All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
5. Is the Elensys program legal under the HIPAA regulations (see Appendix 13.1)? Is it ethical?
4. Is there anything Giant could have done to salvage the situation, either from the beginning or after the fact? Consider the costs and implementation issues for your recommendations.
3. Does the Elensys compliance program represent a compatible or incompatible use of Giant’s prescription data? Based on your conclusion, critique Giant’s implementation of fair information
2. Do compliance programs provide any legitimate benefits? If so, to whom?
1. What caused all the flap about Elensys? Dissect the information and money flows. Who pays whom for what? What information is being used and by whom? What is the business relationship between
3. Outline the things that McCann needs to do right away.
2. Other organizational factors decrease a project’s likelihood of success.Identify these “barriers” for the Green project.
1. Some organizational factors increase a project’s likelihood of success.Identify these “facilitators” for the Green project.
2. What do you believe would be the optimal governance structure for the IS function at ModMeters. Why?
1. Develop an IT planning process for ModMeters to accomplish the demands as set out above.
4. How sustainable is any competitive advantage for Rice Epicurean? For MyWebGrocer?
3. What would you do if you were Ives? Should Upscale Markets implement online grocery shopping in the Dallas, TX market? How similar, or different, should it be from the Rice Epicurean initiative in
2. What new capabilities do the following innovations bring to customer service in the grocery industry: Scanner data, Loyalty card data, Web Shopping?
1. What is the value proposition to the customer of Web-based shopping?How does it compare to the other innovations in customer service that Ives mentions at the end of the case?
5. Based on your proposed IS plan for Outrigger Hotels and Resorts, what strategic initiatives would you propose?
4. Can you articulate both the IS vision and guidelines for the firm?
3. What should be, in your opinion, the role of the IS function at Outrigger Hotels and Resorts?
2. How well are current IS resources serving the needs of Outrigger Hotels and Resorts?
1. What is Outrigger Hotels and Resorts’ strategic position? What are its strengths and weaknesses? What are the firm’s Critical Success Factors (CSF)?
3. How would you grow TripIt today?
2. Would you have invested in TripIt if given the chance?
1. What is TripIt? How does it create value?
2. Is the Internet a disruptive technology in the education industry in general?And for Ivey’s School of Information Management in particular?
1. Do you agree with Peter Drucker’s opening quote?
How should eLoanDocs go about choosing a cloud hosting provider?
Would eLoanDocs’ financial institution customers accept a move of eLoanDocs’ services to a public or private cloud provider?
Should eLoanDocs continue with their current model of designing, building, and managing their own computer hosting infrastructure using their colocation partners?
9. What is ethics? What are the principal challenges associated with information systems ethics?1. Despite having relatively little specific information about why the system failed, what do you think
8. How is privacy defined? What are the principal privacy risks? Can you provide examples of each one?
7. Imagine that you have just been hired by a retail financial institution. How would you explain to your CEO that she needs to get involved in privacy decisions?
6. What is a denial-of-service attack? Why are these attacks particularly dangerous?
5. Define and provide an example of each of the different types of malicious code threats. Describe the appropriate countermeasure.
4. Define and provide an example of each of the different types of intrusion threats. Describe the appropriate countermeasure for each of your examples.
3. Define what is meant by internal and external threats. How do the two differ? How are they related?
2. What are the three costs associated with information systems security?What is the relationship among them?
1. Imagine that you have just been hired by a retail financial institution. How would you explain to your CEO that she needs to get involved in information security decisions?
4. What should you do in the next few days? Should you issue a press release? Should you contact your customers directly? Should you focus on overhauling your security safeguards to prevent future
3. What should you do tonight? Should you approach the topic at dinner or wait and see if anyone else raises the issue?
2. Who do you think should be making security calls at Reinventravel.com?Shouldn’t this be the CIO’s job?
1. Do you agree with the assessment that you had dropped the ball? Or are you being unduly harsh on yourself?
6. What is open source software? What are the main advantages and disadvantages of open source software? When would you consider an open source software implementation in your organization? When
5. How does the CMI trend respond to the limitations of customer relationship management? Who would you think is best positioned to take advantage of the emergence of CMI?
4. Identify two DDSs that you believe are relevant in a sport and suggest an IT dependent strategic initiative based on both of them.
3. Describe the concept of energy informatics. Describe where you believe energy informatics would have the strongest potential impact on environmental sustainability.
2. Explain the difference between smart devices and wearables, making specific examples.
1. Which of the trends associated with the mobile platform do you believe are most likely to become mainstream in the next three years? Why?
3. What are the main challenges you believe you will have to overcome in order to achieve widespread adoption?
2. What is the role of information systems, if any, in enabling the design?
1. What do you believe is the optimal design for your proposed bicycle rental system?
8. Define the term open source software and be able to identify the primary commercial models crafted around the open source movement. You will also be able to articulate the principal advantages and
7. Define the notion of customer-managed interactions, the reasons for its emergence, and its potential impacts.
6. Describe advanced analytics and how they differ from business intelligence.
5. Define the term digital manufacturing and understand both its strengths and current weaknesses.
4. Define the concept of Internet of things and discuss the implications of its diffusion.
3. Define the notion of digital data genesis, digital data streams, and advanced analytics; the reasons for their emergence; and their potential impacts.
2. Describe the importance of Green IS and energy informatics, the reasons for their emergence, and their potential impacts.
1. Define the term mobile platform and its relevance in today’s consumer and technology environments. Describe some of the emerging trends in the mobile space, as well as the key trends surrounding
8. Articulate the advantages and disadvantages of end-user development.
7. Repeat question 5, this time using the systems selection and acquisition methodology.
6. Repeat question 5, this time using the prototyping methodology.
5. Describe the systems development life cycle (SDLC) methodology in the context of a “real” example. In other words, think about (or imagine) a situation where you proposed the need for a new
4. Provide arguments in support of both the make and buy approaches. What are the principal advantages of each decision? Increasingly firms approach information systems development as a “buy and
3. How do the three information systems development approaches in use today in modern organizations differ? Can you provide an example of each?
2. What is the difference between technology development and information systems development? What is the relationship between these two processes?
1. Describe the reasons general and functional managers often fail to understand the complexities of organizational information systems development. Can you provide an example from your experience?
2. What would you do differently, if anything, given the chance to start this project all over again?
1. What should your agenda for tomorrow’s meeting be? Should you press on with your strategy, or is a change of course in order?
5. Describe the reasons for the increasing prominence of end-user development in modern organizations and articulate the benefits and risks of this approach to software development.
4. Identify the systems selection methodology so you can choose a prepackaged software program for a specific organization.
3. Describe and teach you to use the main methodologies for custom software design and development. Specifically, you will be able to identify the major phases of the system development life cycle
2. Articulate the advantages and disadvantages of custom software design and development versus acquisition of an off-the-shelf product.
1. Help you appreciate how complex it is to design and implement information systems (IS) and the stable, robust, secure technology at their core.
7. Define and differentiate the following terms: outsourcing, information systems outsourcing, offshoring, full outsourcing, and selective outsourcing.What are the principal drivers and risks
6. What are the key drivers of new information systems project risk? Why should a firm evaluate the aggregate risk of its portfolio of projects? What should the organization do if the current level
5. Describe each of the three main information systems funding methods and discuss the advantages and disadvantages of each.
4. Define the following terms: total cost of ownership (TCO) and steering committee.
3. What is a business case? What is its purpose? Who should be developing and presenting the business case for a new information system?
2. Why should general and functional managers be involved in decisions about the funding of information systems assets and services?
1. Describe the relationship between strategic information systems planning and the yearly budgeting and prioritization processes. What is the objective of each?
2. Are there any structural problems with the budgeting process at Performance Boards Inc.? What improvements would you suggest for next year—if any?
1. What should you do next? What are some of the options at your disposal to ensure that you do not alienate your colleagues?
6. Define the terms outsourcing and offshoring and identify the primary drivers of this enduring trend. You will also be able to articulate the principal risks of outsourcing and offer some general
5. Explain the yearly budgeting and prioritization project and help you to evaluate individual and portfolio risks of information systems projects.
4. Evaluate the three main funding methods used by modern organizations:chargeback, allocation, and overhead. You will also learn their respective advantages and disadvantages.
3. Allow you to define, comprehend, and use the appropriate vocabulary, including concepts such as total cost of ownership (TCO), business case, and steering committee.
2. Articulate the role that general and functional managers play in the yearly budgeting and prioritization process.
1. Explain the relationship between strategic information systems planning and the yearly budgeting and prioritization process.
5. Review your answers to the questions at the end of the opening minicase.Have they changed? Why or why not?(L. 65)
4. For each barrier to erosion, provide an example of an IT-dependent strategic initiative that, in your opinion, leverages the barrier. Can you identify which response-lag drivers underpin the
3. Describe each of the four barriers to erosion.
2. Why is the difference between information systems and information technology so important to the analysis of sustainability?
1. The chief executive officer (CEO) of your company, where you serve as the chief information officer (CIO), recently read the article title “IT Doesn’t Matter” (see Further Readings list). He
3. What is your recommendation? What should RCPS do next?
2. What are the pros and cons of the wait-and-see approach that Gregg prefers?
1. Do you believe that the Domino’s smartwatch ordering initiative is sustainable?
7. Teach you how to use the concepts and frameworks described in this chapter in situations where your firm may be evaluating whether to retaliate against a competitor who pioneered an IT-dependent
6. Show you how to use the concepts and frameworks described in this chapter in the context of future IT-dependent strategic initiatives when your firm takes a leadership position.
5. Explain how each of the four barriers can be strengthened over time in order to protract the useful life of an IT-dependent strategic initiative.
4. Identify the response lag drivers associated with each of the four barriers to erosion and to provide examples of each.
3. Teach you to recognize the four barriers to erosion that protect ITdependent competitive advantage and to estimate their size.
Showing 1 - 100
of 5265
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last