...Course Title: Accounting Information Systems Course Code: ACC - 406 Course Instructor: Mohammed Sakhawat Hossain Assistant Professor, Faculty of Business & Economics, DIU Group… Assignment on INTERNAL CONTROL & COMPLIANCE FRAMEWORK FOR INTERNAL CONTROL SYSTEMS IN AB BANK Submitted to Mohammed Sakhawat Hossain Assistant Professor Faculty of Business & Economics Daffodil International University Submitted by Group Name: Group…….. Sec: A Batch: 22nd Program: BBA Faculty: Business & economics Daffodil International University ABOUT OUR GROUP ❖ Group Name: ……. ❖ Sec : A ❖ Batch : 22nd ❖ Program : BBA ❖ Faculty: Business & Economics ❖ Group member | | | | | |S:N: |NAME |ID |REMARK | | | | | | |01 |Soma Das |091-11-678 | | | | | | | |02 |Riza Ul Karim...
Words: 5518 - Pages: 23
...THE ROLE OF ICT IN HR PROFESSION By BABATUNDE OGUNDIRAN Introduction: The role of HR has changed significantly over the past couple of decades and is continuing to change as the HR profession strives to gain acceptance as a strategic business partner. In many organizations, HR is performing a very different role to that of 20-30 years ago. Its role from payroll clerk and welfare supporter, through corporate and industrial relations expert, to that of a business partner role. The HR Profession is slowly being transformed by information technology. Technology today is the driver of new business processes for dealing with customers, consumers and suppliers. But it is also reshaping important functions and processes that only those inside the organizations may care about such as accounting, payroll, and human resources management etc. Taken together, the internal and external impact of new ICT technologies is changing the way organizations manage and make decisions. Human Resource Information Systems Human Resource Information System (HRIS), refers to the systems and processes at the intersection between Human Resources Management (HRM) and Information Technology. The HR function consists of tracking existing employee data which traditionally includes personal histories, skills, capabilities, accomplishments and salary. To reduce the manual workload of these administrative activities, organizations began to electronically automate many of these processes by introducing...
Words: 2545 - Pages: 11
...internship project is a part of my 2- year degree program which I conduct at University Tenaga Nasional (UNITEN) , which one of TNB subsidiary company. I was assigned to work in ICT division which is one of the none core business in TNB department that provide network infrastructure , data collection and producing intelligence system for tnb operation .the main client of ict division is distribution ,transmission ,and power generation .hence , the position of ict devision is like the hub of the TNB devisions since they have to corporate with every TNB department in order to ensure their business is running efficiently and running smoothly. I worked on an assignment project to investigate the development of Distribution Operation Management System (DOMS) that was developed by one of TNB primary vendor PSI IN control SDN BHD . the system was requested by Distribution System Operation (DSO) in TNB for the purpose of improving operation efficiency and eliminating manual process of managing planned outage. Besides that, I was also given the opportunity to join MFFA team to perform maintenance work on PDA equipment . This taks suits my major in information system , and also brought me to a very new and interesting area of using communication technologies in electricity network. Through the assignment, I did not only gain a lot of knowledge but more importantly, I also had a great chance to sharpen my skills in a professional working environment. Not less important than the...
Words: 5429 - Pages: 22
...Leonardo Journal of Sciences ISSN 1583-0233 Issue 13, July-December 2008 p. 7-21 Network Security: Policies and Guidelines for Effective Network Management Jonathan Gana KOLO, Umar Suleiman DAUDA Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. jgkolo@gmail.com, usdauda@gmail.com Abstract Network security and management in Information and Communication Technology (ICT) is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password...
Words: 3892 - Pages: 16
...1. Comprehensive Radio frequency (RF) audit and site surveys must be conducted for wireless network implementations. 2. Wireless coverage must be analyzed periodically to ensure that adequate and efficient wireless signal strength is available throughout the campus, and the wireless signals does not radiate and spread beyond campus boundaries and compound walls in order to prevent traffic sniffing, encryption cracking, unauthorized access, and any other malicious network attacks from outside the campus. 3. If the wireless connectivity is required to provide for the remote office location outside the campus, it should be deployed with point-to-point narrow beam directional antennas only. Implementation of Omni Antenna, Panel/Flat Antenna, or Sector Antenna must be...
Words: 929 - Pages: 4
...4/12/12 Unit 4 Assignment 1&2 Enhance an existing it security policy framework Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2. Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them. To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements. Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit entries that an...
