Describe-criticise and select strategic planning techniques

Assignment Help Other Subject
Reference no: EM131265421 , Length: word count:2500

You should hand in one copy of your assignment/project by the date mentioned above to the appropriate 'hand-in location' at the Gulf College. Fill in the front cover (staple together with your assignment). MAKE SURE that you fill in all the relevant details on this form. An acknowledgement will be given to you upon receiving your assignment. This is your receipt, just keep it. Faxed assignments will not be accepted.

Assignments must be submitted on the assigned date. The only circumstance in which assignments can be submitted late is if an extenuating circumstances form is submitted at the same time. In these circumstances, work may be submitted late up to 2 weeks only. If the extenuating circumstances are upheld, the assignment will be graded; otherwise 0 marks will be awarded.

Learning outcome (1, 2, & 3)

1. Describe, criticise and select strategic planning techniques that are appropriate for a given scenario.

2. Evaluate, plan and communicate IS development plans to produce identified business benefits and formulate a basic strategic IS planning and decide some policies by which it could be carried out.

3. Critically discuss and criticise the effective use of some techniques of facilities and IT operations management. Apply such measures as may be appropriate to protect the corporate information resource to maintain a secure system.

This assessment is composed of Group and Individual Assignment

Teams must consist of Two (2) students and each student should submit their joint report wherein individual work is included.

SECTION A) GROUP ASSIGNMENT

THE ROLE OF INFORMATION TECHNOLOGY IN TODAY'S GENERATION

CASE PROBLEM 1: Information System (IS) in Restaurant

A waiter takes an order at a table, and then enters it online via one of the six terminals located in t, restaurant dining room. The order is routed to a printer in the appropriate preparation area: the col item printer if it is a salad, the hot-item printer if it is a hot sandwich or the bar printer if it is a drink. customer's meal check-listing (bill) the items ordered and the respective prices are automaticall generated. This ordering system eliminates the old three-carbon-copy guest check system as well as and problems caused by a waiter's handwriting. When the kitchen runs out of a food item, the cooks sena Out an "out of stock" message, which will be displayed on the dining room terminals when waiters try to order that item. This gives the waiters faster feedback; enabling them to give better service to the customers.

Other system features aid management in the planning and control of their restaurant business. The system provides up-to-the-minute information on the food items ordered and breaks out percentages showing sales of each item versus total sales. This helps management plan menus according to customers' tastes. The system also compares the weekly sales totals versus food costs, allowing planning for tighter cost controls. In addition, whenever an order is voided, the reasons for the void are keyed in. This may help later in management decisions, especially if the voids are consistently related to food or service.

Acceptance of the system by the users is exceptionally high since the waiters and waitresses were involved in the selection and design process. All potential users were asked to give impressions and ideas aboutthe various systems available before one was chosen.

Task 1

In the light of the system, describe the decisions to be made in the area of strategic planning, managerial control and operational control. What information would you require to make such decisions? Support your answer with relevant examples.

Task 2

Prepare your own detailed plan in order to make the system more complete Management Information rather than just doing a transaction processing. In addition, explain the probable effects System (MIS) that making the system more formal would have on the customers and the management.

DATA PROTECTION AND SYSTEM SECURITY ISSUES

CASE PROBLEM 2: Software Security and Privacy Risks in Mobile e-Commerce - The New Da Security Challenge for Business Organisations

Most current e-commerce transactions are conducted by users in fixed locations using workstations an personal computers. Nowadays, a significant portion of e-commerce takes place via wireless, Interne: enabled devices such as cellular phones and personal digital assistants. Wireless devices provide user mobility to research, communicate, and purchase goods and services from anywhere at any tam( without being tethered to the desktop. Using the Internet from wireless devices has come to be knowr as mobile e-commerce, or simply "m-commerce," and encompasses many more activities than merely online purchasing. One of the major wireless applications is Web access for retrieval of real-time information such as weather reports, sport scores, flight and reservation information, navigational maps, and stock quotes. While email will continue to dominate wireless applications, innovative online applications use location reference information of end users that will drive new areas of mobile e- business growth.

In spite of the seemingly unlimited potential to drive new applications and markets in mobile e-commerce, new security and privacy risks particular to the wireless medium and devices abound in m-commerce applications. Integrating security and privacy into online m-commerce applications will enable a projected $25 billion market in wireless software, content, and commerce. On the other hand, failing to provide a secure system of m-commerce will significantly dampen consumer adoption rates.

In addition to contending with the usual Internet security threats in online applications, wireless devices introduce new hazards specific to their mobility and communication medium.

(Source: Examining the Risks in Wireless Computing, Communications at ACM, 2001).

Task 1

1. You are given a task to identify the security risks associated with the implementation of mobile e-commerce into business organisations. How does mobile e-commerce affect the transactions done by business organisations. Support your answer with relevant examples and evidences

Task 2

2. Why is data security the highest priority issue in many business organisations nowadays? How can large business organisations mitigate the risks of mobile e-commerce? Explain your answer with appropriate examples.

