Question: Part A Data and Business Intelligence (5 marks) Case Study: Supermarket peak period A supermarket has been experiencing long lines during peak periods of the

Part A Data and Business Intelligence (5 marks)

Case Study: Supermarket peak period A supermarket has been experiencing long lines during peak periods of the day. The problem is noticeably worse on certain days of the week, and the peak periods sometimes differ according to the day of the week. There are usually enough workers on the job to open all cash registers. The problem the supermarket manager faces is knowing when to call some of the workers who are stocking shelves up to the front to work the checkout counters.

How might business analytics help the supermarket manager?

What data would be needed to facilitate good decisions?

How is the data analyst going to achieve this?

Part B - Information Security (5 marks)

Use one of your favourite search engines and search worlds biggest data breaches. Select at least two of the major data breaches from the list you found and complete the following.

Explain how they impacted you.

Many of the breached companies had standard security controls like firewalls and intrusion detection systems. Discuss what was missing in their designs and processes.

Add other items that you believe organizations should improve on to avoid breaches.

Part C - Communication and Networks (5 marks)

Case Study: Should Manufacturer convert to IoT?

You are a member of the plant information systems group for a small manufacturer of all-natural ingredient cosmetics. Your firm promotes itself as adhering to the highest standards of compliance and quality. Manufacturing is rigorously monitored via sensors and computer controls throughout the entire process, and automated temperature controls ensure complete stability in the manufacturing environment. Sensor tracking is performed from the moment that raw materials enter your facility, throughout the manufacturing process, packaging, and on to distribution. The sensors and computer controls were installed when the plant was built in the 1990s and use proprietary communications protocols and are not Internet enabled. Data from these sensors is monitored by a group of three technicians in the computer control room. Twelve workers are required to staff the control room 24/7, including weekends and most holidays. Your company has just purchased a plant previously owned by one of your competitors in a nearby state. Your group has been asked to look at the feasibility of upgrading the sensors used in both plants to Internet-enabled sensors connected to the Internet of Things. This would make it possible for technicians in one control room to monitor the operation of both plants. Plant staffing could be reduced by 12 workers saving $1.2 million in labour expenses per year. It is estimated that the cost of replacing the existing sensors and converting to the Internet of Things is in the vicinity of $1.5 million.

Why is it necessary to replace the existing sensors to implement an IoT network?

What additional benefits may arise from converting the plants to the Internet of Things?

What new risks are raised by placing the new system of sensors on the Internet of Things?

What actions could be taken to reduce these risks?

Part D - Ethics in Business (5 marks)

Case Study: Apple vs. FBI

In the wake of the December 2015 terrorist attack in San Bernardino, attention turned to the perpetrators iPhone. A federal judge asked Apple, maker of the iPhone, to provide reasonable technical assistance to the FBI in accessing the information on the phone with that hope of discovering additional threats to national security. Apple provided the FBI with data it had in their possession and sent Apple engineers to advise the FBI, but refused to comply with the court order to bypass the phones security measures: specifically the 4-digit login code and a feature that erases all data after ten incorrect attempts. The FBI argued that the bypass could only be used for this phone, this one time. The agency also cited national security concerns, given the phone may lead to better understanding the attack and preventing further incidents. Apple CEO Tim Cook issued a public letter reiterating Apples refusal to cooperate. Cook advocated for the benefits of encryption in society to keep personal information safe. He stated that creating the backdoor entry into the iPhone would be akin to creating a master key capable of accessing the tens of millions of iPhones in the U.S. alone. Cook also had concerns that the FBI was outstepping its bounds - by using the court system to expand its authority - and believed the case should be settled after public debate and legislative action through Congress instead. Public opinion polls on the issue were split. A number of major tech firms filed amicus briefs in support of Apple. The White House and Bill Gates stood behind the FBI. In anticlimactic fashion, the FBI withdrew its request a day before the hearing, claiming it no longer needed Apples help to assess the phone.

Was Apple wrong for not complying with the FBIs request? If so, why? If not, why not?

What ethical issues are involved in this case?

Who are the stakeholders in this situation?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!