1. Trang chủ
  2. » Luận Văn - Báo Cáo

Ebook Management information systems - Managing the digital firm (15/E): Part 1

363 297 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 363
Dung lượng 7,18 MB

Nội dung

Part 1 book “Management information systems - Managing the digital firm” has contents: Information systems in global business today, global e-business and collaboration, information systems, organizations, and strategy, ethical and social issues in information systems, foundations of business intelligence: databases and information management,… and other contents.

www.downloadslide.net GLOBAL EDITION Management Information Systems Managing the Digital Firm For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students with the best possible learning tools This Global Edition preserves the cutting-edge approach and pedagogy of the original, but also features alterations, customization, and adaptation from the North American version GLOBAL EDITION Management Information Systems Managing the Digital Firm  FIFTEENTH EDITION Kenneth C Laudon • Jane P Laudon FIFTEENTH EDITION Laudon Laudon G LO B A L EDITION This is a special edition of an established title widely used by colleges and universities throughout the world Pearson published this exclusive edition for the benefit of students outside the United States and Canada If you purchased this book within the United States or Canada, you should be aware that it has been imported without the approval of the Publisher or Author Pearson Global Edition Laudon_15_129221175X_Final.indd 27/04/17 1:42 PM www.downloadslide.net MANAGEMENT INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM FIFTEENTH EDITION GLOBAL EDITION Kenneth C Laudon New York University Jane P Laudon Azimuth Information Systems www.downloadslide.net VP Editorial Director: Andrew Gilfillan Senior Portfolio Manager: Samantha Lewis Content Development Team Lead: Laura Burgess Program Monitor: Ann Pulido/SPi Global Editorial Assistant: Michael Campbell Managing Editor, Global Edition: Steven Jackson Senior Project Editor, Global Edition: Daniel Luiz Manager, Media Production, Global Edition: M Vikram Kumar Senior Manufacturing Controller, Production, Global Edition: Trudy Kimber Product Marketing Manager: Kaylee Carlson Project Manager: Katrina Ostler/Cenveo® Publisher Services Text Designer: Cenveo® Publisher Services Cover Designer: Lumina Datamatics, Inc Cover Art: LIPING/Shutterstock Full-Service Project Management: Cenveo® Publisher Services Unattributed Figures and Chapter Opener Diagrams: Kenneth C Laudon, Jane P Laudon, Management Information Systems, 15 Ed., © 2018, Pearson Education, Inc., New York, NY Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose All such documents and related graphics are provided “as is” without warranty of any kind Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services The documents and related graphics contained herein could include technical inaccuracies or typographical errors Changes are periodically added to the information herein Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time Partial screen shots may be viewed in full within the software version specified Microsoft® Windows®, and Microsoft Office® are registered trademarks of Microsoft Corporation in the U.S.A and other countries This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2018 The rights of Kenneth C Laudon and Jane P Laudon to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Management Information Systems: Managing the Digital Firm, 15th edition, ISBN 978-0-13-463971-0, by Kenneth C Laudon and Jane P Laudon, published by Pearson Education © 2018 All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners ISBN 10: 1-292-21175-X ISBN 13: 978-1-292-21175-6 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 10 14 13 12 11 10 Typeset in 10.5/13 ITC Veljovic by Cenveo® Publisher Services Printed and bound by Vivar, Malaysia www.downloadslide.net About the Authors Kenneth C Laudon is a Professor of Information Systems at New York University’s Stern School of Business He holds a B.A in Economics from Stanford and a Ph.D from Columbia University He has authored 12 books dealing with electronic commerce, information systems, organizations, and society Professor Laudon has also written more than 40 articles concerned with the social, organizational, and management impacts of information systems, privacy, ethics, and multimedia technology Professor Laudon’s current research is on the planning and management of large-scale information systems and multimedia information technology He has received grants from the National Science Foundation to study the evolution of national information systems at the Social Security Administration, the IRS, and the FBI Ken’s research focuses on enterprise system implementation, computer-related organizational and occupational changes in large organizations, changes in management ideology, changes in public policy, and understanding productivity change in the knowledge sector Ken Laudon has testified as an expert before the United States Congress He has been a researcher and consultant to the Office of Technology Assessment (United States Congress), the Department of Homeland Security, and the Office of the President, several executive branch agencies, and Congressional Committees Professor Laudon also acts as an in-house educator for several consulting firms and as a consultant on systems planning and strategy to several Fortune 500 firms At NYU’s Stern School of Business, Ken Laudon teaches courses on Managing the Digital Firm, Information Technology and Corporate Strategy, Professional Responsibility (Ethics), and Electronic Commerce and Digital Markets Ken Laudon’s hobby is sailing Jane Price Laudon is a management consultant in the information systems area and the author of seven books Her special interests include systems analysis, data management, MIS auditing, software evaluation, and teaching business professionals how to design and use information systems Jane received her Ph.D from Columbia University, her M.A from Harvard University, and her B.A from Barnard College She has taught at Columbia University and the New York University Graduate School of Business She maintains a lifelong interest in Oriental languages and civilizations The Laudons have two daughters, Erica and Elisabeth, to whom this book is dedicated www.downloadslide.net Brief Contents PART ONE Organizations, Management, and the Networked Enterprise 29 Chapter Chapter Chapter Chapter Information Systems in Global Business Today 30 PART TWO Information Technology Infrastructure 191 Chapter Chapter IT Infrastructure and Emerging Technologies 192 Chapter Chapter Telecommunications, the Internet, and Wireless Technology 276 PART THREE Key System Applications for the Digital Age 363 Chapter Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 364 Chapter 10 Chapter 11 Chapter 12 E-commerce: Digital Markets, Digital Goods 398 PART FOUR Building and Managing Systems 513 Chapter 13 Chapter 14 Chapter 15 Building Information Systems 514 Glossary Indexes Global E-business and Collaboration 68 Information Systems, Organizations, and Strategy 106 Ethical and Social Issues in Information Systems 150 Foundations of Business Intelligence: Databases and Information Management 238 Securing Information Systems 320 619 631 Managing Knowledge 444 Enhancing Decision Making 480 Managing Projects 554 Managing Global Systems 588 www.downloadslide.net Complete Contents PART ONE Organizations, Management, and the Networked Enterprise 29 Chapter Information Systems in Global Business Today 30 Opening Case: Rugby Football Union Tries Big Data 31 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today? 33 How Information Systems Are Transforming Business 34 • What's New in Management Information Systems? 35 Interactive Session: Management The Mobile Pocket Office 37 Globalization Challenges and Opportunities: A Flattened World 39 • The Emerging Digital Firm 40 • Strategic Business Objectives of Information Systems 41 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? 44 What Is an Information System? 44 • Dimensions of Information Systems 46 Interactive Session: Technology Digital Transformation of Healthcare at Singapore's JurongHealth Services 51 It Isn't Just Technology: A Business Perspective on Information Systems 52 • Complementary Assets: Organizational Capital and the Right Business Model 54 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? 