All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
understanding cross cultural management
Questions and Answers of
Understanding Cross Cultural Management
11. Do you feel that the policy describes practices that are a violation of personal privacy?
10. Does the policy clearly describe the way Google uses the information it collects?
9. What kinds of information were you surprised to learn that Google collected about users?
8. Is Google wrong to set limits on the use of public domain books it has digitized and stored in its database? Is this an example of anticompetitive behavior? Is it unethical?
7. Is Google infringing on the rights of authors and publishers when it includes their copyrighted work in its searchable database of books?
6. When Google cooperates with governments like China by restricting access to information available through its search engine, is it guilty of human rights violations (e.g., freedom of speech)? Is
5. Is Google’s collection of data for its Street View program unethical? What specific Street View data collection actions have created concern for users and regulatory agencies around the world?
4. Why is Google increasingly blamed for antitrust violations? Cite examples of business practices that are of concern to antitrust regulators around the world.
3. Describe how Google’s advertising model offers advertisers superior targeting capabilities compared to traditional advertising channels (e.g., television, radio, and print media).
2. Explain how Google’s PageRank™ algorithm led to search results that users found more helpful that those from earlier search engines.
1. How does Google’s advertising business require it to operate from the perspective of both a B2B and a B2C company?
Exclusionary conduct in mobile: Buying up companies in the mobile search area that present a nascent competitive threat, and imposing exclusivity restrictions in its Android licensing agreements to
Unfair treatment of advertisers: Manipulating advertisers’ quality scores to inflate ad prices and placing restrictions on its “must buy” ad platform that inhibit customers from using competing
Unauthorized content scraping: Stealing content developed by other web sites, such as user reviews, without permission and displaying that content on its own pages, sometimes even without attribution;
Search manipulation: Manipulating its search algorithm to exclude or penalize competing sites, effectively “disappearing” them from the Internet;
“Deceptive display: Steering users toward its own products by displaying them at the top or in the middle of the results page in ways that suggest to consumers that they are natural search results,
Google and Orkut—two social networking services. Orkut is very popular in countries like India and Brazil. Google is viewed by many as a direct competitor to Facebook(read more about Google in
Android Mobile Operating System—developed in partnership with other companies that form the Open Handset Alliance. Android is the most popular mobile OS globally(See Chapter 7).
Picasa—a photo organizing, editing and sharing service
Google Reader—one of the most popular RSS aggregators for subscribing to blogs and other syndicated web content.
Google Docs—a web-based document editor and collaboration tool.
YouTube—acquired in 2006, YouTube is now the largest video-sharing site on the Internet.
Google Analytics—a program for tracking and monitoring metrics and analytics associated with web site traffic.
Google Earth—a global mapping service that combines satellite imagery, 3D images of buildings and terrain, street-level photographs, user-submitted photos, and Google search.
Google Maps—a web mapping service that powers many map-based services such as the Google Maps web site, Google Maps mobile apps, and many third-party mashup applications through the Google Maps
Blogger—a blog publishing service.
Gmail—a free, advertising supported e-mail service.
Explain how e-business processes improve productivity, efficiency and competitive advantage for business organizations and the public sector (government and nonprofit organizations.)• Describe
5. Explain how the capability to remotely control machines creates a vulnerability or a problem in cyberwarfare?
4. Why is encryption needed?
3. What are the concerns of the Department of Homeland Security (DHS)?
2. What other resources are at risk? Why?
1. Explain why cars, appliances, and other devices not commonly associated with hacking can be hack targets.
4. Research and describe the latest developments in the Army or NSA’s mobile strategy. Does the Army still restrict their mobile strategy to Androids?
Explain your answer.
3. Do you agree that the Army and NSA deciding to allow the use of mobile technologies and to figure out how best to limit risks is encouraging news to the private sector?
2. What are the top three concerns of the DoD?
1. In your opinion, will the outcome of these Army and NSA projects have a big impact throughout government? On the private sector as well?
c. Explain any differences.
b. Which risks would be most dangerous to marketing firms?
a. Which risks would be most dangerous to financial institutions?
2. The SANS Institute publishes the Top CyberSecurity Risks at sans.org/top-cyber-security-risks/.
1. Research a botnet attack. Explain how the botnet works and what damage it causes.What preventive methods are offered by security vendors?
i. Does this incident indicate about how widespread hacking is? Explain your answer.Collaborative Work
h. What other resources are at risk?
g. Explain why cars and appliances can be hack targets.
f. What did the Chamber do to increase cybersecurity after learning of the intrusion and cybertheft?
e. What information could the hackers have gleaned from the intrusion of the Chamber?
d. What or whom did the hackers focus on? Why?
c. How serious was the intrusion, and when did it occur?
b. Draft a list of 3 cybersecurity warnings based on the video.
a. Briefly describe the key issues about the intrusion mentioned in the video.
