Filters
Question type

Study Flashcards

What are some of the best practices for handling information in HRM/HRIS? Please state 5 best practices for handling information in HRM/HRIS

Correct Answer

verifed

verified

-Adopt a comprehensive information secur...

View Answer

What are the information security and privacy considerations in the design, development and maintenance of HRIS?

Correct Answer

verifed

verified

Because of the power to access and use H...

View Answer

Information availability means that the individuals must be able to process and access personal information.

Correct Answer

verifed

verified

According to Kovach and Tansey (2000) ________ is one of the four elements of privacy that is defined as the right to have no public personal identity


A) Solitude
B) Anonymity
C) Intimacy
D) Reserve

Correct Answer

verifed

verified

Information security in HRIS pertains to protecting information in the HRIS from unauthorized access, use, disclosure, disruption, modification, or destruction.

Correct Answer

verifed

verified

Briefly list and describe the important goals/considerations of information security?

Correct Answer

verifed

verified

Three main goals of information security...

View Answer

All companies have been affected by computer-based fraud such as data processing or data entry routines that are modified.

Correct Answer

verifed

verified

Information privacy concerns come to play wherever personally identifiable information is collected, stored and used.

Correct Answer

verifed

verified

According to Kovach and Tansey (2000) ________ is one of the four elements of privacy that is defined as the right to be alone without disturbances.


A) Solitude
B) Anonymity
C) Intimacy
D) Reserve

Correct Answer

verifed

verified

_________ are best described as someone who accesses a computer or computer network unlawfully.


A) Hackers
B) Virus/worms/Trojans
C) Information thief
D) Disgruntled employees

Correct Answer

verifed

verified

If you were an HR manager how would you attempt to combat information security threats?

Correct Answer

verifed

verified

In order to manage these security threat...

View Answer

The Personal Information Protection and Electronic Document Act was enacted in __________to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances.


A) Canada
B) United States
C) European Union
D) South Korea

Correct Answer

verifed

verified

Integrity of information means data must be created, modified, or deleted only by authorized users.

Correct Answer

verifed

verified

Please list and briefly describe the four elements of privacy..

Correct Answer

verifed

verified

-Solitude: the right to be alone without...

View Answer

A hacker is defined as someone who accesses a computer or computer network unlawfully.

Correct Answer

verifed

verified

What is meant by information security in HRIS?

Correct Answer

verifed

verified

Information security in HRIS means prote...

View Answer

Which of the following is considered a common security threat?


A) Human error
B) Damage by employees
C) Hackers
D) All of the above

Correct Answer

verifed

verified

What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least 5 best practices that were discussed in class as well as in your textbook.

Correct Answer

verifed

verified

-Train users on how to securely use and ...

View Answer

According to Kovach and Tansey (2000) ________ is one of the four elements of privacy that is defined as the right to control one's personal information, including the methods of dissemination of that information


A) Solitude
B) Anonymity
C) Intimacy
D) Reserve

Correct Answer

verifed

verified

Showing 21 - 39 of 39

Related Exams

Show Answer