Exam 16: Information Security and Privacy in Human Resource Information Systems
Exam 1: Evolution of Human Resource Management and Human Resource Information Systems: the Role of Information Technology38 Questions
Exam 2: Database Concepts and Applications in Human Resource Information Systems42 Questions
Exam 3: Systems Considerations in the Design of a Human Resource Information40 Questions
Exam 4: Human Resource Information Systems Needs Analysis39 Questions
Exam 5: System Design and Acquisition39 Questions
Exam 6: Human Resource Metrics and Workforce Analytics40 Questions
Exam 7: Cost Justifying Human Resource Information Systems Investments34 Questions
Exam 8: Project Management and Human Resource Advice for Human Resource Information Systems Implementation33 Questions
Exam 9: Change Management: Implementation, Integration, and Maintenance of the Human Resource Information Systems40 Questions
Exam 10: Human Resource Administration and Human Resource Information Systems47 Questions
Exam 11: Talent Management35 Questions
Exam 12: Performance Management, Compensation, Benefits, Payroll, Nd the Human Resource Information System39 Questions
Exam 13: Training and Development: Issues and Human Resource Information Systems38 Questions
Exam 14: Performance Management, Compensation, Benefits, Payroll, and the Human36 Questions
Exam 15: Human Resource Information Systems and International Human Resource33 Questions
Exam 16: Information Security and Privacy in Human Resource Information Systems39 Questions
Select questions type
Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.
(True/False)
4.9/5
(40)
Briefly list and describe the important goals/considerations of information security?
(Essay)
4.9/5
(43)
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity
(Multiple Choice)
4.7/5
(43)
What are the information security and privacy considerations in the design, development and maintenance of HRIS?
(Essay)
4.8/5
(27)
The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.
(Multiple Choice)
4.7/5
(43)
A hacker is defined as someone who accesses a computer or computer network unlawfully.
(True/False)
4.7/5
(41)
All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.
(True/False)
4.7/5
(36)
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information
(Multiple Choice)
4.9/5
(44)
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.
(Multiple Choice)
4.8/5
(34)
Which of the following is considered a common security threat?
(Multiple Choice)
4.8/5
(42)
Information availability means that the individuals must be able to process and access personal information.
(True/False)
4.7/5
(37)
Integrity of information means data must be created, modified, or deleted only by authorized users.
(True/False)
4.8/5
(40)
What are some of the best practices for handling information in HRM/HRIS? Please state 5
best practices for handling information in HRM/HRIS
(Essay)
4.9/5
(33)
_________ are best described as someone who accesses a computer or computer network unlawfully.
(Multiple Choice)
4.9/5
(40)
Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.
(True/False)
5.0/5
(40)
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.
(Essay)
4.8/5
(32)
If you were an HR manager how would you attempt to combat information security threats?
(Essay)
4.8/5
(43)
Showing 21 - 39 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)