Comment on (i) Netflix Case (page 223), (ii) Amazon Reviews: Go to the Amazon site and enter the title of any book, read a couple of reviews and comment on the truthfulness of the reviews., (iii) Go back to the Yelp reviews in H2 on business reputation. Did you see any “signaling” behavior in the comment posts. Comment.

I’m working on a management discussion question and need support to help me learn.

 

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $9/Page
Order Now

Read the section in the textbook on Collaborative Filtering. Pages 222 and 223.

Comment on (i) Netflix Case (page 223), (ii) Amazon Reviews: Go to the Amazon site and enter the title of any book, read a couple of reviews and comment on the truthfulness of the reviews., (iii) Go back to the Yelp reviews in H2 on business reputation. Did you see any “signaling” behavior in the comment posts. Comment.

Post a single comment for all three responses.

for the amazon book , you can choose any busnnes book you like

 

Volunteer State Community College Collaborative Filtering Question
attachment_1
Volunteer State Community College Collaborative Filtering Question
attachment_2
Volunteer State Community College Collaborative Filtering Question
attachment_3

UNFORMATTED ATTACHMENT PREVIEW

The role of information systems and how they assist management in decisionmaking. The impact of electronic commerce on business models. Build or buy? Should a business build its own systems or use enterprise systems? Emerging trends in business information systems. Management Information Systems MANG 3778 – Spring 2021 (Updated 1/5/2021) Sathiadev Mahesh & Cherie Trumbach Management Information Systems Table of Contents 1.MANAGEMENT INFORMATION SYSTEMS – CHAPTER 1 …………………………………………………………………………… 8 1.1 INTRODUCTION ……………………………………………………………………………………………………………………………………..8 1.1.1 Improvements in Performance to Price Ratio ………………………………………………………………………………….8 1.1.2 Digitization ……………………………………………………………………………………………………………………………….10 1.1.3 Ubiquitous Computing – Anytime, Anywhere availability ………………………………………………………………..12 1.1.4 Information about IT ………………………………………………………………………………………………………………….13 1.2 COMPUTER SYSTEMS IN BUSINESS ……………………………………………………………………………………………………………..14 1.2.1 Value of IT: Paul David and Nicholas Carr ……………………………………………………………………………………..15 1.2.2 Efficiency and Effectiveness with IT………………………………………………………………………………………………18 1.2.3 User Training for IT effectiveness and efficiency …………………………………………………………………………….19 1.2.4 The Role of People in Information Systems ……………………………………………………………………………………21 1.2.5 What is computer literacy? …………………………………………………………………………………………………………22 1.3 TRANSACTION PROCESSING SYSTEMS AND MANAGEMENT INFORMATION SYSTEMS…………………………………………………….23 1.4 DATA, INFORMATION, KNOWLEDGE, AND BUSINESS INTELLIGENCE………………………………………………………………………..24 1.5 USING IT TO ADD VALUE …………………………………………………………………………………………………………………………27 1.5.1 Five Forces Model and IT …………………………………………………………………………………………………………….28 1.6 BUSINESS IT ROLES ……………………………………………………………………………………………………………………………….30 1.7 MOORE’S LAW ……………………………………………………………………………………………………………………………………32 QUESTIONS – CHAPTER 1 …………………………………………………………………………………………………………………………….34 Fill in the blanks: ……………………………………………………………………………………………………………………………….34 2. DATABASES – CHAPTER 2 ………………………………………………………………………………………………………………… 37 2.1 INTRODUCTION ……………………………………………………………………………………………………………………………………37 2.2 DATA BASE MANAGEMENT SYSTEM (DBMS) ………………………………………………………………………………………………..40 2.2.1 Logical & Physical Database Design ……………………………………………………………………………………………..42 2.2.2 Index………………………………………………………………………………………………………………………………………..44 2.2.3 File formats ………………………………………………………………………………………………………………………………44 