Deck 16: Information Security and Privacy in Human Resource Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
Play
Full screen (f)
Deck 16: Information Security and Privacy in Human Resource Information Systems
1
Information security breaches cost approximately ________ annually.
A)78 million
B)45 billion
C)17 billion
D)100 billion
A)78 million
B)45 billion
C)17 billion
D)100 billion
C
2
Three main goals of information security are to achieve confidentiality, integrity and availability within a HRIS.
True
3
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
D
4
Information security issues are solely the responsibility of the IT Department and IT managers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
According to the text, approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?
A)25%
B)33%
C)75%
D)100%
A)25%
B)33%
C)75%
D)100%
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
Cybercrime and security breaches cost firms an average of $ _______ annually.
A)15, 670
B)6, 990
C)833,000
D)77, 400
A)15, 670
B)6, 990
C)833,000
D)77, 400
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
Viruses, worms and trojans are common external security threats organization and often come in email attachments.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.
A)Canada
B)United States
C)European Union
D)South Korea
A)Canada
B)United States
C)European Union
D)South Korea
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
The ISO/IEC 27002 security management process does NOT consist of
A)Administrative/procedural controls
B)Logical/technical controls
C)Physical controls
D)Strategic controls
A)Administrative/procedural controls
B)Logical/technical controls
C)Physical controls
D)Strategic controls
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
According to Austin and Darby (2003)it is estimated that security breaches (internal and external)affect _____ of all businesses every year.
A)15%
B)40%
C)75%
D)90%
A)15%
B)40%
C)75%
D)90%
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
A hacker is defined as someone who accesses a computer or computer network unlawfully.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
_________ are best described as someone who accesses a computer or computer network unlawfully.
A)Hackers
B)Virus/worms/Trojans
C)Information thief
D)Disgruntled employees
A)Hackers
B)Virus/worms/Trojans
C)Information thief
D)Disgruntled employees
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as the right to have no public personal identity
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is considered a common security threat?
A)Human error
B)Damage by employees
C)Hackers
D)All of the above
A)Human error
B)Damage by employees
C)Hackers
D)All of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
Which U.S.state enacted the Security Breach Notification Law? The law requires organizations to notify customers or employees when unencrypted personal information may be compromised, stolen or lost
A)New York
B)Massachusetts
C)California
D)Washington
A)New York
B)Massachusetts
C)California
D)Washington
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as "the right to not be monitored".
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
A)Solitude
B)Anonymity
C)Intimacy
D)Reserve
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
The main goal(s)of information security is/are to achieve:
A)Confidentiality, and integrity
B)Integrity, and availability
C)Confidentiality, and availability
D)Confidentiality, integrity, and availability
A)Confidentiality, and integrity
B)Integrity, and availability
C)Confidentiality, and availability
D)Confidentiality, integrity, and availability
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?
A)Train users on how to securely use and handle the equipment, data, and software.
B)Make backup copies of data files and programs
C)Do not allow passwords to be shared.Change passwords frequently
D)Require employees to take sensitive material home with them so that it is not left at the office.
A)Train users on how to securely use and handle the equipment, data, and software.
B)Make backup copies of data files and programs
C)Do not allow passwords to be shared.Change passwords frequently
D)Require employees to take sensitive material home with them so that it is not left at the office.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
Briefly list and describe the important goals/considerations of information security?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
Governments, at various levels, in most of the developed countries have enacted several laws and regulations to safeguard information security and data protection.Please list and briefly describe 3 such laws discussed in chapter 16 of the textbook.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Information availability means that the individuals must be able to process and access personal information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
ISO/IEC 27002 (ISO, 2000), is a security management process which focus of technological control of information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
Confidential information must only be accessed, used, or disclosed by authorized users.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
Privacy is a human value consisting of four elements that refer to human rights, namely, solitude, anonymity, intimacy and reserve.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
What is meant by information security in HRIS?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
Please list and briefly describe the four elements of privacy..
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
The value of information is rarely higher than the price of hardware and/or software being used to store that information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
While they are relatively uncommon, security breaches can be costly for the organization.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
What are the information security and privacy considerations in the design, development and maintenance of HRIS?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
There are many threats to information security.Please describe five information security threats.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
Integrity of information means data must be created, modified, or deleted only by authorized users.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
If you were an HR manager how would you attempt to combat information security threats?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Privacy is a universal concept that is viewed similarly in different cultures.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
What are some of the best practices for handling information in HRM/HRIS? Please state 5
best practices for handling information in HRM/HRIS
best practices for handling information in HRM/HRIS
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck