...CHAPTER 1 THE INFORMATION AGE IN WHICH YOU LIVE: CHANGING THE FACE OF BUSINESS JUMP TO THE SUPPORT YOU WANT • Lecture Outline • Modules, Projects, and Data Files • Slide Reviews • Closing Cases • Short-Answer Questions • Assignments and Exercises • Discussion Questions • Industry & Global Perspectives • Additional Assignments and Exercises CONTACT INFORMATION: Stephen Haag (shaag@du.edu) STUDENT LEARNING OUTCOMES 1. Define management information systems (MIS) and describe the three important organizational resources within it – people, information, and information technology. 2. Describe how to use break-even analysis to assess the financial impact of information technology. 3. Describe how to use Porter’s Five Forces Model to evaluate the relative attractiveness of and competitive pressures in an industry. 4. Compare and contrast Porter’s three generic strategies and the run-grow-transform framework as approaches to the development of business strategy. CHAPTER SUMMARY This chapter serves two primary purposes. First the chapter introduces your students to the broad notion of management information systems within an organization and the three key resources on which MIS focuses – people, information, and information technology. Second, the chapter jumps right into the process of appropriately selecting which technologies to use based on the industry in which your organization operates, the identified...
Words: 3890 - Pages: 16
...Your neighbor is starting a small billing business and has asked you to design the network. Currently, you neighbor has nothing, but needs the following: - 2 workstations, 2 laptops, and 1 server supporting 3 users Go to Dell.com website, Small Business section. Then select 2 workstation (PCs), 2 laptops, and one server. Pick all standard configurations; copy all information details including cost of each. Add the cost together and see if it less than $5,000 or not. If it was more than $5000, then change hardware components or pick lower end computers to lower the cost. You need to get total cost for these items no more than $3,000. - Wireless networking Do the same thing above but choose a wireless switch or routes that have at least 8 ports for expanding at later time. Include cost$$ PowerConnect 2808 Switch. >> Organizations seeking an 8-port switch that offers incredible value, flexible management capabilities and energy-efficient power savings. >> Dell Price $119.00 - 1 quality networked printer Dell V525w All-in-One Wireless Inkjet Printer: Versatile and efficient, this all-in-one printer provides enhanced high speed performance at a great value. Print, scan, fax, and copy with this efficient printer for your office - File and folder sharing Do this through Windows Server 2008 Standard Edition. Setup account, access and permission; create shared folder, etc./437 - Internet access Use Verizon for internet service. Get monthly fee estimate online...
Words: 2715 - Pages: 11
...You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer forensics technology that can be used by the University. Identify the types and determine the costs of technology...
Words: 432 - Pages: 2
...conduct the research a question must be framed that needs answering, and a methodology for the research chosen. There are two methodologies that are used in social science research, quantitative and qualitative methodologies. The quantitative methodology is influenced by the positivist tradition, which seeks a single truth that can be discovered by scientific investigation (Gilbert, 2005). The second methodology is qualitative, which is influenced by the interpretivist position. This position holds that truth is not so easy to find and reality is subjective and cannot be found through scientific methods (Benton & Craib,2001). This essay will look at both methodologies and try to discover if the research method is influenced by the type of information one wishes to collect, or if a methodology has no bearing on social reality. It will also examine a research question chosen by the author and their preferred research methodology. Quantitive Research Quantitative research follow the positivist tradition of research, there is an ‘objective, external world that exists independently of human perception, which is amenable to quantitative measurement’ (Gilbert, 2005,p32). For the positivist their is a single truth that can be discovered by scientific investigation. To this end positivism uses the quantitative method to collect numerical data,...
