Question: Question 8 3 pts Expert systems are designed to mimic the skills of a human expert so more people can benefit from that expertise without

Question 8 3 pts

Expert systems are designed to mimic the skills of a human expert so more people can benefit from that expertise without having to pay the high cost associated with using the services of a human expert. Which of the following is an example of an organization using an expert system that provides a direct benefit to their customers?

The University of Kentucky developed an expert system to teach math and evaluate students math skills so that students could learn and demonstrate required math skills without having to take traditional courses that would cost them more in tuition.

IBM developed an expert system to assist in training their technicians which has resulted in reduced training time. Since IBM must pay their technicians to go through training but the technicians are not earning money for the company while they are in training the expert system provides IBM with significant cost savings.

The Internal Revenue Service has developed expert systems to evaluate tax returns and identify mistakes or missing information on those returns. This has resulted in increased tax revenues for the Federal government while reducing the IRSs labor costs.

Campbells Soup Company developed an expert system to capture expertise that a highly specialized, long-time employee had about plant operations and sterilizing techniques. This allowed the company to pass that knowledge on to new employees even after the expert employee retired.

Question 9 3 pts

Customer relationship management (CRM) consists of the processes a company uses to track and organize its contacts with customers, which includes marketing, sales, and customer service. Which of the following is an example of how a CRM system would directly benefit a companys customers?

Kroger uses loyalty cards to track customers purchases and shopping patterns, which enables them to better manage their store inventory. This results in reduced spoilage which translates to cost savings for the organization.

Kroger uses loyalty cards to track customers purchases and shopping patterns. This enables Kroger to provide customers with personalized discounts and promotions, which saves Kroger shoppers time previously spent looking through generic coupon flyers.

Kroger uses loyalty cards to track customers purchases and shopping patterns and they sell that information to other businesses, which provides Kroger with an additional revenue stream.

Kroger uses loyalty cards to track customers purchases and shopping patterns. This has potential benefits but also opens up the potential for customer data to be compromised through weak security.

Question 10 3 pts

Privacy laws for private organizations in the US are not very restrictive, but most organizations are sensitive to privacy issues and fairness. Which of the following statements focuses on the impact to customers of a privacy breach involving customer information?

A privacy breach involving customer information could damage an organization's reputation leading to lost revenues and profits.

A privacy breach involving customer information could lead to identity theft if the exposed information enabled new lines of credit to be opened.

A privacy breach involving customer information could cause business partners to distance themselves from breach fallout by not renewing partnership contracts.

A privacy breach involving customer information could expose the business to litigation and other legal penalties.

Question 11 3 pts

Laws do not provide a complete guide to ethical behavior. Just because an activity is defined as legal does not mean that it is ethical. As a result, practitioners in many professions subscribe to a(n) ____________, which states the principles and core values that are essential to their work and, therefore, govern their behavior. For the Association of Computing Machinery (ACM), it includes eight moral imperatives that can be used to help guide the actions of IS professionals including: avoid harm to others, give proper credit for intellectual property, and honor confidentiality.

ethical/legal framework

code of ethics

code of civil procedure

immoral code of conduct

Question 12 3 pts

All of the following are behaviors that users should engage in to protect their organization's information system, EXCEPT:

Creating strong passwords that are difficult to guess

Sharing passwords with other people to complete work tasks in a timely manner

Reporting unusual activity to the organization's IT security group

Keeping systems updated with the most current version of firewall, anti-virus, and anti-malware software

Question 13 3 pts

Bring your own device (BYOD) is a businesss policy that permits, and in some cases encourages, employees to use their own mobile devices to access company computer resources and applications, including email, corporate databases, the corporate intranet, and the Internet. Which of the following is a security concern for BYOD?

It improves employee productivity by allowing workers to use devices with which they are already familiar.

It helps create an image of a company as a flexible and progressive employer.

It is highly likely that such devices are also used for nonwork activity that exposes them to malware much more frequently than a device used strictly for business purposes.

It reduces the likelihood of employees making mistakes because they do not have to learn to use a new device just to complete work tasks.

Question 14 3 pts

Information systems professionals must build and maintain systems that are reliable and secure. Business professionals and other employees also have responsibilities when using information systems that include ________________________.

reprogramming systems to meet changing business needs

creating new databases and data warehouses to enhance the organization's knowledge

building and configuring additional networks to extend the reach of the organization

protecting the security of the system and its data by not engaging in risky behaviors

Question 15 3 pts

Which of the following is an example of an employee engaging in an intentional threat to information security?

A programmer codes a backdoor in the timeclock program she is developing for her company so she can later access the program to adjust her clock-in and clock-out times.

The IT department creates a data entry procedure manual that inadvertently includes a procedural error which, if followed, will result in the deletion of customer data.

An HR manager searches the Internet for information on trends in hiring practices and downloads a PDF that contains a virus which turns her work computer into a bot.

An employee misses a training class on a new work process because of illness and as a result continues to use the old work process which results in some lost sales.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!