Deck 10: Global, Ethics, and Security Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/84
Play
Full screen (f)
Deck 10: Global, Ethics, and Security Management
1
Back office IT functions typically involve customer interactions.
False
2
Enterprise systems can change the ethical and legal environment of the organization.
True
3
One reason that outsourcing lowers costs is because it doesn't require any oversight.
False
4
Outsourcing by its very nature forces a more process-oriented perspective on the company.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
5
Outsourcing ERP systems has been done by organizations worldwide.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
6
Because of their extensive integration, ERP systems are less susceptible to security hazards.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
7
Outsourcing occurs when a company decides to sub-contract its business processes or functions to another company.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
8
Front-office IT functions generally include system development and maintenance.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
9
One benefit of outsourcing an ERP system is that it has a predictable monthly payment.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
10
ERP systems don't require a high amount of maintenance.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
11
Outsourcing gives organizations access to a broader set of key IT skills.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
12
It is difficult to add more hardware resources when the ERP system is outsourced.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
13
One benefit of outsourcing is that there are no unexpected costs.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
14
ERP outsourcing is more common that IT outsourcing in general.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
15
The Y2K problem provided a huge boost to the practice of IT outsourcing.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
16
Initially, most IT outsourcing focused on software training.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
17
Misunderstandings often occur between the outsourcer and the organizations.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
18
Outsourcing IT functions is cost effective but decreases flexibility.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
19
All companies can benefit from outsourcing their ERP systems.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
20
Outsourcing ERP systems helps to lower the cost of software ownership and maintenance.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
21
Many developing countries do not have strong intellectual property laws to protect your firm's ideas from being stolen by an outsourcing vendor.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
22
Outsourcing operations means that a company might have to share their trade secrets.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
23
Over a one year period, it is possible that a traditional ERP architecture might be cheaper than a SaaS solution.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
24
ERP implementation teams should not use outsourcing partners as someone who will take ________ or to deflect blame when the project is not successful.
A) development
B) users
C) accountability
D) change management
A) development
B) users
C) accountability
D) change management
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
25
One long standing best practice is the creation of a formal governance process to manage the offshore relationship.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
26
Small and midsize companies are most inclined to in-source their ERP operations.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
27
Companies must be careful to perform due diligence when selecting an outsourcing vendor.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
28
Collocating team members is not cost effective in global ERP implementations.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
29
An ASP is a type of SaaS provider which offers to host the software of another vendor for the company that purchased the software license.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
30
It is important to find the right balance between outsourcing and in-sourcing.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
31
Many SaaS providers allow a wide range of customization within a basic set of functions.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
32
Software can be rented or leased from a software vendor using the PMO model.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
33
Over half of all offshoring IT spending is in India.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
34
Outsourcing is the same as offshoring.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
35
Completely localizing an ERP system decreases complexity and customization, while defeating the purpose of a global solution.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
36
Offshoring can be difficult because firms in different countries have the same local requirements.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
37
The monthly costs of SaaS applications do not depreciate over time as a capital investment in software licenses would.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
38
Because they are cheap SaaS applications can instantly reach a global market.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
39
Companies in developing countries may have less mature operational models.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
40
Offshoring ERP development helps make change management easier.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
41
To protect the accuracy of the data, ERP systems must embed ________, on data accuracy and make them available to organizations.
A) test examples
B) training
C) best practices
D) policy
A) test examples
B) training
C) best practices
D) policy
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
42
The ethical issues surrounding the use of information technology include, privacy, accuracy, property, and ________ issues.
A) communication
B) adaptability
C) accessibility
D) conversion format
A) communication
B) adaptability
C) accessibility
D) conversion format
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
43
There are very few institutions that can protect ________ globally.
A) intellectual property rights
B) system security
C) database access
D) customer rights
A) intellectual property rights
B) system security
C) database access
D) customer rights
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
44
The large amount of data being collected today and its integration with multiple sources means there is a greater chance the data may be:
A) corrupted.
B) converted.
C) outsourced.
D) duplicated.
A) corrupted.
B) converted.
C) outsourced.
D) duplicated.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
45
With the passage of the ________, the U.S. government has gained access to vast databases of telephone and email records.
A) NAFTA Act
B) Patriot Act
C) COPA Act
D) FCRA Act
A) NAFTA Act
B) Patriot Act
C) COPA Act
D) FCRA Act
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
46
________ collect and disseminate information about consumers to be used for credit evaluation and certain other purposes.
A) Marketing agencies
B) Accounting firms
C) Credit reporting agencies
D) ERP systems
A) Marketing agencies
B) Accounting firms
C) Credit reporting agencies
D) ERP systems
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
47
Ethics are developed through culture, values, and the ________ system of the individual with influences from family and society.
A) thought
B) belief
C) political
D) corporate
A) thought
B) belief
C) political
D) corporate
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
48
The increased value of information and the ________ both endanger privacy in the information age.
A) use of spreadsheets
B) greater bandwidth
C) ease of use
D) growth of information technology
A) use of spreadsheets
B) greater bandwidth
C) ease of use
D) growth of information technology
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
49
Organizations now must get a(n) ________ to collect and share individual's personal data.
A) database
B) network application
C) approval
D) web cookie
A) database
B) network application
C) approval
D) web cookie
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
50
An individual's right to privacy must be balanced with:
A) corporate social responsibility.
B) business process efficiencies.
C) the cost of maintaining the data.
D) the public's right to know.
A) corporate social responsibility.
B) business process efficiencies.
C) the cost of maintaining the data.
D) the public's right to know.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
51
Any organization which collects personal information must follow a process on how this information is ________, used and shared.
