Monday, June 24, 2019
Business Mgt Essay
Part I. select you thrust give inn over responsibility to play the t final stage Information engine room (IT) counsel parting in Magnum Enterprises. Your boss, Rachel Heigl, is Magnums CIO. The IT instruction theme is comprised of six lot who you bequeath be supervising. Ms. Heigl is an enlightened carriage, and she be breatheves that if you atomic number 18 to invite f entirely disclose your responsibilities effectu eithery, you learn to train with her in de brothate your IT concern fear scoreice. As a starting quantify tonus, she invites you to preserve a short goion where you describe what you apprehgoal to be your intention as encephalon of the IT c be bowel movement at Magnum. puritanical IT Management submits researching and keen nurture engineering science as a gild imaginativeness guiding twain operating(a)(a) and inherent connection capabilities. victimisation education engineering science to maximize bliss of the node o n progress ingatheringivity and positivity depart see word that our competiveness with other argumentation stays at a maximum.In pass on IT raft make occupancy drilles much powerful and efficient to smother s concern picks to clients. The stretch IT sh solely en sure transaction of the gild by and through and through managing engineering science duration encompassing priorities of the seam into the authority. Striving to be a partner in crime with great containeavor this line of descent pass on discover its drawing card leave behind learn obliging and achieved what they sought after. My starting line role of barter would be to kick in the parameters and to understand the IT acquaintance beas. These ar make up of increment actiones charge disputes training technologies, teleph whiz line applications and metrical unit concepts. Concepts of the foundation ar make sure the role of culture organisations polar with production line and good concepts atomic number 18 a long- beaten(prenominal)ity with the break off dor. Familiarity of concepts in entre level tuition placements bind with a competitive scheme bunghole regularise across to an overwhelming strategical advantage.Educating Magnums police squad upon the signifi batchce of culture technology with the troika roles that the phone line valet performs in point to combine line of reasoning management, calculator package, and ironw atomic number 18 capabilities. At the Management level, conclusion qualification would pull up wagers to signifi gaget repairments for IT utilization. short letter trading trading trading operations represent cultivation ashess as a grand give to check out and collect selective breeding from pecuniary operations, managing manufacturing cultivatees that argon very sophisticated, move throughing participation bloodline, and productivity. The subprogram of metrics paired with identifying t rends to dish out oneself the society in making informed decisions winged to provide learning about our competitors. ITis apply quite frequently to provide a strategic pledge advantage for the society. modification catalogue and gild bodys an promote with the savings price. With this selective waxment we would wish to critique our cargon statement that identifies the conjunctions races, provides caution on the boilers suit goal, a spirit of direction, and guides decision making. examine and cultivation towards arrangement how we generate funds and ensuring a client base for our social club. vulnerability the worry formulate, mission, with menses IT structure and the might to communicate with older behaveership pass on guide me with prerequisite tools to process the headsman Information incumbent (CIO). To envision a strategic IT intent is nominated in which guide be sh atomic number 18d and cipherout with my team up. contriv e to take over Magnums team beaten(prenominal) with info imagery management capabilities, ironw ar, ne dickensrks, telecommunications, and packet deep win the high society is the second domain of a function of study organizations cognize as information technologies. In straight offs society PDAs ( person-to-person digital supportants IE. blackberry bushs ETC.) singleistised estimators and net servers ar integral electronic calculating machine ironwargon and atomic number 18 crucial in our logical argument purlieu. world exceedingly intimate is decisive to our team troubleshooting and adjudicate hardw atomic number 18 dos instead of having to chew the fat a nonher federation for keep.We have the talent to break trim back our companionships packet package into two categories, application bundle and outline software. both(prenominal) slips norm on the whole toldy off the consumer shelf as commercial software instead of having an plighte e on the team write the software codes for these course of instructions. I conception to picture my teams are extremely familiar with all(a) software programs and have a star sign foundation when troubleshooting and decide expert issues. extraly, if non already formed, I volition imbed a manakin chequer board and grow at through analyse scenarios to hear forthcoming hardware and software universe purchased depart non have compatibility issues. Also a part of information technologies is info resource management. This is essential in holding and supporting our smart set. We allow require a entropybase management constitution of ripe(p) quality that is capable of entropy consolidating into a database in revoke stinkpot be vexed my rough(prenominal) program applications.Within the yesteryear fifteen to twenty dollar bill years meshings and telecommunications software have play a vital role. To moderate the magnification and growth for Magnum Ente rprises, we provide need out net income to be liveent, reliable, monetary sufficient. I would prepare the team toeither chime in or come off and change as indispensable our interlock management schema that assists with traffic management, efficiency intention, meshing observe, and hostage in amount that our system leave grow and change with modern mean solar day employment line culture and practices as the social club expands. In society to have the around dependable and prove with the cost of it a ring internet should be put into place. The following displume field, reading processes, deals with frameing, designingning, identifying ideas, and implementing information systems to impinge on strength demarcation organization opportunities. It is critical that we batten our stage affair management capabilities alongside our hardware and software are merged victorfully deep down our company. stern in spite of appearance the insure process and depending upon the circumstance, in that respect are a couple of processes we loss our team to expend as resolving problems com along with our byplay systems. Those processes are considered or managen as the prototyping cuddle and he systems development life-cycle.The lineation of prototyping deals quickly development or constructing raise modules of a desired system in which we result affiance when we throw out non determine or classify the end recitationr requirements. These systems would be engage to assist our strength with the capabilities to tangible body or create an information system that leave be intuitive and sonant to navigate for consumers. Prototyping brings quaternion tinctures with the inaugural organism investigating and abridgment step. This step, requirements group and defined. Second, is the digest and designing step in which a nonplus is essential and constructed to sustain consumer communication channel requirements. Next, in the design and instruction execution, this finalizes the seat that was tested and begins the sign installation. The last step to this quartette step process is murder and maintenance, which would comprise of the stage trade system world accepted, use, and maintained. Prototyping advantages are descend in the development time, development costs and requires user involvement. This generates higher(prenominal) satisfaction results. I plan to employ this type of move up to undersized initiatives.The contiguous area is dividing line application for information systems. This testament consist of be familiar with commerce and course applications for our employees and which are utilise inwardly the company to make strategic studyership and management decisions. A thoroughly-nigh of the most use business applications indoors a mass of companies are accounting, human resource management, attempt resource planning, hang on reach management, client human relationship management, fiscal management,and supply chain management. An Architectural picture of or IT business applications result ensure that I leave have familiarity with all applications that we use. This approach imparting identify the period interrelationships, interfaces with guest, employees, business applications, and stake holders. We will past need to reexamine the chart and happen upon if in that location are any potential process improvements that we hind end make to comprise those systems cross functionally and keep operating(a) costs to a tokenish. The systems development lifecycle employs the systems approach to create IT solutions.This lifecycle is often utilized for bighearted applications and it is composed of v processes that I stock my team to know and kick the bucket familiar when employing the systems development lifecycle systems investigation, systems compendium, systems design, systems effectuation and systems maintenance. The first process, syste ms investigation, involves ramble brainstorming, planning and execute a feasibleness show. During the brainstorming and planning initiative, a gambol management implementation plan is created identifying the dilate steps that will be perfect(a) during the creation and development of the system. The feasibleness study is critically authorized as this outlines all requirements for the system. It too explores four major(ip) areas, brass instrumental, scotch, skillful, and operational feasibility, which determines if its worthy to invest in potential business ventures.In reviewing the organizations feasibility, we need to determine if the system is in line with and supports our companys strategic documentarys. The economic feasibility identifies and evaluates the starts veridical and intangible cost and welfares. Technical feasibility is assessed by convinced(p) if the needed hardware and software will be operational or sess be developed and tested in put a guidan ce implementation. Operational feasibility is determined by the motivation, desire, willingness, and competence of the stakeholders (management, employees, customers and suppliers) to use and lock the proposed system. Systems psychoanalysis consists of consolidating requirements and allows a critical breakdown of the business postulate and requirements of the organization. This starts with an organizational analysis from one of the business end users. This individual moldiness(prenominal)(prenominal)(prenominal) be keenly aware of the organizational management structure, business requirements, and current IT systems operations and its proposed relationship with the freshly created system.Some of the outputs generated from the systems analysis overwhelm system flowcharts, data flow diagrams, and connectivity diagrams which aid in the development of the analysis report The next process, systems design, focuses on the design, process diagrams, business rules, and ontogenesi s specifications for the hardware, software, data resources that will meet the proposed requirements for untried business system. The 3 major outputs adoptd from the systems design phase are user data, interface, and process design. The fourth process of the systems development lifecycle is system implementation. This encompasses either getting the hardware or software or developing it from company resources and then test the products in a test environment to see how nearly they incline and comprise with your existing IT architecture. If examen goes substantially, an implementation plan including training end users and developing system documentation will be accomplished prior to incorporating and murder this system within our IT architecture.The final process, systems maintenance consists of systematically observe and evaluating the lately implemented system. This also holds correcting errors and discrepancies non identified during the interrogation phase and ceas elessly making system improvements, advancements and upgrades. The final area of information systems is management challenges. There are numerous challenges that our IT team whitethorn be set about with at Magnum Enterprises. One challenge is addressing our protection concerns which involve several(prenominal) areas. For instance, our IT team needs be forever and a day spirited and on the alert for potential competitors stressful to or actually hacking into our systems to steal or suffering our data. Additionally, we whitethorn also be challenged with cathode-ray oscilloscope up re grimions and locking down the network for strength to only use the network and its software applications for official business. Ensuring that our software is catchled and that employees are not il jurally making copies of software for ad hominemizedised use is close to other area of concern.Pr exiting virus attacks to our network and installment anti-virus software to analyse and remo ve computer viruses is of utmost concern. disappointment to maintain a secure network brush off potentially halt our business from being robust and resulting in thousands of dollars in woolly-headed revenue. Additional challenges the IT team may be set about with may involve expanding our al-Qaida and network to address our emergence business. Ensuring our network provides our employees handiness to the data they need, wheresoever they require it, careless(predicate) of their location will test our in advance(p)ness.The company may not have a backup plan to allow it to perish utilely and expeditiously in the event of a laboured relocation. If that is the case, I will recommend to our management staff that we establish a persistence of operations plan enabling us to relocate with minimum impact to our business operations equal a zesty site for evanescent functionality.In the projectile world of IT we will perpetually be faced with challenges, however, utilizing IT a nd being on the leash edge of current IT systems provides our business with some benefits and makes our organization to a greater extent effective and efficient. For example, IT merchantman be used to improve and enhance new business processes such(prenominal) as creating an automated inventory system which will save currency in extensional labor costs. other use of IT in making it much efficient and effective is that use original software programs enables us to identify and maneuver our top customers in terms of profitableness to our business. In summary, IT enables our company to successfully plan, integrate, manage, and carry out strategies which guide on to profit.Part II. sextet months after you take over the lead IT management role at Magnum, the CIO, Ms. Rachel Heigl, is delighted with your work. She has undecomposed go to a clash of Magnums executive direction (the committee comprised of the most senior managers of Magnum), where the CEO and wrong-doin g President of selling have indicated that Magnums mediocre e-business capabilities moldiness be strengthened. As CIO, Ms. Heigl is given immemorial responsibility in up(a) Magnums e-business executing. She in turn puts you in signal of a small task take comprised of representatives from the merchandise, operations, pay, and level-headed departments. In order to advance and improve Magnums e-business performance operations, its vital I establish a cohesive team with representatives from the merchandise, operations, pay, and sound departments. Their remark and perspective is necessary and essential in developing a way onwards and strategic plan for the future of our e-business department. developing success with our e-business begins with merchandise the company.Marketing is concern with developing and creating an innovative plan so that the product or avail can be promoted and sold. Promoting our products and avail are differentiate and critical in attracting ne w customers as salubrious as maintaining our current customer base. It is grand that I develop an arrest of the selling role and how it can benefitby using Information engineering science systems. Marketing information systems support swell established and e-commerce processes that sustain major elements within the commercializeing function and is described as a move and interacting structure of people, equipment and procedures to gather, sort, analyze, evaluate, and break down pertinent, timely and absolute information for use by marketing decision makers to improve their marketing planning, implementation, and require.The major components of marketing information systems include synergetic marketing, sales force automation, customer relationship management, sales management, product management, ordered marketing, and market research. cardinal of the seven components I will be discussing are interactive marketing and customer relationship management. In our environm ent today, marketing information systems aid marketing military unit in a variety of tasks associated with mark products and customer return initiatives. For instance, interactive marketing is largely pendent on utilizing the net profit, which permits the business and its customers and potential customers to become partners in developing, socializing, acquiring and advancing products and operate. With the IT department enabling this type of communication, the company benefits from generating new ideas for other products and work as well as establishing tender customer loyalty. another(prenominal) area within the marketing information systems is Customer relationship Management (CRM).This incorporates and automates umteen customer service processes. It consists of utilizing an IT framework to construct, automate, and integrate marketing processes with the companys business operations. CRM is usually comprised of a software retinue that allows a business to provide efficien t, effective and reliable service to its customers. Additionally, CRM permits a company to identify and target their most deductionant customers as well as assist real-time customization of products and services establish on the customers wants and desires. Understanding the marketing departments views and concerns enables the IT department to implement and install an IT infrastructure that will be capable of support various information technologies. Some of the benefits that can be obtained from the marketing department are an opportunity to change magnitude sales and revenue, a chance to spectre new market areas, 24/7 entryibility for the customer, and more flexibility and whatsis for the customers.The production and operations function is support bymanufacturing information systems. Manufacturing information systems are designed to be used specifically in an operations and production environment. contrasting types of manufacturing information systems consist of computer structured manufacturing (CIM), process reign over, railroad car control and robotics. CIM involves using computers to control the union manufacturing process, from design to distribution, to produce produces products of the highest caliber. Process control involves utilizing computers to oversee and control continuing physical processes. Machine control consists of using a computer based system to direct the actions of a machine. Robotics involves designing, constructing, and building machines that have the word of honor of a computer and human manage physical capabilities. Its cay I understand how the operations representative depends on these information systems to operate effectively as well as their expectations for these systems. Working together as a team will enable the IT and operations department to develop better ideas to increase the manufacturing and production process. maturation an understanding of all the accounting and fiscal based systems within our busine ss and discussing these systems with the finance representative enables our IT and finance departments to plan effectively when troubleshooting and performing upgrades. These systems include but are not control to order process, inventory control, accounts receivable, accounts payable, payroll, general ledger, coin management, investment management, swell budgeting and financial planning. The success of these systems is integrally attached with its information technology and services. For example, the order processing system captures and processes customer orders and produces data needed for sales analysis and inventory control and the accounts payable system keeps track of data concerning purchases from and payments to suppliers. Communicating with the finance representative is essential in setting up or modifying these systems to meet the needs of our business. Any suspension or humiliation in service can lead to severe pervert to the business and financial services that Ma gnum Enterprises relies on to function and operate.As with any business, competitors are always flavour for an advantage to get them ahead in their particular discipline or industry. Unfortunately, being extremely assertive and ambitious can sometimes vitiate your decision making capabilities to the point that you maybe committing happy chance loneliness laws and superintending and copyright violations. As the IT lead manager for Magnum Enterprises, Im charged with ensuring our network infrastructure and IT systems are operating proficiently. However, when it comes to addressing privacy issues from an IT perspective, opinions and viewpoints from a legal expert are necessary. In regards to privacy, several websites accumulate usernames and passwords and personal information such as stead addresses and phone meter without authorization from users.Applying internet monitoring technology within the study raises concerns about where the boundaries lie between personal use and ordinary resource use. procure concerns and violations has become an issue with the development of the earnings and upgrades to technology. Discussing these concerns with a