New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
information technology management
Information Technology For Management Transforming Business In The Digital Economy 3rd Edition Efraim Turban Ephraim McLean James Wetherbe - Solutions
It appears that Quantum spent a substantial amount of money on this project and was willing to increase spending when it seemed necessary for the success of the project.Discuss the risks of a “whatever it takes” approach. A direct cutover from an existing system to a new one is risky. If the
Discuss the impact of this project on the internal power relationships between the IS department and the other departments in the organization. A direct cutover from an existing system to a new one is risky. If the system is critical to the operations of the organization, the risks are magnified to
Under what, if any, circumstances would you recommend this kind of direct cutover for critical operational systems? A direct cutover from an existing system to a new one is risky. If the system is critical to the operations of the organization, the risks are magnified to an even higher level.Yet
Evaluate the claim that, because of business and organizational issues, this direct cutover was less risky than a phased conversion. A direct cutover from an existing system to a new one is risky. If the system is critical to the operations of the organization, the risks are magnified to an even
What did Quantum do to minimize the risks of this direct cutover? A direct cutover from an existing system to a new one is risky. If the system is critical to the operations of the organization, the risks are magnified to an even higher level.Yet Quantum Corp. (quantum.com), a Milpitas, California,
Estimate Quantum Corporation’s chances of survival if this project failed. Provide some reasons to support your estimate. A direct cutover from an existing system to a new one is risky. If the system is critical to the operations of the organization, the risks are magnified to an even higher
StoreFront (storefront.net) is the leading vendor of e-Biz software. At their site they provide demonstrations illustrating the types of storefronts that they can create for shoppers. They also provide demonstrations of how their software is used to create a store.a. Run either the StoreFront 5.0
Look at the Netron Corporation site (netron.com). Examine the tools they have for working with legacy systems(gap analysis) and for rapid application development.Write a report. Prepare a report on Netron’s approach to and tools for renovating and maintaining legacy systems.
Go to the site at geocities.com/rfinney/case.htm. Follow the links on the page to look at the features of several CASE tool packages. Prepare a report on the capabilities of one or two packages with multiple features.
Explore the General Electric site at ge.com, and then compare it to the Kodak site at kodak.com. Try to identify the organizational objectives for these two different types of sites. In the context of these objectives, discuss the advantages and disadvantages of having either: (1) a relatively
Several vendors offer products for creating online stores.The Web sites of each vendor usually list those online stores using their software. Assign one or more vendors to each team member. Visit the online stores using each vendor’s software. Prepare a report comparing the similarities and
Divide the class into two teams. Have both teams collect information on SAP’s integrated enterprise management software, and on Oracle’s comparable software packages. After the teams analyze the data, stage a debate with one team arguing that the SAP products are the more desirable and with the
Contact IS managers at some large organizations, and find out whether their IS developers use any CASE tools. If the IS units use an integrated (I-CASE) tool, what things do they like and dislike about it? If the units do not use I-CASE tools, what are the reasons for not using them?
Contact an administrator at your university or work place and find out what purchased systems, especially larger ones, are in use. Do these systems meet the organization’s needs, or are some important features missing that should be included in these packages?
Identify and interview some end users who develop systems at their organizations. Ask them whether their organization has any standards for documenting and testing systems developed by end users. If it has such policies, are they enforced? If not, what do the end users do to ensure the accuracy and
Contact a major information systems consulting firm and ask for literature on its systems development life cycle methodology (or search for it on the Internet). Compare and contrast the proprietary methodology to the eight-stage SDLC described in this chapter.
A large company with a number of products wants to start selling on the Web. Should it use a merchant server or an electronic suite? Assuming the company elects to establish an electronic storefront, how would you determine whether it should outsource the site or run it itself?
Compare component-based development to enterprise application integration.
Discuss the advantages of a lease option over a buy option in e-business applications development.
