USING MIS
13TH EDITION
CHAPTER NO. 01: THE IMPORTANCE OF M I S
Security Guide
PASSWORDS AND PASSWORD ETIQUETTE
1. Here is a line from Shakespeare’s Macbeth: “Tomorrow, and tomorrow, and
tomorrow, creeps in this petty pace.” Explain how to use these lines to create
a password. How could you add numbers and special characters to the
password in a way that you will be able to remember?
There are several correct ways to create a password from this line. One way
might be to take the first letters from each word. The password would then be
“tatatcitpp.” You could then capitalize a couple of the letters and add in
special characters or numbers. The resulting password could be
“T&2morrow&tcitPP.” This would be a very secure password.
2. List two different phrases that you can use to create a strong password. Show
the password created by each.
There will be many correct answers to this question. Using a passphrase to
create a password is done by using the first letters in the phrase, then
changing some of the letters by substituting in special characters, numbers,
or changes of case. For example, the phrase, “I never count my chickens
before the eggs have hatched!” could create the password
“iNcmCHKNSb4t3ggsHH!” This would be a great password.
3. One of the problems of life in the cyberworld is that we all are required to
have multiple passwords—one for work or school, one for bank accounts,
another for eBay or other auction sites, and so forth. Of course, it is better to
use different passwords for each. But in that case, you have to remember
three or four different passwords. Think of different phrases you can use to
create a memorable, strong password for each of these different accounts.
Relate the phrase to the purpose of the account. Show the passwords for
each.
, There will be many correct answers to this question. For example, a
passphrase for a university account may look something like, “I will graduate
from state university before 2020 or bust!” This could yield a password that
would look like “IwgfSUb42020ORB!”
4. Explain the proper behavior when you are using your computer and you need
to enter, for some valid reason, another person’s password.
In this case, say to the other person, “We need your password,” and then get
out of your chair, offer your keyboard to the other person, and look away
while she enters the password. Among professionals working in organizations
that take security seriously, this little “do-si-do” move—one person getting out
of the way so another person can enter her password—is common and
accepted.
5. Explain the proper behavior when someone else is using her computer and
that person needs to enter your password for a valid reason.
If someone asks for your password, do not give it out. Instead, get up, go over
to that person’s machine, and enter your own password yourself. Stay
present while your password is in use, and ensure that your account is logged
out at the end of the activity. No one should mind or be offended in any way
when you do this. It is the mark of a professional.
Case Study 1
Pluralsight
1-10. Go to http://pluralsight.com and search for a course you might be
interested in taking. What is attractive to you about online versus traditional
training?
Student answers will vary in terms of the course that they find interesting.
Attractive features of online training versus traditional classroom training
include the convenience and flexibility of taking a lesson/course when time
allows. (LO: 1, Learning Outcome: Describe the effects of e-commerce on
the modern business world, AACSB: Analytic Skills)
1-11. What advice would you give executives at Pluralsight if they wanted to grow
their business? How could they increase revenues?
Pluralsight has traditionally focused on corporate training. Students might be
more familiar with an academic environment and might suggest that
, Pluralsight establish programs with universities so that students could take
courses to supplement their traditional coursework at a reduced rate.
Possibly some companies could be lined up to help pay the subscription
rate, since the students should be more able to provide needed skills to
those companies when they graduate. (LO: 1, Learning Outcome: Explain
how IS can be used to gain and sustain competitive advantage, AACSB:
Analytic Skills)
1-12. Why would corporate clients be interested in online technology training for
their internal employees? How would they benefit from paying Pluralsight for
training?
Technical skill requirements are constantly changing, and employee skills
constantly need to be updated. Paying for skills training from Pluralsight is
probably much more cost-effective for a company than trying to provide the
training in-house. Pluralsight is a training outsourcer and if their training
quality is good, the company is much better off obtaining the training this
way. (LO: 1, Learning Outcome: Discuss the role of information systems in
supporting business processes, AACSB: Analytic Skills)
1-13. Why is there a technology skills gap? Why do employers have the need for
highly skilled workers, and why do too few workers have these skills?
It is difficult for a traditional college or university to include every type of
technology skill in its curriculum, so graduates will not necessarily know
every type of technology an employer requires. In addition, skills required
evolve quickly and employees need to be updated and retrained on new
technologies. (LO: 2, Learning Outcome: Discuss the role of information
systems in supporting business processes, AACSB: Analytic Skills)
1-14. How might a traditional university benefit from a partnership with Pluralsight?
Why might some universities see such a partnership as a threat to their
existence, while others might see it as a great opportunity?
Universities could benefit from a partnership with Pluralsight in several ways.
One, a university’s IT staff would undoubtedly benefit from access to these
training courses. Two, faculty members in certain fields might like to
enhance their own knowledge and skills. Finally, students might like to
supplement their more traditional classes with training that is more skills-
focused, such as those offered in Pluralsight courses. Many universities
would not fear this partnership because their courses are not focused only
on technical skills but more on conceptual knowledge. Colleges and
universities that do offer focused skills training might find this partnership a
, little threatening if students preferred the Pluralsight online courses to the
traditional university offerings. (LO: 1, Learning Outcome: Explain how IS
can be used to gain and sustain competitive advantage, AACSB: Reflective
Thinking)
1-15. Suppose you were considering buying stock in Pluralsight. What types of
threats might Pluralsight face in the future? Could a large tech company
mimic its business model and threaten its profitability? How could Pluralsight
defend against this type of competition?
Like any company today, there are constant competitive threats. An example
of a threat that could disrupt Pluralsight is the rapid growth of cloud
computing. A major cloud computing provider, such as Amazon, could
launch a skills training business geared toward all its cloud computing
environments and tools that would be far superior to Pluralsight’s. Pluralsight
could defend against this by establishing a partnership with Amazon to
provide Amazon’s cloud computing skills training. (LO: 1, Learning Outcome:
Explain how IS can be used to gain and sustain competitive advantage, AAC
SB: Reflective Thinking)
So What?
IOTrends
1. People often use the terms Web and Internet interchangeably, but they are
not the same. Do your best to define each and identify exactly how they are
different.
Student answers will vary, but a good explanation can be found at the website
https://www.geeksforgeeks.org/whats-difference-internet-
web/#:~:text=The%20Internet%20is%20a%20global,on%20top%20of%20that
%20infrastructure.
It states: “The Internet is a global network of networks while the Web, also
referred formally as World Wide Web (www) is collection of information which
is accessed via the Internet. Another way to look at this difference is: The
Internet is infrastructure while the Web is service on top of that infrastructure.”