2.3 DBMS COMPONENTS & STRUCTURED QUERY LANGUAGE (SQL) …………………………………………………………………………46 2.4 RELATIONAL DATABASES …………………………………………………………………………………………………………………………48 2.4.1 Why RDBMS ……………………………………………………………………………………………………………………………..51 2.5 DATABASE DESIGNS ………………………………………………………………………………………………………………………………53 2.5.1 Distributed Databases ………………………………………………………………………………………………………………..53 2.5.2 Blockchain ………………………………………………………………………………………………………………………………..54 2.5.3 Object Oriented Databases …………………………………………………………………………………………………………55 2.5.4 Star Schema ……………………………………………………………………………………………………………………………..56 2.5.5 Hadoop Databases …………………………………………………………………………………………………………………….58 2.6 DATA QUALITY AND CLEANING………………………………………………………………………………………………………………….61 2.6.1 Extraction-Transformation-Loading ……………………………………………………………………………………………..61 2.7 DATA WAREHOUSING ……………………………………………………………………………………………………………………………62 2.7.1 OLAP ………………………………………………………………………………………………………………………………………..64 2.7.2 Integrating Databases ……………………………………………………………………………………………………………….65 2.7.3 Data Portability …………………………………………………………………………………………………………………………65 2.8 DATA MINING …………………………………………………………………………………………………………………………………….66 QUESTIONS- CHAPTER 2 ………………………………………………………………………………………………………………………………68 Fill in the Blanks ………………………………………………………………………………………………………………………………..68 Select the Correct Answer …………………………………………………………………………………………………………………..69 © Sathiadev Mahesh & Cherie Trumbach – 1/5/2021 Page 2 of 306 Pages Management Information Systems Short Essay ……………………………………………………………………………………………………………………………………….69 3. INTERNET INFRASTRUCTURE – CHAPTER 3 …………………………………………………………………………………………. 71 3.1 INTERNET TIMELINE ………………………………………………………………………………………………………………………………71 3.1.1 IP- Internet Protocol …………………………………………………………………………………………………………………..72 3.1.2 The World Wide Web …………………………………………………………………………………………………………………75 3.2 PACKET SWITCHING & IP ADDRESSES ………………………………………………………………………………………………………….76 3.2.1 Domain Name System ………………………………………………………………………………………………………………..77 3.2.2 Uniform Resource Locator…………………………………………………………………………………………………………..78 3.3 APPLICATIONS AND PROTOCOLS – BROWSING ………………………………………………………………………………………………..79 3.3.1 Dynamic HTML – DHTML …………………………………………………………………………………………………………….81 3.3.2 Search Engines ………………………………………………………………………………………………………………………….82 3.4 MANAGEMENT OF THE INTERNET……………………………………………………………………………………………………………….83 3.4.1 Internet – Limitations …………………………………………………………………………………………………………………84 3.4.2 Intranets and Extranets ………………………………………………………………………………………………………………85 3.4.3 Web 1-2-3 ………………………………………………………………………………………………………………………………..85 3.5 E-COMMERCE TECHNOLOGIES ………………………………………………………………………………………………………………….86 3.5.1 JavaScript …………………………………………………………………………………………………………………………………86 3.5.2 Mashup ……………………………………………………………………………………………………………………………………86 3.5.3 IP Address …………………………………………………………………………………………………………………………………86 3.5.4 Web Log File ……………………………………………………………………………………………………………………………..86 3.5.5 Log-file Analysis ………………………………………………………………………………………………………………………..88 QUESTIONS-CHAPTER 3……………………………………………………………………………………………………………………………….91 Fill in the Blanks ………………………………………………………………………………………………………………………………..91 Select the correct answer ……………………………………………………………………………………………………………………91 Short Essay ……………………………………………………………………………………………………………………………………….91 4. ELECTRONIC COMMERCE – CHAPTER 4 ……………………………………………………………………………………………… 93 4.1 WHAT IS E-COMMERCE? ………………………………………………………………………………………………………………………..93 4.1.1 The boom-bust-renewal cycle ……………………………………………………………………………………………………..93 4.2 UNIQUE FEATURES OF E-COMMERCE…………………………………………………………………………………………………………..95 4.3 SIZE OF E-COMMERCE…………………………………………………………………………………………………………………………….98 4.4 VALUE CHAIN ……………………………………………………………………………………………………………………………………..99 4.4.1 E-Commerce in Value Chain ………………………………………………………………………………………………………..99 4.5 E-COMMERCE MODELS ………………………………………………………………………………………………………………………..101 4.5.1 Business-to-consumer (B2C) models …………………………………………………………………………………………..101 4.5.2 Business-to-Business Models …………………………………………………………………………………………………….104 4.5.3 C2C, P2P, M-commerce …………………………………………………………………………………………………………….105 4.6 E-COMMERCE IN THE SERVICE CYCLE…………………………………………………………………………………………………………106 4.7 SEARCH ENGINE OPTIMIZATION (SEO) ……………………………………………………………………………………………………….107 4.8 IMPACT OF E-COMMERCE ………………………………………………………………………………………………………………………109 4.9 ONLINE ADVERTISING …………………………………………………………………………………………………………………………..112 QUESTIONS – CHAPTER 4 …………………………………………………………………………………………………………………………..116 Fill In the Blanks ………………………………………………………………………………………………………………………………116 Select the Correct Answer …………………………………………………………………………………………………………………116 Short Essay ……………………………………………………………………………………………………………………………………..117 5. INFORMATION SYSTEMS SECURITY – CHAPTER 5 ………………………………………………………………………………. 118 5.1 INTRODUCTION ………………………………………………………………………………………………………………………………….118 © Sathiadev Mahesh & Cherie Trumbach – 1/5/2021 Page 3 of 306 Pages Management Information Systems 5.2 SECURITY PLAN ………………………………………………………………………………………………………………………………….118 5.3 SECURITY ISSUES, TESTING AND USER EDUCATION …………………………………………………………………………………………120 5.3.1 Sources of IT Security Risks………………………………………………………………………………………………………..122 5.3.2 Attacks in IT Systems ………………………………………………………………………………………………………………..123 5.3.3 Attackers ………………………………………………………………………………………………………………………………..126 5.4 ENSURING SYSTEM SECURITY ………………………………………………………………………………………………………………….128 5.4.1 Encryption ………………………………………………………………………………………………………………………………128 5.4.2 Backup Systems ……………………………………………………………………………………………………………………….132 5.4.3 Firewalls and Intrusion Detection Systems…………………………………………………………………………………..132 5.4.4 Physical Protection …………………………………………………………………………………………………………………..134 5.4.5 Authentication & Authorization of Users …………………………………………………………………………………….135 QUESTIONS – CHAPTER 5 …………………………………………………………………………………………………………………………..136 Fill in the blanks ………………………………………………………………………………………………………………………………136 Select the correct answer. …………………………………………………………………………………………………………………137 Short Essay ……………………………………………………………………………………………………………………………………..137 6. ETHICS AND LAWS – CHAPTER 6……………………………………………………………………………………………………… 139 6.1 INTRODUCTION ………………………………………………………………………………………………………………………………….139 6.2 SURVEILLANCE …………………………………………………………………………………………………………………………………..143 6.3 INFORMATION RELATED LAWS ………………………………………………………………………………………………………………..144 6.4 TRACKING WEB CUSTOMERS ………………………………………………………………………………………………………………….147 6.5 DATA OWNERSHIP ………………………………………………………………………………………………………………………………150 6.5.1 Cybersquatting ………………………………………………………………………………………………………………………..151 6.6 ACCEPTABLE USE POLICY FOR BUSINESS ……………………………………………………………………………………………………..152 6.6.1 Workplace Monitoring ……………………………………………………………………………………………………………..153 6.7 TELECOMMUTING ……………………………………………………………………………………………………………………………….155 6.8 HEALTH ISSUES ………………………………………………………………………………………………………………………………….157 QUESTIONS – CHAPTER 6 …………………………………………………………………………………………………………………………..157 Fill in the blanks ………………………………………………………………………………………………………………………………157 Select the correct answer ………………………………………………………………………………………………………………….158 Short Essay ……………………………………………………………………….. …
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool’s honor code & terms of service.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you
Use our paper writing service to score better and meet your deadlines.
Order Now