Free Essay

Cool Care Manufactures in Botswana

In:

Submitted By Lingi
Words 5480
Pages 22
MIS – Cool Care Manufacturers in Botswana

Table of contents

Introduction………………………………………………………………………………1
Introduction of the proposal to the Board…………………………………………………1
Background of the organization/department………………...…………………………….2
The Existing System (Critical analysis and evaluation)…………………..………………2
Part A: Systems Analysis………………………………………………………………….4 1. Problem description……………………………………………………………….4 2. Feasibility Study………………………………………………………………….5 3. Cost Benefit Analysis……………………………………………………………..6 4. Information Requirements………………………………………………………...7
Part B: Systems Design and Development………………………………………………..8 2.1 Proposed IT Infrastructural Design (Hardware and Software)……………………8 2.2 Networking and Telecommunication options…………………………………….9 2.3 Storage…………………………………………………...………………………11 2.4 Back up……………………………………………………………………..……11 2.5 Security…………………………………………………………………………..12 2.6 Systems functionality…………………………………………………………….13
Part C: System Implementation………………………………………………………….14 3.1 Systems Testing………………………………………………………………….14 3.2 Implementation strategy………………………………………………………….15 3.3 Resolution of problems………………………………………………………..…16
Part D: Systems Maintenance……………………………………………………………16 4.1 Maintenance Procedures…………………………………………………………16 4.2 Updating and Upgrading…………………………………………………………18
Conclusions and Recommendations …………………………………………………….18
Bibliography ………………………………………………………...………………….19
Appendix A …..…………………………………………………………………………20

Question 1
Using the structured systems analysis and design approach, prepare a proposal for an information system (IS) at Cool-care manufacturers in Botswana. The document which is to be presented to the Board of Management must propose an IS design and inform board members about the value adding dimensions of an IS at Cool-care as well as the procedure involved in systems development.

Introduction

According to Bentley and Whitten (2007:34) information systems in an organisation captures and manages data to produce useful information that supports an organisation and its employees, customers, suppliers and partners. Schach (2004:5) is of a similar view that information systems is a system that achieves business outcomes by collecting, manipulating, storing and reporting information regarding business activities, in order to assist the management in managing the operations of the business.

Introduction of the proposal to the Board

In the ever growing business environment, demands such as aggressive cost control initiative, the need to analyse costs or revenue on a product or customer basis, flexibility to respond to changing business requirements, informed business decision making and changes in ways of doing business necessitates organisation to take steps to act.

The company profile show that the scope definition for our project is triggered by a number of challenging problems and opportunities. Difficulty in getting accurate data, timely information and growing business needs, application and planning systems have been introduced into the business world for clearing hurdles and enhancing required growth. It is impossible to create and maintain a custom designed software package that will cater for all your requirements Enterprise Resource Planning software can offer a

1 cohesive software solution across all company functions. ERP seeks to integrate operation processes and information flow in the company.

Background of the organization/department

Cool-care manufacturers were established in May 1997 and are based in Gaborone, Botswana. It manufactures compressors used in motor vehicle air-conditions units. There are four departments which are human resources, operations, sales and finance with a total capacity of 412 employees including 34 mangers. Only 113 employees have access to a computer and 12 printers. Cool-care has seven international customers in Motor Manufacturing business who are already digitally enabled. The annual sales were $17.5 million in 2008. The increasing inefficiency of legacy system contribute to information inconsistency, unavailability and accessibility across the organisation coupled with peer-to-peer network system and unavailability of a website. The personal computer used for a server does not have the capacity to sustain the company data and is insecure. Poor control and management of information due to independent information storage.

The Existing system

The existing legacy system faces a number of challenges in running business activities due to unreliable infrastructure, network systems, database servers, storage or personal computers to assist with the day-to-day business processes. An Information Technology department does not exist to support and maintain information technology infrastructure, their international customers are digitally enabled, and information management and control arises from poor data quality in giving satisfactory customer service, inaccurate inventory and lost orders. Lack of data sharing between functional departments and timely availability inhibits information sharing thereby slowing company growth. Unavailability of a website contributes to difficulty in winning or looking for new business prospects.

2
The limitations of a legacy system is which inhibits managers from having timely information for decision making and making forecasts. This contributes to reduced revenues and potential loss of customers. Independent functional data storage has draws backs of file duplication, data redundancy and inconsistency which leads to lack of data sharing and availability of timely information therefore affecting the opportunity innovation, poor understanding of market dynamics and market growth. The peer to peer network system warrants poor security and management data control resulting in the vulnerability of company information to loss, theft or being tempered with by unauthorized individuals. The server lacks the capacity to sustain massive data storage for a long time which can be costly because more servers need to be added to accommodate ever increasing information and wastage of space. Unavailability of a website to advertise its products and services to the global business environment makes it lose the opportunity to increase clientele base, suppliers and opportunity to discover new markets and growth. Management’s performance is affected because the valuable timely information needed to analyze customer purchasing patterns and preferences, planning, decision making and achieve the company goals cannot be attained easily due to the hurdles contributed by the legacy system.

By comparison with the legacy system, a fully integrated information system can produce benefits to Cool-care such as: a) operational excellence in achieving higher levels of efficiency and productivity in business processes; b) improved the quality and efficiency of customer service, production and distribution through integrated and improved internal business processes; c) provides cross-functional information on business performance to assist mangers in making better decisions; d) customer and supplier relationship is reinforced through providing consistent customer service experience; e) faster decision making through provision of timely information thereby making

3 informed decisions, improve planning and allocation of resources accordingly; f) helps the company identify, reward and market to their most loyal and profitable customers; g) survival in the market is enhanced through network systems and online website as its international clients are digitized (Laudon and Laudon, 2010:43-45).

Part A: Systems Analysis

1.1 Problem description

The current legacy system is a combination of obsolete applications which service the firm’s operational day to day processes. A website needs to be created to enable the company’s survival and compete in the current global environment. The peer to peer network is limited and should be upgraded to local area network to enable many personal computers and workstations to be connected to share resources and communicate with one another (Bentley and Whitten, 2007:485). A centralised database server will enhance business services as the finance and sales departments will work faster on requests, order and calculations. The company can also cut costs of keeping good customers through accessibility of consolidated view of the customers’ needs and their performance. Database management systems solves the traditional filing system in alleviating data redundancy, inconsistency, reinforce management control and security. Customer relationship management system helps incorporate some of the independent data into single information. It would also solve administration’s use of traditional filling system which may result in data loss, file duplication and redundancy.

Enterprise applications are costly but some measure of information integration can be achieved using intranet and extranet which connects employees with each other or external users. It is cost effective and requires very little work to maintain (Laudon and Ladudon, 2010). The enterprise resource planning solutions seeks to integrate and automate many business processes and information systems.
4
ERP include tools like decision support systems, executive information systems and data mining for decision making and this improving business processes. Supply chain management assist all movement and storage of raw materials collaborates with supplier and customers, plan production based on actual customer demand and reduce inventory, transportation and warehousing costs (Laudon and Laudon, 2010:373). Customer relationship management systems, according to Laudon and Laudon (2010:87) help companies manage relationships with their customers and consolidate customer information from many communication channels.

The systems developed should be able to interface with existing legacy data and computational systems that are already running.

1.2 Feasibility study

Laudon and Laudon (2010:516) define feasibility study is undertaken to determine whether the solution is feasible, achievable for financial, technical and organisational standpoint.

Organizational feasibility involves efforts to ascertain how the system is going to affect Cool-Care Manufactures stakeholders. Having conducted a survey on the main stakeholders to establish how the system is going to affect them and how they perceive these anticipated effects, and found out that it is going to positively affect the duties and roles of management. The success of management largely depends on the disposal of information and one of the objectives of this project is to improve the quality and flow of information as well as to incorporate decision-making supporting mechanisms. The employees’ morale among Cool Care Manufactures staff members will be boosted due to the alleviation of the legacy system.

Operational feasibility is to establish the urgency of the problem and the acceptability of the proposed solution by its systems users as communication is important in sharing a
5
language Crowe, Beeby and Gammack (1996: 98-108). In order to achieve this and to establish whether the managers and users would accept the proposed solution, we first found out how they both feel about the system. It turns out that they both equally feel that it has out-lived its purpose and something needs to be done. I went on to explain the proposed solution and gave an abstract overview of how it is going to solve some of the identified problems, at the same time getting feedback about how they feel about this idea through use of questionnaires and group meetings. Most of those presented with the idea were pleased that something was about to be done though a minority were sceptic about the proposed system being locally developed and lose of jobs.

Technical feasibility is performed in order to assess whether it’s technically feasible to support the project in terms of hardware, software and technical expertise. Technical Feasibility is inclined on the technical expertise and the availability of the equipment to be used and competent to produce the specified product.

The new systems will address the requirements of owners by making data more organized, easier to retrieve and enhance performance. Both management and staff feel that the system needs to replace the legacy system which concludes that the project is operationally feasible.

1.3 Cost benefits analysis

Cost benefit analysis is a system for calculating and comparing benefits and costs for two purposes, to determine if it is a sound investment and to see how it compares with alternate project. It is an analysis of the cost effectiveness of different alternatives in order to see whether the benefits outweigh the costs.

Use of a computerized management information system, manual filing will be replaced by a database management system, once the program is implemented costs will not be above average costs of maintaining any other system and tried and tested solution can
6
prove to be cheaper and reduce costs if the appropriate package is purchased. Improved decision making capabilities will be incorporated as desired as well as customer relations features will be incorporated like web site development, customers queries can be posted online and quality flow of information. The hardware and software selection has to be compatible with the requirements of the owners such as server, network system that is standard and easy to maintain, latest operating systems and security maintenance. Buying could be a bit costly for hardware but there are other computer vendors who lease and maintain their hardware which could be cheaper in a way. There are open source software which can be used to manage and maintain security and protect company systems from invaders, these are free and can be downloaded form the internet.

The benefits derived are reduced to errors and cost, increased operation, flexibility and timely consistent information for decision making. Communication is improved thereby transactions and agreements can be done more swiftly without having too much money

1.4 Information requirements

According to Bentley and Whitten (2007:83) the requirements analysis does not specify any technical possibilities or solutions and that the systems analyst has to work closely with systems users to identify needs and priorities. Laudon and Laudon (2010:516) argue that faulty requirements analysis leads to systems failure and high systems development costs, therefore thorough investigation and causation needs to be observed. The new system should provide:
• Database servers to record different functional information to appropriate users on time, adjust and correct error promptly;
• Should handle the accessibility of the employees in effective manner and fast data access;
• Provide tools that enable a business and its employees to provide fast, convenient, dependable, consistent service;

7
• Informative website to target regional and international new markets and enhance company growth and profits;
• Support daily operations smoothly and easily and standardization of information;
• Support management decision making processes and planning;
• Client computer specifications must have the latest versions if we are to replace personal computers that are durable and capable;
• Provide customer-facing employees with single, complete view of every customer at every touch and across all channels;
• Network system that connects management, employees, customers and suppliers thereby reducing costs.

These need to be compatible and build the legacy system to minimize costs and time.

