Module 1 discussion
Read the Ethics Guide ‘Yikes! Bikes’ scenario in the text.
Then, answer your choice of one of the discussion questions. Please note that
you can only address a question that has not yet been answered by a classmate.
If all questions have already been answered, then you are free to select any
question. Please clearly indicate which question you’re answering by labeling
it with the question number (e.g. “Question 1”).
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Module 2 discussion
Read the Security Guide ‘No, Thanks, I’ll Use a Spreadsheet’
scenario in the text. Then, answer your choice of one of the discussion
questions. Please note that you can only address a question that has not yet
been answered by a classmate. If all questions have already been answered, then
you are free to select any question. Please clearly indicate which question
you’re answering by labeling it with the question number (e.g. “Question
1”).
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Module 3 discussion
Read the Security Guide ‘You Said What? About Me? In Class?’
scenario in the text. Then, answer your choice of one of the discussion
questions. Please note that you can only address a question that has not yet
been answered by a classmate. If all questions have already been answered, then
you are free to select any question. Please clearly indicate which question
you’re answering by labeling it with the question number (e.g. “Question
1”).
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should pertain
to Question 1). Avoid late Sunday evening posts. You must cite all sources
(references and corresponding in-text citations). Make sure to adhere to all
other aspects that I’ve outlined in my guidelines announcement.
Module 4 discussion
Read the Ethics Guide ‘Social Marketing? Or Lying?’ scenario
in the text. Then, answer your choice of one of the discussion questions.
Please note that you can only address a question that has not yet been answered
by a classmate. If all questions have already been answered, then you are free
to select any question. Please clearly indicate which question you’re answering
by labeling it with the question number (e.g. “Question 1”).
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Module 5 discussion
Read the Ethics Guide ‘Securing Privacy’ scenario in the
text. Then, answer your choice of one of the discussion questions. Please note
that you can only address a question that has not yet been answered by a
classmate. If all questions have already been answered, then you are free to
select any question. Please clearly indicate which question you’re answering by
labeling it with the question number (e.g. “Question 1”).
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Module 6 discussion
Answer your choice of one of the discussion questions below.
Please note that you can only address a question that has not yet been answered
by a classmate. If all questions have already been answered, then you are free
to select any question. Please clearly indicate which question you’re answering
by labeling it with the question number (e.g. “Question 1”).
1. Describe and discuss descriptive, predictive, and
prescriptive analytics. Other than the examples given in the textbook, give an
example how a company (preferably, the company you work for) would use
descriptive, predictive, and prescriptive analytics.
2. Define discrete and continuous metrics, and give your own
original example of each (ie. not one taken from the textbook or any other
source).
3. Define the four types of measurement scales and give your
own original example of each (ie. not one taken from the textbook or any other
source).
4. Define the following types of input to a model: decision
variable, uncontrollable variable, and data. Give your own original example of
each (ie. not one taken from the textbook or any other source).
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Module 7 discussion
Answer your choice of one of the discussion questions below.
Please note that you can only address a question that has not yet been answered
by a classmate. If all questions have already been answered, then you are free
to select any question. Please clearly indicate which question you’re answering
by labeling it with the question number (e.g. “Question 1”).
1. What is an influence diagram and what is its purpose? How
can it be used in your own organization (or in one with which you have
familiarity)?
2. What are a model, model assumptions, and validity?
Provide your own original example for each.
3. Explain the Overbooking model and why it is used. Provide
your own original example for illustrative purposes.
4. What is What-if Analysis and why is it used? How can it
be used in your own organization (or in one with which you have familiarity)?
5. Define Monte Carlo simulation and indicate how it differs
from Hypercube simulation. Provide your own original example of each for
illustrative purposes.
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Module 8 discussion
Answer your choice of one of the discussion questions below.
Please note that you can only address a question that has not yet been answered
by a classmate. If all questions have already been answered, then you are free
to select any question. Please clearly indicate which question you’re answering
by labeling it with the question number (e.g. “Question 1”).
1. Define the data mining technique of cluster analysis, and
describe the various clustering methods. How might cluster analysis be used in
your own workplace (past or present)?
2. Define the data mining technique of classification, and
describe the various classification techniques. How might classification be
used in your own workplace (past or present)?
3. Define the data mining technique of association rule
mining. Provide an example to illustrate association rule mining that is taken
from your own workplace (past or present)?
4. What is the lift value in an association rule? Provide an
example to illustrate lift value that is taken from your own workplace (past or
present)?
