Management Informations Systems And Human Computer Interaction

IT 4683 Management of IT

Exercise 5- Auditing IT Controls

Your name:

 

Policies:

· Submissions made through a means other than the GeorgiaView (D2L) Dropbox will be ignored and earn a 0.

· Submissions without your name stated above earn a 0.

· Submissions not in an docxor pdf file or with the original questions and/or formatting removed from the file earn a 0.

· Submissions without adequate references or acknowledgements will earn a discounted grade, potentially a 0.

· Submissions that I cannot open or require a password will earn a 0.

· Second chances might be requested at any time through GeorgiaView email, and are awarded at the sole discretion of the instructor.

 

Review, Evaluate and Adopt Approaches to IT Management through Auditing IT Controls

 

Being successful in this course requires you to review, evaluate, adapt and adopt methods that might be incorporated into your approach to managing IT through auditing IT controls. This exercise intends to aid you in doing so.

 

Readings for this assignment:

· Selected readings on the web

· Course Textbook [1]- Preface through Chapter 5 (Pages 1-31)

 

Actions/Deliverables for this assignment:

· Read as per above

· Research what you read

· Respond to this assignment within the docx file (leaving all questions and formatting intact)

· Deliverable: Upload your response using the dropbox tool in GeorgiaView

· Deliverable: Make entries on the Module 5 Discussion

· Deliverable: Cite all references and indicate which method used at the end of the file.

 

 

 

 

 

 

 

 

Q1 – 25 points From the textbook’s [1] use of concepts and terminology in Chapters 3 to 5, pick the top 10 to 20 of the terms and concepts useful for managing IT risks, providing IT assurance, and utilizing sound Human Computer Interaction (HCI) principles in IT operations. Tell why you have made each choice. (Example terms and concepts include risk, controls, assurance, users, operations, access, etc.)

 

Q2- 25 points You have been promoted to Call Center Director [2] and your organization follows CobiT [1]. Part of your promotion was to recognize your abilities in working in the HCI part of IT that is, working with users, including human factors, ergonomics and user-centered computing. In awarding the promotion, the CIO specifically mentioned that you took better care of the call center reps so they could take better care of the callers. Since user experience is the key to your call center’s success, you want to incorporate that user-centric flavor into the Call Center IT. You see this can be incorporated into the auditing of IT controls that is ongoing within your organization.

 

Once again you turn to a web search and discover that heuristic evaluation [3, 4] is an approach to user-centered evaluation that will work nicely within the Call Center to evaluate operational effectiveness [1, page 29]. You conclude that through a small (n=6) panel of expert users (expert call center reps), the usability effectiveness of the Call Center’s password policies and procedures can be regularly assessed, and thereby contribute coverage of HCI to IT Assurance. Write a 1 to 2 page plan to complete regular heuristic evaluations of the IT within the Call Center that will contribute to evaluating IT’s operating effectiveness.

 

Q3 25 points Complete Caselet 5 Software Programs Inc. for the Caselets [5, pages 16-17]. Write at most 4 pages on the 4 questions at the end.

 

Q4 15 points Have you ever had a major incident with your own IT (virus, attack, loss of data, etc.)? If so, describe it. State whether you implemented any of the advice listed in the textbook [1] and whether it helped you. If you have not had a major IT incident, review and comment on the helpfulness of the advice in the textbook [1] for detecting and/or dealing with an IT incident. Write at most 2 pages.

 

 

Required: Complete GeorgiaView Discussion Posting: 10 points

 

· Using your answers to the questions above, review and summarize your ideas about auditing IT controls and the role of HCI in doing so.

· Record your answers here.

· Also, enter your answers on the Module 5 Discussion.

 

 

 

 

 

Sources and works used in completing this exercise:

a. Textbook: IT Governance Institute. IT Governance Using COBIT and ValIT: Student Book, 2nd Edition. 2007.

b. http://en.wikipedia.org/wiki/Call_centre does a good job of describing what a call center is all about and was retrieved on 28 April 2013.

c. http://en.wikipedia.org/wiki/Heuristic_evaluation describes heuristic evaluation and has many good links. It was retrieved on 29 April 2013.

d. http://www.usability.gov/methods/test_refine/heuristic.html describes heuristic evaluation and has many good links. It was retrieved on 29 April 2013.

e. 5Caselets: IT Governance Institute. IT Governance Using CobiT® and ValIT™, 3rd Edition. 2010.