Part B: Systems Design and Development

2.1 Proposed IT infrastructural design (Hardware and software)

According to Laudon and Laudon (2010:45) information technology consist of all types’ hardware and software that a firm need to use in order to achieve its business objective. The information technology is made up of seven components which should be coordinated to provide the firm with coherent infrastructure (Laudon and Laudon, 2010:203). [pic]
Source: (Laudon and Laudon, 2010:203)
8
Software includes operating system software, Web browsers, software productivity suites, database management systems, software for business applications like customer relationship management and supply chain management. The following are software requirements for Cool-care:

• Database management and storage – SQL Server • Internet platform – Microsoft IIS • Operating system – Microsoft Windows XP • Enterprise software applications – SAP • Network/Telecommunication –Microsoft Windows Server/Verizon

2.2 Networking and Telecommunication options

Network telecommunications technology consist both physical devices and software, which links the various pieces of hardware and transfers data from one physical location to another (Laudon and Laudon, 2010:51). Client/server computing network and use of packet switching integrates computing across the entire Cool-care company (Laudon and Laudon, 2010:280). [pic]
Source: (http://www.google.com/images)

The networking requirements for the ideal system are based on: ◆ Performance ◆ Consistency ◆ Flexibility
9
◆ Availability ◆ Reliability ◆ Recovery ◆ Security
Network topology is defined as the physical interconnection of the various elements of a computer network, which can be a physical design including the devices, location and cable installation or logical, how data actually transfers in a network as opposed to its design. The rules and regulations of communication as well as the language of communications are collectively called access protocol and communication protocol. The most popular hardware protocol available for Local Area Network is Ethernet and the Transmission Control Protocol or Internet Protocol is for communications protocol.
A bus topology links a number of computers by a single circuit; failure of one does not affect the entire network and is used for a small network that is not expected to grow much. In a star topology all computers and other devices are connected to a central host computer. It is easy to modify and add new computer to the network. If the central hub fails then the entire network is down and is used for a large network which is expected to grow in future. In a ring topology each computer is connected to the next computer in line forming a circle of cable which uses a token to pass information. Failure of one computer can affect the whole network and requires a higher speed network. A mesh topology has a dedicated point to point to every each device. Failure of one node computer does not affect the network by is expensive due to the amount of cabling

To improve the networking systems requires a client/server networking technology that uses packet switching, transmission control protocol/internet protocol for linking desperate networks and computers. A local-area network with a star topology would be ideal to connect all computers in several buildings in close proximity, can link to wide-area networks, internet or other networks (Laudon and Laudon, 2010:283). Cool-care would be able to hold conferences with its international customers and share information with its employees.
10
2.3 Storage

Laudon and Laudon (2010:205) state that there are a few choices for enterprise database management software for organising and managing the firm’s data so that it can be efficiently accessed and used such as DB2, Oracle, SQL server, Adaptive server enterprise and MySQL, a Linux open source and Storage-area network. Companies can use different types of store their data depending on their business processes such as:

a) Hard disk storage which have low access times, availability, capacity; b) External hard drive c) Optical disk is recordable CD and can be restored on any machine with a CD-ROM drive and is cheap and rewritable’s such as DVD-Ram and CD-RW ; d) Floppy disk has a low data capacity which makes it an unpopular and obsolete choice today; e) Flush memory, thumb drives, USB flash drives, Compact Flash, Smart Media, Memory Stick, Secure Digital cards, etc., these devices are relatively costly for their low capacity but offer excellent portability and ease-of-use; f) Remote backup services, backs up data via internet to a remote location are gaining in popularity; g) Magnetic tape can be used for bulk data storage, backup, archiving and interchange; h) Network based storage technologies such as storage area networks (Laudon and Laudon, 2010:205).

For Cool-care’s, storage area networks would be ideal as it creates a large central pool of storage that can be rapidly accessed and shared by multiple servers, cost effective and is reliable in case of a crash data will not be lost.

2.4 Back up

The process of backing up refers to making copies of data which will be used to restore
11
the original in the event of loss, accidentally deleted or disaster such as: • Traditional backup software simply copies critical business data; • Blade servers are cheaper and easier; • IBM mainframe computers are more expensive and require Unix software; • A backup site or data recovery center can be another location operated by the organization, or contracted to a third party such as Symantec Backup Exec 2010; • Floppy disks or CD-R/DVD-R media which takes minimal information; • Microsoft SQL Server 2000 is a relational data model that adequately provides the levels of data independence and includes services to facilitate the changes; • Symantec Enterprise Vault automates the migration, storage and retention of unstructured information in accordance with IT policies while improving performance, reducing costs and simplifying management.
Microsoft SQL Server 2000 is a management system that provides backup services to improve reliability, has a wide range of data types, permits concurrent access, spontaneously updates and edits a new transaction.
2.5 Security

There are four security requirements widely agreed on (Parker, 1981, 1988) discuss confidentiality, integrity, availability of information should only be made available to authorized personnel and (Chokhani, 1994; Rohm, Pernul and Herrmann, 1988) came to a similar conclusion about non-repudiation being important in enabling financial transactions and data interchange which are keys to electronic commerce. Laudon and Laudon (2010:323) refers security to policies, procedures and technical measures used to prevent unauthorized tempering, damage to information systems and managements standards. Types of security are:

• Firewalls prevent unauthorized users from accessing private networks which is a
12
combination of hardware and software that controls the flow of incoming and outgoing network traffic. Cisco Pix, Symantec firewall and Sonicwall are commonly used for corporate environment and are very expensive; • Antivirus software is defensive technology for both individuals and businesses and these must continually be updated to remain effective and antivirus software vendors are McAfee, Symantec and Trend Micro as well as Norton and AVG open source; • Antispyware software tools such as Ad-Aware, Spybot S&D and Spyware Doctor are used in combination with antivirus software; • Encryption and public key infrastructures are used to protect digital information sent over the internet enables the client and server computer to communicate securely; • Access control are polices and procedures used to prevent improper access to systems by unauthorized insiders and outsiders and users must be authorized and authenticated; • Authentication established by password systems, tokens, smart cards and intrusion detection systems (Laudon and Laudon, 2010:345-347).