5. What two numbers are used to express the degree of
uncertainty about a rule identified in association rule mining? Define each and
provide an example taken from your own workplace (past or present).
6. Define the data mining technique of cause-and-effect
modeling. Provide an example to illustrate cause-and-effect modeling that is
taken from your own workplace (past or present)?
7. Define lagging and leading measures in cause-and-effect
modeling. Provide an example to illustrate lagging and leading measures that is
taken from your own workplace (past or present)?
8. Explain logistic regression for classifying data, and
discuss how it is different from linear regression. Provide an example to
illustrate the difference that is taken from your own workplace (past or
present)?
Your initial post must be at least 200 words in length and
must reference the text. Each subsequent post must be at least 100 words in
length. All posts need to add significant value to the discussion. Each post
you make needs to pertain to a different question (e.g. if your primary
response was to Question 1, then none of your subsequent responses should
pertain to Question 1). Avoid late Sunday evening posts. You must cite all
sources (references and corresponding in-text citations). Make sure to adhere
to all other aspects that I’ve outlined in my guidelines announcement.
Assignment 1
Answer the questions to “Case Study 3: Fulfillment by
Amazon” in the textbook Business Information Systems and Analytics.
Submit Assignment 1 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 2
Answer the questions to “Case Study 4: Apple of Your i” in
the textbook Business Information Systems and Analytics.
Submit Assignment 2 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 3
Answer the questions to “Case Study 7: Using the Pride
Database” in the textbook Business Information Systems and Analytics.
Submit Assignment 3 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 4
Answer the questions to “Case Study 10: The Cost of PRIDE”
in the textbook Business Information Systems and Analytics.
Submit Assignment 4 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 5
Answer the questions to “Case Study 12: Will you Trust
FIDO?” in the textbook Business Information Systems and Analytics.
Submit Assignment 5 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 6
Complete the following problems from the textbook Business
Information Systems and Analytics (from the chapters taken from Business
Analytics: Methods, Models, and Decisions):
Chapter 2
8
9
10
12
Submit Assignment 6 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 7
Complete the following problems from the textbook Business
Information Systems and Analytics (from the chapters taken from Business
Analytics: Methods, Models, and Decisions):
Chapter 8
4
15
20 (For this problem, create an optimistic and pessimistic
scenario by varying expected crowd, average concession expenditures, and fixed
costs.)
Chapter 11
2
5
Submit Assignment 7 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
Assignment 8
Complete the following problems from the textbook Business
Information Systems and Analytics (from the chapters taken from Business
Analytics: Methods, Models, and Decisions):
Chapter 12
5 (Hint: To evaluate, use the CORREL function in Excel to
correlate the loan decision with the cluster ID)
8 (Use k=1)
15
Submit Assignment 8 to the Assignment box no later than
Sunday 11:59 PM EST/EDT.
EXAM 2
Question 1
Which of the following revenue models is most likely
followed by companies providing Web 2.0 services?
Question 1 options:
Traditional marketing
User participation
Pay-per-click
Venture capital
Question 2
________ is the dynamic social media process of employing
users to participate in product design or product redesign.
Question 2 options:
Outsourcing
Homesourcing
Crowdsourcing
Farmshoring
Question 3
If the content posted on a social networking site represents
reasonable criticism of the organization’s products or services, the best
response would most likely be to:
Question 3 options:
report it.
delete it.
leave it.
edit it.
Question 4
The primary risk of peer-to-peer support in the context of
social media and customer service is:
Question 4 options:
loss of control.
loss of credibility.
lack of privacy.
increase in expenses.
Question 5
According to Gossieaux and Moran, a(n) ________ is an
organization that uses social media to transform its interactions with
customers, employees, and partners into mutually satisfying relationships with
them and their communities.
Question 5 options:
nonprofit organization
SM application provider
Enterprise 2.0
hyper-social organization
Question 6
According to Gossieaux and Moran, which of the following
statements is true of defenders-of-belief communities?
Question 6 options:
They are very effective for activities that involve
innovation or problem solving.
They seek conformity and want to convince others of the
wisdom of their beliefs.
They are open to changing their beliefs when confronted with
contrary evidence.
They make ineffective sales and marketing professionals.
Question 7
Which of the following is true of Web 2.0?
Question 7 options:
Users usually cannot respond directly to Web ads.
One of the principal means that is used to attract viewers
is providing low-cost content.
Advertisers can find out who responds to ads but not how
strongly.
Most ads on social media generate revenue only when
customers click on them.
