CHAPTER 6
4. As the information systems manager for a small
manufacturing plant, you are responsible for anything relating to the use of
information technology. A new inventory control system is being implemented to
track the quality and movement of all finished products stored in a local
warehouse. Each time a forklift operator moves a case of product, he or she
must first scan the product identifier code on the case. The product
information is captured, as is the day, time and forklift operator
identification number. This data is transmitted over a local area network (LAN)
to the inventory control computer, which then display information about the
case and where it should be placed in the warehouse.
The
warehouse manager is excited about using case movement data to monitor worker
productivity. He will be able to tell how many cases per shift each operator
moves and he plans to use this data to provide performance feedback that could
result in pay increases or termination. He has asked you if there are any
potential problems with using the data in this manager and, if so, what should
be done to avoid them. How would you respond?
Answer:
In my opinion, if my manager asked if
there are any potential problems using the data, I will just respond to him
that every system is not perfect and there’s always be a little mistake to be
take of. Sometimes, there are instances that the system will not meet the
expectation of the users as well as the company. Also, the system may encounter
a problem that should be check and fix by the creator or inventor of the system
in the company.
In order to prevent or avoid that kind
of problems, try to use the system very carefully and the system should have a
manual be a back up if the system will be corrupt and try to understand the
said manual in order for the problem to solve easily. It is the responsibility
of the creator or the programmer of the system to maintain the capabilities of
the system but then they deserved to be pay of by the company.
5. You have been asked to help develop a company policy
on what should be done in the event of a data breach, such as unauthorized
access to your firm’s customer database which contains some 1.5 million
records. What sort of process would you used to develop such a policy? What
resources would you call on?
Answer:
In
this kind of state, If they asked to help develop a company policy on what
should be done in the event of a data breach, such as unauthorized access to
your firm’s customer database which contains some 1.5 million records then the
only thing I want to do is to use the said policy which is just to protect the
sensitive information of the company. The customers as well as the company’s
can benefits about this matter.
However, many breaches occur outside
a company’s computer network, with lost or stolen laptops, discs, flash drives,
and other portable storage devices accounting for a significant percentage of
serious breaches. The company that you are working right now may needs to hire
a public relations firm or a crisis response consultant for the possible damage
control. We should repair the data breach problem and recovering lost or
damaged data can be expensive and must be hired person who are experts about it
and that would be the sources to be use of.
6. You are a new brand manager
for a product line of Coach Purses. You are considering purchasing customer
data from a company that sells a large variety of women’s products online. In
addition to providing a list of names, mailing addresses, and email addresses
the data includes an approximate estimate of customer’s annual income based on
the code in which they live, census data, and highest level of education
achieved. You could use the estimate of annual income to identify likely
purchasers of your high-end purses and use email addresses to send emails
announcing the new product line and touting it’s many features. List the
advantages and disadvantages of such a marketing strategy. Would you recommend
this means of promotion in this instance? Why or why not?
Answer:
For
me as a new brand manager for the product line of a Coach Purses, I will
suggest the means of promotion in this instance because in that instance the
findings of the particular information of a customers are easily to identify
with their names, mailing addresses, and email addresses and also the data
includes an approximate estimate of customer’s annual income based on the code
in which they live, census data, and highest level of education achieved. So I
better recommend the said instance in order to make that transaction more
valuable.
7. Your company is rolling out a training program to
ensure that everyone is familiar with the company’s IT usage policy. As of the
Human Resources department, you have been asked to develop a key piece of the
training relating to why this policy is needed. What kind of concerns can you expect
your audience to raise? How can you deal with the anticipated resistance to the
policy?
Answer:
The only concern in
that situation is to have good performances for the employees of my company.
This could be the way to success of our company, and this is a good policy
especially if your company runs with technology.
8. You are the OPO of a midsized manufacturing company
that has sales of more than $250 million per year and almost $50 million from
online sales. You have been challenger.
Answer:
CHAPTER 7
Discussion Questions
1. Should Apple conduct
extensive screening of Apps before they are allowed to be sold the App Store?
Why or why not?
Answer:
Yes
of course, the Apple should conduct an extensive screening of Apps before they
allowed to be sold the App store because Apple is one of the greatest and
hottest brand in this new generation and because of its high-quality standard,
high definition and high valued they must be careful in the products before they
sell/
They should conduct an extensive
screening of Apps because many people has a high expectation of Apple Apps
because they already know that Apple is one of the best brand of the gadgets
nowadays and Apple should meet the expectation of the users.
2. Do research to determine the
current status of the FCC investigation of Apple for banns use of the Adobe
Flash software on devices that use the iOS operating system.
Answer:
The
flash it is under by the multimedia principles produced by the adobe flash that
you can choose like adding video, animations and etc.
The brand
Apple provides a suitable design to their investors or even in the customer
that can have appropriate insights on the company or in their organization.
3. What do you think of Apple’s
guideline that says it will reject in app for any content or behaviour that
they believe is over the line? Could such a statement be constructed as a
violation of the developer’s freedom of speech? Why or Why not?
Answer:
In my opinion, the guideline statements of the Apple
Company are not constructed as violation of the developer’s freedom of speech because
the said company was trying to fit their applications in their line and not
over the line. Because of that, those applications that are over line must be
rejected and for those application that is in the line is accepted by the Apple
Company.
The Apple Company just wants to maintain
and ensure the capabilities and qualities of their products so that it will
meet the expectation of the people most especially to the die hard customers.
Therefore, the Apple Company guidelines is just concern with their applications
for the users to be satisfy.
Walang komento:
Mag-post ng isang Komento