New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
management information systems
Introduction To Information Systems Supporting And Transforming Business 2nd Edition R. Kelly Rainer, Efraim Turban - Solutions
Access the Web sites of two of the major data warehouse vendors, such as NCR (www.ncr.com) and SAS(www.sas.com). Describe their products and how they are related to the Web.
Draw an entity-relationship diagram for a small retail store. You wish to keep track of the product name, description, unit price, and number of items of that product sold to each customer. You also wish to record customer name, mailing address, and billing address.You must track each transaction
The Internet contains many Web sites that provide information on financial aid resources for students.Access several of these sites. Do you have to register to access the information? Can you apply for financial aid on the sites, or do you have to request paper applications that you must complete
Access the Web sites of several real estate companies.Find the sites that take you through a step-by-step process for buying a home, that provide virtual reality tours of homes in your price range and location, that provide mortgage and interest rate calculators, and that offer financing for your
Distinguish between data warehouses and data marts.
What is the relationship between a company’s databases and its data warehouse?
Discuss the benefits of data warehousing to end users.
Explain the difficulties involved in managing data.
Describe the knowledge management system cycle.
If you were the Wipro CEO, what other components would you add to KNET? Support your answer.
If Wipro is so successful with its knowledge management portal, why don’t other companies implement the same type of portal? Hint: Consider corporate culture and the type of industry in which Wipro competes.
What other types of data would you include in the data warehouse? Hint: Think about national security matters.
As the NYPD data warehouse continues to expand in size and sophistication, is there a question of privacy for citizens? Support your answer.
Describe how structured query language works.
If iParadigms wins the lawsuit, student papers will continue to be added to the database. Is it possible that, once the database is large enough, any paper submitted will have “suspect passages”?That is, what will happen if 500,000 papers already have been written on your topic and stored in
What will be the outcome for iParadigms if it loses the lawsuit?
Explain the two sides to this issue. Take one side or the other, and defend your position.
What is an entity? a relationship?
What are the various sources for data?
Explain data governance and how it helps to produce high-quality data.
Explain the advantages of the database approach.
Describe the sources of data and explain how data are collected.
Recognize the importance of data, the issues involved in managing these data, and the data life cycle.
Is it a stretch to think that the value of Yahoo and Google can be decreased as a result of undetected click fraud? Support your answer.
How would Yahoo and Google find people who are committing click fraud?
Access the Computer Ethics Institute’s Web site at www.cpsr.org/issues/ethics/cei. The site offers the “Ten Commandments of Computer Ethics.” Study these 10 and decide if any should be added.
Enter www.biopay.com and other vendors of biometrics. Find the devices they make that can be used to control access into information systems. Prepare a list of products and major capabilities of each.
Visit www.junkbusters.com and learn how to prohibit unsolicited e-mail (spam). Describe how your privacy is protected.
Complete the computer ethics quiz at http://web.cs.bgsu.edu/maner/xxicee/html/welcome.htm.
A critical problem is assessing how far a company is legally obligated to go in order to secure personal data.Because there is no such thing as perfect security (i.e., there is always more that you can do), resolving this question can significantly affect cost.a. When are a company’s security
Frank Abignale, the criminal played by Leonardo di Caprio in the motion picture Catch Me If You Can, ended up in prison. However, when he left prison, he went to work as a consultant to many companies on matters of fraud. Why do so many companies not report computer crimes? Why do these companies
An information security manager routinely monitored the Web surfing among her company’s employees. She discovered that many employees were visiting the “sinful six” Web sites. (Note: The sinful six are Web sites with material related to pornography, gambling, hate, illegal activities,
What is information system auditing?
Describe the two major types of controls for information systems.
What is the relationship between outsourcing data management and business continuity planning for the Ravens?
Does outsourcing data management increase risk for the Ravens? If so, how?
Why was it necessary for Harvard Pilgrim to implement outbound e-mail content filtering?
Is e-mail encryption likely to be as important to organizations in other industries as it is in healthcare organizations? Why or why not?
What are the possible disadvantages of least privilege?
Why is it so important for organizations to provide least privilege to employees?
Describe the issue of intellectual property protection.
Describe the various types of software attacks.
Give an example of one type of unintentional threat to a computer system.
Should online brokers be held liable for hack, pump, and dump schemes? Why or why not?
How can companies protect themselves from hack, pump, and dump schemes?
How can investors protect themselves from hack, pump, and dump schemes?
Describe the relationship between IT and privacy
Define ethics, and list its four categories as they apply to IT.
Do you think that the LexisNexis Customer Security Program is sufficiently powerful to reduce security breaches that occur through its customers?Why or why not?