Question 8
Enterprise 2.0 workers want applications to enable them to
rate tagged content and to use the tags to predict content that will be of
interest to them, a process McAfee refers to as:
Question 8 options:
signals.
extensions.
authoring.
links.
Question 9
A ________ is an information system that supports the
sharing of content among networks of users.
Question 9 options:
database management system (DBMS)
transaction processing system (TPS)
human resource information system (HRIS)
social media information system (SMIS)
Question 10
________ measures the frequency that someone who clicks on
an ad makes a purchase, “Likes” a site, or takes some other action
desired by the advertiser.
Question 10 options:
Enterprise 2.0
Pay-per-click
Conversion rate
Folksonomy
Question 11
Which of the following is an SM application provider?
Question 11 options:
Oracle
McAfee
SAP
Question 12
Which of the following is one of the principal means that
companies implementing Web 2.0 are most likely to use to attract viewers?
Question 12 options:
Free content
Controlled releases
Fixed product value
Fixed interface
Question 13
A characteristic of Web 2.0 is that the value of a Web site
increases as the number of users:
Question 13 options:
increases over time.
remains constant over time.
decreases over time.
fluctuates over time.
Question 14
Most SM applications earn their revenue through:
Question 14 options:
advertisements.
merchandising.
a franchising model.
a licensing model.
Question 15
According to McAfee, pushing enterprise content to users
based on subscriptions and alerts is a characteristic of the ________ component
of Enterprise 2.0.
Question 15 options:
signals
links
search
authoring
________________________________________
Question 16
The SDLC process follows a linear sequence from requirements
to design to implementation. Therefore, the SDLC process is also known as the:
Question 16 options:
swim-lane method.
waterfall method.
scrum process.
agile development method.
Question 17
The traditional process for developing information systems
is:
Question 17 options:
the systems development life cycle.
the spiral approach.
the V-model.
rapid application development cycle.
Question 18
Which of the following are the steps in the business process
management (BPM) cycle?
Question 18 options:
Implement processes; create components; model processes;
assess results
Create components; model processes; implement processes;
assess results
Model processes; create components; implement processes;
assess results
Model processes; implement processes; assess results; create
components
Question 19
According to Brooks’ Law, adding more people to a late
project will:
Question 19 options:
reduce the need for coordination.
create diseconomies of scale.
guarantee efficiencies.
speed up the project.
Question 20
In the system implementation phase of the SDLC, with
________ installation, the new system runs alongside the old one until it has
been tested and is fully operational.
Question 20 options:
phased
pilot
plunge
parallel
Question 21
In a Business Process Modeling Notation (BPMN) diagram,
________ depict the flow or sequence of activities in a process.
Question 21 options:
circles
solid arrows
dotted arrows
diamonds
Question 22
The final phase of the systems development life cycle (SDLC)
is:
Question 22 options:
maintaining the system.
designing system components.
determining the requirements.
implementing the system.
Question 23
In a Business Process Modeling Notation (BPMN) diagram,
dotted arrows depict the flow of ________ in the process.
Question 23 options:
control
messages and data
tasks and activities
resources
Question 24
A ________ is a network of activities, repositories, roles,
resources, and flows that interact to accomplish a business function.
Question 24 options:
business stature
business process
business policy
business analysis
Question 25
In a business process, ________ are defined as collections
of related tasks that receive inputs and produce outputs.
Question 25 options:
presentations
resources
databases
activities
Question 26
In a Business Process Modeling Notation (BPMN) diagram, a
________ symbol represents an activity.
Question 26 options:
dotted arrow
rectangle
solid arrow
diamond
Question 27
Which of the following statements is true of the swim-lane
layout used for modeling the business processes?
Question 27 options:
It complicates the process diagrams.
Each role in the business process has to share the swim lane
with other roles.
All activities for a given role are repeated in all the swim
lanes.
It draws attention to the interactions among components of
the diagram.
Question 28
Project teams create a ________, which is a hierarchy of the
tasks required to complete a project.
Question 28 options:
control chart
scatter plot
critical path
work breakdown structure
Question 29
In the context of system implementation phase of the SDLC, a
________ installation is the riskiest, because the old system is shut down and
the new system is introduced.
Question 29 options:
plunge
phased
pilot
parallel
Question 30
In the system definition phase of the SDLC, the first major
task for an assembled project team is to:
Question 30 options:
define system goals and scope.
assess the project’s feasibility.
plan the project.
design system components.
Question 31
The process of hardening a Web site is a ________ safeguard.
Question 31 options:
technical
physical
political
financial
Question 32
Which of the following is likely to be accepted by a poorly
designed application, leading to improper disclosure of data?
Question 32 options:
Asymmetric encryption
Public key
SQL injection
Key escrow
Question 33
A ________ is a number used to encrypt data.
Question 33 options:
cookie
cache
honeypot
key
Question 34
A(n) ________ is a computer program that senses when another
computer is attempting to scan the disk or otherwise access a computer.
Question 34 options:
intrusion detection system
botnet
keylogger
access control system
Question 35
Which of the following statements is true of the Secure
Socket Layer (SSL)?
Question 35 options:
It is a stronger version of HTTPS.
It is used to send sensitive data such as credit card
numbers.
It uses asymmetric encryption exclusively.
It uses one set of encryption keys for multiple sessions.
Question 36
________ refers to an organization-wide function that is in
charge of developing data policies and enforcing data standards.
Question 36 options:
Data encryption
Authentication
Data administration
Usurpation
Question 37
In information security, which of the following is true of
managing risk?
Question 37 options:
Organizations should implement safeguards that balance the
trade-off between risk and cost.
Passwords are classified under the technical safeguards
category.
Physical security is classified under the human safeguards
category.
All organizations except financial institutions should
invest heavily in security safeguards.
Question 38
Email spoofing is a synonym for:
Question 38 options:
hacking.
usurping.
sniffing.
phishing.
Question 39
Packet-filtering firewalls:
Question 39 options:
are the most complex type of firewall.
seldom examine the data or the addresses of the message.
can filter both inbound and outbound traffic.
examine the destination address but not the source address.
Question 40
When referring to security threats, pretexting, sniffing,
spoofing, and phishing are all examples of:
Question 40 options:
loss of infrastructure.
faulty services.
unauthorized data disclosure.
incorrect data modification.
Previous PageNext Page
Question 41
Which of the following statements is true about human
safeguards for employees?
Question 41 options:
System administrators should retain user accounts after an
employee has been terminated.
Companies should provide user accounts and passwords to
employees prior to their security training.
User accounts should be defined to give users the least
possible privilege necessary to perform their jobs.
Security screening in an organization is a one-time process
and applies only to new employees.
Question 42
A ________ is a person or an organization that seeks to
obtain or alter data or other IS assets illegally, without the owner’s
permission and often without the owner’s knowledge.
Question 42 options:
target
threat
vulnerability
key escrow
Question 43
Which of the following usually happens in a malicious
denial-of-service attack?
Question 43 options:
A hacker monitors and intercepts wireless traffic at will
An intruder uses another site’s IP address to masquerade as
that other site
A hacker floods a Web server with millions of bogus service
requests
A phisher pretends to be a legitimate company and requests
confidential data
Question 44
Which of the following is an example of a sniffing
technique?
Question 44 options:
IP spoofing
Caches
Denial of service
Adware
Question 45
________ is the type of security loss that involves computer
criminals invading a computer system and replacing legitimate programs with
their own unauthorized ones that shut down legitimate applications and
substitute their own processing to spy, steal, and manipulate data.
Question 45 options:
Spoofing
Usurpation
Encryption
Phishing
________________________________________
Question 46
Which of the following statements is true of global
databases?
Question 46 options:
A single database makes it possible to have an integrated
view of the operations of an organization.
A single database increases data integrity problems.
The processing of a single database that resides in a single
location is referred to as distributed database processing.
When using a single database to process data, data
transmission speeds are extremely high.
Question 47
Which of the following best describes the bullwhip effect?
Question 47 options:
Improvements in technology lead to new applications, which
result in new markets and industries.
The value of a telecommunications network is proportional to
the square of the number of users connected to the system.
The performance improvement to be gained from using some
faster mode of execution is limited by the fraction of the time the faster mode
can be used.
The variability in the size and timing of orders increases
at each stage up the supply chain, from customer to supplier.
Question 48
Which of the following statements is true of international
IS project management?
Question 48 options:
The scope and requirements definition for international IS
is very easy.
Effective communication among team members is expensive.
Quality standards are identical across cultures.
The rate of development is uniform across countries.
Question 49
The bullwhip effect:
Question 49 options:
is not related to erratic consumer demand.
can be eliminated by restricting access to consumer-demand
information to only a few participants in the supply chain.
forces distributors, manufacturers, and suppliers to carry
smaller inventories that do not have the capacity to meet requirements.
increases the overall profitability of the supply chain.
Question 50
Enterprise systems, such as ERP, solve the problems of data
isolation by integrating data into a database that provides a comprehensive and
organization-wide view. This would require:
Question 50 options:
all processes to be locate
