How cloud and mobile computing have affect business process

Assignment Help Management Information Sys
Reference no: EM131242228

Assignment

Part 1

Do you ever use the Internet for personal use at work? Do you check your home email, order items online, chat with friends? If so, you're not alone! Most of us do to some extent. Such use of company time and resources for personal reasons is on the rise. When we do this, we are engaged in "service theft."

Companies are in business to make profits. As business and IT managers, we should be concerned with the loss of time and employee productivity as well as the use of company resources. As a result, most companies monitor employees while at work. Modern technology makes monitoring employees relatively easy. Is this good business sense?

Not only are companies concerned about lost work time and security leaks, companies are also concerned about bandwidth. Calculate how much bandwidth you consume when using the Internet every day. How many e-mails do you send daily and what is the size of each? (Your e-mail program may have e-mail file size information.) How many music and video clips do you download daily and what is the size of each? If you view YouTube often, surf the Web to find out the size of a typical YouTube file. Add up the number of e-mail, audio, and video files you transmit or receive on a typical day. You might be surprised.

This Interactive Session Case, "Monitoring Employees on Networks" is found in Chapter 7 in your textbook.

Read this case carefully and then proceed with this Case Assignment. Insert your answers directly under each item. Name your file Unit 2 Case and include your last name in the file name (Smith 2 Case). Remember to write in complete sentences. If you use an outside resource, and you most likely will, remember to cite this source with APA format.

• Should managers monitor employee e-mail and Internet usage? Why or why not?

• Describe how your company or a company where a friend or family member works monitors employees.

• From a manager's perspective, is this monitoring effective? From an employee's perspective, is this monitoring fair? What recommendations do you have for this company?

• Describe the security problems that are created by employees.

• What are some special concerns about security with remote employees and employees who use wireless equipment?

• Describe an effective e-mail and Web use policy for a company. What would you include? How would you explain this policy to your employees?

Part 2

Copy and paste these questions into a Word document so you can insert your responses directly under each question. Name your file Unit 2 Review and include your last name in the file name. (Smith U2 Review)

You should work on this assignment as you go through the assigned readings and chapters in your textbook. Avoid copying directly from the text. Your responses should be in your own words, with your own thoughts, opinions, interpretations, examples, and conclusions.

If you take information from the text (and you will), you must cite the book as your resource. If you take text directly from our book, you must put this text in quotation marks and cite our book as your resource.

Chapter 5

1. Define the term Information Technology (IT) infrastructure.

2. IT Infrastructure includes hardware, software and services that are shared across the entire firm. Give an example of each.

3. Explain how cloud and mobile computing have affected business processes.

4. Explain what is meant by this interpretation of Moore's Law: The power of microprocessors increases while the price decreases.

5. Communication costs have decreased. How has this decrease affected business processes?

6. Define these terms Unix and Linux. Why are they useful to business?

7. Define the term virtualization and explain the importance of virtualization to how a firm operates. What is the leading virtualization software vendor?

Chapter 7

1. Define VoIP and explain how firms use VoIP to increase productivity.

2. What is search engine optimization (SEO)? Why is SEO important to businesses?

Chapter 8

1. A LAN is a local area network. Why are LANs and Wi-Fi networks vulnerable to hackers?

2. What is pharming?

Reference no: EM131242228

Questions Cloud

Describe the marketing mix for one of disney''s franchises : Do a brief market opportunity analysis for Disney, identifying the major markets that Disney has expanded into.
What is the minimum amount of electric power : A refrigerator in a room at temperature 75 F is to operate with inside temperature 35 F and a cooling power (i.e., the rate at which heat is removed from the inside) of 500 W. What is the minimum amount of electric power needed to run this refrige..
Why you think the company is involved with the activities : Look in your textbook and your notes to help you define what might be consideredsocially responsible activities. Describe what you find and explain why you think the company is involved with the activities you describe.
How much electrical energy is required : A heat pump has COP = 4.0 and is used to deliver heat energy of 500 MJ to a house in one day. (a) How much electrical energy is required to provide the work needed by the heat pump?
How cloud and mobile computing have affect business process : Explain how cloud and mobile computing have affected business processes. Explain what is meant by this interpretation of Moore's Law: The power of microprocessors increases while the price decreases.
What is the legal definition for sexual harassment : What is the legal liability for 1995 Auto Corp. if the EEOC investigation finds the charge to be factual with employer knowledge of the events? Consider the options of mediation versus litigation with regard to organizational cost.
What is the kinetic energy of the electron : An electron with electric charge of1.610-19C falls through a potential difference of36kV in the vacuum of anX-raytube. What is the kinetic energy of the electron, assuming it started from rest and that there is no loss of energy to friction? (Note..
Evaluate how effective you think the information you find : Evaluate how effective you think the information you find is in terms of how it is presented, what impact it might have and whether it will help to sell the company's products. Be sure to support any claims you make.
How could you consult with others to ensure the strategic : Discuss how you would undertake environmental analysis to consider the effect of new technology and emerging practices and trends on job roles and job technology.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What potential effects might crisis have on an organization

What potential effects might a crisis have on an organization? Explain your answer. What are the benefits of an organization developing a proactive crisis management plan? Explain your answer.

  Evaluate alternatives to the company self-hosting the site

Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

  Defensive and offensive measures to frustrate the attacker

Handling attackers to ensure that the application behaves appropriately when being directly targeted, taking suitable defensive and offensive measures to frustrate the attacker

  What are the risks associated with securing confidentiality

What are the risks associated with securing confidentiality, integrity, and availability of electronic information systems?  How are these three elements inter-related?

  Components of the supply chain

Examine the place where you currently work and identify a single service or product produced by your organization (if unemployed discuss your last place of employment).

  Which type of network treats all processors equally

Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?

  Determine whether or not you believe the threat landscape

From the first e-Activity, explain from your perspective why hacktivism is a growing concern for companies and security professionals. Determine whether or not you believe the threat landscape is trending more toward targeted attacks and away fro..

  Your new corporate cio has devised a nine-point mission

your new corporate cio has devised a nine-point mission statement for the company. as one of the operations managers in

  How your presence will benefit the company

As an individual, take the list that was developed in your Week Two Learning Team Collaborative discussion and match those skills with the skills that you expect to have after completing your degree to determine where you fit on an evaluation team..

  Analysis and design of information systems development

CSE2ISD - Information Systems Development - Object-Oriented Analysis and Design for ISD - Apply object-oriented methodology for analysis and design of information systems development in a case study.

  Discuss some of ethical and social issues facing business

Social & Ethical: Discuss some of the current social and ethical issues in today's world. Discuss some of ethical and social issues facing business and users

  Show the role of information systems

Information Systems Role - Show the role of information systems in achieving excellence in healthcare service.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd