{"id":3207,"date":"2024-09-04T09:06:36","date_gmt":"2024-09-04T13:06:36","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5206fall16\/?p=3207"},"modified":"2024-08-04T13:52:40","modified_gmt":"2024-08-04T17:52:40","slug":"week-4","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/2024\/09\/04\/week-4\/","title":{"rendered":"All Questions"},"content":{"rendered":"<p>Answers to the following questions should be written up and submitted following the instructions found in the Syllabus and posted to Canvas.<\/p>\n<ol>\n<li>What is meant by the term \u201cacceptable information system security risk\u201d? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?<\/li>\n<li>What is an information risk profile? How is it used?\u00a0 Why is it critical to the success of an organization\u2019s risk management strategies and activities?<\/li>\n<li>How would you go about creating an information risk profile for a small start-up business? Describe what the risk profile for the business would contain?\u00a0 How should the business use the risk profile?<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Answers to the following questions should be written up and submitted following the instructions found in the Syllabus and posted to Canvas. What is meant by the term \u201cacceptable information system security risk\u201d? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an [&hellip;]<\/p>\n","protected":false},"author":4657,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[807787],"tags":[],"class_list":{"0":"post-3207","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-unit-04-risk-evaluation","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts\/3207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/users\/4657"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/comments?post=3207"}],"version-history":[{"count":5,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts\/3207\/revisions"}],"predecessor-version":[{"id":4957,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts\/3207\/revisions\/4957"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/media?parent=3207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/categories?post=3207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/tags?post=3207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}