New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
experiencing mis
Experiencing MIS 6th Edition David M Kroenke, Randall J Boyle - Solutions
How might browser botnet armies be prevented?
Why do devices, operating systems, and applications begin to have more security issues as they become more popular?
It seems unlikely that everyone who finds a new security threat goes to Black Hat and presents it to the public. What are other options? How can knowledge of this possibility help you?
Using both the categorical imperative (pages 16-17) and utilitarianism (pages 42-43), assess the ethics of spying. Consider a government spying on its own citizens, foreign militaries, foreign governments, foreign corporations, or foreign citizens.
Describe what you think should be done with the NSA's PRISM program. Should it be continued without change, given more public oversight, substantially reduced in functionality, or discontinued altogether? Justify your decision.
Without the illegal disclosure of top-secret documents by Edward Snowden, the PRISM program may never have been discovered. Were Snowden's actions ethical? Consider both the categorical imperative and utilitarianism perspectives in your response.
What is your opinion of employee monitoring? What effect does employee monitoring have on employee morale? How could employee monitoring make the organization more secure?
Describe the differences between freedom and privacy. Does a loss of privacy always mean a loss of freedom? Describe how your conclusions about the differences in these words pertain to PRISM.
To learn the fundamentals of phishing, visit the following site: www.microsoft.com/protect /fraud/phishing/symptoms.aspx. To see recent examples of phishing attacks, visit www.fraudwatchinternational.com/phishing/.a. Using examples from these Web sites, describe how phishing works.b. Explain why a
Define threat, vulnerability, safeguard, and target. Give an example of each. List three types of threats and five types of security losses. Give different examples for the three rows of Figure 10-2. Summarize each of the elements in the cells of Figure 10-3. Explain why it is difficult to know the
Explain why it is difficult to know the true size of the computer security problem in general and of computer crime in particular.List the takeways in this question and explain the meaning of each.
Explain each of the elements in Figure 10-7. Define DS, and explain why the use of an IDS program is sobering, to say the least. Define brute force attack. Summarize the characteristics of a strong password. Explain how your identity and password do more than just open doors on your computer.
Name and describe two security functions that senior management should address. Summarize the contents of a security policy. Explain what it means to manage risk. Summarize the steps that organizations should take when balancing risk and cost.
List five technical safeguards. Define identification and authentication.Describe three types of authentication. Explain how SSL/TLS works. Define firewall, and explain its purpose.Define malware, and name five types of malware. Describe six ways to protect against malware. Summarize why malware is
Define data administration and database administration, and explain their difference. List data safeguards.
Summarize human safeguards for each activity in Figure 10-
Summarize safeguards that pertain to nonemployee personnel.Describe three dimensions of safeguards for account administration. Explain how system procedures can serve as human safeguards. Describe security monitoring techniques.
Summarize the actions that an organization should take when dealing with a security incident.
Summarize the knowledge you have learned from this chapter and explain how it helps you be both a better business professional and a better employee. State the one behavior you should choose above all. Do it!
Suppose you alert your boss to the security threats in Figure 10-3 and to the safeguards in Figure 10-8. Suppose he says, "Very interesting. Tell me more." In preparing for the meeting, you decide to create a list of talking points.a. Write a brief explanation of each threat in Figure 10-3.b.
Go to www.ponemon.org/local/upload/file/2013_US _Cost_of_Cyber_Crime_Study_FINAL6%20.pdfanddownload the 2013 report (or a more recent report if one is available).a. Summarize the survey with regard to safeguards and other measures that organizations use.b. Summarize the study’s conclusions with
Suppose that you are asked by your boss for a summary of what your organization should do with regard to computer security. Using the knowledge of this chapter and your answer to questions 10-4 through 10-6, create a PowerPoint presentation for your summary.Your presentation should include, but not
Why did the attackers spear-phish a contractor to Target?
Explain how a third-party contractor could weaken an organization’s overall security.
Describe how data was stolen from Target.
How might a data loss at one organization affect other organizations?
Explain why large organizations are attractive targets for attackers.
Why might chip-and-pin cards reduce this type of theft?
Why didn’t Target have a CISO before the data breach?
Read about MapReduce and Hadoop on pages 256-257 of Chapter 9 if you have not already done so. Is MapReduce suitable for password cracking? Explain your answer. Assume that it is. If it takes 4.5 years for one computer to crack a password, how long will it take 10,000 computers to crack one using
Using the categorical imperative (pages 16-17) and utilitarian (pages 42-43) perspectives, assess the ethics of each situation above.
Suppose someone from the IS department notifies you that one of your employees is spending 3 hours a day writing Twitter messages.How do you respond?
Suppose someone from the IS department notifies you that one of your employees is sending dozens of personal emails every day.When you ask how he or she knows the emails are personal, you are told that IS measures account activity and when suspicious email usage is suspected the IS department reads
As anemployee, if you know that your company occasionally reads employees’ email, does that change your behavior? If so, does that justify the company reading your email?Do the ethics of this situation differ from having someone read your personal postal mail that happens to be delivered to you
Write what you think is the best corporate policy for personal computer usage at work.Specifically address Facebook, Pinterest, Twitter, and other personal social networking sites.Justify your policy using either the categorical imperative or utilitarianism.
List the five primary functions of the IS department. Define CIO and explain the CIO’s typical reporting relationships.Name the four groups found in a typical IS department, and explain the major responsibilities of each. Define CTO and explain typical CTO responsibilities. Explain the purpose of
Explain the importance of strategic alignment as it pertains to IS planning. Explain why maintaining alignment can be difficult.Describe the CIO’s relationship to the rest of the executive staff. Describe the CIO’s responsibilities with regard to priorities.Explain challenges to this task.
Define outsourcing. Explain how Drucker’s statement “Your back room is someone else’s front room” pertains to outsourcing. Summarize the management advantages, cost advantages, and risks of outsourcing. Differentiate among outsourcing of IaaS, PaaS, and SaaS and give an example of each.
Explain in your own words the meaning of each of your user rights as listed in Figure 11-7 Explain in your own words the meaning of each of your user responsibilities in Figure 11-7
State how the knowledge of this chapter will help you as an employee of a large company. State how it will help you if you work for a small company. Explain how this knowledge will help you should you find yourself in Jared’s position. Explain how this knowledge will enable you to be a more
Given your answers to 11-4 to 11-9, is computer power management during off-hours a significant concern?In comparison to the other costs of running a university, does this issue really matter? Discuss this question among your group and explain your answer.
WHY DOES THE ALLROAD TEAM NEED TO UNDERSTAND BUSINESS PROCESSES?
HOW CAN BUSINESS PROCESS MODELING HELP ALLROAD?
WHAT IS INFORMATION?
WHAT IS PROCESS QUALITY?
Describe three jobs that do not involve teams or group work. Do you want any of those jobs? Explain your answer.
Consider the statement “Working in teams in school is like practicing the stomach flu. When the time comes, I'll know how to do it.” Do you believe this? What possible good can come to you from doing group projects in school?
Both Steve Jobs (Apple cofounder) and Bill Gates(Microsoft cofounder) were notorious for providing, at times, devastating critical comments of faulty team members’ work. Discuss the value of critical feedback to work quality. Do you practice giving and receiving critical feedback in your student
Google Drive, Microsoft OneDrive, and SharePoint all automatically create records of who did what to which documents on their sites. How can you use this data to demonstrate the amount of work you've personally done(or not done) on a team project?
Describe a method that your professor could use to allocate individual grades to team projects based on the data described in question
In your description, use the data generated by the tool (Google Drive, OneDrive, SharePoint) that your team uses.
Summarize the reasons that Drew and the AllRoad team need to understand business processes. Explain how process abstractions make the team more effective. Explain why knowledge of the role of information systems is also important.
Summarize AllRoad’s business operations. Define business process and give three examples. Define BPMN, swimlane format, activity, role, actor, repository, data flow, sequence flow, and subprocess. Describe the BPMN symbols used for each.Review Figure 2-1 and ensure you can explain how this
Define two dimensions of process quality. Explain how information systems can improve both of these dimensions.Summarize the ways that information systems can improve the process quality of the processes in Figures 2-1 and 2-4. Explain how automation relates to the five components in Figure
Give four definitions of information. Using your own experience and judgment, rank those definitions in the order of usefulness in business. Justify your ranking. Describe where both data and information are located.
Name and describe five data characteristics that are needed to produce quality information. Explain why each is required.
Summarize how knowledge and consideration of business processes will enable the AllRoad team to accomplish its goal.Describe how you can use process models like Figure 2-3 when investigating opportunities. Explain the differences between Figures 2-1 and 2-4. State two dimensions of process quality
Suppose you are discussing 3D printing with Kelly at AllRoad and assume you do not have a process abstraction like that in Figure 2-3. Describe how you would explain your concerns about 3D printing at AllRoad. Now, assume you do have the abstraction in Figure 2-3. Again, describe how you would
Evaluate each of the three sequences that you selected in question 2-8. Identify which sequence you think is best.
Explain why this team does not use Lync.
HOW CAN ALLROAD PARTS USE THE CLOUD?
Do you have geotagging enabled on your smartphone?Why or why not?
Give an example how geotagging can be used in a positive way.
Give an example of how using geotagging might be detrimental.
Why might taking pictures of valuables inside your home, with geotagging enabled, be a security concern?
Give an example of how geotagging might affect law enforcement?
Would the military be concerned about geotaggingW?hy or why not?
From the perspective of Kant's categorical imperative (pages 16-17), are Alliance's partners' meeting expense and intended partner distribution unethical?
From the utilitarian perspective (pages 42-43), are Alliance's partners' meeting expense and intended partner distribution unethical?
Do you find any of the following excessive? Explain your answers:a. Spending nearly $200,000 on a 5-day partners' meeting for three partners and their spouses?b. Earning a 74 percent gross profit?c. Paying a semiannual distribution of $1 million, $3 million, or $5 million? If so, which level is
To most students, someone who earns $500,000 a year in income is rich. To someone who makes $500,000 a year, partners that pay themselves $1 million to $5 million every 6 months are rich. To someone making $2 million to $10 million a year, billionaires are rich. What do you think classifies someone
List some of the benefits you see from corporations offering cloud-based services to their customers.
List some of the costs you see from corporations offering cloud-based services to their customers.
Name one cloud-based service you use (e.g., email, social media, etc.). If this service was involved in a data breach what data would you lose?
Why would cloud-based service providers be an attractive target for attackers?
How would a network outage affect users of cloud-based services? Would network outages also affect corporations? How?
How could a denial of service (DoS) attack be used to harm a corporation providing a cloud- based service? Could this be done from another country?
Define cloud and explain the three key terms in your definition.Using Figure 6-3 as a guide, compare and contrast cloudbased and in-house hosting. Explain three factors that make cloud computing possible today. Explain the meaning of the terms SOA, Web service standards, and Web services. When does
Define SaaS, PaaS, and IaaS. Provide an example of each. For each, describe the business situation in which it would be the most appropriate option. Define CDN and explain the purpose and advantages of a CDN. Explain how Web services can be used internally.
Name and describe SaaS products that AllRoad could use.Explain several ways that AllRoad could use PaaS offerings.Summarize why it is unlikely that AllRoad would use IaaS. How would AllRoad use a CDN?
Explain the purpose of a VPN and describe, in broad terms, how a VPN works. Define the term virtual and explain how it relates to VPN. Define private cloud. Summarize why the benefits of a private cloud are questionable. What kind of organization might benefit from such a cloud? Explain why it is
What is the likely future of the cloud? Summarize the good and bad news that the cloud brings. Explain why the photo in Figure 6-2 is disturbing. Explain the statement “The cloud lifts all boats.” Describe three categories of remote action systems.Explain how remote systems will increase the
The cloud is a fundamental shift in the way that organizations acquire computing infrastructure. It enables organizations to share in the benefits of near-zero costs of data processing, storage, and communication. As shown in the AllRoad opening story as well as in the Ethics Guide, the cloud can
Given your answers to questions 6-4 to 6-8, would you rather be an existing ISV attempting to adapt to this new world or an entirely new company? Compare and contrast the advantages and disadvantages of each alternative.
Using your own words, explain the meaning of the statement "Most IT problems are workflow problems, not software problems."
Consider the classroom assignment problem. Briefly describe three ways of solving that problem. Which of those three is the most promising? Why?
In your opinion, is the demand for professionals who know IS_and_something going to decrease? Increase? Stay about the same? Justify your response; search the Internet for data to support your claim.
If you were to become an expert in IS_and_something, what would the something be? Search the Internet for employment prospects for that career choice.
Examine your current plan of courses before you graduate. What courses do you need to add to your plan to learn IS_and_something? Will you add these courses? Why or why not?
Consider the email you write that agrees to take the product back.a. Is your action ethical according to the categorical imperative (pages 16-17) perspective?b. Is your action ethical according to the utilitarian perspective (pages 42-43)?c. If that email comes to light later, what do you think
Explain how information systems vary by scope. Provide examples of four levels of information scope other than those in this chapter. Describe characteristics of information systems for each.
Define information silo, and explain how such silos come into existence. When do such silos become a problem? Name and describe five common functional applications. Describe data that are likely duplicated among those five applications.Summarize the problems that information silos cause.Summarize
Explain two major reasons why it is expensive to develop enterprise information systems in-house. Explain the advantages of inherent processes. Define and differentiate among CRM, ERP, and EAI. Explain how CRM and ERP are more similar to one another than to EAI. Name and describe four sources of
Describe information silos that exist among healthcare providers, health clubs, and individuals with regard to patient exercise data. Describe problems that those silos create. Explain how the system shown in Figure 7-11 will solve the problems caused by those silos.
Describe how you can benefit from the information in this chapter. Suppose a job interviewer asked you, “What do you know about ERP?” How would you respond? What if the question were, "How does the cloud help organizations integrate their activities?"
Assume your team is in charge of the implementation of the system you recommend in your answer to question 7-7. Describe how each of the four challenges discussed in Q3 pertain to this implementation.Explain how your team will deal with those challenges.Read the Guide on pages 194-195, if you have
Is the information system you proposed in your answer to question 7-6 of Collaboration Exercise 7 an application of CRM, ERP, or EAI? If so, which one and why? If not, explain why not. Go to mymislab.com for Auto-graded writing questions as well as the following Assisted-graded writing questions
Explain how the four sources of challenge discussed in Q3 would pertain to the implementation of the PRIDE system. Give specific examples of each. In general, do you think these challenges are more difficult to overcome for an inter-enterprise system like PRIDE or for an enterprise system like CRM?
Showing 1500 - 1600
of 1598
First
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Step by Step Answers