MIS 3534 – Prof. Min-Seok Pang

Online Discussion Questions

Online discussion questions – Apr 20

  • How does Uber’s pricing work? How different is it from pricing of traditional taxicabs?
  • What would be reasons for city governments to ban AirBnb or Uber? How would you counter them?
  • What would be reasons for online education to be valuable to education providers or students?
  • Why are technologies of FreshDirect sophisticated and state-of-the-art?

Online discussion questions – Apr 17

  • What were the roles of Samyojak (former CAs at Mandis) in eChoupal?
  • Why did ITC allow farmers to continue doing business with CAs at Mandis as they used to, even if it could ban the farmers from doing so?
  • Do you think ITC’s competitive advantages from eChoupal can be sustainable? Why or why not?
  • Any other examples, in which a new entrant with IT disrupts the existing industry by eliminating “choke points” or market inefficiency?

Online discussion questions – Apr 15

  • Any other example in which middlemen such as CAs in Mandis create inefficiency in an industry?
  • What did ITC do in order to overcome regulatory challenges in implementing eChoupal?
  • While eChoupal seems to be beneficial to farmers, they are not well-versed in using PCs and the Internet. How does ITC help them adopt eChoupal?
  • Before accepting a job offer, what kind of research do you have to do?

Online discussion questions – Apr 13

  • What should be among the preventative measures for a failure due to personal devices?
  • From IT Adventures Ch. 17,  What is Mr. Williams’ point with respect to his poker analogy?  What is Mr. Barton’s point with respect to his risk escalator analogy?
  • Did Mr. Williams make a right call by doing nothing?
  • Any other trade-off situation in risk and security management?

Online discussion questions – Apr 1

  • How would you explain the difference between a distributed denial of service (DDoS) attack and an intrusion to a non-IT boss or colleagues?
  • If an intrusion was indeed occurred and it was the intruder who changed the database index file, why would he/she have done it?
  • What would have happened if Mr. Barton “pulled the plug” at the request of Mr. Wells?
  • How would you explain “set up parallel systems built from development files, then switch over the those” to your non-IT boss?