Module 1-8 Investigating MIS, Ethics and Privacy Concerns, Competitive Advantage, Cybersecurity, Social Media Marketing, Databases, Computer Networks and the Internet, Data Analytics,

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?

The Principle of Moral Rights

The second step in the five steps of an ethical analysis is to determine the

affected or impacted

During the Measure and Analyze steps of the ___ procedure, collecting data and using data analytics are essential.

Six Sigma

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

1st

In 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors that impact businesses. The became known as Porter's ______ forces.

5

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

There are ___ basic principles of ethical conduct.

5

When conducting a SWOT analysis, managers examine factors that impact their organization's internal strengths and weaknesses. These factors are sometimes refered to as the ______Ps

5

A SWOT analysis examimes which 3 of the following?

A firm's internal weaknesses. A firm's external threats. A firm's internal strengths.

Select two ways managers encourage employees to act unethically.

By failing to act ethically themselves. By not enforcing strong ethical behavior.

Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers?

Copyright and Intellectual property rights

Because it is difficult to trace and it is accessible through any internet connected device, cyber criminals often request payment in ____

Cryptocurrency

If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?

Customers

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Cyberbullying Digital piracy

Which three of the following can encourage ethical computer use in the workplace?

Employee monitoring software Remote desktop software Setting a good example

In his book, The Machine That Changed the World, Dr. James Womack of M.I.T. specified the five tenets of Lean manufacturing. These include, specifying the value of each product with precision, identifying how each product acquires its value (the value stream), and which 3 other principles?

Ensuring that the value flows to the product without interruption. Allowing customers to pull increased value from the producer. Relentlessly pursuing perfection.

Modern supply chain management systems access National Weather Service databases to track weather events that could impact logistics. This is an example of using MIS to monitor which element of a PESTEL analysis?

Environmental

Acting with high morals means you live a virtuous life, while your ___ provide a rationals framework for your morals

Ethics

Place the 5 steps of an ethical analysis in order.

Getting all the pertinent facts Determining who is affected Searching for precedents Listing and researching options Making a decision and preparing for the consequences of the decision

Select the first step in the five steps of an ethical analysis.

Getting the facts

Because employee education and training are so critical in ensuring that all employees can participate in Lean manufacturing processes, ___ systems play a key role in Lean implementation.

Human Resources Management

A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information?

Information privacy rights

Which of the following is true of structured data? More than one answer may be selected.

It has a defined length, type, and format. It can include numbers and dates. It contains confidential information such as passwords.

Select three correct statements regarding international Internet privacy laws.

It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. International laws on Internet privacy vary greatly. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Select three characteristics of Just-in-time (JIT) manufactoring and inventory management.

JIT requires exceptionally smooth supply chains. Parts, and often even labor, are not purchased until the moment they are needed in the assembly process. JIT faces significant challenges during supply disruptions such as those that occur during natural disasters.

Because of its significant challenges during supply disruptions that occur during natural disasters (such as the COVID-19 pandemic), ___ has lost much of its popularity.

Just-in-time (JIT) manufacturing and inventory management

Principles that focus on increasing efficiencies by improving supply lines and through creating a well-trained, highly knowledgeable workforce that assertively acts to minimize waste and maximize value in every process and product are referred to as ______ manufacturing principles.

Lean

Requiring a modern communications system, a process that actively encourages all employees to halt the manufacturing process if safety risks are observed is the __ process.

Lean

Actively encouraging any employee to halt production if a manufacturing error or safety risk is observed is part of the training associated with ___ .

Lean manufacturing

In a PESTEL analysis managers examine ___ factors.

Legal

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Managers use different methodologies and tools to evaluate external opportunities and threats. One popular process examines the political, economic, socio-cultural, technological, environmental, and legal issues facing an organization and is referred to as a ______ analysis.

PESTEL

Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as ___.

Porter's 5 Forces

Professor Michael E. Porter added to his five-forces model by highlighting basic strategies that businesses must follow if they wish to gain competitive advantage. He stated that these strategies fell into which two separate categories?

Price leadership Product differentiation

When conducting a SWOT analysis, managers examine factors that impact their organization's internal strengths and weaknesses. These factors are sometimes refered to as the 5 Ps. The 5 Ps include which 3 of the following?

Purse Plant Personnel

As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions.

Quality of life

This software allows managers to take control of an employee's computer remotely. This also can capture the employee's computer's mouse and keyboard entries.

Remote desktop software

Select three of steps included in the 5 steps of an ethical analysis.

Searching for precedents. Determining who is affected. Getting all the pertinent facts.

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

Setting a strong example.

The Cybersecurity Information ___ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

Sharing

Modern inventory management systems help to ensure a number of critical advantages, including which 3 of the following?

Shelf-space optimization Stock-obsolescence minimization Timely re-ordering

Because of its focus on reducing variation to eliminate product defects, which process methodology relies most heavily upon data analysis?

Six Sigma

By improving communications throughout the organization, as well as gaining better perceptions of consumers' opinions using CRM software, managers are able to monitor which PESTEL factor?

Socio-cultural

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continue to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

Suppliers

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct .

Terrorism

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.

The Principle of Distributive Justice The Principle of Moral Rights The Principle of Virtue

Barriers to entry can protect existing firms from which of Porter's 5 forces?

