...Case study: Evolving from Information to Insight A forward-looking company must stay ahead of the technological curve to gain competitive advantage. In this case, the authors, Glover, Sanjay, and Baiju, mentioned business leaders should concern some of the necessary processes to evolve from information to insight (i.e., infrastructure, data capture ability, utilization of the technical ability, etc.). In other words, companies that aim at enforcing more IT strength to thriving should pay attention to the knowledge management, business intelligence, and analytics. Knowledge management is a fundamental factor to get the insight of the company’s innovation. Knowledge management includes the processes necessary to generate, capture, codify, and transfer knowledge across the organization to competitive advantage. (Pearslon, 2013. P327) Glover enriches the context of the knowledge that company need to take into consideration. At first, the types of information (i.e., business process information, physical-world observations, biological data, public data, and data that indicate personal preferences or intentions) and related data accessibility should be included in the management process. As the data streams increasing rapidly, company should pay attention to the data context that will update more information in the data packages. The extra information may deliver a potential signal for new business activity. Biological information, stated by Glover, is being collected now mostly...
Words: 986 - Pages: 4
...supplier for building, plumbing and gardening businesses and home clients. Along with the company expanded, there were more and more problems appeared, such as accounts payable and receivable problem, inventory problems, supplies and clients problem, communication problem etc. This assignment begins with discuss of ‘FixItNow’ company’s current situation and problem, then a detailed explanation of information systems and identify the importance of information systems for business. Following that, analysis key information requirements by refer to porter’s five forces to find out strategies for competitive advantage and business processes. Moreover, apply information systems to help FIN to solve these exist problems and fulfilling business requirements. As well as, discuss about business decision making by using information systems, and utilize IS/IT to collaborate and communicate with stakeholders. After that, focus on the security and ethical issues that may arise in the company. Finally, discuss about organizational change during the implementation. The problem identification In the case of FIN, obviously, there are different management problems in the business so that reduce the company’s profit and obstruct business processes. As the issues already addressed by Adam and Ian, the first problem was accounts payable and receivable incorrect, reason is the incorrect invoicing which directly affect the accounts payable and receivable. Therefore, FIN should change its data from incorrect...
Words: 3554 - Pages: 15
...from a customer’s perceptive means paying for product or service in a way that makes customer feel good about doing business with a company. Mc Donald’s has developed an apprenticeship program for prospective project manager, combining classroom theory, on the job learning, and support from mentors. Mc Donald’s is accomplishing this program in association with the computer technology industry association ( CompTIA). The goal is to develop a national information technology apprenticeship system aimed at building skills and credentials around specific business technology functions. The grant enables CompTIA to build four career tracks in areas that it feels a prime for IT apprenticeships: IT generalist, project manager, security and data base. The grant also provides funds to implement web based processing of applications and certifications. Many restaurants view the public access Wi-Fi hot spot technology as essential for attracting customers. Question2- How does information technology reduce management costs? Answer: Information technology is now so pervasive and essential that it must be treated as a lever for reducing overall business costs—not only as overhead to be slashed. The ways of reducing costs through the use of IT are: 1. To reduce sales and service costs: Adopt technologies that support customer self-service for simple transactions. In addition, segment customers by their profitability and future value. Segmentation enables managers to invest more in the company’s...
Words: 887 - Pages: 4
...with a really efficient information system. We are now going to describe the different business processes shown in the video that retraces the entire journey of a package. 1. First a FedEx employee goes to the house of the customer and picks up the letter or the box the customer wants to send. The employee immediately scans the product so FedEx recognizes it. From this moment on and until the end of the process, FedEx will be able to know where each package is. When the pick-up tour ends, the truck goes to a sorting center to transfer the packages. 2. Once in the warehouse (called sorting center), all the packages need to be classified. Some of them are headed to the US; others are going to Europe or Asia for instance. First the package is put on a belt where it is measured (length, height, weight, volume) it tells FedEx how much to charge the customer for the shipping. Then the package goes under a scanner that reads the destination and puts the box in the right belt. If the machine cannot scan the box then the package is sorted out manually. 3. The third step is to put all the boxes in the right container and to fill it up at its maximum. The container is designed to fit in perfectly with the shape of the plane. Then it is weighted after that and then it goes to the plane. 4. After that the containers are loaded in the aircrafts directed by a control tower. There, employees check the weather, the location and all the information to make sure that the flight...
