All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
Some experts say that Wi-Fi is winning the battle with 3G cellular service. Others disagree. Discuss both sides of the argument, and support each one.
Investigate commercial applications of voice portals. Visit several vendors, for example, Microsoft and Nuance (links to both Web sites are available via
Using a search engine, try to determine whether there are any commercial Wi-Fi hotspots in your area. (Hint: Access http://www.wiley.com/go/rainer/MIS3e/problemsolving.)
Examine how new data-capture devices such as RFID tags help organizations accurately identify and segment their customers for activities such as targeted marketing. Browse the Web, and develop five
Investigate commercial uses of GPS. Start with www.neigps.com. Can some of the consumer-oriented products be used in industry? Prepare a report on your findings.
Access www.bluetooth.com. Examine the types of products being enhanced with Bluetooth technology. Present two of these products to the class, and explain how they are enhanced by Bluetooth technology.
Explore www.nokia.com. Prepare a summary of the types of mobile services and applications Nokia currently supports and plans to support in the future.
Enter www.ibm.com. Search for “wireless e-business.” Research the resulting stories to determine the types of wireless capabilities and applications IBM’s software and hardware support.
Research the status of 3G and 4G cellular service by visiting the links available via http://www.wiley.com/go/rainer/MIS3e/problemsolving.Prepare a report on the status of 3G and 4G based on your
Enter Pitney-Bowes Business Insight (www.pbinsight.com). Click on “MapInfo Professional,” then click on the “Resources” tab, then on the “Demos” tab. Look for the location-based services
Enter www.onstar.com. What types of fleet services does OnStar provide? Are these any different from the services OnStar provides to individual car owners? (Play the movie.)
Explain why mobile ads are so effective on Facebook. Provide specific examples to support your answer.If there is a difference in your answers to questions 2 and 3 above, explain why.You are
You are accessing Facebook on your smartphone or tablet. Would ads placed directly into your news feed bother you? Why or why not?
You are accessing Facebook from your desktop computer. Would ads placed directly into your news feed bother you? Why or why not?
If there is a difference in your answers to questions 2 and 3 above, explain why.
Compare and contrast the three basic types of reports.
Highlight the differences between ERP configuration, customization, and best of breed implementation strategies.
What are the three main intraorganizational processes that are typically supported by ERP systems?
Why is it important that all steps in each process generate a document that is stored in the ERP system?
What are the two main ES systems that support interorganizational processes?
Discuss the reasons why financial reports must be timely.
Explain how SAP enabled the GEA Group to produce their financial reports in an efficient, timely manner.
What are the advantages of the SAP solution to the GEA Group?
Why is it logical to organize IT applications by functional areas?
How can the Internet support investment decisions?
What is the relationship between information silos and enterprise resource planning?
Finding a job on the Internet is challenging as there are almost too many places to look. Visit the following sites: www.careerbuilder.com, www.craigslist.org, www.linkedin.com, www.careermag.com,
Enter www.sas.com and access revenue optimization there. Explain how the software helps in optimizing prices.
Enter www.eleapsoftware.com and review the product that helps with online training (training systems). What are the most attractive features of this product?
Check out Microsoft Dynamics demos at http://www.wiley.com/go/rainer/MIS3e/problemsolving. View three of the demos in different functional areas of your choice. Prepare a report on each product’s
Examine the capabilities of the following (and similar) financial software packages: Financial Analyzer (from Oracle) and CFO Vision (from SAS Institute). Prepare a report comparing the capabilities
Surf the Net and find free accounting software (Try CNet’s software at at http://www.wiley.com/go/rainer/MIS3e/problemsolving, www.rkom.com, www.tucows.com, www.passtheshareware.com, and
Examine the cap abilities of the following financial software packages: TekPortal (from www.tekknowledge.com), Financial Analyzer (from www.oracle.com), and Financial Management (from www.sas.com).
Find Simply Accounting Basic from Sage Software (http://us.simplyaccounting.com). Why is this product recommended for small businesses?
Enter www.iemployee.com, and find the support it provides to human resources management activities. View the demos, and prepare a report on the capabilities of the products.
Take the “pros” side and discuss GM’s insourcing strategy.
Take the “cons” side and discuss GM’s insourcing strategy.
Discuss the ways in which information technology at GM can help to prevent safety problems such as the 2014 recall.
Describe how the airlines’ new information systems benefit travelers.
What are possible problems with these information systems?
Refer to Chapter 2. Would you categorize the airlines’ new information systems as strategic information systems? Why or why not?
Access the Web sites of several real estate companies. Find the sites that take you through a step-by-step process for buying a home, that provide virtual reality tours of homes in your price range
Access the Web sites of IBM (www.ibm.com), Sybase (www.sybase.com), and Oracle (www.oracle.com), and trace the capabilities of their latest data management products, including Web connections.
Enter Walmart China (www.wal-martchina.com/english/index.htm). How does Walmart China differ from you local Walmart (consider products, prices, services, etc.)? Describe these differences.
Access www.irobot.com, and investigate the company’s Education and Research Robots. Surf the Web for other companies that manufacture robots, and compare their products with those of iRobot.
Would you be willing to ride in an autonomous car? Why or why not?
Would you be suspicious of a low grade you received on a paper graded by AES software? Why or why not? Would you request a review by a human grader?
Using the ethical scenarios presented in this chapter, consider each scenario and note your response. Bring your answers to class to compare them with those of your peers.
Suppose that Cassandra, the CEO’s executive assistant, had been involved in the criminal activity of selling company data. And suppose that when the anonymous tip came in, she deleted the message
Use a Web browser connected to the Internet to explore the career options in cybersecurity at the U.S. National Security Agency. For what kind of InfoSec jobs does the NSA recruit? What
Iris was a little unsure of what to do next. She had just left the meeting with the other executives. At the meeting, they confirmed the need for action on the matter of the critical information
The (ISC)2 has several certifications. Use a Web browser connected to the Internet to read about the (ISC)2 certifications. What does “CISSP” stand for? Using the Internet, find out which
Using the descriptions given in this chapter, write a job description for Iris’s new position, which is described in the following case scenario. What qualifications and responsibilities should be
Using your local telephone directory, locate a service that offers background checks. Select one at random and call to determine the costs of conducting such checks. How much should an organization
1. Looking back at the opening case scenario, did the HR staff that failed to report the candidate’s conviction and parole on the “approval to hire” form commit an ethical lapse, or was it just
Iris reviewed the scant stack of applications for the newly created security manager position and frowned. There should have been many more than just three applicants for the position.After the human
Using the Internet, find at least five job postings for security administrators. What qualifications do the listings have in common? Did any of the listings include any qualifications that seemed
Go to the Web site of VeriSign, one of the market leaders in digital certificates. Determine whether VeriSign serves as a registration authority, certificate authority, or both. Download its free
Regarding the actions taken by the San Diego 10th-grader as described in this chapter’s opening scenario, was this youngster acting illegally? (You may want to look ahead in the text to Chapter 12
Search the Internet for information about a technology called personal or home office firewalls. Examine the various alternatives, select three of the options, and compare their functionalities,
Iris’s smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail.“We’ve really got to do something about the spam!” she muttered to herself. She scanned the
Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example
Using the Web, research the costs associated with the following items when implemented by a firm with 1,000 employees and 100 servers:● Managed antivirus software (not open source) licenses for 500
How could we determine EF if there is no percentage given? Which method is easier for determining the SLE: a percentage of value lost or cost per incident?
