All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
introduction to information systems
Questions and Answers of
Introduction To Information Systems
The list presented in the article entails a number of solutions that would require data collection from employees. Do you think employers have a right to collect these types of data?
When a person or an organization is granted power, it can often be difficult for this power to be relinquished. If organizations put a number of monitoring and surveillance mechanisms in place to
Do you think it is illegal to create and post a deep fake video?
The hackers were able to avoid jail time for their actions. Do you think their direct disruption of numerous sites and companies’ digital operations should have resulted in more serious penalties?
Think of three more examples of industries or processes that will benefit from the higher speeds and lower latencies offered by 5G.
Not only is 5G expected to provide incredible new capabilities on its own, but it is also expected to act as a magnifier that helps other emerging technologies become even more powerful. How do you
What role do you think managers and higher-level organizational leaders play in promoting compliance and there by a secure organizational culture?
To what extent are social media platforms an important part of your daily interactions? Do you use a certain social media platform because your family or friends use it? Why do you think this is the
You may not have realized that your university has a security policy that guides how students, faculty, and staff can use technological resources. Are you familiar with this policy and what it
If you could go to either Black Hat or Def Con, what topic area would be of most interest to you (technical security, behavioral security, hacking IoT devices, etc.)? Explain.
The comparison of information security to a digital castlehas been used for many years. However, the landscape of technology has changed drastically with the mass proliferation of laptops, mobile
What is your position on the adoption of IoT devices considering their tendency to have poor security controls? Are they worth the risk?
Can you think of any other innovations not listed in the article that companies could use to try to mitigate the risks introduced by employees who may have the virus and be contagious?
What are the implications of deep fake videos for the world of politics, finance, or national security?
If you have abandoned physical storage drives and now use the cloud, do you think you should still keep an external drive with a backup of cloud files?
How did the COVID-19 pandemic influence the use of telecommuting? Do you think this will have a lasting impact on the percentage of workers who are able to work from home?
Search the Internet for a map of undersea fiber lines—based on the number of lines that run into the geographic area where you were born, how likely do you think it would be that Internet
Is it possible that growing numbers of telecommuters could negatively impact Internet stability and speeds as more and more people work from home?
Based on the various cloud computing risks identified in this article, do you now think differently about storing your own data in the cloud? Explain.
Based on the benefits and challenges associated with telecommuting that are presented in this article, would you prefera standard office format or working from home? Explain.
Do you think there are any other risks to undersea fiber lines besides military operations intended to damagethem?
Have you ever taken an online course? If so, how did it differ from a standard classroom environment? What did you like and what did you dislike about online learning? How do you think these pros and
Have you or someone you know become the victim of a phishing attack? What mechanisms did the attacker use to get the victim to fulfill the call to action? What was the outcome of the attack?
Why do you think malicious individuals targeted Zoom? Do you see any parallels between Zoom and Windows?
One measure used to slow the infection rate of COVID-19 was the order to shelter in place. This forced many workers to begin working from home. How does this new working format introduce security
Are you aware of any other types of malicious digital activities that took place during the COVID-19 pandemic?
Were you or anyone you know impacted by cybercrime or nefarious digital actors during the COVID-19 pandemic? What happened?
Why are online criminal activities so difficult to prosecute?
If the dark Web is such a hotbed of criminal activity for hackers, why isn’t it shut down, or at least, why aren’t the criminals arrested and prosecuted?
Is it possible that companies could just keep using legacy systems to avoid the cost, risk, and security vulnerabilities associated with ERP systems?
If you were the employee in the hypothetical scenario presented at the beginning of this article, would you opt in or opt out of the wearables program? Explain.
Employees are cited as one of the pain points in an ERP system deployment. Why do you think this is? Don’t you think workers would be excited or motivated by the opportunity to use a
If you were the manager in the hypothetical scenario presented at the beginning of this article, would you be interested in accessing wearables data and thus support thewearables program? Explain.
The article mentions that many companies have to alter the functionality of off-the-shelf ERP solutions to match their business processes. What do you think companies operating in unique market
Think about the passwords that you use to access various sites and accounts. How many different passwords do you use? Do you reuse any of your passwords? Are any of your reused passwords also used
If you could test out one of the new technologies outlined in this article, which one would it be? Explain.
Take an inventory of your text messages or emails for the past day. How many times do you even marginally misrepresent the truth? Does your own track record support the observation that most people
Consider and answer the questions introduced in the beginning of the article. When did you create your first social media account? Which plat form did you choose, and why did you choose that one
The article reports that the human deception detection accuracy rate is right around 50 percent. The studies used to calculate this statistic are largely based on participants who were college
How of ten do you engage with social media? As you read the article and learned about the emerging technologies that may be used as a part of future social media experiences, how did you feel? Are
The article mentions that younger generations are starting to plateau in their use of social media—what do you think is driving this trend? Are you a part of this trend?
Are you guilty of using impression management tactics on your own social media accounts? Or have you found yourself impacted by the possible impression management tactics of others? Overall, does the
Do you think there are any adverse effects of social media use? Have you ever noticed any of these effects in your own life?
You have probably heard of the polygraph machine—a device designed to measure physiological responses of interviewees while they are being asked a number of questions to identify if deception is
Sustainability becomes an even more important issue when considering e-waste at an organizational level (i.e., think how much e-waste is created by your local university, municipality, or hospital).
Describe how the class enrollment application at your university could benefit from a mobile application that uses the cloud.
Imagine you have partnered with a company to develop the next best gadget to be featured at an upcoming CES. What gadget would you create?
Judging from your personal experience, describe the BYOD policy that appears to be in place at your university. Explain the advantages and disadvantages of the policy to you as a student and to the
Take a few minutes to take inventory of all of your electronic devices. Next, identify the typical life span of each of these products. Estimate how many devices you might abandon over the span of 10
Phones are one of the devices that we replace most frequently. Brainstorm three different ways that a phone could be repurposed for something else instead of just being thrown away.
Think about your own password reuse behavior. Do you reuse passwords for your own personal accounts? If so, has the scenario provided in this article changed your perception ofpassword reuse so that
Have you chosen to store any of your personal data in the cloud? If so, do you store all of your data or only certain types of data? If not, what factors have inhibited you from trusting your data in
The article mentions keystroke analysis as a way to detect and ultimately prevent password reuse. How do you think that the evaluation of someone’s typing behavior could beused to identify password
How does password reuse compare or contrast to physical use of the same key for every door that you have to open over the course of a week? Think about the implications of losing that one key that
In a business setting, what types of organizations would place greater value on security rather than convenience?What types of organizations would prioritize convenience over security?
The article mentions that the Stuxnet attack relied on compromising programmable logic controllers (PLCs). Do some online research and find out if PLCs are used for any other applications. Does this
Why do you think phishing attacks have the success rates that they do? Do you think it is likely that you would be the target of a spear phishing attack?
What do you think would happen if a regional power outage was to occur in the northeastern United States for several months? How would the time of year impact the implications of a power outage of
People often use the terms Web and Internet interchangeably, but they are not the same. Do your best to define each and identify exactly how they are different.
Here is a line from Shakespeare’s Macbeth: “Tomorrow and tomorrow and tomorrow, creeps in its petty pace.” Explain how to use these lines to create a password. How could you add numbers and
List two different phrases that you can use to create a strong password. Show the password created by each.
The article talks about Web 1.0 and Web 2.0. You may be wondering if Web 2.0 is the end of the line. What do you think—will there be a Web 3.0, and if so, what would it entail?
One of the problems of life in the cyberworld is that we all are required to have multiple passwords—one for work or school, one for bank accounts, another for eBay or other auction sites, and so
While IoT is clearly having an impact on businesses (e.g., tracking manufacturing using sensors in production lines) and cities (e.g., tracking traffic flows, lighting, public transportation), how
Explain proper behavior when you are using your computer and you need to enter, for some valid reason, another person’s password.
Do you think IoT devices feature the newest and most advanced security measures, or could there be potential security risks from using IoT devices?
Explain proper behavior when someone else is using her computer and that person needs to enter, for some valid reason, your password.
Do you think criminals will actually decrypt your data if you pay them the ransom?
Some of the most innovative and powerful companies in the world are technology companies (e.g., Google, Facebook, Apple, Amazon, and Netflix). Out of the five companies on this list, could a case be
If you are 100 percent certain that paying the ransom for your data will result in it being decrypted, should you do it? Explain.
Can you think of any other technologies that employ sensor fusion, cameras, and computer vision?
The article mentions that surveillance of and attacks against critical infrastructure are growing commonplace. Take a few minutes to search for the latest examples of these types of attacks against
Can you think of any other industries that have been disrupted, or seen processes drastically changed, due to innovationsin technology over the past 10-plus years?
Can you think of any examples of known international cyberattacks that have succeeded in damaging their targets?
Can you think of any emerging technologies that will disrupt,or change, processes in industries over the next 10-plus years?
Remove PrescriberID and put PatientID in the Rows box. Which patient generates the most income for the pharmacy?Detecting unusual patterns in drug prescriptions is the focus of this e-project. To
After reviewing the plan, answer these questions:1. What does the plan say are the agency's mission and vision?2. What does the plan identify as strategic goals?3. What does the plan say about
Beyond not being the first firm to implement a particular piece of software, what other more general lessons apply for software implementation?The airline reserva ti o n syste m is more than just
What are some key differences between the JetBlue and WestJet software implementations?The airline reserva ti o n syste m is more than just automated ticke ting for an airline; it is the interface
What is the value of having Gartner review its past predictions?As the world's leading research and advisory company on all matters relating to information technology, Gartner, Inc., attempts to see
How could organizations apply the Gartner hype cycle to their strategies?As the world's leading research and advisory company on all matters relating to information technology, Gartner, Inc.,
What other information do company executives need to have beyond the type of information provided by Gartner?As the world's leading research and advisory company on all matters relating to
What does this case tell us about the relationship between information systems and strategic planning?As the world's leading research and advisory company on all matters relating to information
How is a work breakdown structure used in project management?
What role does a project manager play in overseeing a project? What skills do project managers need? What are the characteristics of effective project managers?
Create a 100 percent stacked area chart using Severe, Minor, and Total Defects columns.Excel is a useful tool to analyze data from software development. In this e-project, you will analyze the
How did the website change over this time period? What new features or services were added or removed?The Internet archive (www.archive.org) is a nonprofit organization that builds the internet's
Does the research mentioned at the end of the case study influence your view of XP?The agile software development method called extreme programming (XP) has i ts enthusiasts and detractors, and the
Why could a methodology such as extreme programming be good for a military project? What might be its disadvantages?The agile software development method called extreme programming (XP) has i ts
What types of changes accompany the extreme programming methodology?The agile software development method called extreme programming (XP) has i ts enthusiasts and detractors, and the jury is still
How did the US Strategic Command adjust to unexpected issues as it implemented extreme programming?The agile software development method called extreme programming (XP) has i ts enthusiasts and
What might BabyCenter.com business stakeholders and developers not like about the new software development process? How could BabyCenter. corn executives respond to these concerns?BabyCenter.com's
What cultural changes were required for BabyCenter. com employees to adapt to the new software development process?BabyCenter.com's website pioneers some of the most interactive and engaging tools
Describe the new software development process at BabyCenter.com. How has the software development process changed?BabyCenter.com's website pioneers some of the most interactive and engaging tools for
Describe the previous software development process at BabyCenter.com.BabyCenter.com's website pioneers some of the most interactive and engaging tools for parents and parents-to-be, with birth
The Hortons are cooking enthusiasts who want to use a database to manage their collection of recipes. They have asked you to help them create the Access database shown in Figure 11.17. Use the
Jay and friends started Jay's Bikes in the family garage. Cycling is their passion! They moved to their bicycle-friendly community because of its three great bike trails that were built by the city
If software doesn't wear out, which phase is generally the longest phase in the SDLC? Maintenance begins in the first few weeks of implementation and may last for many years until such time as the
The rigorous testing that takes place during the development phase of the SDLC encompasses much more than looking for bugs. What are the six types of testing that may be performed in the development
Recall from Chapter 3 that enterprise architecture describes the blueprint of the information technology and organizational resources that are used to execute business processes. At what stage in the
Showing 1 - 100
of 253
1
2
3