Name: Angelie Flor M. Yamson BSIT-III
Chapter 4 Case Study
1.
Your friend is considering
using an online service to identify people with compatible personalities and
attractive physical features who would be interesting to date. Your friend must
first submit some basic personal information then complete a five-page
personality survey, and finally provide several recent photos. Would you advise
your friend to do this? Why or why not?
Answer:
Of course No, because this idea might not be
safe or good for the security of my friend. I could say that it’s not secure
enough because going into a date must be ask or planned personally by a group
or the person involve with it. By the situation, I rather find a guy who is
interested with my friend than letting her engage into an online service which
is basically unsafe for a reason that he or she didn’t know the background of
such person that my friend is going out with. As we all knew that there are lot
of online scam are spreading today which results in fooling a person and the
worst is into a crime. I don’t want to put my friends in danger. I care about
them and I disagree online services in identifying people who are interested to
her or him.
2. You are a
recent college graduate with only a year of experience with your employer. You
were recently promoted to manager of email services. You are quite surprised to
receive a phone call at home on a Saturday from the Chief Financial Officer of
the firm asking that you immediately delete all email from all email servers,
including the achieve and back-up servers that are older than six months. He
states that the reason for this request is that there have been an increasing
number of complaints about the slowness of email services. In addition, he says
he is concerned about the cost of storing so much email. This does not sound
right to you because you have taken several measures that have actually speeded
up email services. You recall a brief paragraph in the paper last week that
stated several suppliers were upset about what they called “prince fixing”
among the companies in you industry. What do you say to the Chief Financial
Officer?
Answer:
Just because he
is my Chief Financial Officer I will respect his request to delete all email
from all email services. And I also appreciate his concerned about that costing
of storing that email. But before that I ask first a permission to keep a copy
for future references before deleting it. Because what if someone look for a
certain email that one of the older.
3. You have 15
years of experience in sales and marketing with three different organizations.
You currently hold a middle management position and have been approach by a
headhunter to make a move to a company seeking a chief privacy officer. The
headhunter claims the position would represent a good move for you in your
career path and lead to an eventual vice president of marketing position. You
are not sure about the exact responsibilities of the CPO position or what
authority the person in this position would have at this particular company.
How would you go about evaluating this opportunity to determine if it actually
is a good career move or a dead end?
Answer:
In my 15 years of experience in sales and marketing is of course I want
to promote or improve my position. But before receiving or accepting that
position given to me, is I will evaluate first if it is good to me, what are
those responsibilities, if there are benefits or what are those benefits. And
if I deserve it, I will accept and I can say that it is the start of my good
career.
4. As the
information systems manager for a small manufacturing plant, you are
responsible for anything relating to the use of information technology. A new
inventory control system is being implemented to track the quantity and
movement of all finished products stored in a local warehouse. Each time a
forklift operator moves a case of product, he or she must first scan the
product identifier code on the case. The product information is captured, as is
the day, time and forklift operator identification number. This data is
transmitted over a local area network (LAN) to the inventory control computer,
which then displays information about the case and where it should be placed in
the warehouse.
The warehouse manager is excited
about using case movement data to monitor worker productivity. He will be able
to tell how many cases per shift each operator moves and he plans to use this
data to provide performance feedback that could result in pay increases or termination.
He has asked you if there are any potential problems with using the data in
this manner and, if so, what should be done to avoid them. How would you
respond?
Answer:
I think there is a problem regarding that data to
provide performance feedback that could result in pay increase or termination.
But it’s good that there is a performance feedback because it can help to you
to know where your time to adjust is. The problem is many data uses and too
much data are make slowness. And to avoid this is you provide performance
feedback in just a week, month, or year.
5. You have been
asked to help developed a company policy
on what should be done in the event of a data breach, such as unauthorized
access to your firm’s customer database,which contains some 1.5 million
records. What sort of process would you use to develop such a policy? What
resources would you call on?
Answer:
I will develop a company
policy that the unauthorized cant access just likes people who are not in that
certain company. And make a customer database that can store more than 1.5
millions of records that the process is fast. And if ever the process is slow
because of too much records, sort it with by letter, month or by year. Just
databases your policy in order to access or view quickly.
Walang komento:
Mag-post ng isang Komento