answersLogoWhite

0

Students' answers will vary, however they must realize that information is a powerful resource that can be used in an inappropriate matter. As a manager or other end user of information, we must insure that we always consider the ethical responsibilities of the use of information. For example, uses of information technology might be used in an improper, irresponsible, or harmful way, which can hurt other individuals or society as a whole. Information systems must be managed to benefit society while meeting the goals of the organization. Irresponsible use would include taking advantage of access to confidential data for personal gain or interest.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

How can a manager demonstrate that he or she a responsible end user of information system give several example?

Find your answer bwhahahaha


The Security Manager is the person solely responsible for safeguarding classified information?

true


Who is responsible for the IA program and supports DIACAP implementation?

Information Assurance Manager


Is The Security Manager is the person solely responsible for safeguarding classified information?

true


Who is responsible for reporting incidents to the base Information Protection Office?

Your Security Manager


What is the Manager in Chief?

responsible manager


What is the job description of a business intelligence manager?

A business intelligence manager oversees a team of employees that are responsible for end user reporting and analytic's. You can get more information about this at the Wikipedia.


Is the system administrator responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager with the support authority and resources to sat?

According to DODI 8510.01:5.16. The Program Manager (PM) or System Manager (SM) for DoD ISs shall:5.16.1. Ensure that each assigned DoD IS has a designated IA manager (IAM) with the support, authority, and resources to satisfy the responsibilities established in Reference (d) and this Instruction.So - no - the system administrator is not responsible; the PM or SM is responsible


Who is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager with the support authority and resources to satisfy the responsibilities?

According to DODI 8510.01:5.16. The Program Manager (PM) or System Manager (SM) for DoD ISs shall:5.16.1. Ensure that each assigned DoD IS has a designated IA manager (IAM) with the support, authority, and resources to satisfy the responsibilities established in Reference (d) and this Instruction.


Is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager IAM with the support authority and resources to satisfy the responsibilities es?

The Defense Information Systems Agency (DISA) is responsible for ensuring that each DoD information system has a designated Information Assurance Manager (IAM) with the necessary support, authority, and resources to fulfill their responsibilities for information assurance. This is to ensure that the information systems adhere to the DoD's security requirements and guidelines.


Authority of finance manager?

A finance manager is responsible for everyone in the finance department. They are also responsible for creating budgets for the organization.


How can a manager demonstrate that he or she is a responsible end user of information system give example?

Students' answers will vary, however they must realize that information is a powerful resource that can be used in an inappropriate matter. As a manager or other end user of information, we must insure that we always consider the ethical responsibilities of the use of information. For example, uses of information technology might be used in an improper, irresponsible, or harmful way, which can hurt other individuals or society as a whole. Information systems must be managed to benefit society while meeting the goals of the organization. Irresponsible use would include taking advantage of access to confidential data for personal gain or interest.