A) processed
B) collected
C) disseminated
D) collated
A) processed
B) collected
C) disseminated
D) collated
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
52
The ________ principle of ethics forces an organization to have proper controls for authorization and authentication.
A) privacy
B) accessibility
C) accuracy
D) property
A) privacy
B) accessibility
C) accuracy
D) property
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
53
Working with a qualified outsourcing partner may give your IT staff the chance to ________ their skills and gain confidence.
A) manage
B) oversee
C) qualify
D) improve
A) manage
B) oversee
C) qualify
D) improve
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
54
________, where crooks use an individual's profile for fraudulent transactions, is now the number one crime in many parts of the world.
A) Data mining
B) Phishing
C) Internet fraud
D) Identify theft
A) Data mining
B) Phishing
C) Internet fraud
D) Identify theft
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
55
The ________ principle of ethics makes organizations realize that they are not the ultimate owners of the information collected on individuals.
A) privacy
B) accessibility
C) accuracy
D) property
A) privacy
B) accessibility
C) accuracy
D) property
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
56
ERP systems make it ________ to use and share information.
A) easier
B) harder
C) controversial
D) necessary
A) easier
B) harder
C) controversial
D) necessary
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
57
The biggest threat to privacy from ERP systems is from ________ activities.
A) BPR
B) data mining
C) security
D) data warehouse
A) BPR
B) data mining
C) security
D) data warehouse
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
58
Identity theft in the U.S. is:
A) declining.
B) increasing.
C) stabilizing.
D) random.
A) declining.
B) increasing.
C) stabilizing.
D) random.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
59
In the U.S., corporations must adhere to the disclosure rules as specified by:
A) the PMO.
B) the industry council.
C) Sarbanes-Oxley.
D) the Project Executive.
A) the PMO.
B) the industry council.
C) Sarbanes-Oxley.
D) the Project Executive.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
60
ERP systems can help to ________ data with an organization's trading partners.
A) enable
B) synchronize
C) privatize
D) import
A) enable
B) synchronize
C) privatize
D) import
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
61
How should an ERP system be secured?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
62
One danger of outsourcing is that employees for an outsourcing partner can leave and go to work for a(n) ________.
A) government
B) attorney
C) competitor
D) consultant
E) none of the above
A) government
B) attorney
C) competitor
D) consultant
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
63
The rapid growth in SaaS-based applications is due in part to the advent of PCs and the ________.
A) printers
B) cell phones
C) internet
D) iPods
E) none of the above
A) printers
B) cell phones
C) internet
D) iPods
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
64
It is a myth to think that SaaS applications do not need any ________.
A) attorneys
B) hardware
C) configuration
D) consultants
E) none of the above
A) attorneys
B) hardware
C) configuration
D) consultants
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
65
In the context of ________ theory, the ERP system would not be allowed to share or collect consumer information unless the consumers were notified of this plan and only if this activity would result in a net benefit to the society.
A) stakeholder
B) stockholder
C) communication
D) social contract
A) stakeholder
B) stockholder
C) communication
D) social contract
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
66
The adoption of the SaaS model may turn applications into ________.
A) hardware
B) commodities
C) disasters
D) managers
E) none of the above
A) hardware
B) commodities
C) disasters
D) managers
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
67
The SaaS model brings lower implementation risk and a better ________ transfer between integrators and users.
A) knowledge
B) hardware
C) data
D) consultant
E) all of the above
A) knowledge
B) hardware
C) data
D) consultant
E) all of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
68
Why do ERP implementations need an audit plan?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
69
Often in software negotiations, the software is placed in ________ in the event the software company declares bankruptcy.
A) storage
B) escrow
C) production
D) development
A) storage
B) escrow
C) production
D) development
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
70
How should an organization with an ERP system plan for a disaster?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
71
In the context of an ERP implementation, ________ theory would implement very few restrictions on using the information from this system to monitor employee performance or collect and share consumer information from the system..
A) stakeholder
B) stockholder
C) communication
D) social contract
A) stakeholder
B) stockholder
C) communication
D) social contract
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
72
Outsourcing ERP functions might look cheaper on paper, but savvy managers must consider the total cost of ________.
A) attorneys
B) consultants
C) ownership
D) management
E) none of the above
A) attorneys
B) consultants
C) ownership
D) management
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
73
How has the need for SOX compliance impacted ERP systems?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
74
SaaS is a model for ________ delivery rather than being a separate market segment.
A) data
B) software
C) hardware
D) consultant
E) none of the above
A) data
B) software
C) hardware
D) consultant
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
75
When using a computer, most people spend the majority of their time using ________ applications.
A) custom
B) end-user developed
C) illegal
D) standard
E) none of the above
A) custom
B) end-user developed
C) illegal
D) standard
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
76
How can companies guard themselves from lack of performance on the part of consulting partners?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
77
Globalization and offshoring have ________ the level of ethical concerns.
A) lowered
B) mediated
C) raised
D) mitigated
A) lowered
B) mediated
C) raised
D) mitigated
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
78
The learning curve for SaaS-based applications is less because most users already know how to use a ________.
A) web browser
B) personal computer
C) printer
D) iPod
E) none of the above
A) web browser
B) personal computer
C) printer
D) iPod
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
79
Ethics is sometimes referred to as the science of ________.
A) managers
B) attorneys
C) morality
D) consultants
E) none of the above
A) managers
B) attorneys
C) morality
D) consultants
E) none of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
80
Language and time zone differences can be difficult to ________ as far as their impact on an IT project.
A) quantify
B) identify
C) determine
D) document
E) all of the above
A) quantify
B) identify
C) determine
D) document
E) all of the above
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck