This Document Contains Chapters 5 to 8 Chapter 5 Protecting Information Resources Reviews and Discussions 1. Define baiting and quid pro quo as they are used for committing computer crimes. Answer: Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. For example, after completing this form you will receive a free software or a gift card. Similar to baiting, quid pro quo involves a hacker requesting the exchange of critical data or login information in exchange for a service or prize. 2. What are the three components of the CIA triangle? Answer: Confidentiality, integrity, and availability. 3. What are three types of hackers? Answer: Script kiddies, black hats, and white hats. 4. What are three examples of intentional threats? Answer: Viruses, worms, and Trojan programs. 5. What is tailgating as used for committing social engineering attacks? Answer: Tailgating or “piggybacking” takes place when an unauthorized person follows an employee into a restricted area for example an individual impersonates a help desk employee. 6. Who are the prime users of iris analysis? Answer: Smartphones, ATMs, and autos will be the prime users of iris scan technology for ID verification. 7. What are three types of firewalls? Answer: Packet-filtering firewalls, application-filtering firewalls, and proxy servers. 8. What is business continuity planning? Why is it needed? Answer: Business continuity planning outlines procedures for keeping an organization operational in the event of a natural disaster or network attack. It is needed to lessen the effects of a natural disaster or a network attack or intrusion, planning the recovery is important. Projects 1. The computer lab of a local college needs a one-page document that it will distribute to its incoming students to increase their security awareness. After reading the information presented in this chapter and other sources, prepare a document, which should include a 10-item bullet list of the things that students must remember to reduce the risks of using information technology. Answer: Answers will vary. Security Awareness Guidelines for Students To ensure your safety and protect your personal information while using campus computers and online resources, please follow these guidelines: • Use Strong Passwords: Create passwords with a mix of letters, numbers, and symbols, and change them regularly. • Enable Two-Factor Authentication: Use two-factor authentication (2FA) where possible for added security. • Avoid Public Wi-Fi for Sensitive Tasks: Do not access personal accounts or financial information on public Wi-Fi networks. • Be Cautious of Phishing Scams: Never open suspicious emails or click on unknown links. • Lock Your Screen: Always lock your computer when leaving it unattended. • Keep Software Updated: Regularly update your operating system and software to fix security vulnerabilities. • Use Antivirus Software: Ensure antivirus software is installed and up to date on all devices. • Backup Your Data: Regularly back up important files to avoid data loss. • Avoid Sharing Devices: Don’t share your devices with others to prevent unauthorized access. • Report Security Issues Immediately: Report any suspicious activity or security breaches to IT support. By following these tips, you can significantly reduce the risks associated with using technology on campus. 2. After reading the information presented in this chapter and other sources, write a one-page paper about three high-profile companies that faced security breaches in the last two years. Identify two vulnerabilities that enabled hackers to break into these companies’ systems. Answer: Answers will vary. Security Breaches in High-Profile Companies 1. Facebook (Meta): In 2021, a breach exposed data of 530 million users. • Vulnerabilities: Unpatched API and weak access controls. 2. T-Mobile: In 2021, hackers stole data from 40 million customers. • Vulnerabilities: Unprotected servers and poor detection systems. 3. Colonial Pipeline: A ransomware attack in 2021 disrupted fuel supply operations. • Vulnerabilities: Compromised VPN credentials and lack of multi-factor authentication. These incidents highlight the importance of improving security protocols and implementing stronger access control measures. 3. Denial of Service (DoS) is among the security threats that have been on the rise in recent years. After reading the information presented in this chapter and other sources, write a one-page paper that outlines four recommendations for dealing with this security threat. Cite three U.S. companies that have been among the victims of this security threat. What is the relationship between DDoS and IoT devices? Discuss. Answer: Answers will vary. Recommendations for Dealing with DoS Attacks: 1. Use Firewalls and IDS: To block malicious traffic before it reaches systems. 2. Deploy CDNs: Distribute traffic across servers to avoid overload. 3. Use DDoS Mitigation Services: Utilize third-party services for automatic filtering. 4. Maintain Redundancy: Implement failover systems to ensure service availability. Companies Affected by DoS Attacks: 1. GitHub (2018) 2. AWS (Multiple attacks) 3. Dyn (2016) DDoS and IoT: IoT devices can be hijacked and used in botnets for DDoS attacks. As IoT devices increase, so does the potential for larger attacks, emphasizing the need for secure IoT practices. 4. After reading the information presented in this chapter and other sources, write a one-page paper that lists three antivirus software applications; include one advantage and one disadvantage of each. Which one do you recommend for the student lab mentioned in Project 1? What are the bases for your recommendation? Is antivirus software alone sufficient to protect the security of a network? Why and why not? Answer: Answers will vary. McAfee, BullGuard, and Bitdefender are among the popular providers of antivirus software. Three Antivirus Software Applications: 1. Norton Antivirus • Advantage: Comprehensive protection against viruses, malware, spyware, and ransomware, with real-time updates. • Disadvantage: Can be resource-intensive, slowing down system performance during scans. 2. McAfee Antivirus • Advantage: Includes a wide range of features like identity theft protection and secure VPN services. • Disadvantage: Frequent alerts and pop-ups, which can be intrusive for users. 3. Bitdefender Antivirus • Advantage: High detection rates with minimal system impact, offering excellent malware protection. • Disadvantage: Advanced features are sometimes complex for less tech-savvy users to navigate. Recommendation for the Student Lab: For the student lab, I recommend Bitdefender Antivirus. This choice is based on its strong protection capabilities and low system impact, ensuring minimal disruption to student work while providing robust security. Is Antivirus Software Alone Sufficient? No, antivirus software alone is not sufficient to secure a network. While it protects against known threats, it cannot prevent all types of attacks, such as phishing, social engineering, or zero-day vulnerabilities. A comprehensive security strategy should also include firewalls, regular software updates, strong password policies, and employee training on safe online practices. 5. After reading the information presented in this chapter and other sources, write a one-page paper that identifies three companies (in addition to those mentioned in this book) that are using biometric security measures for authentication. Why has each company chosen this alternative over other security measures? What are two advantages and two disadvantages of biometrics as a security measure? Answer: Answers will vary. Companies Using Biometric Security Measures: 1. Apple • Chosen Alternative: Apple uses Touch ID and Face ID for authentication on its devices. • Reason: Biometric security offers a high level of convenience and security by leveraging unique personal identifiers, making it harder for unauthorized users to access devices. 2. Amazon • Chosen Alternative: Amazon’s Amazon Go stores use palm print recognition for customer identification. • Reason: Palm prints are highly unique, providing an efficient and secure way for customers to access their accounts and make purchases without the need for checkout lines. 3. United Arab Emirates (UAE) Government • Chosen Alternative: The UAE has implemented iris scanning at border control points for citizens and travelers. • Reason: Iris scans are extremely accurate and difficult to replicate, improving both security and the speed of processing at checkpoints. Advantages of Biometric Security: 1. Convenience: Users don’t need to remember passwords or carry physical tokens. 