New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
principles information systems
Information Systems Today Managing The Digital World 8th Edition Joseph Valacich, Christoph Schneider - Solutions
Search for further information on encryption. What is the difference between 128-bit and 40-bit encryption?What level of encryption is used in your web browser?Why has the U.S. government been reluctant to release software with higher levels of encryption to other countries?
There are many brands of software firewalls, with ZoneAlarm, Norton 360, and Comodo Firewall being three popular choices. Search for these products on the web and learn more about how a firewall works and what it costs to give you this needed protection; prepare a one-page report that outlines what
Contrast cyberharassment, cyberstalking, and cyberbullying using real-world examples found from recent news stories.
What laws should be enacted to combat cyberterrorism?How could such laws be enforced?
Check one or more of the following websites to see which hoaxes are currently circulating online: www.hoax-slayer.com, www.truthorfiction.com, or www.snopes.com/info/top25uls.asp. What are five popular hoaxes now circulating online?
Search the Internet for information about the damaging effects of software piracy and/or look at the following websites: www.bsa.org and www.microsoft.com/piracy. Is software piracy a global problem? What can you do to mitigate the problem? Prepare a short presentation for the class.
Visit www.fraud.org to find ways to protect yourself from identity theft. Search the Internet for additional sources that provide information on identity theft and make a list of other ways to safeguard against it. What are some of the losses in addition to stolen documents and additional bills to
Do you feel the media generate too much hype regarding hackers and crackers? Since prominent companies such as Microsoft are often hacked into, are you concerned about your bank account or other sensitive information?
Visit the website for the U.S. Computer Emergency Readiness Team at www.us-cert.gov/ncas/tips/ST04-015 and answer the following:a. What is a distributed denial-of-service attack?b. How can you spot a denial-of-service attack?c. What devices or activities within an organization might be impacted by
Research the statistics for the number of unauthorized intrusions into computer systems last year. Which type was most prevalent? Which groups committed the highest number of intrusions—hackers, employees, and so on?
Take a poll of classmates to determine who has had personal experience with computer virus infections, identity theft, or other computer/information system intrusions. How did victims handle the situation? What are classmates who have not been victimized doing to secure computers and personal
Match the following terms to the appropriate definitions:i. Acceptable use policy ii. Authentication iii. Cyberwar iv. Biometrics v. Firewall vi. Phishing vii. Information systems audit viii. Spyware ix. Unauthorized access x. Zombie computera. Body characteristics such as fingerprints, retinal
______________ is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transmission so that recipients can read or hear them.A. Encryption B. Transmission security C. Authentication D. Cloud security
A(n) ______________ is a system composed of hardware, software, or both that is designed to detect intrusion and prevent unauthorized access to or from a private network.A. encryption B. firewall C. alarm D. logic bomb
The use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals is known as ______________.A. cyberwar B.
Which of the following is the process of determining the true, accurate identity of a user of an information system?A. identity audit B. authentication C. authorization audit D. authorization assessment
Limiting access to electronic data can involve ______________.A. something you have B. something you know C. something you are D. all of the above
Technological controls used to protect information include ______________.A. laws B. effective management C. firewalls and physical access restrictions D. ethics
Unauthorized data modification includes ______________.A. an authorized user changing a website address B. a website crashing C. an unauthorized user viewing confidential data D. someone who is not authorized to do so changing electronic data
Which of the following does not pose a threat to electronic data?A. unauthorized access B. jailbreaking one’s mobile phone C. unauthorized data modification D. all of the above can compromise data
Those individuals who break into computer systems with the intention of doing damage or committing a crime are usually called ______________.A. hackers B. crackers C. computer geniuses D. computer operatives
What is the common rule for deciding if an information system faces a security risk?A. Only desktop computers are at risk.B. Only network servers are at risk.C. All systems connected to networks are vulnerable to security violations.D. Networks have nothing to do with computer security.
Describe how the Sarbanes–Oxley Act affects the IS security of an organization.
Describe the process of managing IS security.
Describe three human-based controls for safeguarding information systems.
Describe several methods for preventing and/or managing the spread of computer viruses.
What are physical access restrictions, and how do they make an information system more secure?
Define and contrast cyberwar and cyberterrorism.
Define and contrast cyberharassment, cyberstalking, and cyberbullying.MyMISLab MyMISLab
Define malware and give several examples.
