New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
information technology management
Information Technology For Management Improving Strategic And Operational Performance 8th Edition Efraim Turban Linda Volonino - Solutions
6. Evaluate the various mobile electronic payment processes described in the chapter.Which ones do you think are likely to emerge as the dominant method for mobile payment? Explain your answer.
5. How are people using mobile devices to conduct banking and other financial services?
4. Describe some of the key developments in wireless network technology that have taken place in the last few years.
3. Based on how other industries have developed over time, what do you predict will occur in the area of mobile device operating systems? (Hint: How does this market compare to the operating system market for personal computers?)
2. Describe some of the latest advances in mobile computing devices.What trends do you see in the development of this equipment? Speculate on how future devices might look or function.
1. Explain how mobile computing technology is being used to enhance the safety and effectiveness of the healthcare industry.
5. What is the value of visualization?
6. What other enhancements might improve the mission of CFHI?Canadian Food for the Hungry International (CFHI, fhcanada.org/) is a nonprofit agency located in British Columbia, Canada. CFHI sends emergency relief supplies—food, water, bedding, medical supplies, and other essentials—to
5. Why are dashboards important to performance?Canadian Food for the Hungry International (CFHI, fhcanada.org/) is a nonprofit agency located in British Columbia, Canada. CFHI sends emergency relief supplies—food, water, bedding, medical supplies, and other essentials—to disaster-struck and
4. What are the benefits of NetSuite’s architecture?Canadian Food for the Hungry International (CFHI, fhcanada.org/) is a nonprofit agency located in British Columbia, Canada. CFHI sends emergency relief supplies—food, water, bedding, medical supplies, and other essentials—to disaster-struck
3. Why does real-time data matter to donors?Canadian Food for the Hungry International (CFHI, fhcanada.org/) is a nonprofit agency located in British Columbia, Canada. CFHI sends emergency relief supplies—food, water, bedding, medical supplies, and other essentials—to disaster-struck and
2. Compare donor loyalty to customer loyalty.Canadian Food for the Hungry International (CFHI, fhcanada.org/) is a nonprofit agency located in British Columbia, Canada. CFHI sends emergency relief supplies—food, water, bedding, medical supplies, and other essentials—to disaster-struck and
1. Explain the similarities between CFHI’s “business” needs and those of a for-profit organization.Canadian Food for the Hungry International (CFHI, fhcanada.org/) is a nonprofit agency located in British Columbia, Canada. CFHI sends emergency relief supplies—food, water, bedding, medical
6. What is blog spam and why is it a problem?Stormhoek Vineyards is a small winery in South Africa (stormhoek.com). Annual sales in 2005 were only $3 million, but with Web 2.0 technologies, sales grew to $10 million in 2007 and were projected to reach $30 million in 2010. The company devised a
5. Why do you think the Web 2.0 technologies were successful in increasing sales?Stormhoek Vineyards is a small winery in South Africa (stormhoek.com). Annual sales in 2005 were only $3 million, but with Web 2.0 technologies, sales grew to $10 million in 2007 and were projected to reach $30 million
4. How did the wiki help in communication and collaboration?Stormhoek Vineyards is a small winery in South Africa (stormhoek.com). Annual sales in 2005 were only $3 million, but with Web 2.0 technologies, sales grew to $10 million in 2007 and were projected to reach $30 million in 2010. The company
3. What capabilities were introduced by the mashups?Stormhoek Vineyards is a small winery in South Africa(stormhoek.com). Annual sales in 2005 were only $3 million, but with Web 2.0 technologies, sales grew to $10 million in 2007 and were projected to reach $30 million in 2010. The company devised
2. What were the hosts’ blogs used for?Stormhoek Vineyards is a small winery in South Africa(stormhoek.com). Annual sales in 2005 were only $3 million, but with Web 2.0 technologies, sales grew to $10 million in 2007 and were projected to reach $30 million in 2010. The company devised a marketing
1. What was the corporate blog used for?Stormhoek Vineyards is a small winery in South Africa (stormhoek.com). Annual sales in 2005 were only $3 million, but with Web 2.0 technologies, sales grew to $10 million in 2007 and were projected to reach $30 million in 2010. The company devised a marketing
5. Enter housevalues.com and find the various services it provides under several URLs.What is its revenue model?
4. Visit campusfood.com. Explore the site.Why is the site so successful? Could you start a competing one? Why or why not?
