All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
principles information systems
Questions and Answers of
Principles Information Systems
=+3. Apply the normative theories of business ethics to this situation.
=+2. What are some possible disadvantages that the employees of Midwest Family Mutual might be experiencing as a result of its virtual work‐from‐home office environment?
=+Do you think that most companies could see similar types of economic gains? Explain.
=+1. Do you think that the economic benefits that Midwest Family Mutual realized as a result of green computing are unusual?
=+2. Do you think it is ethical for women to hire Spokeo to see if their boyfriends are cheating on them? Why or why not?
=+1. Do you think it would be ethical for a business to hire Spokeo to find out about potential employees? If so, under what conditions would it be appropriate? If not, why not?
=+3. Apply the normative theories of business ethics to Google ’ s new policy about combining user information?
=+2. How might users change their behaviors if they were aware of this new approach?
=+1. Do you see any ethical issues involved in Google ’ s recent approach to combining information from a particular user?Why or why not?
=+2. Apply the normative theories of business ethics to this situation.
=+1. Do you think it would be ethical for a business to install eBlaster to ensure that its employees are engaged only in work‐related activities? If so, under what conditions would using it be
=+3. Who do you think should have access to the data? How should that access be controlled?
=+2. Who would own the data? Explain.
=+1. Discuss any potential and real threats to privacy in this situation. Search for news articles about Facebook to find problematic incidents, if any.
=+3. Would your opinion change if the software is a critical system for We_Sell_More.com? If it is a noncritical system?Explain.
=+2. If We_Sell_More.com wants to continue to use the system, can it? Why or why not?
=+1. Is Jane obligated to stop using her backup copy? Why or why not?
=+4. Apply the normative theories of business ethics to this situation.
=+3. What management practices should be in place to ensure proper behavior without violating individual “rights”?
=+2. What, if any, ethical principles help guide decision making in this situation?
=+1. What should Essex do?
=+6. Do you believe sending targeted advertising information to a computer using cookies is objectionable? Why or why not?
=+5. If you were a consultant to ICANN.org and were asked to create a global Internet privacy policy, what would you include in it? Create a summary of your recommendations.
=+types of restrictions be made into law? Why or why not? Should the United States bring its laws into agreement with the EU directive?
=+they are operating, collecting data only with the consent of the subjects, and telling subjects of databases the intended and actual use of the databases. What effect might these restrictions have
=+4. The European Community’s Directive on Data Protection strictly limits how database information is used and who has access to it. Some restrictions include registering all databases containing
=+How might hiring decisions be influenced inappropriately by this information?
=+officials use these records often. Approximately 90% of all criminal histories in the United States are available to public and private employers. Use the three normative theories of business
=+3. Consider arrest records, which are mostly computerized and stored locally by law enforcement agencies. They have an accuracy rate of about 50%—about half of them are inaccurate, incomplete,
=+How accurate is the picture Google paints about you in your profile?
=+2. Check out how Google has profiled you. Using your own computer, go to Ad Preferences: www.google.com/ads/ preferences.
=+1. Private corporate data are often encrypted using a key, which is needed to decrypt the information. Who within the corporation should be responsible for maintaining the “keys” to private
=+3. Was the introduction of the Monster Thickburger a good idea or an example of information leading to a wrong decision?
=+2. What are some tips for developing and using the BIS described in this case?
=+1. How does the business intelligence system (BIS) at CKEadd value to the business?
=+3. What is the benefit of Scan It! for the customers? What concerns might shoppers have about their privacy? How would you advise Stop & Shop management to respond to these concerns?
=+2. How would you assess the level of capabilities of Stop & Shop ’ s use of analytics? What might the company do differently with the data to gain more value?
=+ What are some of the questions the company could answer about its customers?
=+1. What is the benefit of the Scan It! data to Stop & Shop ?
=+Everybody goes there sometimes, but when they ’ re looking for expertise, most people go down the hall.” 27 Why do you think that Knowledge Curve is underutilized?
=+insights, links to external Web sites and news services, online training courses, directories of in‐house experts, and other forms of explicit knowledge. Yet, according to one of the firm ’ s
=+7. PricewaterhouseCoopers has an elegant, powerful intranet knowledge management system called Knowledge Curve. It makes available to its consultants and auditors a compendium of best practices,
=+ Do you think that the Digital Millennium Copyright Act is the type of legislation that should be enacted to protect intellectual property? Why or why not?
=+6. Why is it so difficult to protect intellectual property?
=+5. How do social media analytics aid an organization? Give an example of a social media data stream and the type of insight that might be drawn from it.
=+data that you would like to monitor. Please explain why this would be beneficial to you.
=+4. How will the Internet of Things change the way managers make decisions? Give an example of a data stream from sensor
=+From your own experience, describe an example of each. How might an organization manage tacit knowledge?