Why are insider threats particularly dangerous for organizations?
Contrast hackers versus crackers.
Explain the purpose of the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986.
Define computer crime and list several examples of computer crime.
List and describe the primary threats to IS security.
What skills might help you to pursue opportunities in the area of Big Data?
What advantages are there to storing and processing Big Data? How can companies and individuals benefit?
How much data do you generate on a daily, weekly, monthly, and annual basis? Think about every digital encounter you have and what gets stored.
Some privacy advocates argue that biometric systems can become unreliable and single out innocent people, especially over time as these databases become less accurate because of a person’s natural aging process, weight loss, weight gain, injury, or permanent disability. Discuss the problems
Develop a set of faith-, fear-, and fact-based arguments to support the continued and ongoing expansion of the FBI database.Which arguments do you think are the strongest? Why?
List a set of tangible and intangible benefits as well as tangible and intangible costs for the FBI database system.
Using your spreadsheet or presentation software of choice, create a graph/figure/presentation to effectively visualize the findings you consider most important.
As a team, discuss what these numbers will look like in 5 years and 10 years. How are things in the U.S.market the same or different compared with the world?Where are things moving faster/slower? Why?
As a team, interpret the changes in numbers (or stories). What is striking/important about these findings?
Search the web for the most up-to-date statistics and forecasts on people lagging behind in their adoption of new technologies.
In addition to international travel, travel reservations for people with special needs is an area of specialty of Campus Travel. However, to be able to recommend travel destinations and travel activities, you should know what facilities are available at each destination.Therefore, you have been
Campus Travel wants to increase its customer focus and wants to be able to better serve its most valued customers. Many members of the frequent-flier program have requested the ability to check on the status of their membership online; furthermore, the frequent fliers would welcome the opportunity
Imagine that you have just been hired by an organization and you have been tasked with purchasing 10 tablet computers. Compile a list of at least three criteria you will use to evaluate at least three alternatives using weighted multicriteria analysis. Make a purchase recommendation based on your
Find an organization on the Internet (e.g., at www.computerworld.com or www.infoworld.com) or a company you may want to work for in the future that outsources work. What are the managerial challenges of outsourcing, and why is this a popular alternative to hiring additional staff?
Describe your experiences with information systems that were undergoing changes or updates. What kind of conversion procedure was being used? How did this affect your interaction with the system as a user? Who else was affected? If the system was down altogether, for how long was it down? Do you or
Choose an organization with which you are familiar that develops its own information systems. Does this organization follow an SDLC? If not, why not? If so, how many phases does it have? Who developed this life cycle? Was it someone within the company, or was the life cycle adopted from somewhere
Conduct a search on the web for “systems development life cycle.” Check out some of the hits. Compare them with the SDLC outlined in this discussion. Do all these life cycles follow the same general path? How many phases do the ones you found on the web contain?Is the terminology the same or
When Mozilla posts a new version of the Firefox browser on its website and states that this is a beta version, what does it mean? Is this a final working version of the software, or is it still being tested? Who is doing the testing? Search the web to find other companies that have beta versions of
Explain the differences between data and data flows. How might systems analysts obtain the information they need to generate the data flows of a system? How are these data flows and the accompanying processing logic used in the system design phase of the life cycle? What happens when the data and
Contrast the differing perspectives of different stakeholders involved in making information systems investment decisions.
Identify and describe three different situations where fear, faith, or fact arguments would be most compelling when making an information systems investment decision.
Contrast the cost of acquisition versus the total cost of ownership for the purchase of a new car. Demonstrate how the type of car, year, make, model, and so on change the values of various types of costs and benefits.
Why can it be difficult to develop an accurate cost–benefit analysis? What factors may be difficult to quantify? How can this be handled? Is this something that should just be avoided altogether? What are the consequences of that approach?
After reading this chapter, it should be fairly obvious why an IS professional should be able to make a business case for a given system. Why, however, is it just as important for non-IS professionals? How are they involved in this process? What is their role in making IS investment decisions?
Match the following terms with the appropriate definitions:i. Request for proposal ii. Systems benchmarking iii. Alpha testing iv. Systems development life cycle v. Productivity paradox vi. Prototyping vii. Pilot conversion viii. Systems analysis ix. Outsourcing x. External acquisition xi. Data
Most competitive external acquisition processes have at least five general steps. Which of the following is not one of those steps?A. vendor selection B. proposal evaluation C. development of a request for proposal D. implementation
Which of the following factors is a good reason to outsource?A. problems in IS performance B. supplier pressures C. financial factors D. all of the above
A user of proprietary software has the right to ____________ the software.A. copy B. run C. modify D. redistribute
A ______________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those requirements.A. request letter B. vendor request C. request for proposal D. requirements specification
Which of the following is not one of the three types of arguments commonly made in the business case for an information system?A. fear B. fact C. faith D. fiction
______________ maintenance involves making enhancements to improve processing performance or interface usability or adding desired (but not necessarily required) system features (in other words, “bells and whistles”).A. Preventive B. Perfective C. Corrective D. Adaptive
In the systems design phase, the elements that must be designed when building an information system include all of the following except ______________.A. the human–computer interface B. questionnaires C. databases and files D. processing and logic
Which of the following is the correct order of phases in the systems development life cycle?A. analysis, planning, design, implementation B. analysis, design, planning, implementation C. planning, analysis, design, implementation D. design, analysis, planning, implementation
______________ is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function.A. Requirements collection B. Systems collection C. Systems analysis D. Records archiving
Which of the following is not one of the four phases of the systems development life cycle?A. systems analysis B. systems implementation C. systems design D. systems acquisition
List and describe two main types of software licenses.
Describe the two key questions related to outsourcing.
Compare and contrast the four types of systems maintenance.
What are the four options for system conversion?How do they differ from each other?
What are the three major components/tasks of the systems design phase of the SDLC?
List and describe five techniques used in requirements collection.MyMISLab MyMISLab
What are the four phases of the systems development life cycle (SDLC)?
Compare and contrast tangible and intangible benefits and costs.
Describe how to make a successful business case, contrasting faith-, fear-, and fact-based arguments.
Describe the productivity paradox.
If you were the chief executive officer at Amazon.com, would you be comfortable using UAV or driverless vehicle delivery? What are some of the potential risks of using either of these approaches? Explain.
What are some of the drawbacks and challenges to overcome to make UAV and driverless vehicle delivery a reality?
What is meant by the last mile, and why would retailers and delivery services want UAV and driverless vehicle delivery?
What do you see as the greatest event currently (as of reading this chapter) disrupting supply chains? Why?
What can companies do to make sure they are less vulnerable to supply chain disruptions?
What are various ways a supply chain can be disrupted?
Using your presentation software of choice, create a brief presentation about the findings you consider most important.
As a team, discuss what these findings will look like in 5 years and 10 years. How are things in the U.S. market the same or different across the world? Where are things moving faster/slower? Why?
As a team, interpret these numbers (or stories). What is striking/important about these findings?
Search the web for the most up-to-date statistics and forecasts on the use of RFID technology in SCM.
Not all frequent fliers accumulate large amounts of miles. There are many who never travel for years but have frequent-flier accounts. As manager of sales and marketing, you want to find out how to target these individuals with promotions and special offers. To accomplish this task, you will need
Campus Travel has recently started selling products on the Internet; the managers are eager to know how the company’s website is accepted by the customers. The file CampusTravel.csv contains transaction information for the past 3 days, generated from the company’s web server, including IP
Discuss the ethical trade-offs involved when using large databases that profile and categorize customers so that companies can more effectively market their products. Think about products that are “good” for the consumer versus those that are not.
Search on Facebook for your favorite company’s page.How does this company present itself in the social media? How does it handle customer conversations?Is the organization’s strategy effective?
Visit the web sites of three companies offering CRM systems. Do these companies sell only CRM systems?What do they have in common? What does each have that is unique?
Search the web for recent articles on social CRM.What is the current state-of-the-art application for managing customer relationships in social media?
When you last contacted a company with a product or service request, which contact options did you have?Which option did you choose, and why?
Find an organization that is utilizing CRM (visit vendor websites for case studies or industry journals such as CIO Magazine or Computerworld). Who within the organization is most involved in this process, and who benefits?
Assume you are a sales manager. What sales performance measures would you want the CRM system to provide you in order to better manage your sales force? For each measure, describe how you would use it and at what interval you would need to update this information.
Choose a company you are familiar with and examine how efficiently or effectively it has designed the procurement, production, and transportation aspects of its business.
Showing 100 - 200
of 3226
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last
Step by Step Answers