Chapter1.Q1This chapter presents a very simple framework, the Information Systems Strategy Triangle, which links business strategy with organizational strategy and information strategy. The chapter describes this model and builds on several other popular strategy models and organizational models. The goal of this chapter is to make sure every student has a basic understanding of both strategy and organizations. If you are familiar with the business strategy and organizational behavior, this chapter is a review of key points from those two fields.
This from the overview of the chapter
(SEE TEXTBOOK) (ATTATCH)
Chaapter3. Q2; from textbook.
Chapter5. Q3; This chapter explores the relationship between the transformation of business and information systems. There are three key concepts in this chapter:
- Businesses operate as a set of business processes, rather than as a set of functions, departments, or other organizational forms
- Business processes are redesigned using both radical (re-engineering) and incremental techniques
- Information Systems are used to transform a business (by way of changing their business processes). Two of the major concepts discussed in the chapter are Integrated Supply Chains and Enterprise Systems. Other subjects covered in this chapter are agility and the need for constant redesign of business processes and business process management systems are introduced.
(YOU MAIGHT FIND THE REST FROM THE TEXTBOOK)
Chapter6. Q4;These are from Canvas but not sure which ones he means exactly.
Why is this important?
Google Data Center
IBM Infrastructure Delivering Business Value Build an IT Infrastructure that Delivers Value (Links to an external site.)Links to an external site.
Chapter7. Q5; From the materials he posted on canvas.
General Managers must understand the basics to ensure continuance of operations. This chapter explores managing security in five areas: strategy, infrastructure, policies, training and investments. The chapter also discusses common tools that aim to secure access, data storage, and data transmission to prevent these breaches and their advantages and disadvantages.
CHAPTER 7 – Additional Resources
Sony Pictures Data Breach 2014
Forbes Sony Article – What You Need to Know
NBC News – Office of Personnel Management 2015
Chapter9. Q6 I think this question should be answered from the textbook
See attached please (((Questions and the textbook)