 

Required: Please add your list of sources.

Required: Please complete the following:

___ I did not use any method of citation (maximum B on the assignment).

___ I used the ACM approach and have cited my references as I went in the text and also listed them at the end.

___ I used the APA approach and have cited my references as I went in the text and also listed them at the end.

___ I used the MLA approach and have cited my references as I went in the text and also listed them at the end.

 

Required: Acknowledgements of people and discussions used in completing this exercise:

Information System Case Study Apple Co

Case Study-1 -Question

Prepare an in-depth analysis of four case studies during the semester. Here are some guidelines:

· This is an individual assessment, which is a part from your course score. It requires effort and critical thinking

· Answer all the questions listed below for each case.

· The ‘answers’ to the questions are best formulated by reviewing the case and the reading materials up and including the current week in the course.

· The questions are worded to help you apply the readings to the case, so don’t limit yourself to the case’s terminology and perspective. The best analysis will abstract the case content by applying the reading materials to draw broader lessons about the material

 

 

Case Study 1: Apple Merging Technology, Business, and Entertainment

 

1) Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark)

 

2) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark)

 

3) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark)

 

Case Study 1: Apple Merging Technology, Business, and Entertainment

 

This might sound hard to believe, but a bit more than a decade ago, Apple was on the brink of bankruptcy. Apple Computer Inc., now back from near oblivion, is blazing a trail through the digital world with innovation and creativity that has been missing from the company for the past 20 years. The unique feature of Apple’s competitive advantages is that they come from customers and users, not Apple employees. That’s right; the company welcomes products created by consumers to sell to consumers, a trend new to business.

 

Capitalizing on the iPod

With millions of iPods in the hands of consumers, many people are finding ways to capitalize on the product. John Lin created a prototype of a remote control for the iPod and took his prototype to Macworld, where he found success. A few months later, Lin’s company had Apple’s blessing and a commitment for shelf space in its retail stores. “This is how Apple supports the iPod economy,” Lin said. In the iPod-dominated market, hundreds of companies have been inspired to develop more than 500 accessories—everything from rechargers for the car to $1,500 Fendi bags. Eric Tong, vice president at Belkin, a cable and peripheral manufacturer, believes that 75 percent of all iPod owners purchase at least one accessory—selling over 30 million accessories to date. With most of the products priced between $10 and $200, that puts the iPod economy well over $300 million and perhaps as high as $6 billion. Popular iPod accessories include:

■ Altec Lansing Technologies—iPod speakers and recharger dock ($150).

■ Belkin—TuneCast mobile FM transmitter ($40).

■ Etymotic Research—high-end earphones ($150).

■ Griffin Technology—iTrip FM transmitter ($35).

■ Kate Spade—Geneva faux-croc mini iPod holder ($55).

■ Apple—socks set in six colors: green, purple, blue, orange, pink, and gray ($29).

■ Apple—digital camera connector ($29).

 

Capitalizing on the iPhone

Looking at someone using an iPhone is an interesting experience because there is a good chance they are not making a phone call. They could be doing a number of things from playing a game to trading stocks, watching a TV show, or even conducting business with a mobile version of salesforce.com ’s customer-management software. In a brilliant strategic move, Apple let outsiders offer software for the iPhone and in less than six months, more than 10,000 applications had been created. In fact, more than 15,000 applications are available at its app store section of iTunes, and they have been downloaded a total of 500 million times. Now, many of the iPhone apps are available for the iPad. The iPhone and iPad app store market is getting so huge relative to other smartphone markets that some developers argue there is little point adapting applications for Google’s Android or any other iPhone competitor. According to Jeff Holden, CEO of Pelago Inc., when he created his social networking company he fully intended to follow the conventional wisdom for how to build a sizable, fast-growing software company: Get your programs on as many platforms and devices as possible. But when he crunched the numbers he came to an interesting business conclusion: The 13 million iPhone owners had already downloaded more applications than the 1.1 billion other cell phone owners! To entrepreneurs, developing a program for the iPhone automatically provides a significantly larger market—almost 94 times larger than its competitors. “Why would I ever build for anything but the iPhone?” Holden asked

 

Capitalizing on the iPad

Apple’s latest release, the iPad, is a lightweight, portable, tablet computer, similar to the iPhone, that allows customers to download applications, check email, and play music all at the touch of a button. Both the iPhone and the iPad can multitask, allowing customers to read a web page while downloading email in the background over wireless networks. The arrival of the iPad brought a simultaneous expansion of the network of accessories. Because the iPad was designed with an exposed screen and without a camera, separate keyboard, memory card slots, or expansion ports, one might say it was specifically built for accessories. Many owners will modify it in some way, whether for mere decoration or hard-core protection. A few of the new accessories include:

■ iPad Clear Armor screen protector—$35.

■ iPad Antique book case cover—$40.

■ iPad wireless keyboard—$99.

■ iPad overcoat sleeve—$35.

■ iPad Joule luxury stand—$130.

 

Apple has consistently outperformed its key rivals through the development of its MP3 player, the iPod, and continues to make its products smaller and less expensive, while providing complementary features such as games and applications. For the iPhone, Apple developed a unique application called Siri, a voice-activation system that is capable of recognizing voice commands. Siri can perform all kinds of functions from dialing a contact and creating an email to location services such as “Find my Phone,” ensuring lost phones are found quickly.

 

Apple’s latest offering is a new service called the iCloud. The iCloud has the ability to collect all

of the content, including videos, photos, songs, books, etc., from customer devices such as iPods,

iPads, and iPhones in one secure location in “the cloud.” Apple customers no longer have to worry about backing up their applications or data because everything is automatically uploaded and stored in the iCloud when using an Apple device. In a fast-paced, technology-driven sector, with competitors quickly following suit, Apple is constantly pressured to develop new products and product extensions. Luckily Apple stays ahead of the pack by focusing on the following key competitive advantages:

■ Customer focus: Apple is driven by customer satisfaction and ensures customers are deeply

involved in product development and application development.

■ Resources and capabilities: Apple continues to invest heavily in research and development to take advantage of new technologies, improved facilities, and cloud infrastructures.

■ Strategic vision: Apple has a clear alignment of its vision, mission, and business leadership and goals.

■ Branding: Apple is the leader in brand loyalty as it has achieved cult status with its authentic

product image.

■ Quality focus: Apple has an outstanding commitment to quality.24

 

 

 

 

 

 

 

 

 

 

 

 

Answer

PRG/420: Java Programming – 3 LABS

(LAB 1) Exact Change

Write a program with total change amount in pennies as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies.

Ex: If the input is: 0

the output is:  No change

Ex: If the input is:  45

the output is:

1 Quarter

2 Dimes

(LAB 2) Leap Year

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:

1) The year must be divisible by 4

2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400

Some example leap years are 1600, 1712, and 2016.

Write a program that takes in a year and determines whether that year is a leap year.

Ex: If the input is:  1712

the output is:  1712 is a leap year.

Ex: If the input is:  1913

the output is:  1913 is not a leap year.

(LAB 3) Name Format

Many documents use a specific format for a person’s name. Write a program whose input is: firstName middleName lastName, and whose output is: lastName, firstName middleInitial.

Ex: If the input is:  Pat Silly Doe

the output is:  Doe, Pat S.

If the input has the form firstName lastName, the output is lastName, firstName.

Ex: If the input is: Julia Clark

the output is:  Clark, Julia

Case: Netflix Inc.: The Disruptor Faces Disruption (W17722)

#1a: How did Blockbuster emerge as an industry leader (what came before and how did it win)?

1b: How does Clayton Christensen define a disruptive innovation?

#2a: In what ways did the advent of digital video delivery represent a disruptive innovation to Netflix’s DVD-by-mail business?

2B: What risks did Netflix face if it was successful at video downloading/streaming?

#3a: What are Reed Hastings’s biggest decisions at the end of the case?

3b: How should he assess the relative merits of each of Netflix’s options?

#4: What other industries/Companies can you think of that have faced, or are facing, similar challenges in a move to digital delivery?