Sample of Solution Manual for Management

advertisement
Download the full file instantly at http://testbankinstant.com
CHAPTER 1
THE INFORMATION AGE IN WHICH YOU LIVE:
CHANGING THE FACE OF BUSINESS
JUMP TO THE SUPPORT YOU WANT
 Lecture Outline
 Modules, Projects, and Data Files
 Slide Reviews
 Closing Cases
 Short-Answer Questions
 Assignments and Exercises
 Discussion Questions
 Industry & Global Perspectives
 Additional Assignments and Exercises
CONTACT INFORMATION: Stephen Haag (shaag@du.edu)
STUDENT LEARNING OUTCOMES
1. Define management information systems (MIS) and describe the three important
organizational resources within it – people, information, and information technology.
2. Describe how to use break-even analysis to assess the financial impact of information
technology.
3. Describe how to use Porter’s Five Forces Model to evaluate the relative attractiveness of
and competitive pressures in an industry.
4. Compare and contrast Porter’s three generic strategies and the run-grow-transform
framework as approaches to the development of business strategy.
CHAPTER SUMMARY
This chapter serves two primary purposes. First the chapter introduces your students to the
broad notion of management information systems within an organization and the three key
resources on which MIS focuses – people, information, and information technology.
Second, the chapter jumps right into the process of appropriately selecting which technologies
to use based on the industry in which your organization operates, the identified business
strategies for competing in that industry, and how to assess the impact of technology.
The primary sections of this chapter include:
1. MIS Resource #1: Information
2. MIS Resource #2: People
3. MIS Resource #3: Information Technology
4. Financial Impact of IT: Break-Even Analysis
5. Industry Impact of IT: Porter’s Five Forces Model
6. Strategy Impact of IT: Porter (Again) and RGT
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
LECTURE OUTLINE
INTRODUCTION (p. 4)
MIS RESOURCE #1: INFORMATION (p. 5)
1. Defining Information Quality
2. Considering Information from an Organizational Perspective
MIS RESOURCE #2: PEOPLE (p. 10)
1. Technology Literacy
2. Information Literacy
3. Your Ethical Responsibilities
MIS RESOURCE #3: INFORMATION TECHNOLOGY (p. 13)
1. Key Technology Categories
FINANCIAL IMPACT OF IT: BREAK-EVEN ANALYSIS (p. 15)
1. Reducing Fixed Costs
2. Reducing Variable Costs
3. Increasing Revenue
INDUSTRY IMPACT OF IT: PORTER’S FIVE FORCES MODEL (p. 19)
1. Buyer Power
2. Supplier Power
3. Threat of Substitute Products or Services
4. Threat of New Entrants
5. Rivalry among Existing Competitors
STRATEGY IMPACT OF IT: PORTER (AGAIN) AND RGT (p. 23)
1. Overall Cost Leadership
2. Differentiation
3. Focus
4. Run-Grow-Transform Framework
END OF CHAPTER (p. 26)
1. Summary: Student Learning Outcomes Revisited
2. Closing Case Study One
3. Closing Case Study Two
4. Key Terms and Concepts
5. Short-Answer Questions
6. Assignments and Exercises
7. Discussion Questions
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
MODULES, PROJECTS, AND DATA FILES
Supporting Modules
XLM/A Computer Hardware and Software – comprehensive tour of technology terminology
focusing on personal technologies including application software, system software, input
devices, output devices, storage devices, CPU and RAM, and connecting devices such as cables
and ports.
XLM/K Careers in Business – Extended Learning Module K provides an overview of jobs titles
and descriptions in the fields of accounting, finance, hospitality and tourism management,
information technology, management, marketing, productions and operations management,
and real estate and construction management including what IT skills you should acquire to be
successful in each field.
Group Projects
 Assessing the Value of Customer Relationship Management: Trevor Toy Auto Mechanics
 Analyzing the Value of Information: Affordable Homes Real Estate
 Making the Case with Presentation Software: Information Technology Ethics
 Analyzing Strategic and Competitive Advantage: Determining Operating Leverage
Electronic Commerce Projects
 Searching job databases
 Interviewing and negotiating tips
 Financial aid resources
 Protecting your computer
 Ethical computing guidelines
 Global statistics and resources
Data Files
There are no data files associated with this chapter. There may be data files for the Group
Projects you choose.
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
CLOSING CASES
CLOSING CASE STUDY ONE (p. 27)
THE SOCIAL MEDIA MEGAPHONE: TRANSPARENT LIFE INTENSIFIED
This is a good opening case study for the class, as your students will be very familiar with
examples of when people have used social media and made a fool of themselves.
QUESTIONS
1. What do you think of Stacy Snyder’s story? Should she be denied a degree for publicly
endorsing drinking to her underage students? To what extent do you believe that
potential employers should explore social networking sites to validate the “goodness’ of
potential employees? Is there anything on your Facebook page that might turn off
potential employers? If so, are you going to take any action?
DISCUSSION
 This is a great first question that should generate a lot of discussion.
 This is an “extreme” example of when someone’s Facebook posted results in great loss
(i.e., no degree).
 All answers are correct regarding your students’ positions on the use of exploring social
network information to learn about (potential) employees).
2.
The webcasting of funerals is an interesting example of the flatness of the world. Is this an
invasion of privacy or do next-of-kin have the right to make such a decision? What other
significant events in a person’s life might be suitable for webcasting? Identify at least
three such events and then do some research to determine if webcasting of those events
is already taking place.
DISCUSSION
 The next-of-kin definitely have the right to make this decision.
 Other webcasting applications include weddings, graduations, and even baby birthing.
3.
Osama Bin Laden represents a dark image for most Americans. His participation in the
planning of the September 11th attacks will forever mark him in a bad way. Should people,
like Rashard Mendenhall, who make positive or perhaps even neutral comments about
terrorists like Bin Laden be fired from endorsement contracts? Can making such
comments be considered grounds for termination of employment? Dismissal from your
school as a student?
DISCUSSION
 Again, an extreme example of when using social media can result in great loss.
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
 Many organizations can and do terminate employees for the positions they post using
social media. It’s legal if the company can prove that the positions may be detrimental
to the company.
 Schools probably won’t dismiss students. (We haven’t heard of any, anyway.)
4.
Very few people would question the service and commitment of military personnel to our
country. The two sergeants who created the YouTube video openly criticized Delta
Airlines for its charging of baggage fees to military personnel. Is this open form of criticism
of businesses and their practices acceptable? Will it help businesses be more accountable
to customers?
DISCUSSION
 This example illustrates the power of social media.
 So many people responded so publicly to this that all airlines changed their baggage fee
policies for military personnel.
 It’s certainly an acceptable form of criticism and will hold businesses more accountable
to their customers.
5.
The use of Facebook (or any other social networking site) can truly make a person’s life
transparent, available for the whole world to see. Should there be legislation regulating
the openness of your life on the Internet? Can we expect society to regulate this without
any laws?
DISCUSSION
 Most people agree that there should be no legislation, except for perhaps things like
sexual acts, etc.
 Society will have to regulate itself.
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
CLOSING CASE STUDY TWO (p. 29)
GOOGLE AND APPLE KNOW WHERE YOU ARE, MAYBE
In this second case study, your students will address how organizations are using technology to
track the location of people. In some instances, people don’t even know they are being
tracked.
QUESTIONS
1. Location-based tracking is common to all smartphones, for good reason or bad. The
popular location-based service company Foursquare has an app so you can check in at
various locations to receive discounts, become Mayor, and see who else might be there.
DealLeak, which aggregates deals from the likes of Groupon and Living Social, needs your
location in order to offer local discounts on products and services to you. How many
location-based service apps do you have on your smartphone? How often do you use
them and why?
DISCUSSION
 Answers here will vary according to your students.
2.
Apple and Google defended their processes by stating that their privacy policies very
clearly stated what information would be gathered, how that information would be used,
and how and with whom that information might be shared. When was the last time you
read the privacy policy of any technology tool, such as a Web browser or app? Do you
think very many people actually read these? Do the disclaimers in these privacy policies
give the offering organization the right to do anything with your information?
DISCUSSION
 Again, answers here will vary greatly.
 We all need to start reading those privacy policies.
3.
What about location-based tracking in car systems like GM’s OnStar? Those systems know
the car’s location to give you driving directions and perhaps identify local restaurants or
other venues. Are you comfortable with this? When was the last time you bought a paper
map? How much do you rely on your car’s GPS system?
DISCUSSION
 Most people are quite comfortable with GPS systems in cars.
 It’s an easy trade-off – privacy for functionality.
4.
What about smartphone tracking for parents who want to know where their children are
and where they’ve been? Minors under the age of 18 have very few privacy rights,
especially when it comes to parents’ knowledge of where they are. Are parents going too
far in wanting to know where their children are? What are the benefits of such systems
for parents? For the children? What does the term “helicopter parent” refer to?
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
DISCUSSION
 Great discussion questions.
 Most college-age students don’t like this idea.
 Most parents do.
 Helicopter parents are parents who hover over their children’s lives.
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
SHORT-ANSWER QUESTIONS (p. 31)
1. What is the relationship between management information systems (MIS) and information
technology (IT)?
ANSWER: MIS is a broad business function and the study of the use of IT. IT is a set of
tools and a resource within MIS.
2. What is the relationship between data, information, business intelligence (BI), and
knowledge?
ANSWER: Each build on the previous. Data are raw facts, while information is data that
has meaning. Business intelligence is collective information that gives you the ability to
make strategic business decisions. Finally, knowledge is a broad term that can encompass
BI context, how to affect BI, patents and trademarks, and organizational know-how.
3. How does the granularity of information change as it moves from lower to upper
organizational levels?
ANSWER: At the lowest levels, information granularity is very fine because people need
tremendous detail to perform their jobs. As information moves up through the
organization, it becomes more coarse because people don’t need as much detail but rather
aggregations of information.
4. What is the difference between a technology-literate knowledge worker and an
information-literate knowledge worker?
ANSWER: A technology-literate knowledge worker knows how and when to apply
technology; that is, he/she understands the value and role of technology. An informationliterate knowledge worker knows all about information; that is, he/she understands the
value and role of information.
5. How do ethics differ from laws?
ANSWER: Laws either clearly require or prohibit an action. Ethics are more subjective,
more a matter of personal or cultural interpretation.
6. What are the three financial elements of break-even analysis?
ANSWER: The three elements of break-even analysis are fixed costs, variable costs, and
revenue.
7. What role does the Five Forces Model play?
ANSWER: Porter’s Five Forces Model helps business people understand the relative
attractiveness of an industry and the industry’s competitive pressures in terms of buyer
power, supplier power, threat of substitute products or services, threat of new entrants,
and rivalry among existing competitors.
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
8. Why are competitive advantages never permanent?
ANSWER: Once an organization creates a competitive advantage, all competitors move to
offer similar or even better competitive advantages, thus nullifying the competitive
advantage of the first organization.
9. What are the three generic strategies according to Michael Porter?
ANSWER: The three generic strategies according to Michael Porter are: overall cost
leadership, differentiation, and focus.
10. How are Porter’s three generic strategies and the RGT framework similar?
ANSWER: They are similar as follows: (1) run = overall cost leadership, (2) grow = focus and
differentiation, and (3) transform = (new) differentiation.
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
ASSIGNMENTS & EXERCISES (p. 31)
1. USING PORTER TO EVALUATE THE MOVIE RENTAL INDUSTRY One hotly contested and
highly competitive industry is the movie rental business. You can rent videos from local
video rental stores, you can order pay-per-view from the comfort of your own home, and
you can rent videos from the Web at such sites as NetFlix. Using Porter’s Five Forces Model,
evaluate the relative attractiveness of entering the movie rental business. Is buyer power
low or high? Is supplier power low or high? Which substitute products and services are
perceived as threats? Can new entrants easily enter the market? What are the barriers to
entry? What is the level of rivalry among existing competitors? What is your overall view of
the movie rental industry? Is it a good or bad industry to enter?
DISCUSSION
 This is a good project for your students because they can easily and quickly relate to the
movie rental industry.
 It’s also a fairly easy and simple application of the Five Forces Model.
 Buyer power – high because of many choices (VOD, Netflix, local rental places, etc)
 Supplier power – low; the opposite of buyer power
 Substitute products and services – mobisodes delivered via cell phone, YouTube, pirated
movies, and many others including the commonly recognized ones
 This is a relatively easy market into which to enter
 Barriers – no late fees, some sort of online facility, etc
 Rivalry among existing competitors is very high
 Probably not a good industry into which to enter
2. REVIEWING THE 100 BEST COMPANIES TO WORK FOR Each year Fortune magazine
devotes an issue to the top 100 best companies to work for. Find the most recent of
Fortune that does this. First, develop a numerical summary that describes the 100
companies in terms of their relative industries. Which industries are the most dominant?
