Discussion 11 Compromised Data
Despite government regulation regarding privacy and internet security, stories of compromised data and the security of IT are common place in today’s media. What experience do you have personally or of which you are aware in which IT system data was compromised? What was the outcome? What are the legal and ethical considerations for organizations when their data is compromised?
Today’s private and public organizations are increasingly dependent on information technologies for achieving their strategic and operational objectives. Over the past decade alone, enterprise systems have been expanded to provide secure, electronic linkages with suppliers and customers, and the Internet has become a mainstream channel for communications and business transactions. As a result, decision making about information technology resources has also become even more visible as the roles and accountabilities of the IS function have become important not only operationally but also strategically. The overall objectives and targeted audience for this edition remain the same as for the prior sixth edition: to provide comprehensive coverage of IS management practices and technology trends for advanced students and managers. Earlier editions of this textbook have been used for courses in MBA, MS in IS, and executive education programs, as well as in advanced undergraduate courses. We believe that our approach of providing both up-to-date chapter content and full-length case studies, written by the same authors, results in a unique set of materials for educators to customize for students seeking careers as business managers, IS managers, or IS specialists. NEW TO THIS EDITION • All 15 chapters in this edition have been revised to reflect up-to-date technology trends and state-of-the-art IS management practices. • The total number of chapters has been reduced from 17 to 15 to better match the semester schedules of many of our textbook adopters. • Overall topical coverage has been retained, but we have reduced some presentations of the content as follows: • Chapter 2 (Computer Systems) includes content from separate chapters on computer hardware and computer software in the sixth edition. • The content from Chapter 13 of the sixth edition has now been incorporated into two chapters in the seventh edition: The discussion of key characteristics of user-developed applications appears in Chapter 9 (Methodologies for Custom Software Development) and the discussion of support and control mechanisms for end-user computing appears in Chapter 13 (Leading the Information Systems Function). • The in-depth case studies in this edition include five completely new case studies and six that have been significantly revised. THE CHAPTER CONTENT Following an introductory chapter that sets the stage for learning about IS management roles and technology trends, the textbook chapters are presented in four parts: Part I—Information Technology provides background knowledge about major information technology components: hardware and software, networks, and data. Depending on the targeted audience, these chapters may be assigned as background readings as a kind of “level-setting” for students from different educational and work backgrounds and experiences. Part II—Applying Information Technology introduces in detail the capabilities of three categories of software applications: enterprise systems, managerial support systems, and e-business systems. Part III—Acquiring Information Systems prepares the reader for leading and participating in projects to design or select, implement, and support the utilization of software xvii applications—including methodologies for custom-developed systems and purchased software packages, as well as IT project management. Part IV—The Information Management System provides knowledge about effectively planning IS resources for the business, leading IS units responsible for provisioning these resources, and best practices for addressing information security, as well as larger social, legal, and ethical issues related to information technologies.