Wednesday 15 February 2017

SOLUTION MANUAL OF FUNDAMENTALS OF INFORMATION SYSTEMS 6 ED BY REYNOLD


For Order This And Any Other Course, Assignments, Discussions, Quizzes, Exams, Test Banks And Solutions Manuals

Contact us At whisperhills@gmail.com


PART 1 Information Systems in Perspective

CHAPTER 4: SELF-ASSESSMENT TEST ANSWERS

(1) communications media (2) c. (3) wireless communications
(4) b. (5) ARPANET (6) a. (7) a. (8) Internet Service Provider
(ISP) (9) False (10) d. (11) d. (12) c. (13) search engine (14)
telepresence (15) extranet (16) True

REVIEW QUESTIONS


1. What is meant by broadband communications?
2. Describe the elements and steps involved in the telecommunications
process.
3. What is a telecommunications protocol?
4. What are the names of the three primary frequency ranges
used in wireless communications?
5. What is VPN? How do organizations use this technology?
6. What is the difference between near field communication
and ultra wideband?
7. What is the difference between Wi-Fi and WiMAX communications?
8. What roles do the bridge, router, gateway, and switch play
in a network?
9. Distinguish between a PAN, LAN, MAN, and WAN.
10. What is TCP/IP? How does it work?
11. Explain the naming conventions used to identify Internet
host computers.
12. What is a Web browser? Provide four examples.
13. What is cloud computing?
14. Briefly describe three ways to connect to the Internet. What
are the advantages and disadvantages of each approach?
15. What is an Internet service provider? What services do they
provide?
16. How do Web application frameworks assist Web developers?
17. What is a podcast?
18. What is content streaming?
19. What is instant messaging?
20. What is the Web? Is it another network like the Internet
or a service that runs on the Internet?
21. What is a URL and how is it used?
22. What is an intranet? Provide three examples of the use of
an intranet.
23. What is an extranet? How is it different from an intranet?

DISCUSSION QUESTIONS
1. Why is an organization that employs centralized processing
likely to have a different management decision-making
philosophy than an organization that employs distributed
processing?
2. Briefly discuss the evolution of wireless 3G and 4G communications.
3. Identify the fundamental differences between a file server
system and a client/server system.
4. What are the pros and cons of distributed processing versus
centralized processing for a large retail chain?
5. Social networks are being widely used today. Describe how
this technology could be used in a business setting. Are
there any drawbacks or limitations to using social networks
in a business setting?
6. Why is it important to have an organization that manages
IP addresses and domain names?
7. What are the benefits and risks involved in using cloud
computing?
8. Describe how a company could use a blog and podcasting.
9. Briefly describe how the Internet phone service operates.
Discuss the potential impact that this service could have on
traditional telephone services and carriers.
10. Why is XML an important technology?
11. How do HTML, CSS, and XML work together to create
a Web page?
12. What are the defining characteristics of a Web 2.0 site?
13. Name four forms of Internet communication describing
the benefits and drawbacks of each.
14. What social concerns surround geolocation technologies?
15. One of the key issues associated with the development of
a Web site is getting people to visit it. If you were developing
a Web site, how would you inform others about it
and make it interesting enough that they would return and
tell others about it?
16. Downloading music, radio, and video programs from the
Internet is easier than in the past, but some companies are
still worried that people will illegally obtain copies of this
programming without paying the artists and producers
royalties. If you were an artist or producer, what would you
do?
17. How could you use the Internet if you were a traveling
salesperson?
18. Briefly summarize the differences in how the Internet, a
company intranet, and an extranet are accessed and used.

PROBLEM-SOLVING EXERCISES

1. As the CIO of a hospital, you are convinced that installing
a wireless network and providing portable computers to
nurses and doctors is a necessary step to reduce costs and
improve patient care. Use PowerPoint or similar software
to make a convincing presentation to management for
adopting such a program. Your presentation must identify
benefits and potential issues that must be overcome to make
such a program a success.
2. Think of a business that you might like to establish. Use a
word processor to define the business in terms of what
product(s) or service(s) it provides, where it is located, and
its name. Go to www.godaddy.com and find an appropriate
domain name for your business that is not yet taken. Shop
around online for the best deal on Web site hosting. Write
a paragraph about your experience finding a name, and why
you chose the name that you did.
3. You have been hired to research the use of a blog for a
company. Develop a brief report on the advantages and
disadvantages of using a blog to advertise corporate products
and services. Using a graphics program, prepare a slide
show to help you make a verbal presentation.

TEAM ACTIVITIES

1. Form a team to identify the public locations (such as an
airport, public library, or café) in your area where wireless
LAN connections are available. Visit at least two locations
and write a brief paragraph discussing your experience at
each location trying to connect to the Internet.
2. With your teammates, identify a company that is making
effective use of Web 2.0 technologies on its Web site. Write
a review of the site and why you believe it is effective?
3. Use Flickr.com to have a photo contest. Each group member
should post four favorite photos that they personally
took. Share account information between group members
and use photo comment boxes to vote on your favorite
photos. The photo with the most favorable comments wins.

WEB EXERCISES

1. Do research on the Web to identify the latest 4G communications
developments. In your opinion, which carrier’s
4G network (AT&T, Sprint Nextel, T-Mobil, or Verizon)
is the most widely deployed? Write a short report on what
you found.
2. Research some of the potential disadvantages of using the
Internet, such as privacy, fraud, or unauthorized Web sites.
Write a brief report on what you found.
3. Set up an account on www.twitter.com and invite a few
friends to join. Use Twitter to send messages to your friends
on their cell phones, keeping everyone posted on what you
are doing throughout the day. Write a review of the service
to submit to your instructor.

CAREER EXERCISES

1. Consider a future job position with which you are familiar
through work experience, coursework, or a study of industry
performance. How might you use some of the telecommunications
and network applications described in this
chapter in this job?
2. Do research to assess potential career opportunities in the
telecommunications or networking industry. Consider
resources such as the Bureau of Labor Statistics list of fastest
growing positions, Network World, and Computerworld.
Are there particular positions within these industries that
offer good opportunities? What sort of background and
education is required for candidates for these positions? You
might be asked to summarize your findings for your class
in a written or oral report.
CASE STUDIES
Case One
Adidas Turns to Cellular Network for Inventory Data
The Adidas Group is a global leader in the sporting goods
industry, offering a large portfolio of products in virtually every
country in the world. Adidas Group brands include Adidas,
Reebok, and TaylorMade – Adidas Golf. The Adidas Group
headquarters is in Herzogenaurach, Germany, with 170
subsidiaries located around the world.
Adidas America is the U.S. division of the Adidas Group,
employing around 2,000 people at its offices and distribution
centers across the country. Recently, Adidas America
discovered an inexpensive way to use telecommunications
technologies to help their salesforce become more
productive.
Adidas sales representatives spend a lot of time traveling,
paying visits to customers that range from small private
sporting shops to large franchises. One major inconvenience
for the salesforce and the customers it calls on lies in
checking current inventory levels for order placement. For
years, a salesperson was required to phone Adidas customer
service representatives (CSRs) to find out which products
were in stock and which were sold out. Because Adidas
inventory fluctuates frequently, this important information is
needed to keep customers from being frustrated by backordered
products. Having to phone for the information was
frustrating for sales representatives as well as customers
who would have to wait while the salesperson talked on the
phone. It also over-burdened the CSRs, whose main job
wasn’t inventory reporting but assisting customers.
The Adidas America information systems group thought
they had a solution. They set up a VPN to enable customer
representatives to securely connect to the corporate data
from their laptops and access the inventory data directly.
However, what looks good on paper doesn’t always work well
when implemented. Customer service employees were not
comfortable visiting customers with their laptop computers,
because they had to make the customer wait while they
booted up and looked up information. Instead, they would
typically take the customer’s order, then check inventory
later, getting back to the customer if there were product
shortages. This certainly wasn’t the intended workflow, and
the solution ended up being as bad as the original problem.
Adidas Sales Force Automation Manager, Tim
Oligmueller, was struck by a solution while attending a
telecommunications trade show. He realized that the
BlackBerry smartphones the salesforce used could do much
more than deliver e-mail and make phone calls. He saw
demonstrations of BlackBerry phones that ran sophisticated
business information systems. Tim realized that the solution
was in the salespeople’s pockets all along. All that was
required was for Adidas to invest in BlackBerry’s Mobile Data
System and Enterprise Server and for the information system
group to develop their own Sales Force and CRM applications.
Within two weeks and with an investment of less than
$10,000, Tim and his team had deployed a mobile information
system that now allows salespeople to quickly and effortlessly
access inventory data without inconveniencing customers or
CSRs. Now salespeople can provide customers with the
information they need to make quicker purchasing decisions
on the spot. Salespeople and CSRs spend less time on the
phone with each other, freeing both sides to be more
productive. Customers are impressed with the improved
service and technological innovativeness of the company.
Salespeople can e-mail catalogues and order information to
the customer as they converse. The new system has
increased customers’ confidence in doing business with
Adidas.
Adidas is looking to many other wireless applications that
can assist the salesforce and others in the organization. As
with all of the examples provided in this chapter,
telecommunications technologies provide Adidas with rapid
access to information when and where it is needed,
empowering the company to maximize its productivity and
potential and gain a competitive advantage.

Discussion Questions

1. Describe the problem that plagued Adidas’ salesforce that
was addressed through a telecommunications solution.
2. Why do you think the handheld solution was better than
the laptop computer solution?

Critical Thinking Questions

1. What other types of information, besides inventory, might
salespeople like to have access to over their BlackBerry
phones?
2. What security concerns might arise over mobile access to
private corporate information?
SOURCES: BlackBerry Staff, “Adidas America Equips Sales Team with Powerful
Wireless Sales Tool,” BlackBerry Case Study, www.blackberry.com/
products/pdfs/Adidas_LOB_CS_Final.pdf, accessed February 20, 2010; About
Adidas Web page, www.adidas.com/us/shared/aboutadidas.asp, accessed
February 20, 2010; Schultz, Beth, “Realizing Rapid ROI Through Mobility,”
Computerworld White Paper, www.slideshare.net/PingElizabeth/rapid-roirealizing-
rapid-roi-through-mobility, accessed February 20, 2010.
Case Two

Barriers to Enterprise 2.0
Web 2.0 and social media such as Facebook, Wikipedia, and
YouTube have transformed life for many people, providing
new ways to connect with friends and share information and
media. While social Web 2.0 sites have become popular with
the general public, businesses have had a difficult time
deciding how these technologies can benefit their employees.
The use of Web 2.0 technologies and social media in the
enterprise has been dubbed Enterprise 2.0. In most instances,
Enterprise 2.0 is an extension of a corporate intranet; it is
sealed off for access to employees only. VPN technology may
be used to allow employee access from any Internetconnected
device using a corporate login.
Some companies have been extremely successful with the
implementation of Enterprise 2.0. Cisco, one of the world’s
largest technology companies, has implemented Enterprise
2.0 for its 65,000 employees. Cisco is the global leader in the
design, manufacturing, and sales of networking and
communications technologies and services. Cisco created a
Facebook-like application for its employees to assist in
finding subject matter experts within the organization. Like
Facebook users, Cisco employees create profiles within the
system that include their professional areas of expertise.
When other employees need assistance with a problem, a
quick search of the system will lead them to an expert within
the organization.
Cisco also provides a video wiki used for training on
different products and technologies and a Wikipedia-like
application for sharing knowledge across the Enterprise. A
number of mash-up applications have been developed to draw
information from the main Enterprise 2.0 applications to
address specific needs. For example, one mash-up can be
used to quickly contact technical support staff.
Initially Cisco experienced some cultural pushback in the
planning stage of its Enterprise 2.0 applications. A highly
skeptical group of engineers thought that the company was
wasting resources on needless technologies. Ultimately, the
technologies have created real improvements for Cisco’s
business models.
Cisco is in a vast minority of companies that have
successfully implemented Enterprise 2.0; however, it is likely
that many companies will be following Cisco’s lead.
Traditional business culture often acts as a barrier to the
adoption of Web 2.0 technologies. There is often a prevailing
notion that posting to social networks is wasting time rather
than being productive, and doesn’t constitute “real work.” In
reality, people are most productive when interacting with
networks of colleagues.
Another barrier to Enterprise 2.0 is a concern that social
networks act as gateways to chaos, generating an
unmanageable amount of mostly worthless data. The
response to this argument is to provide tools that allow users
to filter out the junk to get an optimal signal-to-noise ratio.
Those that have been successful with Enterprise 2.0 find that
getting users to generate as much noise and activity as
possible creates the most valuable information to mine.
Yet another barrier to implementing Enterprise 2.0 is fear
that the social network will be used as a “digital soapbox for
disgruntled employees.” This issue, as with the others, can be
handled with proper management of the system and
employees. If employees have grounds for complaining,
management can more easily address those issues through
the open forum of a social network.
In general, Enterprise 2.0 has been slow to take off due to
an inability to easily show a return on investment. Social
networks within an enterprise provide a soft return that is
sometimes difficult to quantify. Successful Enterprise 2.0
implementations typically have two things in common: they
are built to support key business processes, and they are not
expected to show a ROI.

Discussion Questions

1. What Web 2.0 applications can provide benefits to
employees in a business environment?
2. What barriers exist in some businesses that hamper the
adoption of Enterprise 2.0?

Critical Thinking Questions

1. How might an information system administrator make a
case for the implementation of Enterprise 2.0 when no ROI
can be easily demonstrated?
2. In a large global enterprise, how might Enterprise 2.0
applications be organized so as to provide local benefits
as well as global benefits?
SOURCES: Bennett, Elizabeth, “Web 2.0 in the Enterprise 2.0,” CIO Insight, July
13, 2009; Gardner, W. David, “Enterprise 2.0: How Cloud Computing Is Challenging
CIOs,” Information Week, June 15, 2010, www.informationweek.com.

Questions for Web Case

See the Web site for this book to read about the Altitude
Online case for this chapter. Following are questions
concerning this Web case.
Altitude Online: Telecommunications and Networks

Discussion Questions

1. What telecommunications equipment is needed to fulfill
Altitude Online’s vision?
2. Why is it necessary to lease a line from a
telecommunication company?

Critical Thinking Questions

1. What types of services will be provided over Altitude
Online’s network?
2. What considerations should Jon and his team take into
account as they select telecommunications equipment?
Altitude Online: The Internet, Web, Intranets, and
Extranets

Discussion Questions

1. What impact will the new ERP system have on Altitude
Online’s public-facing Web site? How will it affect its
intranet?
2. What types of applications will be available from the
employee dashboard?

Critical Thinking Questions

1. Altitude Online employees have various needs, depending
on their position within the enterprise. How might the
dashboard and intranet provide custom support for
individual employee needs?
2. What Web 2.0 applications should Altitude Online consider
for its dashboard? Remember that the applications must
be available only on the secure intranet.


