New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
information systems
Business Information Systems 5th Edition Paul Bocij - Solutions
‘The barriers relating to the relationship between business and IS/IT strategies mean that successful alignment is likely to be the exception rather than the rule.’ Discuss.
Top-down and bottom-up approaches to formulating information systems strategy are fine as far as they go. However, is there a case for a more eclectic or selective approach to the strategy formulation process?
Evaluate the importance of information systems knowledge amongst senior business managers in achieving successful alignment of business and IS/IT strategies.
Explain the concept of Porter’s value chain and how it can be used to identify a company’s information needs.
How can McFarlan’s strategic grid be used to define an information systems strategy for a company?
Explain the difference between a business-impacting and a business-aligning approach to a company’s IS strategy. Give examples of strategy tools that can help support each method.
Using the potential business applications of the Internet, show how Porter’s five forces model can help identify opportunities for deploying information systems.
evaluate the relationship between IS spending and business benefits;
evaluate location alternatives for an organisation’s IS function;
assess the arguments for and against outsourcing;
apply IS governance concepts to the management of an organisation’s IS function.
How can we ensure that our proposed IS/IT solutions will deliver value for money?
What are the main considerations when deciding where to locate the management of the IS/IT function within the organisation?
How can we determine the extent to which IS/IT services should be outsourced?
What management tools and techniques exist to help us manage the IS/IT portfolio effectively?
When information systems costs are being considered, what kinds of costs would be considered development costs and what would be considered operations/maintenance costs?
How do strategic systems differ from high-potential projects?
Why do information systems projects fail?
Explain the difference between project size and project complexity when evaluating information systems risk.
What are the main different types of outsourcing?
‘The millennium bug has demonstrated that organisations, more often than not, take a shortterm view in their approach to information systems rather than a strategic one.’ Discuss.
‘Public-sector organisations such as the police and health service are incapable of delivering good-quality information systems because they are dominated by the need to demonstrate tangible benefits before any investment decisions are made.’ Discuss.
Would you outsource the HRM or accounting functions of a company? If not, what is so different about IS/IT?
Why do many new information systems seem to deliver poor value for money?
It has been said that when making IS investment decisions, organisations are dominated by organisational politics. Is this really true or are there other, more important issues at stake?
What do you see as the main problems with outsourcing, and how can they be overcome?
‘The IS capability model proposed by Peppard and Ward reaffirms the old adage that“technology is easy, people are difficult”.’ Discuss.
What are the two main alternatives for a company’s location of its information systems?Summarise the benefits and disadvantages in terms of cost and control.
What information systems management activities would occur with a total outsourcing contract?
understand and assess potential threats to a computer-based information system;
propose an overall strategy for ensuring the security of a computer-based information system;
identify specific techniques that might be used to protect a computer-based information system against damage or unauthorised access.
An understanding of approaches towards information systems security will help managers to develop and implement an overall strategy for security.
An understanding of the threats to information systems will help in predicting and anticipating acts such as denial-of-service attacks.
Knowledge of specific techniques for protecting information systems will help in the development of effective counter measures.
As organisations turn to the Internet for business purposes, it becomes important to understand some of the new threats that must be faced.
What are the two basic reasons for the need to control computer-based information systems?
List some of the advantages and disadvantages of using passwords to protect equipment and sensitive data from unauthorised users.
What types of controls can be used to protect a computer-based information system against vandalism, theft and unauthorised access?
What are the advantages and disadvantages of an approach to controlling computer-based information systems that is based on containment?
Describe some of the ways in which accidental damage can occur to a computer-based information system.
Explain why virus-scanning software and anti-virus programs are often of only limited value in detecting and removing computer viruses.
Why do some security specialists recommend the use of disk imaging software?
What motivates an individual or organisation to create a computer virus?
‘No computer-based information system can be considered completely secure – all organisations should base their control strategies on recovery.’ Make a case in favour of or against this argument.
‘An increased reliance on the Internet exposes organisations to increased risk in terms of threats to information systems security.’ Make a case in favour of or against this argument.
How can companies reduce their vulnerability to social engineering attacks?
Conduct any research necessary and produce a formal security policy governing student access to the computer systems at the institution that you attend. In addition to providing details of any controls already in place, your work must also address the areas listed below.For each of these areas, you
Select an organisation that you are familiar with, such as a university or bank. Conduct any research necessary to address the following tasks:(a) Describe the potential impact of infection by computer viruses and other malware on the organisation’s computer-based information systems.(b) Consider
Outline some of the threats to information systems that arise as a result of doing business via the Internet. Illustrate your response with appropriate examples and indicate how the risks you identify can be mitigated.
