New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
information technology management
Information Technology For Management Transforming Business In The Digital Economy 3rd Edition Efraim Turban Ephraim McLean James Wetherbe - Solutions
Consider the design features for a picture-map–based navigation system for private car owners. What kind of constraints exist? Is there a universal standard for user-friendliness? How safe is such a system—that is, do you have to stop concentrating on driving in order to use it? What ethical
Define the Internet community and list four types of communities.
Define virtual society.
Define digital divide.
How can IT improve the quality of life?
Present three major arguments of those who believe that IT will not result in massive unemployment.
Present three major arguments of those who believe that IT will result in massive unemployment.
List the major societal impacts of IT that are described in this chapter, and categorize each of them as either negative or positive.
Discuss the following organizational impacts: flatter organizations, increased span of control, power redistribution, supervision, and decision making.
How does the use of IT relate to health and safety?What is information anxiety?
Describe some of the potential risks to human health caused by extensive use of computers.
What are some of the major impacts of IT on individuals?
Describe the organizational impacts caused by IT.
Describe the impact of IT on the manager’s job.
Describe how IT can have negative effects on people.
How would you justify the existence of the Alliance?Who should pay its costs? The Internet Security Alliance (isalliance.org) was formed in April 2001. The alliance is a collaborative endeavor of Carnegie Mellon University’s Software Engineering Institute(SEI); its CERT Coordination Center
Why is it beneficial to prioritize issues? The Internet Security Alliance (isalliance.org) was formed in April 2001. The alliance is a collaborative endeavor of Carnegie Mellon University’s Software Engineering Institute(SEI); its CERT Coordination Center (CEDRT/CC); the Electronics Industries
What is the mission of the Alliance? The Internet Security Alliance (isalliance.org) was formed in April 2001. The alliance is a collaborative endeavor of Carnegie Mellon University’s Software Engineering Institute(SEI); its CERT Coordination Center (CEDRT/CC); the Electronics Industries Alliance
Why does the Internet Security Alliance include both private and public members? The Internet Security Alliance (isalliance.org) was formed in April 2001. The alliance is a collaborative endeavor of Carnegie Mellon University’s Software Engineering Institute(SEI); its CERT Coordination Center
Why is the process flow important in this case? Home Depot is the world’s largest home-improvement retail, a global company that is expanding rapidly (about 200 new stores every year). With over 1,500 stores (mostly in the United States and Canada, and now expanding to other countries) and about
How is collaboration facilitated by IT in this case? Home Depot is the world’s largest home-improvement retail, a global company that is expanding rapidly (about 200 new stores every year). With over 1,500 stores (mostly in the United States and Canada, and now expanding to other countries) and
The structure means that the SPST reports to both marketing and technology. This is known as a matrix structure. Home Depot is the world’s largest home-improvement retail, a global company that is expanding rapidly (about 200 new stores every year). With over 1,500 stores (mostly in the United
Read Chapter 9 (Sections 9.9 and 9.10) regarding teambased organizations. Explain why the team-based structure at Home Depot is so successful. Home Depot is the world’s largest home-improvement retail, a global company that is expanding rapidly (about 200 new stores every year). With over 1,500
Enter biopay.com and other vendors of biometries and find the devices they make that can be used to access control into information systems. Prepare a list of major capabilities.
Enter ncsa.com and find information about “why hackers do the things they do.” Write a report.
Access the Web site 2600.com and read the 2600 Magazine.Also try waregone.com and skynamic.com. Prepare a report that shows how easy it is to hack successfully.
The use of smart cards for electronic storage of user identification, user authentication, changing passwords, and so forth is on the rise. Surf the Internet and report on recent developments. (For example, try the Web sites microsoft.com/windows/smartcards, litronic.com, gemplus.com, or scia.org.)
Access a good search engine (e.g., google.com or findart icles.com). Find recent articles on disaster planning. Prepare a short report on recent developments in disaster recovery planning.
