Deck 16: Information Security and Privacy in Human Resource Information Systems

Full screen (f)
exit full mode
Question
Information security breaches cost approximately ________ annually.

A)78 million
B)45 billion
C)17 billion
D)100 billion
Use Space or
up arrow
down arrow
to flip the card.
Question
Three main goals of information security are to achieve confidentiality, integrity and availability within a HRIS.
Question
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Question
Information security issues are solely the responsibility of the IT Department and IT managers.
Question
According to the text, approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A)25%
B)33%
C)75%
D)100%
Question
Cybercrime and security breaches cost firms an average of $ _______ annually.

A)15, 670
B)6, 990
C)833,000
D)77, 400
Question
Viruses, worms and trojans are common external security threats organization and often come in email attachments.
Question
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Question
The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.

A)Canada
B)United States
C)European Union
D)South Korea
Question
The ISO/IEC 27002 security management process does NOT consist of

A)Administrative/procedural controls
B)Logical/technical controls
C)Physical controls
D)Strategic controls
Question
According to Austin and Darby (2003)it is estimated that security breaches (internal and external)affect _____ of all businesses every year.

A)15%
B)40%
C)75%
D)90%
Question
A hacker is defined as someone who accesses a computer or computer network unlawfully.
Question
_________ are best described as someone who accesses a computer or computer network unlawfully.

A)Hackers
B)Virus/worms/Trojans
C)Information thief
D)Disgruntled employees
Question
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Question
Which of the following is considered a common security threat?

A)Human error
B)Damage by employees
C)Hackers
D)All of the above
Question
Which U.S.state enacted the Security Breach Notification Law? The law requires organizations to notify customers or employees when unencrypted personal information may be compromised, stolen or lost

A)New York
B)Massachusetts
C)California
D)Washington
Question
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as "the right to not be monitored".

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Question
All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.
Question
The main goal(s)of information security is/are to achieve:

A)Confidentiality, and integrity
B)Integrity, and availability
C)Confidentiality, and availability
D)Confidentiality, integrity, and availability
Question
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A)Train users on how to securely use and handle the equipment, data, and software.
B)Make backup copies of data files and programs
C)Do not allow passwords to be shared.Change passwords frequently
D)Require employees to take sensitive material home with them so that it is not left at the office.
Question
Briefly list and describe the important goals/considerations of information security?
Question
Governments, at various levels, in most of the developed countries have enacted several laws and regulations to safeguard information security and data protection.Please list and briefly describe 3 such laws discussed in chapter 16 of the textbook.
Question
Information availability means that the individuals must be able to process and access personal information.
Question
ISO/IEC 27002 (ISO, 2000), is a security management process which focus of technological control of information.
Question
Confidential information must only be accessed, used, or disclosed by authorized users.
Question
Privacy is a human value consisting of four elements that refer to human rights, namely, solitude, anonymity, intimacy and reserve.
Question
What is meant by information security in HRIS?
Question
Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.
Question
Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.
Question
Please list and briefly describe the four elements of privacy..
Question
The value of information is rarely higher than the price of hardware and/or software being used to store that information.
Question
While they are relatively uncommon, security breaches can be costly for the organization.
Question
What are the information security and privacy considerations in the design, development and maintenance of HRIS?
Question
There are many threats to information security.Please describe five information security threats.
Question
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.
Question
Integrity of information means data must be created, modified, or deleted only by authorized users.
Question
If you were an HR manager how would you attempt to combat information security threats?
Question
Privacy is a universal concept that is viewed similarly in different cultures.
Question
What are some of the best practices for handling information in HRM/HRIS? Please state 5
best practices for handling information in HRM/HRIS
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Information Security and Privacy in Human Resource Information Systems
1
Information security breaches cost approximately ________ annually.

A)78 million
B)45 billion
C)17 billion
D)100 billion
C
2
Three main goals of information security are to achieve confidentiality, integrity and availability within a HRIS.
True
3
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
D
4
Information security issues are solely the responsibility of the IT Department and IT managers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
According to the text, approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A)25%
B)33%
C)75%
D)100%
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
Cybercrime and security breaches cost firms an average of $ _______ annually.

A)15, 670
B)6, 990
C)833,000
D)77, 400
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
Viruses, worms and trojans are common external security threats organization and often come in email attachments.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.

A)Canada
B)United States
C)European Union
D)South Korea
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
The ISO/IEC 27002 security management process does NOT consist of

A)Administrative/procedural controls
B)Logical/technical controls
C)Physical controls
D)Strategic controls
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
According to Austin and Darby (2003)it is estimated that security breaches (internal and external)affect _____ of all businesses every year.

A)15%
B)40%
C)75%
D)90%
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
A hacker is defined as someone who accesses a computer or computer network unlawfully.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
_________ are best described as someone who accesses a computer or computer network unlawfully.

A)Hackers
B)Virus/worms/Trojans
C)Information thief
D)Disgruntled employees
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is considered a common security threat?

A)Human error
B)Damage by employees
C)Hackers
D)All of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
Which U.S.state enacted the Security Breach Notification Law? The law requires organizations to notify customers or employees when unencrypted personal information may be compromised, stolen or lost

A)New York
B)Massachusetts
C)California
D)Washington
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as "the right to not be monitored".

A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
The main goal(s)of information security is/are to achieve:

A)Confidentiality, and integrity
B)Integrity, and availability
C)Confidentiality, and availability
D)Confidentiality, integrity, and availability
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A)Train users on how to securely use and handle the equipment, data, and software.
B)Make backup copies of data files and programs
C)Do not allow passwords to be shared.Change passwords frequently
D)Require employees to take sensitive material home with them so that it is not left at the office.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
Briefly list and describe the important goals/considerations of information security?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
Governments, at various levels, in most of the developed countries have enacted several laws and regulations to safeguard information security and data protection.Please list and briefly describe 3 such laws discussed in chapter 16 of the textbook.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Information availability means that the individuals must be able to process and access personal information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
ISO/IEC 27002 (ISO, 2000), is a security management process which focus of technological control of information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
Confidential information must only be accessed, used, or disclosed by authorized users.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
Privacy is a human value consisting of four elements that refer to human rights, namely, solitude, anonymity, intimacy and reserve.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
What is meant by information security in HRIS?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
Please list and briefly describe the four elements of privacy..
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
The value of information is rarely higher than the price of hardware and/or software being used to store that information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
While they are relatively uncommon, security breaches can be costly for the organization.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
What are the information security and privacy considerations in the design, development and maintenance of HRIS?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
There are many threats to information security.Please describe five information security threats.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
Integrity of information means data must be created, modified, or deleted only by authorized users.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
If you were an HR manager how would you attempt to combat information security threats?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Privacy is a universal concept that is viewed similarly in different cultures.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
What are some of the best practices for handling information in HRM/HRIS? Please state 5
best practices for handling information in HRM/HRIS
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 39 flashcards in this deck.