PART 3 Business InformatioN Systems

Chapter 5 Electronic and Mobile Commerce and Enterprise Systems
Chapter 6 Information and Decision Support Systems
Chapter 7 Knowledge Management and Specialized Information Systems

CHAPTER 7: SELF-ASSESSMENT TEST
Knowledge management allows organizations to share
knowledge and experience among their managers and
employees.
1. __________________ knowledge is objective and can be
measured and documented in reports, papers, and rules.
2. What type of person creates, uses, and disseminates
knowledge?
a. knowledge worker
b. information worker
c. domain expert
d. knowledge engineer
3. A community of practice (COP) is a group of people or
community dedicated to a common discipline or practice,
such as open-source software, auditing, medicine, engineering,
and other areas. True or False?
Artificial intelligence systems form a broad and diverse set of
systems that can replicate human decision making for certain
types of well-defined problems.
4. The Turing Test attempts to determine whether the
responses from a computer with intelligent behavior are
indistinguishable from responses from a human. True or
False?
5. _______________ are rules of thumb arising from experience
or even guesses.
6. What is not an important attribute for artificial intelligence?
a. the ability to use sensors
b. the ability to learn from experience
c. the ability to be creative
d. the ability to make complex calculations
7. _______________ involves mechanical or computer
devices that can paint cars, make precision welds, and perform
other tasks that require a high degree of precision or
are tedious or hazardous for human beings.
8. What branch of artificial intelligence involves a computer
understanding and reacting to statements in English or
another language?
a. expert systems
b. neural networks
c. natural language processing
d. vision systems
9. A(n) _______________ is a combination of software and
hardware that allows the computer to change how it functions
or reacts to situations based on feedback it receives.
Expert systems can enable a novice to perform at the level of
an expert but must be developed and maintained very
carefully.
10. What is a disadvantage of an expert system?
a. the inability to solve complex problems
b. the inability to deal with uncertainty
c. limitations to relatively narrow problems
d. the inability to draw conclusions from complex
relationships
11. A(n) __________________ is a collection of software
packages and tools used to develop expert systems that can
be implemented on most popular PC platforms to reduce
development time and costs.
12. A heuristic consists of a collection of software and tools
used to develop an expert system to reduce development
time and costs. True or False?
13. What stores all relevant information, data, rules, cases, and
relationships used by the expert system?
a. the knowledge base
b. the data interface
c. the database
d. the acquisition facility
14. A disadvantage of an expert system is the inability to provide
expertise needed at a number of locations at the same
time or in a hostile environment that is dangerous to
human health. True or False?
15. What allows a user or decision maker to understand how
the expert system arrived at a certain conclusion or result?
a. the domain expert
b. the inference engine
c. the knowledge base
d. the explanation facility
16. An important part of an expert system is the
_______________, which allows a user or decision maker
to understand how the expert system arrived at certain
conclusions or results.
17. In an expert system, the domain expert is the individual or
group who has the expertise or knowledge one is trying to
capture in the expert system. True or False?
Multimedia and virtual reality systems can reshape the interface
between people and information technology by offering
new ways to communicate information, visualize processes,
and express ideas creatively.
18. _____________________ can be used to create stunning
brochures, presentations, reports, and documents.
19. What type of virtual reality is used to make human beings
feel as though they are in a three-dimensional setting, such
as a building, an archaeological excavation site, the human
anatomy, a sculpture, or a crime scene reconstruction?
a. cloud
b. relative
c. immersive
d. visual
Specialized systems can help organizations and individuals
achieve their goals.
20. _______________________ involves the use of information
systems to develop competitive strategies for people,
organizations, or even countries.

CHAPTER 7: SELF-ASSESSMENT TEST ANSWERS

(1) Explicit (2) a (3) True (4) True (5) Heuristics (6) d (7)
Robotics (8) c (9) learning system (10) c (11) expert system
shell (12) False (13) a (14) False (15) d (16) explanation facility
(17) True (18) multimedia (19) c (20) Game theory

REVIEW QUESTIONS

1. What is a knowledge management system?
2. What is a community of practice?
3. What is a chief knowledge officer? What are his or her duties?
4. What is a vision system? Discuss two applications of such
a system.
5. What is natural language processing? What are the three
levels of voice recognition?
6. Describe three examples of the use of robotics. How can a
microrobot be used?
7. What is a learning system? Give a practical example of such
a system.
8. What is a neural network? Describe two applications of
neural networks.
9. Under what conditions is the development of an expert
system likely to be worth the effort?
10. Identify the basic components of an expert system and
describe the role of each.
11. Describe several business uses of multimedia.
12. What is virtual reality? Give three examples of its use.
13. Expert systems can be built based on rules or cases. What
is the difference between the two?
14. Describe the roles of the domain expert, the knowledge
engineer, and the knowledge user in expert systems.
15. What is informatics? Give three examples.
16. Describe game theory and its use.
17. Identify three special interface devices developed for use
with virtual reality systems.
18. Identify and briefly describe three specific virtual reality
applications.
19. What is informatics? How is it used?
20. Give three examples of other specialized systems.

DISCUSSION QUESTIONS

1. What are the requirements for a computer to exhibit
human-level intelligence? How long will it be before we
have the technology to design such computers? Do you
think we should push to accelerate such a development?
Why or why not?
2. You work for an insurance company as an entry-level manager.
The company contains both explicit and tacit knowledge.
Describe the types of explicit and tacit knowledge
that might exist in your insurance company. How would
you capture each type of knowledge?
3. Describe the duties of a chief knowledge officer.
4. What are some of the tasks at which robots excel? Which
human tasks are difficult for robots to master? What fields
of AI are required to develop a truly perceptive robot?
5. Describe how natural language processing could be used in
a university setting.
6. Discuss how learning systems can be used in a military war
simulation to train future officers and field commanders.
7. You have been hired to develop an expert system for a university
career placement center. Develop five rules a student
could use in selecting a career.
8. What is the relationship between a database and a knowledge
base?
9. Imagine that you are developing the rules for an expert
system to select the strongest candidates for a medical
school. What rules or heuristics would you include?
10. Describe how game theory can be used in a business setting.
11. Describe how a university might use multimedia.
12. What application of virtual reality has the most potential
to generate increased profits in the future?
13. Describe a situation for which RFID could be used in a
business setting.

PROBLEM-SOLVING EXERCISES

1. You are a senior vice president of a company that manufactures
kitchen appliances. You are considering using
robots to replace up to ten of your skilled workers on the
factory floor. Using a spreadsheet, analyze the costs of
acquiring several robots to paint and assemble some of your
products versus the cost savings in labor. How many years
would it take to pay for the robots from the savings in fewer
employees? Assume that the skilled workers make $20 per
hour, including benefits.
2. Assume that you have just won a lottery worth $100,000.
You have decided to invest half the amount in the stock
market. Develop a simple expert system to pick ten stocks
to consider. Using your word-processing program, create
seven or more rules that could be used in such an expert
system. Create five cases and use the rules you developed to
determine the best stocks to pick.
3. Use a graphics program, such as PowerPoint, to develop a
brochure for a small restaurant. Contrast your brochure to
one that could have been developed using a multimedia
application. Write a report using a word-processing application
on the advantages of a multimedia application compared
to a graphics program.

TEAM ACTIVITIES

1. Do research with your team to identify KMSs in three different
businesses or nonprofit organizations. Describe the
types of tacit and explicit knowledge that would be needed
by each organization or business.
2. Have your team develop a game between two contestants
in which the winning contestant receives fake money. At
random, pick two team members to play the game against
each other. Have your other team members write a report
on the winning strategy and how the game could be
improved.
3. Have your team members explore the use of a specialpurpose
system in an industry of your choice. Describe
the advantages and disadvantages of this special-purpose
system.

WEB EXERCISES

1. Use the Internet to find information about the use of multimedia
in a business setting. Describe what you found.
2. This chapter discussed several examples of expert systems.
Search the Internet for two examples of the use of expert
systems. Which one has the greatest potential to increase
profits for a medium-sized firm? Explain your choice.
3. Use the Internet to get information about the application
of game theory in business or the military. Write a report
about what you found.

CAREER EXERCISES

1. Describe how a COP can be used to help advance your
career.
2. Describe the roles and salaries of two people involved in
multimedia applications, such as movie production, sound
production, or another multimedia application.

CASE STUDIES

Case One
MITRE Taps the Brain Trust of Top U.S. Experts
MITRE Corporation is responsible for managing the Research
and Development (R&D) Centers for the U.S. Department of
Defense, the Federal Aviation Administration, the Internal
Revenue Service, U.S. Department of Veterans Affairs, and the
Department of Homeland Security. MITRE also researches
new technologies that may assist in solving its clients’
problems.
More than 7,000 scientists, engineers, and support
specialists work in labs managed by MITRE, and most have
master’s or doctoral degrees. Staff members are engaged in
hundreds of different projects across the company. Each staff
member possesses valuable technical, operational, and
domain knowledge that MITRE wants to tap to its full value
and potential. When knowledge management (KM) systems
came on the scene in the mid-1990s, MITRE immediately saw
the benefit for its researchers and has been tinkering with KM
ever since.
With so many research specialists engaged across its
labs, the value of tapping each other’s knowledge and
collaborating on projects is immense. However, it’s a
challenge to interact efficiently with low overhead while
researchers are simultaneously working on hundreds of
separate projects. For knowledge management, MITRE takes
a gradual learn-while-you-go approach.
MITRE’s first step in providing knowledge management
was to simply track its research staff. A people locator was
developed as part of the larger MITRE Information
Infrastructure (MII). The people locator works like an
electronic phone book, identifying which employees worked
on which assignments over time. The system drew
information from the existing project management systems
and human resource systems. Using the people locator, staff
could find colleagues with useful knowledge based on
previous work or the sponsoring organization.
As MITRE researchers used the people finder, developers
refined the system based on user feedback. Over time, they
introduced additional capabilities. For example, they added an
Expertise Finder to help find researchers with expertise in
special areas. MITRE also included a library of best practices
for systems engineering and project management in the
system. MITRE experimented with technology exchange
meetings and an annual Innovation Exchange, which allowed
researchers to share their successes with colleagues. When
they found new technologies and ideas useful, developers
added them to the KM system. More recently, MITRE has
experimented with Web 2.0 technologies similar to Facebook
and Wikipedia for its KM system.
MITRE’s approach to KM has been evolutionary. New
ideas are piloted, and those proven valuable and viable are
kept in the system. The success of MITRE’s KM system is in
its unique approach to KM as a journey with continuous
improvements.

Discussion Questions

1. Why is KM extremely valuable in areas of research and
development?
2. How do the different components of MITRE’s KM system
assist in spreading knowledge throughout its labs and in
storing knowledge for use in the future?

Critical Thinking Questions

1. What unique challenges do research and development
labs provide for KM implementation?
2. What is the benefit of MITRE’s evolutionary approach to
KM?
SOURCES: Swanborg, Rick, “Mitre’s Knowledge Management Journey,” CIO,
February 27, 2009, www.cio.com; “About MITRE,” MITRE Web site,
www.mitre.org/about, accessed January 31, 2010.

Case Two

JEA Uses AI to Optimize Water Delivery
JEA supplies much of the Jacksonville, Florida area with
electricity, water, and sewer services. The JEA water system
uses 150 artesian wells to tap the Florida Aquifer, distributing
water to 44 water treatment plants and then down 3,480 miles
of underground water pipes to businesses and residences.
Making sure that its wells are producing enough water to
meet customer demand is a tricky and sometimes wasteful
process. Reservoirs accommodate anticipated demand, often
overcompensating to make sure they have enough water to
accommodate an unusually high demand. When too much
water is kept on hand, the quality of the water decreases (due
to salt intrusion), and the health of the well decreases (due to
inactivity).
Recently, JEA decided to put artificial intelligence to work
assisting its wells in pumping just enough water to meet
customer demand. It purchased AI-based software from
Gensym and created a neural network to predict hourly
consumption of water over a given time frame. The neural
network is trained using previous water-usage data. The
consumption forecasts created by the neural net are fed into
an expert system. The expert system allocates the total
anticipated demand to the 44 water treatment plants and
artesian well pumps.
The schedule for hourly water production is fed into
automated systems in the production and treatment plant to
control production and delivery of the water. The Gensym
software allows JEA engineers to define inputs (including
reservoir sensors and meter-reading) and outputs (such as
controls on equipment) to optimize the production and flow of
water through the JEA system.
It took JEA six months to develop and implement the
optimized expert system and automation. The system has
resulted in better use of reservoir capacity by filling reservoirs
only to levels required with each hour of operation. The needsbased
production has minimized costs while maximizing
water quality. Salt intrusion has been reduced, and the health
of the wells is increasing. As JEA rolls out its new system to
all of its wells and treatment plants, it will enjoy considerable
benefits and savings, including lower energy costs and
reduced equipment failures from smarter pumping.

Discussion Questions

1. What problem did JEA face that required the use of an
expert system and automation?
2. What benefits were provided by JEA’s new automated
system?

Critical Thinking Questions

1. What are the components of JEA’s new system, and what
tasks does each component accomplish?
2. What other industries might benefit from a Gensym
optimization and automation system like JEA’s? Why?
SOURCES: Gensym Staff, “Success Story: JEA,” Gensym Web site,
www.gensym.com, accessed January 31, 2010; “About JEA,” JEA Web site,
www.jea.com/about, accessed January 31, 2010.

Questions for Web Case

See the Web site for this book to read about the Altitude Online
case for this chapter. Following are questions concerning this
Web case.
Altitude Online: Knowledge Management and Other
Considerations

Discussion Questions

1. Why do you think it is a good idea for Altitude Online to
maintain records of all advertising projects?
2. How can social networks and blogs serve as knowledge
management systems?

Critical Thinking Questions

1. What challenges lie in filling a wiki with information
provided by employees?
2. What other tools could Altitude Online use to capture
employee knowledge, build community, and reward
productive employees?


