What is business information value chain

Assignment Help Management Information Sys
Reference no: EM132240907

Assignment

The questions below are based on various case studies of the transformational role of IT, contained in the following four articles. The first listed article contains 4 case studies, each corresponding to a separate business unit of a high-tech firm. The subsequent three articles contain 1 case study each.

Address the 5 questions below, in the context of ANY SIX of the following 7 cases.

(The first article contains 4 case studies. (( political Article )), and the other three articles contain a single case study each.)

QUESTIONS

Consider the following two claims made in the textbook -

"There is a growing interdependence between a firm's ability to use information technology and its ability to implement corporate strategies and achieve corporate goals."

"To fully understand information systems, you must understand the broader organization, management, and information technology dimensions of systems and their power to provide solutions to challenges and problems in the business environment."

Discuss whether or not each of your chosen six case studies provides empirical support for the above two claims. (You need to show, by means of comprehensive review and discussion of the available facts in the case studies, how they do or do not uphold each claim.)

2) Business processes

Which specific business processes and/or management activities in the "business information value chain" (Fig. 1-7 of the text) comprise the focus of the IT efforts in each of your chosen six firms/business units?

(Be sure to independently research and study "business processes" in detail from extraneous sources before answering this question -- go beyond the textbook figure, as it depicts only a few generic examples of business processes.)

For each firm/business unit, do the business processes and management activities you identified above seem to be well supported by its information processing activities? Explain your reasoning.

3) Which "strategic business objectives" of information systems are evident in each case study? Discuss.

4) What kinds of ethical issues (refer to Chapter 4) are evident in each case study, even if not mentioned explicitly? Discuss.

5) Which types of e-commerce (refer to B2C, B2B, C2C, G2C, G2B, etc., in Chapter 10), if any, are evident in each case study, even if not mentioned explicitly? Discuss.

Reference no: EM132240907

Questions Cloud

Analyze access control best practices : Analyze access control best practices and determine the best strategy for LOTR to implement.
Summarize the process to implement the cis controls : Out of the list of twenty controls, pick the top two pertinent controls that every company should implement. Explain your reasoning.
Should the housecleaner stay self-employed : She knows that if she worked for a cleaning service they would pay her $26,000 and she would have no expenses. Should the housecleaner stay self-employed?
Develop the ideas and concepts you chose to examine : For this project assignment, you will submit your Literary Analysis paper on the assigned novel selected for the course, which should focus on three or more.
What is business information value chain : Which "strategic business objectives" of information systems are evident in each case study? Discuss.
What suggestions for strategy will you make : While analyzing a recent customer survey, you have discovered that there has been a 5% decrease in loyal customers from two years ago.
Why is it beneficial to put a price on mortality : Why is it beneficial to put a price on mortality and morbidity? What do you think the downside or possible negative implications of doing this are?
Define what are the first visual elements that you see : When analyzing the viewer's sensory response to a particular visual, it is important to consider the visual elements that attract the eyes.
What is consumer a price elasticity : What is Consumer A's price elasticity and is he more or less elastic than Consumer B?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify challenges you found in the design

Identify challenges you found in the design and implementation of the "System of Systems Software" portion of this week's instruction.

  Explain how a file system type differs from others

Select three of the most common types of file systems and describe the security features of each file system type.

  Determine the identity and access management practices

For a small- to medium-sized business concerned about IT budget, determine the identity and access management practices you would recommend.

  How bi can help developing countries

How BI can help developing countries. Give specific examples of BI components/concepts and cite specific use by retailers.

  How will barnes and noble earn money

E-commerce - (Revenue model) how will Barnes & Noble earn money? E-commerce - (Market opportunity) what marketplace does Barnes & Noble intend to serve, and what is its size?

  What are the best ways to patch systems

Continuous monitoring is a security framework that the federal government has directed each of its agencies to comply with by reporting its vulnerability assessment and security posture on a regular basis. How can this be achieved? What are things..

  Strategies that competitors can use with a computer company

strategies that competitors can use with a computer company using a proprietary operating system1. discuss whether

  Summarize a customer success story of an organization

What functions does Open Text provide that can augment and assist customer relationship management (CRM) systems?

  Design a network infrastructure for their two campuses

There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

  Explain the basic make-up for a computer

Computer and Functions - List and explain the basic make-up for a computer and the function each performs. Identify and describe the two types of software.

  Identify emerging it trends through scholarly or trade

Identify emerging IT trends through scholarly and/or trade literature. Understand the impact of innovative IT solutions on business.

  Explain the necessity of a hacker concealing his actions

Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd