New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
management information systems
Management Information Systems: Managing The Digital Firm 16th Edition Kenneth Laudon, Jane Laudon - Solutions
5-3 What are the current trends in computer hardware platforms?
5-2 What are the components of IT infrastructure?
5-1 What is IT infrastructure, and what are the stages and drivers of IT infrastructure evolution?
5-5 What are the challenges of managing IT infrastructure and management solutions?
5-4 What are the current computer software platforms and trends?
5-3 What are the current trends in computer hardware platforms?
5-2 What are the components of IT infrastructure?
5-1 What is IT infrastructure, and what are the stages and drivers of IT infrastructure evolution?
5. Review the company’s LinkedIn page, Facebook, and Twitter to learn about strategic trends and important issues for this company.
4. Indicate that you are very interested in learning more about the technology industry and technologies and services used by the company.
3. Inquire exactly how you would be using Microsoft Office, and if possible provide examples of how you used these tools to solve problems in the classroom or for a job assignment. Bring examples of your writing (including some from your Digital Portfolio described in MyLab MIS) demonstrating your
2. Use the web to research the company and how it works with other technology companies to provide its IT services. Learn what you can about these partner companies as well and the tools and services they offer.
1. Review this chapter and also Chapters 6 and 8 of this text, paying special attention to cloud computing, networking technology, and managed technology services.
5. What is your level of proficiency with Microsoft Office? What work have you done with Excel spreadsheets?
4. Can you give us an example of a sales-related problem or other business problem that you helped solve? Do you do any writing and analysis? Can you provide examples?
3. Do you have any digital marketing experience?
2. Have you had much face-to-face contact with customers? Can you describe what work you did with customers? Have you ever helped customers with a technology problem?
1. What do you know about cloud computing and managed IT services? Are you familiar with common operating systems, security, and data management platforms? Have you ever used these services on the job? What did you do with them?
2. What are the disadvantages of cloud computing?
• Platform as a service (PaaS): Customers use infrastructure and programming tools supported by the cloud service provider to develop their own applications.For example, Microsoft offers PaaS tools and services for software development and testing among its Azure cloud services. Another example
• Software as a service (SaaS): Customers use software hosted by the vendor on the vendor’s cloud infrastructure and delivered as a service over a network. Leading software as a service (SaaS) examples are Google’s G Suite, which provides common business applications online, and
• Infrastructure as a service (IaaS): Customers use processing, storage, networking, and other computing resources from cloud service providers to run their information systems. For example, Amazon uses the spare capacity of its IT infrastructure to provide a broadly based cloud environment
• Measured service: Charges for cloud resources are based on amount of resources actually used.
• Rapid elasticity: Computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand.
• Location-independent resource pooling: Computing resources are pooled to serve multiple users, with different virtual resources dynamically assigned according to user demand. The user generally does not know where the computing resources are located.
• Ubiquitous network access: Cloud resources can be accessed using standard network and Internet devices, including mobile platforms.
• On-demand self-service: Consumers can obtain computing capabilities such as server time or network storage as needed automatically on their own.
2. What management, organization, and technology issues would have to be addressed if a company was thinking of equipping its workers with a wearable computing device?
• IT research and development services that provide the firm with research on potential future IT projects and investments that could help the firm differentiate itself in the marketplace
• IT education services that provide training in system use to employees and offer managers training in how to plan for and manage IT investments
• IT standards services that provide the firm and its business units with policies that determine which information technology will be used, when, and how
• IT management services that plan and develop the infrastructure, coordinate with the business units for IT services, manage accounting for the IT expenditure, and provide project management services
• Physical facilities management services that develop and manage the physical installations required for computing, telecommunications, and data management services
• Application software services, including online software services, that provide enterprise-wide capabilities such as enterprise resource planning, customer relationship management, supply chain management, and knowledge management systems that are shared by all business units
• Data management services that store and manage corporate data and provide capabilities for analyzing the data
• Telecommunications services that provide data, voice, and video connectivity to employees, customers, and suppliers
5-6 How will MIS help my career?
5-5 What are the challenges of managing IT infrastructure and management solutions?
5-4 What are the current computer software platforms and trends?
5-3 What are the current trends in computer hardware platforms?
5-2 What are the components of IT infrastructure?
5-1 What is IT infrastructure, and what are the stages and drivers of IT infrastructure evolution?
4-18 What are five digital technology trends in business today that raise ethical issues for business firms and managers? Provide an example from business or personal experience when an ethical issue resulted from each of these trends.
4-17 What are the five principles of Fair Information Practices? For each principle, describe a business situation in which the principle comes into play and how you think managers should react.
4-16 Will Facebook be able to have a successful business model without invading privacy? Explain your answer. Could Facebook take any measures to make this possible?
4-15 Describe the weaknesses of Facebook’s privacy policies and features. What management, organization, and technology factors have contributed to those weaknesses?
4-14 What is the relationship of privacy to Facebook’s business model?
4-13 Perform an ethical analysis of Facebook. What is the ethical dilemma presented by this case?
4-12 With three or four of your classmates, develop a corporate ethics code on privacy that addresses both employee privacy and the privacy of customers and users of the corporate website. Be sure to consider email privacy and employer monitoring of worksites as well as corporate use of information
• Which browser does the best job of protecting privacy? Why?
• How do these privacy protection features affect what businesses can do on the Internet?
• How do these privacy protection features protect individuals?
4-11 This project will help develop your Internet skills for using the privacy protection features of leading web browser software.Examine the privacy protection features and settings for two leading web browsers such as Internet Explorer, Mozilla Firefox, or Google Chrome. Make a table comparing
4-10 In this project, you’ll learn how to build a simple blog of your own design using the online blog creation software available at Blogger.com. Pick a sport, hobby, or topic of interest as the theme for your blog. Name
• Use the guidelines for ethical analysis presented in this chapter to develop a solution to the problems you have identified.
• Do your findings and the contents of the report indicate any ethical problems employees are creating?Is the company creating an ethical problem by monitoring its employees’ use of the Internet?
• Calculate the total amount of time each employee spent on the web for the week and the total amount of time that company computers were used for this purpose. Rank the employees in the order of the amount of time each spent online.
4-9 As the head of a small insurance company with six employees, you are concerned about how effectively your company is using its networking and human resources. Budgets are tight, and you are struggling to meet payrolls because employees are reporting many overtime hours. You do not believe that
4-7 Discuss the pros and cons of allowing companies to amass personal data for behavioral targeting.
4-6 Should companies be responsible for unemployment their information systems cause? Why or why not?MyLab MIS MyLab MIS
• Define and describe computer vision syndrome and repetitive stress injury (RSI) and explain their relationship to information technology.
4-4 How have information systems affected laws for establishing accountability and liability and the quality of everyday life?
• List and define the three regimes that protect intellectual property rights.
4-2 What specific principles for conduct can be used to guide ethical decisions?
• Explain how ethical, social, and political issues are connected and give some examples.
4-1 What ethical, social, and political issues are raised by information systems?
4-4 How have information systems affected laws for establishing accountability and liability and the quality of everyday life?
4-2 What specific principles for conduct can be used to guide ethical decisions?
4-1 What ethical, social, and political issues are raised by information systems?
4. If you do not have any hands-on experience in the privacy area, explain what you do know about privacy and why it is so important to protect sensitive personal data, and indicate you would be very interested in learning more and doing privacy-related work.
3. Try to find out more about employee recordkeeping and privacy protection at U.S. military bases or other organizations.
2. Use the web to find out more about the Privacy Act and privacy protection procedures and policies for personnel records.
1. Review this chapter, with special attention to the sections dealing with information systems and privacy.
5. Have you ever dealt with a problem involving privacy protection? What role did you play in its solution?
4. If you were asked to improve privacy protection for our organization, how would you proceed?
3. What do you know about privacy protection practices for both written and electronic correspondence?
2. What do you know about the Privacy Act?
1. What background or job experience do you have in the privacy protection field?
• Reviewing and analyzing data and documents and assessing options, issues, and positions for a variety of program planning, reporting, and execution activities.
• Coordinating privacy office meetings.
• Monitoring and responding to written, verbal, and electronic correspondence and inquiries directed to the government privacy office, including sensitive beneficiary/personnel correspondence.
• Logging and tracking Privacy Act requests, assistance with review, redaction and preparation of responsive records, and tracking all privacy office correspondence.
• Analyzing and developing policy and procedures related to privacy office functions.
2. If you were the owner of a factory deciding on whether to acquire robots to perform certain tasks, what people, organization, and technology factors would you consider?
1. How does automating jobs pose an ethical dilemma?Who are the stakeholders? Identify the options that can be taken and the potential consequences of each.
4. The web server reads the cookie, identifies the visitor, and calls up data on the user.
3. When the user returns to the website, the server requests the contents of any cookie it deposited previously in the user’s computer.
2. The server transmits a tiny text file with user identification information called a cookie, which the user’s browser receives and stores on the user’s computer hard drive.
1. The web server reads the user’s web browser and determines the operating system, browser name, version number, Internet address, and other information.
6. Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical nofree-lunch rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants
5. Take the action that produces the least harm or the least potential cost (risk aversion principle). Some actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area)or extremely high failure costs of moderate probability
4. Take the action that achieves the higher or greater value (utilitarian principle).This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action.
3. If an action cannot be taken repeatedly, it is not right to take at all. This is the slippery slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once
2. If an action is not right for everyone to take, it is not right for anyone(Immanuel Kant’s categorical imperative). Ask yourself, “If everyone did this, could the organization, or society, survive?”
1. Do unto others as you would have them do unto you (the Golden Rule). Putting yourself in the place of others, and thinking of yourself as the object of the decision, can help you think about fairness in decision making.
5. Identify the potential consequences of your options Some options may be ethically correct but disastrous from other points of view. Other options may work in one instance but not in similar instances. Always ask yourself, “What if I choose this option consistently over time?”
4. Identify the options that you can reasonably take You may find that none of the options satisfy all the interests involved but that some options do a better job than others. Sometimes arriving at a good or ethical solution may not always be a balancing of consequences to stakeholders.
3. Identify the stakeholders Every ethical, social, and political issue has stakeholders:players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful
2. Define the conflict or dilemma and identify the higher-order values involved Ethical, social, and political issues always reference higher values. The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, or the free enterprise system).
1. Identify and describe the facts clearly Find out who did what to whom and where, when, and how. In many instances, you will be surprised at the errors in the initially reported facts, and often you will find that simply getting the facts straight helps define the solution. It also helps to get
Showing 3800 - 3900
of 6652
First
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
Last
Step by Step Answers