PART 04 Systems Development and Social Issues

Chapter 8 Systems Development

CHAPTER 8: SELF-ASSESSMENT TEST
Effective systems development requires a team effort of stakeholders,
users, managers, systems development specialists,
and various support personnel, and it starts with careful planning.
1. __________________ is the activity of creating or modifying
existing business systems. It refers to all aspects of
the process—from identifying problems to be solved or
opportunities to be exploited to the implementation and
refinement of the chosen solution.
2. Which of the following individuals ultimately benefit from
a systems development project?
a. Computer programmers
b. Systems analysts
c. Stakeholders
d. Senior-level managers
3. Like a contractor constructing a new building or renovating
an existing one, chief information officer (CIO) takes the
plans from the systems analyst and builds or modifies the
necessary software. True or False?
Systems development often uses different approaches and
tools such as traditional development, prototyping, rapid
application development, end-user development, computeraided
software engineering, and object-oriented development
to select, implement, and monitor projects.
4. Agile development allows systems to change as they are
being developed. True or False?
5. ____________________ takes an iterative approach to
the systems development process. During each iteration,
requirements and alternative solutions to the problem are
identified and analyzed, new solutions are designed, and a
portion of the system is implemented.
Systems development starts with investigation and analysis of
existing systems.
6. Feasibility analysis is typically done during which systems
development stage?
a. Investigation
b. Analysis
c. Design
d. Implementation
7. Rapid application development (RAD) employs tools,
techniques, and methodologies designed to speed application
development. True or False?
Designing new systems or modifying existing ones should
always be aimed at helping an organization achieve its goals.
8. Scenarios and sequence diagrams are used with
________________.
a. object-oriented design
b. point evaluation
c. incremental design
d. nominal evaluation
9. _________________ involves systems development
efforts that slash power consumption and require less physical
space.
10. The design report is the final result of system design that
technical and detailed descriptions of the new system. True
or False?
The primary emphasis of systems implementation is to make
sure that the right information is delivered to the right person
in the right format at the right time.
11. Software as a Service (SaaS) allows an organization to subscribe
to Web-based applications and pay for the software
and services actually used. True or False?
12. The phase-in approach to conversion involves running
both the old system and the newsystem for a three months
or longer. True or False?
Maintenance and review add to the useful life of a system but
can consume large amounts of resources, so they benefit from
the same rigorous methods and project management techniques
applied to systems development.
13. Reviewing and monitoring the number of errors encountered,
the amount of memory required, the amount of
processing or CPU time needed, and other problems
should be closely observed. This is called
a. Object review
b. Structured review
c. systems performance measurement
d. Critical factors measurement
14. Monitoring a system after it has been implemented to make
it more useful in achieving user and organizational goals is
called ______________________.
CHAPTER 8: SELF-ASSESSMENT TEST ANSWERS
(1) Systems development, (2) c (3) False (4) True (5) Prototyping
(6) a (7) True (8) a (9) environmental design (10) True
(11) True (12) False (13) c (14) systems maintenance
REVIEW QUESTIONS
1. What is an information system stakeholder?
2. What is the goal of information systems planning? What
steps are involved in IS planning?
3. What are the steps of the traditional systems development
life cycle?
4. What is the difference between systems investigation and
systems analysis? Why is it important to identify and
remove errors early in the systems development life cycle?
5. What is end-user systems development? What are the
advantages and disadvantages of end-user systems development?
6. List the different types of feasibility.
7. What is the result or outcome of systems analysis? What
happens next?
8. How does the JAD technique support the RAD systems
development life cycle?
9. What is prototyping?
10. What are the steps of object-oriented systems development?
11. What is an RFP? What is typically included in one? How
is it used?
12. What is systems operation?
13. What activities go on during the user preparation phase of
systems implementation?
14. Give three examples of a computer system vendor.
15. What are the financial options of acquiring hardware?
16. How can SaaS be used in software acquisition?
17. What are some of the reasons for program maintenance?
18. Describe how you back up the files you use at school.

DISCUSSION QUESTIONS

1. Why is it important for business managers to have a basic
understanding of the systems development process?
2. Briefly describe the role of a system user in the systems
investigation and systems analysis stages of a project.
3. You have decided to become an IS entrepreneur and
develop applications for the iPhone and other PDAs.
Describe what applications you would develop and how
you would do it.
4. Imagine that your firm has never developed an information
systems plan. What sort of issues between the business
functions and IS organization might exist?
5. You have been hired by your university to find an outsourcing
company to perform the universities payroll function.
What are your recommendations? Describe the
advantages and disadvantages of the outsourcing approach
for this application.
6. Briefly describe when you would use the object-oriented
approach to systems development instead of the traditional
systems development life cycle.
7. How important are communications skills to IS personnel?
Consider this statement: “IS personnel need a combination
of skills—one-third technical skills, one-third business
skills, and one-third communications skills.” Do you think
this is true? How would this affect the training of IS personnel?
8. You have been hired to perform systems investigation for
a French restaurant owner in a large metropolitan area. She
is thinking of opening a new restaurant with a state-of-theart
computer system that would allow customers to place
orders on the Internet or at Kiosks at restaurant tables.
Describe how you would determine the technical, economic,
legal, operational, and schedule feasibility for the
restaurant and its new computer system.
9. Identify some of the advantages and disadvantages of purchasing
a database package versus the DaaS approach.
10. You have been hired to design a computer system for a
small business. Describe how you could use environmental
design to reduce energy usage and the computer’s impact
on the environment.
11. Assume that you want to start a new video-rental business
for students at your college or university. Go through logical
design for a new information system to help you keep
track of the videos in your inventory.
12. Identify some of the advantages and disadvantages of purchasing
versus leasing hardware.
13. Identify some of the advantages and disadvantages of purchasing
versus developing software.
14. Identify the various forms of testing used. Why are there
so many different types of tests?
15. You have been hired to purchase a new billing and accounting
system for a medium-sized business. Describe how you
would start up the new system and place it into operation.
16. How would you go about evaluating a software vendor?
17. Assume that you have a personal computer that is several
years old. Describe the steps you would use to perform a
systems review to determine whether you should acquire a
new PC.
18. Describe how you would select the best admissions software
for your college or university. What features would
be most important for school administrators? What features
would be most important for students?

PROBLEM-SOLVING EXERCISES

1. You are developing a new information system for The Fitness
Center, a company that has five fitness centers in your
metropolitan area, with about 650 members and 30
employees in each location. This system will be used by
both members and fitness consultants to track participation
in various fitness activities, such as free weights, volleyball,
swimming, stair climbers, and aerobic and yoga classes.
One of the performance objectives of the system is that it
must help members plan a fitness program to meet their
particular needs. The primary purpose of this system, as
envisioned by the director of marketing, is to assist The
Fitness Center in obtaining a competitive advantage over
other fitness clubs. Use a graphics program to develop a
flowchart or a grid chart to show the major components of
your information system and how the components are tied
together.
2. For a business of your choice, use a graphics program to
develop one or more Use Case diagrams and one or more
Generalized/Specialized Hierarchy diagrams for your new
business using the object-oriented approach.
3. You have been hired to develop a payroll program for a
medium sized company. At a minimum, the application
should have an hours-worked table that contains how many
hours each employee worked and an employee table that
contains information about each employee, including
hourly pay rate. Design and develop these tables that could
be used in a database for the payroll program.

TEAM ACTIVITIES
1. Your team should interview people involved in systems
development in a local business or at your college or university.
Describe the process used. Identify the users, analysts,
and stakeholders for a systems development project
that has been completed or is currently under development.
2. Your team has been hired to determine the requirements of
a new medium-cost coffee bar to compete with higherpriced
coffee shops like Starbucks. The new coffee bar will
offer computer kiosks for customers to surf the Internet or
order coffee and other products from the coffee bar. Using
RAD and JAD techniques with your team, develop requirements
for this new coffee bar and its computer system.
3. Your team should perform a systems review of a computer
application being used at your college or university. Include
the strengths and weaknesses of the computer application
and describe how it could be improved from a student perspective.

WEB EXERCISES

1. Use the Internet to find two different systems development
projects that failed to meet cost or performance objectives.
Summarize the problems and what should have been done.
You might be asked to develop a report or send an e-mail
message to your instructor about what you found.
2. Cloud computing, whereby applications like word processing
and spreadsheet analysis are delivered over the Internet,
is becoming more popular. You have been hired to analyze
the potential of a cloud computing application that performs
payroll and invoicing over the Internet from a large
Internet company. Describe the systems development steps
and procedures you would use to analyze the feasibility of
this approach.
3. Using the Web, search for information on the advantages
and disadvantages of environmental design. Write a report
on what you found

CAREER EXERCISES

1. Pick a career that you are considering. What type of information
system would help you on the job? Perform technical,
economic, legal, operational, and schedule feasibility
for an information system you would like developed for
you.
2. Research possible careers in developing applications for
iPhones, other smartphones, and PDAs. Write a report that
describes these opportunities. Include in your report applications
that aren’t currently available that you would find
useful.

CASE STUDIES
Case One

Hotwire.com Gains Control of Hotel Partner
Information
Hotwire.com advertises four-star hotels at two-star prices
throughout North America and Europe. By building
businesses partnerships with more than 7,000 hotels across
North America, Hotwire assists its hotel partners in filling
otherwise empty rooms and helps its customers by finding
them rates discounted by as much as 60 percent.
Hotwire maintains a wealth of information about each of
its 7,000 hotel partners. Besides basics such as location,
amenities, customer reviews, and prices, it also maintains
information about the number of available rooms. Much of the
information Hotwire tracks changes frequently. Maintaining
accurate and up-to-date information is a key to success in this
highly competitive business.
Until recently, Hotwire maintained its hotel information on
shared Excel spreadsheets. Hotwire employees kept the
information up to date by accessing the shared spreadsheets
over the corporate network. Various applications drew
information from the spreadsheets to provide Hotwire the
information it needed to provide its customers with deals.
Unfortunately, the system was prone to errors and extremely
difficult to maintain.
Hotwire systems analysts considered the problem and
possible solutions. The data that the system manipulated was
well defined, as were the processes that were applied to the
data. The problem lay in the manner in which the data was
stored and accessed.
It was clear to Hotwire analysts that a centralized
database-driven system would allow Hotwire to gain better
control over its data. Hotwire analysts considered costs and
benefits of designing its own database and DBMS compared
to outsourcing the service to a provider. Upon evaluation of
the requirements for the system, they discovered that the data
Hotwire was managing could be easily managed by a
Customer Relationship Management (CRM) system, even
though its partner hotels were not exactly customers.
Hotwire systems analysts evaluated a variety of CRM
solutions and found the one from Salesforce to be most
effective and feasible in terms of cost and technology. The
Salesforce CRM allows Hotwire employees to access hotel
data through a user-friendly Web-based interface from any
Internet-connected computer. Hotwire data is securely
stored and maintained on Salesforce servers, relieving
Hotwire of that costly responsibility. Hotwire system
engineers customize the CRM to deliver the information and
reports needed by Hotwire managers and systems.
The new system has improved data reliability and
accuracy, allowing better management of the information,
happier customers, and improved relationships with Hotwire
partners.

Discussion Questions

1. How do you think system engineers determined that it was
a good time to invest in this information systems
development project?
2. What benefits did Salesforce provide Hotwire.com over its
previous system?

Critical Thinking Questions

1. What considerations are required in deciding whether to
host your own system or outsource to a vendor like
Salesforce?
2. How can Hotwire gauge the success of this information
systems development project?
SOURCES: “Hotwire Uses Salesforce CRM to Keep Tabs on More Than 7,000
Hotel Partners Across North America,” Salesforce success stories,
www.salesforce.com, accessed May 25, 2010; Salesforce CRM Web site,
www.salesforce.com/crm/products.jsp, accessed May 25, 2010; About
Hotwire, www.hotwire.com/about-hotwire/press-room/factSheet.jsp,
accessed May 25, 2010.

Case Two

Russian Sporting Goods Chain Scales Up Budgeting
System
The Sportmaster Group is the largest sporting goods chain in
Eastern Europe. It handles Sportlandia and Columbia brands
and more than 200 other trademarks, including its own.
When Sportmaster was established, its CIO decided to
build a budget planning system in house. The system was built
with Excel spreadsheets and was well suited for a young startup
business. But in recent years, with stores spread across
Eastern Europe, the executives at Sportmaster Group wanted
to gain better control of their budgets and use their financial
information to make wise strategic decisions. Due to the large
amount of data involved, using the current Excel-based
system had become burdensome, and the information
provided was too limited to support corporate needs.
In the process of system maintenance and review,
Sportmaster realized that to move to the next stage of growth,
it needed to move to information systems used by large global
corporations. In researching packages from a variety of
vendors, the company settled on software from Cognos, an
IBM company. To customize the Cognos software for its own
needs, Sportmaster hired a company named IBS.
Sportmaster chose IBS because it was a certified Cognos
vendor and had experience working with Russian companies.
IBS consultants met with Sportmaster executives and
information systems staff to discuss the expectations for the
new budget analysis system. They worked on site so they
could test prototypes on actual corporate data and have their
progress reviewed by Sportmaster to confirm that they were
on target.
The resulting system met the following goals defined by
Sportmaster. According to the Cognos case study, the system
could perform the following tasks:
Create a basic gross profit budget
Create budgets for investment activity, including opening
new stores and capital investments
Create an operating expenses budget for all corporate
divisions, including more than “500 centers of responsibility”
Create specialized budgets, including a consolidated Revenue
and Expenditure Budget, a Cash-Flow Budget, and
a Balance Sheet of Payables and Receivables
Create a Revenue and Expenditure Budget for the
divisions
Integrate with external accounting systems
Sportmaster used a parallel start-up method, introducing the
new budget planning and accounting system, keeping the old
system available as a backup. After six months of successful
use and a few tweaks to perfect the system, the company now
fully depends on the new system and is enjoying its benefits.
Sportmaster can access highly detailed budget reports that
assist in making strategic decisions. The process for creating
budget reports has been simplified, and the duration of the
budget cycle is shortened. Operations that used to take days
are now accomplished in near real time. Most important is
that the reliability of the data is improved so that budget errors
are minimized.

Discussion Questions

1. What motivated Sportmaster to start an IS project to build
a new budget planning and accounting system?
2. What steps did the development team take to make sure
that the project was completed in minimum time while
meeting the company’s needs?

Critical Thinking Questions

1. How can the level of detail of the information provided by
a budget planning and accounting system affect a
company’s decision-making capability?
2. Why do you think Sportmaster decided to outsource the
systems development project rather than work in house?
SOURCES: Cognos Staff, “Sportmaster Group,” Cognos Case Study,
www-01.ibm.com/software/success/cssdb.nsf/CS/ABRR-7WEBZ3?
OpenDocument&Site=corp&cty=en_us, accessed March 3, 2010.

Questions for Web Case

See the Web site for this book to read about the Altitude Online
case for this chapter. Following are questions concerning this
Web case.
Altitude Online: Systems Investigation and Analysis
Considerations

Discussion Questions

1. What important activities did Jon’s team engage in during
the Systems Investigation stage of the Systems
Development Life Cycle?
2. Why are all forms of feasibility considerations especially
important for an ERP development project?

Critical Thinking Questions

1. Why is the quality of the systems analysis report crucial
to the successful continuation of the project?
2. Why do you think Jon felt the need to travel to
communicate with Altitude Online colleagues rather than
using e-mail or phone conferencing? What benefit does
face-to-face communication provide in this scenario?
Altitude Online: Systems Design, Implementation,
Maintenance, and Review Considerations

Discussion Questions

1. How did Jon’s team coordinate with the vendor in the
implementation stage of the systems development
project?
2. What did Jon’s team do in advance of contacting SAP that
made the design and implementation systems proceed as
smoothly as possible?

Critical Thinking Questions

1. What risks were involved in the systems development
project?
2. What benefits were gained from this systems
development project? Was it worth the risks?


PART 05 Information Systems in Business and Society
Chapter 9 The Personal and Social Impact of Computers

CHAPTER 9: SELF-ASSESSMENT TEST ANSWERS
(1) True (2) costs, profits (3) monitoring (4) False (5) social
engineering (6) cyberterrorist (7) Federal Trade Commission
(8) Geographic Information Systems (9) False (10) d (11) variant
(12) False (13) Security dashboard (14) formation of blood
clots in the legs or lungs (15) True

REVIEW QUESTIONS

1. What does the CAN-SPAM Act specifically allow?
2. What is a potential danger of using spam filters?
3. According to the 2009 FBI Internet Crime Report, how
much did computer crime increase between 2008 and
2009?
4. What is social engineering?
5. Briefly discuss the seriousness with which the U.S. federal
government views cyberterrorism.
6. How do you distinguish between a hacker and a criminal
hacker?
7. Why are insiders one of the biggest threats for company
computer systems?
8. What is a virus? What is a worm? How are they different?
9. What is vishing? What actions can you take to reduce the
likelihood that you will be a victim of this crime?
10. What is filtering software? Why would organizations use
such software?
11. What does intrusion detection software do? What are some
of the issues with the use of this software?
12. What is the difference between a patent and a copyright?
What copyright issues come into play when downloading
software or music from a Web site?
13. What is a John Doe lawsuit? How would such a lawsuit
arise?
14. What is ergonomics? How can it be applied to office workers?
15. What specific actions can you take to avoid spyware?
16. What is a code of ethics? Give an example.

DISCUSSION QUESTIONS

1. Discuss how policies and procedures can help prevent computer
waste and mistakes.
2. Discuss at least three examples of the computer being used
as a tool to fight crime.
3. Identify the risks associated with the disposal of obsolete
computers. Discuss the steps that one must take to safely
dispose of personal computers.
4. Identify five strong measures organizations can take to
safeguard against the theft of computer hardware and the
data stored on it.
5. Briefly discuss software piracy. What is it, how widespread
is it, and who is harmed by it?
6. Identify and briefly discuss three acts of Congress that were
implemented to limit children’s exposure to online pornography.
7. Imagine that your friend regularly downloads copies of
newly released, full-length motion pictures for free from
the Internet and makes copies for others for a small fee. Do
you think that this is ethical? Is it legal? Would you express
any concerns to him?
8. Outline an approach, including specific techniques (e.g.,
dumpster diving, phishing, social engineering), that you
could employ to gain personal data about the members of
your class.
9. Your 12-year-old niece shows you a dozen or so photos of
herself and a brief biography, including address and cell
phone number that she plans to post on Facebook. What
advice might you offer her about posting personal information
and photos?
10. Imagine that you are a hacker and have developed a Trojan
horse program. What tactics might you use to get unsuspecting
victims to load the program onto their computer?
11. Briefly discuss the potential for cyberterrorism to cause a
major disruption in our daily life. What are some likely
targets of a cyberterrorist? What sort of action could a
cyberterrorist take against these targets?
12. Do you believe that the National Security Agency should
be able to collect the telephone call records of U.S. citizens
without the use of search warrants? Why or why not?
13. Using information presented in this chapter on federal privacy
legislation, identify which federal law regulates the
following areas and situations: cross-checking IRS and
Social Security files to verify the accuracy of information,
customer liability for debit cards, your right to access data
contained in federal agency files, the IRS obtaining personal
information, the government obtaining financial
records, and employers’ access to university transcripts.
14. Briefly discuss the differences between acting morally and
acting legally. Give an example of acting legally and yet
immorally.

PROBLEM-SOLVING EXERCISES

1. Access the Web sites for the Recording Industry Association
of America (RIAA), Motion Picture Association of America
(MPAA), and Business Software Alliance (BSA) to get estimates
of the amount of piracy worldwide for at least five
years. Use a graphics package to develop a bar chart to show
the amount of music, motion picture, and software piracy
over a five-year time period.
2. Using spreadsheet software and appropriate forecasting
routines, develop a forecast for the amount of piracy for
next year. Document any assumptions you make in developing
your forecast.
3. Do research on recent changes to the USA Patriot Act. Use
presentation software to document these changes and
present your position on the impact and legitimacy of these
changes.

TEAM ACTIVITIES

1. The Digital Due Process Coalition includes the Internet’s
largest online service providers, such as Google, Microsoft,
Facebook, AOL, and eBay, as well as social organizations
such as the ACLU and the Bill of Rights Defense
Committee. The Coalition is pushing for updates in the
nation’s electronic privacy law, the 1986 Electronic
Communications Protection Act. Do research to find out
more about this organization and the four principles it
wants to see implemented in new or revised privacy legislation.
Prepare to debate either side of this statement: the
Digital Due Process Coalition is doing worthwhile work to
improve the privacy of electronic data.
2. Have each member of your team access ten different Web
sites and summarize their findings in terms of the existence
of data privacy policy statements. Did the site have such a
policy? Was it easy to find? Was it complete and easy to
understand? Did you find any sites using the P3P standard
or ICRA rating method?

WEB EXERCISES

1. Do research on the Web and find information about efforts
being taken to speed up and improve the patent application
process. What are the forces that are driving these changes?
Write a brief report summarizing your findings.
2. Do research on the Web to find the latest information about
Google’s ongoing battle with China over the filtering of
Internet search results. Write a brief report documenting
your findings. Do you think that Google has acted in an
ethical manner in regards to its response to China’s request
to filter search results?
3. The Computer Emergency Response Team Coordination
Center (CERT/CC) is located at the Software Engineering
Institute (SEI), a federally funded research and development
center at Carnegie Mellon University in Pittsburgh,
Pennsylvania. Do research on the center and write a brief
report summarizing its activities.

CAREER EXERCISES

1. You are a senior member of a marketing organization for a
manufacturer of children’s toys. A recommendation has
been made to develop a Web site to promote and sell your
firm’s products as well as learn more about what parents
and their children are looking for in new toys. Develop a
list of laws and regulations that will affect the design of the
Web site. Describe how these will limit the operation of
your new Web site.
2. You have just begun a new position in customer relations
for a retail organization that sells its products both online
and in brick-and-mortar stores. Within your first week on
the job, several customers have expressed concern about
potential theft of customer data from the store’s computer
databases and identity theft. Who would you talk to within
your organization to develop a satisfactory response to
address your customers’ concerns? What key points would
you need to verify with the store’s technical people?

