Professional Documents
Culture Documents
ACT Document - 2023
ACT Document - 2023
ACT Document - 2023
BITMAP300
Workshop 1
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
• Discuss the traditional and contemporary view of the role that
information systems play in an organization’s value chains
• Identify four benefits of creating a strategic plan
• Identify four drivers that help set the information system
organizational strategy
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Review and discussion questions
Chapter 1
1.Describe four fundamental information system types based on their sphere of influence.
3.The four components of Leavitt’s Diamond are technology, processes, structure, and
_______________.
4.What is the traditional role that IS plays in the supply chain? What is the contemporary role?
Identify five consequences of Identify five federal laws that
a successful cyberattack. address computer crime.
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Identify eight steps that must be taken to perform a thorough security risk assessment.
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Review and discussion questions
Chapter 2
• 1.Provide four reasons why computer incidents are so
prevalent. Which of these do you think is the most
significant? Why?
• 2. List the four perpetrators most likely to initiate a
cyberattack.
• 3. What is the meaning of attack vector?
• 4. Identify three commonly used attack vectors.
• 5. List five cyberattacks that pose serious threats to an
organization.
Summary
Leavitt’s Diamond helps to successfully introduce new systems into the workplace
Strategic planning helps identify desired outcomes and formulate feasible plans to
achieve objectives
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Computer crime is rapidly growing
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.