New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
essentials of management
Essentials Of Mis 8th Edition Kenneth Laudon - Solutions
What types of systems are used for enterprise-wide knowledge management and knowledge work, and how do they provide value for businesses?• Define knowledge management and explain its value to businesses.• Define and describe the various types of enterprise-wide knowledge systems and explain how
What are the business benefits of using intelligent techniques in decision making and knowledge management?• Define an expert system, describe how it works, and explain its value to business.• Define case-based reasoning and explain how it differs from an expert system.• Define a neural
How do BI and business analytics support decision making?• Define and describe business intelligence and business analytics.• List and describe the elements of a BI environment.• List and describe the analytic functionalities BI systems provide.• Define predictive analytics and location
What are the different types of decisions and how does the decision-making process work?• List and describe the different decision-making levels and groups in organizations and their decision-making requirements.• Distinguish among an unstructured, semistructured, and structured decision.•
List and describe the main activities involved in building an e-commerce presence.
Describe the six features of social commerce. Provide an example for each feature, describing how a business could use that feature for selling to consumers online.
Will Walmart be successful against Amazon.com? Explain your answer.
What role does information technology play in each of these businesses? How is it helping them refine their business strategies?
Compare Walmart’s and Amazon’s business models and business strategies.
10-15 Analyze Walmart and Amazon.com, using the competitive forces and value chain models.
Form a group with three or four of your classmates. Select two businesses that are competitors in the same industry and that use their websites for electronic commerce. Visit these websites. You might compare, for example, the websites for Pandora and Spotify, Amazon and BarnesandNoble.com, or
This project will help develop your Internet skills in evaluating commercial services for hosting an e-commerce site for a small start-up company.
Pick one e-commerce company on the Internet—for example, Ashford, Yahoo, or Priceline. Study the web pages that describe the company and explain its purpose and structure. Use the web to find articles that comment on the company.Then visit the Securities and Exchange Commission’s website at
Explore the Web sites of the following companies: Eurosparkle, Promod, Kingfisher plc, and ebookers.com. Determine which of these Web sites would benefit most from adding a company-sponsored blog to the Web site. List the business benefits of the blog. Specify the intended audience for the
Columbiana is a small, independent island in the Caribbean that has many historical buildings, forts, and other sites along with rain forests and striking mountains. A few first-class hotels and several dozen less expensive accommodations lie along its beautiful white-sand beaches. The major
How have social technologies changed e-commerce?
The mobile platform may not make desktop PCs obsolete, but corporations will have to change their business models to adjust to this shift. Do you agree? Why or why not?
How does the Internet change consumer and supplier relationships?
What issues must be addressed when building an e-commerce presence?• List and describe the four types of e-commerce presence.
What is the role of m-commerce in business, and what are the most important m-commerce applications?• List and describe important types of m-commerce services and applications.• Describe common location-based services and applications.
How has e-commerce affected business-to-business transactions?• Explain how Internet technology supports business-to-business electronic commerce.• Define and describe exchanges and explain how they differ from Net marketplaces.
How has e-commerce transformed marketing?• Explain how social networking and the wisdom of crowds help companies improve their marketing.• Define behavioral targeting and explain how it works at individual websites and on advertising networks.• Define the social graph and explain how it is
What are the principal e-commerce business and revenue models?• Summarize the three main types of e-commerce.• Name and describe the principal e-commerce business models.• Name and describe the e-commerce revenue models.
10 - 1 What are the unique features of e-commerce, digital markets, and digital goods?• Name and describe four business trends and three technology trends shaping e-commerce today.• List and describe the eight unique features of e-commerce.• Explain how e-commerce has become more social,
What are the sources of data for analytical CRM systems? Provide three examples of outputs from analytical CRM systems.
What are three reasons a company would want to implement an enterprise resource planning (ERP) system and two reasons it might not want to do so.
Describe two operational activities and two business decisions that were improved by Celcom’s new CRM capabilities.
How effective was this solution? How did it affect the way Celcom ran its business and its business performance?
Describe Celcom’s solution to its problem.What people, organization, and technology issues did the solution have to address?
What was Celcom’s business strategy and what was the role of customer relationship management in that strategy?
9-13 What was the problem at Celcom that was described this case? What people, organization, and technology factors contributed to this problem?
With a group of three or four students, use the web to research and evaluate the products of two vendors of enterprise application software. You could compare, for example, the SAP and Oracle enterprise systems, the supply chain management systems from JDA Software and SAP, or the customer
Third party logistics providers provide transportation, consolidation, forwarding and customs brokerage, warehousing, fulfillment, distribution and virtually any logistics and trade-related services that their international customers need.In this project, you’ll use the Web to research and
In this exercise, you’ll use database software to develop an application that tracks customer service requests and analyzes customer data to identify customers meriting priority treatment.Prime Service is a large service company that provides maintenance and repair services for close to 1200
Office Depot is a global supplier of office supply products and services in 59 countries. The company tries to offer a wider range of office supplies at lower cost than other retailers by using just-in-time replenishment and tight inventory control systems. It uses information from a demand
What advantages does a firm gain by implementing a social CRM application?
If a company wants to implement an enterprise application, it had better do its homework. Discuss the implications of this statement.
Supply chain management is less about managing the physical movement of goods and more about managing information. Discuss the implications of this statement.
What are the challenges that enterprise applications pose and how are enterprise applications taking advantage of new technologies?• List and describe the challenges enterprise applications pose.• Explain how these challenges can be addressed.• How are enterprise applications taking advantage
How do customer relationship management systems help firms achieve customer intimacy?• Define customer relationship management and explain why customer relationships are so important today.• Describe how partner relationship management (PRM) and employee relationship management (ERM) are
How do supply chain management systems coordinate planning, production, and logistics with suppliers?• Define a supply chain and identify each of its components.• Describe some of the issues that arise with supply chains and explain what causes them.• Define and compare supply chain planning
How do enterprise systems help businesses achieve operational excellence?• Define an enterprise system and explain how enterprise software works.• List the business processes supported by enterprise systems.
Describe four reasons mobile devices used in business are difficult to secure.
Describe three spoofing tactics employed in identity theft by using information systems.
8-16 Describe some of the weaknesses exploited by malware.
8-15 Explain how a cyberattack can be carried out.
8-14 Describe some of the main points of the Network and Information Security (NIS)Directive.
8-13 What is a botnet?
With a group of three or four students, use the web to research and evaluate security products from two competing vendors, such as for antivirus software, firewalls, or antispyware software. For each product, describe its capabilities, for what types of businesses it is best suited, and its cost to
This project will help develop your Internet skills in using the web to research and evaluate security outsourcing services.
This project uses spreadsheet software to calculate anticipated annual losses from various security threats identified for a small company.Mercer Paints is a paint manufacturing company located in Alabama that uses a network to link its business operations. A security risk assessment that
A survey of your firm’s IT infastructure has identified a number of security vulnerabilities.Review the data about these vulnerabilities, which can be found in a table in MyMISLab. Use the table to answer the following questions:• Calculate the total number of vulnerabilities for each platform.
Gifty is an online e-tailer for handmade gifts. Customers can purchase either via its Web site or via a mobile app. Prepare a security analysis for this Internetbased business. What kinds of threats should it anticipate? What would be their impact on the business? What steps can it take to prevent
Suppose your business had an e-commerce website where it sold goods and accepted credit card payments. Discuss the major security threats to this website and their potential impact. What can be done to minimize these threats?
Who poses the biggest security threat – insiders or outsiders?
Security isn’t simply a technology issue, it’s a business issue. Discuss.
What are the components of an organizational framework for security and control?• Define general controls and describe each type of general control.• Define application controls and describe each type of application control.
What is the business value of security and control?• Explain how security and control provide value for businesses.• Define computer forensics and explain what it is used for.
Why are information systems vulnerable to destruction, error, and abuse?• List and describe the most common threats against contemporary information systems.• Define malware and distinguish among a virus, a worm, and a Trojan horse.• Explain the challenges presented in securing wireless
How do social search, semantic search, and mobile search differ from searching for information on the web by using conventional search engines?
Compare Web 2.0 and Web 3.0.
How is RFID technology helping the Allianze University College of Medical Sciences library to detect and prevent the theft of books?
What kind of technology does your school or university library use? Does IT play a crucial role in managing operations?
How can RFID technology simplify basic library processes like the lending and returns of books?
Form a group with three or four of your classmates. Compare the capabilities of Apple’s iPhone with a smartphone handset from another vendor with similar features. Your analysis should consider the purchase cost of each device, the wireless networks where each device can operate, plan and handset
This project will help develop your Internet skills in using web search engines for business research.
In this project, you’ll use the web to research alternative wireless services and use spreadsheet software to calculate wireless service costs for a sales force.
BD sells medical devices and instrument systems to hospitals, health clinics, medical offices, and laboratories in over 50 countries. The company employs over 30,000 people around the world, including account managers, customer service and support representatives, and warehouse staff. Management is
Your company supplies ceramic floor tiles to Leroy Merlin, Bricorama, and other home improvement stores in France. You have been asked to start using radio frequency identification tags on each case of tiles you ship to help your customers improve the management of your products and those of other
What are some of the issues to consider in determining whether the Internet would provide your business with a competitive advantage?
Does anyone own the Internet?Discuss how the Internet is currently governed and consider whether countries should be able to impose its own rules on the Internet within their own borders.
It has been said that within the next few years, smartphones will become the single-most important digital device we own. Discuss the implications of this statement.
What are the principal technologies and standards for wireless networking, communications, and Internet access?• Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks.• Describe the capabilities of each and for which types of applications each is best suited.• Define RFID, explain how it
How do the Internet and Internet technology work, and how do they support communication and e-business?• Define the Internet, describe how it works, and explain how it provides business value.• Explain how the Domain Name System (DNS) and IP addressing system work.• List and describe the
What are the different types of networks?• List and describe the different types of physical transmission media.• Distinguish between a LAN, MAN, and WAN.
What are the principal components of telecommunications networks and key networking technologies?• Describe the features of a simple network and the network infrastructure for a large company.• List and describe the four layers of the Department of Defense’s reference model for TCP/IP.•
Discuss how the following facilitate the management of big data: Hadoop, in-memory computing, analytic platforms.
Define web mining and describe the three ways that web mining looks for patterns in data.
6-16 What are the main advantages and disadvantages of having multiple databases in a distributed architecture? Explain.
6-15 Identify some of the business intelligence features included in SAP’s business software suite.
6-14 Explain why distributed architectures are flexible.
6-13 Explain the role of the database in SAP’s threetier system.
With your team of three or four students, select an online database to explore, such as AOL Music, iGo.com, or the Internet Movie Database. Explore one of these websites to see what information it provides. List the entities and attributes that the company running the website must keep track of in
This project develops skills in searching online web-enabled databases with information about products and services in faraway locations.Your company, Caledonian Furniture, is located in Cumbernauld, Scotland, and manufactures office furniture of various types. You are considering opening a
In this exercise, you will use database software to design a database for managing inventory for a small business. Sylvester’s Bike Shop, located in San Francisco, California, sells road, mountain, hybrid, leisure, and children’s bicycles.Currently, Sylvester’s purchases bikes from three
Your industrial supply company wants to create a data warehouse from which management can obtain a single corporate-wide view of critical sales information to identify bestselling products, key customers, and sales trends.Your sales and product information are stored in several systems: a
Iko Instrument Group, a global supplier of measurement, analytical, and monitoring instruments and services based in the Netherlands, had a new data warehouse designed to analyze customer activity to improve service and marketing. However, the data warehouse was full of inaccurate and redundant
What are the consequences of an organization not having an information policy?
To what extent should end users be involved in the selection of a database management system and database design?
It has been said that you do not need database management software to create a database environment.Discuss.
Why are information policy, data administration, and data quality assurance essential for managing the firm’s data resources?• Define information policy and data administration and explain how they help organizations manage their data.• Explain why an organization needs an information
What are the principal tools and technologies for accessing information from databases to improve business performance and decision making?• Define big data and describe the technologies for managing and analyzing big data.• List and describe the components of a contemporary business
What is the total cost of ownership of technology assets and what are its cost components?
Allowing employees use their own smartphones for work will save the company money.Do you agree? Why or why not?
Form a group with three or four of your classmates. Choose two server or mobile operating systems to evaluate. You might research and compare the capabilities and costs of Linux versus UNIX or the most recent version of the Windows operating system for servers. Alternatively, you could compare the
Hischornklinik Group is a leading private medical clinic group in Germany.It relies on information systems to operate 14 hospitals, as well as hundreds of specialist institutes. Demand for additional servers and storage technology iswas growing by 20 percent each year. Hischornklinik was setting up
What are the advantages and disadvantages of BYOD?
Should organizations use software service providers (including cloud services) for all their software needs? Why or why not? What people, organization, and technology factors should be considered when making this decision?
Why is selecting computer hardware and software for the organization an important business decision?What people, organization, and technology issues should be considered when selecting computer hardware and software?
What are the principal issues in managing hardware and software technology?• Explain why managers need to pay attention to capacity planning and scalability of technology resources.• Describe some methods that firms can use to reduce TCO of technology assets.• Identify the benefits and
Showing 800 - 900
of 1879
First
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Last
Step by Step Answers