CASE STUDIES

Case One

The ‘My SHC Community’ Privacy Disaster
Sears Holdings Corporation is the third largest retailer in the
U.S., owning both Sears Roebuck and Kmart. Like all
retailers, Sears is heavily invested in marketing research.
Discovering customers’ interests and purchasing habits is
essential to successful marketing and sales campaigns.
Gathering data on customer interests can be difficult. The
Internet helps considerably by allowing businesses to analyze
the actions of visitors on their sites. Though helpful, Web
analytics provide only a small glimpse into the online activities
of customers; businesses cannot see what users do
elsewhere on the Web. Some businesses have tried, typically
with disastrous effects, to track users around the Web. For
example, online advertiser DoubleClick was charged with
violations of privacy laws when it placed ads on many Web
sites to track users’ movements around the Web. More
recently, Facebook has been scrutinized for its Open Graph
technology that allows it and its partners to track users’
movements around the Web.
Sears Holdings Corporation (SHC) took its stab at tracking
customers’ online activities through a program it called My
SHC Community. Customers of Sears and Kmart were
different.” My SHC was framed as a “dynamic and highly
interactive online community” where “your voice is heard and
your opinion matters, and what you want and need counts!”
Members were asked to install “research software” on their
computers that would allow SHC to track their online
browsing. To further entice customers to participate, SHC
paid them $10 each.
After operating for several months, technology analysts
discovered that the SHC “research” software collected a lot
more information than users were aware of. It not only
tracked URLs of Web pages visited, but also information typed
into secure online forms. Such information included user
names and passwords, credit card numbers, online shopping
cart contents, essentially everything the user typed and every
page the user visited. When Harvard Business School
Assistant Professor Ben Edelman learned of the situation, he
accused SHC of distributing spyware. Shortly thereafter, the
Federal Trade Commission (FTC) took up the case.
The FTC found that Sears Holdings did not sufficiently
notify its customers about what information was being
gathered by the software. The only notice of what the software
actually did was buried on page 10 of the software license that
users may have glanced at before installing the software.
The FTC ordered Sears Holdings to discontinue
distribution of the software, destroy all data gained from the
experiment, and to stop collecting data from copies of the
software still running on customer computers. Additionally,
should Sears Holdings decide to attempt a similar experiment
in the future, it must "clearly and prominently disclose the
types of data the software will monitor, record, or transmit.
This disclosure must be made prior to installation and
separate from any user license agreement. Sears must also
disclose whether any of the data will be used by a third party."
Sears Holdings has stated that while the software did
collect sensitive user information, the company made
“commercially viable efforts automatically to filter out
confidential personally identifiable information such as user
ID, password, credit card numbers, and account numbers,
and made commercially viable efforts to purge our database
of any such information if it was collected inadvertently.”

Discussion Questions

1. What plan did Sears Holdings implement to gain more
insight into customer’s online shopping behavior?
2. Why was the plan considered by a Harvard Law Professor
and the FTC to be unethical and unlawful?

Critical Thinking Questions

1. If Sears Holdings had implemented its plan in accordance
with FTC guidelines, do you think any customers would
have been willing to sacrifice their privacy for $10?
2. What other methods might Sears Holdings and other
companies consider implementing to gather information
about customers’ online habits and interests?
SOURCES: Anderson, Nate, “FTC forces Sears, Kmart out of the spyware business,”
Ars Technica, www.arstechnica.com, September 13, 2009; McMillan,
Robert, “Researcher Accuses Sears of Spreading Spyware,” PCWorld,
www.pcworld.com, January 2, 2008; My SHC Community Web page,
www.myshccommunity.com, accessed June 26, 2010.

Case Two

U.S. Fights Fraud with Personal Certificates
One of the goals of the Obama administration has been to
improve national information security to better protect the
nation’s infrastructure. Toward this goal, the President
created a new post in his administration called the
Cybersecurity Coordinator, appointing Howard Schmidt to the
position.
One of Schmidt’s first assignments was to develop a plan
to effectively fight Internet fraud. Internet fraud is the most
common type of Internet crime, covering a range of scams in
which a buyer or seller assumes a false identity to trick
someone out of money or merchandise. According to the FBI’s
Internet Crime Complaint Center, Internet fraud reports
increased by 22.3 percent in 2009, with losses totaling close
to $560 million. Among the most popular forms of fraud in
2009 were e-mail scams that used the FBI name to gain
information (16.6 percent), undelivered merchandise or
payment (11.9 percent), and advanced fee fraud (in which
targets are asked to pay upfront) (9.8 percent). The one fact
that is consistent across all cases of fraud is the use of a false
identity. If real identities were used, the fraudsters would be
caught.
Cybersecurity Coordinator Howard Schmidt has proposed
a plan by which those involved in online transactions can be
positively identified. Because credit cards and bank account
numbers can be easily stolen and used by fraudsters,
Schmidt’s plan requires the possession of a smart identity
card or digital certificate to buy and sell online.
The notion of national ID cards has been struck down by
privacy advocates in the past, so Schmidt made his proposal
a voluntary one. According to a draft plan, those who wish to
authenticate their transactions would be able to acquire a
secure identifier from a variety of service providers. Schwartz
emphasizes that the system will balance efforts to maintain
privacy while still collecting enough information about the
card owner to ensure his identity.
Security vendors believe that the technology is already
available for Schmidt’s plan. For example, Google and
Microsoft already have “single sign-on” systems for which
people can use their credentials to sign on to partner sites. In
this scenario, Google or Microsoft maintains information
about the user, while the partner sites are not provided access
to that private information. A similar system could be used for
online transaction authentication. What is needed is a national
push for standards so that businesses and consumers can
invest in a technology with some assurance that it will be long
lasting.
Security experts have expressed skepticism that a
voluntary system will be effective. Some argue that unless all
Internet users are required to use the system, many
transactions will remain vulnerable. The government must
walk a fine line between privacy and ensuring secure
transactions. Only time will tell what type of authentication
system will be regarded as acceptable to government,
consumers, and businesses.

Discussion Questions

1. Why does the U.S. government think it’s necessary to
intervene in online transactions?
2. Why might the use of digital certificates or smart identity
cards to fight Internet fraud be controversial?

Critical Thinking Questions

1. How might a digital certificate or smart identity card
system be implemented so that individuals’ privacy is
maintained and yet transactions are made more secure?
2. What ways might a smart card system backfire or present
other security or privacy concerns?
SOURCES: 2009 IC3 Annual Report, IC3 Web site, www.ic3.gov/media/annualreport/
2009_IC3Report.pdf, accessed July 15, 2010; Baldor, Lolita, “White
House Unveils Cybersecurity Plans,” NewsFactor Network,
www.newsfactor.com, June 29, 2010; Stokes, Jon, “White House wants to help
you ‘blog Anonymously’,” Ars Technica, www.arstechnica.com, June 29, 2010;
Markoff, John, “Taking the Mystery Out of Web Anonymity,” New York Times,
www.nytimes.com, July 2, 2010.

Questions for Web Case

See the Web site for this book to read about the Altitude Online
case for this chapter. Following are questions concerning this
Web case.
Altitude Online: The Personal and Social Impact of
Computers

Discussion Questions

1. Why do you think extending access to a corporate network
beyond the business’s walls dramatically elevates the risk
to information security?
2. What tools and policies can be used to minimize that risk?

Critical Thinking Questions

1. Why does information security usually come at the cost of
user convenience?
2. How do proper security measures help ensure
information privacy?


For The Students Who Need Grade ‘A’ In Their Studies

Hi, hope you are having a great day…
We are a group of 24 writers having profound expertise in Business and Computer Science subjects. We can help you score A grade in your Accounting, Marketing, Finance, Economics, Management, Mathematics, Statistics, Information System, System Modeling, C++, Java Programming, Network Administration, Enterprise Administration, Database, Web Design, Networking, Internetworking, Data warehouse etc…
We can also provide help with Psychology, Nursing, Health, History, English Literature, Political Science, Ethics, Humanity etc classes.
We can help with essays, term papers, research papers, dissertation, Ilabs, mymatlab, Wileplus, quizzes, exams, discussion questions etc.
You can expect:
We understand each student has different requirement and we tend to treat each student according to his/her satisfaction.
We will provide original assignments, plagiarism free and to custom requirement.
We will always meet deadlines.
Our support will be 24/27, even in holidays.
Our pricing will be fair.
We will do free revisions if you want to make changes in provided work.
Email us for more information, query and quote.

WHISPERHILLS@GMAIL.COM





No comments:

Post a Comment