Words: 2007 - Pages: 9
...7920IBA: Systems Thinking and Sustainability Article Review Question: "With reference to the article by Ray Anderson, the current information on the Interface website, what you have learnt on the course and have gained from your extended reading please answer the following question: 'Is the Interface model a prototype company for the 21st Century? If so why, if not why not? Prototype companies are vital so industry can move forward with world sustainability in the 21st Century. Interface is the role model of a prototypical company of the 21st Century as they promote and employ elements of Zero Discharge, reduced benign emissions, open communication, efficient transportation and logistics, and renewable energy concepts. Zero Discharge creates an environment in industry where waste and emissions are re-invented through systems of recovery and are reused by either the same plant or other manufactures as a raw material. Reduced benign emissions is process that benefits the community through reduced pollution and also increases profits for a company by waste reduction. Open communication shows a business’s transparency and investment in its stakeholders, by business being open to their operations the stakeholders feel a sense in confidence of a business’ operations. Resource efficient transportation and logistics which looks at aspects of improving air quality, using hybrid vehicles and the careful planning of positioning factories close to their customers, results in...
Words: 2182 - Pages: 9
...Do you agree or disagree with the following statement? With the help of technology, student nowadays can learn more information and learn it more quickly. Use specific reasons and examples to support your answer. Technology has greatly improved the way we get information. Students can now get more information, get it more quickly, and get it more conveniently. The Internet and the World Wide Web has opened every major library and database to students around the world. Information comes not only in print form, but also in multimedia. You can get audio and video data. You can get information about event in the past as well as events that unfold as you watch your computer monitor. Information comes at the speed of the Internet, which is to say in nanoseconds. You can type in a few key words in your search engine, and the engine will search the entire www to find information on your topic. You don’t have to spend hours pouring over card catalogs in the library and looking at the shelves. This research is done for you instantly on the Web. It is certainly more convenient to sit at home and do research on your computer. Your computer is open 24 hours a day, unlike a library or office, which has limited hours and limited resources. You can do research in your pajamas while you eat breakfast. What could be more convenient? Technology, especially the Internet, has certainly changed the quantity and quality of the information we get. The speed and convenience of a computer helps...
Words: 266 - Pages: 2
...Re: Ethics in Business Communication There are so many companies out there that taking advantage of their employers because the employers do not know where to go, to get the help they need when they feel that they are being violated. Especially when it comes to being a waitress or waiter, I know that they have all these posters up on the wall, but who has time to read them. Most waiters or waitresses are doing this to get through school, and because of that they usually accept the treatment that they get. I agree with my fellow peers that this company Philadelphia sports bar and grill acted inappropriately with it employees, they violated their legal rights and probably made them feel discoursed because they started coming up with the “tip pool” not only that but they were being paid less, now their tips were being taken away from them. It is such a shame to see such a popular and established restaurant chose to act in the matter in which they treated their employers with such disregard and disgrace. Especially, because this restaurant was as popular as I read in so many articles, they stated that their food was good and the service was very good. I could not see myself working for such establishment, yet alone provide the service that made customers come back to the restaurant. I guess when industries or companies start making money they become selfish and do not consider their employees as part of their business. They become so selfish that all they see is money coming...
Words: 378 - Pages: 2
...U03a1 Worksheet Name: 1. When an employee wants to resign or transfer, you can try to persuade them to change their mind but you can’t refuse to accept their resignation or transfer. He should act carefully though if the employee has handed in their notice in controversial circumstances, eg after an argument. Henry the first thing you need to do is find out why. If the transfer is unexpected, find out why they want to transfer. Is there anything you can do to make them change their mind? Sometimes employees may request this because they fall out with someone, eg their manager. 2. Henry needs to know communication competency is the ability for someone who is communicating with another to reach their goals through interactive and appropriate interaction. Primarily it is a skill level that HR and those responsible for managing others must attain and possess. Having communication In order to achieve competency in communication, the communicator must meet six criteria: flexibility, involvement, management, empathy, effectiveness and appropriateness. Flexibility requires the communicator to be able to adapt to situations, so that it changes the behaviors of others in order to meet goals. Adaptability or flexibility may require the person who is communicating with others to be sensitive to both the goals itself and the people responsible for achieving the goals. For example, a supervisor may motivate workers by acknowledging the long hours the...
