




已阅读5页,还剩4页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1.0 The nature of the informationStrategicTacticalOperationalLowHighResponsibilityThis picture shows that different levels (Strategic, Tactical, Operational) have many differences on content, responsbility, aims about information and so on.Strategic managers is the most senior management of the organization. These managers are involved in the formulation of strategies, and the Tactical manager is the middle managers, which are responsible for ensuring that the goals of strategic management are achieved. Operational managers are the first line of management responsible for the day-to-day running of each department.Strategic managers is the most senior management of the organization, they develop long-term planning and development policies and strategies. They use their own judgment to make a complex decision, the wide range of information, external information and more internal, this level is always dealing with unstructured issues. In the outside, they are subject to policy, the international situation, the impact of industry competition, in the internal, they are subject to market research reports, the impact of productivity.Tactical manager is responsible for the medium-term planning, and sometimes they are responsible for the budget control, monitoring, develop business policies / objectives, access to resources, to solve the problem, and develop new methods. They have more internal, less external, they decided to affect some people, but not all of the companies. They should follow the facts and statistics of the statistics or historical information, and rely on their own judgment, the decision of the tactical management is likely to be a semi structured.Operational Manager are responsible for some basic problems, such as regular activities, monitoring, ensuring the effective use of resources, staffing levels, but also to solve structural optimization problems. Operational managers consider internal factors: supplier and training information. External factors: attendance, vacation, equipment.2.0 Information System2.1 Strategic2.1.1 ESSExecutive Support System (ESS) is a reporting tool which allows to turn organizations data into useful summarized reports. These reports are generally used by executive level managers for quick access to reports coming from all company levels and departments such as billing, cost accounting, staffing scheduling, and more. It is easy to use, and it rely on mathematical modeling, It provide information in a summarized format.ESS often helps the companys strategic management assessment report to the Department quickly. It provides a flow of information. It helps managers to quickly make plans by providing information about it. ESS centralized or decentralized base, which can provide all levels of valuable information management to the company.2.2 Tactical2.2.1 MISManagement Information System (MIS) provides information that organizations require to manage themselves efficiently and effectively. It collects and presents management information to a business in order to facilitate its control. Management information system involve four primary resources: EDPS, analysis , decision making , and database.MIS can help level tactical planning, organization, command, coordination and control. It can reduce the risk and uncertainty of decision making. Management information systems can help make some sales decisions, such as targeted market segmentation should be, or some product decisions, in most cases, a decision is required, because it can help managers to solve specific problems.2.3 Operational2.3.1 TPSTransaction processing is a style of computing that divides work into individual, indivisible operations, called transactions. A Transaction Processing System (TPS) or transaction server is a software system, or software/hardware combination, that supports transaction processing. Transaction processing system consist of computer hardware and software hosting a transaction-oriented application that performs the routine transactions necessary to conduct business.TPS can help companies solve business decisions. It can meet the needs of daily information, such as sales, inventory and payment. Collect the information from TPS, and the company can produce more profit for the companys products.3.0 The implications of current legislation for decision making3.1 The Data Protection Act 1998 Data Protection Act (DPA) is the act of the United Kingdom Parliament on the right of the United Kingdom of Great Britain and Northern Ireland to define the identity of the United Kingdom of law on the identity of the living person data processing. In Britain, it is the main regulations for the protection of personal data. Although the bill itself does not mention the privacy, it is through the British law into the EU data protection directive 1995, the Directive requires Member States to protect the basic rights and freedoms, in particular their privacy, personal data processing.The bill will be the United Kingdoms law is defined as the identification of biological data processing. Government procurement and personal or corporate information, must comply with the laws and procedures of data protection, and to minimize duplication of collection. Data protection law requires that Member States to protect the basic rights and freedoms of the people, in particular the right to privacy of personal data processing. In order to ensure the legitimacy of the collected information, the purpose and the scientific process of collecting legitimacy is collected.Example, Crown Catering Services company should use this behavior. It can better protect the enterprise data and information, reduce enterprise risk. For example, the establishment of the company