Cipcommunity

Management Information Systems

Management Information Systems

MGMT305 – Unit 5 Individual Project Week 5- Case Studies Chasity Fenn American Intercontinental University October , 2011 ABSTRACT This paper will discuss the questions asked about the four different case studies we are to read this week. The case studies are When antivirus software cripples your computers, How secure is the cloud, Are electronic medical records a cure for heath care, and JetBlue and WestJet: A tale of two IS projects (Laudon & Laudon, 2012, pgs 304, 321, 522 & 556). WEEK 5 CASE STUDIES WHEN ANTIVIRUS SOFTWARE CRIPPLES YOUR COMPUTERS

There are a few reasons why McAfee’s antivirus software created so many problems for their users. First, when test simulations were done, management did not run these tests for Windows XP, with service pack 3, users using the McAfee VirusScan version 8. 7 (Laudon & Laudon, 2012, p. 304). Most McAfee users of VirusScan were using Windows XP service pack 3 and the VirusScan version 8. 7, these were the individuals most affected by this faulty update download. The update for VirusScan was intended to deal with the new virus ‘W32/wecorl. a’. However, it was not known that this virus could make itself appear as the name svchost. xe, which is a Windows file that is critical to PC’s performance (Laudon & Laudon, 2012, p. 304). It was also the slipup of the company to not detect this problem sooner. There was such a high demand for faster antivirus updates that lead to this slipup. The impact on the company, because of this software malfunction, was very damaging to the company. Their reputation with their customers was damaged, but it is not stated how bad it was or if McAfee lost customers or revenue. The impact on their customers, however, was very bad. Customer’s computers would not boot up properly and they were not able to access files or etworks. Once there was a resolution to fix the problem, each computer had to be accessed one by one. Another big problem McAfee encountered was that they tried to downplay the impact of their customers (Laudon & Laudon, 2012, p. 304-305). If I were a McAfee customer, I would not have accepted their response for the problem. First, McAfee did not do enough research and testing, and failed to test one of the most popularly used operating systems with the new version of VirusScan. This was not very professional of them. Then they did not respond to customers in a timely manner.

Customers did not know what was happening or how to fix it. McAfee should have immediately put out an explanation and an apology for the inconvenience. They did do this, but it was not done until after the problem had gotten worse. In order to prevent instances like this from happening again McAfee should make sure all tests done are performed using most up to date operating systems, as well as older systems, with the various versions of the antivirus software that is being used by customers. I am sure McAfee has numerous ways of getting information on how many customers are using which versions of their software.

They can also put out warnings for those customers using older versions that their systems could be affected by new updates. This would insure that customers had access to such information, and McAfee could not be held responsible for any problems with customer systems. It is all a matter of research, testing, and knowledge about their software. HOW SECURE IS THE CLOUD One of the security and control problems discussed in this case study about the cloud is that the computing of the system is “highly distributed” (Laudon & Laudon, 2012, p. 321). All applications and data within the cloud systems are stored in virtual libraries.

It is often hard to determine where your data is being hosted. Providers store and distribute data and work in data centers all over the world (Laudon & Laudon, 2012, p. 321). Another risk of this kind of distribution is the difficulty to “track unauthorized activity” (Laudon & Laudon, 2012, p. 321). A control issue with using cloud is that some providers do not (and do not intend to) meet the requirements about security (Laudon & Laudon, 2012, p. 321). Lastly, cloud system users also have to deal with the fact there could be an interruption of the systems they use.

It is expected by businesses and users for the systems to be available all the time, but in reality power outages and server problems could make data retrieval and usage of the system not possible (Laudon & Laudon, 2012, p. 321). The factors that contribute to the problem of the distribution of data are the number of users of the programs. Having multiple distribution centers is the way that cloud is able to have so many users and to store mass amounts of data. This also contributes to the problem of tracking activities. The reason why some cloud providers do not (and do not intend to) meet security requirements is the cost of audits.

If a cloud provider does not have proof of security requirements, they often have to have outside companies audit their data. Many providers do not want outside companies viewing their data and it can be costly to hire someone to do this (Laudon & Laudon, 2012, p. 321). Cloud computing is only as secure as the company using it is. Even though cloud applications are secure and encrypted, it is the responsibility of the business using the cloud systems to use encryption and other security measures. It is important that security measures be used on the company’s side, not just the provider’s side (Laudon & Laudon, 2012, p. 21). If security and encryption is not used within the business using the cloud systems, that business could be vulnerable to hacking attempts. If I were in charge of the information systems department of my company, the issues that I would want to discuss with potential vendors would be about where our data will be hosted. There are cloud providers that give businesses the choice of “where their cloud computing work” will take place (Laudon & Laudon, 2012, p. 321). I think that this is very important to the security of the business’ data.

I think that with the right security measures in place, with both the cloud-computing vendor and my company, it would be useful to use the cloud computing system. I believe that it would cut costs of having data stored within the company databases. In addition, the amount of data the company would be able to save would be greater than if it was only stored within the company itself. ARE ELECTRONIC MEDICAL RECORDS A CURE FOR HEALTH CARE? One issue that hinders the building of electronic medical records is the cost and time it takes to change medical records over.

Another issue is compatibility. It is unsure whether the systems being created will be compatible with each other years down the road. Other issues of electronic medical records are “patients’ privacy concerns, data quality issues, and resistance from health care workers” (Laudon & Laudon, 2012, p. 522). The stage that will be the hardest to get through with building the electronic medical systems is the switching over. Many doctors’ offices and clinics do not have the funds to make the improvements with the technology.

Even though a stimulus will be provided that will pay doctors to have the systems installed, they do not get all of the money up front (Laudon & Laudon, 2012, p. 523). Not updating medical records to electronic systems could cause more work for physicians. Doctors and nurses would have to manually search for medical information about patients and would have to manually file medical claims to insurance companies. Even though there are risks of security with the electronic medical record, there are security risks with hard copy medical records as well. Medical records, in hard copy form, can be stolen and lost.

In addition, physicians would not be able to take advantage of the linking of systems with other healthcare providers. This technology is beneficial to correctly caring for all patients in a timely manner. On the other hand, updating systems and using the digital medical record could be very useful. Doctors would have access to medical information on all patients at a push of a button, as well as, be able to communicate with other providers and insurers easier. The digital medical record can be more secure than a hard copy. Most digital medical record systems are password nd user name managed, as well as, encrypted from hacking attacks. Prescribing medication for a patient before EMR systems is time consuming. A doctor prescribes medication for the patient and writes it into the patient’s file. That file is then read by a nurse who retrieves the medication to give to the patient. The nurse will then proceed to give the patient the medication by verifying the identity of the patient by their medical identification bracelet. However, after EMR systems are implemented, the information on patient medication is sent directly to a nurse’s workstation.

The information is then verified and compared with other medications that patient is taking to make sure they are not taking a combination of drugs that would be harmful. A scanner is then used to scan the patients ID bracelet, and gives the nurse information on what medication to give. JETBLUE AND WESTJECT: A TALE OF TWO IS PROJECTS Airline reservation systems are very critical to airlines as well as customers. Reservation systems are created to make it easier for customers to book flights, pay for flights, and check in earlier. These systems make it easier for customers and allow them more time.

Reservation systems take a lot of time out of the checking in and booking processes. Using these systems make it possible to record customer activities and preferences. This makes it easier for the airline to schedule and make decisions on improvements within their planes. The key risk in the new reservation systems were the transfer over of all customer information. Flight information and customer information was not transferred over properly to the new system, which created a delay with future flight bookings. It also caused the airline’s website to crash numerous times as well.

This caused the retrieval of flight information online impossible (Laudon & Laudon, 2012, p. 557). I would have made it possible to be able to access all information from the old system while still trying to implement the new system. Having a few stations that were not to be changed over at first would have made things easier to control. It would have given the airline access to all information while trying the change overhaul. REFERENCES Laudon, K. C. , & Laudon, J. P. (2012). Management information systems: managing the digital firm (12th Ed). Upper Saddle River, NJ: Pearson Prentice Hall