Words: 719 - Pages: 3
...mid-90’s the word information super highway was the buzz word. I was very young and clueless when I started hearing about the information super highway. I understood the terms highway and super, however I didn’t get the totality of what an information superhighway encompassed. The business dictionary defines information superhighway as "Internet-type global network of computers that, potentially, will connect most of world's individuals, firms, and organizations. It is envisioned to provide very high speed access to information in all forms (text, graphics, audio, video) via a telephone or wireless connection. The term was first used in 1985 by the 45th US Vice President (1993-2001) Al Gore (born 1948) in an American context where every citizen is aimed to be so connected". As a kid, I hardly knew what a personal computer was, but I was kind of familiar with a word processor. I became a little familiar with the Apple computer because of a work study program that I was involved in. Based on the information I had at that time, I thought a computer was something that you stored information solely for an individual’s use. While I was familiar with using my computer at work to interface with other departments within the organization, I had no idea that the electronic information system would one day be an absolute necessity in my everyday life, both at work and in my personal life. I didn’t know that I would rely so heavily upon information technology to further...
Words: 791 - Pages: 4
...Logistics Information System (LO-LIS) Release 4.6C HELP.LOLIS Logistics Information System (LO-LIS) SAP AG Copyright © Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft , WINDOWS , NT , EXCEL , Word , PowerPoint and SQL Server are registered trademarks of Microsoft Corporation. IBM , DB2 , OS/2 , DB2/6000 , Parallel Sysplex , MVS/ESA , RS/6000 , AIX , S/390 , ® ® ® AS/400 , OS/390 , and OS/400 are registered trademarks of IBM Corporation. ORACLE is a registered trademark of ORACLE Corporation. INFORMIX -OnLine for SAP and Informix Dynamic Server Informix Software Incorporated. ® ® ® ® ® ® TM ® ® ® ® ® ® ® ® ® ® ® ® ® ® ® ® ® are registered trademarks of UNIX , X/Open , OSF/1 , and Motif are registered trademarks of the Open Group. HTML, DHTML, XML, XHTML are trademarks or registered trademarks of W3C , World Wide Web Consortium, Massachusetts Institute of Technology. JAVA is a registered trademark of Sun Microsystems, Inc. JAVASCRIPT is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, SAP Logo, R/2, RIVA, R/3, ABAP, SAP ArchiveLink, SAP Business...
Words: 51862 - Pages: 208
...and processing information and updating existing information to reflect the processed information * —Supports operational processing * —Sales orders, accounts receivable, etc * —Supported by operational databases & DBMSs * •Online analytical processing (OLAP) manipulation of information to support decision making * —Helps build business intelligence * —Supported by data warehouses and data-mining tools RELATIONAL DATABASE MODEL: Database – collection of information that you organize and access according to the logical structure of the information Relational database – series of logically related two-dimensional tables or files for storing information * —Relation = table = file * —Most popular database model DATABASE- CREATED WITH LOGICAL STRUCTURES Data dictionary – contains the logical structure for the information in a database Primary key – field (or group of fields) that uniquely describes each record Foreign key – primary key of one file that appears in another file Integrity constraints – rules that help ensure the quality of information Data dictionary, for example, defines type of information – numeric, date, and so on Foreign keys – must be found as primary keys in another file * —E.G., a Customer Number in the Order Table must also be present in the Customer Table Database management system (DBMS) helps you specify the logical requirements for a database and access and use the information in a database ...