Words: 3327 - Pages: 14
...A Case Study on How to Manage the Theft of Information Robert M Polstra III Kennesaw State University 2004 Westwood Rd Smyrna, GA 30080 404-641-8937 rpolstra@hotmail.com ABSTRACT 1. INTRODUCTION This paper shows the importance that management plays in the protection of information and in the planning to handle a security breach when a theft of information happens. Recent thefts of information that have hit major companies have caused concern. These thefts were caused by companies’ inability to determine risks associated with the protection of their data and these companies lack of planning to properly manage a security breach when it occurs. It is becoming necessary, if not mandatory, for organizations to perform ongoing risk analysis to protect their systems. Organizations need to realize that the theft of information is a management issue as well as a technology one, and that these recent security breaches were mainly caused by business decisions by management and not a lack of technology. After counter-terrorism and counter-intelligence, cyber crime is the third highest priority for the U.S. Federal Bureau [4]. With the rise of the theft of information and the lure of big profits for this stolen information, it is necessary for information systems to have the ability to protect this valuable asset. It is estimated that a credit card number unsupported by any other documentation is worth $10, and a credit history report retails for $60 [2]...
Words: 3469 - Pages: 14
...Case Study: UPS Competes Globally with Information Technology 1. What are the inputs, processing, and outputs of UPS’s package tracking system? * The Inputs to the UPS package tracking system includes the following shipping information: * Customers signatures * Pick-up information * Delivery information * Time card information * Processing involves using the data captured above to update information on the central computer. * Outputs include the delivery status and position of a parcel. 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? a. Handheld computer – the Delivery Information Acquisition Device is a handheld computer that lets the delivery agent collect delivery info remotely for real-time updating of delivery status. b. Cellular Technology – information collected on the DIAD is transmitted from the delivery vehicle via cellular network. This allows for remote and near real-time transmission of delivery data. c. World Wide Web – Allows customers to check delivery routes calculate shipping and schedule a pickup conveniently and remotely. This increases the reach of their services to those. 3. What problems do UPS’s information systems solve? What would happen if these systems were not available? d. I these technologies were not present, customers would not be able to track their shipments in a real-time manner. e. Customers...
Words: 390 - Pages: 2
...Information Systems could be classified as follows (Bagad, 2011): • Operations support systems: are systems that process data generated by business operations, as transaction processing systems. process control systems and office automation systems • Management Support Systems: are systems that enable effective decision making by managers, as management information system, decision support systems and executive information system. Computer-Based Information Systems (CBIS) rely on computer hardware and software and processing operations functions work according to pre-established set of procedures, and sequences of instructions and then information dissemination the user (Institute of distance and open learning, 2011). 2. 4. Core competencies...
Words: 984 - Pages: 4
...Case Study 1: The Critical Need for Information Security Due Week 2 and worth 100 points Access the ACM Digital Library by following the steps below: Students: 1. Login to iCampus. 2. From iCampus, click STUDENT SERVICES>> Learning Resources Center >> Databases. 3. Scroll down to "Information Systems/Computing". 4. Select “ACM Digital Library” below the heading. 5. Enter your library username and password. Faculty: 1. Login to Blackboard: bb.strayer.edu. 2. Click the "Resource Center" tab at top right of page. 3. From the list on the left, click "Databases". 4. Scroll down to "Information Systems/Computing". 5. Select “ACM Digital Library” below the heading. 6. Enter your library username and password. Download and read the following articles available in the ACM Digital Library: Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS ’11: Military Modeling & Simulation Symposium. Boston, MA. Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31. Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the...
Words: 1615 - Pages: 7
...ISSUES IN ACCOUNTING EDUCATION Vol. 24, No. 1 February 2009 pp. 63–76 Assessing Information Technology General Control Risk: An Instructional Case Carolyn Strand Norman, Mark D. Payne, and Valaria P. Vendrzyk ABSTRACT: Information Technology General Controls (ITGCs), a fundamental category of internal controls, provide an overall foundation for reliance on any information produced by a system. Since the relation between ITGCs and the information produced by an organization’s various application programs is indirect, understanding how ITGCs interact and affect an auditor’s risk assessment is often challenging for students. This case helps students assess overall ITGC risk within an organization’s information systems. Students identify specific strengths and weaknesses within five ITGC areas, provide a risk assessment for each area, and then evaluate an organization’s overall level of ITGC risk within the context of an integrated audit. Keywords: internal controls; general control; ITGC; risk assessment. INTRODUCTION he Sarbanes-Oxley Act (SOX 2002) and the Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5 (PCAOB 2007) require that the organization’s chief executive officer (CEO) and chief financial officer (CFO) include an assessment of the operating effectiveness of their internal control structure over financial reporting when issuing the annual report. External auditors must review management’s internal control assessment as part of an annual integrated audit...
Words: 6299 - Pages: 26
...Practice 2008 ISSN 1522-0222 Importance of Information and Communication Technologies (ICTs) in Making a Heathy Information Society: A Case Study of Ethiope East Local Government Area of Delta State, Nigeria Monday Obaidjevwe Ogbomo Esoswo Francisca Ogbomo Department of Library and Information Science Delta State University Abraka, Nigeria Introduction There is widespread research interest in information and communication technologies (ICTs). According to Crede & Mansell (1998), ICTs are crucially important for sustainable development in developing countries. Thioune (2003) notes that for the past two decades most developed countries have witnessed significant changes that can be traced to ICTs. These multi-dimensional changes have been observed in almost all aspects of life: economics, education, communication, and travel. In a technologydriven society, getting information quickly is important for both sender and receiver. ICTs have made it possible to quickly find and distribute information. Thoiune (2003) indicates that many initiatives have taken at the international level to support Africa's efforts to develop a communication infrastructure and. These efforts are designed to enable African countries, including Nigeria, to find faster ways to achieve durable and sustainable development. Helmut (1998), cited by Akpore (1999), states that of the technological changes that have influenced our lives in recent years, information technology (IT) has had the greatest impact...
Words: 3240 - Pages: 13
...Charlotte Beers (Ogilvy & Mather) Case analysis At the point of planning to the launch of the business, the owner of the business is very passionate and usually experienced in the line-of-business; as David Ogilvy was at the age of 38 when he started his own advertising agency in 1948. Ogilvy & Mather, an advertising agency was started in New York and expanded worldwide. By 1991, O&M was ranked the largest marketing company in the world.[1] But there comes a time when a company must look to adapt a change. With competition growing, clients of O&M changed their demands. O&M was a high-cost agency that was failing in controlling their budget and lowering their cost; they failed to see the reason for a change. Due to that fact, O&M had lost few of their multi-million dollar accounts. Many companies may have either filed bankruptcy or have shutdown in the process of losing their clients but O&M was not the type of company that would give up that easily. In 1992, Charlotte Beers was appointed CEO of O&M and a massive change was underway. She was not the type of person who would dwell on the past, but instead look to better the future. Charlotte Beers clearly made an impression on the O&M employees as she had the ability to inspire. But more importantly, she came up with three strategies which turned the company around 360 degrees; Client Security, Better Work/More Often, and Financial Discipline. Yes these strategies were formed for an advertising agency...
Words: 492 - Pages: 2
...From this case study we have found out that combined efforts towards counter terrorism are being made by various agencies by creating a terrorist watch list. Terrorist Screening center or TSC is the organization created to organize and standardize information about suspected terrorist from various government agencies such into a single list. Records there only contain sensitive but unclassified information about the suspects. The database is daily updated with new nominations, modification and deletion. Various agencies that provide the valuable information to TSC are FBI, CIA, National Security Agency, Transportation security administration, Department of Homeland Security, State Department, Customs and Border Protection, secret service, U.S. Marshall Service, and the Whitehouse airlines. The unification of various terrorism databases has been a huge step towards combating terrorists, the project has been quite slow in implementing itself to its full potential as information from 12 different agencies provides them with large amount of data and the TSC has not been able to process it all. Besides the huge database the modification made daily also makes it hard for them in the integration process. Even though this step makes great difference in countering terrorism, it still has many drawbacks that affect the innocent public too. Reports from both the government accountability office and the office of the inspector general assert that the watch list contains several inaccuracies...
Words: 288 - Pages: 2
...Bsuiness Intelligence Information networks and business intelligence: decision locus and political hotbed By: Julie Stephens Case, Module 2 ITM 501: Mgt. Info. Syst. And Bus. Strategy Trident University Dr. James Marion, Core Professor October 25, 2011 To have a successful organization in today’s economy; employees must be given the tools needed to keep up with the changing market. Many top executives have made tough decisions and have made good decisions and poor decisions along the way regarding Business Intelligence. Business Intelligence (BI) is a term that refers to a variety of software applications used to analyze an organization’s data. It is a discipline made up of several activities, including data mining, analytical processing, query and report writing. This paper will discuss two Business Intelligence case studies and lessons learned from the studies regarding creating, implementing, and using business intelligence. LESSONS LEARNED Reviewing Marshfield Clinic’s early investment in an electronic patient records system is a concern. Although many clinics are turning to electronic patient records now, an early investment may mean that the system they elected to implement is not capable with newer technologies that management may want to incorporate in the future. Not anticipating changes and making preparations for it could cause issues later. Because this system has been utilized by the clinic for a period of time, did they...
Words: 307 - Pages: 2
...Adapted from Bernhardt & Kinnear (1988). Cases in marketing management, pp. 6-16. Plano, TX: Business Publications, Inc. Pay careful attention to the following points. They are often used by instructors to evaluate either a written or oral analysis. 1. Be complete. Each area of the situation analysis must be discussed, problems and opportunities identified, alternative presented and evaluated using the situation analysis and relevant financial analysis, and a decision must be made. An analysis that omits part of the situation analysis or only recognizes one alternative is not a good analysis. Second, each area must be covered in-depth and within insight. 2. Avoid rehashing case facts. Every case has a lot of factual information. A good analysis uses facts that are relevant to the situation at hand to make summary points of analysis. A poor analysis just restates or rehashes theses facts without making relevant summary comments. 3. Make reasonable assumptions. Every case is incomplete in terms of some piece of information that you would like to have. A good case analysis must make realistic assumptions to fill in the gaps of information in the case. For example, the case may not describe the purchase decision process for the product of interest. A poor analysis would either omit mentioning this or just state that no information is available. A good analysis would attempt to present this purchase decision process by classifying the product and drawing upon real life...
Words: 487 - Pages: 2
...efficient investigative products and services. As a result, the coverage requirements for ANACI and NACLC investigations have been enhanced to support a common content baseline for all agencies. Note that these enhancements apply only to those ANACI and NACLC cases submitted on an SF 86. The purpose of this FIN is to provide you with information concerning what case coverage changes have been made. The case price adjustments necessary to support these changes will be reflected in the FY 2007 case prices. ANACIINACLC Cases Currently, listed and developed issues which are identified in ANACI and NACLC cases (for non-DoD customers) are not pursued beyond the normal scope of the investigation. These cases are returned to the requesting agency so that the agency may decide whether to adjudicate the case based upon the information in hand, conduct additional follow-up themselves, or request a Reimbursable Suitability Investigation (RSI) from FISD to cover the additional issues. Beginning with FY 2007, expansion of these issues will become a standard part of both the ANACI and NACLC products. Effective October 1, 2006, issues apparent at scheduling or developed during the course of the investigation and which fall within the 5-year case coverage period, unless otherwise noted, will be expanded upon according to the following chart (exception: issues which are known to have been covered in previous investigations, or which would reasonably have been expected to...
Words: 772 - Pages: 4