Identify The Application Of Information Systems In Business Answers

2317 Words 10 Pages
Register to read the introduction… 1.2 Examine the impact of information systems on the business structure. Read Bonus Ch. B, “Using Technology to Manage Information,” of Understanding Business. Read Ch. 1, “Information Systems in the 2010s,” of Information Technology for Management. Read Ch. 2, “IT Infrastructure and Support Systems,” of Information Technology for Management. Participate in class discussion. Resources: SkillSoft (2012). IT Strategy Essentials: Business and IT Strategy Alignment. Complete The Business Integration Levels module in Skillport. Imagine you have been hired by a small well-funded startup company to help with their IT-enabled business strategy. Your first task is to let them know the elements involved with using IT-enabled business strategy. Write an e-mail describing the five elements of IT-enabled business strategy. Answer the following questions in 200 to 300 words each: • • What are the advantages of aligning business and IT strategies? How does IT deliver business benefits that are related to the business …show more content…
2.2 Describe the ethical and security considerations for an information system in business. 2.3 Describe the need for security measures in IT organizations and information systems. Read Ch. 4, “Network Management and Mobility,” of Information Technology for Management. Read Ch. 5, “IT Security, Crime, Compliance, and Continuity,” of Information Technology for Management. Read Ch. 14, “Global Ecology, Ethics, and Social Responsibility,” of Information Technology for Management. Read Ch. 4, “Ethical and Social Issues in Information Systems,” of Management Information Systems. Read Ch. 8, “Securing Information Systems,” of Management Information Systems. Participate in class discussion. Resources: SkillSoft (2012). Control Fundamentals and Security Threats. Complete The Security Threats and Defenses module in Skillport. Write an informative memo to a business manager that does not fully understand the need for security measures. Emphasize the risk of not protecting against known security threats such as social engineering. Answer the following in the memo in 200 to 300 words …show more content…
5.2 Apply the concepts of information systems to business processes. Read Ch. 1, “Information Systems in Global Business Today,” of Management Information Systems. Read Ch. 2, “Global E-Business and Collaboration,” of Management Information Systems. Read Ch. 3, “Information Systems, Organizations, and Strategy,” of Management Information Systems. Read Ch. 8, “Securing Information Systems,” of Management Information Systems. Read Ch. 13, “Building Information Systems,” of Management Information Systems. Read Ch. 12, “IT Strategic Planning,” of Information Technology

Related Documents