In: Operations Management
Book: Information Systems Today Managing In The Digital World 7th Editon
Answer should conform APA standards
Please answer each question
The answers should include external sources to highlight diverse viewpoints and demonstrate a thorough comprehension
Chapter 9 – Developing and Acquiring Information Systems
Compare and contrast drivers that are used for price sensitive customers versus time sensitive customers. Select a company/industry as a case.
9-1. Describe the productivity paradox.
9-10. List and describe two main types of software licenses.
Chapter 10 – Securing Information Systems
10-07. Define and contrast cyberharassment, cyberstalking, and cyberbullying.
10-08. Define and contrast cyberwar and cyberterrorism.
Supply chain is consisting of different drivers which effect
customers differently. Some parts of the supply chain directly
affects the prices to customers and design of these specific
segments required to be more customer oriented according to the
price. While other factors such as facilities, inventory and
transportation are totally focused on time oriented or time
sensitive customers. Production and storage as well as high
inventory and quick transportation using better transportation
career increases the overall cost. Information regarding both of
the aspects can be designed according to the needs of the specific
customer. Low price products are usually less time oriented as the
customer look for the lower prices rather than looking for Greater
delivery. Whether premium products fall under the category of time
oriented products which increase the overall cost involved in
shipping and maintenance but get the higher pricing for the same
product.
Laptop manufacturers are the finest example of these kind of
strategies. Where the premium laptops are mostly provided through
the hi speed shipping channels as well as in store availability,
cost oriented products for cost sensitive customers are usually
slow and delivered to slow channels to the customers which reduces
the overall cost involved in the shipping and handling of the
specific product.
The productivity paradox can be defined as reduction in the overall productivity due to the installation of new systems which are meant to be increasing the overall productivity of the specific organisation. Sometimes Information Systems increase the overall productivity but other forces involved in the same facility decreases the overall productivity by simultaneously working on reducing it.
Two different type of software licences are as follows.
Public domain licence
Public domain licence can be defined as a licence which is equivalent for the licence that is granted to the public domains. This is specific licence is used to create a possibility of using the copyrighted content by anyone without any conditions without damaging the licence compatibility which is usually present with other licences. Different countries have different rules regarding the public domain licence and it changes from region to region.
Permissive software licence
Permissive software licence can be defined as a free software licence which has a very minimalistic requirement regarding the redistribution of the system. It just requires attributing of the original portfolios of the specific licence with the original developer in addition to your own code or documentation.
Cyber stalking
Cyber stalking can be defined as an activity of consistently watching, following are communicating with someone online that specifically does not want you to follow them.
Cyber bullying
Cyber bullying can be defined as a process in which one person is threatened by other person using different threatening messages or other factors such as fear is imposed on the other person.
Cyber harassment
Cyber harassment can be defined as putting rude comment on somebody's online presence as well as harassing using bad words or using bad phrases.
Cyber War
Cyberwar can be defined as an informational War for injecting
different programs into other countries internet locations. By
hacking official websites of different governments as well as
targeting different countries using digital tools can be described
as Cyber War between two countries.
Cyber terrorism
Cyber terrorism can be defined as a political motivated use of computers which increases fear in the environment or creates severe disruption. It includes use of internet for conduction of violent acts which lead to loss of life or significant bodily harm.