Free Essay

Cis 500

In: Computers and Technology

Submitted By Jamestoni1
Words 2846
Pages 12
CIS 500 Weeks 6, 7, 8,9,11 Discussion Questions
Week 6 * Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have been experienced by the financial services industry as a result of mobile banking.
Phishig – Is when malware is downloaded on to a device and it attempts to obtain personal information. It lies in wait and gathers information from apps such as a mobile banking app to gain your login and password. If you bank does not have proper security in place this can lead to your account getting hacked and loss of money.
Smishing- This is where fraudulent communication occurs in the form of a text message in order to obtain personal information.
Vishing – This is similar to smishing instead of getting information through text it is obtained through phone calls or voicemails.
Cloning- The transfer of information from one device to another device including the electronic serial number
When a smartphone is lost or stolen this can lead to a compromise to a person’s personal information since it may be on the phone. I bank with Bank of America and use the mobile app to manage my account transfer funds, pay bills, deposit checks and so on. The app does not store the password but it does store the user login. You are unable to just log in to it from a new device or location without verify your identity. This is the form of know the image chosen when you started the account as well as answering security question and entering a verification code that is texted to the phone number that was used to set up the account. I am not saying that this prevents any of the above threats from happening but it does make it much more difficult for your account to be hacked. Many mobile devices come with apps on them that will wipe the information on the device if it lost or stolen. You can also call you service provider to do this as well if the option is available.

* Personal data assistants (PDAs), iPads, and e-Readers have the capability to wirelessly connect to online stores so that their users can purchase books, music, games, read e-Books, read the news, and perform a myriad of other tasks. Describe and assess the impact of these devices on newspapers, paper books, music CDs, gamesDVDs, etc.
With devices such as PDAs, iPads and e-Reader becoming more popular they are impacting the sales of newspaper, paper books, music CDs and games DVDs in positive and negative ways. When it comes to music industry it has increased sales. Those sales may not be in cd sales but in digital downloads of songs and or albums. It gives the customer to download certain songs if they do not like the whole album. It also allows for quicker sales on release day since they can just log on to iTunes or what every app they are using to download the song the moment is available. This hold true for eBooks and games as well, no more waiting in lines at midnight to purchase an item you can get it from the comfort of your own home. I am sure that this has reduced the sale at small bookstores who probably already struggle to compete against large chains such as Barnes and Noble. Even though many people are buying more and more eBooks it doesn’t change the fact that some people buy both. There will still be a need for paper backs since you can’t go get your eBook autographed by the author. A lot of people enjoy reading the paperback book over the eBook. This is also true with games weather they are console of PC. Many people buy the actual game instead of the digital version because they get special items. Like with many PC games you can get the collector’s edition which offer special in game bonuses as well as books soundtracks and other things. I don’t think that the digital format will completely replace the paper or disk version but I do think it has helped increase the sales of books games and music and has allowed for the reintroduction of classics.
Week 7 * Just-in-time (JIT) software is unable to foresee delivery problems resulting from bad weather, labor strikes, etc. Assess how a company using JIT inventory management software should mitigate delivery problems.
There needs to be a manual override that can make adjustment in the event of bad weather, labor strikes or other unforeseeable issues. Mangers that use this software need to keep up on the weather and news involving the companies they receive parts from and the events that are happing around them. Normally bad storms do not come out of nowhere so you can order parts prior to its arrival to compensate if you are manufacturing or send out orders early. Have a backup suppliers set up in the event that for whatever reason you cannot get product from your primary supplier. Have an emergency plans set in place that take into account varies common scenarios.

* An increasing number of retailers have installed self-checkout machines. Justify the installation of these machines in terms of costs management, efficiency, productivity, and trustworthiness of customers.

In regard to cost managing store that are opened 24/7 have dead times where they do not have a lot of business and they would have loss money due to wages With self-checkout you cut cost of having to pay someone to stand there to ring someone up. It also helps keep traffic flow of customers moving at check out. They way most self-checkout lines work you scan the item and you pace it in the bagging area which is on a scan that keep track of item being scanned and bagged. There is also a person at the self-scan area in case there is a problem or id has to be checked for alcohol and tobacco products they also so keep an eye out to make sure no one is stealing things. There are also security tags on high risk items to ensure that they are not stolen measures such as this ensures that products are not stolen.

* Loyalty programs are programs that recognize customers who repeatedly use services or buy products offered by a company. Examples include BI-LO’s Bonus Card, Kroger’s VIP card, frequent flyers, etc. Determine the risks associated with loyalty programs and identify the risk that is of most concern to you and why.
Pretty much every store has a loyalty program and they all require you to hand over personal information such as address, cell and/or home phone number, email, birthday, age and other demographics. Concerns with this are how is the information being used for do the company’s sale the information to other companies. Are there proper security measures in place to ensure that this data is not stolen?

* From the e-Activity, imagine you are a CTO of a large enterprise and have been tasked with choosing an ERP system for your organization. Compare and contrast commercial ERP systems to open source ERP systems focusing on flexibility and extensibility, supported platforms, support, and intellectual property issues. Describe the one you would choose and why.
I would go with commercial ERP to ensure that I have flexibility, extendibility, platform support, technical support. With open source you may encounter compatibly issues across platforms and security issues related to each. Even with the most commonly known open source software there may not have the flexibility need to do what you to do as well as you need may not have the support you get with a commercial product.
Week 8
From the e-Activity, determine the strategic advantages and disadvantages of using Customer Relations Management (CRM), services provided by vendors, such as Salesforce.com, with regard to analytics and forecasting, infrastructure maintenance, data mining, and availability for a business that cannot implement its own CRM system.
Advantages
* Analytics and forecasting can be used to generate report on sales and services * Scalability to go up or down as needed * Real-time data * Easily deployed once application are chosen

Disadvantages * Startup cost * Time lost training staff to use the product * May be difficult to integrate with current systems * Upkeep cost and upgrades

Businesses that employ CRM, Supply Chain Management (SCM), and Enterprise Resource Planning (ERP) for better decision making have a competitive advantage over businesses that do not. Assume that you are CTO of a large retail company that doesn’t use these tools. As part of the company’s IT strategic plans, the CEO would like to implement them. Suggest to the CEO how to effectively integrate these tools into the company. I would suggest that this system be implemented so that the company can stay competitive with others in the industry. Using the system will increase operations and communication. Arrange a meeting to discuss the possible change with leadership and explain what is need on their part to make this successful transition if they decide to go this route. Show how it has helped and worked for other businesses and how it can work for our company.
Software development can be a considerable part of a company’s software budget. Software may be developed in-house or outsourced. Outsourced development may be on shore or offshore. There have been heated debates on the best strategy of developing software. Take a strategic position on this debate. Create an argument for which method (in-house, onshore, and offshore software development) is the best in terms of cost, security, reliability, and intellectual property protection. Support your response. Outsourcing would be the most cost and time efficient when it comes to software development. With advances in technology and communication security and reliability is no longer a problem the way it has been in the past. As for intellectual property protection this too has change over the years and more laws and regulations have been put into place to protect this.

