搜档网
当前位置:搜档网 › HND ICT 商务通讯技术outcome1 2015

HND ICT 商务通讯技术outcome1 2015

HND ICT 商务通讯技术outcome1 2015
HND ICT 商务通讯技术outcome1 2015

Consultation Paper for Crown Catering Services Case study Report for ICT Assessment Task 1

Module Name: Information and

Communication Technology in

Business

Module Code: F84W 35

Assessment: Task 1

Name: Liu Litao

Class: GTB 1

SCN: 157052020

Date: 11/18

Table of Contents

1.0 Introduction (3)

2.1 Decision making at strategic, tactical and operational (3)

2.2 Three types of information system (4)

2.3 Legislation governing management and handing of information .. 5 2.4 Three data communication systems (6)

2.5 Benefits for Crown Catering Services (7)

2.6 Treats and security procedures (7)

2.7 Innovations (9)

3.0 Conclusion (11)

4.0 Reference (11)

1.0 Introduction

This report is to solve the problems the Crown Catering Services must face about Information and Communication Technology in Business(ICT) at the new age. The main problems are that the company was established in 2001. And they have some trouble because of out of date. So this report described the following points. The nature of the information required for decision making at strategic ,tactical and operational and its types of system is the first one. Then, legal aspects cannot be avoided. The original key point is the data communication systems. As for security, must focus on the threats and the security procedures. Finally, the problem previously mentioned about out of date, is rely on innovation to solve.

2.1 Decision making at strategic, tactical and operational

There is a diagram as follow:

The strategic level obtain the internal information about profitability and the external

about market trends to make decision. Their decision can affect the whole organization. In the case study, the Crown Cateri ng Services’ strategic level obtain that the company’s work is inefficient, particularly in regard to its ICT systems. And they ask a consult to the company to provide him with clear recommendations on the action.

The tactical level obtain the internal information about variance analysis and the external about customers feedback. They decided the tactics to use. In the case, Conner Webster is in this level as its managing director. One major project that Conner is currently planning is a marketing survey project that will involve him working with a number of key personal in the Marketing Department.

The operational level must know the information on hour by hour information update. In the internal way, they can get the information by their work process. And they can get the information by public data in the external way. In the case, the branches team leaders should carry out the plan of the project. Due to the need to complete this survey project in the most effective manner to allow results to be obtained quickly.

2.2 Three types of information system

Management information systems employ information technology to collect and communicate all the information a company or institution uses to operate. Each department or function of an organization produces its own operational and financial data and as a result has its own information system to keep track of it all. There are as many types of management information systems as there are departments or functions in an organization, but there are a few specific systems that almost every organization or institution needs for the whole to operate smoothly.

A management reporting system is a database designed to report on the finances and operations of all levels of management in an organization. A company's management reporting system is commonly used by middle managers to generate regular reports comparing current and past financial performance to determine financial growth and to track how the middle managers themselves are performing. Upper management

uses the data generated by the reporting system to compare the company's current financial position and its efficiency of operations against its predetermined goals for the company.

Decision-Support System could used by the strategic level.Decision-support systems (DSS) are specifically designed to help management make decisions in situations where there is uncertainty about the possible outcomes of those decisions. DSS comprise tools and techniques to help gather relevant information and analyse the options and alternatives. DSS often involves use of complex spreadsheet and databases to create "what-if" models.

The tactical level should use the management information system. A management information system (MIS) is a system or process that provides information needed to manage organizations effectively . Management information systems are regarded to be a subset of the overall internal controls procedures in a business, which cover the application of people, documents, technologies, and procedures used by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making, e.g. Decision Support Systems, Expert systems, and Executive information systems.

2.3 Legislation governing management and handing of information The main implication for decision-making of two pieces of current legislation governing the management and handing of information are the norms of behavior for staff about the company’s business secrets and the confidentiality of customer information.The company has a network of 20 branches that are based throughout the central belt of Scotland. ICT has offered a range of products in the financial markets.

The company offers a range of current accounts, saving accounts and mortgage products. ICT realize that it is important to get research result quickly so that it can influence the way in which members of staff, senior manager, branches manager and team manager.

The related legislation includes the Data Protection Act, 1998, the Computer Misuse Act, 1990 and the Copyright, Designs and Patents Act, 1988. Such legislation can ensure that under the company's information in a secure environment.

Personal data shall be processed fairly and lawfully and, in particular. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. About the rights of individuals e.g. personal data shall be processed in accordance with the rights of data subjects. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

2.4 Three data communication systems

The three data communication systems are local area network(LAN), wide area network(WAN) and the Internet. A local area network is a network that connects computer within a limited geographical area, usually within a single office or building. The technical features of LAN are in the follows: LAN link computers within a single building or on one site. And LAN can be linked to other LAN, but LAN cannot span large distances. Finally LAN is under the control of a single authority.

WAN cover large geographical areas; computers connect each other through telephone lines or cables. The technical features of WAN are used to communicate across wide distance (anywhere in the world), uses the telephone lines to

communicate through a modern and connection is normally through the services of service provider.

An Internet is a global network made up of a number of smaller systems as LAN and WAN. The Internet can be used for any number of activities such as: business transactions, market research, teaching, advertising, group

communication, research, teleconferencing and Email.

2.5 Benefits for Crown Catering Services

The benefit of LAN is that it enables to share the hardware such as network printer and scanners, and to share useful files and information such as stock value. It also can offer simple and quick communication between staffs.

The benefit of WAN are the followings: it can offer long-distance communication to solve the issues, ICT can improve the effectiveness of work through video conference offered by WAN; ICT could manage and control their staff by the remote management offered by WAN.

The benefit of Internet are the followings: it can provide a wide range of information searching, ICT wish to do a marketing survey project and the Internet could help to find out their customers and get research result quickly; it could release information through the Internet to let customer quickly update their information of products and services; it could carry out team exchange through the Internet for example the voice conference.

2.6 Treats and security procedures

While Internet has opened a whole new world of opportunity for interaction and business by removing many trade barriers, it has also opened up new possibilities and means of criminal acts altogether unheard of in the off-line world. Why do people commit crimes online? Perhaps, some of them attempt to gain unauthorised access to other’s money. Some people have fun doing so and there are others who do it to take revenge or to harm others. While the motivation of conducting criminal acts may be

the same as in the off-line world, the manner of such criminal acts is unique to the Internet. The vulnerability of the information transmitted over Internet is the root cause of the sprawling of criminal acts over Internet. Both users and vendors become vulnerable to criminal acts that undermine security due to easy accessibility of Internet and easy exploitation of security loopholes in the Internet. These criminal acts can adversely affect Internet users, particularly online vendors and customers. Therefore, it is important that Internet users not only become conversant of such criminal acts but also take suitable measures to counter and avoid becoming victims of these criminal acts. In this article we examine some of the major information security threats to Internet users with particular emphasis on electronic commerce and propose plausible solutions for a safer online experience. The information security threats can be categorised into threats to the users, threats to the vendors, and threats to both users and vendors. Electronic embezzlement, sniffing and spoofing, and denial-of-service attacks are examples of threat to the vendor. Credit card frauds and malicious codes are examples of threats to the users. In operational effectiveness and continuity of the target application, integrity and optimizing network and application security is an important way to enhance the value of IT network security. Network optimization technology and architecture involved updates, including full network traffic monitoring, application traffic management, security threat management. Today, almost all of the CIO guarantee availability regarded critical applications, or network as a priority. Generally speaking, the network architecture includes six areas: application performance management; secure content management; security event management; user access management; network resource management; endpoint security management. Full network traffic monitoring. As we all know, network security issues 80% occurred in the internal network. For large-scale networks, traffic within the network can also be very serious adverse impact on the operation of the network-critical applications. Therefore, the whole network flow monitoring is very important and necessary. Through the entire network traffic detection, we can understand the data flow among network status, including the size of the flow, source and destination, which is generated by the application, the amount of data size.

Network optimization system combined with the ability to direct and gateway-based application data protection capabilities to identify, due to its direct protection, can avoid linkage brought lag and is not precise enough protection and other issues, it is possible to ban unwanted traffic and content directly. In addition to protection DDoS, worms, intrusions, P2P and hybrid attacks, but also to prevent internal documents leaked by the network.

For network security, the weakest link in addition to security technology lag, the internal staff security awareness is not strong also important factors. A large number of network threats, improper operation and employees are closely associated application, such as random access websites containing malicious code, download and use e-mail attachment with a virus, does not update the virus and so on. Therefore, the organization's network security knowledge training is also essential that management but also to develop a comprehensive network security policy.

2.7 Innovations

A technology whose application significantly affects the way a market functions. An example of a modern disruptive innovation is the Internet, which significantly altered the way companies did business and which negatively impacted companies that were unwilling to adopt it. A disruptive innovation is differentiated from a disruptive technology in that it focuses on the use of the technology rather than the technology itself.

In the case, the ICT innovation can help the strategic level obtain information in time. As mentioned before, the Crown Catering Services work really dependent on ICT. And the company also meet some problems on ICT. So, the ICT innovations is more important for company’s development and expand. The strategic level can faster contact to all of the staff, and grasp the whole company’s situation. The tactical level know the information of market needs and front-line staff’s a ttitude by ICT innovations. And the team leader can arrange their project workers better. Communications technology and communications industry since the 1980s one of the

fastest growth areas. Whether at home or in the true international. This is an important sign of human access to the information society. And after its development will be faster. It is so, it is even more important for ICT innovation for an enterprise.

Web3.0 is a new technology. Information and other site-related information within the site to interact directly, through third-party information while information platform to integrate many websites use; users have their own data on the Internet, and can be used on different websites; entirely based on web, with a browser program to implement complex systems to achieve system functions; user data auditing, data synchronization network. Web3.0 Mashup technology will be applied to user-generated content information integration, content information such characteristic is more obvious, easy retrieval. To clarify the precise characteristics of the information content of the label to integrate and improve the accuracy of the information described in order to facilitate search and organize Internet users. Web3.0 network mode will be compatible different terminals, from the PC to the Internet WAP mobile phones, PDA, set-top boxes, dedicated terminal, not only application on the Internet that a single terminal. This will be helpful for enterprises to improve efficiency.

In recent years the rise of cloud computing is an important new technology. Cloud computing is based on the increase of Internet-related services, the use and delivery models, usually involving resources through the Internet to provide dynamic and easy scalable and often virtualized. Cloud is a network, an Internet metaphor. Cloud computing is a pay-per-use model that supplies available, convenient, on-demand network access to a shared pool of computing resources into the configurable (resources, including networks, servers, storage, applications, services) these resources can be provided quickly, simply put minimal management effort or service provider with very little interaction.

Extensible Markup Language, a subset of the Standard Generalized Markup Language, is a method for marking an electronic document to have a structured markup language. In the computer, the label refers to the information symbol computer can understand, by this token, you can handle that contains a variety of information such as articles,

etc. between computers. It can be used to tag data, defining data types, is a technology that allows users to define their own markup language source language. It is ideal for Web transmission, providing a unified approach to describing and exchanging independent of applications or vendors of structured data. Internet is an effective tool for cross-platform environments, depending on the content of technology, but also in today's distributed processing configuration information. However, its safety can not be guaranteed.

3.0 Conclusion

The ICT development becomes more and more important for the business. The company encountered problems on ICT in developing process, and its opportunity and change are also depend on ICT.

4.0 Reference

https://www.sodocs.net/doc/d818972699.html,/terms/d/disruptive-innovation

2.https://www.sodocs.net/doc/d818972699.html,/info_7830271_functional-vs-divisional-organizational-struct ure.html

https://www.sodocs.net/doc/d818972699.html,/

4. https://www.sodocs.net/doc/d818972699.html,/

相关主题