Discussion

 

Investigate the costs of dumb terminals, network computers, minimally equipped personal computers, and top-of-the-line personal computers. 

Many equipment manufacturers and resellers are on the Web, so it is a good place to start looking.

Information Governance week -4 -2

 Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread. 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 

500 words

E-commerce Security Policy Audit Report

 Write a Audit report for E-commerce (Amazon ) Backup policy, 

Thinks should cover in backup policy like homogeneous operating system environment like Windows, Linus, or Mac OS.

How it is useful, and Importance of the backup policy with two operating systems like Windows and MacOS

Audit Report should in Passive voice, APA format, Number of pages(4-5) without reference 

BI_Discussion_1

Discussion (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Response should be 250-300 words and with references

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Operations Security

 No matter how well an organizations data is protected, eventually there will be a breach of security or a natural disaster. Well prepared organizations create an incident response team (IRT).  Chapter 12 focuses on the IRT team by discussing its various roles and responsibilities.  

  • What is the relationship between a BIA, a BCP, and a DRP? Explain
  • What are some best practices YOU recommend in regards to incident response policies?
  • When an incident occurs, there are a number of options that can be pursued.  Which specific action(s) would YOU recommend when assets of a low value are being attacked? (see page 344)

Information Systems for Business and Beyond Questions:

Information Systems for Business and Beyond Questions:

Chapter 7 -Homework – study questions 1-10, Exercise 1-3

    

Study Questions 

  1. What is the productivity paradox?
     
  2. Summarize Carr’s argument in “Does IT Matter.”
     
  3. How is the 2008 study by Brynjolfsson and McAfee different
    from previous studies? How is it the same?
     
  4. What does it mean for a business to have a competitive
    advantage?
     
  5. What are the primary activities and support activities of the
    value chain?
     
  6. What has been the overall impact of the Internet on industry
    profitability? Who has been the true winner?
     
  7. How does EDI work?
     
  8. Give an example of a semi-structured decision and explain what inputs would be necessary to provide assistance in making the decision.
     
  9. What does a collaborative information system do?
     
  10. How can IT play a role in competitive advantage, according to
     

 

Exercises 

  1. Analyze Carr’s position in regards to PC vs. Mac, Open Office vs. Microsoft Office, and Microsoft Powerpoint vs. Tableau.
     
  2. Do some independent research on Nicholas Carr (the author of “IT Doesn’t Matter”) and explain his current position on the ability of IT to provide competitive advantage.
     
  3. Review the WebEx website. What features of WebEx would contribute to good collaboration? Compare WebEx with other collaboration tools such as Skype or Google Hangouts?