Sebelum nak jawab kena tahu dulu 5 moral dimension iaitu : refer chapter 4 slide no 8

Similar documents
Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION GLOBAL EDITION

n Business Paper Proposal Due 1/29 n Database Assignment 1 Due 2/3 n Reading for Thursday n Messerschmitt Ch 4

Chapter by Prentice Hall

Electronic Business. Electronic Business: Digital Markets and Digital Goods

Achieving Competitive Advantage with Information Systems

Chapter 2 E-Commerce Business Models

Fundamentals of Information Systems, Seventh Edition

e-comma E-commerce developer BM 01: Project planning e-comma e-commerce Developer BM 01: Project Planning

Demand for Digital Billboards and Displays. Energizes Industry Recovery. Jose Simoes. Post University. Competitive Intelligence

Introduction to Information Systems. Mass Customization Revisited. What is Data? Building Impenetrable Customer Loyalty

Syllabus. CSC 142 Fundamentals of Information Systems

Chapter 3 I f n o f rmat ma ion S n y S s y t s e t ms, ms Org Or a g niz n a iz t a ions n, s a nd n d St S ra r t a e t gy VIDEO CASES

E-commerce Mock-exam Questions

Form no. (11A) Knowledge and skills matrix for a course

namib I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY

affordability budgeting Method in which companies budget for marketing based on what they believe

Managing in the Global Environment. Chapter Four

Copyright 2016 Pearson Education, Inc. 41

Contents. Chapter 1 Strategic Marketing Management An Introduction Chapter 2 Marketing Strategy and Planning 26-52

I Management Information Systems

Chapter. Achieving Competitive Advantage with Information Systems

CHAPTER 6. Electronic Commerce: Applications and Issues

Lesson 1 Foundations of Electronic Commerce

Fundamentals of Information Systems, Seventh Edition

Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts

Community Development and Training Centre Semester IT 245 Management Information Systems Chapter 1 Foundation Concepts

CHAPTER 10 E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS AND BUSINESS MODELS. By: S. Sabraz Nawaz Senior Lecturer in Management & IT

Fundamentals of Information Systems, Seventh Edition

Chapter 1 THE INFORMATION AGE IN WHICH YOU LIVE Changing the Face of Business

CIPS. Marketing for Purchasers

Meaning and Definition

1-1 McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Information Systems & Management

MIS 300 Exam 1 Spring 2011

LESSON 4: PUBLIC RELATIONS

2) Appendices A, B, and C of MIS6 book available online with your access code

Information Systems, Organizations, and Strategy

THE DIGITAL FIRM: ELECTRONIC COMMERCE AND ELECTRONIC BUSINESS

Ethics, Global Marketing & The Internet

Klasifikasi B2B Marketplace

Porter s Competitive Forces Model One way to understand competitive advantage Five competitive forces shape fate of firm 1. Traditional competitors

Chapter 1. The Context of Systems Analysis and Design Methods. McGraw-Hill/Irwin

A Case Study-Based Report on Digital Marketing of Tesco

Social Media Guidelines: King County 1

Learning Outcomes. U55080: Marketing Issues Week 3 New Developments in Internet Marketing. Direct Marketing. Direct Marketing.

Introduction to Information Systems

Emerging Information Technology Issues in Leasing

Programme : Diploma in Computer Engineering / Information Technology Programme Code : 06/07 Name of Course : E-Commerce Course Code : AU486

Strategic Use of Information Resources. Managing and Using Information Systems: A Strategic Approach

Test Bank Essentials of MIS 11th Edition Kenneth Laudon and Jane Laudon

Package Title: Test Bank Course Title: Introduction to IS 6e Chapter Number: 2 Answers in blue highlight. Question Type: Multiple Choice

Understanding Ethical and Social Issues Related to Systems

The fundamentals of display advertising. Place ads on websites that are relevant to what you re selling

Why Information Systems? The Information Systems Revolution. Emergence of Global Economy. Emergence of Global Economy

IST 140 The Internet and Computer Technology 3 Course Number Course Title Credits

Topics covered 9/16/2015

Chapter 01 Page 1 of 5

08/01/2019. ACS 3907 E-Commerce. Administration. Course Overview. Instructor: Kerry Augustine January 10 th 2019

MIS4450-HW01. Student:

Chapter 3 INFORMATION SYSTEMS, ORGANIZATIONS, AND STRATEGY. Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION

Social Legal Economic Political. SLEPT Factors

e-commerce WEEK7 Learning Objectives

Marketing MARKET LEADER. Business English. Nina O Driscoll

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS

AQU - Information Systems Fundamentals Spring 2012

Measuring e-government

How Can LuitBiz Help Your Company in ISO 9001:2008 Quality Certifications? Do What You Say. Improve It Say Whay You Do.

EFFECTS OF INTERNET ON BUSINESS - Asst. Prof. Rashmi Thakur Bharat College of Commerce, Badlapur, MMR, India Abstract:

Chapter 8. Innovative EC Systems: From E-Government and E-Learning to C2C

Alexander Nikov. 11. ecommerce and ebusiness. Outline. 1. E Commerce and the Internet. The Growth of E-Commerce. E commerce today

How Mobile Friendly Stores Are Changing the Landscape of Selling Promotional Products

Participants Guide Sustaining Competitive Advantage

E- Publishing: Successful e-commerce efforts to e- publishing online newspapers and independent and independent publication through the internet.

An Executive s Guide to B2B Video Marketing. 8 ways to make video work for your business

CHAPTER 6. E-Business and E-Commerce

Laudon & Laudon MIS, 7th Edition. Pg. 1.1

Bachelor in Business Administration

Chapter 7. Management issues. E-procurement. How important is procurement? The 5 rights of e-procurement

Databases and the edge for FreshDirect

Ecommerce and E-business paper solution (May 18)

INTRODUCTION TO SERVICE STRATEGY

Digital Marketing For Business in Nigeria

Unit code: Y/601/1259 QCF level: 5 Credit value: 15 credits

ST VINCENT DE PAUL SOCIETY (England & Wales) Job Description. 24,000-26,000 + Pension (dependent on experience)

Setting the Vision p. 1 Market Predictions p. 1 Defining Vision p. 3 Traditional Business Vision vs. E-Vision p. 5 Rethink Your Revenue p.

Ebusiness: A Canadian Perspective for a Networked World, 4e Chapter 2 Internet Business Models and Strategies

Past Present & Future. Mkt 330, Chapter 1 By Emd

1) Executive summary. 2) Analysis of the situation and PEST. Example. Questions. Demand trends, social factors, psychographics

PayPal Industry Analysis. [Name of the Writer] [Course Title &Code] [Name of the Instructor] [Name if the Institution.

THE CITY OF GREATER GEELONG WORKING BETTER TOGETHER

Management Information Systems: Business Driven MIS

TRACEABILITY: SOLVING CHALLENGES & ADDING VALUE IN ELECTRONICS MANUFACTURING

Information Strategy Tutorial -1-Answer Guide

2-1 McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter- 9 STRATEGIC MARKETING PLANNING FOR THE TOURISM INDUSTRY OF JAMMU AND KASHMIR

Chapter 8 Media Buying Process

INTERNAL ASSESSMENT TEST 1 Answer Keys

Unit 2 Information Systems Unit Level : Level 3. Purpose of the Unit: Guided Learning Hours 60 Unit Credit Value 10

1. Having a basic understanding of information systems is good, but not nearly as important as understanding other functional business areas.

McGraw-Hill /Irwin. n Education

Transcription:

DIS 2013 FINAL EXAM Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. In one sentence, the three may be distinguished thus: I will assume the blame or benefit for the actions I take (responsibility); this blame or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in harm to another, I will be held by law to reparations for those actions (liability).

