Think about where your personal information is stored from an information systems perspective:

- Is your credit card information saved on file at your favorite online store?
- Are your medical records stored electronically at your doctor’s office?
- What would happen if that information was compromised?
- What are some of the major threats to information systems?

Give three examples to support your answer.

Please note that we don't do students' homework for them. If there's not a tutor with this specialty online right now, be sure to go back into your textbook or use a good search engine. http://hanlib.sou.edu/searchtools/

Once YOU have come up with attempted answers to YOUR questions, please re-post and let us know what you think. Then someone here will be happy to comment on your thinking.

=)

From an information systems perspective, personal information can be stored in various places. Let's consider the examples you mentioned:

1. Credit card information saved at an online store:
- To find out if your credit card information is saved on file at your favorite online store, you can visit the store's website or app.
- Look for an account or profile section where you may have entered your credit card details for easy checkout.
- Check if there is an option to save payment information for future purchases.

2. Medical records stored electronically at a doctor's office:
- To determine if your medical records are stored electronically at your doctor's office, you can directly inquire with the doctor's office or their reception.
- Ask if they maintain electronic health records (EHR) or use a specific healthcare information system.
- Verify if your information is stored in their system and get details about the security measures they have in place to protect your data.

3. Compromised information:
- If your personal information was compromised, it can have serious consequences such as identity theft, financial loss, or reputational damage.
- Unauthorized individuals may gain access to your credit card details, leading to fraudulent charges.
- In the case of compromised medical records, sensitive information like diagnoses, treatments, and personal details could be exposed, potentially leading to medical identity theft or fraud.

Major threats to information systems:
1. Cyberattacks: Hackers may attempt to breach information systems using methods like malware, phishing, or DDoS attacks. These can lead to unauthorized access, data breaches, or disruption of operations.
2. Insider threats: Employees or individuals within an organization who misuse their access to data can pose a significant threat. This can happen through intentional actions, negligence, or inadequate security protocols.
3. Data breaches: Accidental disclosure, weak security measures, or vulnerabilities in information systems can result in data breaches, allowing unauthorized access to sensitive information.

Remember, it's crucial to regularly assess the security measures in place to protect your personal information and stay vigilant against potential threats.