New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
experiencing mis
MIS Essentials 1st Edition David M Kroenke - Solutions
1. These two very similar publications have taken two different approaches for using the Internet to gain revenue from their archives. Describe what you believe are the advantages and disadvantages of each approach.
2. Visit htip://woodenboat.com and http://finewood working.com. Compare the ways that these two publications use social networking on their sites.For each, how does their use of social networking contribute to revenue? To what other goals does social networking contribute? Which publication uses
3. Compare the ways that these two publications host UGC on their sites. For each, how does UGC contribute to revenue? To what other goals does UGC contribute? Which publication employs UGC more effectively? Explain your answer.
4. Choose one of the two publications and identify a new use for social networking. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the goals of the publication.
5. Choose one of the two publications and identify a new use for UGC. Write a one-page memo to the publisher of that magazine describing your idea and how it would contribute to the goals of the publication.
6. Is Fine Woodworking in danger of losing subscriptions to its paper magazine to the online magazine?Does it matter? Why or why not?
7. Fine Woodworking earns revenue from subscriptions to its online magazine. Wooden Boat earns no subscription revenue at all. Is it missing the boat?Why or why not?
1. Investigate auctions on eBay and, for any category of product in which you have knowledge or interest, compare selling prices to prices of new goods from e-commerce sites. Attempt to find one or more products in which the item sold on eBay costs more than if it had been purchased from a vendor.
2. Go to www.ebay.com and learn how eBay charges for its auctions. You have many options to choose from; select the option(s) that you believe will be best for selling goods using this strategy. Explain why you think that option is the best.
3. Using price comparison sites (such as PriceGrabber, CNET, or Froogle), identify three sources for products that you identified in question 1. If you did not find any qualifying products in that question, identify sources for some product in which you have an interest. Seek sources that provide
. Either by yourself or with a group of classmates, find a product from your answer in question 3 that CHAPTER 8 E-Commerce and Web 2.0 211 seems to you to be a good bargain. Set up an auction for that item on eBay with terms that will enable you to make some profit, even if the product sells at
. Run the auction. If you make some profit, celebrate, and run it again. If not, state why and what you would do differently to earn some profit.
WHAT ARE TYPICAL INTER-ENTERPRISE PROCESSES?
Consider the supply chain for Amazon.com. Assume that Amazon.com buys books directly from publishers and also buys from book distributors. Ignore used book sales.a. Diagram this supply chain. Use Figure CE10-2 as an example. Because shippers are so important to Amazon.com, include them in your
How DOES REM ANALYSIS CLASSIFY CUSTOMERS?
Summarize the concerns expressed by this data analyst.
Do you think the concerns raised here are sufficient to avoid data mining projects altogether?
If you were a junior member of a data mining team and you thought that the model that had been developed was ineffective, maybe even wrong, what would you do? If your boss disagrees with your beliefs, would you go higher in the organization? What are the risks of doing so? What else might you do?
Define database marketing. Explain why the term is a misnomer.Give an example of the need for database marketing other than ones described in this chapter extension.
Explain the meaning of R, F, and M scores. Describe how each score is computed. State the action(s) that should be taken for customers having the following RFM scores: [1, 1, 3], [5, 4, 5],(2,22), (3,4, 1), (1,3, 1), and [1, 1,1].
Define cross-selling. Define support, confidence, and lift. In Figure CE12-2, state the probability that someone walks into the store and buys fins. Compute the support for fins and a dive computer. Explain what it means if the value of lift is greater than 1. Explain what it means if the value of
Define decision tree, and explain the basic idea of decision trees. For the hypothetical data in Figure CE12-3, state the grade you would predict for senior nonbusiness students. State the grade you would predict for junior restaurant employees.State the grade you would predict for senior business
WHAT IS A DATA BREACH?
HOW DO DATA BREACHES HAPPEN?
HOW SHOULD ORGANIZATIONS RESPOND TO DATA BREACHES?
WHAT ARE THE LEGAL CONSEQUENCES OF A DATA BREACH?
HOW CAN DATA BREACHES BE PREVENTED?
Define data breach, personally identifiable information (PID), and carding. List some of the direct and indirect costs related to data breaches. How likely is it that a data breach will occur?What motivates hackers to steal data? Explain how hackers can make money from stealing data.
