All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
1. What aspects of corporate culture are particularly important for the successful implementation of a knowledge management program like the one at CNA?
3. Describe how structured query language works.
2. What are the benefits of data dictionaries?
1. What are the advantages and disadvantages of relational databases?
6. Define knowledge, and differentiate between explicit and tacit knowledge.
5. Define data governance, and explain how it helps produce high-quality data.
4. Explain how data warehousing operates and how it supports decision making.
3. Explain the advantages of the database approach.
2. Describe the sources of data, and explain how data are collected.
1. Recognize the importance of data, the issues involved in managing data, and the data life cycle.
2. Analyze the risk involved in IFAW’s allowing users from its partner organizations to access the IFAW network.
1. Does the whitelisting process place more of a burden on the IT group at IFAW? Why or why not? Support your answer.
12. Access www.eightmaps.com. Is the use of data on this web site illegal? Unethical? Support your answer.
11. Software piracy is a global problem. Access the following web sites: www.bsa.org and www.microsoft.com/piracy. What can organizations do to mitigate this problem? Are some organizations dealing
10. Access the Computer Ethics Institute’s web site at www.cpsr.org/issues/ethics/cei. The site offers the“Ten Commandments of Computer Ethics.” Study these 10 rules and decide if any others
9. Enter www.alltrustnetworks.com and other vendors of biometrics. Find the devices they make that can be used to control access into information systems.Prepare a list of products and major
8. Visit www.dhs.gov/dhspublic (Department of Homeland Security). Search the site for “National Strategy to Secure Cyberspace” and write a report on their agenda and accomplishments to date.
7. Enter www.scambusters.org. Find out what the organization does. Learn about e-mail scams and web site scams. Report your findings.
6. Complete the computer ethics quiz at http://web.cs.bgsu.edu/maner/xxicee/html/welcome.htm.
5. A company receives 50,000 messages each year.Currently, the organization has no firewalls. On average, there are two successful hackings each year.Each successful hacking results in a loss to the
Assume that the daily probability of a major earthquake in Los Angeles is .07 percent. The chance of your computer center being damaged during such a quake is 5 percent. If the center is damaged, the
Is there any way for a company to know if its security measures are sufficient? Can you devise a method for any organization to determine if its security measures are sufficient?
When are security measures that a company implements sufficient to comply with its obligations?
3. A critical problem is assessing how far a company is legally obligated to go in order to secure personal data. Because there is no such thing as perfect security(i.e., there is always more that
2. Frank Abignale, the criminal played by Leonardo di Caprio in the motion picture Catch Me If You Can, ended up in prison. However, when he left prison, he went to work as a consultant to many
1. An information security manager routinely monitored the Web surfing among her company’s employees. She discovered that many employees were visiting the “sinful six” web sites. (Note: The
9. What types of user authentication are used at your university and/or place of work? Do these authentication measures seem to be effective? What if a higher level of authentication were
8. In 2008, the Massachusetts Bay Transportation Authority (MBTA) obtained a temporary restraining order barring three Massachusetts Institute of Technology students from showing what they claimed to
7. Discuss why the Sarbanes-Oxley Act is having an impact on information security.
6. Why is cross-border cyber-crime expanding rapidly?Discuss possible solutions.
5. Why are authentication and authorization important to e-commerce?
4. Compare information security in an organization with insuring a house.
3. Is security a technical issue? A business issue? Both?Support your answer. Hint: Read Kim Nash, “Why Technology Isn’t the Answer to Better Security,” CIO(www.cio.com), October 15, 2008.
2. Why should information security be of prime concern to management?
1. Why are computer systems so vulnerable?
3. What is the purpose of a disaster recovery plan?
2. What is information system auditing?
1. Describe the two major types of controls for information systems.
2. What are possible disadvantages of least privilege?
1. Why is it so important for organizations to provide least privilege to employees?
3. Describe the issue of intellectual property protection.
2. Describe the various types of software attacks.
1. Give an example of one type of unintentional threat to a computer system.
2. Discuss the trade-offs for utility companies between having their control systems connected to their business systems or not.
1. Will legislation be enough to strengthen SCADA defenses against cyber-attacks? Support your answer. If not, what do you think utility companies should do to protect their SCADA systems?
4. Describe the relationship between IT and privacy.
3. What does a code of ethics contain?
2. Describe the issue of privacy as it is affected by IT.
1. Define ethics and list the four categories of ethics as they apply to IT.
1. Is Childs guilty of the charges against him, namely computer tampering?(a) Discuss this case from the perspective of the prosecutor of the City of San Francisco.(b) Discuss this case from the
How can we ensure that the information will be processed properly and presented accurately to users?n How can we ensure that errors in databases, data transmissions, and data processing are
What information about individuals should be kept in databases, and how secure is the information there?Accuracy Issues
4. Explain IT auditing and planning for disaster recovery
3. Understand the various defense mechanisms used to protect information systems.
2. Identify the many threats to information security.
1. Describe the major ethical issues related to information technology and identify situations in which they occur.
2. Discuss the reasons that there is so much work to be done in giving international agents the technology that U.S. agents have.
1. Is the Web portal at New York Life a strategic information system? Why or why not? Support your answer.
3. Divide the class into teams. Each team will select a country government and visit its official web site (for example, try the United States, Australia, New Zealand, Singapore, Norway, Canada, the
2. Assign group members to UPS (www.ups.com), FedEx (www.fedex.com), DHL (www.dhl.com), and the U.S. Postal Service (www.usps.com). Have each group study the e-commerce strategies of one
d. Checkout systems are now being replaced by selfservice checkout kiosks and scanners. Compare the two in terms of speed, ease of use, and problems that may arise (for example, an item that the
c. Having the information electronically in the system may provide opportunities for additional managerial uses of that information. Identify such uses.
b. What kind of a system is the scanner (TPS, DSS, EIS, ES, etc.)? Why did you classify it as you did?
a. Identify the following components of the Wal-Mart system: inputs, processes, and outputs.
1. Observe your local Wal-Mart checkout counter. Find material on the Web that describes how the scanned code is translated into the price that the customers pay. Hint: Look at www.howstuffworks.com.
8. Enter www.cio.com and find recent information on the changing role of the CIO and the ISD. What is the role of the CIO in organizations today?
7. Access Truste (www.truste.org) and find the guidelines that web sites displaying its logo must follow.What are the guidelines? Why is it important for web sites to be able to display the Truste
6. Enter www.dell.com, and find the current information systems used by the company. Explain how the systems’innovations contribute to Dell’s success.
5. The market for optical copiers is shrinking rapidly. It is expected that by 2010 as much as 90 percent of all duplicated documents will be done on computer printers. Can a company such as Xerox
4. Apply Porter’s Value Chain Model to Dell(www.dell.com). What is Dell’s competitive strategy?Who are Dell’s major competitors? Describe Dell’s business model. Describe the tasks that Dell
3. Apply Porter’s Value Chain Model to Costco(www.costco.com). What is Costco’s competitive strategy?Who are Costco’s major competitors? Describe Costco’s business model. Describe the tasks
2. Compare and contrast the two companies, Google and Amazon, on their strategies, their business models, their IT infrastructures, their service offerings, and their products. After you have
1. Characterize each of the following systems as one (or more) of the IT support systems:a. A student registration system in a universityb. A system that advises physicians about which antibiotics to
10. Discuss the reasons that some information systems fail.
9. Discuss the idea that an information system by itself can rarely provide a sustainable competitive advantage.
8.Why has the Internet been called the creator of new business models?
7.Describe Porter’s value chain model. What is the relationship between the competitive forces model and the value chain model?
6.Describe the five forces in Porter’s competitive forces model and explain how the Internet has affected each one.
5.Why might it be difficult to justify a strategic information system?
4. Is IT a strategic weapon or a survival tool? Discuss.
3. Using Figure 2.2 as your guide, draw a model of a supply chain with your university as the central focus.Keep in mind that every university has suppliers and customers.
2. Knowledge workers comprise the largest segment of the workforce in U.S. business today. However, many industries need skilled workers who are not knowledge workers. What are some examples of these
1. Discuss the logic of building information systems in accordance with the organization’s hierarchical structure.
2. Where do you think the IT staff should be located? Should they be decentralized in the functional areas? Centralized at corporate level? A combination of the two?Explain your answer.
1. How important are end users to the management of the organization’s information resources?
2. What is the relationship between Pitney Bowes’ IT department and Wipro? Is Wipro of strategic importance to Pitney Bowes? What is the role of Pitney Bowes’s IT department with regard to Wipro?
1. Describe the role of Pitney Bowes’ IT department.Is the IT department of strategic importance to the company? Support your answer.
2. Besides our inability to predict the future, what are other reasons that IT projects might fail?
1. Why do SISs support many corporate strategies?
4. What strategies might companies use to gain competitive advantage?
3. Describe Porter’s value chain model. Differentiate between Porter’s competitive forces model and his value chain model.
2. According to Porter, what are the five forces that could endanger a firm’s position in its industry or marketplaces?
1. What are strategic information systems?
3. Can Chubb’s information systems also be an example of the customer orientation strategy?Support your answ
2. What strategies can Chubb use to encourage agents to adopt the company’s information systems?
1. Describe how Chubb’s information systems have enhanced the relationship among the company, agents, and customers.
3. What should Under Armour do to decide if the recession caused its weak financial results in January 2009 or if other factors (such as the company’s running shoe strategy) contributed?
2. Will Under Armour’s use of information technology in developing a running shoe line of products lead to a competitive advantage?Why or why not? Support your answer.
1. Is Under Armour pursuing a viable strategy in moving into the running shoe business? Analyze Under Armour’s risk with this strategy. Discuss the impact of information technology on the level of
3. As we move up the organization’s hierarchy from clerical workers to executives, how does the type of support provided by information systems change?
Showing 300 - 400
of 6653
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last