All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
AI Study Help
New
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
Check out Microsoft Dynamics demos at http://www.wiley.com/go/rainer/MIS3e/problemsolving. View three of the demos in different functional areas of your choice. Prepare a report on each product’s
Examine the capabilities of the following (and similar) financial software packages: Financial Analyzer (from Oracle) and CFO Vision (from SAS Institute). Prepare a report comparing the capabilities
Surf the Net and find free accounting software (Try CNet’s software at at http://www.wiley.com/go/rainer/MIS3e/problemsolving, www.rkom.com, www.tucows.com, www.passtheshareware.com, and
Examine the cap abilities of the following financial software packages: TekPortal (from www.tekknowledge.com), Financial Analyzer (from www.oracle.com), and Financial Management (from www.sas.com).
Find Simply Accounting Basic from Sage Software (http://us.simplyaccounting.com). Why is this product recommended for small businesses?
Enter www.iemployee.com, and find the support it provides to human resources management activities. View the demos, and prepare a report on the capabilities of the products.
Take the “pros” side and discuss GM’s insourcing strategy.
Take the “cons” side and discuss GM’s insourcing strategy.
Discuss the ways in which information technology at GM can help to prevent safety problems such as the 2014 recall.
Describe how the airlines’ new information systems benefit travelers.
What are possible problems with these information systems?
Refer to Chapter 2. Would you categorize the airlines’ new information systems as strategic information systems? Why or why not?
Access the Web sites of several real estate companies. Find the sites that take you through a step-by-step process for buying a home, that provide virtual reality tours of homes in your price range
Access the Web sites of IBM (www.ibm.com), Sybase (www.sybase.com), and Oracle (www.oracle.com), and trace the capabilities of their latest data management products, including Web connections.
Enter Walmart China (www.wal-martchina.com/english/index.htm). How does Walmart China differ from you local Walmart (consider products, prices, services, etc.)? Describe these differences.
Access www.irobot.com, and investigate the company’s Education and Research Robots. Surf the Web for other companies that manufacture robots, and compare their products with those of iRobot.
Would you be willing to ride in an autonomous car? Why or why not?
Would you be suspicious of a low grade you received on a paper graded by AES software? Why or why not? Would you request a review by a human grader?
Using the ethical scenarios presented in this chapter, consider each scenario and note your response. Bring your answers to class to compare them with those of your peers.
Suppose that Cassandra, the CEO’s executive assistant, had been involved in the criminal activity of selling company data. And suppose that when the anonymous tip came in, she deleted the message
Use a Web browser connected to the Internet to explore the career options in cybersecurity at the U.S. National Security Agency. For what kind of InfoSec jobs does the NSA recruit? What
Iris was a little unsure of what to do next. She had just left the meeting with the other executives. At the meeting, they confirmed the need for action on the matter of the critical information
The (ISC)2 has several certifications. Use a Web browser connected to the Internet to read about the (ISC)2 certifications. What does “CISSP” stand for? Using the Internet, find out which
Using the descriptions given in this chapter, write a job description for Iris’s new position, which is described in the following case scenario. What qualifications and responsibilities should be
Using your local telephone directory, locate a service that offers background checks. Select one at random and call to determine the costs of conducting such checks. How much should an organization
1. Looking back at the opening case scenario, did the HR staff that failed to report the candidate’s conviction and parole on the “approval to hire” form commit an ethical lapse, or was it just
Iris reviewed the scant stack of applications for the newly created security manager position and frowned. There should have been many more than just three applicants for the position.After the human
Using the Internet, find at least five job postings for security administrators. What qualifications do the listings have in common? Did any of the listings include any qualifications that seemed
Go to the Web site of VeriSign, one of the market leaders in digital certificates. Determine whether VeriSign serves as a registration authority, certificate authority, or both. Download its free
Regarding the actions taken by the San Diego 10th-grader as described in this chapter’s opening scenario, was this youngster acting illegally? (You may want to look ahead in the text to Chapter 12
Search the Internet for information about a technology called personal or home office firewalls. Examine the various alternatives, select three of the options, and compare their functionalities,
Iris’s smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail.“We’ve really got to do something about the spam!” she muttered to herself. She scanned the
Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example
Using the Web, research the costs associated with the following items when implemented by a firm with 1,000 employees and 100 servers:● Managed antivirus software (not open source) licenses for 500
How could we determine EF if there is no percentage given? Which method is easier for determining the SLE: a percentage of value lost or cost per incident?
Suppose Mike and Iris make a decision to simply take the higher of each of the values without regard to how the values were determined by the person who made the initial assessment. Then, they
Mike and Iris were reviewing the asset valuation worksheets that had been collected from all the company managers.“Iris,” Mike said after a few minutes, “the problem, as I see it, is that no
Using the following table, calculate the SLE, ARO, and ALE for each threat category listed. XYZ Software Company (Asset value: $1,200,000 in projected revenues) Cost per Incident Threat Category
Using the Internet, locate the National Association of Corporate Directors’ Web site. Describe its function and purpose. What does this association say about board member liability for InfoSec
Using the asset valuation method presented in this chapter, conduct a preliminary risk assessment on the information contained in your home. Answer each of the valuation questions listed in the
Suppose that after they returned to the office, Mike was called to a private meeting with a senior executive from another division of the firm. During the discussion, Mike felt he was being subtly
Using the Web, search for at least three tools to automate risk assessment. Collect information on automated risk assessment tools. What do they cost? What features do they provide? What are the
Mike and Iris were flying home from the meeting. The audit committee’s reaction had not been what they expected.“I’m glad they understood the situation,” Mike said. “I’d like you to start
Visit the Web sites of the major technology organizations listed in this chapter (Microsoft, Oracle, and Cisco), plus two more that you choose on your own. Search the Web sites for best security
Maria was troubled by her recommendation of Linda to supervise the policy compliance team. As she considered the nature of the job and some of the personal issues that Linda faced, she wondered if
Maria sighed as she considered her new assignment. It had seemed like a great idea when Iris offered her the role, but now she wondered if she could get her arms around the complex process of getting
Search the Web for the term “security best practices.” Compare your findings to the recommended practices outlined in the NIST documents.
Search the Internet for the term “Treadway Commission.” What was the Treadway Commission, and what is its major legacy in the field of InfoSec?
Search the Internet for the term “data classification model.” Identify two such models and then compare and contrast the categories those models use for the various levels of classification.
Search the Internet for the term “security best practices.” Compare your findings to the recommended practices outlined in the NIST documents.
Compare the ISO/IEC 27001 outline with the NIST documents discussed in this chapter. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST
Iris sighed as she completed her initial review of her staff’s checklist results. She pulled out a notepad and began outlining the projects she foresaw, based on the shortcomings identified via the
Examine your institution’s Web site and identify full- and part-time InfoSec jobs. Create an organizational chart showing the reporting structures for these individuals.
Design five security posters on various aspects of InfoSec using a graphics presentation program and clipart. Bring the posters to class and discuss the methods you used to develop your materials.
Using a Web browser or local newspaper, search for advertisements for training and education in security- and technology-related areas. What are the costs of the advertised security-specific
“Thanks, that was very helpful,” Mike Edwards said to the attorney from the corporate legal office, who’d just given a presentation on the newly enacted state computer crime and privacy law.
Search the term “security awareness” on the Internet. Choose two or three sites that offer materials and services and describe what they offer.
Search for sample security policies on the Web. Identify five EISP and five ISSP sample policies and bring them to class. Compare these with the framework presented in this chapter and comment on the
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are
Using the framework presented in this chapter, evaluate the comprehensiveness of each policy you located in Exercise 2. Which areas are missing?
Search your institution’s intranet or Web sites for its security policies. Do you find an enterprise security policy? What issue-specific security policies can you locate? Are all of these policies
Prior to the first meeting of the RWW Enterprise Policy Review Committee, Mike asked Iris to meet him in his office.“You’ve convinced me that IT and InfoSec policy are tightly integrated,” Mike
Look for information on incident response on your institution’s Web site. Does your institution have a published plan? Identify the areas in an academic institution’s contingency planning that
Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if each of the following events occur:● Virus attack● Power failure●
Iris tried not to smile. “Of course, it isn’t technically a disaster,” she explained, “but I understand what you mean. How much information is lost?”Joel looked at her in dismay. “Lost?
Using a Web search engine, search for the terms “disaster recovery” and “business continuity.” How many responses do you get for each term? Note how many companies do not distinguish between
Visit your library’s newspaper archives and search for recent articles on the subject of threats to InfoSec in your locality. How many examples of threats to InfoSec in the last week can you find?
Search your institution’s (or another organization’s) published documents, including its Web pages. Locate its values, vision, and/or mission statement, as well as strategic goals. Identify any
Using a Web search engine, find five examples of values, vision, and mission statements as well as public declarations of organizational strategy. Do these examples express concern for the security
Mike and Iris met to discuss the strategic plan that would be presented at the upcoming company-wide strategic planning workshop. Mike had given Iris the IT Division’s list of strategic goals. She
Using a Web search engine, find an article from a reputable source, published within the past six months, that reports on the risk coming from inside the organization compared to the risk coming from
Draft a work breakdown structure for the task of implementing and using a PC-based virus detection program (one that is not centrally managed). Don’t forget to include tasks to remove or quarantine
Consider the information stored in your personal computer. Do you, at this moment, have information stored in your computer that is critical to your personal life? If that information became
Charley and Iris met for a working lunch. “First thing you need to do,” Charley told Iris when they met, “is gain some consensus from your higher management to fund a new position for a
Assume that a security model is needed for the protection of information used in the class you are taking—say, the information found in your course’s learning management system (if your class
Identify and describe five problems of international networks that prevent companies from developing effective global systems.
Identify and describe solutions to the five management challenges of developing global systems.
Compare the two major types of planning and control tools.
Identify and describe three methods for helping managers select information systems projects.
Describe the role of end users in developing systems using the traditional systems life cycle, prototyping, application software packages, and end-user development.
Describe four system conversion strategies.
Give three examples of data used in location analytics and explain how each can help businesses.
Identify and describe three factors that prevent managers from making good decisions.
How do enterprise content management systems help organizations manage structured and semistructured knowledge? What are two examples of each type of knowledge handled by these systems?
How do each of the following types of systems acquire and represents knowledge: expert system, case-based reasoning, neural network?
Describe three ways in which businesses are able to sell to other businesses using the Internet.
Describe four features of social commerce.
What are the sources of data for analytical CRM systems? Provide three examples of outputs from analytical CRM systems.
What are three reasons why a company would want to implement an enterprise resource planning (ERP) system and two reasons why it might not want to do so.
What were the business benefits of Vodafone’s global business transformation? How did it change decision making and the way the company operated?
What are the sources of data for analytical CRM systems? Provide three examples of outputs from analytical CRM systems.
What are three reasons why a company would want to implement an enterprise resource planning (ERP) system and two reasons why it might not want to do so.
Describe four reasons why mobile devices used in business are difficult to secure.
Describe three spoofing tactics employed in identity theft using information systems.
How do social search, semantic search, and mobile search differ from searching for information on the Web using conventional search engines?
Compare Web 2.0 and Web 3.0.
Discuss how the following facilitate the management of big data: Hadoop, in-memory computing, analytic platforms.
List the companies you would contact to interview on your trip to determine whether they can help you with these and any other functions you think vital to establishing your office.
This exercise requires that students know how to create queries and reports using information from multiple tables. The solutions provided were created using the query wizard and report wizard
What is the total cost of ownership of technology assets and what are t is cost components?
Showing 2600 - 2700
of 3477
First
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Last