IT governance is concerned with organizational investments in IT and to ensure that the IT strategy delivers full value. The avoidance or prevention of IT strategic failures is the biggest part of IT governance. Describe at least two issues that drive IT governance. 1. Lack of accountability There needs to be a clear understanding of the roles and responsibilities of everyone. 2. Disconnect between management and IT. Management may not fully understand what is needed to implement or secure certain security measures or how to manage them and that can cause all kinds of problems. There need to be clear lines of communication between IT departments and mangers to ensure everyone is on the same page and following procedures
Week 9
Service Oriented Architecture (SOA) is an architectural style for building software applications that use services available in a network such as the Web. SOA is based on standard protocols such as Hypertext Transfer Protocol (HTTP), Simple Object Access Protocol (SOAP), etc. SOA services are consumed by client applications over the Internet. SOA exposes business services to a wide range of service consumers. Assess SOA in terms of business integration, security, interoperability, and IT infrastructure.
Service-Oriented Architecture
SOA is an architectural style for building software applications that use services available in a network such as the web. It promotes loose coupling between software components so that they can be reused. Applications in SOA are built based on services. A service is an implementation of well-defined business functionality, and such services can then be consumed by clients in different applications or business processes.
SOA allows for the reuse of existing assets where new services can be created from an existing IT infrastructure of systems. In other words, it enables businesses to leverage existing investments by allowing them to reuse existing applications, and promises interoperability between heterogeneous applications and technologies. SOA provides a level of flexibility that wasn't possible before in the sense that: * Services are software components with well-defined interfaces that are implementation-independent. An important aspect of SOA is the separation of the service interface (the what) from its implementation (the how). Such services are consumed by clients that are not concerned with how these services will execute their requests. * Services are self-contained (perform predetermined tasks) and loosely coupled (for independence) * Services can be dynamically discovered * Composite services can be built from aggregates of other services http://www.oracle.com/technetwork/articles/javase/soa-142870.html From everything that I have read SOA can work with current systems and is secure and easily added to an existing system. It has many apps available to suit the needs of a business.
A Web service is a set of technologies used for exchanging data between applications. Web services allow businesses to connect their processes to their business partners. This form of business integration results in Business Process Management (BPM) mashups. Assess the benefits of BPM mashups in terms of ease of integration, composition of services, and information sharing.
As stated on the Paga websites these are just a few benefits to BPM
Understanding — Migrating your processes onto a BPM platform can serve as the impetus to deeper understanding of your operations and the strengths and weaknesses of your current processes.
Efficiency and effectiveness — By intelligently automating manual processes or sub-processes that are time-consuming and prone to error, and by providing a fast, powerful source of decision-making support for process personnel, business process management software increases the efficiency and effectiveness of your operations.
Consistency — When consistency across customer interactions or other types of processes is important, business process management software can deliver that consistency.
Scalability — Automated and semi-automated processes scale much better than manual processes, an important consideration for businesses on a growth trajectory or navigating economic ups and downs. BPM software can also help to facilitate business process integration for large enterprises whose operations span multiple locations, departments, and IT systems.
Agility — The right business process management software will empower you to quickly update your processes in response to developments in your operational environment. Across time, BPM software provides a dynamic foundation for business performance management and continuous business process improvement programs. – http://www.pega.com/business-process-management-software#sthash.rMjNNK0y.dpuf
When a company has a need for software, one option is to buy it from a software vendor or build it internally if the IT department can develop the software. This results in a build-or-buy debate.
Week 11
You have just completed 10 weeks of a CIS course. Imagine you have been asked to create a one-day training course highlighting the important elements of what you have just learned in the past 10 weeks.
Create a hierarchy of five (no more or no less) of the most important topics that you believe need to be addressed in this one-day course that best fits the course title of “Information Systems for Decision Making: The Essentials Presented in One Day.” Give a detailed rationale for each of the five topics.

1. IS Vulnerabilities and Threats-It is important to know the type of threats you will face from within your organization as well as from the outside. You need to know how to proper defend from them and ensure that everyone is trained in how to protect themselves and the company. 2. IT Infrastructure and Cloud Computing –This essential to know since you need to know how to setup IS with regards to you company. How to save money and still have everything you need to have your business function properly and dependable support and scalability at your fingertips. 3. E-Business and E-Commerce Challenges- it is important you know the risk and advantages to E- Business and how to successfully integrate it into your current business plan. 4. IT Governance-This is important because you need to know and follow guide lines to ensure not only the protection of your company but of your customers. 5. Mobile Computing and Social Networking – This is key to staying up on new technologies and being able to reach more potential customers as well as adding more convince to current customers. It also shows the importance of have more ways to advertise products and receive quick feedback.
Using140 characters or less (the length of a Tweet), summarize the importance of this class to someone unfamiliar with the concepts.
This class provides helpful information about the importance of IS and IT infrastructure. It helps to inform about how to best make sure you people are trained properly and the importance of know security risk and how to prevent them. It is also provides a wealth of knowledge that is important in the IT field and our personal lives not only about security but how business are affected by ne advances in technology and what they are looking for in future employees.…...

