HND ICT 商务通讯技术outcome1 2015_第1页
HND ICT 商务通讯技术outcome1 2015_第2页
HND ICT 商务通讯技术outcome1 2015_第3页
HND ICT 商务通讯技术outcome1 2015_第4页
HND ICT 商务通讯技术outcome1 2015_第5页
已阅读5页,还剩6页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Consultation Paper for Crown Catering ServicesCase study Report for ICT Assessment Task 1Module Name:Information and Communication Technology in BusinessModule Code:F84W 35Assessment:Task 1Name:Liu LitaoClass:GTB 1SCN:157052020Date: 11/18Table of Contents1.0 Introduction22.1 Decision making at strategic, tactical and operational22.2 Three types of information system32.3 Legislation governing management and handing of information42.4 Three data communication systems52.5 Benefits for Crown Catering Services52.6 Treats and security procedures62.7 Innovations73.0 Conclusion74.0 Reference81.0 IntroductionThis report is to solve the problems the Crown Catering Services must face about Information and Communication Technology in Business(ICT) at the new age. The main problems are that the company was established in 2001. And they have some trouble because of out of date. So this report described the following points. The nature of the information required for decision making at strategic ,tactical and operational and its types of system is the first one. Then, legal aspects cannot be avoided. The original key point is the data communication systems. As for security, must focus on the threats and the security procedures. Finally, the problem previously mentioned about out of date, is rely on innovation to solve.2.1 Decision making at strategic, tactical and operationalThere is a diagram as follow:The strategic level obtain the internal information about profitability and the external about market trends to make decision. Their decision can affect the whole organization. In the case study, the Crown Catering Services strategic level obtain that the companys work is inefficient, particularly in regard to its ICT systems. And they ask a consult to the company to provide him with clear recommendations on the action.The tactical level obtain the internal information about variance analysis and the external about customers feedback. They decided the tactics to use. In the case, Conner Webster is in this level as its managing director. One major project that Conner is currently planning is a marketing survey project that will involve him working with a number of key personal in the Marketing Department.The operational level must know the information on hour by hour information update. In the internal way, they can get the information by their work process. And they can get the information by public data in the external way. In the case, the branches team leaders should carry out the plan of the project. Due to the need to complete this survey project in the most effective manner to allow results to be obtained quickly.2.2 Three types of information systemManagement information systems employinformation technologyto collect and communicate all the information a company or institution uses to operate. Each department or function of an organization produces its own operational and financial data and as a result has its own information system to keep track of it all. There are as many types ofmanagement information systemsas there are departments or functions in an organization, but there are a fewspecific systemsthat almost every organization or institution needs for the whole to operate smoothly.A management reporting system is a database designed to report on thefinances and operationsof all levels of management in an organization. A companys management reporting system is commonly used by middle managers to generate regular reports comparing current and past financial performance to determine financial growth and to track how the middle managers themselves are performing. Upper management uses the data generated by the reporting system to compare the companys current financial position and its efficiency of operations against its predetermined goals for the company.Decision-Support System could used by the strategic level.Decision-support systems (DSS) are specifically designed to help management make decisions in situations where there is uncertainty about the possible outcomes of those decisions. DSS comprise tools and techniques to help gather relevant information and analyse the options and alternatives. DSS often involves use of complex spreadsheet and databases to create what-if models.The tactical level should use the management information system. A management information system (MIS) is a system or process that provides information needed to manage organizations effectively . Management information systems are regarded to be a subset of the overall internal controls procedures in a business, which cover the application of people, documents, technologies, and procedures used by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making, e.g. Decision Support Systems, Expert systems, and Executive information systems.2.3 Legislation governing management and handing of informationThe main implication for decision-making of two pieces of current legislation governing the management and handing of information are the norms of behavior for staff about the companys business secrets and the confidentiality of customer information.The company has a network of 20 branches that are based throughout the central belt of Scotland. ICT has offered a range of products in the financial markets. The company offers a range of current accounts, saving accounts and mortgage products. ICT realize that it is important to get research result quickly so that it can influence the way in which members of staff, senior manager, branches manager and team manager.The related legislation includes the Data Protection Act, 1998,the Computer Misuse Act, 1990and the Copyright, Designs and Patents Act, 1988. Such legislation can ensure that under the companys information in a secure environment.Personal data shall be processed fairly and lawfully and, in particular. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. About the rights of individuals e.g.personal data shall be processed in accordance with the rights of data subjects. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.2.4 Three data communication systemsThe three data communication systems are local area network(LAN), wide area network(WAN) and the Internet. A local area network is a network that connects computer within a limited geographical area, usually within a single office or building. The technical features of LAN are in the follows: LAN link computers within a single building or on one site. And LAN can be linked to other LAN, but LAN cannot span large distances. Finally LAN is under the control of a single authority.WAN cover large geographical areas; computers connect each other through telephone lines or cables. The technical features of WAN are used to communicate across wide distance (anywhere in the world), uses the telephone lines to communicate through a modern and connection is normally through the services of service provider. An Internet is a global network made up of a number of smaller systems as LAN and WAN. The Internet can be used for any number of activities such as: business transactions, market research, teaching, advertising, group communication, research, teleconferencing and Email. 2.5 Benefits for Crown Catering ServicesThe benefit of LAN is that it enables to share the hardware such as network printer and scanners, and to share useful files and information such as stock value. It also can offer simple and quick communication between staffs.The benefit of WAN are the followings: it can offer long-distance communication to solve the issues, ICT can improve the effectiveness of work through video conference offered by WAN; ICT could manage and control their staff by the remote management offered by WAN.The benefit of Internet are the followings: it can provide a wide range of information searching, ICT wish to do a marketing survey project and the Internet could help to find out their customers and get research result quickly; it could release information through the Internet to let customer quickly update their information of products and services; it could carry out team exchange through the Internet for example the voice conference.2.6 Treats and security proceduresWhile Internet has opened a whole new world of opportunity for interaction and business by removing many trade barriers, it has also opened up new possibilities and means of criminal acts altogether unheard of in the off-line world. Why do people commit crimes online? Perhaps, some of them attempt to gain unauthorised access to others money. Some people have fun doing so and there are others who do it to take revenge or to harm others. While the motivation of conducting criminal acts may be the same as in the off-line world, the manner of such criminal acts is unique to the Internet. The vulnerability of the information transmitted over Internet is the root cause of the sprawling of criminal acts over Internet. Both users and vendors become vulnerable to criminal acts that undermine security due to easy accessibility of Internet and easy exploitation of security loopholes in the Internet. These criminal acts can adversely affect Internet users, particularly online vendors and customers. Therefore, it is important that Internet users not only become conversant of such criminal acts but also take suitable measures to counter and avoid becoming victims of these criminal acts. In this article we examine some of the major information security threats to Internet users with particular emphasis on electronic commerce and propose plausible solutions for a safer online experience. The information security threats can be categorised into threats to the users, threats to the vendors, and threats to both users and vendors. Electronic embezzlement, sniffing and spoofing, and denial-of-service attacks are examples of threat to the vendor. Credit card frauds and malicious codes are examples of threats to the users. In operational effectiveness and continuity of the target application, integrity and optimizing network and application security is an important way to enhance the value of IT network security. Network optimization technology and architecture involved updates, including full network traffic monitoring, application traffic management, security threat management. Today, almost all of the CIO guarantee availability regarded critical applications, or network as a priority. Generally speaking, the network architecture includes six areas: application performance management; secure content management; security event management; user access management; network resource management; endpoint security management. Full network traffic monitoring. As we all know, network security issues 80% occurred in the internal network. For large-scale networks, traffic within the network can also be very serious adverse impact on the operation of the network-critical applications. Therefore, the whole network flow monitoring is very important and necessary. Through the entire network traffic detection, we can understand the data flow among network status, including the size of the flow, source and destination, which is generated by the application, the amount of data size. Network optimization system combined with the ability to direct and gateway-based application data protection capabilities to identify, due to its direct protection, can avoid linkage brought lag and is not precise enough protection and other issues, it is possible to ban unwanted traffic and content directly. In addition to protection DDoS, worms, intrusions, P2P and hybrid attacks, but also to prevent internal documents leaked by the network.For network security, the weakest link in addition to security technology lag, the internal staff security awareness is not strong also important factors. A large number of network threats, improper operation and employees are closely associated application, such as random access websites containing malicious code, download and use e-mail attachment with a virus, does not update the virus and so on. Therefore, the organizations network security knowledge training is also essential that management but also to develop a comprehensive network security policy.2.7 InnovationsA technology whose application significantly affects the way a market functions. An example of a modern disruptive innovation is the Internet, which significantly altered the way companies did business and which negatively impacted companies that were unwilling to adopt it. A disruptive innovation is differentiated from a disruptive technology in that it focuses on the use of the technology rather than the technology itself.In the case, the ICT innovation can help the strategic level obtain information in time. As mentioned before, the Crown Catering Services work really dependent on ICT. And the company also meet some problems on ICT. So, the ICT innovations is more important for companys development and expand. The strategic level can faster contact to all of the staff, and grasp the whole companys situation. The tactical level know the information of market needs and front-line staffs attitude by ICT innovations. And the team leader can arrange their project workers better.Communications technology and communications industry since the 1980s one of the fastest growth areas. Whether at home or in the true international. This is an important sign of human access to the information society. And after its development will be faster. It is so, it is even more important for ICT innovation for an enterprise.Web3.0 is a new technology. Information and other site-related information within the site to interact directly, through third-party information while information platform to integrate many websites use; users have their own data on the Internet, and can be used on different websites; entirely based on web, with a browser program to implement complex systems to achieve system functions; user data auditing, data synchronization network. Web3.0 Mashup technology will be applied to user-generated content information integration, content information such characteristic is more obvious, easy retrieval. To clarify the precise characteristics of the information content of the label to integrate and improve the accuracy of the information described in order to facilitate search and organize Internet users. Web3.0 network mode will be compatible different terminals, from the PC to the Internet WAP mobile phones, PDA, set-top boxes, dedicated terminal, not only application on the Internet that a single terminal. This will be helpful for enterprises to improve efficiency.In recent years the rise of cloud computing is an important new technology. Cloud computing is based on the increase of Internet-related services, the use and delivery models, usually involving resourc

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论