Computer viruses represent a significant threat to the security of organisational computerbased information systems. Some sources have estimated that as many as 1700 new computer viruses may appear each month. You are required to:(a) Provide a definition of the term ‘computer virus’.(b) Using
With regard to the control of computer-based information systems, answer the following:(a) Describe some of the common security threats facing organisational computer-based information systems.(b) Explain the four basic approaches to controlling computer-based information systems.Highlight the
A formal security policy can provide an effective means of protecting an organisation’s computer-based information systems against theft, damage and other hazards.(a) Provide an overview of the areas that will be outlined by a typical formal security policy document.(b) Describe the ways in which
define the range of services that must be delivered to support end-users effectively;
distinguish between the general term ‘end-user computing’ and the more specific ‘end-user development’;
analyse the risks associated with pursuing end-user development of information systems as part of a company’s IS strategy;
recommend policies for the effective management of end-user computing within an organisation;
recommend new information systems applications that could reasonably be developed by end-user staff within an organisation.
assessing the emphasis to be placed on end-user software development activities;
providing a suitable support function to assist end-users in their use of computers;
ensuring the appropriate skill levels for end-users through staff development and training;
controlling the cost of end-user activities and support.
What are the principal end-user services that must be provided by the information systems manager?
What is the significance of the total cost of ownership?
What is the role of the network computer and other thin clients in reducing the total cost of ownership?
What is the difference between end-user computing and end-user development?
What are the different types of end-user development?
What are the main reasons for the growth in end-user development?
Which activities in the software development lifecycle are often omitted by end-users?
What facilities can be provided to support end-user development?
It has been argued that end-user computing has been driven by a failure of central information systems departments to develop applications quickly enough (the applications backlog). Is this statement true or is there an alternative explanation?
Examine the reasons for the growth of end-user computing in companies of all sizes. You should consider the balance between practical necessity and strategic planning.
What do you see as the future for end-user computing? Will the growth continue, or will there be a backlash against the problems experienced by some companies using this approach?
End-user applications development poses a new set of management problems in companies that adopt this approach. Identify the nature of these problems and suggest measures to overcome them.
Intranets are now widely used by many companies. Examine the suitability of end-users for the control, development and maintenance of intranets.
End-user computing can only be successful if users have a knowledge of the software lifecycle and the activities required to produce good-quality information systems. Which activities do you consider essential to achieving this, and which are likely to be omitted?
Imagine that you are the IS manager of a medium-to-large company with 500 staff. Explain the strategy you would develop to encourage end-user computing, while seeking to control any problems that may arise.
What are the main benefits provided by end-user computing?
Why are end-user-developed applications unsuitable for cross-enterprise applications?
What factors contribute to the total cost of ownership? Why is it significantly higher than the purchase cost?
How does the network computer differ from the personal computer? Why might this appeal to:(a) the IS manager;(b) the finance manager;(c) the end-user.
Name and explain three services that can be provided by an information centre.
What is the applications backlog and how is end-user development significant in relation to this?
Give three reasons why it is important for end-user computing to be part of a company’s overall IS strategy. Briefly justify each.
analyse decisions and courses of action from professional, ethical and moral perspectives;
select appropriate and legal courses of action in keeping with professional codes of conduct;
understand and respond to issues of concern, such as personal privacy
Managers must deal with moral, ethical, professional and legal issues that often conflict with one another.
Responsible organisations must show an awareness of issues that cause concern for employees and the public such as monitoring of employees.
An understanding of legislation is required to ensure that the organisation operates within the law.
Describe the offences are covered by the Computer Misuse Act 1990.
What is meant by computer monitoring?
What are eight guiding principles of the Data Protection Act?
What are the most common types of computer crime?
Identify the legislation that covers the following actions:(a) distributing a computer virus;(b) making an unauthorised copy of a computer program;(c) gaining unauthorised access to a computer-based information system;(d) vandalising computer hardware;(e) creating a computer virus;(f) placing an
For each of the following acts, state whether or not they are permissible under the Computer Misuse Act 1990 or Data Protection Act 1998:(a) storing inaccurate or misleading personal data;(b) damaging data held on offline storage media;(c) electronic eavesdropping;(d) preventing access to personal
What is reverse engineering?
What is a professional code of conduct?
You are given the responsibility of managing a technical project that may result in hundreds of job losses. Decide whether or not you should continue with the project and justify your decision on professional, moral and ethical grounds.
Do the security services and government departments have the right to monitor personal communications, such as e-mail messages? Justify your answer.
Showing 200 - 300
of 1204
1
2
3
4
5
6
7
8
9
10
11
12
13
Step by Step Answers