Pick one of the more dominant industries (preferably one in which you would like to work)
and choose a specific highlighted company. Prepare a short class presentation on why that
company is among the 100 best to work for.
DISCUSSION
 Because you’ll be assigning this exercise at different times (and because we wrote this
exercise in mid 2007), we can’t give you the correct answers for this project.
 However, your students should find a considerable number of companies in the IT field
that are the best to work for according to Fortune.
3. BREAK-EVEN ANALYSIS Perform a break-even analysis for the following scenario. Assume
you sell widgets. You have total fixed costs of $12,000. Your manufacturing and shipping of
widgets costs $7 per widget. You sell each widget for $22. What is your break-even point?
How many widgets do you have to sell to realize a net profit of $15,000?
DISCUSSION
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
 Great assignment to get your students into Excel and also understanding the impact of
break-even analysis as a tool for financial evaluation.
 Break-even point is 800.
 Break-even point is 1,000 units.
4. BUSINESS STRATEGY FOR ENTERING THE CELL PHONE SERVICE INDUSTRY Assume that you
run a start-up and have decided to enter the cell phone service industry. Which of the three
generic strategies would you choose as your primary business strategy – overall cost
leadership, differentiation, or focus? Explain your choice by elaborating on the product and
services features you would offer to lure customers from the competition.
DISCUSSION
 Again, this is another great interactive in-class project.
 We recommend that you split the class into 3 groups and have each group focus on a
different strategy.
 Your groups will come up with some very interesting ideas.
5. RESEARCHING YOUR CAREER AND INFORMATION TECHNOLOGY To position yourself in
the best possible way to succeed in the business world, you need to start researching your
career right now. Here, we would like you to focus on the IT skills your career requires.
First, consider what career you want to have. Second, visit Monster.com
(www.monster.com) and search for jobs that relate to your career. Read through several of
the job postings and determine what IT skills you need to acquire.
DISCUSSION
 We recommend that you assign this to each individual student and also cover XLM/K
(Careers in Business) in conjunction with it.
 Answers will vary greatly, but try to get all the finance majors to compile a list, all the
marketing majors, etc.
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
DISCUSSION QUESTIONS (p. 34)
1. The three key resources in management information systems (MIS) are information,
information technology, and people. Which of these three resources is the most
important? Why? The least important? Why?
DISCUSSION
 The most important resource is people, plain and simple. People are the heart of any
business, regardless of its industry and regardless of the extent to which it uses
technology.
 The least important is really technology. We simply use technology to work with
information. If information were not so important, we would need much less
technology.
2. We often say that hardware is the physical interface to a technology system while software
is the intellectual interface. How is your hardware your physical interface to your
computer? How is your software your intellectual interface to your computer? Do you see
technology progressing to the point that we may no longer distinguish between hardware
and software and thus no longer perceive differing physical and intellectual interfaces?
DISCUSSION
 Hardware is the physical interface because it is the physical devices that make up a
computer. Hardware is the also the set of devices we interact with physically – typing
on a keyboard, moving a mouse, viewing something on the screen.
 Software takes over steps that we would otherwise perform with our mind – adding two
numbers together, creating a graph, etc. So, it is our intellectual interface.
 Who knows if technology will ever progress to the point that we can’t distinguish
between hardware and software.
 However, our view of technology is changing. We see it as an integrated set of tools.
That view may make hardware and software indistinguishable.
3. In a group of three to four students, consider eBay in the context of Porter’s Five Forces
Model. How does eBay reduce the threat of new entrants? If necessary, you may want to
explore eBay’s site (www.ebay.com) and determine the role of buyer and seller ratings, its
integration with PayPal, and how it helps buyers and sellers resolve disputes.
DISCUSSION
 eBay uses many techniques to reduce the threat of new entrants. These essentially
become entry barriers that are costly and time-consuming for new entrants to
implements.
 Some include buyer and seller ratings, eBay learning seminars, and PayPal as a financial
cybermediary for payments.
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
4. In this chapter, we discussed the use of loyalty programs in the travel industry as a
mechanism for reducing buyer power. What is another industry that also uses loyalty
programs to reduce buyer power? How does that industry use loyalty programs to do so?
DISCUSSION
 Loyalty programs are just about everywhere – restaurants now have programs in which
you accumulate points toward free meals, Office Max and Office Depot have similar
programs, home supply stores do as well, and so on.
5. As an information-literate knowledge worker for a local distributor of imported foods and
spices, you’ve been asked to prepare a customer mailing list that will be sold to
international cuisine restaurants in your area. If you do so, will you be acting ethically?
Suppose you don’t consider the proposal ethical. What will you do if your boss threatens to
fire you if you don’t prepare the list? Do you believe you would have any legal recourse if
you didn’t prepare the list and were subsequently fired?
DISCUSSION
 Answers here will vary according to your students’ ethics.
 It is legal for the distributor to sell a customer mailing list, if it has clearly stated so in its
privacy and information usage policy. So, depending on in which state you work (and
whether or not you work for a union), you may be subject to being fired.
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
INDUSTRY & GLOBAL PERSPECTIVES
INDUSTRY PERSPECTIVE – Employment Information Has Gone Social (p. 10)
 Many of your students will be familiar with this
 Most young people are finding jobs by using social networks
 Organizations are making major pushes now to find employees on these social networks
 Lesson – is your Facebook information a detriment to job hunting?
Return to Slide #17
INDUSTRY PERSPECTIVE – Spending Money to Save Customers (p. 18)
 Often times, you have to spend money just to keep your customers from going to the
competition.
 Such is the case with HBO and its HBO Go initiative
 HBO offers this mobile service for free to paid TV subscribers in the hopes that they won’t
abandon HBO for something like Netflix.
Return to Slide #30
INDUSTRY PERSPECTIVE – Valentine’s Day Goes Virtual (p. 24)
 Almost every aspect of our lives is going virtual.
 Now, you don’t even have to buy real (physical) gifts or cards for Valentine’s Day.
 Many organizations offer virtual gifts and cards you can send to someone, while never
leaving your computer.
Return to Slide #42
INDUSTRY PERSPECTIVE – Innovate or Go Home (p. 25)
 All organizations must constantly be innovating in their industries.
 The competition is innovating and so must you.
 There are several great IT-enabled innovations in this perspective.
Return to Slide #50
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
ADDITIONAL ASSIGNMENTS AND EXERCISES
E-MAIL: ELECTRONIC MAIL OR EXPENSIVE MAIL?
Note: Use this in the section on ethics and your ethical responsibilities


Provide your students with the above graphic.
Ask them to develop answers to both the “yes” and “no” components at the bottom.
Download the full file instantly at http://testbankinstant.com
Download the full file instantly at http://testbankinstant.com
IDENTIFYING HARDWARE AND SOFTWARE
Note: Use this in the section on information technology as a key resource
Pick up a recent copy of your local newspaper or perhaps a computer magazine such as PC
Magazine or Wired and find an ad for a personal computer system. What is the price of the
complete system? What hardware devices does it include? What software does it include?
Now, compare that system to a similar one that you can find on the Internet (you might want to
start at Dell at www.dell.com). Which is cheaper? Does this surprise you? Why or why not?
Finally, identify all the various computer components and place them in the graphical depiction
of information technology hardware and software in Figure 1.6 on page 15.
DEVELOPING STRATEGIES FOR PROTECTING YOURSELF FROM IDENTITY THEFT
Note: Use this anywhere in the chapter.
Identity theft is not something that happens to someone else. Almost 10 million people in the
United States reported themselves as victims of identity theft in 2002 – that’s about 1 in every
29 people (even less when you take children out of the equation).
Focus on creating a comprehensive list of steps you can take to avoid identity theft. Write
down the most important steps. To help you start, consider visiting these sites:
 Federal Trade Commission – www.ftc.gov
 Identity Theft Prevention and Survival – www.identitytheft.org
 MSN’s Money – http://money.msn.com
 Identity Theft Resource Center – www.idtheftcenter.org
Back to Jump List
Download the full file instantly at http://testbankinstant.com
Download