Building Web-based systems such as intranets can be a fast and fairly easy process. Based on Chapters 4 and 5 can you explain why? What are the long-term implications of this for IS professionals? For end-user systems developers? For outsourcing firms?
Some programmers feel that implementing the capability maturity model (CMM) will make the development process too rigid and bureaucratic, thus stifling their creativity. Discuss the pros and cons of this issue.
Although the CASE concept—automated tools to increase programmer productivity—seems valid, many IS organizations do not use integrated (I-CASE) packages.Discuss the barriers to the increasing use of ICASE.
Do you think technology has a lot of catching up to do before utility computing will become a reality for companies with many computing needs?
End-user systems developers usually work for managers whose IT knowledge is limited. Discuss the types of problems to which this situation could lead, and suggest possible ways of dealing with these problems.
Discuss the use of Web services for systems development.What kind of systems are especially amenable to Web services?
Is extreme programming (XP) really “extreme”?
What type of development approaches would be most appropriate for developing small systems? For very large systems? Why? What other factors need to be considered?
What types of incentives could an IS group provide to its programmers to encourage reuse of objects and other software they develop?
Why is it advisable in some systems development projects to use prototyping to find information needs?Why can’t the analyst just ask the users what they want and use the SDLC?
List the issues in controlling the quality of systems development. What is the role of IS-9000?
Identify and explain the five levels of the capability maturity model (CMM).
Describe Java and its role in Internet development.
Describe an application service provider (ASP).
List the e-business application options.
Identify the major reasons why utility computing tools will become the next big thing.
List the advantages and disadvantages of purchasing generic software versus using in-house staff or outsourcers to develop customized applications.
List five major advantages and three major disadvantages of Web services.
List the major areas of Web services Applications.
Describe the architecture of component-based development of e-commerce applications.
Describe object-oriented development and its increasing importance.
Why do many companies use the prototyping approach to develop their e-business applications? What are the limitations of the prototyping approach?
Describe the tools that are commonly included in rapid application development (RAD) packages. What capabilities can they provide?
List four different approaches to converting from one system to another. Which is most risky? Least risky?
Explain why it is important to understand the concept of SDLC.
Describe the major stages of the SDLC.
This chapter presents a number of ways to evaluate the economic viability of a technology investment. Which method would you choose for a small business such as The Wireless Café and why?
Consider the costs of acquiring and implementing the Wireless Waitress software package. What are the components of TCO and TBO that should be analyzed in an acquisition decision?
What is the business case for implementing the following systems at The Wireless Café?a. CRMb. SCMc. Wireless networks and applications
How can Kone controls its vendors?
What are some of the risks of this outsourcing?
Why did Kone elect to work with several vendors?
What were the major drivers of the outsourcing at Kone?
Relate the Needham case to the concept of a repository knowledge base.
Do you see any relationship between the “invest first, analyze later” approach to financial analysis and the use of behavior-oriented chargeback systems?
Based on the numbers provided for Cadence Design System’s intranet project, use a spreadsheet to calculate the net present value of the project. Assume a 5-year life for the system.
What are the risks of going into projects that have not received a thorough financial analysis? How can organizations reduce these risks?
How long do you think the “invest first, analyze later”approach will be appropriate for intranet projects?When (and why) will the emphasis shift to traditional project justification approaches? (Or has the shift already occurred?)
Where and under what circumstances is the “invest first, analyze later” approach appropriate? Where and when is it inappropriate? Give specific examples of technologies and other circumstances.
Enter sap.com and use the casebuilder calculator for a hypotethical (or real) IT project. Write a report on your experience.
Enter plumtree.com and see how they conduct ROI on portals. List major elements of the analysis. Is it biased?
Enter compaq.com/tco and cosn.org/tco. Find information about the total cost of ownership model. Write a report on the state of the art.
Visit the Web site of Resource Management Systems(rms.net) and take the IT investment Management Approach Assessment Self-Test (rms.net/self_test.htm) to compare your organization’s IT decision-making process with those of best-practices organizations.
