All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
3. Give examples of three decisions at Land O'Lakes that were improved by using GIS. (l. 87)
2. How did using GIS improve operations and deci- sion making at Land O'Lakes? (l. 87)
1. Why is geographic location data so important to Land O'Lakes? What categories of geographic in- formation does Land O'Lakes use? (l. 87)
4. Give an example of how predictive maintenance systems could be used in another industry. (l. 87)
1. Why is predictive maintenance so important in the oil and gas industry? What problems does it solve? (l. 87)
12-4 How do different decision-making constituencies in an organization use business intelligence? (l. 87)
12-3 How do business intelligence and business analytics support decision making? (l. 87)
8. How is privacy defined? What are the principal privacy risks? Can you provide examples of each one?
7. Imagine that you have just been hired by a retail financial institution. How would you explain to your CEO that she needs to get involved in privacy decisions?
6. What is a denial-of-service attack? Why are these attacks particularly dangerous?
5. Define and provide an example of each of the different types of malicious code threats. Describe the appropriate countermeasure.
4. Define and provide an example of each of the different types of intrusion threats. Describe the appropriate countermeasure for each of your examples.
3. Define what is meant by internal and external threats. How do the two differ? How are they related?
2. What are the three costs associated with information systems security? What is the relationship among them?
1. Imagine that you have just been hired by a retail financial institution. How would you explain to your CEO that she needs to get involved in information security decisions?
5. Define ethics, apply the concept of ethical behavior to information systems decisions, and be able to articulate how general and functional managers can help ensure that their organization behaves
4. Be able to identify the nature of privacy concerns that modern organizations face, and be able to articulate how general and functional managers can safeguard the privacy of their customers and
3. Understand the principal security threats, both internal and external, and the principal safeguards that have been developed to mitigate these risks.
2. Understand the basic IT risk management processes, including risk assessment, risk analysis, and risk mitigation.
1. Learn to make the case that information systems security, privacy, and ethics are issues of interest to general and functional managers, and why it is a grave mistake to delegate them exclusively
5. What is open source software? What are the main advantages and disadvantages of open source software? When would you consider an open source software implementation in your organization? When
4. How does the CMI trend respond to the limitations of Customer Relationship Management? Who would you think is best positioned to take advantage of the emergence of CMI?
3. Describe the concept of energy informatics. Describe where you believe energy informatics would have the strongest potential impact toward environmental sustainability.
2. All too often organizations adopt an information technology or technology management fad without careful examination. Choose a specific organization and discuss how it could create value
1. Which of the trends associated with the mobile platform do you believe are most likely to become mainstream in the next three years? Why?
6. Define the terms cloud computing and software as a service (SaaS), understand their genesis, and discuss their principal characteristics.
5. Define the term open source software and be able to identify the primary commercial models that have been crafted around the open source movement. You will also be able to articulate the principal
4. Define the notion of customer-managed interactions, the reasons for its emergence, and its potential impacts.
3. Define the notion of digital data genesis, the reasons for its emergence, and its potential impacts.
2. Describe the importance of Green IS and energy informatics, the reasons for their emergence, and their potential impacts.
1. Define the term mobile platform and its relevance in today’s technology environment. Describe some of the emerging applications that leverage the mobile platform, as well as the key trends
8. Articulate the advantages and disadvantages of enduser developmen
7. Repeat Question 5, this time using the systems selection and acquisition methodology.
6. Repeat Question 5, this time using the prototyping methodology.
5. Describe the systems development life cycle (SDLC) methodology in the context of a “real” example. In other words, think about (or imagine) a situation where you proposed the need for a new
4. Provide arguments in support of both the make and buy approaches. What are the principal advantages of each decision? Increasingly firms approach information systems development as a “buy and
3. How do the three information systems development approaches in use today in modern organizations differ? Can you provide an example of each?
2. What is the difference between technology development and information systems development? What is the relationship between these two processes?
1. Describe the reasons why general and functional managers often fail to understand the complexities of organizational information systems development. Can you provide an example from your own
5. To describe the reasons for the increasing prominence of end-user development in modern organizations and to articulate the benefits and risks of this approach to software development.
4. To describe the systems selection methodology and be able to use it to choose a prepackaged software program for a specific organization.
3. To describe and be able to use the main methodologies for custom software design and development. Specifically, you will be able to identify the major phases of the system development life cycle
2. To articulate the advantages and disadvantages of custom software design and development versus acquisition of an off-the-shelf product.
1. To appreciate how complex it is to design and implement information systems and the stable, robust, secure technology at their core.
7. Define and differentiate the following terms: Outsourcing, information systems outsourcing, offshoring, full outsourcing, and selective outsourcing. What are the principal drivers and risks
6. What are the key drivers of new information systems project risk? Why should a firm evaluate the aggregate risk of its portfolio of projects? What should the organization do if the current level
5. Describe each of the three main information systems funding methods and discuss the advantages and disadvantages of each.
4. Define the following terms: total cost of ownership (TCO) and steering committee.
3. What is a business case? What is its purpose? Who should be developing and presenting the business case for a new information system?
2. Why should general and functional managers be involved in decisions about the funding of information systems assets and services?
1. Describe the relationship between strategic information systems planning and the yearly budgeting and prioritization processes. What is the objective of each?
6. To define the terms outsourcing and offshoring, and identify the primary drivers of this enduring trend. You will also be able to articulate the principal risks of outsourcing and offer some
5. To understand the yearly budgeting and prioritization project, and be able to evaluate individual and portfolio risks of information systems projects.
4. To evaluate the three main funding methods used by modern organizations: chargeback, allocation, and overhead. You will also learn their respective advantages and disadvantages.
3. To define, comprehend, and use the appropriate vocabulary, including concepts such as total cost of ownership (TCO), business case, and steering committee.
2. To be able to articulate the role that general and functional managers play in the yearly budgeting and prioritization process.
1. To understand the relationship between strategic information systems planning and the yearly budgeting and prioritization process.
8. Can IS create a sustainable competitive advantage, or only support a firm in achieving a sustainable competitive advantage based on a compelling value proposition? Use evidence to support your
problem?
7. Identify some businesses that currently appear to have no sustainable advantage and as a result are losing market share, are in (or close to) Chapter 11, or have gone out of business in the last
6. Identify some businesses that currently appear to have a sustainable advantage. How does IS contribute to this sustainability? Highlight any cases where this sustainability appears to have a
5. Review your answers to the questions at the end of the opening mini-case. Have they changed? Why or why not?
4. For each barrier to erosion, provide an example of an IT-dependent strategic initiative that, in your opinion, leverages the barrier. Can you identify which response-lag drivers underpin the
3. Describe each of the four barriers to erosion.
2. Why is the difference between information systems and information technology so important to the analysis of sustainability?
1. The CEO of your company, where you serve as the CIO, recently read the article title “IT Doesn’t Matter” (see Further Readings list). He calls you into his office to “pick your brain,”
8. To identify the possible courses of action a firm should take based on your analysis, and to be able to recommend when the firm should or should not pursue a given IT-dependent strategic
7. To use the concepts and frameworks described in this chapter in situations where your firm may be evaluating whether to retaliate against a competitor who pioneered an IT-dependent strategic
6. To use the concepts and frameworks described in this chapter in the context of future IT-dependent strategic initiatives when your firm takes a leadership position.
5. To recognize how each of the four barriers can be strengthened over time in order to protract the useful life of an IT-dependent strategic initiative.
4. To identify the response lag drivers associated with each of the four barriers to erosion, and to provide examples of each.
3. To recognize the four barriers to erosion that protect IT-dependent competitive advantage, and to estimate their size.
2. To recognize the flaws in the arguments of those who suggest that information technology has lost its potential to enable sustained competitive advantage.
1. To analyze the potential of IT-dependent strategic initiatives to ensure value appropriation over time.
4. Describe the basic tenets of the virtual value chain. How does it differ from the physical value chain? Can you identify an example for each of the three applications of the virtual value chain?
3. Describe the customer service life cycle (CSLC) and its primary objectives. Provide an example of a firm that, in your opinion, has created competitive advantage using information systems to
2. Describe the focus and principal objectives of value chain analysis applied to information systems. Why is it important to contextualize the value chain? Provide an example of a firm you think
1. Describe the focus and principal objectives of industry analysis applied to information systems. Select one of the five competitive forces, and offer an example of a firm that you believe has been
4. How to devise and select initiatives that create value using organizational data.
3. How to incorporate information resources in your search for opportunities for value creation using emerging frameworks, including the virtual value chain and the customer data strategies framework.
2. How to use traditional models of value creation with information systems and information technology to identify and craft IT-dependent strategic initiatives, including industry analysis, value
1. How to think in a disciplined fashion about the question of value creation with information systems resources.
8. Define the concept of IT-dependent strategic initiative and provide an example.
7. Define the concept of tactical information systems and provide an example.
6. Define the concept of strategic information systems and provide an example.
5. Provide an example of a well-known firm that you think currently has added value. Explain your example using added value analysis.
4. What is the difference between value creation and value appropriation? Why is this difference important?
3. Think about the last time you bought something that you felt was “a great deal.” Why did you think the product or service was such a great deal? Do you believe that the transaction was
2. Provide two examples of firms that you think have been able to create value using information systems. The first one should be a firm that has done so mainly by focusing on customer willingness to
1. Explain the value creation process. How does a firm contribute to the creation of economic value?
5. To define and utilize the concept of IT-dependent strategic initiatives.
4. To differentiate between strategic information systems and tactical information systems.
3. To estimate the portion of the total value created that will be appropriated by each of the entities who contributed to its creation.
2. To compute total value created and added value.
1. To define key terminology, including the concepts of total value created, customer willingness to pay, supplier opportunity cost, and added value.
7. What is the purpose of the information systems guidelines? Given the information systems vision you have proposed in response to Question 6, can you provide an example of guidelines that are
6. What is the purpose of the information systems vision? Can you provide an example?
5. What purpose do the critical success factors methodology and the strategic impact grid play in the planning process? Can you provide examples of firms in each of the four quadrants of the
4. What are the key components of the strategic information systems planning process? Can you define and describe each one?
3. What is the purpose of strategic information systems planning? Who needs to be involved in this process? Why?
Showing 1700 - 1800
of 6653
First
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Last