2.6 System functionality

According to Laudon and Laudon (2010:340) a good acceptable use policy defines unacceptable and acceptable actions for every user and specifies measures for noncompliance. An authorization policy determines different level users who can access to information assets and authorization management systems establish permission to certain parts of the corporate database. User rights are put in place to protect privileged information of internal users e.g. employers and customers’ information.

Bragg (2004:526) is of a similar view that systems functioning user rights are defined by domain controller security policy. The important thing is not to give full right to users, default settings maybe adequate and additional user rights must be given after a thorough
13
investigation. Companies have policies and procedures in place to control and prevent improper access to systems by unauthorized insiders or outsiders e.g. staff in human resource department some have user rights to access employee benefits information and some have access to update employee information e.g. contract extensions. Laudon and Laudon (2010:344) argue that user access or rights must be authorized and authenticated using a password only known to the user.

Maintaining a secure password is sometimes difficult due to sniffing, sharing them or poor password that easy to guess hence new authentication technologies have been device such as tokens a device for a single user like identification card, smart cards like credit cards that which reads and interpret individual human traits such as finger prints, irises or voice to grant access.

Part C: System Implementation

3.1 Systems testing

There are three testing methods that can be used for systems testing which are unit testing, systems testing and acceptance testing (Laudon and Laudon, 2010:518 and Bentley and Whitten, 2007:709).

Unit testing or program testing are were individual components of the system are tested independently without other system components to locate errors and trying to find all ways to make a program fail as there is no program that is error free. Once the errors are found they are rectified. Systems testing ensure that the entire application of which the modified program was a part still works or there are any discrepancies to the way the system works and the way it was programmed as well as checking performance time, file storage capacity, handling peak loads, recovery and restart capabilities and manual procedures. They are evaluated by users and reviewed by management.

14
Acceptance Testing determine whether functioning as per user requirements and ready to be used in a production setting. Once all parties are satisfied the system is formally accepted for implementation.

The system testing is a better method as it tests the modified program and the main users are the role players. Also considering their business operations, there is need to check the entire program and rectify any errors.

3.2 Implementation strategy

According to Laudon and Laudon (2010:521) conversion is the process of changing from a legacy system to the new system and four strategies may be used. The parallel strategy allows both the legacy system and the potential replacement to run concurrently for a time until everyone is satisfied that the new functions are correct. This strategy is safe in case of errors or processing disruptions the old systems can still be used as backup though is very expensive as additional staff or resources may be needed. The direct cutover strategy replaces the old legacy system completely with the new system on an agreed dated. This can be risky compared to running two systems at the same time in the event that serious problems are found. As there would be no system to fall back on while rectifications are made can be very expensive and time consuming. The pilot study strategy introduces the new systems to a section of the organization e.g. human resource or operations department. Once the new system is operating correctly the new system can be implemented through the entire organization or can be in stages. The phased approach strategy introduces the new system in stages such as stating with the headquarters and then moving down until the whole organization in installed.

As Cool-care’s legacy system has been running though obsolete I would recommend the pilot study approach as it is not very expensive and there is a back when things go wrong. Also the installation of the new system will be installing once and for all once all the errors have been rectified in the pilot study phase.
15
3.3 Resolution of problems

Laudon and Laudon (2010:422) defines call centre as an organizational department responsible for handling customer service issues by phone, email or other channels which is cheaper than a live customer representative. Bentley and Whitten (2007:709-10) discusses the system recovery methods to resolve problem such as the systems analyst acts as intermediary between the user and those who can fix the systems. The roll forward method is used to recover lost data between the last back up and the database’s reprocessing recovery. In cases where a crash occurred during a transaction, then any updates done to the databases before the crash must be undone before reprocessing the complete transaction using the roll back method.

The other technique to resolution of problems is to call technicians or vendor service representatives to fix the hardware problems or the analyst will automatically or by coaching users to manually avoid a software bug or debug. Technical support is provided to users routinely, conducting user-satisfaction surveys and meetings, providing additional training as necessary and logging enhancement ideas and request in the repository.

As Cool-care is a manufacturing company dealing with international motor manufacturer, having a call centre would prove to be a worthwhile move as it quickly responds to client queries regarding also time difference between countries.

Part D: System maintenance

4.1 Maintenance procedures

Once the system has been installed it needs to be maintained. Outsourcing can be used to maintain a system. There are three external sources for software maintenance which are

16 software packages from a commercial vendor, software services from online provider and outsourcing custom application development to an outside software firm (Laudon and Laudon, 2010:217).

Software package is a prewritten, predesigned and pretested commercially available program which organization can buy to use instead of writing up its own software. SAP and Oracle-PeopleSoft are vendors that have developed these software to support business processes of a firm worldwide at a cost less than developing it themselves.
Package vendors provide ongoing maintenance and support. A company can customize its unique requirements as the vendor packages include capabilities for customization. It can be expensive and time consuming if additional programming is required. Analyst evaluate the functions provided by the package for flexibility, user friendliness, hardware and software, data requirements, installation and maintenance efforts, documentation, vendor quality and cost. Once the analyst is satisfied with the selected package the organization will have no total control over the system design process (Laudon and Laudon, 2010:531).

Software as a service is delivered and used over networks as a service e.g. cloud computing is delivered as a service over the internet. Companies need to really assess the costs and benefits of the services as costs may become more than purchasing and maintaining the application in-house. Outsourcing is when firms contract external source which can be domestic or in another country for custom software development and maintenance of it old system. These companies provide lower-level maintenance, data entry and call centre operations to service their clients. Outsourcing is often less expensive than hiring permanent new employees who would need extensive training in the new software package. Companies need to thoroughly understand the project’s requirements, methods of implementation, benefits, cost and metrics for measuring performance. Though caution need to be taken when using an outsourcer to develop or operate applications that give some competitive advantage (Laudon and Laudon, 2010:532).
17
Cool-care is recommended to use outsourcing as it a cost saver and would benefit if they thoroughly investigate the risks and vendor’s service.