Enter the Web site of IDC (idc.com) and find how they evaluate ROI on intranets, supply chain, and other IT projects.
Enter the Web sites of the GartnerGroup (gartnergroup.com), The Yankee Group (yankeegroup.com), and CIO(cio.com). Search for recent material about outsourcing, and prepare a report on your findings.
Read the Information Week article at techweb.com/se/directlink.cgi?IWK19970630S0038. Compare and contrast the approaches to evaluating intangible benefits in the article to those suggested in this textbook.
Enter google.com and search for material on the used of the balanced scorecard method for evaluating IT investments. Prepare a report on your findings.
Each group is assigned to an ROI calculator (e.g., from peopleSoft, Oracle, IBM, etc.) Each group should prepare a list of the functionalities included and the variables. Make a report that shows the features and limitations of each tool.
Considerable discussions and disagreements exist among IS professionals regarding outsourcing. Divide the group into two parts: One will defend the strategy of large-scale outsourcing. One will oppose it. Start by collecting recent material at google.com and cio.com.
Each group is assigned to an ROI calculator (e.g., from peopleSoft, Oracle, IBM, etc.) Each group should prepare a list of the functionalities included and the variables. Make a report that shows the features and limitations of each tool.
Considerable discussions and disagreements exist among IS professionals regarding outsourcing. Divide the group into two parts: One will defend the strategy of large-scale outsourcing. One will oppose it. Start by collecting recent material at google.com and cio.com.
Projected cash flows of $20,000 per year in Year 1 through Year 5 result from labor savings, reduced material costs, and tax benefits. The business plans to replace the robots with more modern ones after 5 years and does not expect them to have any scrap value. The equipment generates a total of
A small business invests $50,000 in robotic equipment.This amount is shown as a negative value in Year
Enter ibm.com and find information about how IBM measures the ROI on WebSphere. Then examine ROI from CIOView Corporation (CIOview.com). Identify the variables included in the analysis (at both ibm.com and CIOview.com).Prepare a report about the fairness of such a tool.
If you have access to a large organization, conduct research on the methods it uses to charge users for IT services and how the users feel about these charges.
Create a scoring methodology that reflects your personal requirements, and use it to evaluate two competing software products in the same category (for example, two Web browsers or two corporate portal development environments).
Conduct research on how long exponential growth in computer hardware capabilities (Moore’s Law) will continue.
Discuss how giving products away can be a profitable strategy in industries with increasing returns.
Discuss the pros and cons of outsourcing IT, including alternatives to outsourcing.
Explain how a behavior-oriented chargeback system can be superior to an accounting system that charges users fairly accurate estimates of the costs of services they use.
Discuss the economic advantages of digital products compared to nondigital ones.
What is IT infrastructure, and why is it difficult to justify its cost?
Identify arguments for including estimated values for intangible benefits in net present value (NPV) analyses of IT investments, and contrast them with the arguments for excluding such estimates.
Identify circumstances that could lead a firm to outsource its IT functions rather than continue with an internal IS unit.
Discuss what may happen when an organization does not charge users for IT services.
Compare and contrast metrics and best practices. Give an example of each in an IT in a university.
Why is it more difficult to measure productivity in service industries?
Discuss what is necessary to achieve productivity gains from IT investments.
What are the impacts of exponentially increasing computer hardware power and declining price-to-performance ratios on business production activities and new product development?
What are the general implications for managers, organizations, and consumers of constantly increasing computer capabilities and declining costs?
Describe increasing returns in IT.
List five drawbacks or limitation of outsourcing.
List five benefits of outsourcing.
Define IT outsourcing.
Define behavior-oriented chargeback
Describe IT chargeback.
What is real option valuation in IT?
What is management by maxim?
Describe best practice benchmarks.
Define IT benchmarks.
Define information economics.
Showing 1700 - 1800
of 5712
First
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Last
Step by Step Answers