New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
exploring management
Experiencing MIS 3rd Edition David Kroenke - Solutions
What are your IS rights and responsibilities?
Estimate the number of each type of device in use on your campus.Use your university’s Web site to determine the number of colleges, departments, faculty, staff, and students. Make assumptions about the number of computers, copiers, and other types of equipment used by each.
Using the data from items 1 and 2, estimate the total power used by computing and related devices on your campus.
Calculate the monthly cost, in watts, if:a. All user computers run full time night and day.b. All user computers run full time during work hours and in sleep mode during off-hours.c. All user computers are shut off during nonwork hours.
Explain how you would respond to each situation.
Suppose someone from the IS department notifies you that one of your employees is spending 3 hours a day surfing the Web. How do you respond?
For question 2, suppose you ask how the IS department knows about your employee and you are told,“We secretly monitor computer usage.” Do you object to such monitoring? Why or why not?
Suppose someone from the IS department notifies you that one of your employees is sending many personal emails. When you ask how they know the emails are personal, you are told that they measure account activity and that when suspicious email usage is suspected the IS department reads
As an employee, if you know that your company occasionally reads emails, does that change your behavior?If so, does that justify the company reading your email? Does this situation differ from having someone read your personal postal mail that happens to be delivered to you at work? Why or why not?
Write what you think is the best corporate policy for personal computer usage at work.
Describe several ways that the overseas outsourcing problem is overstated.
Summarize the argument that the “culprit”is not overseas outsourcing, but rather productivity.
Why is it incorrect to consider productivity as a culprit?
Explain the phenomenon of creative destruction.
Why are your career prospects limited if you define yourself as an expert in SOA and XML?
Apply the line of reasoning you used in your answer to question 5 to some other technology or system, such as CRM, ERP, OLAP, or RFM.
Explain how you can use one of the technologies in question 6 to help you start your career. To be successful, what perspective must you then maintain?
Explain why Jeff needs to become involved with IS management at Fox Lake. To what extent do you think general managers of other small companies need to be involved in IS management?
Suppose you work for an organization that you believe does not adequately protect its data and IS assets. Assume you manage the telesales department and you have raised your concerns several times with your management, all to no avail.Describe how you would protect yourself and your department.
Reread the chapter introductions regarding Fox Lake in Chapters 7 through
List and briefly describe the information systems that are being used at Fox Lake. Although we have not considered accounting systems, add them to your list.
Describe the Fox Lake computing infrastructure.Assume that Fox Lake servers are located in the facilities building and that Fox Lake operates a local area network among its buildings and facilities. Portions of the network are wired and others are wireless.Assume that the network is supported by a
With the exception of the new facilities scheduling system that will be operated in the cloud, assume that Fox Lake’s data are stored on servers in the facilities building. List major categories of data that must exist to support the golf, tennis, restaurant, pro shop, and wedding activities.
Using the answers you provided to questions 1–3, summarize the major activities for Fox Lake for each of the four responsibility categories in Figure 11-1.
Describe why Mike has a conflict of interest in the management of IS at Fox Lake (see the chapter introduction). Assuming that Jeff wants to continue to have Mike manage the IS facilities and resources, how can he reduce the impact of this conflict?
Given your answers to questions 1–6, write a one page memo to Jeff explaining how he should be involved in management of the IS department.
Generalize the memo in your answer to question 6 to describe the responsibilities for IS management for owners of small businesses of any type.Write this memo in such a way that you might use it in a job interview with the owner of a small business.
How does One System contribute to Marriott’s objectives?
What are the advantages of having one revenue management system instead of two? Consider both users and the IS department in your answer.
At the same time it was developing OneSystem in-house, Marriott chose to outsource its human relations information system. Why would it choose to develop one system in-house but outsource the other? Consider the following factors in your answer:• Marriott’s objectives• The nature of the
How did outsourcing HR contribute to the success of OneSystem?
What are the sources and types of security threats?
What are the elements of a security program?
How can technical safeguards protect against security threats?
How can data safeguards protect against security threats?
How can human safeguards protect against security threats?
What is necessary for disaster preparedness?
How should organizations respond to security incidents?
Suppose you received the email in Figure 1 and mistakenly clicked See more details here. When you did so, you were taken to the Web page shown in Figure
List every phishing symptom that you find in these two figures and explain why it is a symptom.
Explain the term metasecurity. Describe two metasecurity problems not mentioned in this guide.
Explain the control problem that exists when personnel can reset customer passwords.Describe a way to reduce this threat using an audit log and at least two independent employees.
Describe the dilemma posed by an in-house hacker. Describe the problem of using an outside company for white-hat hacking. If you were asked to manage a project to test your computer network security, would you use in-house or outsourced personnel? Why?
A typical corporate computer has software from Microsoft, SAP, Siebel, Oracle, and possibly dozens of smaller vendors. How do users know that none of the software from these companies contains a Trojan horse?
Explain why part of the security solution lies in openness. Describe how openness applies to accounting controls like the one you designed in your answer to question 2.Explain the danger of procedural controls that rely on secrecy.
Reflect on what you have learned from this course. Write two paragraphs on how the knowledge you have gained will help you to “assess, evaluate, and apply emerging information technology to business.” Shape your writing around the kind of job that you want to obtain upon graduation.
Write two paragraphs on how the knowledge and experiences you’ve had in this class will help you to “collaborate, reason abstractly, think in terms of systems, and experiment.” Again, shape your writing around the kind of job you wish to obtain.
Using your answer to question 1, extract three or four sentences about yourself that you could use in a job interview.