database. Different levels of staff through different information to obtain data, thus facilitating the data content of the correctness, data integrity and accuracy.3.2 Computer Misuse ActThe Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom,The Act has nonetheless become a model from which several other countries, including Canada and the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws.The Act introduced three criminal offences:Unauthorised access to computer material.Unauthorised access with intent to commit or facilitate commission of further offences.Unauthorised modification of computer material.Example, Crown Catering Services company should use the Computer Misuse Act. Companies must take adequate security measures to prevent unauthorized access. For example, the company can train the staff of the management, and set a password for the computer. It can help companies to better protect and develop their own security.4.0 data communication systemsA local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their smaller geographic area, and non-inclusion of leased telecommunication lines.A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines. (Ban Wei, 2002 year) Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite(TCP/IP) to link several billion devices worldwide. It is an international network of networks that consists of millions of private, public, academic, business, and government packet switched networks, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks for file sharing and telephony.The local area network is a limited distance within the network usually within a geographic location. Wide area network is a large-scale network, which can be controlled and shared resources. It is bigger than a local area network. Internet is global, the most extensive. It can obtain a large amount of information resources, to understand the market demand survey. Three data communication system has its own advantages, so it should be combined with each other, the development of enterprises will be better.5.0 Benefits of data communication systemsLocal Area NetworkThrough the sharing of software and hardware, local area network can reduce the cost. Therefore, companies can share resources, such as printers, to save costs. Secondly, the local area network provides an opportunity to communicate with others, which means that the manager can communicate with the local area network more easily. Third, local area network allows companies to set permissions, so different levels of management can share different information and files.Wide Area NetworkWAN is more convenient, when a company needs a long distance communication. Wide area network transmission speed is good, the transmission of large amounts of data. and transmission range is wider .It can help companies solve the problem of remote communication and management. In addition, the wide area network can save time and money.InternetThe Internet provides a wealth of information resources and services. The Internet can help companies advertise, so as to enhance the companys reputation.6.0 Three Threats6.1Computer HackersComputer hacker is a computer system which is obtained from the unauthorized access. These hackers enter the system and other reasons to test their computer skills, in some way or cause damage to the system effectiveness. Hackers are usually trying to access access through telecommunications links. Traditionally, hackers have referred to the process of writing code, hackers are skilled computer programmers.Crown Catering Services enterprises should set up different system permissions and install security software. The company may require professional processing system vulnerabilities.6.2 VirusComputer virus is an artificial program or code segment. But these codes have an unexpected negative impact. It will result in the loss of data, create additional file copy, delete files from hard disk and disable system, and destroy data. Computer viruses are ubiquitous, they are usually downloaded from the Internet or via email and they can self replicate.Crown catering service enterprises to hire network security engineers, and set up a firewall to prevent virus intrusion.6.3 Data theftData theft is a mistake and accident caused by human error. This is an increasingly serious phenomenon mainly caused by system administrators and office staff access technology such as database servers, and some people can not evaluate their information needs, their emotions will affect performance.Crown catering service enterprises should be rented in the interior of the security and the installation of cameras, so as to better avoid the threat of thieves.7.0 ICT innovations7.1 Wi-FiWi-Fi is a wireless local area network technology, which allows the electronic device network, which is mainly used in the 2.4 MHz (12 cm) and 5 MHz (6 cm) ISM SHF radio frequency band. On the one hand, Wi-Fi can help managers and employees to transfer information and decision-making. For example, managers and employees can use Wi-Fi to attend a meeting to discuss the introduction of new products or do performance evaluation. On the other hand, Wi-Fi can provide better service to customers. Customers can connect to the Internet through Wi-Fi, watching movies or browse the title. At present, each public service
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 《电力拖动控制与实训》课件-电力拖动技术与实训(低压电器)
- 心外科题库简答题及答案
- 作文教学教学课件
- 明确问题的教学课件
- 物业天台清扫方案(3篇)
- 医院市场拓展方案(3篇)
- 墙面修理规划方案(3篇)
- 机械库存管理方案(3篇)
- 工厂工艺方案简单(3篇)
- 环保餐盒订购方案(3篇)
- 文史哲与艺术中的数学智慧树知到期末考试答案章节答案2024年吉林师范大学
- 信息光学智慧树知到期末考试答案章节答案2024年北京工业大学
- 《HSK标准教程1》课件
- 电大财务大数据分析编程作业3
- 诺贝尔生理学或医学奖史话智慧树知到期末考试答案2024年
- 行业分析报告模板(很全面-非常有用)
- 内分泌系统疾病教学设计教案1
- 法人变更书面催促通知合集3篇
- 广东省初级中学教育装备标准
- 售票员岗前培训
- 教科版六年级下册科学第一单元《小小工程师》教材分析及全部教案(定稿;共7课时)
评论
0/150
提交评论