All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
AI Tutor
New
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
Why are information systems vulnerable to destruction, error, and abuse?
List and describe the most common threats against contemporary information systems.
Define malware and distinguish among a virus, a worm, and a Trojan horse.
Define a hacker and explain how hackers create security problems and damage systems.
Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.
Define identity theft and phishing and explain why identity theft is such a big problem today.
Describe the security and system reliability problems created by employees.
Explain how software defects affect system reliability and security.
What is the business value of security and control?
Explain how security and control provide value for businesses.
Describe the relationship between security and control and recent U.S. government regulatory requirements and computer forensics.
What are the components of an organizational framework for security and control?
Define general controls and describe each type of general control.
Define application controls and describe each type of application control.
Describe the function of risk assessment and explain how it is conducted for information systems.
Define and describe the following: security policy, acceptable use policy, and identity management.
Explain how MIS auditing promotes security and control.
What are the most important tools and technologies for safeguarding information resources?
Name and describe three authentication methods.
Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
Explain how encryption protects information.
Describe the role of encryption and digital certificates in a public key infrastructure.
Distinguish between fault-tolerant and highavailability computing, and between disaster recovery planning and business continuity planning.
Identify and describe the security problems posed by cloud computing.
Describe measures for improving software quality and reliability.
Video Cases and Instructional Videos illustrating some of the concepts in this chapter are available.Contact your instructor to access these videos.
Is cyberwarfare a serious problem? Why or why not?
Assess the management, organization, and technology factors that have created this problem.
What solutions have been proposed? Do you think they will be effective? Why or why not?
Are there other solutions for this problem that should be pursued? What are they?
K2 Network operates online game sites used by about 16 million people in over 100 countries. Players are allowed to enter a game for free, but must buy digital“assets” from K2, such as swords to
A survey of your firm’s information technology infrastructure has produced the following security analysis statistics:High risk vulnerabilities include non-authorized users accessing applications,
Calculate the total number of vulnerabilities for each platform. What is the potential impact of the security problems for each computing platform on the organization?
If you only have one information systems specialist in charge of security, which platforms should you address first in trying to eliminate these vulnerabilities?Second? Third? Last? Why?
Identify the types of control problems illustrated by these vulnerabilities and explain the measures that should be taken to solve them.
What does your firm risk by ignoring the security vulnerabilities identified?
Businesses today have a choice of whether to outsource the security function or maintain their own internal staff for this purpose. This project will help develop your Internet skills in using the
Present a brief summary of the arguments for and against outsourcing computer security for your company.
Select two firms that offer computer security outsourcing services, and compare them and their services.
Prepare an electronic presentation for management summarizing your findings. Your presentation should make the case on whether or not your company should outsource computer security. If you believe
What security and control problems are described in this case?
What people, organization, and technology factors contribute to these problems?
How secure is cloud computing? Explain your answer.
If you were in charge of your company’s information systems department, what issues would you want to clarify with prospective vendors?
Would you entrust your corporate systems to a cloud computing provider? Why or why not?
Click on Security and describe Salesforce.com’s security provisions. How helpful are these?
Click on Best Practices and describe what subscribing companies can do to tighten security.How helpful are these guidelines?
If you ran a business, would you feel confident about using Salesforce.com’s on-demand service?Why or why not?
What management, organization, and technology factors were responsible for McAfee’s software problem?
What was the business impact of this software problem, both for McAfee and for its customers?
If you were a McAfee enterprise customer, would you consider McAfee’s response to the problem be acceptable? Why or why not?
What should McAfee do in the future to avoid similar problems?
Search online for the apology by Barry McPherson(“Barry McPherson apology”) and read the reaction of customers. Do you think McPherson’s apology helped or inflamed the situation? What is a
Describe how information systems have changed the way businesses operate and their products and services.
Identify three major new information system trends.
Describe the characteristics of a digital firm.
Describe the challenges and opportunities of globalization in a “flattened” world.
List and describe six reasons why information systems are so important for business today.
Define an information system and describe the activities it performs.
List and describe the organizational, management, and technology dimensions of information systems.
Distinguish between data and information and between information systems literacy and computer literacy.
Explain how the Internet and the World Wide Web are related to the other technology components of information systems.
Define complementary assets and describe their relationship to information technology.
Describe the complementary social, managerial, and organizational assets required to optimize returns from information technology investments.
List and describe each discipline that contributes to a technical approach to information systems.
List and describe each discipline that contributes to a behavioral approach to information systems.
Describe the sociotechnical perspective on information systems.
Define business processes and describe the role they play in organizations.
Describe the relationship between information systems and business processes.Describe the characteristics of transaction processing systems (TPS) and the roles they play in a business.
Describe the characteristics of management information systems (MIS) and explain how MIS differ from TPS and from DSS.
Describe the characteristics of decision-support systems (DSS) and how they benefit businesses.
Describe the characteristics of executive support systems (ESS) and explain how these systems differ from DSS.
Explain how enterprise applications improve organizational performance.
Define enterprise systems, supply chain management systems, customer relationship management systems, and knowledge management systems and describe their business benefits.
Explain how intranets and extranets help firms integrate information and business processes.
Define collaboration and teamwork and explain why they have become so important in business today.
List and describe the business benefits of collaboration.
Describe a supportive organizational culture and business processes for collaboration.
List and describe the various types of collaboration and communication systems.
Describe how the information systems function supports a business.
Compare the roles played by programmers, systems analysts, information systems managers, the chief information officer (CIO), chief security officer (CSO), and chief knowledge officer (CKO).
Define an organization and compare the technical definition of organizations with the behavioral definition.
Identify and describe the features of organizations that help explain differences in organizations’ use of information systems.
Describe the major economic theories that help explain how information systems affect organizations.
Describe the major behavioral theories that help explain how information systems affect organizations.
Explain why there is considerable organizational resistance to the introduction of information systems.
Describe the impact of the Internet and disruptive technologies on organizations.
Define Porter’s competitive forces model and explain how it works.
Describe what the competitive forces model explains about competitive advantage.
List and describe four competitive strategies enabled by information systems that firms can pursue.
Describe how information systems can support each of these competitive strategies and give examples.
Explain why aligning IT with business objectives is essential for strategic use of systems.
Define and describe the value chain model.
Explain how the value chain model can be used to identify opportunities for information systems.
Define the value web and show how it is related to the value chain.
Explain how the value web helps businesses identify opportunities for strategic information systems.
Describe how the Internet has changed competitive forces and competitive advantage.
Explain how information systems promote synergies and core competencies.
Describe how promoting synergies and core competencies enhances competitive advantage.
Explain how businesses benefit by using network economics.
Showing 1 - 100
of 1576
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last