Describe the role of information systems in the business

Assignment Help Management Information Sys
Reference no: EM131420127 , Length: word count:2500

Creating an E-Business System Report

Examining an existing company's e-business system can often allow you to learn what to do and not do when designing an e-business system for a new company. Some of the components of an e-business system may include hardware, application software, network infrastructure, and e-commerce strategies.

This Final Paper will require you to analyze the selections made by a company of your choosing. It will also prepare you for the process you will encounter in designing and implementing an e-business system.

Background

For the Final Paper in this course, you will create an e-business system report on the company you work for. If you are not currently employed, select a company to research and focus on for your Final Paper (e.g., a company a friend or family member works for, a company you can research on the Internet). You must select a company that has an existing e-business system.

Requirements, Length, and Format

Create an original 2,000- to 2,500-word report, titled "E-Business System Report for XYZ Company." Replace "XYZ Company" with the actual company name only if you are not working for the company and selected to research another company. Do not disclose the name of the company anywhere in the report if you are working for the company you selected. Just refer to the company as "XYZ Company," including on the title page.

Your Final Paper must cover five main areas, outlined in detail in the Content section below.

Your report must be carefully edited for grammar, punctuation, spelling, sentence structure, format, and APA referencing style. The report should include:

· Title page

· Page numbers

· Main headings for each section:

o Introduction

o Information Resources

o System Specification

o Electronic Commerce

o Emerging Trends and Technologies

· Sub-headings as necessary

· In-text citations (not footnotes)

· Reference list (must use at least four outside references in APA format)

Note: The word-length requirement is for the main body of the paper and does not include the Title or Reference pages.

Content

Your report must include the following components:

Introduction

· Provide a brief introduction of the company. Include the company's name, purpose, number of employees, etc.

Information Resources

· Explain how the business uses the following resources: people, hardware, software, information/data, and network.

· Describe the role of information systems in the particular business.

· Explain how Porter's Five Forces Model comes into play in the company.

System Specification

· Explain what functionality you think the employees, customers, suppliers, or other end users need from an e-business system.

· Describe how the e-business system will be utilized.

· Recommend ways the e-business system might be improved to meet the needs of the system stakeholders, and justify your recommendation.

· Describe the e-business system in terms of hardware, application software, operating system, network infrastructure, and pricing comparison.

Electronic Commerce

· Considering the possible combinations of business, consumers, and government, which best describes the company? For example, you might select Business to Business (B2B) or Business to Consumer (B2C). Explain your choice.

· Explain how e-commerce is used in the business.

Emerging Trends and Technologies

· Explain which emerging trends and technologies could be used to improve/enhance the e-business system.

· Explain how you will identify the emerging trends and technologies, and determine their applicability to your system.

Acceptable References

You must have at least four acceptable references for the information contained in your paper. The course text cannot count as one of the four references. Wikipedia is NOT an acceptable reference. Blogs and websites that simply present unsupported opinions are not acceptable references.

If you have a question on what resources are acceptable or unacceptable references, ask your Instructor for guidance. Instructors will look favorably upon your paper if it has more than the required minimum of references.

Evaluation

In addition to the intellectual content, each paper will be evaluated for clarity of writing and adherence to APA standards

Reference no: EM131420127

Questions Cloud

Define a problem or challenge within your topical area : You chose a topic area and problem or challenge within that area which was "Private Security". Develop a viable solution that considers resources, policy, stakeholders, organizational readiness, administrative structures and other internal and ext..
Write an introductory statement of the company : Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty. The company hired you because of your expertise with mobile apps, socia..
Which one of mill''s methods did the administrator use : Unable to attribute the remaining 3 percent to any lawful factor, the administrator concluded that it resulted from increased cheating by the taxpayers. Which one of Mill's methods did the administrator use?
Which one of mill’s methods did the manufacturer use : Among these six distinguishing characteristics the manager concluded that salty air caused the computers to break down. Construct a table that supports this conclusion. Which one of Mill's methods did the manufacturer use? What sense of causality ..
Describe the role of information systems in the business : Examining an existing company's e-business system can often allow you to learn what to do and not do when designing an e-business system for a new company. Some of the components of an e-business system may include hardware, application software, ..
Describe one of the models in the continuum of care : Health Insurance and managed care may be thought of as a continuum of models. Identify and briefly describe one of the models in the continuum of care.
Evaluate the effect of this ruling on forensic investigation : Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer
Is relationship between your pay-perception of performance : What are the factors that would make you most likely to quit a job? Is the relationship between your pay and your perception of your performance a reason? Why or why not? What could your organization do to keep you?
Summarize and defend carr arguments : In no more than two or three paragraphs, take the position of the "prosecuting attorney," i.e. of Mr. Carr. Summarize and defend Carr's arguments using material from the essay and also material from your outside reading

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the significant developments

Identify the significant developments that are occurring related to global integration and What implications does this have for the technology that an organization might have in its supply network?

  Perform a k-nearest neighbors prediction

MMIS 643 Data Mining - Under Predict menu in XLMiner, perform a k-nearest neighbors prediction with all 13 predictors (excluding the CAT.NIEDV column is the outcome or decision variable) for both training data set and validation data set.

  Is the policy easy to read and understand

Compare and contrast the two policies. For example, one may have a very in-depth acceptable use section while the other one may be lax. You don't have to compare every section, just pick a few to get a good understanding of where one may be lackin..

  Describe the objectives of the database environment

Describe the objectives of the database environment. Describe the scope and boundaries. List the data specifications (must include a minimum of three entities with attributes).

  Common mistakes to avoid as a systems analystwhat common

common mistakes to avoid as a systems analystwhat common errors does a new systems analyst often make when analyzing a

  Write essay on most important elements of computer security

The class textbook is not a valid source for this assignment. Apply the content from the articles in an essay on the most important elements of computer security.

  Did you develop your wbs top-down or bottom up approach

Does your WBS include everything in your team's charter and all deliverables (promised deliverables to the client organization customer)? Does your WBS address tasks that were not discussed in the Project Charter? If so, what are they and how did..

  Different types of information systems

Scenario: Imagine that you and a business partner are considering starting a small, brick & mortar, nostalgic record store. Your friend does not have much experience with information systems or technology, and needs a basic understanding of the di..

  How does the patient view of the meaning of her illnes

In what ways are the health professional's perception, diagnosis and treatment of ill health influenced by his/her own individual attributes (age, gender, personality, experience, prejudices), education or subcultures, ethnic, religious or profess..

  What do you do in situation where your ethical code clashes

However, what do you do in a situation where your ethical code clashes with something else? Personal ethics can, and will, inevitably clash with someone else's, the law, other cultures and even your work.

  Analyze the fundamental impact of enterprise architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry.

  Logistics networkwhat are the main steps for designing a

logistics networkwhat are the main steps for designing a logistics network? specifically what data would you

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd