Identifying stakeholders, Computer Engineering

Assignment Help:

I have chosen an imaginary example to illustrate the different stakeholder categories. At Home sells a selection of consumer products, currently listed in a paper catalogue, which are now to be listed on a website as well. Front-line staff take telephone orders for products, which are dispatched by mail to the customers. For simplicity, I will ignore the way in which products are selected for the catalogue and purchased to fulfil current and future orders.

Historically, there has been a high turnover of front-line staff: this is one of the reasons for developing the website. A small team of trainers recruits and trains the front-line staff. There is a customer support department that looks after complaints and returns. For historical reasons, this is located in the organisation alongside the trainers in the implementation team. The logistics department is concerned with moving the various products around the country.


Related Discussions:- Identifying stakeholders

Explain advantages and disadvantages of static document, Explain Advantages...

Explain Advantages and Disadvantages of Static Document. The chief advantages of a static document are reliability, performance and simplicity. A browser can display a static d

Explain an intermediate language, Assemblies are made up of IL code modules...

Assemblies are made up of IL code modules and the metadata that explains them. Although programs may be compiled by an IDE or the command line, in fact, they are easily translated

Gustafsons law, Amdahl's law is suitable for applications where response ti...

Amdahl's law is suitable for applications where response time is critical. On the other hand, there are a lot of applications which need that accuracy of the resultant output shoul

How many lists can a program can produce, How many lists can a program can ...

How many lists can a program can produce? Every program can produce up to 21 lists: one basic list and 20 secondary lists.  If the user makes a list on the next level (that is,

Two ways of producing a list within a transaction, What are the two ways of...

What are the two ways of producing a list within a transaction? By submitting a separate report. By using leave to list-processing.

Diiferentiate between ROM and PROM, Diiference between ROM and PROM. R...

Diiference between ROM and PROM. ROM: It also called Read Only Memory is a Permanent Memory. The data is permanently stored and cannot be changed in Permanent ROM. This can o

What is telnet explain, Q. What is Telnet explain? TELNET stands for TE...

Q. What is Telnet explain? TELNET stands for TErminal NETwork. Telnet is both a protocol for connecting a local computer to a remote computer and a TCP/IP application. Telnet i

Describe the basic aspects of ENIAC, Q. Describe the basic aspects of ENIAC...

Q. Describe the basic aspects of ENIAC? The main aspects of ENIAC can be summarized as: ENIAC was a general purpose-computing machine in that vacuum tube technology was

Define linear probing with respect to hashing technique, Define Linear Pro...

Define Linear Probing Linear Probing:  The easiest way to resolve a collision is to begin with the hash address and do a sequential search by the table for an empty location.

By which exposing EPROM contents can be erased, EPROM contents can be eras...

EPROM contents can be erased by exposing it to ? Ans. By exposing EPROM contents to Ultraviolet rays, it can be erased. The Ultraviolet (UV) light passes throughout a window i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd