




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、InformationCommunications Technology in Business :An Introduction(DE3K 35)NAME:SCN: CLASS: ContentsIntroduction3Section1 introduced for functions of management3Section2 Three types of information system4Section3: Two pieces of current legislation5Section4 Three data communication systems7Section5 Tw
2、o benefits for each of the three data communication systems8Section6 Three threats to security of networked information9Section7 Three ICT innovations in term of their relevance to the company10Reference11IntroductionThe body of this report consists of seven parts that includes different management
3、needs different information, three types of information system, two pieces of current legislation, three data communication systems, two benefits for three data communication, three threats to security of networked information, three ICT innovation of company.Section1 introduced for functions of man
4、agement CommandsStrategicCondensedReports TacticalOperational coordimtionFigure1 functions of managementStrategic manager: Connor Webster is strategic manager of Crown Catering Service Company. Strategic manager need some information to developing Catering Services Company. The information includes
5、an internal information staffing needs. The company should meet the needs of staff. So that staffs work harder. External information includes market trends. Companies understands the market trends conducive to the development. Catering Services Companys Strategic Manager through the information to f
6、ormulate long-term planning and setting objectives and policy. The long-term planning is 3-5 year target. Catering Services Company. Catering Services Company through object and policy to developing company.Tactical Manager: Crown Catering Services Company has about 20 branches is tactical manager.
7、The tactical manager needs information includes four kinds of internal information and one external information. Four kinds of internal information includes productivity, improve productivity can improve the efficiency of the work. Variance analysis can show difference between the planned and actual
8、 production. Tactical manager needs Cash Flows and Budgets information to do budgetary control and monitoring. External information includes current market data and opponents policy related. The tactical manager through information to obtaining resources monitoring and developing operational policie
9、s and objectives.Operational Manager: Crown Catering Services Companys sales manager is operational manager. Operational managers needs real-time and specific business information. Operational managers to responsible for routine activity business information, monitoring of frontline staff, ensuring
10、effective use of resources, rating to staff of different levels, monitor employee attendance hours worked and overtime. Low levels of responsibility affecting individuals. Section2 Three types of information systemDSS Operational manager using decision support systems. Decision support systems are i
11、nteractive systems that rely on hardware and software to support managers in the decision making process and a highly flexible and interactive IT system that is designed to support decision making when the problem is not structured. Connor Webster can use that to do market survey project. The benefi
12、ts of DSS for Crown Catering Services Company includes optimization and forecasting work completed, simulate scenarios and for easy to Crown Catering Services development of contingency plans in advance, understand work processes, prevent the potential danger.ESExpert System aimed to duplicate what
13、an expert or number of experts would do in a given situation. Expert system is suitable for tactical manager. ES system can help Crown Catering Services company solve complex problems and make decisions. The ESs benefits includes put together structured data, defined area and hands complex logic.EIS
14、EISs definition is any kind of information system which improves the functions of an enterprise business processes by integration. Strategic manage can use EIS to precise find information in many fields. Fields includes marketing, finance, manufacturing and others. The EISs benefits includes provide
15、 the efficiency of decision makers, timely decision, improve the tracking information for Crown Catering Services, provide timely information.Section3: Two pieces of current legislationThe Date protection Act (1998): The Data Protection Act governs the processing of information relating to individua
16、ls. The Act covers the obtaining, holding and use or disclosure of information.This Act also concerns personal information held about individuals and relates to the followingData processed using an electronic system. Information recorded as part of a relevant filing system.The Data Protection Princi
17、ples:1. Information shall be obtained and processed fairly and lawfully.2. Information shall only be held for one or more specific and lawful purposes.3. Companies should not hold information that is excessive or is not relevant to the purposes the company has registered under the Act.4. Information
18、 held on individuals should be accurate and up-to-date.5. Information should not be held for longer than necessary.6. Individuals have the right to see the data held about them and have corrections made if need be.7. Companies must take adequate security measures to prevent unauthorized access.8. Da
19、ta must not be transferred to countries outside the European Union (EU) that provides inadequate protection.Suggestion for Crown Catering Services CompanyCrown Catering Services Company should lawfully use the collect data. Crown Catering Services Company should protect the security of data. Crown C