56 Technical Approach 56 • Behavioral Approach 57 • Approach of This Text: Sociotechnical Systems 58 Review Summary 59 • Key Terms 60 • Review Questions 60 • Discussion Questions 61 Hands-On MIS Projects 61 Collaboration and Teamwork Project 62 Case Study: Are Farms Becoming Digital Firms? 62 References: 66 www.downloadslide.net Contents Chapter Global E-business and Collaboration 68 Opening Case: Enterprise Social Networking Helps ABB Innovate and Grow 69 2-1 What are business processes? How are they related to information systems? 71 Business Processes 71 • How Information Technology Improves Business Processes 73 2-2 How systems serve the different management groups in a business, and how systems that link the enterprise improve organizational performance? 74 Systems for Different Management Groups 74 • Systems for Linking the Enterprise 79 Interactive Session: Organizations New Systems Help Plan International Manage Its Human Resources 80 E-business, E-commerce, and E-government 84 2-3 Why are systems for collaboration and social business so important, and what technologies they use? 85 What Is Collaboration? 85 • What Is Social Business? 86 • Business Benefits of Collaboration and Social Business 87 • Building a Collaborative Culture and Business Processes 87 • Tools and Technologies for Collaboration and Social Business 89 Interactive Session: Technology Collaborating the Glasscubes Way 91 2-4 What is the role of the information systems function in a business? 95 The Information Systems Department 96 • Organizing the Information Systems Function 97 Review Summary 98 • Key Terms 99 • Review Questions 99 • Discussion Questions 100 Hands-On MIS Projects 100 Collaboration and Teamwork Project 101 Case Study: Social Business: Full Speed Ahead or Proceed with Caution? 101 References: 104 Chapter Information Systems, Organizations, and Strategy 106 Opening Case: Tate & Lyle Devise a Global IT Strategy 107 3-1 Which features of organizations managers need to know about to build and use information systems successfully? 109 What Is an Organization? 110 • Features of Organizations 112 3-2 What is the impact of information systems on organizations? 117 Economic Impacts 117 • Organizational and Behavioral Impacts 118 Interactive Session: Management Can Technology Replace Managers? 120 The Internet and Organizations 122 • Implications for the Design and Understanding of Information Systems 122 www.downloadslide.net Contents 3-3 How Porter's competitive forces model, the value chain model, synergies, core competencies, and network economics help companies develop competitive strategies using information systems? 123 Porter's Competitive Forces Model 123 • Information System Strategies for Dealing with Competitive Forces 125 • The Internet's Impact on Competitive Advantage 128 • The Business Value Chain Model 129 Interactive Session: Technology Smart Products, Smart Companies 130 Synergies, Core Competencies, and Network-Based Strategies 134 3-4 What are the challenges posed by strategic information systems, and how should they be addressed? 138 Sustaining Competitive Advantage 138 • Aligning IT with Business Objectives 139 • Managing Strategic Transitions 140 Review Summary 140 • Key Terms 141 • Review Questions 141 • Discussion Questions 142 Hands-On MIS Projects 142 Collaboration and Teamwork Project 143 Case Study: Deutsche Bank: The Cost of Legacy Systems 144 References: 147 Chapter Ethical and Social Issues in Information Systems 150 Opening Case: The Dark Side of Big Data 151 4-1 What ethical, social, and political issues are raised by information systems? 153 A Model for Thinking About Ethical, Social, and Political Issues 155 • Five Moral Dimensions of the Information Age 156 • Key Technology Trends that Raise Ethical Issues 156 4-2 What specific principles for conduct can be used to guide ethical decisions? 158 Basic Concepts: Responsibility, Accountability, and Liability 159 • Ethical Analysis 160 • Candidate Ethical Principles 160 • Professional Codes of Conduct 161 • Some Real-World Ethical Dilemmas 161 4-3 Why contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? 162 Information Rights: Privacy and Freedom in the Internet Age 162 • Property Rights: Intellectual Property 169 4-4 How have information systems affected laws for establishing accountability and liability and the quality of everyday life? 172 Computer-Related Liability Problems 173 • System Quality: Data Quality and System Errors 174 • Quality of Life: Equity, Access, and Boundaries 174 Interactive Session: Technology Monitoring in the Workplace 178 Health Risks: RSI, CVS, and Cognitive Decline 180 Interactive Session: Organizations Are We Relying Too Much on Computers to Think for Us? 181 Review Summary 183 • Key Terms 184 • Review Questions 184 • Discussion Questions 185 Hands-On MIS Projects 185 www.downloadslide.net Contents Collaboration and Teamwork Project 186 Case Study: Facebook Privacy: What Privacy? 186 References: 190 PART TWO Information Technology Infrastructure 191 Chapter IT Infrastructure and Emerging Technologies 192 Opening Case: EasyJet Flies High with Cloud Computing 193 5-1 What is IT infrastructure, and what are the stages and drivers of IT infrastructure evolution? 195 Defining IT Infrastructure 195 • Evolution of IT Infrastructure 197 • Technology Drivers of Infrastructure Evolution 201 5-2 What are the components of IT infrastructure? 206 Computer Hardware Platforms 207 • Operating System Platforms 208 • Enterprise Software Applications 208 • Data Management and Storage 209 • Networking/Telecommunications Platforms 209 • Internet Platforms 209 • Consulting and System Integration Services 210 5-3 What are the current trends in computer hardware platforms? 210 The Mobile Digital Platform 210 Interactive Session: Technology Wearable Computers Change How We Work 211 Consumerization of IT and BYOD 212 • Quantum Computing 213 • Virtualization 213 • Cloud Computing 213 Interactive Session: Organizations Glory Finds Solutions in the Cloud 216 Green Computing 219 • High-Performance and Power-Saving Processors 220 5-4 What are the current computer software platforms and trends? 220 Linux and Open Source Software 220 • Software for the Web: Java, HTML, and HTML5 221 • Web Services and Service-Oriented Architecture 222 • Software Outsourcing and Cloud Services 224 5-5 What are the challenges of managing IT infrastructure and management solutions? 226 Dealing with Platform and Infrastructure Change 226 • Management and Governance 227 • Making Wise Infrastructure Investments 227 Review Summary 230 • Key Terms 231 • Review Questions 232 • Discussion Questions 232 Hands-On MIS Projects 232 Collaboration and Teamwork Project 233 Case Study: BYOD: Business Opportunity or Big Headache? 234 References: 237 Chapter Foundations of Business Intelligence: Databases and Information Management 238 Opening Case: BAE Systems 239 6-1 What are the problems of managing data resources in a traditional file environment? 241 www.downloadslide.net Contents File Organization Terms and Concepts 242 • Problems with the Traditional File Environment 243 6-2 What are the major capabilities of database management systems (DBMS), and why is a relational DBMS so powerful? 245 Database Management Systems 245 • Capabilities of Database Management Systems 248 • Designing Databases 250 • Non-relational Databases and Databases in the Cloud 253 6-3 What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 254 The Challenge of Big Data 254 • Business Intelligence Infrastructure 255 Interactive Session: Organizations Data-Driven Crime Fighting Goes Global 256 Analytical Tools: Relationships, Patterns, Trends 260 • Databases and the Web 263 6-4 Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 264 Establishing an Information Policy 264 • Ensuring Data Quality 265 Interactive Session: Management Societe Generale Builds an Intelligent System to Manage Information Flow 267 Review Summary 268 • Key Terms 269 • Review Questions 270 • Discussion Questions 270 Hands-On MIS Projects 270 Collaboration and Teamwork Project 272 Case Study: Lego's Enterprise Software Spurs Growth 272 References: 275 Chapter Telecommunications, the Internet, and Wireless Technology 276 Opening Case: Wireless Technology Makes Dundee Precious Metals Good as Gold 277 7-1 What are the principal components of telecommunications networks and key networking technologies? 