363 #1
network
1. A(n) __________ links two or more computers to share data or resources.
Customer and supplier intimacy
1. The Mandarin Oriental hotel in Manhattan keeps track of guest's preferences, such as their preferred room temperature and television programs, in a large data repository. Individual rooms are networked to a central network server computer, so that when a customer arrives, the system automatically changes the room conditions to meet each customer's specifications. This scenario is a good example of a business using information systems to achieve which of the following strategic business objectives?
firms and individuals seek to spend less on the costs incurred when a firm buys on the marketplace what it cannot make itself
According to transaction cost theory, __________.
create opportunities for intense social change
Information systems affect ethical principles because they __________.
core competencies
Procter & Gamble uses an intranet called InnovationNet to help people working on similar problems share ideas and expertise. InnovationNet connects those working in many different departments around the world. It uses a browser-based portal to access data and includes a directory of subject matter experts who can be tapped to give advice or collaborate on problem solving or product development. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.
disruptive technologies
Substitute products that perform as well as or better than anything currently produced are called __________.
Core competencies are activities at which a firm excels as a world-class leader.
What are core competencies?
They are more highly motivated than traditional occupants of an industry. &&&& They often hire younger workers, who are less expensive and more innovative.
What is a possible advantage of new entrants in an industry?
Organization
What is a stable, formal social structure that takes resources from the environment and processes them to produce outputs?
An information system can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support decision making and control in an organization.
What is an information system?
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called profiling.
What is profiling?
Ethics
Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?
The traditional boundaries that separate work from family and just plain leisure have been weakened.
Which of the following statements about the social costs of information technology is true?
Web beacons are tiny software programs that keep a record of users' online clickstream.
Which of the following statements best describe web beacons?
A movement between levels of sociotechnical systems is called a strategic transition.
Which of the following statements best describes a strategic transition?
It is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement
Which statement describes safe harbor?
digital firm
A _________ is one in which nearly all of the organization's significant business relationships with customers, suppliers, and employees are digitally enabled and mediated.
business ecosystem
A __________ is loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.
growth in cloud computing
A flexible collection of computers on the Internet begins to perform tasks traditionally performed on corporate computers. Major business applications are delivered online as an Internet service. The developments in the scenario are part of the __________.
The growth in cloud computing
A flexible collection of computers on the Internet begins to perform tasks traditionally performed on corporate computers. Major business applications are delivered online as an Internet service. Which technology changes affecting information systems are described in this scenario?
transaction cost theory
According to __________, firms and individuals seek to spend less on the costs incurred when a firm buys on the marketplace what it cannot make itself.
a firm is viewed as a "nexus of contracts" among self-interest individuals rather than as a unified, profit-maximizing entity
According to agency theory, __________.
difficulty of sustaining competitive advantage
Amazon was an e-commerce leader with its rapid distribution of a wide array of products, but the firm now faces competition from eBay, Yahoo, and Google. This example illustrates the __________.
difficulty of sustaining competitive advantage
American Airlines' SABRE computer reservation system, Citibank's ATM system, and FedEx's package tracking system benefited by being the first in their industries. Then rival systems emerged. These examples illustrate the __________.
The Mandarin Oriental hotel in Manhattan keeps track of guest's preferences, such as their preferred room temperature and television programs, in a large data repository. Individual rooms are networked to a central network server computer, so that when a customer arrives, the system automatically changes the room conditions to meet each customer's specifications.
Business firms invest heavily in information systems to achieve six strategic business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision making; competitive advantage; and survival. Which of the following is a good example of the relationship between information systems and customer and supplier intimacy?
In 2012, Walmart achieved $460 billion in sales in large part because of its Retail Link system, which digitally links its suppliers to every one of Walmart's stores. As soon as a customer purchases an item, the supplier monitoring the item knows to ship a replacement to the shelf.
Business firms invest heavily in information systems to achieve six strategic business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision making; competitive advantage; and survival. Which of the following is a good example of the relationship between information systems and operational excellence?
synergies
Countrywide Financial enabled Bank of America to extend its mortgage lending business and to tap into a large pool of new customers who might be interested in its credit card, consumer banking, and other financial products. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage
Management
From a business perspective, an information system provides a solution to a problem or challenge facing a firm and represents a combination of management, organization, and technology elements. Leadership, strategy, and management behavior are components of which dimension of information systems?
Leadership, strategy, and management behavior
From a business perspective, an information system provides a solution to a problem or challenge facing a firm and represents a combination of management, organization, and technology elements. The management dimension of information systems involves which set of components?
Organization
From a business perspective, an information system provides a solution to a problem or challenge facing a firm and represents a combination of management, organization, and technology elements. The organization's hierarchy, functional specialties, business processes, culture, and political interest groups are components of which element of information systems?
The organization's hierarchy, functional specialties, business processes, culture, and political interest groups
From a business perspective, an information system provides a solution to a problem or challenge facing a firm and represents a combination of management, organization, and technology elements. The organizational dimension of information systems involves which set of components?
that if the action is not right for everyone to take, it is not right for anyone
Immanuel Kant's Categorical Imperative states __________.
Economic
Implementing information systems has economic, organizational, and behavioral effects on firms. For example, information systems make it possible for companies such as Cisco Systems and Dell to outsource their production to contract manufacturers such as Flextronics instead of making their products themselves. In this example, information systems have what kind of an impact on an organization?
Operational excellence
In 2012, Walmart achieved $460 billion in sales in large part because of its Retail Link system, which digitally links its suppliers to every one of Walmart's stores. As soon as a customer purchases an item, the supplier monitoring the item knows to ship a replacement to the shelf. Business firms invest heavily in information systems to achieve six strategic business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision making; competitive advantage; and survival. This scenario is a good example of a business using information systems to achieve which of the following strategic business objectives?
Sociotechnical
In which of the approaches to information systems is the performance of a system optimized when both the technology and the organization mutually adjust to one another until a satisfactory fit is obtained?
primary activities
Inbound logistics (receiving and storing materials for distribution to production), operations (transforming inputs into finished products), outbound logistics (storing and distributing finished products), sales and marketing, and service are all __________.
network-based strategies
Internet sites like eBay (the giant online auction site) and iVillage (an online community for women) can be used by firms to build communities of users—like-minded customers who want to share their experiences. This builds customer loyalty and enjoyment and develops unique ties to customers. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.
Computer vision syndrome
Judy is a data analyst who spends more than 6 hours a day at her computer. She has been experiencing headaches, blurred vision, and dry and irritated eyes. From which of the following occupational health risk does Judy likely suffer?
achieve the lowest operational costs
Organizations using information systems to deal with competitive forces __________.
Organizational complementary assets
Research indicates that firms that support their technology investments with investments in key organizational, managerial, and social complementary assets receive superior returns. A supportive business culture that values efficiency and effectiveness, an appropriate business model, efficient business processes, decentralization of authority, highly distributed decision rights, and a strong information system (IS) development team is an example of which type of key complementary asset?
Strong senior management support for change, incentive systems that monitor and reward individual innovation, an emphasis on teamwork and collaboration, training programs, and a management culture that values flexibility and knowledge
Research indicates that firms that support their technology investments with investments in key organizational, managerial, and social complementary assets receive superior returns. Which of the following are examples of key managerial complementary assets?
Strong senior management support for change, incentive systems that monitor and reward individual innovation, an emphasis on teamwork and collaboration, training programs, and a management culture that values flexibility and knowledge
Research indicates that firms that support their technology investments with investments in key organizational, managerial, and social complementary assets receive superior returns. Which of the following is an example of a key organizational complementary asset?
managerial complementary assets
Strong senior management support for change, incentive systems that monitor and reward individual innovation, an emphasis on teamwork and collaboration, training programs, and a management culture that values flexibility and knowledge are examples of __________.
organization infrastructure, human resources, technology, and procurement
Support activities consist of _________.
that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
The ethical "no free lunch" rule states __________.
psychology, sociology, and economics.