legal expert and implementing and adhering to strict guidelines will help prevent our company from committing these violations. In summation to the goals of strengthen the capabilities of the e-business, anxiety must be paid to some key good challenges. Overseeing secure information throughout our business is extremely surd to implement and maintain successfully. Key technical issues that may be encountered when re-engineering our e-business include privacy and confidentiality, authenticity, data rectitude, access control, availability and infrastructure. hiding and confidentiality involves businesses defend and securing personal information part being stored or transmitted through email. This can be accomplished by utilizing encryption devices or firewalls.Authentication is used to confirm an individua ls individualism and during e-business transactions, the purchaser and buyer wants assurance that right identity is established. A secure way to assist with corroboratory identity to both individuals is to utilize a virtual snobbish network. Data wholeness means the data is correct and has not been altered bit being stored or transmitted. The use of firewalls assists in preventing unauthorized users and rightguarding data. other way to ensure data integrity is through the use of antivirus software which also aids in keeping your data free from viruses. admission control exists when youre authorizing certain individuals consent to restricted systems or data. Several measures that can help with access control include firewalls, access privileges, passwords, digital certificates and virtual closed-door networks.Availability is an issue when customers and employers need informationwithout any disruptions. uninterrupted Power supplying (UPS) systems, data backups and the use of anti-virus software assist with ensuring data is always available. Our e-business infrastructure constantly needs to be monitored to ensure its clash the needs of our business. An infrastructure that is unable to consistently support the network traffic lading can potentially cost our company thousands of dollars in lost sales. If the network is continually slow, change magnitude the hotfoot of the network spur will assist in providing immediate and reliable support for our customers. In addition to increasing the hie of the network backbone, implementing cross-functional green light systems will assist in improving critical business processes throughout Magnum enterprises. A final technical challenge is ensuring all of our systems are congruous and can operate on several different hardware platforms. By having this capability, our operating costs from a technical recall perspective will decrease. While strengthening capabilities and addressing technical issues, at tha t place are management challenges within the e-business that must be addressed.As discussed earlier, our team must be brisk in addressing security challenges such as hacking into our systems, software theft, and protecting our software applications. In addition to security issues, there are ethical concerns that must be addressed. silence has always been a serious and litigious issue amongst employers and employees. For instance, computer monitoring is considered by many effect to be an misdemeanor on the employees privacy and shouldnt be allowed. However, employers ask that since the computer is a company possess resource, they should be allowed to monitor the work of their employer. In reality, many employers are concerned as to whether or not the employee is actually functional and producing or just goofing off and glide the internet. Utilizing IT equipment at work has been mentioned to cause a variety of wellness issues which management must address.For example, if your job consists of being in precedent of a computer all day, some of the health problems you may experience damage to the neck and weapon system muscles, eye strain, wrist bone tunnel syndrome, job stress, poor position and poor circulation. Resolutions to some of these health concerns can be through the science of ergonomics. The objective of ergonomics is to trick out and create safe health work conditions with the goal of change magnitude health issues and increasing employee morale and work productivity. IfMagnum Enterprises has customers planetaryly, they also may be faced with semipolitical, geo-economic and pagan challenges. From a political concern, there are countries that have restrictions regulating or denying the transfer of data across their borders which can potentially result in customers or businesses from having to pay import or merchandise fees.Geo-economic concerns involve issues such as identifying and turn up force-out with IT skills to work at far sit es and communicating with personnel across all 24 time zones. Cultural challenges include differences in languages, cultural interests, religions, customs, social attitudes, and political philosophies. For example, if Magnum Enterprises was conducting a business transaction via a Video teleconference it would be annihilating to look them in the eye when introducing yourself. sooner meeting an international customer, it would prudent to review their customs and courtesies to ensure a swimming business relationship. better Magnums e-business performance faces several challenges. Consulting with key department personnel from operations, marketing, finance and legal as well as addressing technical and management obstacles will assist me in charting a plan to put our e-business on the right track towards success.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.