Explore BrainMass

Management Information Systems

Internal Controls & Risk Management

Smith, a certified public accounting firm, was engaged to audit the financial statements of the Sky-is-the-Limit company. The company has its own IT installation. While obtaining an understanding of internal control, Smith found that Sky-is-the-Limit lacked proper segregation of the programming and operating functions. Smith ana

Technology Role in Healthcare

You are holding your first meeting with the office managers and the newest additions to your medical center's group of affiliated physicians. The topic of this first meeting is a discussion of the benefits to be gained by connecting to the hospital network. Answer should include (but is not limited to) the following: The ben

Six Attributes of Success

The six attributes discussed include: business focus, adaptability, organizational cohesion, entrepreneurial culture, organizational cohesion, sense of integrity, and hands on top management Which one is (ones are) the most crucial for success, and why? Are there any that you see as being not very important or applicable? Wh

Portable Input Devices in Hospital System

Your hospital system has decided to purchase portable input devices for use by clinical personnel to document care at the bedside or diagnostic areas. Using proper information system terminology, explain different types, advantages, and disadvantages of portable input devices. Be sure to include the following information : - De

Disk vs Cloud Storage, Backups, SLAs

1.As we move more of our personal storage needs to the cloud, will computers really need disk storage space? Is it possible that we're in the early stages of an outrageous industry transformation? Who are the major manufacturers of disk storage for personal computers and laptops? 2.If you choose to store all your personal in

Implementing an Enterprise Resource Planning Finance System Module

We have a multinational organization making the decision to implement an Enterprise Resource Planning finance system module using a standard package such as offered by Oracle and SAP. This system will only be used by the organization's employees; that is, there are no interfaces to systems owned by the organization's external pa

Types of Networks: LAN and WWN

What are the two types of networks that are specific to the user? How are these types of networking advantageous for both the business and the end user?

Computer and Functions

List and describe the basic make-up for a computer and the function each performs. Identify and describe the two types of software.

Tablets Take Their Place in the PC Market

1. Computers, using some AI techniques, can learn. In the classroom while a child is using a tablet PC to learn the basics of addition, how can software be developed to aid in the learning process? Does this mean that teachers are no longer needed for some subjects? Are teachers needed in earlier grades while computer-based t

Information System Basics

You are working with a new employee who has experienced minimal exposure to computers or networks. As part of the orientation, you are in charge of helping this employee. Instructions You need to provide an overview of your lesson including, but not limited to, the following: Create a timeline with an overview of inform

Managerial Accounting Case Studies

1. The opening paragraph of an accounting textbook says "Managers need accounting information and need to know how to use it" Critically evaluate this statement. 2. Parkview Hospital Case Study Parkview hospital, a regional hospital, serves a population of 400,00 people. The next closest hospital is 50 miles away. Parkview

Article: Google and Apple Know Where You Are

Google and Apple Know Where You Are, Maybe In April 2011, some interesting discoveries were made regarding location tracking by Apple iPhones and iPads and Google Android smartphones. Pete Warden and Alasdair Allan, British researchers, discovered a file on Allan's iPhone that provided a detailed list of places Allan had visi

Technology as the way to move forward to success

What are some real-world examples of how organizations that embrace innovation of all types, such as technologies and processes, are more likely to thrive than those that do not embrace innovation? The old saying in business is: "if you do fail to plan then you plan to fail". When the Internet boom hit the economic arena, ev

Information Security and Ethics: Protection Policies and Procedures

Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management

Requests and Changes

How do you prepare employees to handle the changes required by adopting a new system? How would you handle numerous requests for change to a system that has just been implemented?

Organization cost accounting systems

Identify the specific cost accounting system any organization utilizes and how it uses the accounting information for financial management. Include the following: -Descriptions of the cost accounting system used in your organization -Pros and cons of this cost accounting system -Descriptions of how your organization uses th

Impact of the SOA Paradigm on Perspectives

MyInsurance Inc. is in the process of developing an SOA solution for its Insurance Quote business process. Before embarking on the project, the company wants to know the effects of architecture quality attributes, or perspectives, on an SOA solution. You have been chosen as an external consultant to advise MyInsurance Inc. o

Security Policies in Organizations

Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management

Management: Alternatives, Hierarchy Processes & Control Systems

NOTE: The text book needed for these questions is Project Management: Processes, Methodologies, and Economics , by Avraham Shtub, Jonathan F. Bard, and Shlomo Globerson ( 2nd edition). Please list references. (1) In your own words, describe the two distinct sets of project alternatives dealt with in every evaluation. In your

Distance Education Issues

Distance education over the Internet and online examinations are a great way to make education accessible across the globe to those who need it and cannot make it to full-time campus courses. Do you see the potential for ethical issues due to the way technology has transformed the field of education? If so, what are these issues

Management of Information Systems

Refer to Real World Case: Toyota, Procter & Gamble, Hess Corp., and Others After reading the case, what do you think are the most important competencies for the successful CIO of tomorrow? How do you rate yourself in those? Had you considered the importance of these skills and abilities before? Answer in narrative form using AP

Evaluating a top-rated Web portal for executives

Body: Check out CEO Express (, a top-rated Web portal for busy executives. Evaluate this Web site as a source of useful links. What advantages does CEO Express provide? Which links would be of value to you in the business environment? Why?

Role of Technology, etc.

What role do technologies such as encryption play in protecting privacy? Describe the process within public key systems if you want to support non-repudiation and securing the message. Describe how the Take-Grant model works? Which popular operating system uses it any why? Describe the 4th amendment versus security in

"Software as a Service"

Why "software as a service" is (or is not - pick one) going to dominate the next several years in information management. The case for this module calls for you to explore some of the divergent opinions about this new approach to organizational information systems and weigh some of the competing claims. First off, if you don

BUS Management of Information Systems

In narrative form, describe some of the actions that can be taken to improve the security of business uses of the Internet. Give several examples of security measures and technologies you would use. Be sure and site all outside sources.