CiS 336 STUDy Learn Do Live /cis336study.com CiS 336 STUDy Learn Do Live /cis336study.com | Page 31

5) All of the following are risks associated with IS otsourcing EXCEPT: 6) This project cycle plan tends to be used for projects that have direct relationships between time and resources. 7) This is an IT governance framework that is consistent with COSO controls. 8) The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue. 9) ________________ is the process of analyzing data warehouses for “gems”. 10) Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent futue security breaches? 11) Scorecards provide a summary of information gathered over a period of time. Another common IT monitoring tool is the _____________. 12) The initial reason organizations outsourced IT was which one of the following? 13) The project triangle includes 3 sides - time, scope and ________.