3. Visit alibaba.com. Identify the site’s capabilities.Look at the site’s private trading room. Write a report.How can such a site help a person who is making a purchase?
2. Access realtor.com. Prepare a list of services available on this site.Then prepare a list of advantages to users and advantages to realtors. Are there any disadvantages? To whom?
1. Use the Internet to plan a trip to Paris. Visit lonely-planet.com, yahoo.com, and expedia.com.a. Find the lowest airfare.b. Examine a few hotels by class.c. Get suggestions of what to see.d. Find out about local currency, and convert $1,000 to that currency with an online currency converter.e.
4. Conduct a study on selling diamonds and gems online.Each group member investigates one company such as bluenile.com, diamond.com, thaigem.com, tiffany.com, or jewelryexchange.com.a. What features are used in these sites to educate buyers about gemstones?b. How do the sites attract buyers?c. How
3. Have teams investigate how B2B payments are made in global trade. Consider instruments such as electronic letters of credit and e-checks.Visit tradecard.com and examine their services to SMEs. Also, investigate what Visa and MasterCard are offering. Finally, check Citicorp and some German and
2. Assign each team to one industry. Each team will find five real-world applications of the major business-tobusiness models listed in the chapter. (Try success stories of vendors and e-commerce-related magazines.)Examine the problems the applications solve or the opportunities they exploit.
1. Have each team study a major bank with extensive e-commerce offerings. For example,Wells Fargo Bank is well on its way to being a cyberbank. Hundreds of brick-and-mortar branch offices are being closed. In Spring 2003, the bank served more than 1.2 million cyberaccounts (see wellsfargo.com).
6. Visit manyeyes.alphaworks.ibm.com/manyeyes/. Select visualizations from the left-side menu bar. Generate two visualizations. How does visualization improve understanding of the data sets?
5. Visit espn.com. Identify at least five different ways it makes revenue.
4. Go to nacha.org.What is the National Automated Clearing House Association (NACHA)? What is its role?What is the ACH? Who are the key participants in an ACH e-payment? Describe the “pilot” projects currently underway at ACH.
3. Compare the various electronic payment methods.Specifically, collect information from the vendors cited in the chapter and find more with google.com.Pay attention to security level, speed, cost, and convenience.
2. Visit amazon.com and identify at least three specific elements of its personalization and customization features. Browse specific books on one particular subject, leave the site, and then go back and revisit the site.What do you see? Are these features likely to encourage you to purchase more
1. Assume you’re interested in buying a car.You can find information about cars at autos.msn.com. Go to autoweb.com or autobytel.com for information about financing and insurance. Decide what car you want to buy.Configure your car by going to the car manufacturer’s Web site. Finally, try to
9. What are two of the most pressing ethical issues related to e-commerce?
8. Discuss the role of recommendation agents in e-commerce.
7. Discuss the reasons for e-commerce failures.
6. Why is order fulfillment in B2C difficult?
5. Discuss the various ways to pay online in B2C.
4. What are the major benefits of e-government? How are they changing?
3. Discuss the benefits to sellers and buyers of a B2B exchange.
2. Distinguish between business-to-business forward auctions and buyers’ bids for RFQs.
1. Discuss the reasons for having multiple e-commerce business models in one company.
7. What would you recommend BSBCRI do to prevent another infosec incident? In April 2010, Blue Cross & Blue Shield of Rhode Island(BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated with
6. Why was restoring trust so important to the company? In April 2010, Blue Cross & Blue Shield of Rhode Island(BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated with other surplus
5. Why did BSBCRI take such fast and thorough action to protect its members? In April 2010, Blue Cross & Blue Shield of Rhode Island(BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated
4. To what extent could this data breach have been prevented? In April 2010, Blue Cross & Blue Shield of Rhode Island(BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated with other
3. Why did BSBCRI notify government agencies immediately? In April 2010, Blue Cross & Blue Shield of Rhode Island(BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated with other surplus
2. What types of costs did BSBCRI incur because of the breach? In April 2010, Blue Cross & Blue Shield of Rhode Island(BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated with other
1. Explain the reasons for the data breach.In April 2010, Blue Cross & Blue Shield of Rhode Island (BCBSRI) announced that personal information belonging to approximately 12,000 BlueCHiP for Medicare members was inadvertently contained in a filing cabinet donated with other surplus office furniture
3. What types of internal controls might have prevented or detected the fraud? In September 2007, the Japan-based electronics company NEC announced that it could not complete the financial analysis it was required to file with the SEC (Securities and Exchange Commission). SEC filings are mandatory
2. Use an Internet browser to do a search on the term“restatement of earnings.” Explain the results. In September 2007, the Japan-based electronics company NEC announced that it could not complete the financial analysis it was required to file with the SEC (Securities and Exchange Commission).