Sebelum nak jawab kena tahu dulu 5 moral dimension iaitu : refer chapter 4 slide no 8 Information rights and obligations What rights do individuals andorganizations have with respect to information pertaining to them? Property rights. How can intellectual property rights be protected when it isso easy to copy digital materials? Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? System quality. What standards of data and system quality should wedemand to protect individual rights and the safety of society? Quality of life. What values should be preserved? What institutions must we protect? What cultural values can be harmed? Jawapan : Quality of life issues will be most difficult for society to deal with in societies that are comprised of many different cultural and ethnic groups, such as the United States. It is difficult to regulate concerns that are based on subjective values

Chapter 6 slide 28-29 Data mining finds information such as: Associations: Occurrences linked to single event Sequences: Events linked over time Classification: Recognizes patterns that describe group to which item belongs Clustering: Similar to classification when no groups have been defined; finds groupings within data Forecasting: Uses series of existing values to forecast what other values will be I would advise a company to use data mining when they are looking for new products and services, or when they are looking for new marketing techniques or new markets. Data mining might also be helpful when trying to analyze unanticipated problems with sales whose causes are difficult to identify. The security of a firm's information system and data by exposing it to threats such as people because employees may have access to data not shared on the internet. The organizations goals could also be a factor because hackers could target them for that reason alone. Technology may also be a factor, whether or not the organization uses the most recent tech or old outdated tech that hackers can easily access. A Firms security policy can contribute to the 6 main business objective by supporting them.

1. Establish what data and processes are important and essential to the company. 2. Determine what external and internal information is essential to the different employee roles in the company. 3. Conduct an MIS audit, a security audit, and create a risk assessment analysis. 4. Establish what legal/governmental/industry standards need to be adhered to and which international standards are relevant. 5. Conduct a business impact analysis and determine a disaster recovery and business continuity plan. 6. Create a security policy that defines an acceptable use policy, authorization policies and processes. 7. Plan for any change management needed. 8. Determine how the success of your policy will be measured and set up means for measuring this. 9. Implement such policies 10. Measure and evaluate the effectiveness of the policy and make any additional adjustments.

SOALAN 4 : TOPIK TIADA DIDALAM SILIBUS E-commerce and the Internet has profoundly changed the relationship between companies and customers by allowing the ability to extend the traditional boundaries of a marketplace to a market space and make it available just about everywhere. Internet provides marketers with new ways of identifying and communicating with customers Long tail marketing: Ability to reach a large audience inexpensively Behavioral targeting: Tracking online behavior of individuals on thousands of Web sites Advertising formats include search engine marketing, display ads, rich media, and e-mail For market research: He could advertise on search engines. He could pay for marketing research at relevant portals. He could also collect customer information from the company s Web site. He could monitor relevant blogs to see what issues are of concern in juvenile justice, so as to address these concerns in your advertising campaigns.

To advertise: He could advertise on search engine results and at relevant portals or legal information content providers, using banner ad or popup ads. If it were feasible, he could create a juvenile justice portal and blog for the company in order to attract users whom you could gather market research as well as promote the services. Knowledge workers help maintain competitive advantage by creating new products and find ways to improve existing ones. Without them, the firm would stagnate and become less competitive in an environment that is always changing and is increasingly more competitive. Knowledge workers have three main functions: o Keeping the organizations knowledge on par with world developments, o firm consulting on knowledge opportunities o acting as change agents as they evaluate, start, and promote new projects. The most critical function should be keeping an organization's knowledge and products up to date. Without it, competitors will become more appealing to current clients and competitive advantage will be lost.

