Page 116 -
P. 116
MyMISLab ™ Endnotes 115
Go to the Assignments section of your MyLab to complete these writing exercises.
2-16. Reread about 2026 in Q2-9. Do you agree with the conclusions? Why or why
not? If F2F meetings become rare, what additional impacts do you see on the
travel industry? In light of this change, describe travel industry investments that
make sense and those that do not. What are promising investments in training?
What are promising investments in other industries?
2-17. Groupware is a software used to support multiple users in remote locations
working on the same set of tasks. It is also known as collaborative software.
The major benefit is that the groupware has a mechanism by which the tasks
can be coordinated.
The major component of groupware is email. This is used to update members
of the team, elicit responses and send out alerts. Find out more about group-
ware and then answer the following questions:
a. What do the emails have live links to and what is the other main form of
communication between team members?
b. Groupware can be described as either process or information centered,
what does this mean?
c. What are the drawbacks of collaborative software that relies on email?
enDnoteS
1. Mitch Ditkoff, Tim Moore, Carolyn Allen, and Dave Pollard, “The Ideal 8. See also David Kroenke and Donald Nilson, Office 365 in Business
Collaborative Team,” Idea Champions, accessed April 26, 2014, www. (Indianapolis, IN: John Wiley & Sons, 2011).
ideachampions.com/downloads/collaborationresults.pdf. 9. Grant Hatchimonji, “Report Indicates Insider Threats Leading Cause
2. J. Richard Hackman, Leading Teams: Setting the Stage for Great of Data Breaches in Last 12 Months,” CSO Online, October 8, 2013,
Performances (Boston: Harvard Business Press, 2002). accessed April 13, 2015, www.csoonline.com/article/2134056/network-
3. Wouter van Diggelen, Changing Face-to-Face Communication: security/report-indicates-insider-threats-leading-cause-of-data-breaches-in-
Collaborative Tools to Support Small-Group Discussions in the Classroom last-12-months.html.
(Groningen: University of Groningen, 2011). 10. Donna Ballman, “10 New (and Legal) Ways Your Employer is
4. Warning: The data in this figure is changing rapidly. The features Spying on You,” AOL Jobs, September 29, 2013, accessed
and functions of both Web applications and cloud drives may have April 13, 2015, http://jobs.aol.com/articles/2013/09/29/new-
been extended from what is described here. Check the vendor’s ways- employer-spy.
documentation for new capabilities. 11. Paul Taylor, “Employers Can Predict Rogue Behavior Using Your
5. Carey Cole, Steve Fox, and David Kroenke, SharePoint for Students Emails,” The Conversation, February 18, 2014, accessed April 14,
(Upper Saddle River, NJ: Pearson Education, 2012), pp. 116–129. 2015, https://theconversation.com/employers-can-predict-rogue-behaviour-
6. Jessi Hempel, “Project HoloLens: Our Exclusive Hands-On with using-your-emails-23338.
Microsoft’s Holographic Goggles,” Wired.com, January 21, 2015, 12. J. L. Jenkins, M. Grimes, J. G. Proudfoot, and P. B. Lowry,
accessed April 5, 2015, www.wired.com/2015/01/microsoft-hands-on. “Improving Password Cyber-security Through Inexpensive and
7. Matt Rosoff, “I Just Tried Microsoft’s Remarkable Holographic Minimally Invasive Means: Detecting and Deterring Password
Headset—Here’s What It’s Like,” BusinessInsider.com, January 21, Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time
2015, accessed April 5, 2015, www.businessinsider.com/microsoft- Fear Appeals. Information Technology for Development 20, no. 2
hololens-hands-on-2015-1. (2014), 196–213.