The study of information deals with issues and insights contributed from technical and behavioral disciplines. The disciplines that contribute to the behavioral approach (focusing on the design, implementation, management, and business impact of systems) are:
Input, processing, and output
There are three activities in an information system that produce the information that organizations need to make decisions, control operations, analyze problems, and create new products or services. What are these three activities?
Descartes's rule of change
Which ethical principle of conduct can also be called the slippery-slope rule (an action may bring about a small change now that is acceptable, but if it is repeated, it might bring unacceptable changes in the long run)?
A network of activities that generates value by transforming inputs into outputs
Which of the following best defines a business process?
Complementary assets are those assets required to derive value from a primary investment.
Which of the following best defines complementary assets?
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright
Which of the following best defines copyright?
NORA is a new data analysis technology that takes information about people from many disparate sources and correlates relationship to find obscure hidden connections that might help identify criminals or terrorists.
Which of the following best describes NORA?
The intentional destruction of data and other computer components
Which of the following best describes a computer crime?
It is one in which nearly all of the organization's significant business relationships with customers, suppliers, and employees are digitally enabled and mediated.
Which of the following best describes a digital firm?
Benchmarking involves comparing the efficiency and effectiveness of a business process against strict standards and then measuring the performance against those standards.
Which of the following best describes benchmarking?
They are the set of logically related tasks and behaviors that organizations develop over time to produce specific business results and the unique manner in which these activities are organized and coordinated.
Which of the following best describes business processes?
Disruptive technologies are substitute products that perform as well as or better than anything currently produced.
Which of the following best describes disruptive technologies?
Take the action that produces the least harm or the least potential cost.
Which of the following best describes the Risk Aversion Principle?
The value chain model
Which of the following highlights activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage?
Computer software
Which of the following information technologies consists of detailed, preprogrammed instructions that control and coordinate the computer in an information system?
Information rights and obligations
Which of the following is one of the five moral dimensions of the information age?
An efficient customer response system directly links consumer behavior to distribution and production and supply chains.
Which of the following is true of an efficient customer response system?
Communication between businesses in different parts of the world is now instant, but expensive. &&&& Internet service firms, such as Google and eBay, are able to replicate their business models and services in multiple countries with only a redesign of their information systems infrastructure.
Which of the following statements about information systems and globalization is false?
The behavioral approach ignores technology.
Which of the following statements about the behavioral approach to understanding information systems is false?
The Golden Rule is also known as "Do unto others as you would have them do unto you," this concept can help you think about fairness in decision making.
Which of the following statements best describes the Golden Rule?
In the sociotechnical approach to information systems, the performance of a system is optimized when both the technology and the organization mutually adjust to one another until a satisfactory fit is obtained.
Which of the following statements best describes the sociotechnical approach?
Operational management
Which of the following types of operational personnel is responsible for monitoring the daily activities of the business?
It is difficult to prevent ideas from falling into the public domain.
Which statement describes how trade secret laws are limited in their ability to protect intellectual property?
The behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in a firm
With what does the field of management information systems deal?
Production workers
__________ actually produce the product and deliver the service in an organization.
Complementary assets
__________ are those assets required to derive value from a primary investment.
The Utilitarian Principle
__________ assumes you can prioritize values in rank order and understand the consequences of various courses of action.
An information system
__________ can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support decision making and control in an organization.
Networking and telecommunications technology
__________ consists of both physical devices and software, links the various pieces of hardware, and transfers data from one physical location to another.
The value web
__________ is a collection of interdependent firms that use information technology to coordinate their value chains to produce a product or services for a market collectively.
Management information systems
__________ is a field that deals with the behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in a firm.
Customer and supplier intimacy
__________ is one of the four basic competitive strategies, and uses information systems to develop strong ties and loyalty with customers and suppliers.
Privacy
__________ is the claim of individuals to be left along, free from surveillance.
Computer abuse
__________ is the commission of acts involving a computer that may not be illegal but that are considered unethical.
Processing
__________ is the function of an information system that converst raw input into a meaningful form.
Business processes
__________ refer to the set of logically related tasks and behaviors that organizations develop over time to produce specific business results and the unique manner in which these activities are organized and coordinated.