2. High Security: Biometrics are difficult to replicate, providing a higher level of security than traditional methods like passwords or PINs. Disadvantages of Biometric Security: 1. Privacy Concerns: Collecting biometric data can lead to concerns about how this sensitive information is stored and used. 2. Cost and Implementation: Setting up biometric systems can be expensive and may require significant infrastructure changes in existing security protocols. 6. After reading the information presented in this chapter and other sources, write a two-page paper that offers five recommendations for improving the security of online transactions. List two companies that provide preventive measures for e-commerce sites. What are included in their offerings? What are the costs? When you purchase from online businesses, how do you know that a Web site is secure? Answer: Answers will vary. Recommendations for Improving Online Transaction Security: 1. Use SSL Encryption: Ensures secure data transfer between the user's browser and the website. 2. Implement Two-Factor Authentication (2FA): Adds an extra layer of security by requiring two forms of verification. 3. Regular Software Updates: Keeps the website secure by patching known vulnerabilities. 4. Fraud Detection Tools: Monitors transactions for suspicious activity in real-time. 5. Customer Education: Informs users about safe practices, such as creating strong passwords. Companies Offering E-Commerce Security: 1. McAfee • Offerings: Fraud prevention, data encryption, vulnerability scans. • Cost: Around $299/year for small businesses. 2. Norton • Offerings: Payment encryption, malware protection, identity theft prevention. • Cost: Starts at $99.99/year. Identifying Secure Websites: 1. Look for HTTPS in the URL. 2. Check for the padlock icon next to the URL. 3. Review privacy policies and contact information for legitimacy. 4. Use trusted payment processors like PayPal or Stripe. Are You Ready to Move On? 1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. True or False? Answer: True 2. Tailgating or “piggybacking” takes place when an unauthorized person follows an employee into a restricted area for example an individual impersonates a help desk employee. True or False? Answer: True 3. Asymmetric encryption uses one key. True or False? Answer: False 4. E-commerce transaction security is concerned with all of the following issues except: a. Use of a firewall b. Confidentiality c. Authentication d. Nonrepudiation of origin Answer: A 5. All of the following are a part of a comprehensive security system except: a. Raise employees’ awareness of security problems. b. Install software patches and updates on operating systems on a regular basis c. Limit computer access to authorized personnel only d. Do not post the security policy in a visible place Answer: D 6. All of the following are among the techniques used by social engineers except: a. Dumpster diving b. Tailgating c. Continuity planning d. Pretexting Answer: C Case Study 5-1 1. What are three examples of devices that could be attacked by computer viruses? Answer: Heart monitors, pacemakers, mammogram, and X-ray machines. 2. What are the risks related to using electronic health records in hospitals and medical facilities? Answer: Exposing sensitive patient data to outside world. 3. What are three pieces of advice for reducing the risk associated with using these devices? Answer: Answers will vary. (1) Manufacturers must improve the security features of these devices, making them more difficult for hackers to break into. (2) There needs to be close coordination between the manufacturers and healthcare providers to further enhance security. (3) Hospitals and medical facilities must make sure that all the software running these devices is up to date and any updates have been installed. (4) These devices must be blocked from Internet access. Case Study 5-2 1. According to the case, how many Yahoo!’s user accounts were stolen in 2013? Answer: One billion. 2. What types of information were stolen? Answer: The Stolen information include names, e-mail addresses, telephone numbers, dates of births, and encrypted passwords. Some encrypted or unencrypted security questions and answers were also included in this list. 3. When did Yahoo! find out about the 1 billion user accounts breach? Answer: In December 14, 2016. 4. According to the case, did Yahoo! encrypt all the security questions that it stored? Answer: No. Chapter 6 Data Communication: Delivering Information Anywhere and Anytime Reviews and Discussions 1. Define data communication. Answer: Data communication is the electronic transfer of data from one location to another. 2. What are three areas within data communication that managers need to have a clear understanding? Answer: • The basics of data communication and networking • The Internet, intranets, and extranets • Wired and wireless networks 3. What are three major components of a typical data communication system? Answer: • Sender and receiver devices • Modems or routers • Communication medium (channel) 4. What are the seven layers of the Open Systems Interconnection (OSI) model? Answer: • Application layer—Serves as the window through which applications access network services. It performs different tasks, depending on the application, and provides services that support users’ tasks, such as file transfers, database access, and e-mail. • Presentation layer—Formats message packets. • Session layer—Establishes a communication session between computers. • Transport layer—Generates the receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. This layer provides methods for controlling data flow, ordering received data, and acknowledging received data. • Network layer—Routes messages. • Data Link layer—Oversees the establishment and control of the communication link. • Physical layer—Specifies the electrical connections between computers and the transmission medium; defines the physical medium used for communication. This layer is primarily concerned with transmitting binary data, or bits, over a communication network. 5. What is a network topology? What are the five popular types? Answer: A network topology represents a network’s physical layout, including the arrangement of computers and cables. The five popular types include star, ring, bus, hierarchical, and mesh. 6. Define the client/server model. Which type is the most popular type? Answer: In the client/server model, software runs on the local computer (the client) and communicates with the remote server to request information or services. A server is a remote computer on the network that provides information or services in response to client requests. In the two-tier architecture which is the most common type, a client (tier one) communicates directly with the server (tier two). 7. What are three drawbacks of mobile and wireless networks? Answer: • Limited throughput • Limited range • In-building penetration problems 8. What is convergence? What are two business applications of convergence? Answer: In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. Two business applications of convergence include: • Increased availability and affordability of video and computer conferencing • Consumer products and services, such as virtual classrooms, telecommuting, and virtual reality Projects 1. A newly established Internet company with 40 employees needs your advice. They are looking for a collaboration tool and have narrowed their choices to GoToMeeting, WebEx, and My Web Conferences. After reading the information presented in this chapter and other sources, prepare a two-page document that includes two advantages and two disadvantages of each tool. Which one is your final recommendation? Why did you choose that tool over the other two? Answer: Answers will vary. Collaboration Tool Comparison 1. GoToMeeting • Advantages: User-friendly interface, high-quality video/audio. • Disadvantages: Limited integrations, relatively expensive. 2. WebEx • Advantages: Scalable for large meetings, advanced features. • Disadvantages: Complex interface, occasional performance issues. 3. My Web Conferences • Advantages: Affordable, easy-to-use. • Disadvantages: Limited features, smaller user base. Recommendation: GoToMeeting is recommended due to its balance of quality and ease of use, making it ideal for a small growing company. 2. Cisco and Polycom are two major vendors of telepresence products. After reading the information presented in this chapter and other sources, write a one-page paper that identifies one top-of-the-line product from each company. Which product would you recommend to the company mentioned in Project 1? What are you basing your recommendation on? What are two advantages of using a telepresence system compared to a face-to-face meeting? What are two disadvantages? Answer: Answers will vary. Telepresence Product Comparison: Cisco vs. Polycom 1. Cisco TelePresence IX5000 Series • Description: The Cisco IX5000 series provides high-definition video and audio quality, an immersive meeting experience, and integrates with Cisco collaboration tools. • Advantages: Excellent video quality, easy integration with existing Cisco networks. • Disadvantages: Expensive, requires high bandwidth for optimal performance. 2. Polycom RealPresence Group 500 • Description: The Polycom RealPresence Group 500 offers HD video conferencing with a focus on ease of use, flexibility, and compatibility with third-party platforms. • Advantages: Cost-effective, compatible with a wide range of devices. • Disadvantages: Video quality may be lower compared to Cisco in some environments, limited features for advanced collaboration. Recommendation For a company with 40 employees like the one in Project 1, Polycom RealPresence Group 500 would be the ideal choice. It provides a cost-effective solution while offering flexibility for remote communication. Cisco’s product, while higher-end, might be too expensive for a smaller company. Advantages of Telepresence Systems vs. Face-to-Face Meetings 1. Convenience: Telepresence eliminates travel time and costs. 2. Global Reach: It allows for meetings with remote participants, regardless of location. Disadvantages of Telepresence Systems 1. Technical Issues: Can face connectivity or hardware problems. 2. Less Personal: Lack of in-person interaction may impact relationship-building and communication dynamics. 3. Mobile and wireless devices are being increasingly used in the health care industry. After reading the information presented in this chapter and other sources, write a two-page paper that outlines five applications of these devices in this industry. Also, identify three mobile apps that could be used by medical personnel to increase their productivity. Answer: Answers will vary. Mobile and Wireless Devices in Healthcare 1. Telemedicine: Enables remote consultations between patients and healthcare providers, improving access to care. 2. Patient Monitoring: Wearables track vitals (e.g., heart rate, glucose) and send data to doctors for remote monitoring. 3. Mobile Health Records: Doctors can access and update patient records on-the-go, improving care efficiency. 4. Medication Management: Apps remind patients to take medications and help providers track adherence. 5. Wireless Diagnostic Tools: Mobile devices perform diagnostic tests, enhancing access to healthcare in remote areas. Mobile Apps for Medical Productivity 1. UpToDate: Provides evidence-based medical info for fast decision-making. 2. Pillow: Tracks sleep patterns, improving performance for healthcare workers. 3. Medscape: Offers clinical tools, drug information, and guidelines for quick access to vital info. These technologies streamline workflows, improve patient care, and increase productivity for healthcare professionals. 4. After reading the information presented in this chapter and other sources, write a two-page paper that identifies five mobile apps that could be used in the banking industry. How do these apps increase the productivity of the bankers and their customers? Do you see any drawbacks involved in using these apps? Answer: Answers will vary. Mobile Apps in the Banking Industry The banking industry has increasingly adopted mobile applications to improve customer experience, streamline operations, and enhance productivity. Here are five mobile apps used in banking and their benefits: 1. Mobile Banking Apps (e.g., Chase Mobile, Bank of America Mobile): • Function: Allows customers to check balances, transfer funds, pay bills, and deposit checks. • Productivity Boost: These apps save time for both customers and bankers, reducing in-branch visits and enabling bankers to focus on more complex customer needs. For customers, it provides 24/7 access to their accounts. 2. Zelle: • Function: A peer-to-peer payment app that enables fast, fee-free transfers between bank accounts. • Productivity Boost: Zelle streamlines money transfers, making it easier for customers to send money without requiring cash or checks. Bankers spend less time processing transfers manually. 3. Mint: • Function: A personal finance and budgeting app that connects to multiple bank accounts to track spending and provide financial insights. • Productivity Boost: Helps customers manage their finances, thus reducing customer queries regarding their financial status. Bankers can focus on providing targeted advice rather than general financial guidance. 4. Yodlee: • Function: Aggregates banking data from various institutions, allowing customers to view all their financial information in one place. • Productivity Boost: Reduces the need for bankers to assist with gathering data across multiple accounts. It helps customers stay organized and improve their financial decision-making. 5. PayPal: • Function: Facilitates secure online payments and money transfers. PayPal also links to bank accounts for seamless transactions. • Productivity Boost: Simplifies both in-store and online payments for customers, reducing the workload on customer service teams for transaction-related queries. Drawbacks of Using Mobile Banking Apps: 1. Security Risks: Mobile banking apps can be vulnerable to hacking, phishing, and malware attacks, compromising user data. 2. User Dependency: Excessive reliance on mobile apps can alienate customers who are not tech-savvy or lack access to smartphones. 3. Operational Failures: Connectivity issues or system downtimes can impact app functionality, leading to customer dissatisfaction and potential financial losses. Conclusion: Mobile apps in banking enhance productivity by reducing time spent on manual tasks, providing instant access to financial services, and enabling efficient transactions. However, security concerns and a potential digital divide among users must be considered when relying heavily on these technologies. 5. After reading the information presented in this chapter and other sources, write a one-page paper that includes a six-item bulleted lists for improving the privacy and security of your smartphone. Generally speaking, are iOS devices more or less secure than Android devices? Answer: Answers will vary. Improving the Privacy and Security of Your Smartphone To ensure the privacy and security of your smartphone, consider the following tips: • Enable Two-Factor Authentication (2FA): Add an extra layer of security by requiring a second form of verification in addition to your password when accessing accounts. • Use Strong, Unique Passwords: Set strong passwords for your device and applications, and avoid using easily guessable passwords (e.g., birthdays). • Keep Software Updated: Regularly update your operating system and apps to patch any known security vulnerabilities. • Download Apps from Trusted Sources: Only install apps from official stores (Google Play or Apple App Store) to reduce the risk of malware. • Use a VPN (Virtual Private Network): When connected to public Wi-Fi, a VPN helps encrypt your data and protect it from potential eavesdropping. • Review App Permissions: Regularly check and adjust app permissions to ensure that apps only have access to the data and features they need. iOS vs. Android Security In general, iOS devices are considered more secure than Android devices. This is primarily because of iOS's closed ecosystem, where apps undergo rigorous vetting before being allowed in the App Store. Additionally, iOS provides more consistent updates and better control over app permissions. On the other hand, Android devices offer more customization but often have a higher risk of malware due to the openness of the Google Play Store and delayed security updates on some devices. 6. After reading the information presented in this chapter and other sources, write a two-page paper that describes five business applications of convergence. Which industries are expected to gain the most from the convergence trend? Answer: Answers will vary. E-commerce, entertainment, videos on demand, video and computer conferencing, virtual classrooms, telecommuting are just a few examples. Business Applications of Convergence Convergence refers to the integration of various technologies, devices, and services into a unified system that improves efficiency, communication, and business processes. With advancements in technology, the concept of convergence has found widespread use across multiple industries. Here are five key business applications of convergence: 1. Unified Communications (UC) Systems Unified Communications integrates various communication methods, such as voice calls, email, instant messaging, video conferencing, and voicemail, into a single platform. By unifying these channels, businesses can streamline communication, reduce inefficiencies, and improve collaboration. For example, companies like Microsoft and Cisco offer UC systems that allow employees to seamlessly switch between devices and communication mediums, enhancing productivity and reducing the need for multiple, disconnected systems. 