Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 11.5, Problem 11.5ARQ
Explanation of Solution
Changes and developments that will have an effect on an organization’s management of IS (
- Organizations will shift their internal hardware infrastructure into the cloud.
- Companies will keep some data in their own privately controlled servers for the sake of safety.
- Use of mobile devices will increase at workplaces as they will become more powerful, cheaper and will provide dynamic and game like experiences.
- Organization will develop BYOD (Bring Your Own Device) policies that will help them meet their needs and strategies and at the same time IoT (Internet of Things) will offer the opportunity for innovation in operations, manufacturing and chain management.
- Organizational knowledge management will use social media as a key component in projects.
- The change which is going to be like a revolution is, CIO (Chief information officer) will become a fully-fledged member of the executive suite, and IS will be the key component to fetch competitive advantage.
Mobile devices and IoT:
- In 2027, mobile devices will be used in the workplaces as it will become cheaper, more powerful, with dynamic and game like user experiences.
- By developing BYOD policies, Organizations will encourage the employees to bring their own devices to work.
- Internet of things (IoT) will simultaneously provide more opportunities for innovation in operations, manufacturing and supply chain management.
- As it can be seen that workers will be bringing their own computing devices which will be equally powerful as any computer they have at work, organization will have to develop the restrictive BYOD policies to meet organizational needs and strategies.
- Even after that the security of the data will be in risk as workers will have their own devices and access to all the organizational documents.
- In the starting years, BYOD policies may help in maintaining control but after a while, it will lead to competitive disadvantage.
- Workers will access the network using whatever hardware they have and whatever they happen to be. Even if the employees are unable to do so, their competitors will.
Loss of data control is inevitable:
It has been observed that since the time world is experiencing the advancement in technology, there has been advancement in the ways to lose the data...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
i Discuss social engineering and describe five (5) impacts it has on modern business organization. Also, evaluate five (5) software security threats and howit affects return on investment of a business organization.
Discuss relevant cybersecurity issues and how these emerging technologies (AI, analytics, blockchain, IoT, etc) can be combined in the context of the use case any industry (finance, health, supply chain, sports etc) identified to deliver operational and strategic value.
-What is SIEM solution, cyber threat intelligence, open-source? ( detail one more page )
-Why do companies need this kind of tech?
Chapter 11 Solutions
Using MIS (10th Edition)
Ch. 11.2 - Prob. 1MDQCh. 11.2 - Prob. 2MDQCh. 11.2 - Prob. 3MDQCh. 11.2 - Prob. 4MDQCh. 11.2 - Prob. 5MDQCh. 11.3 - Prob. 1EGDQCh. 11.3 - Prob. 2EGDQCh. 11.3 - Prob. 3EGDQCh. 11.3 - Prob. 4EGDQCh. 11.5 - Prob. 1SGDQ
Ch. 11.5 - Prob. 2SGDQCh. 11.5 - Prob. 3SGDQCh. 11.5 - Prob. 4SGDQCh. 11.5 - Prob. 11.1ARQCh. 11.5 - How do organizations plan the use of IS? Explain...Ch. 11.5 - Prob. 11.3ARQCh. 11.5 - Prob. 11.4ARQCh. 11.5 - Prob. 11.5ARQCh. 11 - Prob. 11.1UYKCh. 11 - Prob. 11.2UYKCh. 11 - Prob. 11.3UYKCh. 11 - Prob. 11.8CE11Ch. 11 - Prob. 11.11CS11Ch. 11 - Prob. 11.12CS11Ch. 11 - Prob. 11.13CS11Ch. 11 - Prob. 11.14CS11Ch. 11 - Prob. 11.15CS11Ch. 11 - Prob. 11.16CS11Ch. 11 - Prob. 11.17CS11Ch. 11 - Prob. 11.18MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Consider the impact of cyber threats on your organization. Examine the impact of a recent cyber incident on sales, earnings, or brand. Decide if you're talking about disaster recovery or business continuity. We'd like to hear your side of the story. Exclude links and small details from your answers to those three questions.arrow_forward1. As a student, Give two ways on how will you avoid yourselves in Computer Addiction nd cyberbullying? 2. In your perspectice,What will happen in Learning Management Systems (LMS/Google Classroom) in the coming years , which is part of the Media and Information for Education, when the old normal (Pre-pandemic) comes back?arrow_forwardDiscuss why cyber attacks are significant and how they might hurt your company. Evaluate and explain a recent cyber-attack and its influence on the company's sales, profit, or brand. Compare business continuity, incident response, and catastrophe recovery. Explain and defend your position. Could you kindly write the answers to those three questions without links or tiny details?arrow_forward
- Question R .The word governance is often used to refer to an organization’s management of cyberspace, cyber security, information technology, and information security policies and processes. Why is governance difficult in cyberspace? Share an example and explain your response. Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forwardYou are the Chief Information Security Officer for a small manufacturing company (50 employees), creating non-metallic fasteners for military aircraft. You suspect economic espionage --your competitors have been trying to steal your designs for years. Your job? Author an incident response plan for a small legal firm (<50 people) to satisfy the NIST 800-171 requirements. What steps would a fictitious manufacturing company have to have to be in business? Research and Development Design Manufacturing (robot manufacturing can run 24x7 and cost millions if offline) Testing and QA Finance Sales and Marketing Legalarrow_forwardYour job? Author an incident response plan for a small legal firm (<50 people) to satisfy the NIST 800-171 requirements. What steps would you go through if you were designated to build an IR plan for a company? What steps would a fictitious manufacturing company have to have to be in business? Research and Development Design Manufacturing (robot manufacturing can run 24x7 and cost millions if offline) Testing and QA Finance Sales and Marketing Legalarrow_forward
- -What is SIEM solution, cyber threat intelligence, open-source? -Why do companies need this kind of tech?arrow_forwardOnce a person has been authenticated in an organization's network, that user is granted access to certain data based on the information security concept of least privilege. Your CEO and CIO need authentication and authorisation methods for the company. Recommendations should include strategies for mitigating the effects and hazards posed by vulnerabilities. Be a 9- to 11-slide, multimedia-rich presentation in Microsoft PowerPoint for the WHO (World Health Organization), and make sure to include: Descriptions of at least three jobs performed by members of the organization WHO (World Health Organization). At least three typical attacks on access control techniques, including the password policy vulnerability mentioned in the vulnerability report, are discussed. Countermeasures for reducing vulnerabilities and mitigating possible access control mechanism assaults. A multimedia presentation should contain graphics, images, video clips, or audio.arrow_forwardDiscuss why it's so important to understand cyber dangers and how they could affect your company. Investigate and explain a recent cyber-attack and how it affected the company's income, profit, or brand. Discuss how Disaster Recovery, Business Continuity, and Incident Response are similar, different, and overlap. Please state and defend your viewpoint. Could you kindly write the answers to those three questions in full, without including any links or minor details?arrow_forward
- A primer on the Internet of Things, including security concerns, potential threats, and the societal effects of widespread IoT use.arrow_forwardThink about the consequences that cyber attacks might have on your business. Analyze how a recent cyber attack affected your bottom line or reputation. Make a choice between discussing business continuity and catastrophe recovery. Please explain your side of the situation to us. Don't include extra information like links or minor specifics in your responses to those three questions.arrow_forwardDevelop ethical guidelines for information technology professionals and professional ethics?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning