Introduction to Information Systems

1264 Words6 Pages
Chapter 7
Discussion Questions
2. Why there is a strong trend toward cross-functional integrated enterprise system in the business use of information technology?
Cross-functional enterprise system is a group of people with different functional expertise working towards a common goal. It can be the people from finance, marketing, operations and human resources. Typically, it includes people from all levels of an organization. Cross-functional enterprise systems often function as self-directed enterprise system responding to broad, but not specific directives. Cross functional enterprise systems include Enterprise resource planning (ERP), Customer Relationship management (CRM) and supply chain management (SCM).
Enterprise Resource
…show more content…
Before baker Tanks invested in and implemented sales force automation, they were recording all sales data on paper. It was tedious for the company to improve productivity and respond to its client in time. Baker Tanks moved from paper-based system to a Web-based system, Sales people were equipped with PDAs with instant access to companies Customer database. By implementing sales force automation the Baker Tanks achieved the main objective of communicating better with their customers and increased productivity and profitability.

Textbook pg 295 http://www.webopedia.com/TERM/S/Sales_Force_Automation.html Chapter 11
Discussion Question
What are your major concerns about computer crime and privacy on the internet? What can you do about it? Explain.
Computer crime is a growing threat to society by the criminal or irresponsible actions of computer individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It thus presents a major challenge to the ethical use of information technologies. E-computer crime poses serious threats to the integrity, safety, and survival of most e-business systems, and thus makes the development of effective security methods a top priority. The Association of Information Technology professionals (ATIP) defines computer crime as including:
The unauthorized use, access, modification, and destruction of hardware, software, data, or network
Get Access