Words: 1876 - Pages: 8
...meeting and a meeting with the College’s career advisor | -I had a meeting with Mrs brown; my career advisor about how many ucas points are required to study to become a stock broker in university and what grades must be achieved to get into the stock broking market. | September 11 | Research on internet http://www.totaljobs.com/careers-advice/job-profile/finance-jobs/trainee-stockbroker-job-description | * What I need to become stock broker is the ability to understand and analyse complex information good communication skills, good mathematics skills, good mathematics skills and ict. Calmness under pressure, the ability to work both as part of a team and on your own initiative, drive and determination, good judgement of risks, honest and a trustworthy attitude. Furthermore, I would need Certificates in Investment Management, Securities or Financial Derivatives * CFA Society Investment Management Certificate (IMC)With more experience (usually around three years'), could take more advanced professional qualifications, such as: * SII Diploma * Chartered financial analyst (CFA) qualificationRelevant training, such as the diploma in financial Planning.During my career I need to have continuous training to keep up with update procedures and...
Words: 2026 - Pages: 9
...Paper Case study Nantonia ICT Strategy & Planning Master : ICT in Business Location : University, Leiden Course : ICT Strategy & Planning Assignment : Paper Case study Nantonia Date : 3 June 2011 Name : Suraj Soerdjbali Studentnr : Teacher : ------------------------------------------------- Part 1 The business model: 1. Partners: Natepco is a subsidiary of Natonia Energy Holdings. Which on their turn have a joint venture with Prime Energy Group and Government of Natonia 2. Key activities: The key activities of Natepco are exploration and production 3. Key resources: The key resources of Natepco are sell crude oil to commodity markets and gas (LHG) to power/electricity producers 4. Value Proposition: crude oil and gas (LHG) 5. Relationship: Their Brand, retaining customers 6. Distribution and acquisition channel: Traders, electricity producers 7. Customers: willing market in local industry 8. Cost structure: Manufacturing, exploration, maintenance 9. Revenue streams: The IT systems being used within the business model: * Partners: Prime Energy Group is in consideration of implementing SAP * Key activities: VAX/Compaq systems are used for drilling applications, HP systems are used for running applications for maintenance en procurement. Offshore platforms uses email application and application access * Key resource: IBM systems for finance The business maxims that I found in the case...
Words: 3623 - Pages: 15
...Unit 27: Understanding Health and Safety in the Business Workplace Unit code: H/502/5458 QCF Level 3: BTEC National Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to enable learners to develop knowledge of the legislation and regulations relating to health and safety in a business workplace in order to conduct an audit and carry out a risk assessment. Unit introduction It is important, when working in business, to ensure compliance with organisational procedures and legal requirements, as the consequences of non-compliance can have serious implications for employees and employers. It is important, therefore, for learners to appreciate that those working in business must understand the principal issues which affect the working environment, for all individuals and the organisations that employ them. This involves keeping up to date with information on the legal issues that affect safe working practices. Everyone at work plays an important part in ensuring health and safety and it is essential that key personnel are aware of their roles and responsibilities. Employers must take reasonable care to protect their employees, and others, from the risk of injury, disease or death, while employees must take care to protect themselves and others. Safe working conditions and the ‘welfare of employees’ can contribute to the success of an organisation. It is important that organisations take steps to prevent accidents...
Words: 3693 - Pages: 15
...Unit 3: Introduction to Marketing Unit code: Y/502/5411 QCF Level 3: BTEC National Credit value: 10 Guided learning hours: 60 Aim and purpose The aim and purpose of this unit is to give learners an understanding of how marketing, research and planning and the marketing mix are used by all organisations. Unit introduction Marketing is at the heart of every organisation’s activity. Its importance is also growing in the non-commercial, public and voluntary sectors. Also, at the heart of marketing is the customer. This unit will introduce learners to some of the tools and techniques all types of organisations use to achieve their objectives. Firstly, learners will explore how different types of organisations use marketing principles to meet the needs of their customers and achieve their objectives. The constraints under which organisations operate are important and learners will study the legal requirements and voluntary codes that affect marketing. Learners will then go on to investigate how organisations collect data through market research and turn it into useful information which can be analysed and used to plan their marketing activities. The segmentation and targeting of groups of customers is a key marketing technique and this is studied in detail. This includes the different bases for segmentation of both consumer and business markets. Next, learners will examine how a marketing mix is developed to meet the needs and aspirations of...
Words: 4051 - Pages: 17
...forms of employee involvement. Module Content: • History of the HR function, theories and models of HRM; • The roles and responsibilities of stakeholders in HRM; • The changing nature of work, managing diversity, technology and flexibility; • Human resourcing: recruitment and selection, human resource planning; • Reward and performance management; • Employee relations, employment legislation, the legal framework for unionism; • Human resource development; managing learning, knowledge and change; • The integration of HR and corporate strategy. Teaching Format: One 2-hour lecture per week; Three 1-hour tutorials. Assessment: • Group coursework assignment (40%); • Individual written coursework assignment (60%). Text(s): Beardwell, J. and...