279 Networking and Communication Trends 279 • What is a Computer Network? 280 • Key Digital Networking Technologies 282 7-2 What are the different types of networks? 285 Signals: Digital Versus Analog 285 • Types of Networks 285 • Transmission Media and Transmission Speed 287 7-3 How the Internet and Internet technology work, and how they support communication and e-business? 287 What is the Internet? 288 • Internet Addressing and Architecture 288 Interactive Session: Organizations The Battle over Net Neutrality 291 Internet Services and Communication Tools 293 Interactive Session: Management Monitoring Employees on Networks: Unethical or Good Business? 296 The Web 298 www.downloadslide.net 348 Part Two Information Technology Infrastructure Unified Threat Management Systems To help businesses reduce costs and improve manageability, security vendors have combined into a single appliance various security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software These comprehensive security management products are called unified threat management (UTM) systems UTM products are available for all sizes of networks Leading UTM vendors include Fortinent, Sophos, and Check Point, and networking vendors such as Cisco Systems and Juniper Networks provide some UTM capabilities in their products Securing Wireless Networks The initial security standard developed for Wi-Fi, called Wired Equivalent Privacy (WEP), is not very effective because its encryption keys are relatively easy to crack WEP provides some margin of security, however, if users remember to enable it Corporations can further improve Wi-Fi security by using it in conjunction with virtual private network (VPN) technology when accessing internal corporate data In June 2004, the Wi-Fi Alliance industry trade group finalized the 802.11i specification (also referred to as Wi-Fi Protected Access or WPA2) that replaces WEP with stronger security standards Instead of the static encryption keys used in WEP, the new standard uses much longer keys that continually change, making them harder to crack Encryption and Public Key Infrastructure Many businesses use encryption to protect digital information that they store, physically transfer, or send over the Internet Encryption is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver Data are encrypted by using a secret numerical code, called an encryption key, that transforms plain data into cipher text The message must be decrypted by the receiver Two methods for encrypting network traffic on the web are SSL and S-HTTP Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), enable client and server computers to manage encryption and decryption activities as they communicate with each other during a secure web session Secure Hypertext Transfer Protocol (S-HTTP) is another protocol used for encrypting data flowing over the Internet, but it is limited to individual messages, whereas SSL and TLS are designed to establish a secure connection between two computers The capability to generate secure sessions is built into Internet client browser software and servers The client and the server negotiate what key and what level of security to use Once a secure session is established between the client and the server, all messages in that session are encrypted Two methods of encryption are symmetric key encryption and public key encryption In symmetric key encryption, the sender and receiver establish a secure Internet session by creating a single encryption key and sending it to the receiver so both the sender and receiver share the same key The strength of the encryption key is measured by its bit length Today, a typical key will be 56 to 256 bits long (a string of from 56 to 256 binary digits) depending on the level of security desired The longer the key, the more difficult it is to break the key The downside is that the longer the key, the more computing power it takes for legitimate users to process the information www.downloadslide.net Chapter Securing Information Systems FIGURE PUBLIC KEY ENCRYPTION A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received The sender locates the recipient’s public key in a directory and uses it to encrypt a message The message is sent in encrypted form over the Internet or a private network When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message The problem with all symmetric encryption schemes is that the key itself must be shared somehow among the senders and receivers, which exposes the key to outsiders who might just be able to intercept and decrypt the key A more secure form of encryption called public key encryption uses two keys: one shared (or public) and one totally private as shown in Figure 8.6 The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key To send and receive messages, communicators first create separate pairs of private and public keys The public key is kept in a directory, and the private key must be kept secret The sender encrypts a message with the recipient’s public key On receiving the message, the recipient uses his or her private key to decrypt it Digital certificates are data files used to establish the identity of users and electronic assets for protection of online transactions (see Figure 8.7) A digital FIGURE DIGITAL CERTIFICATES Digital certificates help establish the identity of people or electronic assets They protect online transactions by providing secure, encrypted, online communication 349 www.downloadslide.net 350 Part Two Information Technology Infrastructure certificate system uses a trusted third party, known as a certificate authority (CA), to validate a user’s identity There are many CAs in the United States and around the world, including Symantec, GoDaddy, and Comodo The CA verifies a digital certificate user’s identity offline This information is put into a CA server, which generates an encrypted digital certificate containing owner identification information and a copy of the owner’s public key The certificate authenticates that the public key belongs to the designated owner The CA makes its own public key available either in print or perhaps on the Internet The recipient of an encrypted message uses the CA’s public key to decode the digital certificate attached to the message, verifies it was issued by the CA, and then obtains the sender’s public key and identification information contained in the certificate By using this information, the recipient can send an encrypted reply The digital certificate system would enable, for example, a credit card user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data Public key infrastructure (PKI), the use of public key cryptography working with a CA, is now widely used in e-commerce Ensuring System Availability As companies increasingly rely on digital networks for revenue and operations, they need to take additional steps to ensure that their systems and applications are always available Firms such as those in the airline and financial services industries with critical applications requiring online transaction processing have traditionally used fault-tolerant computer systems for many years to ensure 100 percent availability In online transaction processing, transactions entered online are immediately processed by the computer Multitudinous changes to databases, reporting, and requests for information occur each instant Fault-tolerant computer systems contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service Fault-tolerant computers use special software routines or self-checking logic built into their circuitry to detect hardware failures and automatically switch to a backup device Parts from these computers can be removed and repaired without disruption to the computer or downtime Downtime refers to periods of time in which a system is not operational Controlling Network Traffic: Deep Packet Inspection Have you ever tried to use your campus network and found that it was very slow? It may be because your fellow students are using the network to download music or watch YouTube Bandwith-consuming applications such as file-sharing programs, Internet phone service, and online video can clog and slow down corporate networks, degrading performance For example, Ball State University in Muncie, Indiana, found its network had slowed because a small minority of students were using P2P file-sharing programs to download movies and music A technology called deep packet inspection (DPI) helps solve this problem DPI examines data files and sorts out low-priority online material while assigning higher priority to business-critical files Based on the priorities established by a network’s operators, it decides whether a specific data packet can continue to its destination or should be blocked or delayed while more important traffic proceeds Using a DPI system from Allot Communications, Ball State was able to cap the amount of file-sharing traffic and assign it a much lower priority Ball State’s preferred network traffic sped up www.downloadslide.net Chapter Securing Information Systems Security Outsourcing Many companies, especially small businesses, lack the resources or expertise to provide a secure high-availability computing environment on their own They can outsource many security functions to managed security service providers (MSSPs) that monitor network activity and perform vulnerability testing and intrusion detection SecureWorks, AT&T, Verizon, IBM, Perimeter eSecurity, and Symantec are leading providers of MSSP services Security Issues for Cloud Computing and the Mobile Digital Platform Although cloud computing and the emerging mobile digital platform have the potential to deliver powerful benefits, they pose new challenges to system security and reliability We now describe some of these challenges and how they should be addressed Security in the Cloud When processing takes place in the cloud, accountability and responsibility for protection of sensitive data still reside with the company owning that data Understanding how the cloud computing provider organizes its services and manages the data is critical Cloud computing is highly distributed Cloud applications reside in large remote data centers and server farms that supply business services and data management for multiple corporate clients To save money and keep costs low, cloud computing providers often distribute work to data centers around the globe where work can be accomplished most efficiently When you use the cloud, you may not know precisely where your data are being hosted The dispersed nature of cloud computing makes it difficult to track unauthorized activity Virtually all cloud providers use encryption, such as SSL, to secure the data they handle while the data are being transmitted However, if the data are stored on devices that also store other companies’ data, it’s important to ensure that these stored data are encrypted as well According to research from Alert Logic, there has been a 45 percent year-over-year increase in attacks on the cloud DDoS attacks are especially harmful because they render cloud services unavailable to legitimate customers Companies expect their systems to be running 24/7 Cloud providers still experience occasional outages, but their reliability has increased to the point where a number of large companies are using cloud services for part of their IT infrastructures Most keep their critical systems in-house Cloud users need to confirm that regardless of where their data are stored, they are protected at a level that meets their corporate requirements They should stipulate that the cloud provider store and process data in specific jurisdictions according to the privacy rules of those jurisdictions Cloud clients should find how the cloud provider segregates their corporate data from those of other companies and ask for proof that encryption mechanisms are sound It’s also important to know how the cloud provider will respond if a disaster strikes, whether the provider will be able to restore your data completely, and how long this should take Cloud users should also ask whether cloud providers will submit to external audits and security certifications These kinds of controls can be written into the service level agreement (SLA) before signing with a cloud provider The Cloud Security Alliance (CSA) has created industrywide standards for cloud security, specifying best practices to secure cloud computing 351 www.downloadslide.net 352 Part Two Information Technology Infrastructure Securing Mobile Platforms If mobile devices are performing many of the functions of computers, they need to be secured like desktops and laptops against malware, theft, accidental loss, unauthorized access, and hacking attempts The Interactive Session on Technology describes these mobile vulnerabilities in greater detail and their implications for both individuals and businesses Mobile devices accessing corporate systems and data require special protection Companies should make sure that their corporate security policy includes mobile devices, with additional details on how mobile devices should be supported, protected, and used They will need mobile device management tools to authorize all devices in use; to maintain accurate inventory records on all mobile devices, users, and applications; to control updates to applications; and to lock down or erase lost or stolen devices so they can’t be compromised Data loss prevention technology can identify where critical data are saved, who is accessing the data, how data are leaving the company, and where the data are going Firms should develop guidelines stipulating approved mobile platforms and software applications as well as the required software and procedures for remote access of corporate systems The organization’s mobile security policy should forbid employees from using unsecured, consumer-based applications for transferring and storing corporate documents and files or sending such documents and files to oneself by e-mail without encryption Companies should encrypt communication whenever possible All mobile device users should be required to use the password feature found in every smartphone Mobile security products are available from Kaspersky, Symantec, Trend Micro, and McAfee Ensuring Software Quality In addition to implementing effective security and controls, organizations can improve system quality and reliability by employing software metrics and rigorous software testing Software metrics are objective assessments of the system in the form of quantified measurements Ongoing use of metrics allows the information systems department and end users to measure the performance of the system jointly and identify problems as they occur Examples of software metrics include the number of transactions that can be processed in a specified unit of time, online response time, the number of payroll checks printed per hour, and the number of known bugs per hundred lines of program code For metrics to be successful, they must be carefully designed, formal, objective, and used consistently Early, regular, and thorough testing will contribute significantly to system quality Many view testing as a way to prove the correctness of work they have done In fact, we know that all sizable software is riddled with errors, and we must test to uncover these errors Good testing begins before a software program is even written, by using a walkthrough—a review of a specification or design document by a small group of people carefully selected based on the skills needed for the particular objectives being tested When developers start writing software programs, coding walkthroughs can also be used to review program code However, code must be tested by computer runs When errors are discovered, the source is found and eliminated through a process called debugging You can find out more about the various stages of testing required to put an information system into operation in Chapter 13 Our Learning Tracks also contain descriptions of methodologies for developing software programs that contribute to software quality www.downloadslide.net Chapter Securing Information Systems 353 INTERACTIVE SESSION: TECHNOLOGY BYOD: A Security Nightmare? Bring your own device has become a huge trend, with half of employees with mobile computing tools at workplaces worldwide using their own devices This figure is expected to increase even more in the years to come But while use of the iPhone, iPad, and other mobile computing devices