JUN 2013 FINAL Information technology (IT) consists of all the hardware and software that a firm needs to use to achieve its business objectives. Information systems are more complex. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization. The difference between computer literacy and information literacy is as follows: Information literacy is the ability to access, organize, evaluate and use information from various sources. Computer literacy is having the knowledge to use technology in order to manipulate computer software or hardware. Technology change rapidly every day, and become cheaper today. The Cost Of Storing Data Declines Exponentially Declining Communication Costs And The Internet Falling Cost Of Computer Hardware such as processor, memory

People are referring knowledge worker, more experience the worker, the salary become higher. Knowledge workers create new products or find ways to improve existing ones. Without them, the firm would stagnate and become less competitive in an environment that is always changing and is increasingly more competitive Porter sees the Internet as creating ever more intense rivalry, through allowing new competitors to enter the market, and forcing competition on price alone, raising the bargaining power of customers, and dampening profits. Positive influences of the Internet would be lowering telecommunications costs, creating new opportunities for building brands and loyal customer bases, lowering costs of globalization. You could also view Porter s negative take on lowering the barrier to entry as a positive for new companies. The Internet s influence being negative or positive depends in part on the point of view from which the influence is being seen. For example, a telephone utility is impacted negatively by the emergence of Internet telephony, whereas other industries may be impacted positively either through the use of this technology or through engaging in Internet telephony as a business.

In network economics, the cost of adding a participant in the network is negligible, while the gain in value is relatively much larger. The Internet itself is an example of a successful implementation of network economics the more people participate, the more valuable and essential a commodity it is. If a company were to provide a service through the Internet such as a project management application, the costs to the company of adding another user are small (as the software infrastructure or application is already built), and the more users are signed up the more profit is made. Jawab 3 point + explanation Information Systems can improve quality by reducing cycle time and simplify the production process. You can also benchmark your business to a set of standards and measure the performance against those standards. You can use customer feedback or demands to improve products and services. Improve Design Quality and precision especially for products. And you can improve production precision and tighten production tolerances using software.

In terms of B2B e-commerce, Pakulski s might be able to procure goods over the Internet, use a private industrial network to coordinate their supply chain with suppliers and manage inventory. Depending on the structure of the fast food business, industry net marketplaces and exchanges might be of use. In terms of B2C e-commerce, there are not many opportunities, as it is inefficient to sell food over the Internet. However, a mobile payment system, similar to Mobil s SpeedPass payment system, is a way of offering more convenient services to customers. Additionally, Pakulski s could make sure that it s stations are listed in popular locationbased mobile services that help drivers find nearby fast food restaurant Jawab 4 + explanation Ubiquity - Internet/Web technology available everywhere: work, home, etc., anytime Global reach- The technology reaches across national boundaries, around Earth Universal standards - One set of technology standards: Internet standards Richness - Supports video, audio, and text messages Interactivity - The technology works through interaction with the user Information density - Large increases in information density the total amount and quality of information available to all market participants Personalization/Customization - Technology permits modification of messages, goods Social technology - The technology promotes user content generation and social networking

Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. In one sentence, the three may be distinguished thus: I will assume the blame or benefit for the actions I take (responsibility); this blame or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in harm to another, I will be held by law to reparations for those actions (liability). Jawap 4 point + explanation Computer errors can cause serious harm to individuals and organizations. Poor data quality is also responsible for disruptions and losses for businesses Jobs can be lost when computers replace workers or tasks become unnecessary in reengineered business processes. The ability to own and use a computer may be exacerbating socioeconomic disparities among different racial, ethnic, and economic groups and social classes.

Widespread use of computers increases opportunities for computer crime and computer abuse. Computers can also create health problems, such as repetitive strain injury (RSI), computer vision syndrome, and technostress. The security of a firm's information system and data by exposing it to threats such as people because employees may have access to data not shared on the internet. The organizations goals could also be a factor because hackers could target them for that reason alone. Technology may also be a factor, whether or not the organization uses the most recent tech or old outdated tech that hackers can easily access. A Firms security policy can contribute to the 6 main business objective by supporting them. VIRUS WORM Rogue software program that attaches itself to other software programs or data files in order to be executed Independent computer programs that copy themselves from one computer to other computers over a network.

SPOOFING Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else SNIFFING Eavesdropping program that monitors information traveling over network Redirecting Web link to address different from intended one, with site masquerading as intended destination Enables hackers to steal proprietary information such as e-mail, company files, etc.