2. Cloud Computing and SaaS (Software as a Service) Cloud computing and SaaS solutions allow businesses to access and manage data, applications, and software over the internet. This form of convergence enables businesses to scale operations without investing heavily in infrastructure. Companies like Amazon Web Services (AWS) and Microsoft Azure provide cloud-based platforms that integrate multiple services, such as data storage, computing power, and analytics tools, into a single platform accessible from anywhere. This reduces IT costs and increases operational flexibility. 3. Mobile Device Integration The convergence of mobile devices and business systems enables employees to access business tools and data on the go, improving productivity and decision-making. With mobile apps that integrate with enterprise resource planning (ERP) systems, customer relationship management (CRM) software, and other business tools, employees can access real-time data and perform tasks remotely. This integration is especially valuable for industries like sales, field services, and healthcare, where mobile access to business systems is crucial for success. 4. Smart Manufacturing and the Internet of Things (IoT) In industries like manufacturing, IoT and smart devices have been integrated into the production process to enhance operational efficiency. Through IoT, devices and sensors are connected, providing real-time monitoring, predictive maintenance, and automation. For example, manufacturers like General Electric (GE) use IoT-based systems to track machinery health and predict maintenance needs, reducing downtime and optimizing production processes. This convergence allows businesses to make data-driven decisions and improve operational efficiency. 5. Retail and E-commerce Integration The convergence of online and offline shopping experiences through omni-channel strategies has transformed the retail industry. Retailers now integrate their physical stores with e-commerce platforms, allowing customers to shop online and pick up in-store, or shop in-store and have items delivered. Retail giants like Walmart and Target use mobile apps, websites, and in-store kiosks to provide customers with a seamless shopping experience. Additionally, this convergence allows businesses to collect customer data from both digital and physical touchpoints to improve personalization and marketing efforts. Industries Expected to Gain the Most from Convergence Several industries are expected to benefit significantly from convergence: • Healthcare: The healthcare industry is increasingly adopting convergence technologies such as telemedicine, IoT-enabled medical devices, and cloud-based patient management systems. These technologies enable better patient care, remote monitoring, and more efficient use of resources, making healthcare more accessible and affordable. • Retail: With the growing importance of e-commerce and omni-channel shopping, the retail industry will continue to benefit from the convergence of online and offline shopping experiences. Retailers can enhance customer experience, increase sales, and improve inventory management through integrated systems. • Manufacturing: The manufacturing industry is undergoing a digital transformation with the use of smart factories, IoT, and advanced analytics. These converged technologies enable manufacturers to streamline operations, improve product quality, and reduce costs, giving them a competitive edge in the market. • Finance: The financial services industry is leveraging convergence technologies like mobile banking, blockchain, and AI-powered analytics to improve customer experience, enhance security, and streamline processes. These innovations are transforming traditional banking and investment services, making them more accessible and efficient. • Telecommunications: The telecom industry is one of the biggest beneficiaries of convergence, as it integrates voice, data, video, and messaging services into unified platforms. This convergence helps telecom companies offer bundled services, improve customer satisfaction, and reduce operational costs. Conclusion Convergence is driving innovation across a range of industries, from healthcare to retail, by enabling businesses to integrate various technologies, systems, and services into unified solutions. This trend has the potential to reduce costs, improve efficiency, and enhance customer experience. As technology continues to evolve, industries that embrace convergence are likely to remain competitive and adapt quickly to changing market demands. Are You Ready to Move On? 1. Bandwidth is the amount of data that can be transferred from one point to another in a certain time period, usually one second. True or False? Answer: True 2. Fiber optics is an example of conducted media. True or False? Answer: True 3. A network interface card (NIC), is a software component that enables computers to communicate over a network. True or False? Answer: False 4. The fastest type of computer network is: a. LAN b. MAN c. WAN d. BYOD Answer: A 5. All of the following is a network topology except: a. Bus b. Tree c. Circular d. Ring Answer: C 6. All of the following techniques are used for improving the security of a wireless network except: a. SSID (Service Set Identifier) b. Worm c. WPA2 or 802.11i d. WEP (Wired Equivalent Privacy) Answer: B Case Study 6-1 1. How has Walmart improved its data communication systems for suppliers? Answer: Answers will vary. Walmart has made several changes in data communication systems to improve suppliers’ access to sales and inventory data. For example, the company added a customized Web site for suppliers, such as Mattel, Procter & Gamble, and Warner-Lambert. 2. What are some typical data communication applications in Walmart? Answer: With Walmart’s network, suppliers can access sales, inventory, and forecasting data over extremely fast connections. 3. What are some of the applications of wireless technology at Walmart? Answer: Walmart uses the latest in wireless technology in its operations for warehouse management systems (WMS) to track and manage the flow of goods through its distribution centers. Another application of wireless technology is for controlling and monitoring forklifts and industrial vehicles that move merchandise inside its distribution centers. 4. What are some of the features and capabilities of VMS? Answer: The Vehicle Management System (VMS) is the latest application of data communication in Walmart. Among other features, VMS includes a two-way text messaging system that enables management to effectively divert material handling resources to where they are needed the most. (VMS works effectively with RFID systems.) According to Walmart, VMS has improved safety and has also significantly improved the productivity of its operations. Case Study 6-2 1. What are some examples of security risks associated with a mobile device? Answer: Malware, premium SMS billing, e-mail and SMS phishing, spyware, and malicious Web sites. 2. How can these devices automatically track a user’s location? Answer: They do this because they have GPS capabilities. 3. What are a couple of recommendations for protecting your mobile device against these threats? Answer: Never leave your mobile device unlocked. Never leave it unattended. Always protect it with a password. Chapter 7 The Internet, Intranets, and Extranets End of Chapter Solutions Reviews and Discussions 1. In which year did the Advanced Research Projects Agency Network (ARPANET) start? Answer: In 1969. 2. What are three examples of generic top-level domains? Answer: .com - Commercial organizations (such as Microsoft) .edu - Educational institutions (such as California State University) .int- International organizations (such as the United Nations) 3. What are three examples of popular messaging systems? Answer: Messenger (Facebook), Allo (Google), and iMessage (Apple). 4. What are three popular applications of the Internet? Answer: Tourism and travel, publishing, and higher education. 5. Define an extranet. What are two applications of an extranet? Answer: An extranet is a secure network that uses the Internet and Web technologies to connect intranets of business partners so communication between organizations or between consumers is possible. An extranet offers an organization the same benefits as an intranet but provides other advantages, such as the following: • Coordination—Improves coordination between business partners, such as suppliers, distributors, and customers. Critical information can be made available quickly so decisions can be made without delays. For example, a manufacturer can coordinate production by checking the inventory status. • Feedback—Provides instant feedback from customers and other business partners to an organization, and gives consumers an opportunity to express opinions on new products or services before they are introduced to the market. 6. What are three business applications of social networking sites? Answer: • Facebook—A business can create a Facebook business fan page. • Twitter—A business can connect with its customers in real time. • Pinterest—A business can showcase its product offerings. 7. What are three applications of IoTs? Answer: In supply chain by tracking and monitoring everything on the network, their applications on automated checkout, and in monitoring machine performance. 8. What are two examples of industries that could benefit from IoM? Answer: Healthcare and entertainment. Projects 1. A properly designed extranet allows companies to reduce internetworking costs and gives participating companies a competitive advantage, which can lead to increased profits. After reading the information presented in this chapter and other sources, write a one-page paper that identifies three companies that are using extranets as an internetworking platform. List two applications of this platform in each company. What are two challenges that must be overcome for designing a successful extranet? Answer: Answers will vary. Extranets are private networks that connect a company’s internal systems with external partners, offering benefits such as cost reduction and improved collaboration. Companies Using Extranets: 1. Ford Motor Company • Supplier Collaboration: Sharing supply chain info. • Dealer Support: Providing updated product and pricing details. 2. Caterpillar Inc. • Parts Ordering: Dealers order parts efficiently. • Customer Support: Offering product manuals and technical support. 3. Walmart • Supplier Portal: Sharing real-time inventory data. • Vendor Management: Uploading product details and pricing. Challenges: 1. Security Risks: Ensuring secure data transfer. 2. System Integration: Linking extranet with internal systems. Extranets enhance business operations but require strong security and seamless integration. 2. AskMD is a popular medical app. After reading the information presented in this chapter and other sources, write a one-page paper that summarizes some of the features of this app. What are three other examples of medical apps for iOS and Android devices? Answer: Answers will vary. AskMD is a medical app that helps users assess their health conditions by providing a guided interview with symptoms and medical history. It aims to assist users in identifying potential diagnoses and suggests possible next steps, such as seeing a doctor. Key features of AskMD include: 1. Symptom Checker: Users input symptoms, and the app suggests potential conditions based on the answers. 2. Health History Tracker: Allows users to track and review their health history, including medication and allergies. 3. Doctor Search: Helps users find nearby healthcare professionals based on their symptoms or diagnosis. 4. Treatment Recommendations: Offers advice on what to do next, including lifestyle changes or medical consultations. Other Popular Medical Apps: 1. MyChart (iOS, Android) • Provides patients access to their medical records, appointment scheduling, and test results from healthcare providers. 2. Medscape (iOS, Android) • Offers medical professionals reliable, evidence-based content such as drug information, disease condition summaries, and medical news. 3. Epocrates (iOS, Android) • A drug reference app for healthcare providers that includes dosing information, drug interactions, and medical calculators. These medical apps are designed to empower both healthcare providers and patients, offering accessibility to critical health information and promoting better decision-making. 3. The human resources departments of many organizations are creating intranets to improve the efficiency and effectiveness of the departments’ operations. After reading the information presented in this chapter and other sources, write a one-page paper that summarizes the applications of intranets in HR operations. What are some of the challenges in designing and using such an application? Which other departments in a business firm can use intranets and for which applications? Answer: Answers will vary. Intranet Applications in Human Resources (HR) Intranets are becoming increasingly vital for improving the efficiency and effectiveness of human resources (HR) operations. By using an internal network, HR departments can streamline communication, enhance employee access to information, and automate various processes. Key applications of intranets in HR include: 1. Employee Self-Service Portals: Intranets provide employees with easy access to personal records, payroll information, benefits enrollment, and leave requests. This allows HR staff to focus on higher-priority tasks while empowering employees to manage their own data. 2. Recruitment and Onboarding: HR teams can post job openings, manage candidate applications, and facilitate the hiring process directly through the intranet. Onboarding materials, including training resources and company policies, can also be easily distributed to new hires. 3. Training and Development: Intranets serve as central repositories for training programs, career development resources, and certification tracking. HR can use the intranet to schedule training sessions and assess employee performance through integrated tools. 4. Internal Communication: HR can use intranets to send company-wide announcements, policy updates, and newsletters. This reduces reliance on email and ensures that employees have a single point of access for company communications. Challenges in Designing and Using an HR Intranet 1. User Adoption: Employees must be trained to use the intranet effectively, and some may resist the transition from traditional methods of communication or document management. 2. Security Concerns: HR handles sensitive employee data. Ensuring that the intranet is secure, with appropriate access controls and encryption, is crucial to protecting personal and confidential information. Other Departments Using Intranets In addition to HR, other departments within a business can also benefit from intranets: 1. Finance: Finance teams can use the intranet to share budget reports, manage expense approvals, and track financial forecasts. 2. Sales and Marketing: These teams can use intranets to access marketing materials, track sales performance, and collaborate on campaigns. 3. IT: The IT department can use intranets to provide technical support, manage software updates, and offer troubleshooting guides for employees. 4. Operations: Operations teams can utilize intranets for inventory management, process documentation, and workflow optimization. By creating a central hub for information and communication, intranets can foster greater collaboration, reduce inefficiencies, and support decision-making across multiple departments. 4. Small as well as large businesses could use social networks to improve their efficiency and help their bottom lines. After reading the information presented in this chapter and other sources, write a two-page paper that identifies two applications of Twitter, Facebook, Pinterest, and Yelp in running a small business. Answer: Answers will vary. Using Social Networks to Improve Small Business Efficiency: Twitter: 1. Customer Service: Engage with customers in real-time, responding to inquiries and complaints. 2. Brand Awareness: Promote products, sales, and special offers to a wider audience using hashtags. Facebook: 1. Community Building: Create a brand community through posts and Facebook Groups to foster loyalty. 2. Targeted Advertising: Use Facebook Ads to reach specific demographics and analyze customer insights. Pinterest: 1. Product Showcasing: Display visually appealing products to attract customers, particularly in fashion or decor. 2. Drive Traffic: Use Pinterest links to direct users to e-commerce sites, boosting sales. Yelp: 1. Reputation Management: Respond to customer reviews, building trust and addressing issues. 2. Local SEO: Optimize Yelp pages for local search visibility to attract nearby customers. By leveraging these platforms, small businesses can increase visibility, improve customer relationships, and drive growth efficiently. 5. Graph Search by Facebook and Knowledge Graph by Google offer features that are not available in traditional search engines. After reading the information presented in this chapter and other sources, write a one-page paper that outlines two business applications of each search method. How could these new search methods help a business generate more revenue? Answer: Answers will vary. Business Applications of Graph Search and Knowledge Graph Graph Search by Facebook: 1. Targeted Advertising: Businesses can use Graph Search to target potential customers more effectively by filtering search results based on personal connections, interests, and behaviors, creating highly targeted and personalized ads. 2. Customer Engagement: Businesses can engage with customers through shared experiences, such as friends recommending products, local events, or services. This can boost interaction and brand loyalty. Knowledge Graph by Google: 1. Enhanced Product Discovery: Businesses can integrate with Google’s Knowledge Graph to display enriched product or service information directly in search results, improving visibility and making it easier for customers to find relevant offerings. 2. Improved Local Search: Businesses can leverage the Knowledge Graph for local SEO. By enhancing their Google My Business profile, businesses can appear in Knowledge Graph panels, leading to higher visibility in search results. Revenue Generation: Both Graph Search and Knowledge Graph improve a business’s ability to connect with potential customers more effectively by providing richer, more relevant search results. Graph Search’s social integration helps businesses access more precise customer data for targeted marketing, while Knowledge Graph enhances the visibility of their products or services, directly contributing to greater customer reach and increased sales. 6. The Internet of Me has created a lot of excitement in the business world. After reading the information presented in this chapter and other sources, write a one-page paper that lists five business applications of this new platform. What are some of the legal and social issues related to the Internet of Me? Answer: Answers will vary. Business Applications of the Internet of Me 1. Personalized Marketing: Businesses can use data from the Internet of Me to create highly personalized marketing campaigns, tailoring product recommendations, offers, and content to individual preferences and behaviors. 2. Enhanced Customer Experience: With IoT devices and sensors, companies can track customer activity and provide real-time, context-aware services, such as customized shopping experiences in retail or personalized patient care in healthcare. 3. Data-Driven Product Development: Companies can gather detailed insights from users' behaviors and preferences to design and improve products that better meet customer needs, leading to higher satisfaction and sales. 4. Supply Chain Optimization: The Internet of Me allows businesses to track customer interactions and product usage, helping to predict demand more accurately and improve inventory management and logistics. 5. Workplace Efficiency: Organizations can use the Internet of Me to improve employee productivity by using wearable devices or other IoT tools that monitor health, wellness, and work patterns, creating a more efficient and responsive work environment. Legal and Social Issues: • Privacy Concerns: The vast amount of personal data collected by IoT devices raises concerns about user privacy and data security, especially if that data is misused or exposed. • Data Ownership: There are questions about who owns and controls the personal data generated by users, which is vital for businesses to address to ensure compliance with regulations like GDPR. • Ethical Implications: With increased access to personal data, businesses face ethical challenges in balancing personalized services with the risk of exploiting sensitive user information. Are You Ready to Move On? 1. With hypermedia, documents include embedded references to audio, text, images, video, and other documents. True or False? Answer: True 2. Educational institutions (such as California State University) are identified with COM as their top-level domain. True or False? Answer: False 3. Web 1.0 refers to the trend toward Web applications that are more interactive than traditional Web applications. Collaboration or e-collaboration is one of its key components. True or False? Answer: False 4. All of the following are among the features of Web 2.0 except: a. Mp3.com b. Wikis c. Blogging d. Cost per click Answer: A 5. One of the following focuses on applications such a personalized healthcare: a. Internet of Everything (IoE) b. Internet of Things (IoT) c. The Internet d. Internet of Me (IoM) Answer: D 6. All of the following are among the popular Web browsers except: a. Microsoft Internet Explorer (IE) b. Bing c. Mozilla Firefox d. Google Chrome Answer: B Case Study 7-1 1. When was The Garden launched? Answer: In 2011. 2. What are some key features of The Garden? Answer: The Garden has served as an effective internal communication tool for Scotts employees. On any given day, some 2,250 employees visit the site in order to get the latest news about the company, among other things. The Garden is very user friendly, and employees are constantly asked about features they would like to be added. The Garden gives Scotts employees fast access to important and frequently used documents, such as travel expense and HR forms. Employees can also organize their important links into “My Favorites” lists. 3. Why has The Garden been so successful? Answer: Because the system was developed based on employee needs and through close communication between the employees and the IT department. 4. What is the purpose of The Vine? Answer: “The Vine,” is an internal social media site. Using the Vine, employees are able to communicate with one another through their profile categories, such as job title, location, years of experience, and other relevant information. Case Study 7-2 1. How does the Internet put small businesses on the same footing as large organizations? Answer: Answers will vary. The Internet puts small businesses on the same footing as large organizations by providing an inexpensive platform for interacting with customers and selling products and services. With their global reach, social networking sites are a good example of how the Internet can level the playing field. 2. What are two ways social networking sites such as Twitter can help a small business? Answer: Answers will vary. Twitter allows small businesses to connect with their consumers in real time. It can be used for customer service, for trouble shooting or for promoting products and services. 3. How can a site such as Yelp help small businesses? Answer: Answers will vary. Small businesses can use sites such as Yelp (www.yelp.com), which help people find local restaurants, dentists, hair stylists, mechanics, and so on. People also use these sites to find out about upcoming events, take advantage of special offers, and talk to other customers. Chapter 8 E-Commerce Reviews and Discussions 1. What is inbound logistics? How is it related to Michael Porter’s value chain? Answer: Movement of materials and parts from suppliers and vendors to production or storage facilities; includes tasks associated with receiving, storing, and disseminating incoming goods or materials. It is among the primary activities in Michael Porter’s value chain 2. What is an omnichannel? How does it combat showrooming? Answer: Showrooming is when consumers physically inspect a product in a store to get a look and feel for it- and then buy it from an online store because it is chapter to do so. To combat this trend retailers can create omnichannel, which integrates online, social media, mobile technology, and the physical store. By doing this, a retailer is flexible enough to generate a sale regardless of where a customer wants to initiate the sale. 3. What are two advantages and two disadvantages of e-commerce? Answer: Advantages: • Creating better relationships with suppliers, customers, and business partners • Creating “price transparency,” meaning all market participants can trade at the same price Disadvantages: • Bandwidth capacity problems (in certain parts of the world) • Security and privacy issues 4. What are three examples of best practices in B2B e-commerce environment? Answer: • Implement smart product offering: specific promotions and pricing for different customers • Improve user experience and ease of online shopping • Offer mobile tools for anytime/anywhere shopping 5. What is a vertical market? Answer: A vertical market concentrates on a specific industry or market, such as the utilities industry, the beef and dairy industries, and the sale of medical products. 6. What are two challenges in using mobile payment systems that should be overcome? Answer: • Lack of standards • User acceptance 7. Define a hyper-social organization? Provide two examples of such organizations. Answer: Hyper-social organizations are companies that leverage social media to better connect with customers and increase sales through the social process. Spotify and Airbnb are two examples of such organizations. 8. What are three major components of a social media information system? Answer: • Application (app) providers: Social media sites such as Facebook, Twitter, LinkedIn, and Snapchat that create features and functions for the app and make them available for free to their users. • User communities: All the people (you and me) that use any of the social media apps. • Sponsors: Organizations and businesses that pay money to social media sites to advertise their products and services such as Walmart, Macy's, and Intel. Projects 1. Local, state, and federal government agencies are establishing e-gov sites in order to improve the efficiency and effectiveness of their operations. After reading the information presented in this chapter and other sources, write a one-page paper that summarizes six advantages of using e-gov applications for running a city? What are some of the challenges? Answer: Answers will vary. Advantages of Using E-Gov Applications for Running a City 1. Improved Access to Services: E-government platforms provide citizens with easy and direct access to municipal services like paying bills, renewing licenses, or submitting complaints, reducing the need for in-person visits and making services available 24/7. 2. Increased Efficiency: By automating processes, e-gov applications streamline operations, reducing paperwork, eliminating redundant tasks, and speeding up decision-making, which helps city departments function more efficiently. 3. Cost Savings: E-gov applications can reduce operational costs by decreasing the need for physical infrastructure, administrative staff, and paper-based processes, resulting in significant budget savings for the city. 4. Transparency and Accountability: E-government platforms allow citizens to track the progress of requests or complaints and view public financial data, promoting transparency and enhancing trust in local government. 5. Enhanced Citizen Engagement: E-gov tools provide platforms for citizens to engage with city leaders, participate in surveys or town halls, and voice concerns or suggestions, fostering greater community involvement and responsiveness. 6. Improved Data Management: Digital systems allow for better storage, analysis, and sharing of city data, making it easier for government agencies to collaborate, track trends, and make informed decisions about urban planning, resource allocation, and public health. Challenges of E-Gov Applications: • Digital Divide: Not all citizens have access to the internet or digital literacy skills, which may limit their ability to fully benefit from e-gov services. • Cybersecurity Risks: The increased use of online platforms makes government systems vulnerable to cyber-attacks and data breaches, requiring robust security measures to protect sensitive information. • Resistance to Change: Some government employees or citizens may resist transitioning to digital processes due to unfamiliarity or concern over job displacement. • High Initial Investment: Setting up e-gov applications requires significant upfront costs for technology infrastructure, software, training, and ongoing maintenance. 2. Yelp is a successful social networking site. After reading the information presented in this chapter and other sources, write a one-page paper that describes the business model used by Yelp. How does Yelp generate revenue? How can businesses benefit from this site? Who are the top two competitors of Yelp? Answer: Answers will vary. Yelp's Business Model and Revenue Generation Yelp operates as a user-generated review platform where individuals can share feedback on local businesses, such as restaurants, shops, and service providers. The platform allows users to rate businesses, leave written reviews, upload photos, and engage with others. Yelp's business model is based on connecting consumers with businesses through these reviews and offering paid advertising and promotional tools for businesses. Revenue Generation: Yelp generates revenue primarily through the following methods: 1. Advertising: Local businesses can pay Yelp to promote their services via ads on the site and in search results. This includes options like enhanced profiles, sponsored search results, and display ads. 2. Transaction Fees: Yelp offers reservation and booking services for restaurants and other businesses. It earns a commission on each transaction made through its platform, such as through online ordering, reservations, and appointments. 3. Yelp Deals and Gift Certificates: Businesses can offer deals or gift certificates through Yelp, and the platform takes a share of the transaction. 4. Other Services: Yelp also generates revenue by selling analytics and business intelligence tools to businesses to help them track customer feedback and improve their services. How Businesses Benefit from Yelp: • Increased Visibility: Businesses can enhance their online presence by claiming their Yelp profiles, which allows them to interact with customers, update their business information, and respond to reviews. • Customer Insights: Yelp provides businesses with valuable data on customer feedback, helping them identify strengths and weaknesses, and improve their products or services accordingly. • Advertising Opportunities: By purchasing Yelp ads, businesses can increase their visibility on the platform, which can drive more traffic and potentially attract new customers. Top Competitors of Yelp: 1. Google Reviews: Google’s review system integrates directly with Google Search and Google Maps, providing users with a large database of local business reviews. It competes with Yelp by offering similar features and a broader search platform. 2. TripAdvisor: While focused on the travel and hospitality industry, TripAdvisor competes with Yelp in terms of user-generated reviews and ratings for restaurants, hotels, and attractions, particularly in the tourism sector. 3. Twitter has become a very popular personal as well as business social networking site. After reading the information presented in this chapter and other sources, write a one-page paper that summarizes five ways that a business can use Twitter in order to increase its revenue. What does “trending” mean on Twitter? What are promoted tweets? Answer: Answers will vary. Trending refers to hashtag-driven topics that become popular very fast. Promoted tweets refer to those tweets that advertisers pay for their placement on Twitter. Using Twitter to Increase Revenue 1. Customer Engagement: Businesses can engage with customers directly by responding to inquiries, addressing concerns, and building a loyal community through regular, personalized interactions on Twitter. 2. Brand Awareness: Twitter allows businesses to reach a large audience quickly, promoting their brand through tweets, hashtags, and viral content to increase visibility. 3. Product Promotion: Businesses can announce product launches, share discounts, or run limited-time offers, encouraging followers to make purchases. 4. Targeted Advertising: Through Twitter’s advertising platform, businesses can run promoted tweets and ads targeted at specific demographics or locations, helping attract potential customers. 5. Market Research: Twitter provides businesses with insights into consumer sentiment and trends through user comments and hashtags, allowing companies to adapt their products and services accordingly. Trending on Twitter: Trending refers to topics, hashtags, or keywords that are being discussed the most at any given moment on Twitter. Trending topics represent popular conversations or current events. Promoted Tweets: Promoted tweets are paid advertisements that appear on users' Twitter timelines. These tweets are designed to look like regular tweets but are sponsored by businesses to reach a wider or targeted audience. 4. A Mediterranean restaurant chain with over 25 restaurants in Southern California is trying to expand its operations. After reading the information presented in this chapter and other sources, write a two-page paper that outlines a mobile marketing program for this company. What are three mobile marketing strategies that you recommend for this company? What are the bases of your recommendations for reaching out to the largest number of potential customers with a moderate cost? Answer: Answers will vary. Mobile Marketing Program for Mediterranean Restaurant Chain To expand its operations, the Mediterranean restaurant chain can implement the following three mobile marketing strategies: 1. Mobile App for Customer Engagement • Advantages: Direct engagement through features like ordering, reservations, and a loyalty program. • Cost-Efficiency: Long-term savings on marketing materials; enhances customer retention. 2. SMS Marketing for Promotions • Advantages: High open rates and quick impact with time-sensitive offers. • Cost-Efficiency: Low-cost messaging with high ROI, especially for targeted promotions. 3. Social Media Marketing on Mobile Platforms • Advantages: Visual appeal through Instagram/Facebook, and targeted ads to attract local customers. • Cost-Efficiency: Organic posts are free, and paid ads can be precisely targeted to minimize costs. These strategies will effectively increase customer engagement, brand loyalty, and expand the customer base while staying within a moderate budget. 5. The future of m-commerce appears to be very promising. After reading the information presented in this chapter and other sources, write a two-page paper that identifies four factors that will contribute to the future growth of m-commerce. What are some of the challenges that must be overcome? Answer: Answers will vary. M-commerce is expected to grow due to factors such as widespread smartphone use, improved mobile payment systems, better mobile app technology, and location-based services. These advancements make shopping easier, faster, and more personalized, driving customer engagement and sales. However, challenges include security and privacy concerns, device fragmentation, logistics and delivery issues, and regulatory complexities. Businesses need to invest in secure payment systems, create cross-platform solutions, improve delivery infrastructure, and stay compliant with local laws to ensure m-commerce success. 6. The "hyper-social" model is gaining in popularity. After reading the information presented in this chapter and other sources, write a two-page paper that lists four organizations that you consider to be hyper-social. What are the bases of your classification? What are two factors that make an organization hyper-social? What are a two advantages of a hyper-social origination compared to a traditional model? Answer: Answers will vary. The "hyper-social" model refers to organizations that deeply integrate social media and collaborative tools into their business operations, enhancing real-time engagement, communication, and collaboration both internally and externally. The hyper-social model encourages open communication, promotes sharing of ideas, and builds a highly interactive environment. Four organizations that exemplify the hyper-social model include: 1. Zappos – Known for its strong company culture and customer-centric approach, Zappos uses social media and internal communication tools to create a vibrant, highly engaged workforce. Employees are encouraged to share personal stories and experiences, fostering strong customer relationships and internal collaboration. 2. Salesforce – Salesforce leverages its own tools like Chatter to encourage collaboration within the company. By making communication transparent and accessible across all levels, it allows employees to share real-time feedback, ideas, and solutions, making it a hyper-social organization. 3. Google – Google has integrated various collaboration tools like Google Meet, Hangouts, and internal social networks to encourage both internal communication and external collaboration with users, partners, and developers, reinforcing a hyper-social approach. 4. Airbnb – With a focus on sharing and community-building, Airbnb uses social media to engage both guests and hosts, creating a network where feedback and reviews are central to the business model. The company's approach to connecting people socially is a major factor in its success. Bases for Classification These organizations are classified as hyper-social based on their active use of social media platforms, internal communication tools, and focus on creating a connected, transparent, and collaborative culture. They make use of both external social channels to engage customers and internal tools to foster teamwork, making information sharing seamless and more efficient. Two Factors that Make an Organization Hyper-Social 1. Real-Time Communication and Collaboration – Hyper-social organizations encourage constant, open, and real-time communication among employees and with customers, using social media and collaboration platforms. 2. Open Culture and Engagement – These organizations promote an open culture where employees are encouraged to share ideas, feedback, and personal experiences, contributing to a more vibrant and engaging work environment. Two Advantages of Hyper-Social Organizations Compared to Traditional Models 1. Increased Innovation and Agility – Hyper-social organizations are more flexible and adaptable because real-time communication and constant collaboration lead to faster decision-making and a more innovative approach to problem-solving. 2. Stronger Customer Relationships – By engaging with customers on social media and gathering feedback, hyper-social companies build stronger relationships, offering personalized services and responding quickly to customer needs, which improves customer loyalty and retention. In conclusion, adopting the hyper-social model helps organizations become more dynamic, responsive, and customer-focused, leveraging social technologies to enhance internal collaboration and external engagement. Are You Ready to Move On? 1. Social commerce is a subset of e-commerce that is influenced by social networks and other online media. True or False? Answer: True 2. Search engine optimization (SEO) is a method for improving the volume or quality of traffic to a Web site. True or False? Answer: True 3. App-based marketing is not among the popular mobile marketing strategies. True or False? Answer: False 4. All of the following are among the major models of B2B e-commerce except: a. Seller-side marketplace b. Buyer-side marketplace c. Third-party exchange market-place d. Merchant-side marketplace Answer: D 5. One of the following B2C business model collects information on consumers and businesses and then sell this information to other companies for marketing purposes: a. Subscription model b. Infomediary model c. Mixed model d. Subscription model Answer: B 6. The four pillars of hyper-sociality include all of the following except: a. Tribe versus market segment b. Human-centric versus company-centric c. B2B versus C2C d. Information channels versus network channels Answer: C Case Study 8-1 1. By 2020 how many smartphones will be available globally? Answer: This number is expected to top 6.1 billion globally by 2020. 2. Who are the two companies that generate the biggest revenue from mobile ads? Answer: Facebook and Google. 3. What does PlaceIQ do for businesses? Answer: PlaceIQ collects billions of data points from mobile devices and other sources and is able to track potential customers as they move from one retail location to another retail location, such as from one car dealership to another. 4. For what purpose is Audi using the services offered by PlaceIQ? Answer: Audi is using the PlaceIQ data to measure how many potential customers will visit its dealerships before and after they have seen their ads. They also want to target potential customers that are visiting their competitors' showrooms. Case Study 8-2 1. What is the function of Apple's iBeacon? Answer: iBeacon tracks the customer inside the store. 2. What are the differences between iBeacon and GPS? Answer: A GPS guides a customer to a store; iBeacon then tracks the customer inside the store. 3. How might a retail business benefit from iBeacon? Answer: For example, a retailer can send a coupon as soon as it detects that a customer has walked to a particular aisle and is looking at a particular product. 4. What are some of the concerns that customers may have about this technology? Answer: Privacy issues. Solution Manual for MIS-2 Hossein Bidgoli 9781337406925
Close