Define attack vectors, exploit, and spear phishing. Describe each step in the Target data breach. How did the hackers gain access to Target’s internal network? Why did the hackers want to sell the stolen information as quickly as possible? Describe the damage caused by this data breach.
Define exfiltration, walkthrough, business continuity planning, and computer security incident response team (CSIRT). Why is it important to respond quickly to a data breach? Explain how planning for a data breach can mitigate the damage associated with a breach, List the six data breach best
Why do you need to know about the IT department? LO.1
What are the responsibilities of the IT department? LO.1
How is the IT department organized? LO.1
What IS-related job positions exist? LO.1
How do organizations decide how much to spend on IT? LO.1
What are your IS rights and responsibilities? LO.1
Describe several ways that the overseas outsourcing problem is overstated. LO.1
Summarize the argument that the "culprit" is not overseas outsourcing, but rather productivity. LO.1
Why is it incorrect to consider productivity as a culprit? LO.1
Explain the phenomenon of creative destruction. LO.1
Why are your career prospects limited if you define yourself as an expert in SOA and XML? LO.1
Apply the line of reasoning you used in your answer to question 5 to some other technology or system, such as CRM, ERP, OLAP, RFM, or some other technology. LO.1
Explain how you can use one of the technologies in question 6 to help you start your career. To be successful, what perspective must you then maintain? LO.1
Explain how you would respond to each situation. LO.1
Suppose someone from the IT department notifies you that one of your employees is spending 3 hours a day surfing the Web. LO.1
How do you respond? LO.1
For question 2, suppose you ask how the IS department knows about your employee and you are told, “We secretly monitor computer usage.” Do you object to such monitoring? Why or why not? LO.1
Write what you think is the best corporate policy for personal computer usage at work. LO.1
How does OneSystem contribute to Marriott’s objectives? LO.1
What are the advantages of having one revenuemanagement system instead of two? Consider both users and the IT department in your answer. LO.1
How did outsourcing HR contribute to the success of OneSystem? LO.1
It's overstated, because the 250,000 jobs lost per year is a small percentage of the 137 million U.S.workers. LO.1
Outsourcing does not impact a high percentage of U.S. jobs. Rather, it is increased productivity that enables fewer people to accomplish more. The same level of output can be achieved with fewer people.The Web and email enable people to communicate not just faster and more conveniently, but it also
Productivity is not a “culprit”; rather, it enhances the material quality of everyone's life. It enables society to do more with less. Productivity makes existing means of operation obsolete; organizations must adapt to more efficient processes, or Schumpeter’s creative destruction will clean
Creative destruction occurs when economic factors remove organizations that have become inefficient.For example, Dell’s direct-marketing model drove IBM to sell its personal computer business to Lenovo Group, a Chinese company. That acquisition will eliminate inefficient competitors in China, or,
You should not define yourself in terms of a particular technology, because those technologies will be replaced by others. Define yourself as someone who can use the latest interorganizational communications technology (whether that’s SOA, BPMN, XML, or Gizmo 3.0) to help your business achieve
The principle is the same for each of these systems and technologies. Knowledge of the system or technology will open the door, but that door will stay open only as long as the business professional continues to learn new systems and technology and new applications of those systems and
I use the example of OLAP from this list because most students think they’d have to be a real techie to use it to get an interesting job. Not so! Howcould you use knowledge of OLAP to obtain a job? Write a great paper on why OLAP is going to be the greatest thing since sliced bread.Or, write a
I would be exceedingly surprised if students who seriously embarked upon this course of action did not have more job opportunities than they would ever imagine. LO.1
This is a long list of situations. One approach is to ask the students to group the situations into categories according to the severity of the violation. Three possible categories are: OK, Questionable, and Definitely Wrong. I'd put the following in the Definitely Wrong category: situationsa, f,
If Iw as told that an employee was spending 3 hours a day on the Web, I’d evaluate that employee's recent performance. I’d find out what jobs the employee was supposed to have been doing and find out how well those jobs were done.Clearly, something’s wrong. I’d talk with the employee.
I personally find secret monitoring of employees computer use a bit creepy, but the employer is paying for the employees’ time and for the equipment.I grant an employer's right to perform such monitoring.I think that the monitoring ought to be done in such a way, however, so as to minimize the
It is certainly legal for companies to read employees’emails, and, because the employer is paying for the employees’ time and the computer and network equipment, I think it’s ethical. When employees use their employer's equipment for personal use, I believe they give up any right to privacy.
I personally dislike a style of management that relies on the hammer of discovery to limit employees’misuse of computers. I'd prefer to manage by giving people work they want to do; by creating tight, but not impossible, schedules; by following up with them on progress; and by focusing on what
Why is business process management important to organizations? LO.1
How does business process management vary in scope? LO.1
How does Business Process Modeling Notation (BPMN)document business processes? LO.1
How does the interaction of business process elements affect cost and added value? LO.1
_ What role do information systems play in business processes? LO.1
What are the advantages of the service-oriented architecture(SOA)? LO.1
Why are XML and other SOA standards important? LO.1
Is it ethical for you to write the email agreeing to take the product back? If that email comes to light later, what do you think your boss will say? LO.1
Is it ethical for you to offer the “advertising” discount? What effect does that discount have on your company’s balance sheet? LO.1
Is it ethical for you to ship to the fictitious company? Is it legal? LO.1
Describe the impact of your activities on next quarter’s inventories. LO.1
Clearly, this person is bitter about new programs and new ideas. What do you think might have been the cause of her antagonism? What seems to be her principal concern? LO.1
What does she mean by "vicious" compliance? Give an example of an experience you've had that exemplifies such compliance. LO.1
What does she mean when she says, "If someone wants to empower me, she would listen rather than talk"? How does listening to someone empower that person? LO.1
Her examples of "pull change" all involve the use of new products. To what extent do you think pull works for new management programs? LO.1
If you managed an employee who had an attitude like this, what could you do to make her more positive about organizational change and new programs and initiatives? LO.1
Reread MIS in Use 7 on pages 178-179. Redraw Figure 1 so that all activities are services. Use the standard BPMN symbols. LO.1
Explain the problems in the business process in Figure 1. LO.1
Redraw Figure 2 so that all activities are services.Use the standard BPMN symbols. LO.1
Explain the problems in the business process in Figure 2. LO.1
Develop a process that solves the problems you identified in your answers to questions 2 and LO.1
Consider the use of information systems and information technology. Possible technologies to use are email, FTP and Microsoft SharePoint, but you need not restrict your thinking to these technologies.Document your solution using BPMN symbols;ensure that each activity is a service. LO.1
Identify the activities that are performed in the process of selecting and installing stone countertops.Ensure that each activity is a service. LO.1
Identify the resources that apply to these activities. LO.1
Identify the data that flows among activities. LO.1
Model the stone selection process using BPMN notation. Use PowerPoint to create your model and construct it in swim-lane format. LO.1
Explain how a knowledge of business process management could help you become a stone slab client rather than a stone chipper. LO.1
Ask the students to give examples of each of the quadrants of the Porter competitive strategy model for the river rafting industry. LO.1
Ask the students to evaluate MRV’s competitive strategy:a. What does their strategy mean? What characterizes a quality customer? What characterizes a quality relationship?b. What are five ways that MRV can create quality relationships?c. What are five ways that MRV can use quality relationships
Consider MRV from a process perspective:a. Describe three different business processes that MRV must have to be able to profitably conduct a river trip. (There are lots more than three, by the way).b. What is the process problem in this chapter?How does that process problem interfere with MRV’s
Consider possible solutions to the process problem:a. What solution to this process problem does the text present?b. What are two other ways of solving this process problem? LO.1
Assume the problem is that there is no effective and reliable communication method for the warehouse manager to notify salespeople that no private tents are available.a. What are five different ways of using IS to provide reliable communication?b. What are the advantages and disadvantages of each
How big is an exabyte, and why does it matter? LO.1
How do business intelligence (Bl) systems provide competitive advantages? LO.1
What problems do operational data pose for BI systems? LO.1
What are the purpose and components of a data warehouse? LO.1
Showing 500 - 600
of 1598
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last
Step by Step Answers