1. What might have been some of the indicators that the NECE manager/engineer was committing fraud? What type of information systems could have helped to detect the fraud? In September 2007, the Japan-based electronics company NEC announced that it could not complete the financial analysis it was
12. Research vendors of biometrics. Select one vendor and discuss three of its biometric devices or technologies.Prepare a list of major capabilities.What are the advantages and disadvantages of its biometrics?
11. Access the Web sites of any three major antivirus vendors(e.g., symantec.com, mcafee.com, and antivirus.com).Find out what the vendors’ research centers are doing.Also download VirusScan from McAfee and scan your hard drive with it.
10. Enter epic.org/privacy/tools.html and examine one of the following groups of tools: snoop proof e-mail, encryption, or firewalls. Discuss the security benefits.
9. Enter scambusters.org. Find out what the organization does.Learn about e-mail andWeb site scams. Report your findings.
8. Visit cio.com and search for a recent article on security, privacy, or compliance. Write a brief summary of the article.
7. Visit securitytracker.com and select one of the vulnerabilities.Describe the vulnerability, its impacts, its cause, and the affected operating system.
6. Visit wi-fi.org (Wi-Fi Alliance) and discover what its mission is. Report on what you think about its relevance in the overall wireless security industry.
5. Visit issa.org (Information Systems Security Association)and choose a Webcast to listen to—one concerned with systems security. Write a short opinion essay.
4. Visit first.org (a global leader in incident response). Find a current article under “Global Security News” and write a summary.
3. Visit dhs.gov/dhspublic (Department of Homeland Security). Search for an article on E-Verify. Write a report on the benefits of this verification program and who can benefit from it.
2. Visit cert.org/csirts/services.html. Discover the security services a CSIRT can provide in handling vulnerability.Write a summary of those services.
1. Visit cert.org (a center of Internet security expertise).Read one of the recent Security Alerts or CERT Spotlights and write a report.
3. Research a botnet attack. Explain how the botnet works and what damage it causes.What preventive methods are offered by security vendors?
2. Create groups to investigate the latest development in IT and e-commerce security. Check journals such as cio.com(available free online), vendors, and search engines such as techdata.com and google.com.
1. Each group is to be divided into two parts. One part will interview students and businesspeople and record the experiences they have had with computer security problems.The other part of each group will visit a computer store (and/or read the literature or use the Internet) to find out what
7. Twenty-five thousand messages arrive at an organization each year. Currently there are no firewalls. On average, there are 1.2 successful hackings each year. Each successful hack attack results in loss to the company of about $130,000. A major firewall is proposed at a cost of$66,000 and a
6. Should an employer notify employees that their usage of computers is being monitored? Why or why not?
5. The theft of laptop computers at conventions, hotels, and airports is becoming a major problem.These categories of protection exist: physical devices (e.g., targus.com), encryption (e.g., networkassociates.com), and security policies (e.g., at ebay.com). Find more information on the problem and
4. Assume that the daily probability of a major earthquake in Los Angeles is .07 percent.The chance of your computer center being damaged during such a quake is 5 percent. If the center is damaged, the average estimated damage will be $1.6 million.a. Calculate the expected loss (in dollars).b. An
3. Access the Anti-Phishing Working Group Web site(antiphishing.org) and download the most recent Phishing Activity Trends Report.a. Describe the recent trends in phishing attacks.b. Explain the reasons for these trends.
2. The SANS Institute publishes the Top 20 Internet Security Vulnerabilities (sans.org/top20).a. Which of those vulnerabilities are most dangerous to financial institutions?b. Which of those vulnerabilities are most dangerous to marketing firms?c. Explain any differences.
