preview

Essay about Management Information Systems

Good Essays

MGMT305 - Unit 5 Individual Project Week 5- Case Studies Chasity Fenn American Intercontinental University
October , 2011

ABSTRACT This paper will discuss the questions asked about the four different case studies we are to read this week. The case studies are When antivirus software cripples your computers, How secure is the cloud, Are electronic medical records a cure for heath care, and JetBlue and WestJet: A tale of two IS projects (Laudon & Laudon, 2012, pgs 304, 321, 522 & 556).

WEEK 5 CASE STUDIES
WHEN ANTIVIRUS SOFTWARE CRIPPLES YOUR COMPUTERS There are a few reasons why McAfee’s antivirus software created so many problems for their users. First, when test simulations were done, management did not run …show more content…

321). Lastly, cloud system users also have to deal with the fact there could be an interruption of the systems they use. It is expected by businesses and users for the systems to be available all the time, but in reality power outages and server problems could make data retrieval and usage of the system not possible (Laudon & Laudon, 2012, p. 321). The factors that contribute to the problem of the distribution of data are the number of users of the programs. Having multiple distribution centers is the way that cloud is able to have so many users and to store mass amounts of data. This also contributes to the problem of tracking activities. The reason why some cloud providers do not (and do not intend to) meet security requirements is the cost of audits. If a cloud provider does not have proof of security requirements, they often have to have outside companies audit their data. Many providers do not want outside companies viewing their data and it can be costly to hire someone to do this (Laudon & Laudon, 2012, p. 321). Cloud computing is only as secure as the company using it is. Even though cloud applications are secure and encrypted, it is the responsibility of the business using the cloud systems to use encryption and other security measures. It is important that security measures be used on the company’s side, not just the provider’s side (Laudon & Laudon, 2012, p. 321). If

Get Access