Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

1. Discussion Question: Business Process and Information Systems

A process can be defined as a series of tasks or activities that lead to an outcome.

For example, in a home, a process called "grocery shopping" has the outcome of ensuring food is available for the week. This process could include the following:

Defining a menu plan for the week, Assessing family-members preferences, Reviewing the family budget, Identifying current pantry and freezer contents, Creating a shopping list, Shopping, and Stocking the shelves with newly purchased items.

Business processes are the same, except they have business-related outcomes and tasks.

Identify one information system that supports a business process with which you are familiar.

Explain the data that is obtained, stored, and used in this system, and how the data supports the process.

Include whether the information system is department-specific or is an enterprise resources planning (ERP) system and outline the limitations and/or benefits this design creates.

2. Discussion Question: Cloud Computing

Consider the many cloud-based information systems we use in our daily lives. Some examples are as follows: E-mail accessed via web browser, Shopping via Amazon or other online retailers, Cloud-based software such as Salesforce or Google Apps and Netflix.

Answer the following questions:

• What are three advantages of cloud computing?

• What are three disadvantages of cloud computing?

• If you were running a small business with limited funds for information technology, would you consider using cloud computing? Include web-based resources that support your decision.

3. Discussion Question: Ethical and Legal Implications of Information Systems

Most of us have been exposed to messages during an online purchase such as; "people who purchased what you are purchasing also purchased 'X'." This means that the purchasing system you are using is profiling you against others with similar habits.

Every time we come into contact with digital technologies, information about us is being made available; from our location to our web-surfing habits, our criminal record to our credit report. We are constantly being monitored. This data is then often synthesized, summarized, and aggregated into profiles and sold.

Address the following questions:

• Do you think that companies have the right to sell our profiles and information they collect?

• Should there be any limitations? Why or Why not?

4.Discussion Question: Information System Security

How do you develop strong information systems security skills? You can start by thinking like a hacker. Some of the best information system security professionals started as hackers. Their experience exploiting vulnerabilities and ability to "think like a hacker" makes them great at their jobs.

You have been asked to perform a security audit on a professor's process of calculating, storing, and submitting final course grades. Figure out how, if at all possible, the integrity of the grading process could be breached. If you have trouble getting started, ask yourself, "Where would a hacker start?"

Answer the following questions:

• What type of information might one need to know in order to fraudulently change a grade?

• How would you go about finding out this information?

• What questions would you ask the professor to help uncover the information you need?

Attachment:- Discussion Question.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92722441
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Descriptionrefer to this resource when completing the its

Description: Refer to this resource when completing the It's All About the HAT assignment. In this assignment, students will learn to use and identify tools that may be helpful in their navigation of security related eve ...

A crucial starting point to develop an effective disaster

A crucial starting point to develop an effective disaster recovery plan is to cultivate an efficient Business Impact Analysis (BIA). The BIA evaluates the potential effect of interruptions to an organization's critical b ...

Hill-rom was transforming from its traditional lines of

Hill-Rom was transforming from its traditional lines of business to a company that was leveraging data to ensure patient safety and satisfaction. 1-How does the HILL-TOM transformation journey change the way the company ...

Assignment 1 cloud computingmany organizations have now

Assignment 1: Cloud Computing Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization. Select two (2) ...

Response 1annotations have been identified as an important

Response 1 Annotations have been identified as an important aid in analysis record-keeping and recently data discovery. In this paper we discuss the use of annotations on visualization dashboards, with a special focus on ...

Assignment application perform data gathering and

Assignment Application: Perform Data Gathering and Footprinting on a Targeted Website You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Using proper apa formatting write an initial 400-600 word

Using proper APA formatting write an initial 400-600 word discussion paper relating to the following: 1. What are protective barriers and what should they entail? 2. What mitigation procedures can be used to ensure the r ...

Question sources that can help you with hardware

Question : Sources that can help you with hardware troubleshooting include the user manual, the Internet, online technical support, technical forums, diagnostic software and your network of technical associates. In which ...

Assignmentpart 1 research and detail an example of how you

Assignment Part 1: Research and detail an example of how you would for steganography to hide a message. Would you use a picture, video, audio message? Explore and select one method and detail in 1 page with figure, pictu ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As