You have installed a DSL line in your home. You read in this chapter that you need a personal firewall. Enter securitydogs.com, macafee.com, or symantec.com. Find three possible products. Which one dp you like best? Why?
Enter v:l.nai.com/vil/default.asp. Find information about viruses. What tips does McAfee (mcafee b2b.com) give for avoiding or minimizing the impact of viruses?
Check the status of biometric controls. See the demo at sensar.com. Check what Microsoft is doing with biometric controls.
Many newsgroups are related to computer security(groups,google.com; alt.comp.virus; comp.virus; maous.comp.virus). Access any of these sites to find information on the most recently discovered viruses.
Access the Web sites of the major antivirus vendors(symantec.com, mcafee.com, and antivirus.com). Find out what the vendors’ research centers are doing. Also download VirusScan from McAfee and scan your hard drive with it.
Enter epic.org/privacy/tools.html, and examine the following groups of tools: Web encryption, disk encryption, and PC firewalls. Explain how these tools can be used to facilitate the security of your PC.
Access the site of comdisco.com. Locate and describe the latest disaster recovery services.
Enter scambusters.org. Find out what the organization does. Learn about e-mail scams and Web site scams.Report your findings.
Explore some job-searching Web sites (such as brassring.com, and headhunter.com), and identify job openings for CIOs. Examine the job requirements and the salary range. Also visit google.com and cio.com, and find some information regarding CIOs, their roles, salaries, and so forth. Report your
Research the Melissa attack in 1999. Explain how the virus works and what damage it causes. Examine Microsoft’s attempts to prevent similar future attacks. Investigate similarities between the 2003 viruses (Slammer, Bugbear, etc.) and earlier ones (e.g., “I Love You”and Melissa). What
Create groups to investigate the latest development in IT and e-commerce security. Check journals such as CIO.com (available free online), vendors, and search engines such as techdata.com. and google.com.
Each group is to be divided into two parts. The first part will interview students and business people and record the experiences they have had with computer security problems. The second part of each group will visit a computer store (and/or read the literature or use the Internet) to find out
With the class divided into groups, have each group visit an IS department. Then present the following in class:an organizational chart of the department; a discussion on the department’s CIO (director) and her or his reporting status; information on a steering committee(composition, duties);
In spring 2000 the U.S. government developed an internal intrusion detection network ( fidnet.gov) to protect itself from hackers. The Center for Democracy and Technology (cdt.org) objected, claiming invasion of privacy.Research the status of the project (FIDNet) and discuss the claims of the
Twenty-five thousand messages arrive at an organization each year. Currently there are no firewalls. On the average there are 1.2 successful hackings each year.Each successful hacking results in loss to the company of about $130,000.A major firewall is proposed at a cost of $66,000 and a
Guarding against a distributed denial of service attack is not simple. Examine the major tools and approaches available. Start by downloading software from nipc.gov.Also visit cert.org, sans.org, and ciac.llnl.gov. Write a report summarizing your findings.
Ms. M. Hsieh worked as a customer support representative for the Wollongong Group, a small software company(Palo Alto, California). She was fired in late 1987.In early 1988, Wollongong discovered that someone was logging onto its computers at night via a modem and had altered and copied files.
Expert systems can be used to analyze the profiles of computer users. Such analysis may enable better intrusion detection. Should an employer notify employees that their usage of computers is being monitored by an expert system? Why or why not?
The theft of laptop computers at conventions, hotels, and airports is becoming a major problem. These categories of protection exist: physical devices (e.g., targus.com), encryption (e.g., networkassociates.com), and security policies (e.g., at ebay.com). Find more information on the problem and on
Assume that the daily probability of a major earthquake in Los Angeles is .07%. The chance of your computer center being damaged during such a quake is 5%. If the center is damaged, the average estimated damage will be $1.6 million.a. Calculate the expected loss (in dollars).b. An insurance agent
Examine Online File W15.4. Read some new material on the CIO and add any new roles you find in your reading.Which of the roles in the table seem to have gained importance and which seem to have lost importance?