SECTION B) INDIVIDUAL ASSIGNMENT

CASE PROBLEM 3: ETHICAL ISSUES IN COMPUTING

The TLR software company (fictitious name) based in Sultanate of Oman where you have been consultant for many years has a four-year-old relationship with a strong and stable European client; the EUROSOFT. In this economic phase of high demand for experienced software professionals, the company's relatively unknown name does not attract a lot of resources from the top tier, but it has still managed to create and retain a decent team with them for the last three years.

The trouble started five months ago, when one of the company's lead developers left for greener pastures. He left on good terms with the company's management, but he also left a big hole in the company's small structure that needed a quick replacement. Meanwhile, the EUROSOFT (as their client) was requesting a further increase in terms of team size to manage and handle the ever-increasing workload. Upon hearing this, Mr. James, an expert programmer and former company's employee showed interest in rejoining, as the pastures that he had left for earlier were drying up. The company was quite happy to have Mr. James back as he Would have partially patched up the widening hole, and already possessed prior domain knowledge on the project. The company and client were happy.

After two months, the company started scheduling interviews to hire support team members for Mr. James. The client sent one of their project managers from Europe to Oman to train team members for better offshore coordination. The company's CEO went out of the way to attend Mr. James numerous phone calls, and agreed to most of his demands, so eventually, Mr. James signed a contract with the company last week. Two days after Mr. James signed the contract; the CEO informed you that he had just gotten a one-liner email from Mr. James telling him that he won't be joining the company after all. No apologies, no explanations and no mention of the penalties for such an action that is included as standard in the contract. The CEO also heard from the grapevine that Mr. James had opted to join through another firm. Despite being an outsider for the most part, you were boggled by Mr. James arrogant and unprofessional behaviour. Ignoring it this time was not an option as such behaviour is not anomalous anymore.

(Source: Bosed on the scenario provided by Ethical Cases 2007 - pbworks.com)

Discussion Questions:

1. If you were the company's CEO, what would you have done? Support your answer.

2. What actions might be taken and what would be the consequences of these actions be? Explain clearly your answer with relevant examples.

3. Can anything be done to prevent this from reoccurring or to minimise the severity of th consequences? What would be the impact of the above mentioned scenario to TER Company? Support your answer.

PROBLEM 4: Intellectual Property

Not far from the bustling tourist areas in Ruwi, Sultanate of Oman, there is a shopping centre called the Oman's Arcade Shop (fictitious name) where dozens of shops sell hundreds of CD-ROM titles for as little as OMR 10 each. At a quick glance, they appear legitimate. However, they are actually counterfeits.

Counterfeit software is everywhere. In the United States, auction and classified ads sites are notorious for being rampant with counterfeit software.

According to the most recent survey conducted by Business Software Alliance, sixty percent (60%) of all software installed on computers in Oman is pirated. The Global Software Survey for 2014 by the Business Software Alliance confirms that a lot of work remains to be done in the area of software piracy. Anyone found guilty of software piracy in Oman will be punished.

Counterfeit software sometimes can be identified by close inspection of the discs, documentation (if available) and packaging. Poorly reproduced colour, misplaced trademark logos, missing documentation and typographical errors are warnings that the software may be counterfeit.

(Source: Software Piracy in Oman, Muscat Daily, 2016 and SIIA IP Protection)

1. What do you think are the consequences both software publishers and users are facing in using counterfeit software? What are the consequences if my business is using unlicensed software? Support your answer with relevant law/s on software piracy.

2. Suppose one of your employees installed counterfeit software on an office computer without your knowledge, do you think you as an employer will be liable for your employee's actions? Why or why not? Explain your answer clearly; '

3. Do you agree with the statement below about software piracy? Why or Why not? Does the government of Oman have the ability to go after software pirates? Support your answer with Oman's law in software piracy.

"Software piracy by users has been identified as the worst problem facing the software industry today. Software piracy permits the shadow diffusion of software parallel to its legal diffusion in the marketplace, increasing its user base over time. Because of this software shadow diffusion, a software firm loses potential profits, access to a significant proportion of the software user base, opportunities for cross-selling, and marketing its other products and new generations of the software."