Suppose Mike and Iris make a decision to simply take the higher of each of the values without regard to how the values were determined by the person who made the initial assessment. Then, they
Mike and Iris were reviewing the asset valuation worksheets that had been collected from all the company managers.“Iris,” Mike said after a few minutes, “the problem, as I see it, is that no
Using the following table, calculate the SLE, ARO, and ALE for each threat category listed. XYZ Software Company (Asset value: $1,200,000 in projected revenues) Cost per Incident Threat Category
Using the Internet, locate the National Association of Corporate Directors’ Web site. Describe its function and purpose. What does this association say about board member liability for InfoSec
Using the asset valuation method presented in this chapter, conduct a preliminary risk assessment on the information contained in your home. Answer each of the valuation questions listed in the
Suppose that after they returned to the office, Mike was called to a private meeting with a senior executive from another division of the firm. During the discussion, Mike felt he was being subtly
Using the Web, search for at least three tools to automate risk assessment. Collect information on automated risk assessment tools. What do they cost? What features do they provide? What are the
Mike and Iris were flying home from the meeting. The audit committee’s reaction had not been what they expected.“I’m glad they understood the situation,” Mike said. “I’d like you to start
Visit the Web sites of the major technology organizations listed in this chapter (Microsoft, Oracle, and Cisco), plus two more that you choose on your own. Search the Web sites for best security
Maria was troubled by her recommendation of Linda to supervise the policy compliance team. As she considered the nature of the job and some of the personal issues that Linda faced, she wondered if
Maria sighed as she considered her new assignment. It had seemed like a great idea when Iris offered her the role, but now she wondered if she could get her arms around the complex process of getting
Search the Web for the term “security best practices.” Compare your findings to the recommended practices outlined in the NIST documents.
Search the Internet for the term “Treadway Commission.” What was the Treadway Commission, and what is its major legacy in the field of InfoSec?
Search the Internet for the term “data classification model.” Identify two such models and then compare and contrast the categories those models use for the various levels of classification.
Search the Internet for the term “security best practices.” Compare your findings to the recommended practices outlined in the NIST documents.
Compare the ISO/IEC 27001 outline with the NIST documents discussed in this chapter. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST
Iris sighed as she completed her initial review of her staff’s checklist results. She pulled out a notepad and began outlining the projects she foresaw, based on the shortcomings identified via the
Examine your institution’s Web site and identify full- and part-time InfoSec jobs. Create an organizational chart showing the reporting structures for these individuals.
Design five security posters on various aspects of InfoSec using a graphics presentation program and clipart. Bring the posters to class and discuss the methods you used to develop your materials.
Using a Web browser or local newspaper, search for advertisements for training and education in security- and technology-related areas. What are the costs of the advertised security-specific
“Thanks, that was very helpful,” Mike Edwards said to the attorney from the corporate legal office, who’d just given a presentation on the newly enacted state computer crime and privacy law.
Search the term “security awareness” on the Internet. Choose two or three sites that offer materials and services and describe what they offer.
Search for sample security policies on the Web. Identify five EISP and five ISSP sample policies and bring them to class. Compare these with the framework presented in this chapter and comment on the
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are
Using the framework presented in this chapter, evaluate the comprehensiveness of each policy you located in Exercise 2. Which areas are missing?
Search your institution’s intranet or Web sites for its security policies. Do you find an enterprise security policy? What issue-specific security policies can you locate? Are all of these policies
Prior to the first meeting of the RWW Enterprise Policy Review Committee, Mike asked Iris to meet him in his office.“You’ve convinced me that IT and InfoSec policy are tightly integrated,” Mike
Look for information on incident response on your institution’s Web site. Does your institution have a published plan? Identify the areas in an academic institution’s contingency planning that
Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if each of the following events occur:● Virus attack● Power failure●
Iris tried not to smile. “Of course, it isn’t technically a disaster,” she explained, “but I understand what you mean. How much information is lost?”Joel looked at her in dismay. “Lost?
Using a Web search engine, search for the terms “disaster recovery” and “business continuity.” How many responses do you get for each term? Note how many companies do not distinguish between
Visit your library’s newspaper archives and search for recent articles on the subject of threats to InfoSec in your locality. How many examples of threats to InfoSec in the last week can you find?
Search your institution’s (or another organization’s) published documents, including its Web pages. Locate its values, vision, and/or mission statement, as well as strategic goals. Identify any
Using a Web search engine, find five examples of values, vision, and mission statements as well as public declarations of organizational strategy. Do these examples express concern for the security
Mike and Iris met to discuss the strategic plan that would be presented at the upcoming company-wide strategic planning workshop. Mike had given Iris the IT Division’s list of strategic goals. She
Using a Web search engine, find an article from a reputable source, published within the past six months, that reports on the risk coming from inside the organization compared to the risk coming from
Showing 100 - 200
of 1006
1
2
3
4
5
6
7
8
9
10
11