New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
principles information systems
Information Systems For Business An Experiential Approach 2nd Edition France Belanger, Craig Van Slyke, Robert E. Crossler - Solutions
Why is managing knowledge important to organizations?
Briefly explain how knowledge and information differ in the terms of case of management and the level of human contribution.
How have you used information technologies to help you connect with others for the purpose of tapping their knowledge? Why did you use those technologies?
When have you used the knowledge of others to help you make a decision? Briefly describe the decision. Whom did you contact to help you? What knowledge were you trying to access?
Why is mobile commerce more popular in other areas of the world compared to the United States?
A businessperson the authors know said that search engine optimization is as much art as science. What does he mean?
If both channel compression and channel expansion occur in an industry because of e-busi- ness, does that mean that e-business had limited impacts on that industry? Why or why not?
What is the role of privacy in e-business success?
What is the role of security in e-business success?
What is the relationship between network effects and the material on competitive advantages in Chapter 4?
How is the material in this chapter related to the material on transmitting information in Chapter 7?
Is it important to distinguish among e-business, e-commerce, and Internet commerce? Why or why not?
What topics are unclear? What about them is unclear?
What is the most important thing you learned in this chapter? Why is it important?
Describe how electronic data interchange (EDI) functions and how it is evolving today.
Compare and contrast B2B e-business to B2C e-business.
Describe the goals of search engine optimization, the various ways in which it is performed, and other options organizations have for marketing their websites.
Explain how e-business has led to channel expansion, discuss its impacts, and provide examples.
Explain how e-business has led to disintermediation and provide examples.
Explain the concept of network effects or network economics and its importance to e-business.
Identify the main technological factors that have enabled e-business growth and compare them to the technological enablers of m-business.
Describe the various ways to classify e-business models, including B2C and B2B models.
Explain what a business model is and what it should include.
Define e-business and compare this to e-commerce, e-government, and Internet commerce. Is Internet commerce considered e-business?
Can a very small business implement a CRM system? What would be the advantages and disadvantages of doing so?
We discussed different types of integration in this chapter (system, business, and data). How do they relate to one another?
How can process modeling (Chapter 11) enable firms to successfully implement enterprise systems?
Which issues are similar for both the process and the hierarchical perspectives of developing enterprise systems? Why?
Explain how data integration is essential to the success of ERP, SCM, and CRM systems.
How does the material in this chapter relate to the content of Chapter 4 on strategic informa- tion systems?
How does cloud computing relate to ERP and CRM applications?
How does the process perspective provide integration, and what types of integration are provided?
What topics are unclear? What about them is unclear?
What is the most important thing you learned in this chapter? Why is it important?
What are customer-managed interactions? How do they differ from CRM?
What is the difference between on-premise CRM systems and on-demand CRM systems?
What are the main goals of a CRM system?
What are the main components of a CRM system? Briefly describe each.
What is customer relationship management (CRM)?
What is the purpose of a supply chain management (SCM) system?
What is an enterprise resource planning (ERP) system, and how does it support systems integration?
Define business integration and systems integration.
How are applications developed using the functional perspective? The hierarchical perspective?
What is the difference between a personal and an enterprise information system?
What are the benefits to companies of self-servicing CRM applications?
What are the benefits to customers of self-servicing CRM applications?
How likely are you to use this self-servicing application (Return Center) instead of calling someone at Amazon? Why?
How difficult do you think it would be to actually complete the return?
How difficult was it to find the information needed?
Why do you think business process reengineering is an important concern for CIOs?
What is an example of technology being a barrier to redesign in a school setting?
Should informal business processes (representing how things are really done, even if they do not follow recognized or documented procedures) be modeled or just formalized business processes (those documented by the organization)?
What are the similarities and differences between process modeling as discussed in this chap- ter and data modeling as discussed in Chapter 5?
Can all business processes be redesigned? Why or why not?
How does the business process-related material in this chapter relate to the privacy topics in Chapter 9?
How does the business process-related material in this chapter relate to the security topics in Chapter 8?
Identify all the processes a student encounters during the first week of class as a freshman.
What topics are unclear? What about them is unclear?
What is the most important thing you learned in this chapter? Why is it important?
What are some of the results expected from a business redesign effort?
Briefly explain the main steps involved in performing business process redesign.
What are the four key areas for business process improvement?
What is business process reengineering (BPR), and what does it involve?
How does technology impact business processes?
What kinds of tools are available for business process modeling?
Identify some of the important characteristics of a process model.
What is business process modeling, and what is the purpose of business process modeling?
Identify some of the important characteristics of processes.
Explain what a business process is and give an example from your school environment.
There have been several instances of software development companies making formerly pro- prietary software open source. (See http://en.wikipedia.org/wiki/List_of_formerly proprietary _software for a partial list of proprietary software that has been shifted to open source.) Why would a software
What ethical issues are related to the decision to outsource a function? Are these issues differ- ent for offshore, nearshore, and onshore outsourcing?
Commercial, off-the-shelf (COTS) software is often of higher quality than custom-built soft- ware. This is especially true if the COTS software is widely used.a. Why might COTS software be of higher quality?b. Why would this be more likely if the COTS software is widely used?
Your organization needs to build a system to help users carry out a business process that is very unique to your organization.a. Should your organization build this system from scratch or use a COTS system? Why? What additional information would be helpful in making this decision?b. Do you think
What is the difference between functional and nonfunctional requirements? Why are they both important? Which do you think is harder to determine? Why?
How is the traditional systems development life cycle related to systems theory? (Recall that you learned about systems theory in Chapter 2.)
What relationships do you see between what you learned in this chapter and what you have learned in earlier chapters?
How do offshore, nearshore, and onshore outsourcing differ?
What factors should organizations consider when deciding whether to outsource?
List the major benefits and risks of outsourcing.
List and briefly describe the outsourcing models presented in the chapter.
What advantages does open source software offer to businesses?
Define open source software.
What are the main factors to consider when deciding whether to build or purchase software?
List the main characteristics of custom-built and COTS software.
List the advantages and disadvantages of custom; commercial, off-the-shelf (COTS); and hybrid approaches to software.
Name the advantages and disadvantages of each of the software development methodologies described in the chapter.
Name and describe three alternatives to the traditional SDLC.
Name and briefly describe the aspects of feasibility described in the chapter.
Name and briefly describe the phases of the systems development life cycle described in the chapter.
What aspects of software development does a methodology specify?
What is the major benefit of a software development methodology?
How can information and communication technologies help make ethical decisions?
When should organizations consider trust seals when they design a website?
Can businesses be victims of identity theft? Why or why not?
Why are data collection and secondary use of information threats to information privacy?
What is the difference between information privacy and information security? Can one exist without the other?
Give examples of five types of data that could be stored in a cookie set up by your university when you browse the main student pages.
Imagine a well-known online retailer reveals that a hacker successfully accessed the personal information of 500 of its consumers. Is this a threat to privacy or security for the consumers? Explain.
How are privacy policies, cookies, and privacy seals related?
Are there any overlaps between the information privacy threats discussed in the chapter and the components of the PAPA framework?
Showing 1400 - 1500
of 3226
First
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Last
Step by Step Answers