Words: 9120 - Pages: 37
...SUSTAINABILITY ASSIGNMENT Submitted by : Shailaja Gupta(2015PGPM054) Table of Contents: Four Rs Responsible Business Redefine Workplace Renew Ecosystem Repay Society Analysis FOUR Rs: RESPONSIBLE BUSINESS * Uphold transparency by following Code of conduct principles. * Invest in innovation * Improve knowledge through Knowledge management * Deliver ICT solutions in a sustainable manner * Help reduce congestion and help reduce overheads as the server requirements reduce REDEFINE WORKPLACE IGNITE HCL facilitates growth of employees by: 1. Empowering them with programs that encourage them. 2. Create benefits and experiences for them which are enriching 3. Promoting their well-being and happiness 4. Giving them recognition for their contribution to organization Employees First If you take care of your employees, they take care of the customers. That’s the strategy of HCL. • Maximum value is created at the employee-customer interface. Employees are given the authority to help customers. • HCL helps create space for growth, expansion and enrichment. • Employees First: Get into the very core of an individual and know about their individuality and helping them to unleash their potential. Employee Passion * Hobby Clubs at HCL: They can all come together and win exciting prizes, participate in so many competitions. They can join so many clubs for various things such as bike rides, photography etc. They...
Words: 1089 - Pages: 5
...seamlessly connected with world-class information, communication and entertainment services. Our Mission Your trusted and proven partner for innovative and exciting communication experiences delivered with passion, quality and commitment. Contents SLT at a glance 02 SLT’s year at a glance 05 About this report 07 Letter from the Group Chairman 08 Letter from the Group Chief Executive Officer 10 Board of Directors 12 Leadership team 18 Corporate governance 23 Risk management 34 Management discussion and analysis 38 Financial reports Annual Report of the Board of Directors on the affairs of the Company 86 Statement of Directors in relation to their responsibility for the preparation of financial statements 93 Audit committee report 94 Independent auditors’ report 97 Statement of profit or loss and other comprehensive income 98 Statement of financial position 99 Statement of changes in equity - Group 100 Statement of changes in equity - Company 101 Statement of cash flows 102 Notes to the financial statements 103 Ten year progress - Group 150 Value added statement 151 Investor relations 152 Portfolio of lands 154 Milestones 157 GRI index 158 Abbreviations 161 Notice of meeting 162 Form of proxy Enclosed Corporate information Inner back cover Sri Lanka Telecom is the pioneer communications provider to the Nation. We have over 150 years of expertise in ‘giving life to thought’, fulfilling the evolving dreams...
Words: 22150 - Pages: 89
...has been there right from the beginning to this very point. Special dedication also to my ever supportive parents, for their relentless support and compassion towards me during the course of my six months SIWES training. To God is the glory. 2 ACKNOWLEDGMENT With a deep sense of appreciation, respect and gratitude, I want to say a big thank you to my parents, brothers, sisters and other relatives and non relative friends for their caring attitude and support from the beginning of my pursuit for B.Sc degree in Information Communication Technology to this point. I also want to express my appreciation to my immediate supervisors, Mr. Ifeanyi Ogochukwu, (ICT Manager, NAMA) and Mrs. Onusi (Information Technology Services Manager (ITSM), NAMA), for their intellectual support during our work together. Not forgetting the other ICT Department Management team of, Mr Femi Opeyori, Mr Ernest Aigbangbe, Mr. Charles Ibe, Mr Emmanuel Adeniran and my other IT colleagues. My sincere appreciation also goes to everyone that has been by me all this while. A Big thanks!!! KOYA TEMITOPE ABAYOMI 3 Table of Contents Title Page Cover Page 1 Dedication 2...
Words: 4261 - Pages: 18
...Subject: Management Information Systems Assignment: Security Poli Cooney Hardware Ltd Security Policy Table Of Contents * Introduction * Purpose * Why do we need a Security Policy * What is a Security Policy * Building Issues * IT Policy * Risk Analysis (Identifying The Assets) * Risk Management(Identifying The Threats) * Personal Security * Health And Safety * Auditing * Security Threats * Network Policy * Delivery Of Goods * Conclusion * Introduction Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security. It’s sad to see that the possibility of having our data exposed to a malicious attacker is constantly increasing everyday due to the high number of ‘security illiterate’ staff also having access to sensitive and sometime even secret business information. * Purpose The purpose of this policy is to secure and protect the assets owned by Cooney Hardware Ltd, one of the biggest hardware...
Words: 2252 - Pages: 10