All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
experiencing mis
Questions and Answers of
Experiencing MIS
I introduce this scenario with the following questions:a. Why should access to Dee’s blog be restricted?What would happen if the blog were hosted on a public site?b. What are the two alternatives
As a way of checking the class’s understanding of the material in Chapters 4 through 6, I go around the room asking the students to explain the elements in Figure 6-19. For each element(computer,
Dee played hardball with the IT department. She knew they didn’t want her to create a separate site with separate user [Ds and passwords, so she threatened to do so in order to get access for
Let's recap and evaluate the results:a. What was Dee’s goal?b. How did she accomplish that goal?c. How did she use knowledge of IT to increase her power?d. Do you think situations like this are
Were some alternatives not addressed?a. What actions might Dee or Emerson have taken to reduce the risk of allowing Don access?b. Were there alternatives other than allowing Don to access the
I think it’s hard to disagree with this statement, but it will be interesting to see what the students think.The goal of the question is to make sure the students understand the point of the
See the earlier discussion of social networking.RFID adoption is another. It hasn't yet caught on, but once RFID becomes a standard in the supply chain, watch out! Everyone will begin to use
It’s having a huge impact. Not just the 500 channels of TV, but the blogs and podcasters. Also consider social networking (by whatever name it will have). Look at how the blogs influenced response
Three possibilities are:e Delivery trucks could publish their movement and locations over time to interested parties (shipping managers, customer support representatives)e Parents could use GPS and
The answer depends on the student and your local situation. LO.1
Use a fraternity or sorority, a student club, a church community, a dorm, a professional group, or a job. LO.1
It's easier to meet Linda because she’s in your group. You and she have many acquaintances in common. You also have your department’s business in common, so you'll likely have much to say, It’s
Business social events are business events, and not treating them as a way of increasing the size of your network is naive.> Over time, business relationships may evolve into social relationships,
First, regarding the phrase, professionals need to know their profession. Accountants need to know accounting, financial analysts need to know finance, and network administrators need to know
Get out and meet people. Go to every possible business speaker event. Talk with the speaker afterward. Ask interesting questions about his or her talk. Get that person’s business card. Follow up
Suppose you work in the marketing department for an airline. Can you use these data in your marketing efforts? If so, how? What are the dangers of basing a marketing campaign on safety? LO.1
Suppose you are a maintenance manager for a major airline. How can you use these data? Would it be wise to develop your own, similar database? Why or why not? LO.1
How do companies use e-commerce? LO.1
How does e-commerce improve market efficiency? LO.1
What economic factors disfavor e-commerce? LO.1
What technology is needed for e-commerce? LO.1
What is Web 2.0? LO.1
How can businesses benefit from Web 2.0? LO.1
Do you think Anne’s post that she was “Out too late last night” was inappropriate, given that she knew that her professional colleagues were reading her page? Explain your answer. LO.1
Read the situations in items a through g and answer the questions contained in each, LO.1
Based on your answers in question 1, formulate ethical principles for creating or using social networks for business purposes. LO.1
Based on your answers in question 1, formulate ethical principles for creating or using user-generated content for business purposes. LO.1
Summarize the risks that a business assumes when it chooses to sponsor user-generated content. LO.1
Summarize the risks that a business assumes when it uses social networks for business purposes. LO.1
These two very similar publications have taken two different approaches for using the Internet to gain revenue from their archives. Describe what you believe are the advantages and disadvantages of
Visit http://woodenboat.com and _ http://finewood working.com. Compare the ways that these two publications use social networking on their sites.For each, how does their use of social networking
Compare the ways that these two publications host UGC on their sites. For each, how does UGC contribute to revenue? To what other goals does UGC contribute? Which publication employs UGC more
Choose one of the two publications and identify a new use for social networking. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the goals
Choose one of the two publications and identify a new use for UGC. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the goals of the
Is Fine Woodworking in danger of losing subscriptions to its paper magazine to the online magazine?Does it matter? Why or why not? LO.1
Fine Woodworking earns revenue from subscriptions to its online magazine. Wooden Boat earns no subscription revenue at all. Is it missing the boat?Why or why not? LO.1
Investigate auctions on eBay and, for any category of product in which you have knowledge or interest, compare selling prices to prices of new goods from e-commerce sites. Attempt to find one or more
Go to www.ebay.com and learn how eBay charges for its auctions. You have many options to choose from; select the option(s) that you believe will be best for selling goods using this strategy. Explain
Using price comparison sites (such as PriceGrabber, CNET, or Froogle), identify three sources for products that you identified in question 1. If you did not find any qualifying products in that
Either by yourself or with a group of classmates, find a product from your answer in question 3 that seems to you to be a good bargain. Set up an auction for that item on eBay with terms that will
Run the auction. If you make some profit, celebrate, and run it again. If not, state why and what you would do differently to earn some profit. LO.1
a. Suppose that Majestic starts a group ona social networking site for a particular rafting trip. Graham, the 15-year-old college student who started this chapter, decides to use that group to
. Suppose you own and manage Majestic. Is it unethical for you to encourage your employees to write positive reviews about MRV? Does your assessment change if you ask your employees to use an email
. Again, suppose you own and manage Majestic and that you pay your employees a bonus for every client they bring to a rafting trip.Without specifying any particular technique, you encourage your
. Suppose you were at one time employed by Majestic and you were, undeservedly you think, terminated by the company. To get~ even, you use Facebook to spread rumors to your friends (many of whom are
1. Sue, the owner of Majestic River Ventures, decided some time ago that she or one of the senior trip leaders should interview each client to ensure that they have enrolled in the proper raft trip.
2. Develop three different ways that Majestic could use social networking to facilitate its competitive strat- egy. Select what you think is the best alternative and justify your selection.
3. Develop three different ways that Majestic could use user-generated content (other than crowd- sourcing) to facilitate its competitive strategy. Select what you think is the best alternative and
4. Develop three different ways that Majestic could use crowdsourcing to facilitate its competitive strategy. Select what you think is the best alternative and jus- tify your selection.
5. At the start of this chapter, Graham complains because there are "no girls" on his trip. Take that complaint as a statement of a larger problem- namely, that trips are randomly composed of clients
1. These two very similar publications have taken two different approaches for using the Internet to gain revenue from their archives. Describe what you believe are the advantages and disadvantages
2. Visit htip://woodenboat.com and http://finewood working.com. Compare the ways that these two publications use social networking on their sites.For each, how does their use of social networking
3. Compare the ways that these two publications host UGC on their sites. For each, how does UGC contribute to revenue? To what other goals does UGC contribute? Which publication employs UGC more
4. Choose one of the two publications and identify a new use for social networking. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the
5. Choose one of the two publications and identify a new use for UGC. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the goals of the
6. Is Fine Woodworking in danger of losing subscriptions to its paper magazine to the online magazine?Does it matter? Why or why not?
7. Fine Woodworking earns revenue from subscriptions to its online magazine. Wooden Boat earns no subscription revenue at all. Is it missing the boat?Why or why not?
1. Investigate auctions on eBay and, for any category of product in which you have knowledge or interest, compare selling prices to prices of new goods from e-commerce sites. Attempt to find one or
2. Go to www.ebay.com and learn how eBay charges for its auctions. You have many options to choose from; select the option(s) that you believe will be best for selling goods using this strategy.
3. Using price comparison sites (such as PriceGrabber, CNET, or Froogle), identify three sources for products that you identified in question 1. If you did not find any qualifying products in that
. Either by yourself or with a group of classmates, find a product from your answer in question 3 that CHAPTER 8 E-Commerce and Web 2.0 211 seems to you to be a good bargain. Set up an auction for
. Run the auction. If you make some profit, celebrate, and run it again. If not, state why and what you would do differently to earn some profit.
WHAT ARE TYPICAL INTER-ENTERPRISE PROCESSES?
Consider the supply chain for Amazon.com. Assume that Amazon.com buys books directly from publishers and also buys from book distributors. Ignore used book sales.a. Diagram this supply chain. Use
How DOES REM ANALYSIS CLASSIFY CUSTOMERS?
Summarize the concerns expressed by this data analyst.
Do you think the concerns raised here are sufficient to avoid data mining projects altogether?
If you were a junior member of a data mining team and you thought that the model that had been developed was ineffective, maybe even wrong, what would you do? If your boss disagrees with your
Define database marketing. Explain why the term is a misnomer.Give an example of the need for database marketing other than ones described in this chapter extension.
Explain the meaning of R, F, and M scores. Describe how each score is computed. State the action(s) that should be taken for customers having the following RFM scores: [1, 1, 3], [5, 4, 5],(2,22),
Define cross-selling. Define support, confidence, and lift. In Figure CE12-2, state the probability that someone walks into the store and buys fins. Compute the support for fins and a dive computer.
Define decision tree, and explain the basic idea of decision trees. For the hypothetical data in Figure CE12-3, state the grade you would predict for senior nonbusiness students. State the grade you
WHAT IS A DATA BREACH?
HOW DO DATA BREACHES HAPPEN?
HOW SHOULD ORGANIZATIONS RESPOND TO DATA BREACHES?
WHAT ARE THE LEGAL CONSEQUENCES OF A DATA BREACH?
HOW CAN DATA BREACHES BE PREVENTED?
Define data breach, personally identifiable information (PID), and carding. List some of the direct and indirect costs related to data breaches. How likely is it that a data breach will occur?What
Define attack vectors, exploit, and spear phishing. Describe each step in the Target data breach. How did the hackers gain access to Target’s internal network? Why did the hackers want to sell the
Define exfiltration, walkthrough, business continuity planning, and computer security incident response team (CSIRT). Why is it important to respond quickly to a data breach? Explain how planning for
Why do you need to know about the IT department? LO.1
What are the responsibilities of the IT department? LO.1
How is the IT department organized? LO.1
What IS-related job positions exist? LO.1
How do organizations decide how much to spend on IT? LO.1
What are your IS rights and responsibilities? LO.1
Describe several ways that the overseas outsourcing problem is overstated. LO.1
Summarize the argument that the "culprit" is not overseas outsourcing, but rather productivity. LO.1
Why is it incorrect to consider productivity as a culprit? LO.1
Explain the phenomenon of creative destruction. LO.1
Why are your career prospects limited if you define yourself as an expert in SOA and XML? LO.1
Apply the line of reasoning you used in your answer to question 5 to some other technology or system, such as CRM, ERP, OLAP, RFM, or some other technology. LO.1
Explain how you can use one of the technologies in question 6 to help you start your career. To be successful, what perspective must you then maintain? LO.1
Explain how you would respond to each situation. LO.1
Suppose someone from the IT department notifies you that one of your employees is spending 3 hours a day surfing the Web. LO.1
How do you respond? LO.1
For question 2, suppose you ask how the IS department knows about your employee and you are told, “We secretly monitor computer usage.” Do you object to such monitoring? Why or why not? LO.1
Write what you think is the best corporate policy for personal computer usage at work. LO.1
How does OneSystem contribute to Marriott’s objectives? LO.1
What are the advantages of having one revenuemanagement system instead of two? Consider both users and the IT department in your answer. LO.1
Showing 200 - 300
of 1348
1
2
3
4
5
6
7
8
9
10
11
12
13
14