20、atering Services Company should be accurate and update of individuals. Crown Catering Services Company should be not be held for longer than necessary of data.Computer Misuse Act 1990This legislation protects information stored on computer from unauthorized access, alteration and damage. Unauthorize
21、d access, including hacking or internal members of staff using someone elses password to access restricted information.Ulterior intent with the intention of committing a crime for personal gain. Unauthorized modification to documents.Suggestion for Crown Catering Services CompanyCrown Catering Servi
22、ces Company often give computer virus. Crown Catering Services Company should put the data in a safe place. The company should prohibit employees from using the data for profit. The company should define who can access dataSection4 Three data communication systemsA local area network (LAN) is a comp
23、uter network that interconnects computers within a limited area. A local area network is contrasted in principle to a wide area network, which covers a larger geographic distance and may involve leased telecommunication circuits, while the media for LANs are locally managed. Limited area includes re
24、sidence, school, laboratory, or office building. Ethernet over twisted pair cabling and Wi-Fi are the two most common transmission technologies in use for local area networks. A local area network coverage is very small. A wide area network (WAN) is a telecommunications network or computer network t
25、hat extends over a large geographical distance. Wide area networks are often established with leased telecommunication circuits. Many technologies are available for wide area network links. Examples include circuit switched telephone lines, radio wave transmission, and optic fiber. New developments
26、in technologies have successively increased transmission rates. Therefore, the WAN communication requirements and complexity are high. The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. Common met
27、hods of Internet access by users include dial-up with a computer modem via telephone circuits, broadband over coaxial cable, fiber optics or copper wires, Wi-Fi, satellite and cellular telephone technology. The shortcoming of internet includes very vulnerable to intentional attacks.Section5 Two bene
28、fits for each of the three data communication systemsLocal area networkEnables the sharing of hardware on the network. Crown Catering Services Company can use local area network to share printer that can improve work efficiency. Saves duplication of work within the organization. Local area network c
29、an help Crown Catering Services Company to Saves duplication of work.InternetThe use of email as a communication tool. Staff use the internet to send email that easy and save time.It enables you to create links with customers and suppliers. Crown Catering Services Companys staff can uses internet li
30、nks with customers and suppliers to handles business. Wide area networkIncreased security of data that is backed up on file service and restricted access through the use of passwords. Crown Catering Services Company use Wide area network to enhanced data security.Networks also allow data to be excha
31、nged with suppliers and online payment facilities, making them much more efficient. Network can help Crown Catering Services Company with suppliers to exchanged data and online payment. Section6 Three threats to security of networked informationHackers"Hacker" means research outsmart compu
32、ter security system staff. Use of public communications networks, such as Internet and telephone system, without permission, to load other systemSuggests:The Crown Catering Services Company should give data encryption in order to prevent hacker attacks, the Crown Catering Services Company to supervi
33、se everyone access to data to rule out the hackers.Natural DisastersNatural disasters can destroy hardware store data, such as earthquakes and floods can destroy hardwares data.SuggestsCrown Catering Services Company can build a database without a place of natural disasters. The company regularly up
34、dates and backup of data.Computer VirusesComputer Viruses: Compilers is inserted in a computer program function or destruction of computer code data, can affect computer use, a set of computer instructions, or self-replicating code.SuggestsThe Crown Catering Services Company save data to a computer
35、install anti-virus software upgrade to the latest version, and open real-time monitoring and give people complex passwords to access the data.Section7 Three ICT innovations in term of their relevance to the companyF2b2CF2b2C is a new e-commerce business model. F2b2C is the Factory-to-business-to-Con
36、sumer. Consumers through the Internet and business communications with company. Company give customers personalized products, the company can provided produces directly to the customer. Crown Catering Services Company can use F2b2C model to meet the needs of individual customers and directly to the
37、hands of customers. So F2b2C can help Crown Catering Services Company increase work efficiency and customers satisfaction and cut costs.VoIPVoice over Internet Protocol is Allows you to send voice communication over the Internet, avoiding the long-distance telephone charges, you would normally receive from your long-distance carrier. Crown Catering Services Company can use VoIP
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025共同担保借款合同书模板
- 2025新农村建设项目:污水处理设施施工承包合同
- 2025关于出版社与作者版权转让合同
- 2025劳动合同法辞职规定
- 《2025年的青岛房屋租赁合同》
- 2025供应商与分销商合作合同模板
- 2025 水产品买卖合同
- 幼儿园中班课程艺术造飞机
- 2025租房合同书格式样本
- 2025商业办公房买卖合同模板
- 七类作业JSA分析记录表格模板
- 心理统计学考研历年真题及答案
- 2022年中国石油大学《化工原理二》完整答案详解
- 技术经纪人练习题集附有答案
- 内科学讲义(唐子益版)
- GB/T 4357-2022冷拉碳素弹簧钢丝
- GB/T 19845-2005机械振动船舶设备和机械部件的振动试验要求
- GB/T 14614-1993小麦粉吸水量和面团揉和性能测定法粉质仪法
- 酱酒行业发展趋势分析
- 《红楼梦》贾府平面图
- 养老机构全套服务管理流程图()
评论
0/150
提交评论