Kenneth C. Laudon,Jane P. Laudon Management Information System 12th Edition pdf



Download 15,21 Mb.
Pdf ko'rish
bet258/645
Sana20.01.2022
Hajmi15,21 Mb.
#393158
1   ...   254   255   256   257   258   259   260   261   ...   645
Bog'liq
Kenneth C. Laudon ( PDFDrive ) (1)

Sources:

Jennifer LeClaire, “Quattro Wireless to be Closed as

Apple Focuses on IAd,” 

Top Tech News

, August 20, 2010; Yukari

Iwatani Kane and Emily Steel, “Apple Fights Rival Google on New

Turf,” 


The Wall Street Journal

, April 8, 2010; Brad Stone and Miguel

Helft, “Apple’s Spat with Google Is Getting Personal,” 

The New York

Times

, March 12, 2010; Peter Burrows, “Apple vs. Google,”



BusinessWeek

, January 14, 2010; Holman W. Jenkins, Jr., 

“The Microsofting of Apple?”, 

The Wall Street Journal

, February 10,

2010; Jessica E. Vascellaro and Ethan Smith, “Google and Microsoft

Crank Up Rivalry,” 



The Wall Street Journal

, October 21, 2009;

Jessica E. Vascellaro and Don Clark, “Google Targets Microsoft’s

Turf,” 


The Wall Street Journal

, July 9, 2009; Miguel Helft, “Google

Set to Acquire AdMob for $750 Million,” 

The New York Times

,

November 10, 2009; Jessica E. Vascellaro, “Google Rolls Out New



Tools as it Battles Rival,” 

The Wall Street Journal

, December 8, 2009;

and Jessica E. Vascellaro and Yukari Iwatani Kane, “Apple, Google

Rivalry Heats Up,” 



The Wall Street Journal

, December 10, 2009.

CASE STUDY QUESTIONS

1. Compare the business models and areas of

strength of Apple, Google, and Microsoft.

2. Why is mobile computing so important to these

three firms? Evaluate the mobile platform

offerings of each firm. 

3. What is the significance of applications and app

stores to the success or failure of mobile computing?

4. Which company and business model do you think

will prevail in this epic struggle? Explain your

answer.

5. What difference would it make to you as a

manager or individual consumer if Apple, Google,

or Microsoft dominated the Internet experience?

Explain your answer.



LEARNING OBJECTIVES

S

After reading this chapter, you

will be able to answer the

following questions:

1.

Why are information systems vulnerable

to destruction, error, and abuse?

2.

What is the business value of security

and control?

3.

What are the components of an organi-

zational framework for security and

control?


4.

What are the most important tools and

technologies for safeguarding informa-

tion resources?



CHAPTER OUTLINE

8.1

SYSTEM VULNERABILITY AND ABUSE

Why Systems Are Vulnerable

Malicious Software: Viruses, Worms, Trojan Horses, and

Spyware


Hackers and Computer Crime 

Internal Threats: Employees

Software Vulnerability

8.2

BUSINESS VALUE OF SECURITY AND CONTROL

Legal and Regulatory Requirements for Electronic Records

Management

Electronic Evidence and Computer Forensics



8.3

ESTABLISHING A FRAMEWORK FOR SECURITY AND

CONTROL

Information Systems Controls

Risk Assessment 

Security Policy

Disaster Recovery Planning and Business Continuity

Planning


The Role of Auditing 

8.4


Download 15,21 Mb.

Do'stlaringiz bilan baham:
1   ...   254   255   256   257   258   259   260   261   ...   645




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish