.7/5
(32)

Supporters of digitized medical records claim that:

(Multiple Choice)
4.8/5
(29)

In 2014,the country with the highest percentage of unlicensed software users was Venezuela.

(True/False)
4.8/5
(33)

In 2013,North Korea opened Internet access to which group of people?

(Multiple Choice)
4.9/5
(35)

Downloading illegal files,spreading computer viruses,and stealing from online bank accounts is collectively referred to as:

(Multiple Choice)
4.7/5
(40)

This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:

(Multiple Choice)
4.8/5
(31)

How has the increase in information technology affected criminal activities globally?

(Multiple Choice)
4.7/5
(38)

The Center for Strategic and International Studies recently reported that the global costs of cybercrime run as high as $1 million.

(True/False)
4.9/5
(44)

A CIO is the company's:

(Multiple Choice)
4.7/5
(32)

Which of these actions have Western nations taken to fight cybercrime?

(Multiple Choice)
4.8/5
(42)

In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:

(Multiple Choice)
4.8/5
(38)

Most U.S.state laws permit the monitoring of employees through:

(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)