4.2 Updating and upgrading

The updating and upgrading procedure for hardware and software is necessary and should be on an ongoing basis. Cloud computing is more appealing to mal and medium-size businesses that have no resource to buy and own their own hardware and software and these are offered as services over the internet. Data is stored permanently in remote mass data centres and is accessed and updated over the internet (Laudon and Laudon, 2010:208).

Autonomic computing is an effort to develop systems that can protect themselves and heal, detect and destroy virus when invaded. IBM and other vendors have started to build autonomic features into products for large systems (Laudon and Laudon, 2010:209). Programs can be updated automatically through online antivirus protection services, designed to check computer systems and drives for viruses. McAfee, Symantec and Trend Micro are leading antivirus software vendors. Companies need to remember that antivirus software is effective in detecting virus already known when the software was written, therefore should be continually updated to remain effective (Laudon and Laudon, 2010:347).

Conclusions and Recommendations
In the current global market, business organizations cannot do without information systems and technology. It is the main source of survival and of attaining the competitive advantage positions in the industry. Though business propellers need to understand that the system indeed need the human skills for application of information and sharing knowledge for the continuous growth of the business.
18
Bibliography

Bentley, L.D. and Whitten, J.L. (2007). Systems Analysis and Design for the Global Enterprises. 7th edition. McGraw-Hill International

Bragg, R. (2004). Hardening Windows Systems, Bulletproof your systems before you are hacked. McGraw-Hill Osborne.

Chokhani, S. (1994). Towards a national public key infrastructure. IEEE Communications Magazine. 9 (32), 70-74.

Crowe, A., Beeby, R. and Gammack, J. (1996). Constructing systems and information: a process view. Maidenhead. McGraw-Hill.

Laudon K.C. and Laudon J.P. (2006) Management Information Systems. 9th edition. Pearson Education. Upper Saddle River: New Jersey

Parker, D.B. (1998). Fighting Computer Crime – A New Framework for Protecting Information. Wiley Computer Publishing. USA.

Parker, D. (1981). Computer Security Management. Reston, Virginia. Reston Publishing.

Röhmn, A.W., Pernul, G. and Herrmann, G. (1998). Modelling secure and fair electronic commerce, In Proceedings of the 14th Annual Computer Security Applications Conference. 155-164.

Schach, S.R. (2004). Introduction to Object-Oriented Analysis and Design with UML and the Unified Process. McGraw-Hill

19
Appendix A
Problem Statement
|Project: Information systems |Project Manager: Mabel Jiri |
|Created by: Mabel Jiri |Last update by: Ashley Madoda |
|Date created: 16 April 2010 |Date last updated: 18 April 2010 |
|Statements of Problems, opportunities or Directive |Urgency |Visibility |Annual benefits |Priority |Proposed solution |
|2. Currently, four functional departments each has |1 month |Medium |$45,000 |1 |New development |
|its independent databases. Therefore, intent to merge| | | | | |
|databases into a single centralized database | | | | | |
|3. There is lack of access to management and |4 months |Low |20,000 |2 |After new systems is |
|decision-making information. A centralized database | | | | |developed, provide users with|
|will enhance sharing of information. | | | | |easy-to-learn and use |
| | | | | |reporting tools |
|4. There currently exists data inconsistency in |2 months |High |$40,000 |1 |Urgent fix, then new |
|member and order files. | | | | |development |
|5. There is need to create a website. |2 months |Medium |10,000 |3 |Newly developed systems |
|6. Need to improve the P2P network system is limited.|3 months |Medium |$40,000 |2 |New systems |
|There is need to improve networking between | | | | | |
|employees, customers and suppliers (LAN). | | | | | |
|7. The security and control is an issue that needs to|6 months |Low |Unknown |4 |Future version of newly |
|be addressed. | | | | |developed system |

20

Similar Documents

Premium Essay

Business Management

...Lorenzo Cherubini Ontario (Canada) Education Provincial Policy: Aboriginal Student Learning 101 Jennifer Dahmen Natascha Compes Just Google It?! But at What Price? Teaching Pro-Environmental Behaviour for Smart and Energy-Efficient Use of Information and Communication Technologies 119 Marion Engin Senem Donanci Using iPads in a dialogic classroom: Mutually exclusive or naturally compatible? 132 Nahed Ghazzoul Teaching and Learning in the Age of 'Just Google it' 149 Saba A. Gheni Falah H. Hussein Teaching Against Culture of Terrorism in the Middle East 162 Jessica Gordon Bonnie Boaz Integrating Digital Media into Multimodal Compositions: Five Trends in the Transfer of Rhetorical Skills 173 Jeehee Han Public Opinion on Health Care Policies in the 21st Century 181 Elijah C. Irozuru M. Ukpong Eno Home Environment,...

Words: 236613 - Pages: 947

Premium Essay

World Investment Report 2013

...U N I T E D N AT I O N S C O N F E R E N C E O N T R A D E A N D D E V E L O P M E N T WORLD INVESTMENT REPORT 2013 GLOBAL VALUE CHAINS: INVESTMENT AND TRADE FOR DEVELOPMENT New York and Geneva, 2013 ii World Investment Report 2013: Global Value Chains: Investment and Trade for Development NOTE The Division on Investment and Enterprise of UNCTAD is a global centre of excellence, dealing with issues related to investment and enterprise development in the United Nations System. It builds on four decades of experience and international expertise in research and policy analysis, intergovernmental consensusbuilding, and provides technical assistance to over 150 countries. The terms country/economy as used in this Report also refer, as appropriate, to territories or areas; the designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. In addition, the designations of country groups are intended solely for statistical or analytical convenience and do not necessarily express a judgment about the stage of development reached by a particular country or area in the development process. The major country groupings used in this Report follow the classification of the United Nations Statistical Office. These are:...

