Course eTextbook Kroenke, D. (2015). Using MIS 2014 [VitalSource Bookshelf version] (7th ed.).
Discussion VII need asap late 200 words min
Outsourcing can appear too good to be true, and some of the benefits of outsourcing can be outweighed by its long-term costs. Conduct some research on the advantages and disadvantages of outsourcing. Using what you learned from your research, discuss an example of how the benefits of outsourcing are outweighed by its long-term costs.
Reply to below 200 words min
The benefits of outsourcing are outweighed by its long-term costs. An example of how benefits of outsourcing are outweighed by its long-term costs is the outsourcing of iPhone to South Asian countries. The main benefit was a lower cost of manufacturing but the long-term cost was that the technology of iPhone was exposed to foreign manufacturers.
These companies made similar products that were comparable to the iPhone. A large part of the market for smartphones was appropriated by foreign companies. Further, when a product manufacturing is outsourced, hidden costs creep in. In the case of iPhone, the result is.
Unit VII Assessment late need asap
Question 1 : In an IS department, the ____________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
operations
technology
development
manufacturing
Question 2 : Every IS user has a right to a secure computing environment. This means that:
The organization should protect his/her computer and its files
The user should solely be in charge of protecting the organization's computers and files
The user should inform the IS about software upgrades
The user will never face a network problem
Question 3 : The responsibilities of a ____________ include advising the chief information officer, executive group, and project managers on emerging technologies.
technical writer
chief financial officer
system analyst
chief technology officer
Question 4 : A ____________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
system analyst
business analyst
user support representative
systems auditor
Question 5 : The purpose of the ____________ group is to protect data and information assets by establishing data standards and data management practices and policies.
data administration
data warehousing
data mining
data communication
Question 6 : Describe the major functions of the IS department.
Your response should be at least 200 words in length.
Question 7 : Describe any four rights of users of information systems.
Your response should be at least 200 words in length.
Unit VIII Discussion Board
Reply with min 200 words
Identify an assignment in this course that had a positive impact on you. How will you be able to apply the skills you learned from it to gain life and/or career success?
Respond to below min 200 words
An assignment in this course that had a positive impact on me would be the last assessments regarding safety policies and security incidents. Being in human resources and being responsible for creating and implementing policies, having a better understanding on how to protect the information system as well as give direction to users is very useful.
Also, having knowledge of how information systems work and would could affect them, I can create policies and procedures to help the organization. In addition, having a better understanding of how implementing a new system works, I can assist with the staffing to help make it successful.
Unit VIII Assessment
Question 1 : A ____________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
target
vulnerability
threat
key escrow
Question 2 : ____________ is the term used to denote viruses, worms, and Trojan horses.
Malware
Cookie
Firewall
Spam
Question 3 : Which of the following is an example of a sniffing technique?
IP spoofing
Caches
Denial of service
Adware
Question 4 : A(n) ____________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
intrusion detection system
keylogger
botnet
access control system
Question 5 : When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ____________ .
unauthorized data disclosure
incorrect data modification
faulty services
loss of infrastructure
Question 6 : Define threat, vulnerability, safeguard, and target. Support your answer with examples.
Your response should be at least 200 words in length.
Question 7 : Explain what is meant by security policy and describe the basic information that a security policy must stipulate.
Your response should be at least 200 words in length.
Unit VIII Research Paper
Utilizing the unit lessons, textbook, Online Library, and other outside sources, write a two-page (not including title and reference pages) Research Paper identifying the key components of information systems management discussed throughout this course.
Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute.
Then, select three out of the six questions below, and provide detailed answers, supporting those answers by referencing any sources used. Be sure to use examples from your research to strengthen your argument as needed.
• What personal knowledge management tools does this organization utilize?
• What steps has this organization taken in securing their information and knowledge?
• What has this organization done to gain and sustain an advantage over their competitors?
• Describe in detail how this organization manages the components of its IT infrastructure.
• In what ways does the organization demonstrate successful collaboration?
• Identify at least two types of hardware and two types of software used by this organization.
APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.