Question

Answer All Questions.
Anwer with proper definations and clearly statated explainations with references and bibliography.
11.(a) Define and contrast between the terms ESS and DSS

11.(b) Define and contrast between the terms knowledge worker and data worker
12.(a) Describe two fundamental differences between data controller and data subject

12.(b) Define and contrast between the terms Telecommuting and video conferencing
13.(a) Provide four problems associated with using internet

13.(b) Compare and contrast between the terms intranet and extranet
14. (a) List and briefly explain any four IEEE code of ethics

14. (b) There are many types of information and computer security. List and explain at least four of them.
15. (a) Discuss with examples the any four threats to an information systems

15. (b) Why should certain duties be segregated between staff members in computer security

Answers

Answered by GPT-4o mini
Here's a comprehensive response to your questions, with definitions, explanations, and references included.

---

### 11. (a) Define and contrast the terms ESS and DSS

**Definition:**
- **Executive Support System (ESS):** An Executive Support System is a type of information system that provides senior management with easy access to internal and external information relevant to their strategic decisions. ESS often includes data visualization tools that help managers synthesize large amounts of data quickly.
- **Decision Support System (DSS):** A Decision Support System is a computer-based information system that aids the decision-making process by providing relevant data, DSS often incorporates advanced analytical tools, models, and simulations that help managers analyze complex scenarios.

**Contrast:**
1. **User Base:** ESS is primarily designed for top-level executives, while DSS caters to middle and operational management.
2. **Functionality and Complexity:** ESS focuses on high-level strategic decisions guided by dashboards and KPIs (Key Performance Indicators), while DSS provides deeper analytical capabilities to support complex decision-making processes across various scenarios.

**Reference:**
Turban, E., Sharda, R., & Delen, D. (2010). Decision Support Systems and Intelligent Systems. Pearson.

---

### 11. (b) Define and contrast the terms knowledge worker and data worker

**Definition:**
- **Knowledge Worker:** A knowledge worker is someone who uses their expertise, intellectual capabilities, and problem-solving skills to analyze information, develop strategies, and create knowledge-based products. Examples include doctors, engineers, and software developers.
- **Data Worker:** A data worker is someone whose primary job involves handling and processing data rather than creating knowledge. Their tasks usually involve data entry, computation, and routine information processing. Examples include clerks and data entry personnel.

**Contrast:**
1. **Nature of Work:** Knowledge workers create and disseminate knowledge, while data workers mainly manage and process existing data.
2. **Skill Requirement:** Knowledge workers require higher levels of education and specialized skills, while data workers typically require less formal education and specific administrative skills.

**Reference:**
Davenport, T. H. (2005). Thinking for a Living: How to Get Better Performance and Results from Knowledge Workers. Harvard Business Review Press.

---

### 12. (a) Describe two fundamental differences between data controller and data subject

**Definition:**
- **Data Controller:** A data controller is an entity (individual or organization) that determines the purposes and means of processing personal data. They are responsible for ensuring that the processing complies with legal requirements.
- **Data Subject:** A data subject is an individual whose personal data is being processed by a data controller. They have certain rights regarding their data under data protection laws.

**Differences:**
1. **Role in Data Processing:** The data controller decides how and why to process personal data, while the data subject is the person whose data is being processed and has rights to access and modify it.
2. **Responsibilities:** Data controllers have legal obligations to protect the data and ensure compliance with data protection regulations, whereas data subjects have rights, including the right to access their data and request its deletion.

**Reference:**
GDPR (General Data Protection Regulation). (2016). EU Regulation 2016/679.

---

### 12. (b) Define and contrast the terms Telecommuting and video conferencing

**Definition:**
- **Telecommuting:** Telecommuting, also known as remote work, is a working arrangement where employees work outside a traditional office environment, often from home, using technology to communicate with their employer and colleagues.
- **Video Conferencing:** Video conferencing refers to a technology that allows individuals or groups in separate locations to communicate in real-time using video and audio transmissions over the internet.

**Contrast:**
1. **Nature of Interaction:** Telecommuting encompasses a broader work arrangement including work hours, productivity, and tasks outside the office, while video conferencing is a method of communication, primarily focused on meetings and discussions.
2. **Technology Dependency:** Telecommuting relies on various tools such as email, project management software, and communication apps, while video conferencing primarily depends on specialized software like Zoom, Microsoft Teams, or Skype.

**Reference:**
Bailey, D. E., & Kurland, N. B. (2002). A Review of the Telecommuting Literature: Current Findings and Future Directions. *Personnel Psychology*, 55(3), 601-632.

