Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CIN708 - Management Information Systems Tutorial 01 Describe the information age and the differences between data, information, business intelligence, and knowledge. Explain systems thinking and

CIN708 - Management Information Systems

Tutorial 01

  1. Describe the information age and the differences between data, information, business intelligence, and knowledge.

Explain systems thinking and how management information systems enable business communications.

Compare management information systems (MIS) and information technology (IT).

Identify four different departments in a typical business and explain how technology helps them to work together.

Explain how Apple achieved business success through the use of information, information technology, and people.

Explain why competitive advantages are temporary.

Describe and compare buyer power and supplier power in Porter's Five Forces Model. Also, explain how an organization can manipulate buyer power and supplier power.

List and describe Porter's three generic strategies and provide an example of a company that is using each strategy.

Demonstrate how a company can add value by using Porter's value chain analysis.

Explain the interrelationships of efficiency and effectiveness IT metrics.

List and describe the five common IT-related strategic positions.

Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.

CIN708 - Management Information Systems

Semester 1, 2021

Tutorial 04

  1. Describe the relationship between information security policies and an information security plan.
  2. Summarize the five steps to creating an information security plan.
  3. List and describe the three primary security areas.
  4. Describe authentication and the most secure type of authentication.
  5. Describe the relationships and differences between hackers and viruses.
  6. Describe the important ethical concepts steaming from information technology.
  7. Discuss the reasons why privacy issues lose trust for e-businesses.
  8. Describe the relationship between ethics and privacy.
  9. Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
  10. Identify the differences between an ethical computer use policy and an acceptable computer use policy.
  11. Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
  12. Explain the ethical issues in the use of information technology.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials Of Strategic Management

Authors: J. Hunger, Thomas Wheelen

5th Edition

0136006698, 9788120348615

More Books

Students also viewed these General Management questions

Question

2. Ask questions, listen rather than attempt to persuade.

Answered: 1 week ago