Words: 156671 - Pages: 627

Premium Essay

World Investment Report

...U N I T E D N AT I O N S C O N F E R E N C E O N T R A D E A N D D E V E L O P M E N T WORLD INVESTMENT REPORT 2013 GLOBAL VALUE CHAINS: INVESTMENT AND TRADE FOR DEVELOPMENT New York and Geneva, 2013 ii World Investment Report 2013: Global Value Chains: Investment and Trade for Development NOTE The Division on Investment and Enterprise of UNCTAD is a global centre of excellence, dealing with issues related to investment and enterprise development in the United Nations System. It builds on four decades of experience and international expertise in research and policy analysis, intergovernmental consensusbuilding, and provides technical assistance to over 150 countries. The terms country/economy as used in this Report also refer, as appropriate, to territories or areas; the designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. In addition, the designations of country groups are intended solely for statistical or analytical convenience and do not necessarily express a judgment about the stage of development reached by a particular country or area in the development process. The major country groupings used in this Report follow the classification of the United Nations Statistical Office. These are:...

Words: 156671 - Pages: 627

Premium Essay

Introduction to Global Marketing

...PART 2 The Global Marketing Environment CHAPTER 2 The Global Economic Environment Case 2-1 The Global Economic Crisis I n his 1997 book One World, Ready or Not, William Greider described the United States as “the buyer of last resort.” Greider explained that, for many years, the United States was the only nation that was willing to absorb production surpluses exported by companies in Europe, Asia, and Latin America. Greider asked: “Who will buy the surpluses when the United States cannot?” The conventional wisdom has long held that strong spending by consumers in other nations would keep the world economy humming. However, by 2008, Greider’s question was taking on a new urgency and the conventional wisdom was being tested. An economic crisis that had its roots in lax subprime mortgage lending practices began to spread around the globe. In the United States, where the crisis began, economic misery was widespread: The housing market collapsed, real estate values plummeted, credit tightened, and job growth slowed (see Exhibit 2-1). As the price of oil passed the $100 per barrel benchmark, the average price of a gallon of gasoline rose to $4. American consumers were, indeed, less willing and less able to buy. However, the crisis was not confined to the United States alone. Consumer-goods exporters in Asia, which Exhibit 2-1: The bursting of the global real estate bubble was only one aspect of the worst recession in decades. The ripple effects from the economic...

Words: 24814 - Pages: 100

Premium Essay

Dissertation

...UNIVERSITY OF THE WITWATERSRAND LANGUAGE AND IDENTITY: INVESTIGATING THE LANGUAGE PRACTICES OF MULTILINGUAL GRADE 9 LEARNERS AT A PRIVATE DESEGREGATED HIGH SCHOOL IN SOUTH AFRICA. Submitted by: Nomakhalipha Margaret Nongogo Student Number: 0309644N Supervised by Dr Carolyn McKinney Research report submitted to the Faculty of Humanities, University of the Witwatersrand in partial fulfilment of the degree of Masters of Arts in Applied English Language Studies. 2007 ABSTRACT This research report engages with the concern that African learners attending English medium, multiracial schools are losing their proficiency in African languages. In so doing, the report explores the language practices of four multilingual Grade 9 learners at a desegregated private high school in Gauteng. In a school environment that does not overtly support the use of African languages, I explore the extent to which multilingual learners use African languages in the school context, to position themselves and others, as an identity building resource, and the extent to which the use of African languages is implicated in their identities. I also explore the possible influence of the learners’ cultural and ethnic backgrounds on their language practices, and related to this, the expression of their identities. I look at how their language practices help them shift identities with space and purpose, and the contradictions therein. The study draws on poststructuralist theories of language and...

Words: 38460 - Pages: 154

Free Essay

Translation

...HUE UNIVERSITY COLLEGE OF FOREIGN LANGUAGES DEPARTMENT OF ENGLISH ------***------ NGUYEN VAN TUAN TRANSLATION 5 HUE - 2006 1 INTRODUCTION TRANSLATION 5 is a basic course book written for the second-year students of the Department of English, College of Foreign Languages, Hue University. It is intended to equip the students with an overview of translating Vietnamese and English scientific texts. It also helps the students get familiar with the terms related to science and technology as well as the typical structures frequently used in scientific and technological texts. Since the course book has been written for the students to learn either by themselves or in class with a teacher, there will be a course book and assignments. The course book contains the Vietnamese and English socio-politic texts with notes and suggested translations. The assignments contain the Vietnamese and English socio-politic texts that will be translated into either English or Vietnamese by the students. By the end of the course, the students will be able to: - obtain general knowledge of the Vietnamese and English scientific and technological documents. - get familiar with and effectively use scientific and technological terms and typical structures of scientific and technological texts in their translations. - accurately translate scientific and technological texts into English and Vietnamese. On the completion of this course book, I would like to express...

Words: 34454 - Pages: 138

Free Essay

Living History

...___________________________ LIVING HISTORY Hillary Rodham Clinton Simon & Schuster New York • London • Toronto • Sydney • Singapore To my parents, my husband, my daughter and all the good souls around the world whose inspiration, prayers, support and love blessed my heart and sustained me in the years of living history. AUTHOR’S NOTE In 1959, I wrote my autobiography for an assignment in sixth grade. In twenty-nine pages, most half-filled with earnest scrawl, I described my parents, brothers, pets, house, hobbies, school, sports and plans for the future. Forty-two years later, I began writing another memoir, this one about the eight years I spent in the White House living history with Bill Clinton. I quickly realized that I couldn’t explain my life as First Lady without going back to the beginning―how I became the woman I was that first day I walked into the White House on January 20, 1993, to take on a new role and experiences that would test and transform me in unexpected ways. By the time I crossed the threshold of the White House, I had been shaped by my family upbringing, education, religious faith and all that I had learned before―as the daughter of a staunch conservative father and a more liberal mother, a student activist, an advocate for children, a lawyer, Bill’s wife and Chelsea’s mom. For each chapter, there were more ideas I wanted to discuss than space allowed; more people to include than could be named; more places visited than could be described...

Words: 217937 - Pages: 872

Premium Essay

Abb Infra Report

...Strengthening the foundations for growth ABB Limited, India - Annual Report 2010 Contents 01 Board of directors and other information 02 5 year highlights 04 This is ABB 05 Corporate Management Committee 08 Notice to the members 13 Directors’ Report 27 Management’s discussion and analysis 31 CEO / CFO certification 32 Auditors’ report 36 Balance sheet, profit & loss account and schedules 47 Notes to the accounts 65 Cash flow statement 67 Balance sheet abstract and company's general business profile ABB Limited Board of Directors Gary Steel, Chairman Bazmi R. Husain, Managing Director (w.e.f. 01.01.2011) Biplab Majumder, Vice Chairman & Managing Director (upto 31.12.2010) and Director (w.e.f. 01.01.2011) N.S. Raghavan Nasser Munjee D.E. Udwadia Arun Kanti Dasgupta Peter Leupp Francis Duggan Bankers AXIS Bank Ltd Canara Bank Citibank N.A. DBS Bank Ltd. Deutsche Bank AG HDFC Bank Limited ICICI Bank Limited IDBI Bank Limited State Bank of India Standard Chartered Bank The Hongkong & Shanghai Banking Corporation Limited The Royal Bank of Scotland N.V. Company Secretary B. Gururaj Corporate Management Committee Bazmi R. Husain Amlan Datta Majumdar B. Gururaj GNV Subba Rao Juliane Lenzner Madhav Vemuri N. Venu Pitamber Shivnani Prakash Nayak R. Narayanan Raja Radhakrishnan Ranjan De S. Karun Tommy Andreasson Union Bank of India YES BANK Ltd. Auditors M/s. S.R. BATLIBOI & CO. Chartered Accountants Registered Office 2nd Floor, East Wing, Khanija Bhavan...

Words: 30711 - Pages: 123

Premium Essay

Management Skills, Leadership Skills.

...Instructor’s Manual Jane Murtaugh College of DuPage BUSINESS IN ACTION 3rd Edition COURTLAND L. BOVEE JOHN V. THILL & BARBARA E. SCHATZMAN Introduction This Instructor’s Manual brings together a set of completely integrated support materials designed to save instructors the trouble of finding and assembling the resources available for each chapter of the text. 1. Course Planning Guide Included in the guide are suggestions for course design, classroom activities, and supplemental teaching aids. 2. Learning Objectives and Summary of Learning Objectives For each chapter, learning objectives and the summary of the learning objectives are listed. 3. Brief Chapter Outlines For each chapter, a brief chapter outline is provided. 4. Lecture Notes and Chapter Outlines For each chapter, a comprehensive outline is provided, as well as a variety of stimulating lecture enrichment materials. 5. Real-World Cases At least two real-world cases related to chapter material are included for each chapter. 6. Answers to End-of-Chapter Questions Answers to the end-of-chapter questions are provided, as well as suggested teaching tips when appropriate. 7. Answers to See It on the Web Exercises Following the end-of-chapter questions, answers to the See It on the Web Exercises can be found, along with tips for the instructor. Answers to Boxed Features In each chapter, students are presented with at least two supplemental “boxes,” both containing questions about the material discussed. Answers...

Words: 156200 - Pages: 625

Free Essay

Meteorological Instruments

...Guide to Meteorological Instruments and Methods of Observation WMO-No. 8 Guide to Meteorological Instruments and Methods of Observation WMO-No. 8 Seventh edition 2008 WMO-No. 8 © World Meteorological Organization, 2008 The right of publication in print, electronic and any other form and in any language is reserved by WMO. Short extracts from WMO publications may be reproduced without authorization, provided that the complete source is clearly indicated. Editorial correspondence and requests to publish, reproduce or translate this publication in part or in whole should be addressed to: Chairperson, Publications Board World Meteorological Organization (WMO) 7 bis, avenue de la Paix P.O. Box No. 2300 CH-1211 Geneva 2, Switzerland ISBN 978-92-63-10008-5 NOTE The designations employed in WMO publications and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of WMO concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Opinions expressed in WMO publications are those of the authors and do not necessarily reflect those of WMO. The mention of specific companies or products does not imply that they are endorsed or recommended by WMO in preference to others of a similar nature which are not mentioned or advertised. Tel.: +41 (0) 22 730 84 03 Fax: +41 (0) 22 730 80 40 E-mail: publications@wmo...

Words: 216230 - Pages: 865

Premium Essay

Case

...CoNTE j\:\PORA.R'f Contents Foreword Preface iii v Chapter 1 The Cold War Era 1 Chapter 2 The End of Bipolarity 17 Chapter 3 US Hegemony in World Politics 31 Chapter 4 Alternative Centres of Power 51 Chapter 5 Contemporary South Asia 65 Chapter 6 International Organisations 81 Chapter 7 Security in the Contemporary World 99 Chapter 8 Environment and Natural Resources 117 Chapter 9 Globalisation 135 Chapter 1 The Cold War Era OVERVIEW This chapter provides a backdrop to the entire book. The end of the Cold War is usually seen as the beginning of the contemporary era in world politics which is the subject matter of this book. It is, therefore, appropriate that we begin the story with a discussion of the Cold War. The chapter shows how the dominance of two superpowers, the United States of America and the Soviet Union, was central to the Cold War. It tracks the various arenas of the Cold War in different parts of the world. The chapter views the NonAligned Movement (NAM) as a challenge to the dominance of the two superpowers and describes the attempts by the non-aligned countries to establish a New International Economic Order (NIEO) as a means of attaining economic development and political independence. It concludes with an assessment of India’s role in NAM and asks how successful the policy of nonalignment has been in protecting India’s interests. The end of the Second...