1. A critical problem is assessing how far a company is legally obligated to go. Since there is no such thing as perfect security (i.e., there is always more that you can do), resolving these questions can significantly affect cost.a. When are a company’s security measures sufficient to comply
11. Discuss the shift in motivation of criminals.
10. Discuss why the Sarbanes-Oxley Act focuses on internal control. How does that focus influence infosec?
9. Explain why risk management should involve the following elements: threats, exposure associated with each threat, risk of each threat occurring, cost of controls, and assessment of their effectiveness.
8. Some insurance companies will not insure a business unless the firm has a computer disaster recovery plan.Explain why.
7. Why are authentication and authorization important in e-commerce?
6. Why is cybercrime expanding rapidly? Discuss some possible solutions.
5. Explain what firewalls protect and what they do not protect.Why?
4. Compare the computer security situation with that of insuring a house.
3. Why should information control and security be of prime concern to management?
2. How can the risk of occupational fraud be decreased?
1. Many firms concentrate on the wrong questions and end up throwing a great deal of money and time at minimal security risks while ignoring major vulnerabilities.Why?
5. Make a recommendation to CFO Griffin.DUMBO Company (a fictitious company) needed to cut travel costs and productivity losses (wasted time) but still maintain the benefits of person-to-person collaboration. One option was Web conferencing, which could be used internally for collaboration and
4. Identify other criteria that should be taken into account when making such a decision (for example, vendor support or the ability to integrate with Outlook).DUMBO Company (a fictitious company) needed to cut travel costs and productivity losses (wasted time) but still maintain the benefits of
3. Prepare cost comparisons of the vendors’ licensing options and pay-per-usage.DUMBO Company (a fictitious company) needed to cut travel costs and productivity losses (wasted time) but still maintain the benefits of person-to-person collaboration. One option was Web conferencing, which could be
2. Research LiveMeeting and WebEx to find the costs for a pay-per-use basis or the cost to buy the software.DUMBO Company (a fictitious company) needed to cut travel costs and productivity losses (wasted time) but still maintain the benefits of person-to-person collaboration. One option was Web
1. Calculate the total minutes per year for Web conferencing at DUMBO.DUMBO Company (a fictitious company) needed to cut travel costs and productivity losses (wasted time) but still maintain the benefits of person-to-person collaboration. One option was Web conferencing, which could be used
4. Why is KP HealthConnect a strategic investment for Kaiser? Founded in 1945, Kaiser is recognized as one of America’s leading healthcare providers and nonprofit health plans. Its mission is to provide high-quality, affordable healthcare services and to improve the health of 8.6 million members
3. Research the annual rate of medical errors in one or two countries. What are several reasons for these errors? How does KP HealthConnect help to reduce medical errors? Founded in 1945, Kaiser is recognized as one of America’s leading healthcare providers and nonprofit health plans. Its mission
2. What benefits does KP HealthConnect offer healthcare providers? Members? Patients? Founded in 1945, Kaiser is recognized as one of America’s leading healthcare providers and nonprofit health plans. Its mission is to provide high-quality, affordable healthcare services and to improve the health
1. To see Kaiser Permanente members, physicians, and employees talk about KP HealthConnect, view a video at www.youtube.com/kaiserpermanenteorg. What did you learn? Founded in 1945, Kaiser is recognized as one of America’s leading healthcare providers and nonprofit health plans. Its mission is to
4. Bottom line: Is it profitable for operators to go green?Explain.Four incentives are driving mobile network operators (carriers)to develop greener mobile networks. The four incentives are:• To reduce costs. Energy consumption is one of the biggest operating costs for both fixed and mobile
3. Review predictions of global warming and related issues.Consider the expected surge in the use of 4G networks, which will increase electricity consumption to power the networks and cool the equipment. Based on your research, estimate the impact on the environment if mobile network operators did
2. Explain the reasons for your ranking.Four incentives are driving mobile network operators (carriers)to develop greener mobile networks. The four incentives are:• To reduce costs. Energy consumption is one of the biggest operating costs for both fixed and mobile networks.• To overcome limited
1. Rank the four incentives according to how you believe they motivate a company to invest in greener IT.Four incentives are driving mobile network operators (carriers)to develop greener mobile networks. The four incentives are:• To reduce costs. Energy consumption is one of the biggest operating
2. Visit the Google Apps Web site.What types of collaboration support are available?
Showing 1000 - 1100
of 5712
First
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Last
Step by Step Answers