Similar Documents

Premium Essay

Cis 500 - Predictive Policing

...Predictive Policing By Gus Finklestein Strayer University Abstract Predictive policing is a relatively new crime-fighting technique that can be used to both deter crime and catch criminals red-handed. Combining computer technology together with area- specific crime data, reports are generated forecasting precisely when and where crimes are most likely to occur. Police departments maintain records, data, and or databases which log huge volumes of information on crimes, criminals, suspects, and much more. Inputting that information into a sophisticated computer program designed to predict crime, to within a 500 by 500 foot location, is proving to have some merit. With technological advances, police no longer radio headquarters to retrieve basic information like license plates. In fact, the majority of police possess internet-connected computers in their cruisers, allowing them access to vast amounts of data. Within an organizational context, when police easily communicate and share knowledge across boundaries, and the entire country, the overall efficiency of crime-fighting and crime- solving greatly improves. Take for example an Amber Alert, the name of a missing persons report when a child vanishes. Once an alert is executed, police forces very quickly mobilize and cast a very wide net using all available resources to locate that child. This paper discusses the uses of technology, in particular predictive policing, to advance the......

Words: 1698 - Pages: 7

Free Essay

Cis 500

...Wireless Networks 4G Wireless Networks Britney Green CIS 500: Information Systems for Decision Making Professor Frank Lazzara November 4, 2012 4G Wireless Networks “Wireless networks use packet switching and wireless networks. Patching switching is when the path of the signal is digital and is neither dedicated nor exclusive. Routers are devices that forward packets from one network to another network. Packets occur when the network breaks a file or e-mail message into smaller blocks of specific size. Wireless routers are actually wired routers with wireless access points (WAP) built in. It provides both wired and wireless at the same time”. (Turban & Volonino, 2011) Third generation also called 3G; of cellular telecommunications technology supports multimedia and broadband services. Broadband means fast transmission speed. It is faster than the 1G and 2G. The third generation networks have far greater ranges because they use large satellite connections that connect to telecommunication towers. The fourth generation is called 4G. 4G mobile network standards enable faster data transfer rates. (Turban & Volonino) Right now 4G is the latest generation of wireless data technologies. It carries average download rates of 3 Mbps or more. “In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. The 2G and 3G started separately with their own purposes; soon both will be converted to the 4G......

Words: 1202 - Pages: 5

Premium Essay

Cis 500 Assignment 4

...Assignment 4: Data Mining CIS 500 Dr. Besharatian Submitted by: Eric Spurbeck December 7, 2013 Abstract This paper will discuss the process of data mining, how it is used, for what purpose it is used and what information can be gathered from the data, which is compiled from data mining. Assignment 4: Data Mining Webopedia (2013) defines data mining as, "A class of database applications that look for hidden patterns in a group of data that can be used to predict future behavior. For example, data mining software can help retail companies find customers with common interests." This means that large groups of data that is derived by information obtained through customers, customer purchases and customer buying habits. Businesses use this information for a variety of reasons; it is used for purchasing merchandise, tracking how certain merchandise is selling and even customers buying habits. Webopedia goes on to state that "data mining is popular in the science and mathematical fields but also is utilized increasingly by marketers trying to distill useful consumer data from Web sites." Predictive analytics are used to understand customer's behaviors, according to the article Predictive Analytics with Data Mining: How It Works (Siegel, Feb. 2005) it describes how this method has a predictor. This is "a single value measured for each customer" this is based on the customers purchased over a period and sets higher values for the most recent customer purchases. ......

Words: 1808 - Pages: 8

Premium Essay

Cis 500 Case Study - Cloud Computer

...Case study 2 CIS 500 – Information Systems for Decision Making Abstract Cloud computing is not strange to people at all. People use their iPhone and their iPad App to store their important files. Microsoft 2013 users use the SkyDrive to store their files and they can access anywhere and anytime. Major venders such as Google, Amazon, and Microsoft have provided Cloud Computing services. This paper discusses the Amazon Web Services (AWS) and evaluates the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud, Amazon Simple Storage Service, and RightScale. Moreover, this paper examines the security concerns for cloud-based services and assesses scalability, reliability, and cost issues. Assess how Ericsson benefitted from Amazon Web Service (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability Ericsson is one of the world’s leading providers of technology and services to telecom operators. There are reasons how Ericsson success like that. According to the Amazon Web Services (AWS) Case study, Ericsson uses AWS such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and RightScale for provisioning and auto-scale functionality. AWS give many benefits to Ericsson. For example, Ericsson saves money to invest to build on-premises infrastructure by using AWS. Ericsson also saves the time to build and install the infrastructure. Some of the technical...

Words: 1257 - Pages: 6

Premium Essay

Cis 500

...Rahkon A. Ross Dr. Edwin Otto Strayer University CIS 500 Assignment #1: Predictive Policing Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. Over the last decade, computer and telecommunications technologies have developed at a surprising rate. Increased computing power, advances in data transmission, smart and user-friendly graphic interfaces present law enforcement agencies with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of government. Ultimately, information technology represents a tool to help local law enforcement achieve its broadened and increasingly complex missions. (Reichert, 2001) There are many advantages associated with using information technology in policing. Comparative analysis shows that using information technology (IT) to combat crime has save lot of resources and time in the police department. There are a number of other advantages that can be associated with the use of information technology in the police department. For instance they use of Automated Field Reporting System by the police department has eradicated the use of hand writing of reports at the field by the Police Officers. Officers completed handwritten incident reports in the field and submitted them at the end of a shift to a field supervisor. After reviewing and approving reports, field supervisors would...

Words: 1431 - Pages: 6

Free Essay

Cis 500

...Assignment 2: 3G wireless networks and 4G networks sweetie Professor: CLIFTON HOWELL CIS 500 February 03, 2014 INTRODUCTION For one to compare and contrast 3g versus a 4g network, we first have to define what a wireless network is. Radios are considered to be the most popular for wireless technologies. Wireless communication is transferred between multiple points which are not connected to an electrical conductor. Wireless is playing a big part in the cellular network communication field. Literally, on all the channels on TV it’s impossible to go 3 minutes without seeing advertisements from Verizon, AT&T, T-Mobile, and Sprint claiming to be the best network provider. Each cell phone provider promote their own version of 3g and 4g networks. Carriers do this to draw the attention to endorse their services and to bring in new customers. As a result, it makes it very difficult for consumes to make a choice between the competitors. Consumers make their choice between providers based upon the price and coverage which are both vital to most consumers. With all the promotions and dramatic advertising it can be hard to know the truths about each wireless company. In this paper 3G and 4G networks will be compared and contrasted, 4G LTE, 4G WiMAX and 4G WiBro networks and competition will be identified. Lastly, this paper will identify why the competition between the 4G LTE carriers has been so fierce. 3G and 4G Networks Technology has allowed advance speed......

Words: 1092 - Pages: 5

Premium Essay

The Broadway Cafe' Cis 500

...Final Project 1 Final Project The Broadway Cafe' Part I and II CIS 500 Strayer University Elizabeth Bethel Final Project 2 The Broadway cafe is a family inherited coffee shop located in downtown Atlanta, Georgia. The cafe' has been in business for 58 years. The business offers specialized coffees, teas, a full service bakery, homemade sandwiches, soups, and salads. It was once a hotspot but for the past five years business has been declining. Although my grandfather was very adroit at managing the business, Starbucks will be coming to the area. Grandfather had a terrific memory and stored everything such as customers names, family recipes, and soups in his brain. His record keeping system was tracked...

Words: 2450 - Pages: 10

Free Essay

Cis 500 - Assignment 2 4g Wireless Networks

...| 4G Wireless Networks | | | | Jason LehmanCIS 500 – Information Systems for Decision Making 7/27/14 | | 4G Wireless Networks | | | | Jason LehmanCIS 500 – Information Systems for Decision Making 7/27/14 | Compare and Contrast 3G and 4G Wireless Networks The comparison of 3G and 4G wireless networks can be broken down into four main areas of concern when deciding on the more future-oriented 4G compared to the more established 3G network. The first areas examined are service and applications. Third-generation (3G) networks consist of CDMA 2000, UMTS, WCDMA, and various others. Fourth-generation (4G) technologies include WiMAX, HSPA+21/42, and LTE, of which many consider LTE to be the only “true” 4G network (Segan, 2013). The introduction of 3G technologies heralded a wide range of possibilities to include the ability for user to wirelessly stream audio, video, visual calling and conferencing, and various mobile multimedia functions to include more streamlined E-mail and general web browsing, online banking, basic video games on demand, mobile TV, and location-based services (4Gon Solutions, 2012). 4G application offerings include four main categories: Localized/Personalized Information, Communications, Organizational, and Entertainment (M-Indya, 2012). Localized/Personalized Information applications will offer users the ability to browse various news outlets, more accurate and improved locational servicers, more enhance mobile commerce (i.e. mobile...

Words: 2244 - Pages: 9

Premium Essay

Cis 500 Complete Class Assignments and Term Paper

...CIS 500 Complete ClasCIS 500 Complete Class Assignments and Term Paper Click link Below To Download Entire Class: http://strtutorials.com/CIS-500-Complete-Class-Assignments-and-Term-Paper-CIS5006.htm CIS 500 Complete Class Assignments and Term Paper CIS 500 Assignment 1 Predictive Policing CIS 500 Assignment 2: 4G Wireless Networks CIS 500 Assignment 3 Mobile Computing and Social Networking CIS 500 Assignment 4 Data Mining CIS 500 Term Paper Mobile Computing and Social Networks CIS 500 Assignment 1 Predictive Policing Click link Below To Download: http://strtutorials.com/CIS-500-Assignment-1-Predictive-Policing-CIS5001.htm In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. This is known as predictive policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some cities. Write a four to five (45) page paper in which you Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets...

Words: 2044 - Pages: 9

Premium Essay

Cis 500 Mobile Computing & Social Networks

... | | | | | |Denise Washington | |12/14/2014 | Professor Janet Durgin CIS 500, Information Systems for Decision-Making Social networking is powerful and convenient. Consumers are using these avenues to dictate demands on companies and organizations. With over 5 billion mobile phones connected globally, a company must have a mobile offering with plans to invest for the long term. The impact is huge for every business and you must embrace both mobile and social media to survive in today’s economy. Consumers prefer mobile technologies. They use text rather than email and they have conversations on social sites rather than phone. Companies have to be prepared to deliver across all channels including mobile. All of this is amplified by social media. 770 million people have......

Words: 2356 - Pages: 10

Free Essay

Cis 500

...implementing Big Data into their inventions and designs. The voluminous amount of data may have been overwhelming and costly to store but the cost to purchase high volume storage has earned them tremendous respect in the auto industry. They have very safe vehicles and amazing features. The real time data processing gives them the edge needed to produce safe vehicles and remain competitive. References Blanco, B (September 2007). Volvo's fuel cell Alcoguard breathalyzer says "Blow 5 seconds". Retrieved from http://green.autoblog.com/2007/09/03/volvos-fuel-cell-alcoguard-breathalyzer-says-blow-5-seconds/ Strader, R (January 2011). Converting data into business value at Volvo. Retrieved from http://blackboard.strayer.edu/bbcswebdav/institution/CIS/500/1124/Week3-1124/CIS500CaseStudy1-Volvo.pdf Teradata case study: A car company powered by data. (2012, May 16). Retrieved from http://www.thebigdatainsightgroup.com/site/article/teradata-case-study-car-company-powered-data “Volvo. In a demonstration of continued leadership in the field of safety, Volvo Car Corporation establishes new test facility for active car safety” (n.d.). Retrieved from http://www.autoalliance.org/index.cfm?objectid=02000880-B49C-11E1-B12B000C296BA163...

Words: 989 - Pages: 4

Premium Essay

Cis 500 - the New Frontier-Data Analytics

...The New Frontier: Data Analytics CIS 500: Information Systems For Decision-Making Anywhere we travel on the internet we have been bombarded with seemingly codependent requests to, “Like US!”, “Follow US!”, “Watch US!”, “Share US!” from businesses of all types. If you think about it, this is exactly the dynamic. Businesses are in a dependent relationship, relying on the consumers for their survival. If a business wants to engage and remain in a viable relationship, it has to have a product/service the consumer desires and be able to deliver it in a manner that the consumer perceives as valuable. Even if a business has the “next greatest thing”, the consumer will not engage/continue in the relationship if the business does not or cannot provide it in a valuable way to the consumer. Amazon is one company that has been able to successfully develop this dynamic relationship. So then how does a business become and remain successful in the relationship? They need a better understanding of what the consumer wants by improving their Business Intelligence (BI). For decades, businesses have used statistics to analyze data to obtain information and insights for improving BI. With the advent of the computer, data analysis moved from statistical based inferences about the data to a more scientific method based on empirical results. This was the foundational begins of Data Analytics. Data Analytics, as defined in our course text is, specialized software, capabilities, and...

Words: 1961 - Pages: 8

Premium Essay

Cis 500 - Cyber Security in Business Organizations

...Case Study #1 Cyber Security in Business Organizations CIS 500: Information Systems for Decision-Making Cyber Security in Business Organizations On December 19, 2013, the Target Corporation in Minneapolis, MN, put out a press release on their website confirming there had been a security breach allowing unauthorized database access to their Point of Sale (POS) systems, between November 27 and December 15, 2013. Target reported approximately 40 million credit/debit card accounts could have been affected. In the release, Gregg Steinhafel, chairperson, president and chief executive officer, stated the following, “Target’s first priority is preserving the trust of our guests and we have moved swiftly to address this issue, so guests can shop with confidence. We regret any inconvenience this may cause. “We take this matter very seriously and are working with law enforcement to bring those responsible to justice.” (Target Press Release, 12/19/2013). Retailers are prime targets for hackers. Why? Simply stated, Risk versus Benefit. Retail stores compile a vast amount of financial data and banking information for millions of people across the country. It could be considered a new version of bank robbery. Rather than dealing with all the planning, resources needed and danger involved with robbing one actual bank, not to mention having to split the money with cohorts, hackers can skip the bank altogether. Obtaining consumers’ banking information provides all the......

Words: 2080 - Pages: 9

Premium Essay

Cis 500 - Wireless and Mobile Technologies

...Case Study #2 Wireless and Mobile Technologies CIS 500: Information Systems for Decision-Making Wireless and Mobile Technologies Wireless technologies make use of radio waves, to connect with other devices or networks in order, to transmit/receive data. A wireless technology can be as simple as using a garage door opener or as complex running applications on Enterprise Resource Planning software. Wireless technologies make use of various types of hardware, from Bluetooth™ capable devices (printers, keyboards, earpieces, etc.) to offsite data warehouses to satellites, all of which communicate through networks, via radio waves. Wireless technologies are used by fixed/stationary items such as a desktop computer, as well as various mobile devices, tablets, cell/smart phones, laptops, GPS and others. Mobile technologies are, as the name implies, mobile. These devices are portable and can be used in route, from one place to the next, by accessing and using wireless networks. Mobile technologies are not just hardware but include special platforms in which these devices and the users interface. The combination of the wireless and mobile technologies has opened new methods for businesses to improve productivity.  Wireless and Mobile technologies allow staff members to have real-time communication with the business and operations, from relatively anywhere in the world.  Wireless and Mobile technologies provide a faster connectivity to vendors and customers......

Words: 1916 - Pages: 8

Premium Essay

Cis 500 - Term Paper - Information Technology Strategic Plan

...Term Paper Information Technology Strategic Plan CIS 500: Information Systems for Decision-Making Information Technology Strategic Plan Established in 1984, in Chattanooga, TN, 1st Step Counseling started as a privately owned counseling practice, primarily serving the local courts by providing first time DUI offenders with DUI education service and assessment, as mandated by their court ordered probation. Over the next ten years 1st Step Counseling has expanded its’ services to deliver out-come focused Mental Health and Substance Use Disorder counseling. By 1995, 1st Step Counseling had a patient census of approximately 300 patients, requiring the employ of an Internal Medicine Specialist, a Psychiatrist, a Nurse Practitioner, three Licensed Practical Nurses, two Clinical Psychologist, six Licensed Professional Counselors and two Clinical Social Workers, plus eight Administrative and Support staff. Later the same year, 1st Step Counseling opened a second office in Farragut, south of Knoxville, TN. Since this first expansion, 1st Step Counseling has established itself as a prominent Mental Healthcare Service provider, with 14 locations in or near metropolitan areas, throughout the Southeast. In January 2014, the Board of Directors decided to expand to the national market. To begin steering the company toward the national stage, the Directors and Senior Executives rebrand the company’s identity by changing the name to Access-Link Behavioral Healthcare......

Words: 2977 - Pages: 12