Using your answer to question 2, extract three or four sentences about yourself that you could use in a job interview.
Practice using your answers to questions 3 and 4 in a job interview with a classmate, roommate, or friend.
Suppose you lose your company laptop at an airport.What should you do? Does it matter what data are stored on your disk drive? If the computer contained sensitive or proprietary data, are you necessarily in trouble? Under what circumstances should you now focus on updating your resume?
Suppose you alert your boss to the security threats in Figure 12-1 and to the safeguards in Figure 12-2.Suppose he says, “Very interesting. Tell me more.” In preparing for the meeting, you decide to create a list of talking points.a. Write a brief explanation of each threat in Figure 12-1.b.
In what ways did weaknesses in technical safeguards allow this situation to occur?
In what ways did weaknesses in data safeguards allow this situation to occur?
In what ways did weaknesses in human safeguards allow this situation to occur?
How should Fox Lake respond to this incident?
What security mistakes, if any, did each of the following make:a. Anneb. Mikec. Jeffd. Laura
If you were Jeff, how would you remedy the weaknesses you identified in your answers to questions 1–3?
Suppose you were in a job interview with the owner of a small business, with IS and IT infrastructure similar to that at Fox Lake. If that owner were to ask you what the top three issues for IS security in a small business are, how would you respond?
ChoicePoint exposed itself to considerable expense, many problems, and a possible loss of brand confidence because it notified the Los Angeles Police Department, cooperated in the investigation, and notified the individuals whose records had been compromised. It could have buried the theft and
Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way? Given your answer, do you think federal regulation and additional laws are required? What other steps could be taken to ensure that data vendors notify people harmed by data
Visit www.choicepoint.com. Summarize the products that ChoicePoint provides. What seems to be the central theme of this business?
Suppose that ChoicePoint decides to establish a formal security policy on the issue of inappropriate release of personal data. Summarize the issues that ChoicePoint should address in this policy.
Why learn collaboration skills?
What is collaboration?
What is an effective team?
What skills are important for effective collaboration?
What characterizes productive conflict?
How can you improve your collaboration skills?
Explain why collaboration will be important to you as a business professional.
What is the relationship between collaboration and teams? Are all teams collaborative? Does every collaborative activity involve a team? Consider a team of five students painting a house. Is that team collaborative?Does it proceed via a sequence of steps using feedback and iteration? Are teams that
Consider a team of students given the task of recommending ways to improve campus security. Explain why such a team is likely to be collaborative. Identify three issues that such a team might address, and explain why those issues would need feedback and iteration.
Consider the following statement: “In business, the only questions that have definite answers are those that are not worth asking.” What do you think this means? Do you agree or disagree? Explain.
The text states that if your professor gives you an ambiguous problem statement, you should be grateful, not critical. Why do you think the author wrote that sentence? Do you agree or disagree? How common do you think ambiguous problems are in business?
The number one characteristic in the Ditkoff et al.survey is enthusiasm for the subject of the collaboration.Suppose you are assigned to a collaborative team that has been given a task that you find tedious and boring. Besides resigning yourself to failing in a horrible experience, describe three
Consider the following statement: “All of the literature on team performance indicates that attacks on a team member’s personality, appearance, intelligence, or any other personal characteristic does irreparable harm to the team.” Define the term irreparable. If, in a moment of frustration
Why use information systems for collaboration?
How can you use collaboration systems to improve team communication?
How can you use collaboration systems to manage content?
How can you use Microsoft SharePoint for team projects?
This exercise requires you to experiment with Google Docs. You will need two Google accounts to complete this exercise. If you have two different email addresses, then set up two Google accounts using those addresses. Otherwise, use your school email address and set up a Google Gmail account. A
This exercise requires you to experiment with Windows Live SkyDrive. You will need two Office Live IDs to complete this exercise. The easiest way to do it is to work with a classmate. If that is not possible, set up two OfficeLive accounts, using two different Hotmail addresses.a. Go to
Repeat exercise 2, but use Facebook Docs rather than Windows Live SkyDrive.
If your instructor has enabled a Microsoft SharePoint site for your class, you can perform exercises using SharePoint. Go to www.pearsonhighered.com/kroenke and find the file Chapter 2 SharePoint Exercise. Perform the exercises shown there.
Reflect on your experience working on teams in previous classes as well as on collaborative teams in other settings, such as a campus committee. To what extent was your team collaborative? Did it involve feedback and iteration? If so, how? How did you use collaborative information systems, if at
How do decisions vary by level?
What is the difference between structured and unstructured decisions?
How do decision level and decision process relate?
What is the difference between automation and augmentation?
How does IS support decision steps?
Give an example of three different operational decisions that Singing Valley personnel make each day.Describe an information system that could be used to facilitate those decisions.
Give an example of three different managerial decisions that Singing Valley managers make each week.Describe an information system that could be used to facilitate those decisions.
Give an example of three different strategic decisions that Singing Valley’s owners might make in a year. Describe an information system for each.
Which of the decisions in your answers to questions 1–3 are structured? Which, if any, are unstructured?
Give an example of an automated system that would support one of the decisions in your answer to question 1. Describe work performed by each component of the information system.
Give an example of an augmentation system that would support one of the decisions in your answer to question 1. Describe work performed by each component of the information system.
List the decision steps for one of the decisions in your answer to question 1. List the decision steps for one of the decisions in your answer to question 3. Compare the use of information systems to support each of the decision steps for these two decisions.
What are the benefits of knowledge management?
What are content management systems?
What are the challenges of content management?
Showing 1500 - 1600
of 2370
First
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Last
Step by Step Answers