What are the principal challenges associated with information systems ethics?

CTQ1. Read the Minicase from Chapter 12 or Chapter 13. Answer all the Discussion Questions in the end of this Minicase.

CTQ2. Pick one question to answer from the following list. Use your own language. Copying from the textbook will result in 0 points.

  • What are the idiosyncratic main capabilities of smart devices? How may they challenge current business models?
  • Explain the difference between smart devices and wearables, giving specific examples.
  • What is the meaning of the acronym BYOD? How might BYOD or BYOW trends impact existing information systems?
  • Identify two DDSs that you believe are relevant in a sport and suggest an IT-dependent strategic initiative based on both of them.
  • What is virtual reality? How is virtual reality different from augmented reality and mixed reality? Give examples.
  • What is digital manufacturing? How is digital manufacturing set to transform current offering, operations, and competition?
  • What is machine learning? Discuss how they are different from traditional statistics methods.
  • Define deep learning and discuss its main characteristics and limitations.
  • What is AI? How is machine learning different from human learning? Use examples.
  • Which machine learning approach would you use if you had to build a system to predict consumers’ credit risk and you had past knowledge of the transactions and the delinquency rate on loans?
  • What is the difference between data mining and machine learning? Use examples.
  • What is a blockchain? What are the main properties of blockchains?
  • Imagine that you have just been hired by a retail financial institution. How would you explain to your CEO that she needs to get involved in information security decisions?
  • What security challenges does cloud storage post on companies?
  • What can be done to improve the security of business uses of the Internet? Give several examples of security measures and technologies you would use.
  • What are the three costs associated with information systems security? What is the relationship among them?
  • Define what is meant by internal and external threats. How do the two differ? How are they related?
  • Define and provide an example of each of the different types of intrusion threats. Describe the appropriate countermeasure for each of your examples.
  • Define and provide an example of each of the different types of malicious code threats. Describe the appropriate countermeasure.
  • What is a denial-of-service attack? Why are these attacks particularly dangerous?
  • What is the “kill chain”? Can you describe the inspiring principles of Lockheed’s Cyber Kill framework?
  • How is privacy defined? What are the principal privacy risks? Can you provide examples of each one?
  • What are the principal challenges associated with information systems ethics?
  • attachment

    779AD6D2-42EA-4D18-9E71-B4EDF00B5418.png
  • attachment

    16150C59-7BD7-4E70-A4D6-5E3716C2735D.png
  • attachment

    7F090045-A3EF-4150-870F-62E3B63D9C17.png
  • attachment

    26CD7BFB-FC08-4306-B6B8-FD614FCBE643.png

LOOKING FOR THIS ASSIGNMENT OR A SIMILAR ONE? WE HAVE HAD A GOOD SUCCESS RATE ON THIS PAPER! ORDER WITH US TODAY FOR QUALITY WORK AND GET A DISCOUNT!

ORDER NOW

Disclaimer:

All types of paper that Discount Writers provides is only for the purpose of assistance! No text, paper, assignment, discussion would be similar with another student therefore guaranteeing Uniqueness and can be used with proper references only!

More tools: Better Grades: Choose your Homework Help:

Assignment Help: We would write your papers according to the instructions provided and guarantee you timely work

 

Entire Online Class Help: We are here for you and we would do your entire Class work from discussions, assignments, Replies, Exams and Quizzes at a Cost

 

Exam/ Quiz Help: We have a team of writers who specialize on exams from any specific field and we would give you an A+ Grade!

 

ORDER NOW