Chapter
4
1. As the information systems
manager for a small manufacturing plant, you are responsible for anything
relating to the use of information technology. A new inventory control system
is being implemented to track the quantity and movement of all finished
products store in a local warehouse. Each time a forklift operator moves a case
of product, he or she must first scan the product identifier code on the case.
The product information is captured, as is the day, time, and forklift operator
identification number. This data is transmitted over a local area network (LAN)
to the inventory control computer, which then display information about the
case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to
monitor worker productivity. He will be able to tell how many cases per shift
each operator move and he plans to use this data to provide performance
feedback that could result in pay increases or termination. He has asked you if
there are any potential problems with using the data in this manner and, if so,
what should be done to avoid them. How would you respond?
Answer:
As the information system manager, since there is an
upcoming new inventory system to control and monitor the productivity of our
worker, as part of the job I will be the in-charged and it will be my
responsibility to follow up the development of the system. Addition, I I’m also
responsible for analyzing the potential problems that the new system will
encounter. So, if there is, I will just explain to our manager the possible
problems that will occur when using the system and to avoid them, when the
system is already developed and ready to use, I will recommend to have workers
who will maintain the system, so that its usability and reliability will last
longer.
2. You have been asked to
help develop a company policy on what should be done in the event on a data
breach, such as unauthorized access to your firm’s customer database which
contains some 1.5 million records. What sort of process would you use to
develop such a policy? What resources would you call on?
Answer:
For
me, the first step that I will make in order to develop a company policy is to
first know the business of the company, what are their ways of having such an
operations in order for me to develop such policy. And when I completely understand their
problem, then I will next go to an IT professional to help me develop the
policy for their problem of data breach. The only thing that I can recommend is
that they should develop a system that will block the access from an
unauthorized person.
3. You are new manager for a
product line of Coach Purses. You are considering purchasing customer data from
a company that sells a large variety of women’s products online. In addition to
providing a list of names, mailing addresses, and email addresses, the data
includes an approximate estimate of customer’s annual income based on the zip
code in which they live, census data, and highest level of education achieved.
You could use the estimate of annual income to identify likely purchases of
your high-end purses and use email addresses to send emails announcing the new product
line and routing its many features. List the advantages and disadvantages of
such a marketing strategy. Would you recommend this means of promotion in this
instance? Why or why not?
Answer:
For
me, the strategy is good. The aim of every business, especially, in marketing
business is to have as many customers as they have every day. So, the advantage
will be, it will be easy for the manager of such product line to endorse or
announce their new product to many customers, especially to those who have
enough money or high income customers because they have already the data of the
possible buyers, so the effort of spreading their product will be lessen and
also with the cost for having advertisement of the product, because there is
already a basis of possible buyers. And I think the only possible disadvantage
is, it depends to the customers if they will buy or not.
4.Your company is rolling
out a training program to ensure that everyone is familiar with the company’s
IT usage policy. As a member of the Human Resources department, you have been
asked to develop a key piece of training relating to why this policy is needed.
What kind of concerns can you expect your audience to raise? How can you deal
with anticipated resistance to policy?
Answer:
In
a company, there are different kinds of employee and their responsibility
depends on their position in the company. The expected concern of every
audience to raise maybe, some people will ask if it is really necessary
especially to those whose responsibility is not concern with the usage of IT.
But the training is good not only for those who is IT workers but also for
those who are not because it will serve as an advantage for them.
No comments:
Post a Comment