Discuss the relationships between grid computing and self-healing computers.
Why is cross-border cybercrime expanding rapidly?Discuss some possible solutions.
Why do intelligent systems play an increasing role in securing IT?
Compare TQM to a corporatewide security plan. What is similar? What is different?
Why is it necessary to use SLAs with vendors? What are some of the potential problems in such situations?
How important is it for a CIO to have an extensive knowledge of the business?
Some people have recently suggested using viruses and similar programs in wars between countries. What is the logic of such a proposal? How could it be implemented?
Explain why risk management should involve the following elements: threats, exposure associated with each threat, risk of each threat occurring, cost of controls, and assessment of their effectiveness.
Describe how IS auditing works and how it is related to traditional accounting and financial auditing.
Why is the purpose of biometrics? Why they are popular?
Explain what firewalls protect and what they do not protect. Why?
Compare the computer security situation with that of insuring a house.
Why should information control and security be a prime concern to management?
Discuss the new role of the CIO and the implications of this role to management.
What information resources are usually controlled by the ISD, and why?
What is a desirable location for the ISD to report to, and why?
List and briefly describe the steps involved in risk analysis of controls.
Describe auditing of information systems.
What are “hot” and “cold” recover sites?
Define and describe a disaster recovery plan.
Define a business continuity plan.
Explain encryption.
Define firewall. What is it used for?
How you protect against viruses?
Explain DOS and how to defend against it.
What is the difference between authorized and authenticated users?
Distinguish between general controls and application controls.
Define biometrics; list five of them.
Describe prevention, deterrence, detection, recovery, and correction.
Define controls.
Explain a corporatewide security system.
Explain a virus and a Trojan horse.
What is the difference between hackers and crackers?
List the four major categories of computer crimes.
What is a computer crime?
Define controls, threats, vulnerability, and backup.
What are the services to end users that are usually provided by an information (help) center?
Define SLAs and discuss the roles they play.
What is a steering committee?
List Rockart’s eight imperatives.
Summarize the new role of the CIO.
List the mechanisms for ISD—end users cooperation.
Why has the ISD historically reported to finance or accounting departments?
What are possible reporting locations for the ISD?
As TWC expands its utilization of IT, the concept of an application service provider becomes increasingly attractive.What are some risks and benefits to a small business of using an ASP for major applications? Barbara and Jeremy have done some serious economic justification of the myriad
Once a CRM system is identified, should its implementation be outsourced? Assuming you do decide to outsource the entire implementation of the selected CRM, how would you manage the outsourcer to make sure the implementation is successful? Barbara and Jeremy have done some serious economic
Propose a system development life cycle for implementing a CRM at The Wireless Café (TWC). Consider methodologies that are well-suited to rapid development of Web-based applications. Barbara and Jeremy have done some serious economic justification of the myriad technologies that could benefit
Go to the site at sap.com. Follow the links on the page to look at the features of some cross-industry solutions.Prepare a report on the capabilities of the SAP solutions. On a Monday morning in August 1998, Jim Buckler, project manager of the University of Nebraska’s Administrative System
Can you think of circumstances where a company might want to install an enterprise management system, such as SAP R/3, even though it appears that this would be significantly more expensive than developing a comparable system in-house? Discuss. On a Monday morning in August 1998, Jim Buckler,
Discuss the advantages and disadvantages of a purchased system that forces different organizational units to change their business processes and policies to conform to the new system. Identify situations where this standardization would be desirable, and other situations where it would be
Which of the four options or combination of options would you recommend to project management and the steering committee? What are the risks involved in your recommendation? How would you manage the risks? On a Monday morning in August 1998, Jim Buckler, project manager of the University of
Showing 1600 - 1700
of 5712
First
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Last
Step by Step Answers