What is business information value chain

Assignment Help Management Information Sys
Reference no: EM132240907

Assignment

The questions below are based on various case studies of the transformational role of IT, contained in the following four articles. The first listed article contains 4 case studies, each corresponding to a separate business unit of a high-tech firm. The subsequent three articles contain 1 case study each.

Address the 5 questions below, in the context of ANY SIX of the following 7 cases.

(The first article contains 4 case studies. (( political Article )), and the other three articles contain a single case study each.)

QUESTIONS

Consider the following two claims made in the textbook -

"There is a growing interdependence between a firm's ability to use information technology and its ability to implement corporate strategies and achieve corporate goals."

"To fully understand information systems, you must understand the broader organization, management, and information technology dimensions of systems and their power to provide solutions to challenges and problems in the business environment."

Discuss whether or not each of your chosen six case studies provides empirical support for the above two claims. (You need to show, by means of comprehensive review and discussion of the available facts in the case studies, how they do or do not uphold each claim.)

2) Business processes

Which specific business processes and/or management activities in the "business information value chain" (Fig. 1-7 of the text) comprise the focus of the IT efforts in each of your chosen six firms/business units?

(Be sure to independently research and study "business processes" in detail from extraneous sources before answering this question -- go beyond the textbook figure, as it depicts only a few generic examples of business processes.)

For each firm/business unit, do the business processes and management activities you identified above seem to be well supported by its information processing activities? Explain your reasoning.

3) Which "strategic business objectives" of information systems are evident in each case study? Discuss.

4) What kinds of ethical issues (refer to Chapter 4) are evident in each case study, even if not mentioned explicitly? Discuss.

5) Which types of e-commerce (refer to B2C, B2B, C2C, G2C, G2B, etc., in Chapter 10), if any, are evident in each case study, even if not mentioned explicitly? Discuss.

Reference no: EM132240907

Questions Cloud

Analyze access control best practices : Analyze access control best practices and determine the best strategy for LOTR to implement.
Summarize the process to implement the cis controls : Out of the list of twenty controls, pick the top two pertinent controls that every company should implement. Explain your reasoning.
Should the housecleaner stay self-employed : She knows that if she worked for a cleaning service they would pay her $26,000 and she would have no expenses. Should the housecleaner stay self-employed?
Develop the ideas and concepts you chose to examine : For this project assignment, you will submit your Literary Analysis paper on the assigned novel selected for the course, which should focus on three or more.
What is business information value chain : Which "strategic business objectives" of information systems are evident in each case study? Discuss.
What suggestions for strategy will you make : While analyzing a recent customer survey, you have discovered that there has been a 5% decrease in loyal customers from two years ago.
Why is it beneficial to put a price on mortality : Why is it beneficial to put a price on mortality and morbidity? What do you think the downside or possible negative implications of doing this are?
Define what are the first visual elements that you see : When analyzing the viewer's sensory response to a particular visual, it is important to consider the visual elements that attract the eyes.
What is consumer a price elasticity : What is Consumer A's price elasticity and is he more or less elastic than Consumer B?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Show the computer security checklist

Computer security checklist - Three major categories: preventive, detective, and corrective controls.

  Database administrator for department store

Database Administrator for Department Store - Identify the potential sales and department store transactions that can be stored within the database

  Emerging technologies in the field that you are covering

For example if your name is John Doe, the file will submitted as DoeJ.docx. If you submit a screen recording be sure to test the link to either the screencastomatic or youtube server prior to submission. Do not attach the video file. Include a br..

  Explain the pros and cons of amazon web services

Determine the key business requirements that Amazon's IT must meet to implement its SharePoint solution. Explain the pros and cons of Amazon Web Services Cloud for IT organizations

  Describing the need to justify investing in it projects

Review the contents of this document and find two articles describing the need to justify investing in IT projects.

  What changes the system brought to the business world

Assignment Effect of Systems on Business. What changes the system brought to the business world? What business processes changed because of the system?

  Logical and physical representationsdescribe how logical

logical and physical representationsdescribe how logical and physical representations of a to-be system will

  Describe the business environment and identify the risk

A successful IT administration strategy requires the continuous enforcement of policies, standards, and practices (procedures) within the organization.

  Describe qualification each firm holds putting into consider

Describe the qualifications/certifications each firm holds putting into consideration required resources such as course textbook, Internet, in microsoft word.

  Internal controls concepts knowledge

Write and submit 10 audit questions that will help you establish the degree to which the organization is complying with IS objectives as defined by the CISM certification requirements focusing on IS governance. Emphasize areas where the technology..

  How would compose a team for completing a course

How would compose a team for completing a course/work project in terms of the three dimensions listed above.

  Describe the integrative functions and activities

You are currently the Chief Information Officer (CIO) for an innovative Internet-based company with gross revenues of more than $35 million dollars per year. During an executive leadership meeting, you were told that your company will be merging w..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd