...Measuring the value of IT investments solely through an organization’s financial results can be a difficult task. Valuing IT often requires in depth knowledge of the organization’s IT structure and the uses of IT rather than the ability to simply calculate random metrics like ROI. Clearly, there could be factors other than IT that contribute to the growth of the organization. Nevertheless, IT often serves as a critical source for creating efficiencies and the development of a competitive advantage for many companies. Initially, when IVK was a small organization, most of the IT investments (90%) were directed towards achieving business objectives by developing applications. These initial investments helped the organization gain some competitive advantage, and then later when IT operations gained scale, most of the investments (60%) were made for improving infrastructure. These investments in IT infrastructure were critical for successfully maintaining the applications which were developed initially. However, fewer investments have been made to develop new applications and respond to customer’s current needs. Our memo presents a detailed view of IVK’s current IT investments/spending and explains how these investments are adding to the value of the company. Furthermore, we present the issues identified in the IT department’s cost management procedures and outline suggestions for improvement of these processes. IT Spending – The current landscape at IVK Last year, the money spent...
Words: 595 - Pages: 3
...F E D E R A L R E S E R V E B A N K O F AT L A N TA Merchant Acquirers and Payment Card Processors: A Look inside the Black Box RAMON P. DEGENNARO The author is the SunTrust Professor of Finance at the University of Tennessee and a visiting scholar at the Federal Reserve Bank of Atlanta. He thanks Jerry Dwyer, Dick Fraher, Scott Frame, Will Roberds, and Lynn Woosley for useful comments and discussions. He is grateful to Timothy Miller and Mario Beltran of NOVA Information Systems for explaining important institutional details and to Lee Cohen and Victoria L. Messman for research assistance. L ike most consumers, you probably take your credit and debit card transactions for granted. You and others like you carry millions of cards and use them billions of times annually. But unless a transaction goes awry, you rarely think about how your cards work. In fact, a great deal happens after you produce your card to pay for a purchase and before the merchant receives funds and you receive your bill. What happens during the few seconds between the time you swipe your card and the terminal flashes a result? How does that swipe translate into a line on your bill from the institution that issued the card? When making a purchase using a card online or over the telephone, why are you sometimes asked for the three- or four-digit number printed on the back of the card, the card’s expiration date, or arcane information such as your mother’s maiden name? From the merchant’s perspective...
Words: 9225 - Pages: 37
...electric. Summit was continuing to grow and was beginning the outgoing the legacy information system that were built in 1980. Summit SAP software also produce a significant return on investment from automating sales tax processing and chargeback. As we talk about chargeback, it is a most important and large part of the wholesale distribution channel of equipment in profit model. In that situation summit electric was losing the revenue opportunity only because of its chargeback process was damaged and the other reason was reporting ability was incomplete. In addition, summit workers have to work on opening through client’s bills for particular manufacturer to identify which chargeback the company could claim. By the sometime the vendors of the summit electric responded to the chargeback invoices, as per talk the bills were three of four months old. In that case as a part of ERP solution, summit electric putted the SAP paybacks and chargeback application and this application was specifically for the vender industries. The SAP system NEW PROCESS, this process of chargeback is much more flexible and quick and it also makes possible to review them faster than another. When the vendor exchanging the data with summit electric it is easy to make a chargeback claim and gain the vendors approval the same day. So it is so fast and quick process for company. As up to now summit electric can see and check easily that which provider,...
Words: 1338 - Pages: 6
...1. 1. G S T 5 0 8 3 INFORMATION SYSTEMS & ELECTRONIC COMMERCE Group Members 2. 2. • Summit Electric Supply Co., Inc. engages in the wholesale distribution of electrical equipment, supplies, and solutions for the electrical professionals in the United States and internationally. • This company is one of the top wholesale distributors. Summit obtains finished goods from manufacturers and sells them to electrical contractors working on projects ranging from small construction job to sophisticated industrial projects. • This company was known as middle on the supply chain, so it must be able to handle high volume of transactions and swift inventory turnover. • However, the information built in the 1980s could not keep up with the business growth, it could only handle a fixed number of locations and limited the range of numbers that could be used on document. Introduction 3. 3. Question 1 : Which business processes are the most important at Summit Electric Supply ? • The company is known as a one of the top distributors, Supply chain management played the most important business process at Summit Electric. Supply chain management (SCM) is the management of the flow of goods. • It includes the movement and storage of raw materials work-in-process inventory, and finished goods from point of origin to point of consumption. 4. 4. Why ? • The reason business processes are the most important is both manufacturers and end users rely on distributors to efficiently bring products...
Words: 1489 - Pages: 6
...Further, the individual using the card has no connection with the cardholder or issuer, and has no intention of either contacting the owner of the card or making repayments for the purchases made. Credit card frauds are committed in the following ways: * An act of criminal deception (mislead with intent) by use of unauthorized account and/or personal information * Illegal or unauthorized use of account for personal gain * Misrepresentation of account information to obtain goods and/or services. Opposing to popular belief, merchants are far more at risk from credit card fraud than the cardholders. While consumers may face trouble trying to get a fraudulent charge reversed, merchants lose the cost of the product sold, pay chargeback fees, and fear from the risk of having their merchant account closed. Increasingly, the card not present scenario, such as shopping on the...
Words: 1878 - Pages: 8
...After extensively reviewing ERP vendors, Summit selected ERP software from SAP because of its functionality in sales and distribution, materials management and financials, and its knowledge of the distribution business. Summit visited other electrical distributers using SAP, including some of its competitors, to make sure the software would work in its line of business. Summit was able to go live with its new ERP system across 19 locations in January 2007. Nevertheless, Summit still had to customise its SAP software to meet its unique business requirements. Most SAP delivery and material scheduling functions were designed for overnight processing, because many industries have longer lead times for order fulfilment. Waiting for overnight inventory updates would significantly delay Summit’s sales. Summit found it could solve this problem by running smaller, more frequent updates for just the material received during the day, rather than running big inventory updates less often. This provided more timely and accurate snapshots of what was actually available in inventory so that orders could be rapidly processed. Wire and cable are one of Summit’s most popular product categories. Summit buys these products by the reel in lengths up to 5,000 feet and then cuts them into various lengths to sell to customers. This makes it difficult to determine how much of this type of inventory has been sold and when it is time to replenish. To address this issue, Summit used a “batch management”...
Words: 622 - Pages: 3
...activity-based system was more useful than simple system or not. Although it still has some arguments about usefulness of simple costing system and activity-based costing system on allocating cost, there is no doubt that each system had its own benefits and helped managers managing overhead and understanding profitability of products and customers, is a powerful tool for decision making. The main purpose of this assignment is providing a general evaluation on Boeing’s voice telecommunication services through activity-based and simple systems. Our assignment will cover all of advantages and limitations of each voice chargeback system with the objective appreciation. 2. Three voice telecommunication costing system: Boeing company used three different systems through 3 periods: prior to 1995, 1995-1998, 1999 3.1 Overview about three system: Prior to 1995: The old chargeback system is the system that too much detail...
Words: 2351 - Pages: 10
...have profit margin of 20% from 5th year onwards • To have annual sale of $80,000 from 3rd year. As the website selling ebooks is an online business, the risks associated with the business are moderate. There are some situations that presents high risk such as hacking attempts, fraud transactions, money chargebacks and customer password compromise. The tolerable risk level is moderate because investment would be made in SSL certificates to ensure Objectives of the Risk Process: The short-term goals of the project are; • To achieve break-even in first year • To have minimum traffic of 50,000 visitors in first six months and a traffic of 20,000 visitors every month from sixth month till one year • To have the sales of minimum $10,000 in first year • To generate additional advertising revenue of $1,000 in first year. The long-term goals of the project are; • To have profit margin of 20% from 5th year onwards • To have annual sale of $80,000 from 3rd year. As the website selling ebooks is an online business, the risks associated with the business are moderate. There are some situations that presents high risk such as hacking attempts, fraud transactions, money chargebacks and customer password compromise. The tolerable risk level is...
Words: 332 - Pages: 2
...White Paper November 2006 BMC® Best Practice Process Flows for Asset Management and ITIL Configuration Management Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names, BMC Software, the BMC Software logos, and all other BMC Software product or service names, are registered trademarks or trademarks of BMC Software, Inc. All other trademarks belong to their respective companies. BMC Software, Inc., considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable end user license agreement or nondisclosure agreement for the product and the proprietary and restricted rights notices included in this documentation. Restricted Rights Legend U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section 52.227-14, DFARS 252.227-7013, DFARS 252.227-7014, DFARS 252.227-7015, and DFARS 252.227-7025, as amended from time to time. Contractor/Manufacturer is BMC Software, Inc., 2101 CityWest Blvd., Houston, TX 77042-2827, USA. Any contract notices should be sent to this address. Contacting Us If you need technical support for this product, contact Customer Support by email at customer_support@bmc...
Words: 5623 - Pages: 23
...business strategy with a more reconciled IT procedure. The new steering committee reflects an abnormal amount of executive inclusion. It may as well now have the capacity to better prioritize ventures and furnish more center to IT activities. The extent that the impediments, progressing correspondences and preparing around the IT staff will be more challenging with a decentralized structure. Imparting of IT knowledge around the staff will require more exertion since they are more spread out all around the organization. Also, the IS section may have more challenge getting financing since all divisions must vie for constrained funding. Then again, the IS section may be less responsible for its exercises or tasks that have gone harsh than if a chargeback subsidizing framework had been utilized since the business unit heads might be precisely following each upkeep. That is the reason it is paramount for Cooper to serve on the committee. 2. What problems was Cooper trying to solve with the new IS structure? How successful do you think the new structure will be in solving these problems? With the new structure, Cooper was attempting to address the diminishing profits of the organization because of the expanded IT using. Business units were permitted to purchase...
Words: 1399 - Pages: 6
...2. How should the company recognize revenue based upon the two possible FOB structures mentioned in the contract? Option 1: FOB shipping point: Recognise revenue when shipment leaves Manitoba, provided that Biovail does not retain any significant risks of ownership or future obligations. Biovail recognized revenue when the product was shipped to the customer provided that it has not retained any risk of ownership or future obligations when the product has been shipped to the customer. The revenue so recognized is recognized net of reserves for estimated product returns, recalls, rebates and chargebacks. These reserves are estimated at the beginning of the transaction and based on estimates of the proportion of product sales subject to return, recall, rebate or chargeback. This implies that Biovail should recognize the revenue relating to the shipment when the truck leaves the manufacturing facility in Manitoba, Canada on 30 September 2003. Note that here we assume that the requirements relating to SAB101 has been satisfied, namely: 1) Persausive evidence of an arrangement exists; 2) Delivery has occurred or services has been rendered 3) The sellers price to the buyer is fixed or determinable 4) Collectability is reasonably assured/ Option 2: FOB destination point: Recognise revenue when shipment arrives in North Carilina As per Kennith Howling, the revenue recognition policy of Biovail is not correct. He claims that risk of loss and ownership...
Words: 336 - Pages: 2
...American University of Nigeria School of Information Technology and Communication INF 402 Group Work Group Members * Amina Ramallan A00011501 * Abdulrazak Gashash A00011462 * Ibraheem Babalola A00010481 * Victory O. Okurakpo A00013215 Abstract Although the application of Information and Communication Technology (ICT) in rural areas can be advantageous, there are also some limitations that may hinder the development of these areas. This study aims at identifying the problems that are caused by ICT in the application of electronic commerce and electronic business in rural Nigeria. The paper will point out these limitations and give solutions to each, thereby ensuring a smooth development process. The following limitations were found: System scalability and available customers, fraud and identity theft, delivery time and uncertainty, trust and customer satisfaction. Key words: Electronic commerce, Electronic business Methodology: The method used in this research is Internet research and personal observation. Solutions To The limitations Of E-commerce And E-business According to Wikipedia: “Electronic commerce consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. It is more than just buying and selling products online. It also includes the entire online process of developing, marketing, selling, delivering, servicing and paying for products and service”. Wikipedia also...
Words: 2345 - Pages: 10
...1.1 Introduction Standard Chartered Bank first started its acquiring services in Bangladesh for Visa International in1988 and then Master Card in 1991. At that point of time, ANZ Grindlays Bank had only a few premium Merchants (e.g., Pac pacific Sonargaon, Dhaka Sheraton Hotel & Aarong) to facilitate the card acceptance for the tourist and expertise in Bangladesh. Now after years together of technological expansion, the prosperity of business lies in the adherence of more technological facilities. Business man slowly grabbed this idea in Bangladesh. More young people joined the queue in business, more advancement in technological use. At present the scenario has changed more people want to facilitate EFT POS in their premises. Standard Chartered Bank, pioneer in EFT POS service has got their trend to make it popular and secure. From the merchants view point it will serve them safe accounts transactions and it will also protect them from the risk of carrying money. They can call the bank, supporting agency for the POS for their calculations. In this case study it will be described elaborately. 1.2 Back Ground of Study The study is leading from a succession of events where people first started dreaming of transferring money without carrying it physically. The dream came into reality with the advancement of science. The invention of Electronic fund transfer point of sales (EFT POS) device and its worldwide adaptation. 1.2.1 POS Machine and its values POS...
Words: 4007 - Pages: 17
...Running Head: You Decide: Book Bunker You Decide: Book Bunker DeVry University June 15, 2014 Table of Contents Executive Summery3 How E-Payments Work4 E-Payment System Review5 Security Suggestions6 Executive Summery Book Bunker is a book store specializing in rare and used books. Established twenty years ago, in a small town, the book store grew and expanded. Recently Book Bunker has implemented an online presence, including their own website and is now looking for a secure online payment system to prevent losing any further online sales. This report will explain how an e-payment system works along with three researched e-payment systems recommendations. In addition, security suggestions for Book Bunkers website and e-payment system to secure their database and customer transactions will be discussed. In attempt to help Mary and Joe decide what e-payment system to use, I have made three recommendations including Authorize.net ,Wepay, and PayPal. I believe the information I’ve provided will give your business the direction it needs to choose the right e-payment system. How E-Payments Work There are many online payment service providers (PSP) available today, most of them accepting all major credit cards. Online credit card payments work by a customer imputing their credit card information into the payment system data base, acting as a promise to pay. The PSP the contacts the bank that issued the credit card who then authorizes the credit card. Many...
Words: 777 - Pages: 4
...KFF Week 3 Pt 2 Sean Rachubka NTC/362 KFF Week 3 Pt 2 When it comes to communications between devices, there is a requirement in which the devices will agree on the format of the data being used. Communications protocols must adhere to the following; the rate of transmission either in baud or bps. The transmission is to be synchronous or asynchronous. Also, the data is to be transmitted in half-duplex or full-duplex mode. Baud transmission is the number of signaling elements that occur each second. At slower speeds, only 1 bit of information is encoded in each electrical change. When saying 1500 baud, it means that 1500 bits are transmitted each second, this is also shown as 1500bps. Communication protocols can also describe the syntax, semantics, and synchronization of analog and digital communications. Communications protocols are implemented in hardware and software. There are thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking. It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either copper...
Words: 838 - Pages: 4