2. View the video “China Hackers Attack U.S. Chamber of Commerce” dated December 21, 2011.The WSJ details a cyber attack against the U.S. Chamber of Commerce in which e-mails were stolen.
b. What can be done to prevent this type of intrusion from occurring again?
a. Explain the importance and the role of social engineering in this intrusion and cybertheft.
1. Review theWall Street Journal interactive graphic of“China Hackers Hit U.S. Chamber, Attacks Breached Computer System of Business-Lobbying Group; E-mails Stolen” dated December 21, 2011.The
10. Discuss why the Sarbanes–Oxley Act focuses on internal control. How does that focus influence infosec?Online Activities
9. Explain why risk management should involve the following elements: threats, exposure associated with each threat, risk of each threat occurring, cost of controls, and assessment of their
8. Some insurance companies will not insure a business unless the firm has a computer disaster recovery plan.Explain why.
7. Why is cybercrime expanding rapidly? Discuss some possible solutions.Evaluate and Expand Your Learning
6. Explain what firewalls protect and what they do not protect.
5. Why should information control and security be a top concern of management?
4. How can the risk of insider fraud be decreased?
3. Discuss the shift in motivation of criminals.
2. Many firms concentrate on the wrong questions and end up throwing a great deal of money and time at minimal security risks while ignoring major vulnerabilities.Why?
1. What are the dangers of BYOD to work, and how can they be minimized?
b. An improved firewall that is 99.9988 percent effective and that costs $84,000, with a life of 3 years and annual maintenance cost of $16,000, is available.Should this one be purchased instead of
a. Would you invest in the firewall? Explain.
A major firewall is proposed at a cost of$66,000 and a maintenance cost of $5,000.The estimated useful life is 3 years.The chance that an intruder will break through the firewall is 0.0002. In such a
4. Twenty-five thousand messages arrive at an organization each year. Currently there are no firewalls. On the average there are 1.2 successful hackings each year. Each successful hack attack results
3. Should an employer notify employees that their computer usage and online activities are being monitored by the company? Why or why not?
b. An insurance agent is willing to insure your facility for an annual fee of $15,000. Analyze the offer, and discuss whether to accept it.
a. Calculate the expected loss (in dollars).
2. Assume that the daily probability of a major earthquake in Los Angeles is .07 percent.The chance of your computer center being damaged during such a quake is 5 percent. If the center is damaged,
b. Assume your company has implemented a BYOD solution. Does your company have to encrypt all data that is accessible on employees own devices?
a. When are a company’s security measures sufficient to comply with its obligations? For example, does installing a firewall and using virus detection software satisfy a company’s legal
1. Managers need to determine how much their companies need to invest in cybersecurity to meet their legal obligations.Since there is no such thing as perfect security(i.e., there is always more that
IT and Data Management Decisions
7. What is the doctrine of due care?
6. How is expected loss calculated?
5. Why should Web sites be audited?
4. Explain why business continuity/disaster recovery (BC/DR) is not simply an IT security issue.
3. Identify two factors that influence a company’s ability to recover from a disaster.
2. List three issues a business continuity plan should cover.
1. Why do organizations need a business continuity plan?
Are there procedures to ensure reporting and corrective actions in case of violations of controls?
Are there procedures to ensure compliance with the controls?
Is there a clear separation of duties of employees?
Are the controls effective? That is, do they check the output of the system?
Are the controls implemented properly?
Which controls are not necessary?
Are there sufficient controls in the system? Which areas are not covered by controls?
The plan should be kept in a safe place; copies should be given to all key managers, or it should be available on the intranet.The plan should be audited periodically.
The plan should be written so that it will be effective in case of disaster, not just in order to satisfy the auditors.
All critical applications must be identified and their recovery procedures addressed in the plan.
Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current.
Planning should focus first on recovery from a total loss of all capabilities.
Recovery planning is part of asset protection. Every organization should assign responsibility to management to identify and protect assets within their spheres of functional control.
The purpose of a business continuity plan is to keep the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan.
3. List three symptoms or red flags of fraud that can be detected by internal controls.
Showing 1600 - 1700
of 3266
First
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Last