Question
CIN708 - Management Information Systems Tutorial 01 Describe the information age and the differences between data, information, business intelligence, and knowledge. Explain systems thinking and
CIN708 - Management Information Systems
Tutorial 01
- Describe the information age and the differences between data, information, business intelligence, and knowledge.
Explain systems thinking and how management information systems enable business communications.
Compare management information systems (MIS) and information technology (IT).
Identify four different departments in a typical business and explain how technology helps them to work together.
Explain how Apple achieved business success through the use of information, information technology, and people.
Explain why competitive advantages are temporary.
Describe and compare buyer power and supplier power in Porter's Five Forces Model. Also, explain how an organization can manipulate buyer power and supplier power.
List and describe Porter's three generic strategies and provide an example of a company that is using each strategy.
Demonstrate how a company can add value by using Porter's value chain analysis.
Explain the interrelationships of efficiency and effectiveness IT metrics.
List and describe the five common IT-related strategic positions.
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
CIN708 - Management Information Systems
Semester 1, 2021
Tutorial 04
- Describe the relationship between information security policies and an information security plan.
- Summarize the five steps to creating an information security plan.
- List and describe the three primary security areas.
- Describe authentication and the most secure type of authentication.
- Describe the relationships and differences between hackers and viruses.
- Describe the important ethical concepts steaming from information technology.
- Discuss the reasons why privacy issues lose trust for e-businesses.
- Describe the relationship between ethics and privacy.
- Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
- Identify the differences between an ethical computer use policy and an acceptable computer use policy.
- Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
- Explain the ethical issues in the use of information technology.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started