Exam 16: Information Security and Privacy in Human Resource Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.

(True/False)
4.9/5
(40)

What is meant by information security in HRIS?

(Essay)
5.0/5
(32)

Briefly list and describe the important goals/considerations of information security?

(Essay)
4.9/5
(43)

According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity

(Multiple Choice)
4.7/5
(43)

What are the information security and privacy considerations in the design, development and maintenance of HRIS?

(Essay)
4.8/5
(27)

The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.

(Multiple Choice)
4.7/5
(43)

A hacker is defined as someone who accesses a computer or computer network unlawfully.

(True/False)
4.7/5
(41)

All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.

(True/False)
4.7/5
(36)

According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information

(Multiple Choice)
4.9/5
(44)

According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.

(Multiple Choice)
4.8/5
(34)

Please list and briefly describe the four elements of privacy..

(Essay)
4.9/5
(45)

Which of the following is considered a common security threat?

(Multiple Choice)
4.8/5
(42)

Information availability means that the individuals must be able to process and access personal information.

(True/False)
4.7/5
(37)

Integrity of information means data must be created, modified, or deleted only by authorized users.

(True/False)
4.8/5
(40)

What are some of the best practices for handling information in HRM/HRIS? Please state 5 best practices for handling information in HRM/HRIS

(Essay)
4.9/5
(33)

_________ are best described as someone who accesses a computer or computer network unlawfully.

(Multiple Choice)
4.9/5
(40)

Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.

(True/False)
5.0/5
(40)

What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.

(Essay)
4.8/5
(32)

If you were an HR manager how would you attempt to combat information security threats?

(Essay)
4.8/5
(43)
Showing 21 - 39 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)