Business Finance Homework Help

Harvard University Management Information Systems Ch 10 11 & 12 Review Questions

 

I have 3 chapter assignments for management information systems class. You will need the book for them, I have attached the book. Make one document for each chapter. If using any other source other than the book, please cite it.

  • REMINDERS: Answers must be in paragraph format. Proofread, a professional business document is expected. Points will be deducted for poor formatting, grammar, etc.

CHAPTER 10

Review Chapter 10, then read the following questions relating to the chapter. Select and respond to two questions of your choice below.

  1. Define threat, vulnerability, safeguard and target. Give an example (do not use examples in the book) of each. Explain the types of the threats and security losses. How do laws like GLBA, HIPPA and PCI DSS protect consumers?
  2. What is the goal of IS security? Explain why it is difficult to know the true cost, magnitude and impact of computer crime. List and explain the three procedures that all companies should have in place for each type of information system. Select a company, review their security policy and summarize three things in the policy that stood out to you the most and why.
  3. Senior management should be aware of security threats. Describe two security functions senior management should address. What steps should an organization take when balancing risk and cost? How can human safeguards protect against security threats? Define and explain firewall. Why is malware a serious problem?
  4. Search the Web for the term computer crime and any other related terms. Identify what you think are the FIVE most serious recent (no later than 6 months ago) examples. Create a chart (using Word or Excel) with your findings. Findings should include date(s) of the crime, summary, safeguards that were not in place or ineffective in preventing the crimes.

CHAPTER 11

Review Chapter 11, then read the following questions relating to the chapter. Select and respond to two questions of your choice below.

  1. List the five primary functions of the IS department. Name the four groups found in a typical reporting relationship. Name the four groups found in a typical IS department and explain the major responsibilities.
  2. Explain the importance of strategic alignment as it pertains to IS planning. Explain why maintaining alignment can be difficult. Define CIO, CTO, CSO and CISO.
  3. Define outsourcing. Explain how Drucker’s statement “Your backroom is someone else’s front room” pertains to outsourcing. Create a table (if created in Excel, please copy into Word doc) to summarize the management advantages, cost advantages and risks of outsourcing. Explain why international outsourcing can be advantageous.
  4. Read the security guide on pages 438-439. Respond to discussion question 2 on page 439.

CHAPTER 12

Review Chapter 12, then read the following questions relating to the chapter. Select and respond to two questions of your choice below.

  1. Explain the differences among business processes, information systems and applications. Refer back to Chapter 5 and describe the relationship of business processes and IS.
  2. Why is process documentation important? Describe the swim-lane layout. Name three uses for BPMN diagrams.
  3. Use Google to search for what is a business analyst. Investigate several links, then respond to these questions. What are the primary job responsibilities of a business analyst? What knowledge do business analysts need? What skills/personal traits do business analysts need?
  4. Use Google to search for what is a systems analyst. Investigate several links, then respond to these questions. What are the primary job responsibilities of a systems analyst? What knowledge do systems analysts need? What skills/personal traits do systems analysts need?

THIS IS THE BOOK https://drive.google.com/file/d/1c5EJt-UUkaHNvkTcu…