=+3. What is the difference between tacit and explicit knowledge?
=+2. The terms data , information , and knowledge are often used interchangeably. But as this chapter discussed, they can be seen as three points on a continuum. What, if anything, in your opinion,
=+What is the role of information technology (IT) in helping build this competence for the enterprise?
=+1. What does it take to be a successful competitor using business analytics?
=+• What is our customer’s experience with this problem?
=+• How well received is our latest marketing campaign?
=+• What do our customers think about our position on this issue?
=+3. When a project is outsourced, who should manage the project—the internal group or the outsourcer? Why?
=+2. Describe the development methodology that was applied to this project. Was this the most appropriate approach?Provide a rationale for your response.
=+What, if any, of these strategies were adopted in this project?
=+1. Assess the risks of this project. Given your assessment of the project complexity, clarity, and size, what management strategies would you recommend for it?
=+3. Assess Southern ’s ECM system on the four dimensions of project success. How successful do you think this project is?
=+2. Describe how Traynor could have applied Lewin ’ s three‐stage model of change in implementing the ECM. What would have been the advantages of applying Lewin ’ s three‐stage model?
=+1. What type of development methodology appears to have been employed at Southern Company for the ECM project?Was this a good approach? Provide a rationale for your response.
=+c. How should Lego manage the open source movement?
=+b. What are the disadvantages of Lego ’ s approach to open sourcing?
=+a. What are the advantages of Lego ’ s approach to open sourcing?
=+their robots. To date, Lego has done nothing to stop this open source movement even though thousands of Lego ’ s customers now operate their robots with software the company didn ’ t produce or
=+intention of hacking it. They wanted to make the software more flexible and powerful. They deciphered Mindstorms’ proprietary code, posted it on the Internet, began writing new advanced
=+first Christmas in 1998. In its first year, a staggering 100,000 kits were sold, far beyond the 12,000 units the company had projected. Of Mindstorms’ early customers, 70% were old enough to
=+5. Lego ’ s Mindstorms Robotics Invention System was designed for 12‐year‐olds. But after more than a decade of development at the MIT Media Lab using the latest advances in artificial
=+How can a general manager assist in minimizing these risk components?
=+ What determines the level of organizational risk?
=+4. What determines the level of technical risk associated with a project?
=+3. What are the critical success factors for a project manager? What skills should managers look for when hiring someone who would be successful in this job?
=+2. Why does it often take a long time before troubled projects are abandoned or brought under control?
=+What criteria should managers use to manage this trade‐off?
=+1. What are the trade‐offs between cost, quality, and time designing a project plan?
=+• How and when will these other systems be coordinated?
=+• What other corporate systems and processes will this project affect?
=+• Does the company possess the technical expertise in house to build the site?
=+• How will this sales process interface with the existing customer fulfillment process?
=+• Will this site support global, national, regional, or local sales?
=+• How many products will this Web site sell?
=+3. Is this a good idea to market Altia Business Park as a nearshoring site to people in North America? Why or why not?
=+2. Barbara Rivera is marketing Altia Business Park as a nearshoring site to companies in North America. What characteristics make it a desirable nearshoring site to them?
=+1. Discuss offshoring from the perspective of potential workers in your country. Discuss offshoring from the perspective of potential workers in Honduras.
=+4. Describe the advantages and disadvantages of crowdsourcing.
=+3. What factors should be considered when deciding whether to crowdsource a particular part of a business?
=+2. What steps do you think Maloney might have taken to ensure that the crowdsourcing would be a success for the inventory project?
=+1. Is crowdsourcing as used by AOL a form of outsourcing? Why or why not?
=+4. Does a captive center resolve the concerns managers have about outsourcing to a third party vendor? Why or why not?
=+3. When does cloud computing make sense for a large corporation that already has an IS organization? Give an example of cloud computing that might make sense for a start‐up company.
=+2. Is offshoring a problem to your country? To the global economy? Please explain.
=+What are the key reasons it should buy an application?
=+What, in your opinion, are the key reasons an IS organization should make its own systems?
=+1. The make‐versus‐buy decision is important every time a new application is requested of the IS group.
=+5. What other parties might have been interested in obtaining the information in John Deere ’ s cloud? What might they have done with it?
=+4. How do you think John Deeremight have overcome those internal and external difficulties?
=+3. What difficulties do you believe John Deere faced externally among the proposed users?
=+2. What difficulties do you think an “old” heavy industry player such as John Deere encountered internally when proposing to develop the MyJohnDeere platform?
=+1. What governance approach did John Deereappear to have adopted? Did it fit the profile of an “old” heavy industry player?
Showing 1 - 100
of 1502
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last