---

### 13. (a) Provide four problems associated with using the internet

1. **Security Threats:** Personal and financial information can be compromised through hacking, phishing, and malware attacks.
2. **Privacy Concerns:** Users may be tracked and monitored online, often without their consent, leading to data leaks and misuse.
3. **Information Overload:** The vast amount of information available can lead to difficulty in discerning credible sources and finding relevant content, resulting in confusion.
4. **Digital Addiction:** The internet can lead to addictive behaviors, impacting productivity and mental health.

**Reference:**
Khan, M. A. (2020). Internet Security Issues and Challenges: A Survey. *International Journal of Computer Applications*, 975, 8887.

---

### 13. (b) Compare and contrast the terms intranet and extranet

**Definition:**
- **Intranet:** An intranet is a private network accessible only to an organization's staff. It is used to share company information and computing resources securely.
- **Extranet:** An extranet is an extension of an intranet that allows controlled access to outsiders, such as partners, vendors, or customers, facilitating collaboration and information sharing beyond the organization.

**Contrast:**
1. **Accessibility:** Intranets are restricted to internal users only, while extranets offer controlled access to external users as well.
2. **Purpose:** Intranets are primarily used for internal communication and resource sharing, while extranets facilitate collaboration with external stakeholders and enhance partnership engagement.

**Reference:**
O’Brien, J. A., & Marakas, G. M. (2011). Management Information Systems. McGraw-Hill.

---

### 14. (a) List and briefly explain any four IEEE code of ethics

1. **Public Safety:** Engineers should hold paramount the safety, health, and welfare of the public.
2. **Avoid Harm:** A commitment to avoiding harm to others extends beyond the workplace and community.
3. **Integrity:** Engineers should act with integrity and honesty in all professional matters.
4. **Fairness and Justice:** Engineers should treat all persons fairly, without discrimination, and promote equitable treatment in all professional environments.

**Reference:**
IEEE Code of Ethics. Institute of Electrical and Electronics Engineers. Retrieved from [IEEE Website](https://www.ieee.org/about/corporate/governance/p7-8.html).

---

### 14. (b) There are many types of information and computer security. List and explain at least four of them.

1. **Network Security:** Protects computer networks from breaches, intrusions, and other threats by implementing hardware and software measures.
2. **Application Security:** Ensures that software applications are secure from vulnerabilities and breaches by using secure coding practices and regular updates.
3. **Information Security:** Focuses on protecting data integrity, confidentiality, and availability, encompassing data at rest and in transit, using various encryption and access control methods.
4. **Endpoint Security:** Protects end-user devices such as computers and mobile devices from threats by limiting access and ensuring that these endpoints are secure.

**Reference:**
Stallings, W. (2015). Computer Security: Principles and Practice. Pearson.

---

### 15. (a) Discuss with examples any four threats to an information system

1. **Malware:** Malicious software, such as viruses and ransomware, that can corrupt files or lock users out of their systems. Example: WannaCry ransomware attack that affected thousands of computers worldwide.
2. **Phishing:** A deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity in electronic communications. Example: Fake emails mimicking bank notifications requesting login credentials.
3. **Insider Threats:** Current or former employees who exploit their access to harm the organization. Example: An employee leaking confidential company data to competitors.
4. **Denial of Service (DoS):** Attacks that overwhelm a system or network, making it unavailable to its intended users. Example: A DDoS attack causing a website to crash due to a flood of internet traffic.

**Reference:**
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.

---

### 15. (b) Why should certain duties be segregated between staff members in computer security

Segregation of duties is vital in computer security to:

1. **Reduce Risk of Fraud:** When power is concentrated in one individual's hands, the opportunity for fraud increases. By assigning different responsibilities to different individuals, it becomes much harder to commit fraud without detection.
2. **Enhance Accountability:** Segregating duties helps in tracking actions more accurately. For example, if one person is responsible for making data entries and another for approving them, it creates a check and balances system that holds individuals accountable for their specific actions.
3. **Error Reduction:** Having separate individuals perform checks can reduce errors in processing. One employee may overlook a mistake that another would catch.
4. **Compliance with Regulations:** Many industry regulations require a segregation of duties to ensure proper internal controls and minimize risks associated with data processing and management.

**Reference:**
Department of Justice (2014). Internal Controls: A Guide for Nonprofit Organizations.

---

These definitions and explanations provide a foundational understanding of the given topics and should serve well for academic and practical applications.
There are no human answers yet. A form for humans to post answers is coming very soon!

Related Questions