Principles of Information System Questions

Principles of Information System Questions ORDER NOW FOR CUSTOMIZED AND ORIGINAL ESSAY PAPERS ON Principles of Information System Questions ESSAY TYPE QUESTIONS: (50 Marks) . Principles of Information System Questions Answer any TWO (2) questions in this section. Each question carries 25 marks. Essay should include examples where appropriate to support your answers. Question No: 1 Explain how information system raise ethical issues. Identify and explain the five (5) moral dimensions of information’s system, raised due to ethical, social and political issues, give 1 example each. Question No: 2 Explain why information system control is needed, identify, and discuss the two major types of control. For each major type, list and explain the controls under them. Question No: 3 You are a consultant to a company and in-charge of developing a system for them, explain the development process using the problem solving process approach. Provide an illustration and discuss each step including important activities that must be performed. question 1 : chapter 4 question 2: chapter 8 question 3: chapter 12 attachment_1 attachment_2 attachment_3 Essentials of Management Information Systems Thirteenth Edition Chapter 12 Building Information Systems and Managing Projects Copyright © 2019 Pearson Education Ltd. Learning Objectives 12.1 What are the core problem-solving steps for developing new information systems? 12.2 What are the alternative methods for building information systems? 12.3 What are the principal methodologies for modeling and designing systems? 12.4 How should information systems projects be selected and managed? 12.5 How will MIS help my career? Copyright © 2019 Pearson Education Ltd. Video Cases • Case 1: PSEG Leverages Big Data and Business Analytics Using GE’s Predix Platform • Case 2: IBM: BPM in a SaaS Environment • Case 3: IBM Helps the City of Madrid with Real-Time BPM Software • Instructional Video 1: What is PaaS? • Instructional Video 2: BPM: Business Process Management Customer Story Copyright © 2019 Pearson Education Ltd. Eastspring: Targeted Enterprise System Building • Problem – End-of-life technology and legacy systems – Business needs of regional business units • Solutions – Systems offering a breadth of services – Using outside vendors for products and systems – Changing business processes • Illustrates benefits of implementing a new system solution while changing business processes Copyright © 2019 Pearson Education Ltd. Core Problem-Solving Steps for Developing New Information Systems • New information systems are built as solutions to problems • Four steps to building an information system – Define and understand the problem – Develop alternative solutions – Choose a solution – Implement the solution • The first three steps are called systems analysis Copyright © 2019 Pearson Education Ltd. Figure 12.1 Developing an Information System Solution Copyright © 2019 Pearson Education Ltd. Defining and Understanding the Problem • Different people may have different ideas about the nature of the problem and its severity – What caused the problem? – Why does it persist? – Why hasn’t it been solved? – What are the objectives of a solution? • Information requirements – Identifies who needs what information, when, where, and how – Requirements analysis Copyright © 2019 Pearson Education Ltd. Developing Alternative Solutions • Paths to a solution determined by systems analysis. • Some solutions do not require an information system. • Some solutions require modification of existing systems. • Some solutions require new systems. Copyright © 2019 Pearson Education Ltd. Evaluating and Choosing Solutions • Feasibility study: – Is solution feasible from financial, technical, and organizational standpoint? • Systems proposal report – Describes, for each alternative solution ? Costs and benefits ? Advantages and disadvantages Copyright © 2019 Pearson Education Ltd. Implementing the Solution • Systems design • Completing implementation – Hardware selection and acquisition – Software development and programming – Testing – Training and documentation – Conversion – Production and maintenance • Managing the change Copyright © 2019 Pearson Education Ltd. Figure 12.2 A Sample Test Plan for the Girl Scout Digital Cookie System Copyright © 2019 Pearson Education Ltd. Traditional Systems Development Lifecycle • SLDC: Oldest method for building information systems • Phased approach with formal stages • Waterfall approach • Formal division of labor •Principles of Information System Questions Used for building large, complex systems • Time consuming and expensive to use Copyright © 2019 Pearson Education Ltd. Figure 12.3 The Traditional Systems Development Life Cycle Copyright © 2019 Pearson Education Ltd. Prototyping • Preliminary model built rapidly and inexpensively • Four-step process – Identify the user’s basic requirements – Develop an initial prototype – Use the prototype – Revise and enhance the prototype • Especially useful in designing a user interface Copyright © 2019 Pearson Education Ltd. Figure 12.4 The Prototyping Process Copyright © 2019 Pearson Education Ltd. End-User Development • End users create simple information systems with little or no assistance from specialists • Completed more rapidly than systems developed with conventional tools • Often leads to higher level of user involvement and satisfaction with systems • Cannot handle large numbers of transactions • Organizational risks Copyright © 2019 Pearson Education Ltd. Application Software Packages, software Services, and Outsourcing • Request for Proposal (RFP) • Application software packages and cloud software packages – Generalized systems for universal functions with standard processes – Customization features • Outsourcing – Domestic outsourcing – Offshore outsourcing Copyright © 2019 Pearson Education Ltd. Figure 12.5 Total Cost of Offshore Outsourcing Copyright © 2019 Pearson Education Ltd. Mobile Application Development • Mobile websites, web apps • Native apps • Different requirements for mobile devices than for PCs – Reduced size of screens – Touch screens – Saving resources: bandwidth, memory, processing, data entry • Responsive web design Copyright © 2019 Pearson Education Ltd. Interactive Session – Technology: Developing Mobile Apps: What’s Different • Class discussion – What people, organization, and technology issues need to be addressed when building mobile applications? – How does user requirement definition for mobile applications differ from that in traditional systems analysis? – Describe how Great-West’s invoice approval process changed after the mobile application was deployed. Copyright © 2019 Pearson Education Ltd. Rapid Application Development • Need for agility, scalability, and fast-cycle techniques • Rapid application development (RAD) – Creating workable systems in a very short period of time • Joint application design (JAD) – End users and information systems specialists working together on design • Agile development • DevOps Copyright © 2019 Pearson Education Ltd. Structured Methodologies • Step by step techniques’ • Top-down modeling • Separate data from process • Tools: – Data flow diagram – Process specifications – Structure chart Copyright © 2019 Pearson Education Ltd. Figure 12.6 Data Flow Diagram for Mail-in University Registration System Copyright © 2019 Pearson Education Ltd. Figure 12.7 High-Level Structure Chart for a Payroll System Copyright © 2019 Pearson Education Ltd. Object-Oriented Development • Uses the object as the basic unit of systems analysis and design – Class – Inheritance • More iterative and incremental than traditional structured development • Component-based development – Groups of objects assembled into software components – Used to create e-commerce applications – Web services, cloud-based development Copyright © 2019 Pearson Education Ltd. Figure 12.8 Principles of Information System Questions Class and Inheritance Copyright © 2019 Pearson Education Ltd. Computer-Aided Software Engineering (CASE) • Provides software tools to automate the previously described methodologies • Reduces repetitive work in systems development • CASE tools facilitate – Clear documentation – Coordination of team development efforts – Modest productivity benefits if tools are used correctly Copyright © 2019 Pearson Education Ltd. Project Management Objectives • Project management – Application of knowledge, skills, tools, and techniques to achieve targets within specified budget and time constraints • Five major variables: – Scope – Time – Cost – Quality – Risk Copyright © 2019 Pearson Education Ltd. Selecting Projects • Determining project costs and benefits – Tangible benefits – Intangible benefits – Capital budgeting methods • Information systems plan • Portfolio analysis • Scoring model Copyright © 2019 Pearson Education Ltd. Figure 12.9 A System Portfolio Copyright © 2019 Pearson Education Ltd. Managing Project Risk and System-Related Change • Implementation and change management – Implementation – User-designer communications gap • Controlling risk factors – Formal planning and tools – Gantt chart, PERT chart – Project management software • Overcoming user resistance – Ergonomics – Organizational impact analysis Copyright © 2019 Pearson Education Ltd. Figure 12.10 A Gannt Chart (1 of 3) A: Copyright © 2019 Pearson Education Ltd. Figure 12.10 A Gannt Chart (2 of 3) B: Copyright © 2019 Pearson Education Ltd. Figure 12.10 A Gannt Chart (3 of 3) C: Copyright © 2019 Pearson Education Ltd. Figure 12.11 A PERT Chart Copyright © 2019 Pearson Education Ltd. Interactive Session – Organizations: Fujitsu Selects a SaaS Solution to Simplify the Sales Process • Class discussion – What were Fujitsu’s problems with its existing systems for the CPQ process? What was the business impact of these problems? – List and describe the most important information requirements you would expect to see in Fujitsu’s RFP. – Why was the FPX CPQ solution selected? Was it a good choice? Why or why not? – Why would software as a service be an appropriate solution for Fujitsu? Should Fujitsu have built its own CPQ system in-house? – How much did FPX CPQ change the way Fujitsu ran its business? Copyright © 2019 Pearson Education Ltd. How Will MIS Help My Career? • The Business: Systems 100 Technology Consultants • Position Description • Job Requirements • Interview Questions Copyright © 2019 Pearson Education Ltd. Essentials of Management Information Systems Thirteenth Edition Chapter 8 Securing Information Systems Copyright © 2019 Pearson Education Ltd. Learning Objectives 8.1 Why are information systems vulnerable to destruction, error, and abuse? 8.2 What is the business value of security and control? 8.3 What are the components of an organizational framework for security and control? 8.4 What are the most important tools and technologies for safeguarding information resources? 8.5 How will MIS help my career? Copyright © 2019 Pearson Education Ltd. Video Cases • Case 1: Stuxnet and Cyberwarfare • Case 2: Cyberespionage: The Chinese Threat • Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 Million Users • Instructional Video 2: Meet the Hackers: Anonymous Statement on Hacking Sony Copyright © 2019 Pearson Education Ltd. Principles of Information System Questions Copyright © 2019 Pearson Education Ltd. Cyberattacks in the Asia-Pacific Target the Weakest Link: People (1 of 2) • Problem – Information technology is pervasive – Social engineering attacks • Solutions – Educate customers about security practices – Manage data breaches proactively Copyright © 2019 Pearson Education Ltd. Cyberattacks in the Asia-Pacific Target the Weakest Link: People (2 of 2) • Robust business processes need to be created and monitored • Demonstrates vulnerabilities in information technology systems • Illustrates some of the reasons organizations need to pay special attention to information system security Copyright © 2019 Pearson Education Ltd. Why Systems are Vulnerable (1 of 2) • Security – Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems • Controls – Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards Copyright © 2019 Pearson Education Ltd. Why Systems are Vulnerable (2 of 2) • Accessibility of networks • Hardware problems (breakdowns, configuration errors, damage from improper use or crime) • Software problems (programming errors, installation errors, unauthorized changes) • Disasters • Use of networks/computers outside of firm’s control • Loss and theft of portable devices Copyright © 2019 Pearson Education Ltd. Figure 8.1 Contemporary Security Challenges and Vulnerabilities Copyright © 2019 Pearson Education Ltd. Internet Vulnerabilities • Network open to anyone • Size of Internet means abuses can have wide impact • Use of fixed Internet addresses with cable / DSL modems creates fixed targets for hackers • Unencrypted VOIP • Email, P2P, IM – Interception – Attachments with malicious software – Transmitting trade secrets Copyright © 2019 Pearson Education Ltd. Wireless Security Challenges • Radio frequency bands easy to scan • SSIDs (service set identifiers) – Identify access points, broadcast multiple times, can be identified by sniffer programs • War driving – Eavesdroppers drive by buildings and try to detect SSID and gain access to network and resources – Once access point is breached, intruder can gain access to networked drives and files • Rogue access points Copyright © 2019 Pearson Education Ltd. Figure 8.2 Wi-Fi Security Challenges Copyright © 2019 Pearson Education Ltd. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware (1 of 2) • Malware (malicious software) • Viruses • Worms • Worms and viruses spread by – Downloads and drive-by downloads – Email, IM attachments • Mobile device malware • Social network malware Copyright © 2019 Pearson Education Ltd. Social Network Malwares Copyright © 2019 Pearson Education Ltd. First Computer bug • Grace Murray Hopper records the first computer bug in her log book as she worked on the Harvard Mark II. The problem was traced to a moth stuck between a relay in the machine, which Hopper duly taped into the Mark II’s log book with the explanation: “First actual case of bug being found.” Copyright © 2019 Pearson Education Ltd. Malicious Software ( MALWARE) Principles of Information System Questions • Computer Virus- a rogue software program that attaches itself to other software programs or data files in order to be executed without the knowledge and permission of the user. Copyright © 2019 Pearson Education Ltd. Signs you have a virus Copyright © 2019 Pearson Education Ltd. Malicious Software ( MALWARE) • Worms – independent computer programs that copy themselves from one computer to another computer over a network. • Main purpose is to replicate itself in the shortest possible time • Different code make worms perform different actions Copyright © 2019 Pearson Education Ltd. How worm spread 1. initially infects one computer in the network that has vulnerability 2. scans the network for more computers that has vulnerability 3. When target process/computer/user or activity is identified it will create a backdoor 4. Perform the illegal activity it was designed for Copyright © 2019 Pearson Education Ltd. Types of worm 1. Email worm- spread via email, activates when attachment is opened, will use contacts in the mail to send itself to them. Copyright © 2019 Pearson Education Ltd. Types of worm 2. IM worm- spread via IM using web links, also spread via the contact lists Copyright © 2019 Pearson Education Ltd. Types of worm 3. Internet worm- hops from internet to LAN, infect unprotected machines, create backdoors and perform illegal activities Copyright © 2019 Pearson Education Ltd. Types of worm 4. File sharing worm- infects shared folders with unassuming name spread when users download files from the folder and steal personal information Copyright © 2019 Pearson Education Ltd. Mobile Device Malware Copyright © 2019 Pearson Education Ltd. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware (2 of 2) • Trojan horse • SQL injection attacks • Ransomware • Spyware – Key loggers – Other types ? Reset browser home page ? Redirect search requests ? Slow computer performance by taking up memory Copyright © 2019 Pearson Education Ltd. Malicious Software ( MALWARE) • Trojan Horse- is a software program that appears to be benign but the does something other than expected. • term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth Copyright © 2019 Pearson Education Ltd. Trojan types and activities • Backdoor • Exploit • Rootkit-makes virus undetected • Trojan Banker-steal online banking data • Trojan DDoS-denial of Service • Trojan Downloader-download and install new Trojans • Trojan Dropper-combine rootkit and downloader • Trojan FakeAV- fake anti virus when installed asked money-reports are not true • Trojan Game-steals account of online gamers • Trojan IM • Trojan Ransom Copyright © 2019 Pearson Education Ltd. Malicious Software ( MALWARE) • Spyware- programs that install themselves to secretly monitors user Web surfing activity and serve up advertising. Copyright © 2019 Pearson Education Ltd. Two Classification of Spyware • Domestic Spyware is software that is usually purchased and installed by computer owners to monitor the Internet behavior on their computer networks. Employers use this software to monitor employee online activities; Copyright © 2019 Pearson Education Ltd. Principles of Information System Questions Two Classification of Spyware • Commercial Spyware (also known as adware) is software that companies use to track your Internet browsing activities. Companies that track your online habits often sell this information to marketers who then hit you with targeted advertising ads that match your browsing interests and would most likely appeal to you. Copyright © 2019 Pearson Education Ltd. Malicious Software ( MALWARE) Keyloggers- records every keystroke made on a computer to steal serial numbers for software, launch internet attack Copyright © 2019 Pearson Education Ltd. Interactive Session Technology – WannaCry and the SWIFT System Hacking Attacks: Theft on a Worldwide Scale • Class discussion – Compare the WannaCry and SWIFT system hacking attacks. What security vulnerabilities were exploited in each of these attacks? – What people, organization, and technology factors contributed to these security weaknesses? – How could these attacks have been prevented? – What was the business and social impact of these attacks? Copyright © 2019 Pearson Education Ltd. Hackers and Computer Crime (1 of 3) • Hackers v s. Crackers – Hacker- is an individual who intends to gain unauthorized access to a computer system. – Cracker- a hacker with criminal intent. ersu Copyright © 2019 Pearson Education Ltd. Reason For Hacking • For fun • Show off • Steal important information • Revenge • Sympathy • Curiosity • Boredom • Sabotage etc,. Copyright © 2019 Pearson Education Ltd. Advantages of hacking • To recover lost information, especially in case you lost your password. • To perform penetration testing to strengthen computer and network security. • To put enough preventative measures in place to prevent security breaches. Copyright © 2019 Pearson Education Ltd. Disadvantages of Hacking • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Denial of service attacks • Malicious attack on the system. Copyright © 2019 Pearson Education Ltd. Types of hackers • Green hat • Black hat • White Hat • Red Hat • Blue hat • Elite Copyright © 2019 Pearson Education Ltd. Hackers and Computer Crime (1 of 3) • Activities include: – System intrusion – System damage – Cybervandalism ? Intentional disruption, defacement, destruction of website or corporate information system • Spoofing and sniffing Copyright © 2019 Pearson Education Ltd. Copyright © 2019 Pearson Education Ltd. Hackers and Computer Crime (2 of 3) • Denial-of-service attacks (DoS) • Distributed denial-of-service attacks (DDoS) … Get a 10 % discount on an order above $ 100 Use the following coupon code : NURSING10

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Start off on the right foot this semester. Get expert-written solutions at a 20% discount