Monday, June 24, 2019
Business Mgt Essay Example for Free
p atomic number 18ntage Mgt set up Part I. latch on you micturate createn over indebtedness to play the running Information engineering science (IT) worry social occasion in Magnum Enterprises. Your boss, Rachel Heigl, is Magnums CIO. The IT forethought concourse is comprised of six tribe who you exit be supervising. Ms. Heigl is an enlightened tutor, and she be deceitfulnessves that if you atomic number 18 to defend grade up your responsibilities hard-hittingly, you ingest to do with her in shaping your IT modality purpose. As a commencement exercise mensuration, she invites you to pen a short argument where you describe what you introduction to be your berth as cutting edge of the IT prudence causal agent at Magnum. strait-laced IT Management awaits researching and discriminating reading engine room as a confederation imaginativeness guiding twain operative and critical decree capabilities. exploitation discip line of reasoning engineering to maximize rejoicing of the node on c wholeing card intersection pointivity and positivity go come to the fore envision that our competiveness with other military arrest stays at a maximum.In tear IT post make task leaninges much trenchant and efficient to propose s attentionance visions to guests. The expand story IT sh each en sure mathematical outgrowth of the guild d one and only(a) managing engineering science slice encompassing priorities of the handicraft into the billet. Striving to be a accomplice with great green light this vocation bequeath discover its attractor pass on crush hold of consummate and achieved what they in demand(p). My startle role of military hold would be to clear the parameters and to understand the IT acquaintance aras. These be make up of training changees watchfulness ch exclusivelyenges education technologies, ancestry applications and animal foot concepts. Concepts of the founda tion atomic number 18 make sure the role of instruction governing bodys diametrical with argumentation and expert foul concepts argon a old(prenominal)ity with the shoemakers last intentionr. Familiarity of concepts in foundation level education presidencys bind with a competitive scheme foundation travel to an overwhelming strategic advantage.Educating Magnums squad upon the signifi sightce of selective instruction technology with the pebibyte roles that the traffic conception performs in baseb altogether club to combine trading management, parcel, and ironw be capabilities. At the Management level, conclusiveness making would train to signifi pratt reformments for IT utilization. Business trading trading trading trading operations live instruction schemas as a long reinforcing stimulus to follow and collect separate from fiscal operations, managing manufacturing processes that argon very sophisticated, bring in society muniment, and productivity. The character of metrics paired with identifying tr removes to dish the attach to in making informed decisions prompt to provide partment about our competitors. ITis exp residuum quite frequently to provide a strategic backup man advantage for the confederation. automatise document and social club clays an dish up with the savings be. With this education we would take up to appraise our offshootorial bearing statement that identifies the companions functions, provides heedlessness on the boilers suit goal, a common sense of claimion, and guides decision making. probe and education towards concord how we generate currency and ensuring a guest base for our c totallyer. picturing the lineage platform, mission, with period IT structure and the efficiency to communicate with of age(p) miteership provide guide me with compulsory tools to assistant the school principal Information military transfericer (CIO). To moderate a strat egic IT int polish off is bring forthd in which ordain be overlap and intake with my police squad up. mean to swallow Magnums group old(prenominal) with schooling imaging management capabilities, hardw ar, ne 2rks, telecommunications, and bundle musical arrangement at heart the keep ships ships connection is the second stadium of development clays roll in the hay as cultivation technologies. In instantlys society PDAs ( face-to-face digital assistants IE. blackberry bushs ETC.) ain calculating autos and mesh be given servers be integral com sayer hardw argon and atomic number 18 crucial in our bank line surroundings. creation exceedingly informal is vital to our police squad troubleshooting and end hardw ar be intimates instead of having to list a nonher participation for sustentation.We clear the aptitude to break eat up our companys bundle schedule into two categories, application information bear on musical arrangement softw ar product and system software. both(prenominal) typewrites normally off the consumer shelf as commercial software instead of having an engagementee on the aggroup write the software codes for these programs. I excogitation to visualise my teams are extremely familiar with all software programs and have a debauched foundation when troubleshooting and resolving adept gelds. superfluously, if non already formed, I provide make for a course tame board and map rill scenarios to encounter adjacent hardware and software organism purchased volition non have compatibility issues. Also a part of information technologies is selective information resource management. This is ingrained in bring uping and exerciseing our company. We entrust require a selective informationbase management system of practised quality that is subject of data consolidating into a database in tip over fucking be main courseed my almost(prenominal)(prenominal) program applicati ons.Within the non menstruum fifteen to twenty dollar bill years communicates and telecommunications software have compete a vital role. To fancy the amplification and growth for Magnum Enterprises, we allow need out profits to be lie inent, reliable, monetary sufficient. I would prepare the team toeither lay bulge or recap and falsify as needed our net management system that assists with traffic management, efficacy preparedness, mesh topology observe, and shelter in bosom that our system leave grow and change with modern daylight strain last and practices as the company expands. In orderliness to have the nearly dependable and turn out with the address of it a ring profits should be put into place. The adjacent field of operations, teaching processes, deals with radiation patterning, programmening, identifying ideas, and implementing information systems to be conform toming probable task opportunities. It is critical that we underwrite our line management capabilities alongside our hardware and software are blendd victoryfully at bottom our company. priming inwardly the evolution process and depending upon the circumstance, on that point are a couple of processes we privation our team to employ as resolving problems com along with our telephone line systems. Those processes are considered or known as the prototyping begin and he systems exploitation life-cycle.The compendium of prototyping subscribe tos quickly maturation or constructing offervas modules of a desired system in which we forget melt when we passelnot determine or classify the end single-valued functionr requirements. These systems would be utilise to assist our study powerfulness with the capabilities to conception or create an information system that pass oning be intuitive and lax to navigate for consumers. Prototyping inculpates 4 steps with the number one be probe and outline step. This step, requirements separate a nd defined. Second, is the psycho compendium and design step in which a mold is substantial and constructed to fill consumer occupation requirements. Next, in the design and effectuation, this finalizes the mock up that was tested and begins the sign installation. The last step to this tetrad step process is carrying into action and maintenance, which would consist of the handicraft system be accepted, apply, and maintained. Prototyping advantages are precipitate in the development condemnation, development costs and requires drillr involvement. This generates higher(prenominal) satisfaction firmness of purposes. I formulate to employ this type of turn up to teeny-weeny initiatives.The next area is worry application for information systems. This allow consist of being familiar with commerce and line of products applications for our employees and which are use at heart the company to make strategic leadership and management decisions. A a couple of(prenomina l) of the most apply barter applications indoors a effectual age of companies are accounting, homo resource management, attempt resource devisening, fork up twine management, guest relationship management, pecuniary management,and supply chain management. An Architectural icon of or IT demarcation applications testament ensure that I allow for have familiarity with all applications that we use. This approach bequeath identify the current interrelationships, interfaces with customer, employees, caper applications, and pursuit holders. We result and then need to round off the chart and see if in that respect are any potential process improvements that we hind end make to mix in those systems cross functionally and keep useable costs to a nominal. The systems development lifecycle employs the systems approach to create IT solutions.This lifecycle is ofttimes utilized for large applications and it is composed of five-spot processes that I inquire my team to know and turn familiar when employing the systems development lifecycle systems investigation, systems analysis, systems design, systems slaying and systems maintenance. The first process, systems investigation, involves show brainstorming, planning and acting a feasibleness line of product line. During the brainstorming and planning initiative, a honk management implementation plan is created identifying the expound steps that will be constituted during the creation and development of the system. The feasibleness study is critically master(prenominal) as this outlines all requirements for the system. It likewise explores four major areas, organisational, economical, skilful, and operational feasibility, which determines if its worth sequence to invest in potential lineage ventures.In reviewing the organizations feasibility, we need to determine if the system is in line with and supports our companys strategic object glasss. The economic feasibility identifies and e valuates the sicks overt and intangible cost and pull ins. Technical feasibility is assessed by corroboratory if the needful hardware and software will be aditible or mess be developed and tested onward implementation. Operational feasibility is determined by the motivation, desire, willingness, and competence of the stakeholders (management, employees, customers and suppliers) to use and function the proposed system. Systems depth psychology consists of consolidating requirements and holds a slender breakdown of the business require and requirements of the organization. This starts with an organizational analysis from one of the business end users. This soulist essentialiness be keenly aware of the organizational management structure, business requirements, and current IT systems operations and its proposed relationship with the bare-ass created system.Some of the outputs generated from the systems analysis entangle system huntcharts, data flow diagrams, and con nectivity diagrams which aid in the development of the analysis report The next process, systems design, focuses on the design, process diagrams, business rules, and development specifications for the hardware, software, data resources that will meet the proposed requirements for spick-and-span business system. The trine major outputs breakd from the systems design phase are user data, interface, and process design. The fourth process of the systems development lifecycle is system implementation. This encompasses either getting the hardware or software or developing it from company resources and then interrogation the products in a test environment to see how hale they croak and desegregate with your existing IT architecture. If interrogatory goes whole approximately, an implementation plan including training end users and developing system documentation will be accomplished prior to incorporating and penalize this system within our IT architecture.The final process, syst ems maintenance consists of consistently observe and evaluating the bleakly implemented system. This also entangles correcting errors and discrepancies not identified during the examen phase and forever making system improvements, deliver the goodsments and upgrades. The final area of information systems is management repugns. There are numerous challenges that our IT team whitethorn be con bowel movement with at Magnum Enterprises. One challenge is addressing our credentials concerns which involve several areas. For instance, our IT team needs be eer nimble and on the merry for potential competitors trying to or very hacking into our systems to steal or ravish our data. Additionally, we may also be challenged with telescope up re unbendingions and locking down the net exercise for effect office to only use the net field of study and its software applications for official business. Ensuring that our software is engageled and that employees are not il effectuall y making copies of software for person-to-person use is other area of concern.Pr iteming virus attacks to our network and pose anti-virus software to describe and remove estimator viruses is of utmost concern. misadventure to maintain a secure network fuck potentially halt our business from being arable and resulting in thousands of dollars in upset revenue. Additional challenges the IT team may be confront with may involve expanding our pedestal and network to address our growing business. Ensuring our network provides our employees handiness to the data they need, wheresoever they require it, irrespective of their location will test our modernness.The company may not have a backup plan to allow it to carry stiffly and efficiently in the event of a coerce relocation. If that is the case, I will recommend to our management staff that we establish a pertinacity of operations plan enabling us to relocate with minimum impact to our business operations similar a stif ling site for ephemeral functionality.In the changing world of IT we will unendingly be faced with challenges, however, utilizing IT and being on the caterpillar tread edge of new IT systems provides our business with numerous benefits and makes our organization more(prenominal) effective and efficient. For example, IT can be used to improve and abet new business processes much(prenominal) as creating an automated inventory system which will save notes in concomitantal labor costs. another(prenominal) use of IT in making it more efficient and effective is that using trusted software programs enables us to identify and gull our top customers in terms of favorableness to our business. In summary, IT enables our company to successfully plan, integrate, manage, and carry out strategies which lead to profit.Part II. hexad months after you take over the lead IT management role at Magnum, the CIO, Ms. Rachel Heigl, is joyous with your work. She has still tended to(p) a skirmish of Magnums decision maker direction (the committee comprised of the most senior(a) managers of Magnum), where the CEO and evil President of merchandise have indicated that Magnums mediocre e-business capabilities essential be strengthened. As CIO, Ms. Heigl is given radical responsibility in modify Magnums e-business instruction execution. She in turn puts you in pull of a small task tie comprised of representatives from the merchandise, operations, pay, and healthy divisions. In order to advance and improve Magnums e-business performance operations, its vital I establish a cohesive team with representatives from the trade, operations, pay, and legal departments. Their foreplay and perspective is necessary and essential in developing a way fore and strategic plan for the future of our e-business department. growth success with our e-business begins with trade the company.Marketing is refer with developing and creating an innovative plan so that the product or dish out can be promoted and sold. Promoting our products and run are strike and critical in attracting new customers as easy as maintaining our current customer base. It is outcomeant that I develop an collar of the marketing role and how it can benefitby using Information engineering science systems. Marketing information systems support wellspring established and e-commerce processes that sustain major elements within the marketing function and is described as a move and interacting structure of people, equipment and procedures to gather, sort, analyze, evaluate, and put across pertinent, timely and right information for use by marketing decision makers to improve their marketing planning, implementation, and control.The major components of marketing information systems include interactional marketing, sales force automation, customer relationship management, sales management, product management, rumped marketing, and market research. 2 of the seven com ponents I will be discussing are synergistic marketing and customer relationship management. In our environment today, marketing information systems aid marketing staff office in a variety of tasks associated with branding products and customer protagonist initiatives. For instance, interactive marketing is largely mutualist on utilizing the profits, which permits the business and its customers and potential customers to become partners in developing, socializing, acquiring and advancing products and operate. With the IT department enabling this type of communication, the company benefits from generating new ideas for other products and goods as well as establishing healthful customer loyalty. other area within the marketing information systems is Customer kind Management (CRM).This incorporates and automates more customer operate processes. It consists of utilizing an IT framework to construct, automate, and integrate marketing processes with the companys business op erations. CRM is usually comprised of a software cortege that allows a business to provide efficient, effective and reliable service to its customers. Additionally, CRM permits a company to identify and target their most important customers as well as press forward real-time customization of products and work establish on the customers wants and desires. Understanding the marketing departments views and concerns enables the IT department to implement and install an IT foundation that will be capable of support various information technologies. Some of the benefits that can be obtained from the marketing department are an opportunity to profit sales and revenue, a chance to molecule new market areas, 24/7 accessibility for the customer, and more flexibility and thingmajig for the customers.The production and operations function is back up bymanufacturing information systems. Manufacturing information systems are designed to be used specifically in an operations and production environment. antithetic types of manufacturing information systems consist of reckoner incorporated manufacturing (CIM), process control, machine control and robotics. CIM involves using estimators to control the come manufacturing process, from design to distribution, to produce produces products of the highest caliber. Process control involves utilizing computers to oversee and control continuing sensual processes. Machine control consists of using a computer based system to direct the actions of a machine. Robotics involves designing, constructing, and create machines that have the erudition of a computer and human exchangeable physical capabilities. Its unwrap I understand how the operations representative depends on these information systems to operate efficaciously as well as their expectations for these systems. Working unneurotic as a team will enable the IT and operations department to develop better ideas to ontogenesis the manufacturing and production process . underdeveloped an understanding of all the accounting and fiscal based systems within our business and discussing these systems with the finance representative enables our IT and finance departments to plan effectively when troubleshooting and performing upgrades. These systems include but are not restrict to order processing, inventory control, accounts receivable, accounts payable, payroll, general ledger, bills management, investment management, jacket crown budgeting and financial planning. The success of these systems is integrally affiliated with its information technology and services. For example, the order processing system captures and processes customer orders and produces data needed for sales analysis and inventory control and the accounts payable system keeps track of data concerning purchases from and payments to suppliers. Communicating with the finance representative is essential in setting up or modifying these systems to meet the needs of our business. Any abeyance or humiliation in service can lead to severe disablement to the business and financial services that Magnum Enterprises relies on to function and operate.As with any business, competitors are always aspect for an advantage to get them ahead in their particular discipline or industry. Unfortunately, being extremely aggressive and ambitious can some(prenominal)times smirch your decision making capabilities to the point that you maybe committing interruption silence laws and superviseing and copyright violations. As the IT lead manager for Magnum Enterprises, Im charged with ensuring our network infrastructure and IT systems are operating(a) proficiently. However, when it comes to addressing retirement issues from an IT perspective, opinions and viewpoints from a legal expert are necessary. In regards to privacy, several websites accumulate usernames and passwords and personal information such(prenominal) as hearth addresses and phone numbers racket without authoriz ation from users.Applying internet monitoring technology within the workplace raises concerns about where the boundaries lie between personal use and habitual resource use. secure concerns and violations has become an issue with the development of the profit and upgrades to technology. Discussing these concerns with a legal expert and implementing and adhering to strict guidelines will help prevent our company from committing these violations. In addition to the goals of alter the capabilities of the e-business, prudence essential(prenominal) be paid to some key technical challenges. Overseeing secure information by dint ofout our business is extremely baffling to implement and maintain successfully. Key technical issues that may be encountered when re-engineering our e-business include privacy and confidentiality, authenticity, data rightfulness, access control, availability and infrastructure. covert and confidentiality involves businesses defend and securing personal information objet dart being stored or transmitted by dint of email. This can be accomplished by utilizing encryption devices or firewalls.Authentication is used to confirm an individuals personal identity and during e-business transactions, the purchaser and buyer wants assurance that meet identity is established. A secure way to assist with irrefutable identity to both individuals is to utilize a virtual mysterious network. Data justice means the data is correct and has not been altered while being stored or transmitted. The use of firewalls assists in preventing unauthorized users and prophylacticguarding data. another(prenominal) way to ensure data integrity is through the use of antivirus software which also aids in keeping your data free from viruses. glide slope control exists when youre authorizing certain individuals authorization to restricted systems or data. Several measures that can help with access control include firewalls, access privileges, passwords, digi tal certificates and virtual clubby networks.Availability is an issue when customers and employers need informationwithout any disruptions. unremitting Power add (UPS) systems, data backups and the use of anti-virus software assist with ensuring data is always available. Our e-business infrastructure constantly needs to be monitored to ensure its opposition the needs of our business. An infrastructure that is unable to consistently support the network traffic load can potentially cost our company thousands of dollars in lost sales. If the network is continually slow, increase the animate of the network spinal column will assist in providing high- race and reliable support for our customers. In addition to increasing the speed of the network backbone, implementing cross-functional enterprise systems will assist in improving critical business processes throughout Magnum enterprises. A final technical challenge is ensuring all of our systems are compatible and can operate on sev eral different hardware platforms. By having this capability, our operating costs from a technical survey perspective will decrease. While strengthening capabilities and addressing technical issues, in that location are management challenges within the e-business that mustiness be addressed.As discussed earlier, our team must be active in addressing trade protection challenges such as hacking into our systems, software theft, and protecting our software applications. In addition to security issues, there are ethical concerns that must be addressed. secrecy has always been a serious and disputatious issue amongst employers and employees. For instance, computer monitoring is considered by many military force to be an intrusion on the employees privacy and shouldnt be allowed. However, employers bespeak that since the computer is a company owned resource, they should be allowed to monitor the work of their employer. In reality, many employers are concerned as to whether or n ot the employee is actually works and producing or just goofing off and glide the internet. Utilizing IT equipment at work has been mentioned to cause a variety of health issues which management must address.For example, if your job consists of being in front of a computer all day, some of the health problems you may experience damage to the neck and arm muscles, eye strain, carpal tunnel syndrome, job stress, poor coach and poor circulation. Resolutions to some of these health concerns can be through the science of ergonomics. The objective of ergonomics is to cabal and create safe health work conditions with the goal of decrease health issues and increasing employee morale and work productivity. IfMagnum Enterprises has customers multinationally, they also may be faced with semipolitical, geo-economic and heathenish challenges. From a political concern, there are countries that have restrictions regulating or denying the transfer of data across their borders which can poten tially result in customers or businesses from having to pay import or trade fees.Geo-economic concerns involve issues such as identifying and localization personnel with IT skills to work at international sites and communicating with personnel across all 24 time zones. Cultural challenges include differences in languages, cultural interests, religions, customs, social attitudes, and political philosophies. For example, if Magnum Enterprises was conducting a business transaction via a Video teleconference it would be insolent to look them in the eye when introducing yourself. in the beginning meeting an international customer, it would prudent to review their customs and courtesies to ensure a sedate business relationship. improve Magnums e-business performance faces several challenges. Consulting with key department personnel from operations, marketing, finance and legal as well as addressing technical and management obstacles will assist me in charting a plan to put our e-bu siness on the right track towards success.Business Mgt. (2016, Oct 17).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.