santoshdahal assessment2 s242842.ppt

18
BIS342 enterprise IT Management Santosh Dahal s242842 Assignment 2

Upload: nir-nia

Post on 16-Feb-2017

224 views

Category:

Engineering


0 download

TRANSCRIPT

BIS342 enterprise IT Management

BIS342 enterprise IT ManagementSantosh Dahal s242842Assignment 2

1.1With the benefit of 20-20 hindsight, how might the problems with payroll checks been significantly reduced?

began using the new budgetary , structure on timetableASU wanted to execute the ERP framework in a meager 18 months, despite the fact that other comparative estimated establishments had assumed control more than four years.

1.2Dou you suspect that there might have been serious problems with the Student Information System portion of this project as well? Why do you think there seems to be no documentation of problems in this area? a wrong salary checkpurposes 3000 representatives were come up short on or not paid by any methods, while diverse laborers were paid thousands more than they ought to

1.3There is mixed reaction to ASUs implementation approach and its results. Imagine that you have been hired as a consultant to assess whether or not the ASU strategy was effective. Identify six people (by role or title) that you would want to interview. Identify a set of four or five questions you would ask each interview subject.Accountant-Revenue RecognitionFunctional ConsultantCloud Migration ConsultantNet Suite Implementation Consultant 1.4Would you recommend the ASU approach to other universities? Why or why not?paying little respect to an understudy's family circumstance.Not effective ERP

2.1Indicate Yes for each requirement listed in Table 8-8 that you feel was essential in the selection of an ERP system for Hunter Manufacturing. Provide a brief rationale for selecting or rejecting each requirement.

Rationale ERP execution stances real difficulties to affiliations, the same number of them miss the mark in their initial stages or generously surpass the undertaking Co ERP frameworks vary subjectively from earlier extensive scale Information Technology executions in three ways ERP sways the entire association, workers may be adapting new business processes notwithstanding new programming, also, ERP is regularly a business drove activity, instead of IT drove.

2.2 Briefly outline a process that the management team could have followed to evaluate several ERP solutions objectively and overcome their original misgivings about SAP.

68 percent of programming utilization experience serious issuesPicking the wrong one for your special business could stop your association progressing

2.3 What role might industry consultants or third party ERP implementation experts have played in this successful project?helps mid-market makers diminish the shot of usage issues by serving to oversee many-sided quality, danger, and information combination challenges. 2.4 What role could Hunter Manufacturing management have taken to minimize organizational resistance?authoritative change! the coherent thing to ask is if there is an impeccable approach to present and oversee change

3.Name some open source ERP software and explain the benefits and drawbacks of open source software.

Apache, Compiere, Open for Business and Openbravo,Technology Group International, x Tuple, and WebERP.

Benefit: Costs Nothing to ImplementDrawback: Open Source Code Can Be DangerousBenefit: Good for Companies that Have Simple Tracking NeedsDrawback: Lack of ConfigurabilityBenefit: No Financial Risk InvolvedDrawback: Lack of Customer Support. [ 247-248] (Reynolds, 2010)

4.1Does anything in the courts ruling restrict the ability of private employers with clear computer usage policies that disclaim employee privacy from monitoring employees e-mail and text message?

changed the way business is led in the run of the mill American working environment.data about any subject experienced in an everyday employment errand can be recovered in seconds from the Internet through various web indexes. 4.2 What learnings does this case provide for an employer who is attempting to establish an employee workplace monitoring program?Representative observing has ascended as a need, however, as a to a great degree questionable issue on the grounds that of the intricacy and boundless utilization viewing and observing workers' activities amid working hours utilizing boss gear/property. 4.3 With 20-20 hindsight, what could the city of Ontario have done to ensure enforcement of its intended computer usage, Internet, and e-mail policy?

Hannaford Brothers is a grocery store chain that utilizes 27,000 laborers with 167 stores in 5 northeastern states and Florida. (Zhang et al., 2014)In December 2007, a security break started at Hannaford including client credit and platinum card data

5.Search the Internet for a recent case against iiNet for information on the users using iiNet gateway to download copyrighted material without payment. Explain the ethical and privacy issues involved in the case.

The Federal Court has handed down a crushing ruling to iiNet and several other Australian internet administration suppliersconstraining them to hand over points of interest of clients who have allegedly downloaded the Dallas Buyers Club film via Bit Torrent.

6.In an organization there is, sometimes, resistance to enforcing SLAs amongst various business units. Explain why.

Before masking an outsourcing get, an association ought to benchmark its current administration levels so it knows how well the administrations are being conveyed and it knows the related costs. This benchmark can then be utilized to secure a sensible standard for negotiating target results and expenses from the outsourcing direction contractor. A enter to undeniable benchmarking is taking the right measures to assess the execution of the procedure. Recollect that, you get what you measure.

7.Briefly discusses the NT Privacy Principles.

Accumulation of data Utilization and Disclosure Administration of data Openness

8.What is the reasons for organizations to turn to outsourcing?

To Cut or Stabilize Costs: The top motivation to outsource is to cut or balance out the expenses. To Improve Focus: Another explanation behind outsourcing is to empower an association to concentrate on its generally imperative needs. (Thu Nga and Binh, 2012)To Upgrade Capabilities and Services: Regularly, an outsourcing administration supplier can perform a business process superior to anything its customers ever could. The outsourcing supplier may be exceptionally effective, with world-class capacities furthermore, access to new advancement, methodologies, and dominance. (Nilsson, Karlsson and Andersson, 1995)

9.What key issues must be addressed when considering outsourcing?

Quality ProblemsLegal IssuesUnconstructive collision on client associations and SatisfactionData Security and Integrity Issues Cost advantage: Salaries in developing countries such as China, India, Latin America, and the Philippines are increasing at more than 15 percent per year. Turnover: The velocity of employees income is as high as 50 percent on outsourcingFirms in some countries. (Hutchin, 1986)Intellectual property rights: Various countries have widely divergent stances for the protection of corporate data, the best copyrights and trade secrets.

10. Briefly describe the contents of Australian Security standards that is used extensively in large enterprises to manage security.inform people on how the business is to be run and how day-to-day operations are to be conductedthere are 63 standards to maintain the information security, system and identification technology.Division creates security gauges and innovation against dangers to the secrecy, trustworthiness, and accessibility of data furthermore, services.

11.Describe the importance of an IT Helpdesk and the significance of standards in an enterprise.If the help desk is to insure management backing rather than simply consent it must make its case in terms which management understand. The successful help desk uses the information which it gathers to make the business case for receiving resourcing, or to give its voice influence. The help desk is increasingly seen as a business rather than a technical function, and must align itself accordingly. There are implications for users and providers in this new form of provision which have yet to be researched. While there are burdens for providers in having to support technologically the development, the potential is there to encourage selfsufficiency in users and to minimize expense in staffing and dealing with individual calls.The outcome is a continually advancing arrangement of uses and innovations that IT associations must bolster, while being more responsive and sympathetic than any other time in recent memory before all without expanding expenses.

12.What is business continuity planning? Name some important initiatives that an enterprise should take to reduce risks to the business

The Business Continuity Plan (BCP) is an essential part of any organizations response planning. It sets out how the business will operate following an incident and how it expects to return to business as usual in the quickest possible time afterwardsUnderstanding the businessThe initial responseLonger-term planningContinuity preparations

References

Reynolds, G. (2010). Information technology for managers. Boston, MA: Course Technology, Cengage Learning .Beger, G. (1994). Outsourcing - Privatisierung - Bibliothek. Bibliotheksdienst, 28(7).Chakravarty, A., Grewal, R., Sarker, S. and Sambamurthy, V. (2014). Choice of Geographical Location as Governance Strategy in Outsourcing Contracts: Localized Outsourcing, Global Outsourcing, and Onshore Outsourcing. Customer Needs and Solutions, 1(1), pp.11-22.Greenleaf, G., Waters, N. and Bygrave, L. (n.d.). Implementing Privacy Principles: After 20 Years, it's Time to Enforce the Privacy Act. SSRN Journal

Harnsamut, N., Natwichai, J., Sun, X. and Li, X. (2014). PRIVACY PRESERVATION FOR ASSOCIATIVE CLASSIFICATION. Computational Intelligence, 30(4), pp.752-770.Hutchin, T. (1986). Information Technology: Implications for Managers. J Inf Technol, 1(1), pp.36-37.Nilsson, J., Karlsson, L. and Andersson, J. (1995). Secondary austenite for mation and its relation to pitting corrosion in duplex stainless steel weld metal. Materials Science and Technology, 11(3), pp.276-283.Noordeh, M. (n.d.). Information Technology Outsourcing. SSRN Journal.Smith, R. (2012). A contemporary look at Saltzer and Schroeder's 1975 design principles. IEEE Security & Privacy Magazine, pp.1-1.

Suwazono, S. and Arao, H. (2010). P32-24 Poorman's ERP/EP lab. yet another free analysis software for EP/ERP, version 0.9. Clinical Neurophysiology, 121, p.S298.Thu Nga, N. and Binh, L. (2012). Establishment of a system for regeneration and transfor-mation in peanut (Arachis hypogaea L.) using somatic embryo. TAP CHI SINH HOC, 34(3).Umemuro, H. (2004). Lowering elderly Japanese users? resistance towards computers by using touchscreen technology. Univ Access Inf Soc, 3(3-4), pp.276-288.Zhang, X., Liu, J., Cole, M. and Belkin, N. (2014). Predicting users' domain knowledge in information retrieval using multiple regression analysis of search behaviors. Journal of the Association for Information Science and Technology, p.n/a-n/a.CPNI,business continuity planning, http://www.cpni.gov.uk/Security-Planning/Business-continuity-plan/ viewed 19th may 2015.