in the workplace is growing, so are security problems Quite a few security experts believe that smartphones and other mobile devices now pose one of the most serious security threats for organizations today Whether mobile devices are company-assigned or employee-owned, they are opening up new avenues for accessing corporate data that need to be closely monitored and protected Sensitive data on mobile devices travel, both physically and electronically, from the office to home and possibly other off-site locations According to a February 2016 Ponemon Institute study of 588 U.S IT and security professionals, 67 percent of those surveyed reported that it was certain or likely that an employee’s mobile access to confidential corporate data had resulted in a data breach Unfortunately, only 41 percent of respondents said their companies had policies for accessing corporate data from mobile devices More than half of security breaches occur when devices are lost or stolen That puts all of the personal and corporate data stored on the device, as well as access to corporate data on remote servers, at risk Physical access to mobile devices may be a greater threat than hacking into a network because less effort is required to gain entry Experienced attackers can easily circumvent passwords or locks on mobile devices or access encrypted data Moreover, many smartphone users leave their phones totally unprotected to begin with or fail to keep the security features of their devices up-to-date In the Websense and the Ponemon Institute’s Global Study on Mobility Risks, 59 percent of respondents reported that employees circumvented or disabled security features such as passwords and key locks Another worry today is large-scale data leakage caused by use of cloud computing services Employees are increasingly using public cloud services such as Google Drive or Dropbox for file sharing and collaboration Valiant Entertainment, Cenoric Projects, Vita Coco, and BCBGMAXAZRIAGROUP are among the companies allowing employees and freelance contractors to use Dropbox for Business to post and share files There are also many instances where employees are using Dropbox to store and exchange files without their employers’ approval In early 2015 Dropbox had to patch a security flaw that allowed cyberattackers to steal new information uploaded to accounts through compromised third-party apps that work with Dropbox services on Android devices There’s very little a company can to prevent employees who are allowed to use their smartphones from downloading corporate data so they can work on those data remotely Text messaging and other mobile messaging technologies are being used to deliver all kinds of scam campaigns, such as adult content and rogue pharmacy, phishing, and banking scams, and text messages have been a propagation medium for Trojan horses and worms A malicious source is now able to send a text message that will open in a mobile browser by default, which can be readily utilized to exploit the recipient To date, deliberate hacker attacks on mobile devices have been limited in scope and impact, but this situation is worsening Android is now the world’s most popular operating system for mobile devices with 81 percent of the global market, and most mobile malware is targeted at the Android platform When corporate and personal data are stored on the same device, mobile malware unknowingly installed by the user could find its way onto the corporate network Apple uses a closed “walled garden” model for managing its apps and reviews each one before releasing it on its App Store Android application security has been weaker than that for Apple devices, but it is improving Android application security uses sandboxing, which confines apps, minimizing their ability to affect one another or manipulate device features without user permission Google removes any apps that break its rules against malicious activity from Google Play, its digital distribution platform that serves as the official app store for the Android operating system Google also vets the backgrounds of developers Recent Android security enhancements include assigning varying levels of trust to each app, dictating what kind of data an app can access inside its confined domain, and providing a more robust way to store cryptographic credentials used to access sensitive information and resources www.downloadslide.net 354 Part Two Information Technology Infrastructure Google Play now provides security scanning of all applications before they are available to download, ongoing security checks for as long as the application is available, and a Verify Apps service for mobile device protection for apps installed outside of Google Play However, these Android improvements are largely only for people who use a phone or tablet running a newer version of Android and restrict their app downloads to Google’s own Play store Companies need to develop mobile security strategies that strike the right balance between improving worker productivity and effective information security Aetna’s Chief Security Officer (CSO) Jim Routh says there is a certain minimum level of mobile security he requires regardless of whether a device is company- or personally owned Aetna has about 6,000 users equipped with mobile devices that are either personally owned or issued by the company Each device has mandatory protection that provides an encrypted channel to use in unsecured Wi-Fi networks and alerts the user and the company if a malicious app is about to be installed on the device Colin Minihan, director of security and best practices at VMWare AirWatch, believes that understanding users and their needs helps a mobile security strategy progress further VmAirWatch categorizes similar groups of users and devises a specific plan of action for each group, choosing the right tools for the job According to Patrick Hevesi, Nordstrom’s former director of security, if users need access to critical corporate data that must be protected, the firm should probably allow only fully managed, fully controlled, approved types of devices Users who only want mobile tools for e-mail and contacts can more easily bring their own devices The key questions to ask are called the “three Ws”: Who needs access? What they need to access? What is the security posture of the device? Sources: Michael Heller, “Mobile Security Strategy Matures with BYOD,” and Kathleen Richards, “CISOs Battle to Control Mobile Risk in the Workplace,” Information Security Magazine, June 1, 2016; Nathan Olivarez-Giles, “Android’s Security Improves—for the Few,” Wall Street Journal, April 21, 2016; Ponemon Institute, “The Economic Risk of Confidential Data on Mobile Devices in the Workplace,” February, 2016; McAfee Inc., “Mobile Threat Report: What’s on the Horizon for 2016,” 2016; Charlie Osborne, “Dropbox Patches Android Security Flaw,” Zero Day, March 11, 2015; Edel Creely, “5 BYOD Security Implications and How to Overcome Them,” Trilogy Technologies, May 26, 2015; Tony Kontzer, “Most of Your Mobile Apps Have Been Hacked,” Baseline, January 16, 2015; and Ponemon Institute, Global Study on Mobility Risks (February 2012) CASE STUDY QUESTIONS It has been said that a smartphone is a computer in your hand Discuss the security implications of this statement What kinds of security problems mobile computing devices pose? What management, organizational, and technology issues must be addressed by smartphone security? What steps can individuals and businesses take to make their smartphones more secure? Review Summary 8-1 Why are information systems vulnerable to destruction, error, and abuse? Digital data are vulnerable to destruction, misuse, error, fraud, and hardware or software failures The Internet is designed to be an open system and makes internal corporate systems more vulnerable to actions from outsiders Hackers can unleash denial-of-service (DoS) attacks or penetrate corporate networks, causing serious system disruptions Wi-Fi networks can easily be penetrated by intruders using sniffer programs to obtain an address to access the resources of the network Computer viruses and worms can disable systems and websites The dispersed nature of cloud computing makes it difficult to track unauthorized activity or to apply controls from afar Software presents problems because software bugs may be impossible to eliminate and because software vulnerabilities can be exploited by hackers and malicious software End users often introduce errors www.downloadslide.net Chapter Securing Information Systems 8-2 What is the business value of security and control? Lack of sound security and control can cause firms relying on computer systems for their core business functions to lose sales and productivity Information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability Laws, such as HIPAA, the Sarbanes-Oxley Act, and the GrammLeach-Bliley Act, require companies to practice stringent electronic records management and adhere to strict standards for security, privacy, and control Legal actions requiring electronic evidence and computer forensics also require firms to pay more attention to security and electronic records management 8-3 What are the components of an organizational framework for security and control? Firms need to establish a good set of both general and application controls for their information systems A risk assessment evaluates information assets, identifies control points and control weaknesses, and determines the most cost-effective set of controls Firms must also develop a coherent corporate security policy and plans for continuing business operations in the event of disaster or disruption The security policy includes policies for acceptable use and identity management Comprehensive and systematic information systems auditing helps organizations determine the effectiveness of security and controls for their information systems 8-4 What are the most important tools and technologies for safeguarding information resources? Firewalls prevent unauthorized users from accessing a private network when it is linked to the Internet Intrusion detection systems monitor private networks for suspicious network traffic and attempts to access corporate systems Passwords, tokens, smart cards, and biometric authentication are used to authenticate system users Antivirus software checks computer systems for infections by viruses and worms and often eliminates the malicious software; antispyware software combats intrusive and harmful spyware programs Encryption, the coding and scrambling of messages, is a widely used technology for securing electronic transmissions over unprotected networks Digital certificates combined with public key encryption provide further protection of electronic transactions by authenticating a user’s identity Companies can use fault-tolerant computer systems to make sure that their information systems are always available Use of software metrics and rigorous software testing help improve software quality and reliability Key Terms Acceptable use policy (AUP), 341 Antivirus software, 347 Application controls, 337 Authentication, 344 Biometric authentication, 345 Botnet, 329 Bugs, 334 Business continuity planning, 343 Click fraud, 332 Computer crime, 330 Computer forensics, 336 Computer virus, 326 Controls, 323 Cybervandalism, 329 Cyberwarfare, 333 Deep packet inspection (DPI), 350 Denial-of-service (DoS) attack, 329 Digital certificates, 349 Disaster recovery planning, 342 Distributed denial-of-service (DDoS) attack, 329 Downtime, 350 Drive-by download, 327 Encryption, 348 Evil twin, 331 Fault-tolerant computer systems, 350 Firewall, 346 General controls, 337 Gramm-Leach-Bliley Act, 336 Hacker, 329 HIPAA, 335 Identity management, 341 Identity theft, 331 Information systems audit, 343 Intrusion detection systems, 347 Keyloggers, 328 Malware, 326 Managed security service providers (MSSPs), 351 Online transaction processing, 350 Password, 344 Patches, 334 Pharming, 331 Phishing, 331 Public key encryption, 348 Public key infrastructure (PKI), 350 355 www.downloadslide.net 356 Part Two Information Technology Infrastructure Ransomware, 328 Risk assessment, 338 Sarbanes-Oxley Act, 336 Secure Hypertext Transfer Protocol (S-HTTP), 348 Secure Sockets Layer (SSL), 348 Security, 323 Security policy, 341 Smart card, 345 Sniffer, 329 Social engineering, 333 Spoofing, 329 Spyware, 328 SQL injection attack, 328 Token, 344 Trojan horse, 328 Two-factor authentication, 345 Unified threat management (UTM), 348 War driving, 325 Worms, 326 Zero-day vulnerabilities, 334 MyLab MIS To complete the problems with the MyLab MIS, go to EOC Discussion Questions in the MyLab MIS Review Questions 8-1 Why are information systems vulnerable to destruction, error, and abuse? • List and describe the most common threats against contemporary information systems • Define malware and distinguish among a virus, a worm, and a Trojan horse • Define computer crime Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime • Define DoS and DDoS attacks and explain how they relate to botnets • Define identity theft and phishing and explain why identity theft is such a big problem today • Describe the security and system reliability problems employees create • Explain how software defects affect system reliability and security 8-2 What is the business value of security and control? • Explain how security and control provide value for businesses • Define and describe the techniques involved in computer forensics 8-3 What are the components of an organizational framework for security and control? • Define general controls and describe each type of general control • • • • • 8-4 Define application controls and describe each type of application control Describe the function of risk assessment and explain how it is conducted for information systems Define and describe the following: security policy, acceptable use policy, and identity management Distinguish between disaster recovery planning and business continuity planning Explain how information systems auditing promotes security and control What are the most important tools and technologies for safeguarding information resources? • Name and describe three authentication methods • Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security • Explain how encryption protects information • Describe the role of encryption and digital certificates in a public key infrastructure • Describe techniques companies use to ensure system availability • Identify and describe the security problems cloud computing poses • Describe measures for improving software quality and reliability www.downloadslide.net Chapter Securing Information Systems 357 Discussion Questions 8-5 Security isn’t simply a technology issue, it’s a business issue Discuss 8-6 If you were developing a business continuity MyLabMIS plan for your company, where would you start? What aspects of the business would the plan address? MyLabMIS 8-7 Suppose your business had an e-commerce website where it sold goods and accepted credit card payments Discuss the major security threats to this website and their potential impact What can be done to minimize these threats? MyLabMIS Hands-On MIS Projects The projects in this section give you hands-on experience analyzing security vulnerabilities, using spreadsheet software for risk analysis, and using web tools to research security outsourcing services Visit MyLab MIS’s Multimedia Library to access this chapter’s Hands-On MIS Projects Management Decision Problems 8-8 8-9 Reloaded Games is an online games platform that powers leading massively multiplayer online games The Reloaded platform serves more than 30 million users The games can accommodate millions of players at once and are played simultaneously by people all over the world Prepare a security analysis for this Internet-based business What kinds of threats should it anticipate? What would be their impact on the business? What steps can it take to prevent damage to its websites and continuing operations? A survey of your firm’s IT infastructure has identified a number of security vulnerabilities Review the data about these vulnerabilities, which can be found in a table in MyLab MIS Use the table to answer the following questions: • Calculate the total number of vulnerabilities for each platform What is the potential impact of the security problems for each computing platform on the organization? • If you only have one information systems specialist in charge of security, which platforms should you address first in trying to eliminate these vulnerabilities? Second? Third? Last? Why? • Identify the types of control problems these vulnerabilities illustrate and explain the measures that should be taken to solve them • What does your firm risk by ignoring the security vulnerabilities identified? Improving Decision Making: Using Spreadsheet Software to Perform a Security Risk Assessment Software skills: Spreadsheet formulas and charts Business skills: Risk assessment 8-10 This project uses spreadsheet software to calculate anticipated annual losses from various security threats identified for a small company Mercer Paints is a paint manufacturing company located in Alabama that uses a network to link its business operations A security risk assessment that management requested identified a number of potential exposures These exposures, their associated probabilities, and average losses are summarized in a table, which can be found in MyLab MIS Use the table to answer the following questions: • In addition to the potential exposures listed, identify at least three other potential threats to Mercer Paints, assign probabilities, and estimate a loss range • Use spreadsheet software and the risk assessment data to calculate the expected annual loss for each exposure • Present your findings in the form of a chart Which control points have the greatest vulnerability? What recommendations would you make to Mercer Paints? Prepare a written report that summarizes your findings and recommendations www.downloadslide.net 358 Part Two Information Technology Infrastructure Improving Decision Making: Evaluating Security Outsourcing Services Software skills: Web browser and presentation software Business skills: Evaluating business outsourcing services 8-11 This project will help develop your Internet skills in using the web to research and evaluate security outsourcing services You have been asked to help your company’s management decide whether to outsource security or keep the security function within the firm Search the web to find information to help you decide whether to outsource security and to locate security outsourcing services • Present a brief summary of the arguments for and against outsourcing computer security for your company • Select two firms that offer computer security outsourcing services and compare them and their services • Prepare an electronic presentation for management, summarizing your findings Your presentation should make the case of whether your company should outsource computer security If you believe your company should outsource, the presentation should identify which security outsourcing service you selected and justify your decision Collaboration and Teamwork Project Evaluating Security Software Tools 8-12 With a group of three or four students, use the web to research and evaluate security products from two competing vendors, such as for antivirus software, firewalls, or antispyware software For each product, describe its capabilities, for what types of businesses it is best suited, and its cost to purchase and install Which is the best product? Why? If possible, use Google Docs and Google Drive or Google Sites to brainstorm, organize, and develop a presentation of your findings for the class Information Security Threats and Policies in Europe CASE STUDY The IT sector is one of the key drivers of the European economy It has been estimated that 60 percent of Europeans use the Internet regularly Additionally, 87 percent own or have access to mobile phones In 2015, the European broadband market was one of the largest in the world These facts demonstrate the importance of ensuring the security and safe operation of the Internet for the well-being of the European economy However, the safety and security of the Internet have been threatened in recent years as Internet-based cyber attacks have become increasingly sophisticated In 2007, Estonia suffered a massive cyber attack that affected the government, the banking system, media, and other services The attack was performed using a variety of techniques, ranging from simple individual ping commands and message flooding to more sophisticated distributed denial-of-service (DDoS) attacks Hackers coordinated the attack by using a large number of compromised servers organized in a botnet distributed around the world A botnet is a network of autonomous malicious software agents that are under the control of a bot commander The network is created by installing malware that exploits the vulnerabilities of Web servers, operating systems, or applications to take control of the infected computers Once a computer is infected it becomes part of a network of thousands of “zombies”; that is, machines that are commanded to carry out the attack The cyber attack on Estonia started in late April 2007 and lasted for almost weeks During this period, vital parts of the Estonian Internet network had to be closed from access from outside the country, causing millions of dollars in economic losses At around the same time, Arsys, an important Spanish domain registration company, was also targeted by international hackers Arsys reported that hackers had stolen codes that were then used to insert links to external servers containing malicious codes in the Web pages of some of its clients www.downloadslide.net Chapter Securing Information Systems In 2009, an estimated 10 million computers were infected with the Conficker worm worldwide France, the United Kingdom, and Germany were among the European countries that suffered the most infections The French navy had to ground all military planes when it was discovered that its computer network was infected In the United Kingdom, the worm infected computers in the Ministry of Defence, the city of Manchester’s city council and police IT network, some hospitals in the city of Sheffield, and other government offices across the country Computers in the network of the German army were also reported as infected Once installed on a computer, Conficker is able to download and install other malware from controlled websites, and thus infected computers could be under full control of the hackers More recently, a sophisticated malware threat targeting industrial systems was detected in Germany, Norway, China, Iran, India, Indonesia, and other countries The malware, known as Stuxnet, infected Windows PCs running the Supervisory Control and Data Acquisition (SCADA) control system from the German company Siemens Stuxnet was propagated via USB devices Experts estimated that up to 1,000 machines were infected on a daily basis at the peak of the infection The malware, hidden in shortcuts to executable programs (files with extension lnk), was executed automatically when the content of an infected USB drive was displayed Employing this same technique, the worm was capable of installing other malware Initially, security experts disclosed that Stuxnet was designed to steal industrial secrets from SIMATIC WinCC, a visualization and control software system from Siemens However, data gathered later by other experts indicates that the worm was actually looking for some specific programmable logic controller (PLC) devices used in a specific industrial plant, a fact that points to the possibility that the malware was part of a well-planned act of sabotage Even though none of the sites infected with Stuxnet suffered physical damage, the significance that such a sophisticated threat represents to the industrial resources in Europe and other parts of the world cannot be underestimated Europe has been the location of some large cyberattacks and data breaches in 2015 Among the targets were TalkTalk (a large ISP in the United Kingdom), J.D 359 Witherspoon (a pub chain), and CarphoneWarehouse com (an online store) In each case hundreds of thousands of customers had their personal data compromised Infrastructure is also a target in Europe In April 2015 hackers vandalized TV5Monde in France, taking down 11 TV channels, parts of its Web site, and its social media site as well The action was allegedly carried out by Middle Eastern terrorist groups To overcome the absence of cooperation among EU states, in 2004 the European Commission established the European Network and Information Security Agency (ENISA) with the goal of coordinating efforts to prevent and respond more effectively to potentially more harmful security threats ENISA’s main objectives are to secure Europe’s information infrastructure, promote security standards, and educate the