The force of new competitors

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Attributes that allow firms to provide goods and services with higher perceived values than their competitors are referred to as competitive ____________.

advantage

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet. Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings. Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material.

The second of Porter's 5 forces refers to the ease with which a new competitor can enter the market. Strong ______ decrease the strength of this force.

barriers

According to Professors W. Chan Kim and Renee Mauborgne, creating an entirely new market is an example of a _______ ocean strategy.

blue

Management Information Systems allow managers to build upon an organization's existing strengths to create

competitive advantages

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

Porter's 5 Forces include existing competitors, new competitors, and which 3 of the following?

customers substitutes suppliers

Lean manufacturing techniques seek to eliminate waste in the production process, in contrast, Six Sigma seeks to eliminate ________.

defects

Using technology to transform a market or to create an entirely new market is called creating a _______ innovation.

disruptive

Karl Benz invented the internal combustion automobile in 1885. Adam Smith described the efficiencies of division of labor (the assembly line) in 1776. However, when Henry Ford combined these two to produce an inexpensive automobile with the Model T in 1908, he transformed the personal transportation market. Professor Clayton Christensen called this a ___.

disruptive innovation

Sears, which revolutionized catalog (mail order) sales, failed to make the online leap and while Amazon capitalized on this technology, Amazon successfully used ___

disruptive innovation

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Getting all the pertinent ___ is the first step in an ethical analysis

facts

Chinese and Nigerian manufactures have been notably successful in adopting a strategy of, rather than creating an innovative product, offering a competing product rapidly enough so that early majority adopters have a choice when purchasing the product for the first time. This is referred to as a ___.

fast-follower strategy

That employees will learn from experience how to use technologies to develop a product, gaining a "head start" over any competition that attempts to enter the market is considered a ___.

first-mover advantage

Over 50% of all innovative products fail in the market, while over 80% of the successors to the products succeed. This is a key tenet of the fast-__________ strategy.

follower

Because for many businesses, particularly in the retail and manufacturing sectors, this remains the largest operating expense, incremental improvements to ______ management can translate to huge overall savings

inventory

Information management systems that help to ensure that a minimal number of product touches occur from product creation to customer purchase are known as ___ systems.

inventory management

In order to gain market share, the firm must differentiate itself from

its competitors

A manufacturing and inventory management practice that gained popularity in the 1980s was known as _______-in-time (JIT) manufacturing and inventory management.

just

A starting point to investigate the complex topic of a society's ethics is first to understand the society's __ and the history behind the enacting of them.

laws

Small, drive-up, coffee stands seem to be popping up on every street corner. Because of this, these coffee vendors have difficulty raising prices significantly higher than their competitors. This is because the coffee stand business has extremely ___.

low barriers to entry

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ___ software or remote desktop software.

monitoring

According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called ___.

monopolistic competition

Professors Marvin B. Lieberman and David B. Montgomery of UCLA's Anderson School of Management examined the advantages and disadvantages of being the first firm to enter a product into the market. They coined this the first-_____ advantage.

mover

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Managers must protect the online ___ of employees and organization stakeholders.

privacy

When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a ___.

red ocean strategy

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral

rights

The ability for a firm to enjoy significant profit margins decreases as the number of ______ offering essentially the same products or services increases.

rivals

Walmart uses economies of _______ to pressure suppliers to lower their prices, allowing Walmart to offer lower prices to its customers and decrease competition.

scale

With price leadership, an organization seeks to offer a product to a large market at the lowest possible price by maximizing efficiencies and using economies of ______.

scale

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .

search for precedents

Because its techniques rely so heavily on statistical data to ensure quality control and to minimize process and product variance, management information systems are integral to the success of any Six _______ initiative.

sigma

MIS tools that analysts commonly use to determing the causes of variences include scatter diagrams, histograms and Pareto charts. For this reason, MIS are critical in the implementation of ___ techniques.

six sigma

Techniques that seek to reduce variance in output to less than 3.4 errors per 1,000,000 manufacturing steps are referred to as ___.

six sigma

Managers often use the PESTEL analysis to examine the political, economic, environmental, legal and which 2 other issues facing an organization?

socio-cultural technological

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of _______ in the market.

substitutes

Coca-Cola and PepsiCo dominate the soft drink market. However, during the 2000s, many customers switched from soft drinks to water, causing Coca-Cola and PepsiCo to develop Dasani and Aquafina. The ability of customers to switch from one product to an alternate product illustrates what Porter called the strength of __.

substitutes

During the 1950s, the United Auto Workers union (UAW) exercised considerable control over the labor ___. This meant that automobile manufacturers had little control over labor costs.

supply

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

A SWOT analysis attempts to identify, an organization's (or an individual's) internal strengths and weaknesses and examines external opportunities and _______.

threat

When external opportunities match with internal strengths, managers should choose an aggressive strategy, particularly when facing weak external ___.

threats

When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have ___. This tends to strengthen the firm's profitability.

weakened


Ensembles d'études connexes

ИКТ ДЖИГИ ЕБАЛЬНИЧКИ СМЕЛО 100 АЛАМЫЗ

View Set

Ch. 1 - Introduction to Employee Training and Development

View Set

Chapter 3: The Adjusting Process Multiple Choice

View Set

Chapter 3 - Taxes in Your Financial Plan

View Set

CS2830 In-Class Midterm Exam Review

View Set

Commercial Law Quiz Questions (14,15,16,20,24)

View Set