(Source: Software Piracy: Estimation of Lost Sales and the Impact on Software Dillusion, Muller, etal 2007)

Reference no: EM131265421

Questions Cloud

Identify the major fallacies of international trade : Eco 142A Midterm Exam. Identify the major fallacies of international trade. "The net effect of a tariff, looking at its impact on consumers, domestic producers, government, and the economy at large, is generally considered negative." Explain this s..
Should the us only provide aid to democratic nations : If so, are there any political implications? Should the U.S. only provide aid to democratic nations, or does this go beyond the altruistic intent of providing relief efforts?
Identify three factors of production : Choose five U.S. government policies that affect trade with foreign nations. Identify three factors of production, and describe how their mobility is good or bad for U.S. trade.
Was there a topic that you struggled with : It has been stated that we know more about the surface of the moon than we do the oceans. Compare what you have learned in Unit V with this Unit. Do you think, as a nation, we should invest more resources in space exploration or in ocean explorati..
Describe-criticise and select strategic planning techniques : Describe, criticise and select strategic planning techniques that are appropriate for a given scenario - Evaluate, plan and communicate IS development plans to produce identified business benefits and formulate a basic strategic IS planning and dec..
Example of transaction : Please give us an example of a transaction where there are two increases. Note that you will still need to have at least one debit and one credit. Indicate which account will be debited and which will be credited.
Explain important issue that we must address as a nation : Civil rights is a huge and important issue that we must address as a nation. Post your thoughts on this week's subject; you may want to write about how some of these issues directly affect you.
Assuming that as finance lease calculate the pv of the mlp : Gamison leased a fleet of trucks. The lease is for 5 years and commenced on 1st July 2013. The annual rentals are $62,000 and are made on 1st July each year with the first rental being paid on 1st July 2013. Assuming that as a finance lease calculate..

Reviews

len1265421

11/4/2016 3:06:39 AM

I want this assignment it's of 2000-2500 words. How much will be the price of 2000 and 2500 words. I want both the price quotes. Thank you - In addition to contending with the usual Internet security threats in online applications, wireless devices introduce new hazards specific to their mobility and communication medium.

len1265421

11/4/2016 3:05:56 AM

Presents all information clearly and concisely in an organised manner incorporates pertinent and detailed information from class discussions. No rr grammatical or spelling errors.

len1265421

11/4/2016 3:05:32 AM

Paragraph Format Font size 14pt for headine . .., 12pt for body text Font size Adal Length of the contents (Section A) 2000-2500 words (include page numbers at the right-hand bottom of each page) . , Length of the contents (Section B) Minimum of 7 pages (include page numbers at the right-hand bottom of each page) Paragraph alignMent Justified Line spacing Ls lines

len1265421

11/4/2016 3:05:21 AM

Assignment Guidelines 1. Provide a standard cover page with the group members' name and ID numbers. 2. Provide a standard cover page for individual work as well. 3. The tasks should be divided equally among members. No extra marks for the students who more tasks. 4. Zero mark is given to students who do not perform any task in the group assignment. 5. Adding a new member in the group should be directly reported to the lecturer during th assignment progress. Complaints will not be entertained after the assignment marking. 6. Double check whether your assignment is in accordance with the assignment guidelines before the submission 7. Include references (proper referencing should be observed).

Write a Review

Other Subject Questions & Answers

  Define what is accomplice liability and criminal liability

What is accomplice liability and criminal liability. How does it relate to the case. What is the difference between the various elements of crime, including actus reus, mens rea, and concurrence. How do they relate to the case.

  Government bailouts of private industry

Write a research paper about "Government Bailouts of Private Industry", To what degree should the government bailout troubled private industries?

  What are the advantages of using subsidiary ledgers

What are the advantages of using subsidiary ledgers

  How dante uses imagery from classical mythology and history

Characterize the medieval religious outlook of people in the late middle ages, and talk about how Dante uses imagery from classical mythology, history and the Bible to bring vividness to this outlook as presented in The Divine Comedy: The Inferno..

  You might select any topic phenomenon person subject or

the research paper is an act of scholarship which requires that you utilize a minimum of three scholarly reputable and

  Explore the arguments around corporate social responsibility

You are to explore the arguments around Corporate Social Responsibility (CSR), and showcase a company showing leadership in CSR. The key sections to be included in the report are listed below. All reports must contain a Title page; Executive summar..

  Write a three pages paper on the everglades wildlife

Write a three pages paper on the Everglades wildlife. Paper must inform about threatned and endangered species in the Everglades and the climate of the Everglades.

  Determine two leadership theories and leadership styles

Determine two leadership theories and two leadership styles that support the definition of a public leader. Provide a rationale for your response.

  Discuss how blues style functions in gospel music

The Blues Queens of the 1920s represent a significant evolution of black performance style beyond black-face minstrelsy. However, they also present a racially stereotyped or confining set of performance practices. Discuss this dichotomy.

  Explain reasons these are the major audiences

Describe the primary and secondary audiences for your selected topic. Explain reasons these are the major audiences for your selected topic. Describe the expectations these audiences have about a writer's research and evidence to support his/her clai..

  P-value would be associated with the data

If x , the number of successes in the first set, is 60 and y , the number of successes in the second set, is 48, what P-value would be associated with the data?

  Generating tools and techniques for innovation

What are some of the idea generating tools and techniques for innovation, design, and creativity? How do you create an innovative environment? How have you used one of the idea generating tools and techniques in your own decision-making? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd