When financial institutions discover that their ISs (especially databases) have been broken into, they often do not report the event to law enforcement officers. Even if they know who the hacker is, they do what they can to avoid publicity. Why? Should they be forced to report such events?
Answer to relevant QuestionsGive three business examples (not mentioned in the text) of data that must be processed to provide useful information.Give two examples of phenomena that are a social concern because of information technology. Explain.We will soon stop talking of e-commerce and simply speak of commerce. Why?Refer to Chapter 1’s discussion of different types of information systems. Which types of ISs can gain strategic advantage and which cannot? Why? When hackers are caught, they often argue that they actually did a service to the organization whose system they accessed without permission; now, they say, the organization knows its system has a weak point, and it can take ...
Post your question