Need Help finishing an assignment for Introduction to Information Systems Textbook: Wallace, P. (2018). Introduction to Information Systems (3rd ed.). New York, NY: Pearson Educat

Heissel Rivero

Week 4 Assignment

10-1. What are ethics? What are two broad categories of ethics? What approach does each category take? What are examples of each category of ethics? What is the difference between ethics and the law?

Ethics are moral principles that guide a person's behavior or the way an activity is performed. Two broad categories of ethics are consequentialist and non-consequentialist. Consequentialist judge rightfulness and wrongfulness of an action based on the consequences, while non-consequentialist judge the same but based intrinsic on the action rather than its consequences. Ethics are sets of moral values and laws are structured rules enforced by governments to keep citizens in line.

10-3. What is plagiarism? What are the information ethics associated with plagiarism? What is the impact of digital media on the information ethics of plagiarism? What are examples of technologies used to detect plagiarism?

Plagiarism is taking someone’s work and make it your own without giving recognition to the right people. The information ethics associated with plagiarism are privacy invasion, hacking, anonymity, surveillance, spamming, etc. There is a big impact on the digital media part of information ethics on plagiarism, most companies, developers, publishers and media companies have taken the initiative to use and enhance security for their digital information to prevent all sorts of events. Some technologies to prevent plagiarism are encryption, access control and digital right management(DRM) while technologies to detect plagiarized information exists all over the web.

10-5. Why do organizations implement surveillance? What are the advantages of surveillance? What are the disadvantages of surveillance?

10-7. What are the two types of threats to information security? What are examples of each type of threat?

10-9. What are examples of administrative controls that organizations implement to improve security?

10-11. Why is human behavior often the weakest link for information ethics, information privacy, and information security? What are examples of strategies that organizations can implement to counteract the weaknesses in human behavior and decision making that have a negative impact on information security and privacy?

11-1. What are the seven phases of the systems development life cycle? What activities occur in each phase?

11-3. What is the iterative method of software development? How do the SDLC tasks occur in this method of development? What role does time play in this development methodology?

11-5. Why do organizations choose one software development methodology over another? What are two factors that affect this decision? Why do organizations consider each of these factors when selecting a software development strategy?

11-7. What are the advantages and disadvantages of buying prepackaged software?

11-9. What steps do organizations take when they decide to buy rather than build software? What activities occur in each step? How is an RFI different from an RFP? Does the logical approach to systems procurement always prevail? What are examples of ways in which the human element affects information systems procurement decisions?

11-11. What role should senior managers play in systems development and procurement?

12-1. What is a project? How do projects differ from business processes? What three forces constrain every project? How does each constrain a project?

12-3. What role does a project manager play in overseeing a project? What skills do project managers need? What are the characteristics of effective project managers?

12-5. What is the purpose of a Gantt chart? How is it used in project management?

12-7. What are the main factors that cause projects to fail? What are the main factors that enable projects to succeed?

12-9. What are two IT funding models that organizations use to determine how IT expenses are allocated and costs recovered? How are IT expenses charged in each model? How does each funding model affect human behavior?

12-11. What is project portfolio management? Why do organizations need project portfolio management?

12-13. What is disaster recovery? What are the major tasks associated with disaster recovery?

12-15. What is a cognitive bias? What are examples of cognitive biases? What is a black swan phenomenon? How do cognitive biases and black swan phenomena affect strategic planning for information systems?