BSA 310 Week 2 DQ
1. Review Chapter 3 in the eBook. Apply Porter’s competitive forces model to your organization. Who are the new market entrants, substitute products, etc.
2. Review Chapter 4 in the eBook. Explain how informed consent, legislation, industry self-regulation, and technology tools help protect the individual privacy of Internet users.
Describe common threats against contemporary information systems in your organization. What can be done to mitigate the risks imposed
Security isn’t simply a technology issue, it’s a business issue. Discuss.
1. Review Chapter 3 in the eBook. Apply Porter’s competitive forces model to your organization. Who are the new market entrants, substitute products, etc.
2. Review Chapter 4 in the eBook. Explain how informed consent, legislation, industry self-regulation, and technology tools help protect the individual privacy of Internet users.
Describe common threats against contemporary information systems in your organization. What can be done to mitigate the risks imposed
Security isn’t simply a technology issue, it’s a business issue. Discuss.
0 comments:
Post a Comment