Words: 1431 - Pages: 6
...Corps We will be discussing the information flow of the United States Marine Corps. We will go over everything from marking to safeguarding to control measures to security check to other security measures. The first thing that we will discuss is the marking of information. To do this first we must understand the classification types of information that is within the military branch of services. Those classifications are as follows: unclassified, official, restricted, confidential, secret and top secret. Every country has the same levels of confidentiality levels for their specific types of information. And those specific types are usually restricted, confidential, secret and top secret. Depending on your rank and your specific job within the military you will need to get a security clearance to be able to even view certain levels of information that flows through the military. A clearance is the military’s way of checking your background and your history very thoroughly to ensure that you don’t have anything in your background that the enemy could use to get you to divulge and information that they deem necessary to destroy us. For example, let’s say that you have a top secret clearance and you work for the department of defense’s special weapons division and you are overseas and you decide to unwind and have a few drinks with fellow workers in the same division that you work in and all of you are at a bar. You do not realize that you are talking very loud and other people...
Words: 754 - Pages: 4
...Why We Collect Your Personal Information We collect personal data to administer the Railroad Retirement Act and Railroad Unemployment Insurance Act. We do not use the information for any other internal secondary purpose. You don't have to give us personal information to visit our website. If you do give us your personal information, we treat it very carefully. We collect personal information about You (e.g., name, e-mail address, Social Security number or other unique identifier) only if you specifically and knowingly give it to us. You should note, however, that when you send us an email, you automatically furnish us with your e-mail address even if you don't furnish any additional personal information. How We Will Use Your Personal Information We do not sell the information we collect at this site, or any information we collect. The personal information you give us at this site will be used only in connection with the administration of the Railroad Retirement Act and the Railroad Unemployment Insurance Act. If you use our web site to apply for benefits, the information that you give us on the application will be used in the same way as if you had furnished the information in person to our field office representatives or had completed an application and mailed it in to us. In both cases the uses of the information is subject to the provisions of the Privacy Act. The retention period will be the same. If, however, you send us an email, for example as to how we can improve...
Words: 448 - Pages: 2
...survey of information security professionals from around the world and are also based on the many different information security and assurance frameworks (ISO 27001/2, COBIT, ITL, etc.). The results of this survey were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content. The Security Policy and Standards subdomain focuses on creating organizational security activities and policies; assessing information security risk; and implementing and auditing information security management programs, information assurance certification programs, and security ethics. Watch the following video for an introduction to this course: Competencies This course provides guidance to help you demonstrate the following 3 competencies: Competency 427.3.2: Controls and Countermeasures The graduate evaluates security threats and identifies and applies security controls based on analyses and industry standards and best practices. Competency 427.3.3: Security Audits The graduate evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices. Competency 427.3.4: Certifications and Accreditations The graduate identifies and discusses the Information Assurance certification and accreditation (C&A) process. Course Mentor Assistance As you prepare to successfully demonstrate competency in this subject, remember that course mentors stand ready to help you reach...
Words: 4354 - Pages: 18
...HECS-HELP Commonwealth supported places information for 2016 IMPORTANT The Australian Government has proposed changes to the higher education system. It is important that current and future students understand how these changes may affect them. Visit www.studyassist.gov.au for up-to-date information on these proposed changes. www.studyassist.gov.au YOU MUST READ THIS BOOKLET BEFORE SIGNING THE COMMONWEALTH ASSISTANCE FORM BELOW. WHEN YOU SIGN YOUR FORM, YOU DECLARE THAT YOU HAVE READ THIS BOOKLET AND THAT YOU ARE AWARE OF YOUR OBLIGATIONS AS A COMMONWEALTH SUPPORTED STUDENT AND UNDER HECS-HELP. Request for Commonwealth support and HECS-HELP form If you do not submit a form or finalise your payment by the census date you risk cancellation of your enrolment as a Commonwealth supported student (your institution may have set an earlier administrative date for this deadline—check with your institution). USING THIS BOOKLET • As you read through, you will notice that certain terms are highlighted in pink. These terms are defined in the glossary. • If you have a specific question after reading this booklet, the contacts list at the end of this booklet will help you. • More information is available at www.studyassist.gov.au. IMPORTANT NOTE: The Department of Education and Training has endeavoured to ensure that the information in this publication is consistent with the Higher Education Support Act 2003 (the Act) and guidelines made...
Words: 7318 - Pages: 30