Words: 52386 - Pages: 210

Premium Essay

Managing Cultura Differences

...MANAGING CULTURAL DIFFERENCES SIXTHEDITION MANAGING CULTURAL DIFFERENCES SERIES Managing Cultural Differences: Global Leadership Strategies for the 21 st Century, Sixth Edition Philip R. Harris, Ph.D., Robert T. Moran, Ph.D., Sarah V. Moran, M.A. Managing Cultural Diversity in Technical Professions Lionel Laroche, Ph.D Uniting North American Business—NAFTA Best Practices Jeffrey D. Abbot and Robert T. Moran, Ph.D. Eurodiversity: A Business Guide to Managing Differences George Simons, D.M. Global Strategic Planning: Cultural Perspectives for Profit and Non-Profit Organizations Marios I. Katsioulodes Ph.D. Competing Globally: Mastering Cross-Cultural Management and Negotiations Farid Elashmawi, Ph.D. Succeeding in Business in Eastern and Central Europe—A Guide to Cultures, Markets, and Practices Woodrow H. Sears, Ed.D. and Audrone Tamulionyte-Lentz, M.S. Intercultural Services: A Worldwide Buyer’s Guide and Sourcebook Gary M. Wederspahn, M.A. SIXTH EDITION MANAGING CULTURAL DIFFERENCES GLOBAL LEADERSHIP STRATEGIES ST FOR THE 21 CENTURY 25TH ANNIVERSARY EDITION PHILIP R. HARRIS, PH.D. ROBERT T. MORAN, PH.D. SARAH V. MORAN, M.A. JUDITH SOCCORSY Editorial Coordinator Elsevier Butterworth–Heinemann 200 Wheeler Road, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2004, Philip R. Harris, Robert T. Moran, Sarah V. Moran. All rights reserved. No part of this publication may be reproduced, stored in a...

Words: 229816 - Pages: 920

Premium Essay

The Relationship Between the English Language Exposures and Common Grammatical Errors in Writing Skills

...The Future of English? A guide to forecasting the popularity of the English language in the 21st century David Graddol First published 1997 © The British Council 1997, 2000 All Rights Reserved This digital edition created by The English Company (UK) Ltd David Graddol hereby asserts and gives notice of his right under section 77 of the UK Copyright, Designs and Patents Act 1988 to be identified as the author of this work. What is this book about? This book is about the English language in of the English language and concludes that forecasting, identifies the patterns which the 21st century: about who will speak it and for what purposes. It is a practical the future is more complex and less predictable than has usually been assumed. underlie typical linguistic change and describes the way large corporations have briefing document, written for educationists, politicians, managers – indeed any decision maker or planning team with a professional interest in the development of English worldwide. The book has been commissioned by the British Council to complement the many texts already available about the teaching and learning of English, the history and used ‘scenario planning’ as a strategy for coping with unpredictable futures. Section three outlines significant global trends which will shape the social and economic world in the 21st century. Section four discusses the impacts these trends are The Future of English? takes stock...

Words: 62119 - Pages: 249

Premium Essay

Dictionary of Travel, Tourism, and Hospitality

...Dictionary of Travel, Tourism and Hospitality By the same author Britain – Workshop or Service Centre to the World? The British Hotel and Catering Industry The Business of Hotels (with H. Ingram) Europeans on Holiday Higher Education and Research in Tourism in Western Europe Historical Development of Tourism (with A.J. Burkart) Holiday Surveys Examined The Management of Tourism (with A.J. Burkart eds) Managing Tourism (ed.) A Manual of Hotel Reception (with J.R.S. Beavis) Paying Guests Profile of the Hotel and Catering Industry (with D.W. Airey) Tourism and Hospitality in the 21st Century (with A. Lockwood eds) Tourism and Productivity Tourism Council of the South Pacific Corporate Plan Tourism Employment in Wales Tourism: Past, Present and Future (with A.J. Burkart) Trends in Tourism: World Experience and England’s Prospects Trends in World Tourism Understanding Tourism Your Manpower (with J. Denton) Dictionary of Travel, Tourism and Hospitality S. Medlik Third edition OXFORD AMSTERDAM BOSTON LONDON NEW YORK PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann An imprint of Elsevier Science Linacre House, Jordan Hill, Oxford OX2 8DP 200 Wheeler Road, Burlington MA 01803 First published 1993 Reprinted (with amendments) 1994 Second edition 1996 Third edition 2003 Copyright © 1993, 1996, 2003, S. Medlik. All rights reserved The right of S. Medlik to be identified as the author of this work has been asserted...

Words: 133754 - Pages: 536

Free Essay

Hoba Lala

...Athabasca Oil Sands Project, extracts bitumen from oil sands in Alberta, western Canada and converts it to synthetic crude oils. Our Oil Products business makes, moves and sells a range of petroleum-based products around the world for domestic, industrial and transport use. Its Future Fuels and CO2 business unit develops fuels such as biofuels and hydrogen and synthetic fuels made from natural gas (GTL Fuel) and potentially from biomass; and leads company-wide activities on CO2 management. With 46,000 service stations, ours is the world’s largest single-branded fuel retail network. Our Chemicals business produces petrochemicals for industrial customers. They include the raw materials for plastics, coatings and detergents used in the manufacture of textiles, medical supplies and computers. United States Securities and Exchange Commission Washington, D.C. 20549 Annual Report...

Words: 135221 - Pages: 541