All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
Explain how critical success factors, portfolio analysis, and scoring models can be used to select information systems projects.
How important is the reservation system at airlines such as WestJet and JetBlue? How does it impact operational activities and decision making?Evaluate the key risk factors of the projects to upgrade
1. What are some of the risks involved when one firm acquires another firm’s IT infrastructure?2. Why do firms often fail to take the target firm’s information systems and IT
What are some of the challenges MARR faces as an organization? Why is project management so critical for MARR and its ILU division?What features of MS Project Server 2010 were most useful to
How do you think using a mobile app will affect the real estate industry in Canada?
Identify and describe the problem discussed in the case (how can you close the deal with donors)?How do business intelligence systems provide a solution to this problem? What are the inputs and
Your company wants to do more with knowledge management. Describe the steps it should take to develop a knowledge management program and select knowledge management applications.
Describe various ways that knowledge management systems could help firms with sales and marketing or with manufacturing and production.
Knowledge management is a business process, not a technology. Discuss.
How did the integration of online custom board design software (CBD), CAD, and computer numerical control (CNC) improve Firewire’s operations? How does this affect surfboard manufacturers and
What types of problems was Hydro-Québec experiencing with document management before instituting the OpenText system?How did the OpenText system provide a solution to these problems?What management,
Describe some of the barriers to m-commerce.
Evaluate Canam Group’s need for better internal communication. What was driving the need for an intranet?How did using Facebook for an intranet come about? Is that a good model for every company to
Define a service platform and describe the tools for integrating data from enterprise applications.
What problems was Bluewater Power encountering as it merged? What management, organization, and technology factors were responsible for these problems?How easy was it to develop a solution using
Why is it hard for Canada Post to automate data entry into its SAP systems? What business processes are involved?Why were management, organization, and technology factors responsible for Canada
Which company and business model do you believe will prevail in internet experience? Explain your answer
Define a data warehouse, explaining how it works and how it benefits organizations.Define business intelligence and explain how it is related to database technology.
Assess the business impact of credit bureaus’ data quality problems for the credit bureaus, for lenders, and for individuals.Are any ethical issues raised by credit bureaus’ data quality
Define Java and Ajax and explain why they are important.
Define privacy, and discuss the principles of PIPEDA.
Explain how ethical, social, and legal issues are connected and give some examples.
Do you think that the U.S. study that showed that minority children spend more time with media than “white” children is also true in Canada between minority children (e.g., those identified as
It has been said that the advantage that leading-edge retailers such as The Bay and Canadian Tire have over their competition isn’t technology; it’s their management. Do you agree? Why or why not?
It has been said that there is no such thing as a sustainable competitive advantage. Do you agree? Why or why not?
What competitive forces have challenged the movie industry? What problems have these forces created? What changes have these problems caused the movie and television studios to make?Describe the
List and describe the various types of collaboration and social business systems.
If you were setting up an extranet for the Canadian Wheat Board, what management, organization, and technology issues might you encounter?
What kinds of businesses are most likely to benefit from equipping their employees with mobile digital devices such as iPhones, iPads, and BlackBerrys?
Which U.S. federal agency sponsors the InfraGard program? Which agency has taken control of the overall National Infrastructure Protection mission?
What is the stated purpose of the SANS organization? In what ways is it involved in professional certification for InfoSec professionals?
Of the professional organizations discussed in this chapter, which is focused on auditing and control?
Of the professional organizations discussed in this chapter, which has been in existence the longest time? When was it founded?
What is a policy? How does it differ from a law?
What is the USA PATRIOT Act? When was it initially established and when was it significantly modified?
What is tort law and what does it permit an individual to do?
What are the three primary types of public law?
What is least privilege? Why is implementing least privilege important?
List and describe the types of nonemployee workers often used by organizations. What special security considerations apply to such workers, and why are they significant?
Why shouldn’t you show a job candidate secure areas during interviews?
List and describe the standard personnel practices that are part of the InfoSec function. What happens to these practices when they are integrated with InfoSec concepts?
In your opinion, who should pay for the expenses of certification? Under what circumstances would your answer be different? Why?
List and describe the certification credentials available to InfoSec professionals.
What is the rationale for acquiring professional credentials?
What functions does the internal security consultant perform, and what are the key qualifications and requirements for the position?
Why is it important to have a body of standard job descriptions for hiring InfoSec professionals?
Which two career paths are the most commonly encountered as entrees into the Info- Sec discipline? Are there other paths? If so, describe them.
How do the security considerations for temporary or contract workers differ from those for regular employees?
What are the critical actions that management must consider taking when dismissing an employee? Do these issues change based on whether the departure is friendly or hostile?
What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking.
What are some of the factors that influence an organization’s hiring decisions?
List and describe the criteria for selecting InfoSec personnel.
When an organization undertakes an InfoSec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be
Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management?
One tenet of cryptography is that increasing the work factor to break a code increases the security of that code. Why is that true?
Define asymmetric encryption. Why would it be of interest to information security professionals?
Explain the relationship between plaintext and ciphertext.
What are the main components of cryptology?
Why is TCP port 80 always of critical importance when securing an organization’s network?
What is a DMZ? Is this really a good name for the function that this type of subnet performs?
How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers more security for the information assets that remain on the trusted network?
What is the most effective biometric authorization technology? Why?
What is the most widely accepted biometric authorization technology? Why?
What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not?
How does Microsoft define “risk management”? What phases are used in its approach?
What is the OCTAVE Method? What does it provide to those who adopt it?
What is the difference between qualitative measurement and quantitative measurement?
What is the difference between organizational feasibility and operational feasibility?
What is the difference between benchmarking and baselining?
What is single loss expectancy? What is annual loss expectancy?
What is the difference between intrinsic value and acquired value?
What is a cost-benefit analysis?
What conditions must be met to ensure that risk acceptance has been used properly?
Describe how outsourcing can be used for risk transference.
What four types of controls or applications can be used to avoid risk?
Describe residual risk.
Describe the strategy of acceptance.
Describe the strategy of mitigation.
Describe the strategy of transferal.
Describe the strategy of defense.
What is competitive advantage? How has it changed in the years since the IT industry began?
Examine the simplest risk formula presented in this chapter. What are its primary elements?
Describe the TVA worksheet. What is it used for?
What are vulnerabilities?
How many threat categories are listed in this chapter? Which is noted as being the most frequently encountered, and why?
How many categories should a data classification scheme include? Why?
Which is more important to the information asset classification scheme, that it be comprehensive or that it be mutually exclusive?
When you document procedures, why is it useful to know where the electronic versions are stored?
Which information attribute is often of great value for networking equipment when Dynamic Host Configuration Protocol (DHCP) is not used?
Which information attributes are seldom or never applied to software elements?
In risk management strategies, why must periodic reviews be a part of the process?
Which community of interest usually provides the resources used when undertaking information asset risk management?
Which community of interest usually takes the lead in information asset risk management?
Who is responsible for risk management in an organization?
According to Sun Tzu, what two things must be achieved to secure information assets successfully?
Why is identification of risks, through a listing of assets and their vulnerabilities, so important to the risk management process?
List and describe the key areas of concern for risk management.
What is risk management?
What is the new Risk Management Framework initiative? How is it superior to the previous approach for the certification and accreditation of federal IT systems?
What industry standard requires system certification? How is this certification enforced?
Showing 200 - 300
of 965
1
2
3
4
5
6
7
8
9
10