1. Discussion Question: Business Process and Information Systems
A process can be defined as a series of tasks or activities that lead to an outcome.
For example, in a home, a process called "grocery shopping" has the outcome of ensuring food is available for the week. This process could include the following:
Defining a menu plan for the week, Assessing family-members preferences, Reviewing the family budget, Identifying current pantry and freezer contents, Creating a shopping list, Shopping, and Stocking the shelves with newly purchased items.
Business processes are the same, except they have business-related outcomes and tasks.
Identify one information system that supports a business process with which you are familiar.
Explain the data that is obtained, stored, and used in this system, and how the data supports the process.
Include whether the information system is department-specific or is an enterprise resources planning (ERP) system and outline the limitations and/or benefits this design creates.
2. Discussion Question: Cloud Computing
Consider the many cloud-based information systems we use in our daily lives. Some examples are as follows: E-mail accessed via web browser, Shopping via Amazon or other online retailers, Cloud-based software such as Salesforce or Google Apps and Netflix.
Answer the following questions:
• What are three advantages of cloud computing?
• What are three disadvantages of cloud computing?
• If you were running a small business with limited funds for information technology, would you consider using cloud computing? Include web-based resources that support your decision.
3. Discussion Question: Ethical and Legal Implications of Information Systems
Most of us have been exposed to messages during an online purchase such as; "people who purchased what you are purchasing also purchased 'X'." This means that the purchasing system you are using is profiling you against others with similar habits.
Every time we come into contact with digital technologies, information about us is being made available; from our location to our web-surfing habits, our criminal record to our credit report. We are constantly being monitored. This data is then often synthesized, summarized, and aggregated into profiles and sold.
Address the following questions:
• Do you think that companies have the right to sell our profiles and information they collect?
• Should there be any limitations? Why or Why not?
4.Discussion Question: Information System Security
How do you develop strong information systems security skills? You can start by thinking like a hacker. Some of the best information system security professionals started as hackers. Their experience exploiting vulnerabilities and ability to "think like a hacker" makes them great at their jobs.
You have been asked to perform a security audit on a professor's process of calculating, storing, and submitting final course grades. Figure out how, if at all possible, the integrity of the grading process could be breached. If you have trouble getting started, ask yourself, "Where would a hacker start?"
Answer the following questions:
• What type of information might one need to know in order to fraudulently change a grade?
• How would you go about finding out this information?
• What questions would you ask the professor to help uncover the information you need?
Attachment:- Discussion Question.rar