Page 4 -
P. 4

The Guides









                    Each chapter includes  three unique  guides  that focus on   of business. The content of each guide is designed to stimu-
                    current issues in information systems. In each chapter, one   late thought, discussion, and active participation in order to
                    of the guides focuses on an ethical issue in business, and the   help you develop your problem-solving skills and become a
                    second focuses on security. The third guide addresses the ap-  better business professional.
                    plication of the chapter’s contents to some other dimension








                    Chapter 1                                           Chapter 7
                    Ethics: Ethics and Professional Responsibility  56  Ethics: Dialing for Dollars  300
                    Security: Passwords and Password Etiquette  60      Security: One-Stop Shopping  314
                    Guide: Five-Component Careers  62                   Guide: ERP and the Standard, Standard Blueprint  316

                    Chapter 2                                           Chapter 8
                    Ethics: I Know What’s Better, Really  92            Ethics: Synthetic Friends  344
                    Security: Evolving Security  104                    Security: Digital Is Forever  358
                    Guide: Egocentric Versus Empathetic Thinking  106   Guide: Developing Your Personal Brand  360


                    Chapter 3                                           Chapter 9
                    Ethics: Yikes! Bikes  122                           Ethics: Unseen Cyberazzi  384
                    Security: Hacking Smart Things  136                 Security: Semantic Security  406
                    Guide: Your Personal Competitive Advantage  138     Guide: Data Mining in the Real World  408

                    Chapter 4                                           Chapter 10
                    Ethics: Free Apps for Data  176                     Ethics: Securing Privacy  434
                    Security: Anatomy of a Heartbleed  184              Security: EMV to the Rescue  450
                    Guide: Keeping Up to Speed  186                     Guide: Phishing for Credit Cards, Identifying Numbers,
                                                                           Bank Accounts  452
                    Chapter 5
                    Ethics: Querying Inequality?  202                   Chapter 11
                    Security: Theft by SQL Injection  224               Ethics: Privacy Versus Productivity: The BYOD
                    Guide: Immanuel Kant, Data Modeler  226                Dilemma? 470
                                                                        Security: Selling Privacy  480
                    Chapter 6                                           Guide: Is Outsourcing Fool’s Gold?  482
                    Ethics: Cloudy Profit?  244
                    Security: From Anthem to Anathema  270              Chapter 12
                    Guide: Is It Spying or Just Good Management?  272   Ethics: Estimation Ethics  504
                                                                        Security: Psst. There’s Another Way, You Know . . .  526
                                                                        Guide: The Final, Final Word  528
   1   2   3   4   5   6   7   8   9