Should LexisNexis be held legally liable for security breaches outside its perimeter? Support your answer.
What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?
Who will be provided with equipment needed for accessing information?
How can accessibility to computers be provided for employees with disabilities?
How much should companies charge for permitting accessibility to information?
Who is allowed to access information?
How should access to information channels be allocated?
How should experts who contribute their knowledge to create expert systems be compensated?
Can corporate computers be used for private purposes?
Under what circumstances can one use proprietary databases?
How should one handle software piracy (copying copyrighted software)?
What are the just and fair prices for its exchange?
Who owns the information?
Who is to be held accountable for errors in information, and how should the injured parties be compensated?
How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
How can we ensure that the information will be processed properly and presented accurately to users?
Who is responsible for the authenticity, fidelity, and accuracy of the information collected?
What information about individuals should be kept in databases, and how secure is the information there?
What types of personal information can people keep to themselves and not be forced to reveal to others?
What kind of surveillance can an employer use on its employees?
What information about oneself should an individual be required to reveal to others?
Should organizations audit employees’ computers for unauthorized software or illegally downloaded music or video files?
Should organizations sell customer information to other companies?
Explain IT auditing and planning for disaster recovery.Should organizations monitor employees’ Web surfing and e-mail?
Understand the various defense mechanisms used to protect information systems.
Identify the many threats to information security.
Describe the major ethical issues related to information technology and identify situations in which they occur.
Would the new system at Todd Pacific improve or damage the company’s relationship with its unions?Support your answer.
Skilled union workers typically have a degree of autonomy. If you are a skilled worker at Todd Pacific, do you have any privacy concerns about being wirelessly monitored? Why or why not?
If you are the CIO at Todd Pacific, to what other applications could you link the Time Tracking application?
Divide the class into teams. Each team will select a country government and visit its official Web site (try the United States, Australia, New Zealand, Singapore, Norway, Canada, the United Kingdom, the Netherlands, Denmark, Germany, and France). For example, the official Web portal for the U.S.
Assign group members to UPS (www.ups.com), FedEx(www.fedex.com), DHL (www.dhl.com), and the U.S.Postal Service (www.usps.com). Have each group study the e-commerce strategies of one organization. Then have members present the organization, explaining why it is the best.
Observe your local Wal-Mart checkout counter. Find material on the Web that describes how the scanned code is translated into the price that the customers pay. Hint: Look at www.howstuffworks.com.a. Identify the following components of the WalMart system: inputs, processes, and outputs.b. What kind
Enter www.cio.com and find recent information on the changing role of the CIO and the ISD. What is the role of the CIO in organizations today?
Access Truste (www.truste.org), and find the guidelines that Web sites displaying its logo must follow. What are the guidelines? Why is it important for Web sites to be able to display the Truste logo on their sites?
Enter the site of Dell.com, and find the current information systems used by the company. Explain how the systems’ innovations contribute to Dell’s success.
The market for optical copiers is shrinking rapidly. It is expected that by 2008 as much as 90 percent of all duplicated documents will be done on computer printers. Can a company such as Xerox Corporation survive?a. Read about the problems and solutions of Xerox in 2000–2003 at www.fortune.com,
Discuss the reasons why some information systems fail.
Why has the Internet been called the creator of new business models?
Explain how office automation systems, functional area information systems, and decision support systems can support multiple levels of the organization.
Using Figure 2.2 as your guide, draw a model of a supply chain with your university as the central focus.Keep in mind that every university has suppliers and customers.
Knowledge workers comprise the largest segment of the workforce in U.S. business today. However, many industries need skilled workers who are not knowledge workers. What are some examples of these industries?What might replace these skilled workers? When might the U.S. economy need more skilled
Discuss the logic of building information systems in accordance with the organization’s hierarchical structure.
Where do you think the IT staff should be located? Should they be decentralized in the functional areas? centralized at corporate level? a combination of the two? Explain your answer.
How important are end users to the management of the organization’s information resources?
If you were majoring in architecture, how would you prepare in order to reduce the chance that your job would be offshored? Hint: Think about the characteristics of work that is offshored versus the characteristics of work that “stays home.”Now, extend your answer to the field of MIS.
Has the emergence of the global, Web-based platform affected the offshoring of architectural work? If so, explain how.
Besides our inability to predict the future, what are other reasons why IT projects might fail?
Why do SISs support many corporate strategies?
Is TIAA-CREF’s new information system a strategic information system? Why or why not? Hint: Look back at the definition of an SIS in this chapter.
What are the problems (there are many) associated with the implementation of TIAA-CREF’s new information system? Which problem is the most fundamental?
Showing 2400 - 2500
of 6652
First
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Last
Step by Step Answers