general public about security issues The European Commission has recently launched the Digital Agenda for Europe The goal of this initiative is to define the key role that information and communication technologies will play in 2020 The initiative calls for a single, open European digital market Prior to 2015, there was no common approach to digital network breaches, hacks, or vandalism In 2016, the European Parliament adopted the NIS Directive on security of network and information systems The Directive came into force in August 2016 Member states were given 21 months to transpose the Directive into their national laws and months more to identify operators of essential services The NIS Directive requires EU nations to develop a Computer Security Incident Response Team (CSIRT) and a national NIS authority to identify essential services that could be imperiled by security breaches The new law also sets cybersecurity standards across a wide range of government agencies such as airports, transportation centers, and government offices For the first time, Europe has developed a coordinated approach to cyber security Sources: European Commission, “The Directive on Security of Network and Information Systems,” ec.europa.eu, July 16, 2016; Bob Tarzey, “At Least in Europe Enterprises Lose Data Through Targeted Cyber Attacks,” Computer Weekly, December 18, 2015; “Europe Agrees Response to Cyber-attacks,” BBC News, December 2015; Gunther Oettinger, “New EU Rules Agreed on Cyber Security Breaches,” DW.com, December 8, 2015; Don Melvin, www.downloadslide.net 360 Part Two Information Technology Infrastructure “Cyberattack Disables 11 French TV Channels, Takes Over Social Media Sites,” Don Melvin, CNN, April 9, 2015; European Commission, “Network and Information Security (NIS) Directive,” Digital Agenda For Europe, European Commission, March 16, 2015 CASE STUDY QUESTIONS 8-13 What is a botnet? 8-14 Describe some of the main points of the Network and Information Security (NIS) Directive 8-15 Explain how a cyberattack can be carried out 8-16 Describe some of the weaknesses exploited by malware Case contributed by Daniel OrtizArroyo, Aalborg University MyLab MIS Go to the Assignments section of MyLab MIS to complete these writing exercises 8-17 Describe three spoofing tactics employed in identity theft by using information systems 8-18 Describe four reasons mobile devices used in business are difficult to secure www.downloadslide.net Chapter Securing Information Systems 361 Chapter References Bajaj, Vikas “The Perils of Automated Flight.” New York Times (April 30, 2015) Boss, Scott R., Dennis F Galletta, Paul Benjamin Lowry, Gregory D Moody, and Peter Polak “What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors MIS Quarterly 39, No (December 2015) Boyle, Randall J and Raymond R Panko Corporate Computer Security (4th ed.) Upper Saddle River, NJ: Prentice-Hall (2015) Chen, Yan and Fatemeh Mariam Zahedi “Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China” MIS Quarterly 40, No (March 2016) Chen, Yan, K Ram Ramamurthy, and Kuang-Wei Wen “Organizations’ Information Security Policy Compliance: Stick or Carrot Approach?” Journal of Management Information Systems 29, No (Winter 2013) CSA Top Threats Working Group “The Treacherous Twelve: CSA’s Cloud Computing Top Threats in 2016.” Cloud Security Alliance (February 2016) FireEye “Out of Pocket: A Comprehensive Mobile Threat Assessment of Million iOS and Android Apps.” (February 2015) Focus Research “Devastating Downtime: The Surprising Cost of Human Error and Unforeseen Events.” (October 2010) Galbreth, Michael R and Mikhael Shor “The Impact of Malicious Agents on the Enterprise Software Industry.” MIS Quarterly 34, No (September 2010) Hui, Kai Lung, Wendy Hui and Wei T Yue “Information Security Outsourcing with System Interdependency and Mandatory Security Requirement.” Journal of Management Information Systems 29, No (Winter 2013) Javelin Strategy & Research “2016 Identity Fraud Study.” (February 2, 2016) Kaplan, James, Chris Rezek, and Kara Sprague “Protecting Information in the Cloud.” McKinsey Quarterly (January 2013) Karlovsky, Brian “FireEye Names Malware’s Favorite Targets, Sources.” Australian Reseller News (March 2, 2014) Kirk, Jeremy “Pushdo Spamming Botnet Gains Strength Again.” IDG News Service (April 20, 2015) Osterman Research “The Risks of Social Media and What Can Be Done to Manage Them.” Commvault (June 2011) Paletta, Damian, Danny Yadron, and Jennifer Valentino-Devries “Cyberwar Ignites a New Arms Race.” Wall Street Journal (October 11, 2015) Panda Security “PandaLabs 2015 Annual Report.” (January 28, 2016) Panko, Raymond R and Julie L Panko Business Data Networks and Security Upper Saddle River, NJ: Pearson (2015) Perlroth, Nicole “Online Attacks on Infrastructure Are Increasing at a Worrying Pace,” New York Times (October 1, 2015) Ponemon Institute “2015 Cost of Cybercrime Study: United States” (October 9, 2015) “2015 Cost of Data Breach Study: United States” (2015) “The Cost of Malware Containment” (January 2015) Poremba, Sue Marquette “Hackers Targeting the Cloud at Higher Rates Than Ever.” IT Business Edge (October 15, 2015) Posey, Clay, Tom L Roberts, and Paul Benjamin Lowry “The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets.” Journal of Management Information Systems 32 No (2015) Reisinger, Don “Android Security Remains a Glaring Problem: 10 Reasons Why.” eWeek (March 2, 2014) Ribeiro, John “Hacker Group Targets Skype Social Media Accounts,” Computer World (January 2, 2014) Sadeh, Norman M “Phish Isn’t Spam.” Information Week (June 25, 2012) Samuel, Alexandra “Online Security as Herd Immunity.” Harvard Business Review (March 13, 2014) Scharr, Jill “Fake Instagram ‘Image Viewers’ Are Latest Malware Fad.” Tom’s Guide (May 8, 2014) Schwartz, Matthew J “Android Trojan Looks, Acts Like Windows Malware.” Information Week (June 7, 2013) Sen, Ravi and Sharad Borle “Estimating the Contextual Risk of Data Breach: An Empirical Approach.” Journal of Management Information Systems 32, No (2015) Sengupta, Somini “Machines That Know You Without Using a Password.” New York Times (September 10, 2013) Snell, Bruce “Mobile Threat Report.” McAfee Inc (2016) Solutionary “Solutionary Security Engineering Research Team Unveils Annual Global Threat Intelligence Report.” (March 12, 2013) Spears, Janine L and Henri Barki “User Participation in Information Systems Security Risk Management.” MIS Quarterly 34, No (September 2010) Temizkan, Orcun, Ram L Kumar, Sungjune Park, and Chandrasekar Subramaniam “Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis “ Journal of Management Information Systems 28, No (Spring 2012) Thompson, Jadiann “Scam Alert: Two Clicks on Facebook Could Leak All Your Personal Info to an International Scammer.” Kshb.com (April 30, 2015) Vance, Anthony, Paul Benjamin Lowry, and Dennis Eggett “Using Accountability to Reduce Access Policy Violations in Information Systems.” Journal of Management Information Systems 29, No (Spring 2013) Verizon “2016 Data Breach Investigations Report.” (2016) Wakida, Clayton “Anonymous Accused of Hacking TMT Web Site.” KMTV.com (April 27, 2015) Wang, Jingguo, Manish Gupta, and H Raghav Rao “Insider Threats in a Financial Institution: Analysis of AttackProneness of Information Systems Applications.” MIS Quarterly 39, No (March 2015) Young, Carl S “The Enemies of Data Security: Convenience and Collaboration.” Harvard Business Review (February 11, 2015) Zhao, Xia, Ling Xue, and Andrew B Whinston “Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements.” Journal of Management Information Systems 30, No (Summer 2013) www.downloadslide.net This page intentionally left blank ... nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners ISBN 10 : 1- 2 9 2-2 11 75-X ISBN 13 : 97 8 -1 -2 9 2-2 11 7 5-6 British Library Cataloguing-in-Publication... Chapter 10 Chapter 11 Chapter 12 E-commerce: Digital Markets, Digital Goods 398 PART FOUR Building and Managing Systems 513 Chapter 13 Chapter 14 Chapter 15 Building Information Systems 514 Glossary... 19 88 Authorized adaptation from the United States edition, entitled Management Information Systems: Managing the Digital Firm, 15 th edition, ISBN 97 8-0 -1 3-4 6397 1- 0 , by Kenneth C Laudon and Jane

Ngày đăng: 03/02/2020, 19:41

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w