Premium Essay

Critical Information Systems: Ups

In:

Submitted By sisimmo
Words 692
Pages 3
Critical Information Systems: UPS America

The United Parcels Service (UPS) is a corporation specializing in the collection and delivery of packages around the world. What helped this private message and delivery service go from running errands and delivering packages of anything ranging from notes and baggage to trays of food on foot or bicycles for longer distances to routing packages and servicing areas in 200 nations worldwide? It was the company’s ability to adapt with the changing of times and information technology. In keeping up with the technology age UPS’s information systems helped take them to the top. Those systems are DIAD (Delivery Information Acquisition Device), COMPASS (Computerized Operations Monitoring, Planning and Scheduling System), and UPSnet.
United Parcel Service was started in 1907 by James E. Casey. Originally the company was named American Messenger Company headquartered in Seattle, Washington. Jim and his partner, Claude Ryan, had one goal. That was to provide their customers with reliable, around the clock service at low-rates and the utmost respect and courtesy. Even today those principles are embedded deep in UPS and summed up in the company’s slogan: best service and lowest rates. Six years later the company began to receive stiff competition after the introduction of the automobile. The company soon acquired their first automobile and established the first consolidated delivery technique, which is the combing of packages addressed to the same area or neighborhood onto one delivery vehicle. The next several decades would prove to be trying for the company. Despite economic woes WWII might have caused and the trends that may have followed afterward, the company still continued to grow widening its range to department stores in Newark, New Jersey and New York City on the east coast. By the 1980’s UPS had risen from two

Similar Documents

Premium Essay

Risk Management Plan

...Management – Sector I Risk Management Plan Introduction Version 1.2.0 Designed by: Defense Logistics Information Systems Designers: Matthew Gugumuck Michael Mawyer Daryl Giggetts | Overview | * The goal of the Risk Management plan is to design and execute the implementation of various security policies and different counter-measures in the event of any type of risk, threat, and/or vulnerabilities against the organizations daily operations and sensitive information. By combining both hardware devices and software applications will boost the effectiveness of security and preventing unauthorized access and effectively repulsing attacks. | Authority/Ownership | * Any information and sensitive contents contained in this document has been planned and developed by DLA Logistics Information Service and in which is the rightful owner of this document. All materials contained within this document is considered CLASSIFIED and is also copyrighted by DLA Logistics Information Service (DLIS). Any wrongful use of such material and/or reference to this document without the rightful expressed and written consent of the owner(s) may result in criminal prosecution. | Sections contained in DLIS Risk Management Plan | * Risk Management Overview * Planning and Implementation of Risk Management * Key Personnel Roles * Risk Assessment Plan * System Analysis and Characterization * Threat Identifications * Vulnerability Identifications...

Words: 4166 - Pages: 17

Premium Essay

Business Impact Analysis

...1 Purpose 3 2 System Information 3 2.1 Points of Contact 3 2.2 System Resources 4 2.3 Critical Contacts and Resources 4 2.4 Disruption Impact 4 2.5 Resource Recovery Priority 4 Appendix A: Business Impact Analysis Approval 5 * Introduction Purpose The Business Impact Analysis (BIA) is an essential step in the development of a contingency/disaster recovery plan. The Purpose of this Impact Analysis is to determine the business impact that an incident will have on business operations and the amount of downtown the network may experience. Also we will define the critical business processes of an organization and relating to them specify possible threats which occur due to interdependence, resource unavailability as well as other effects which may disrupt the daily business and determine their impact on the same if such should take place. System Informations Date:<Enter date BIA completed> Point of Contact (POC): <Enter BIA POC> Organization:<Enter Organization> System Name: <Enter name> System Manager: <Enter manager> System Description: <Enter description> Points of Contact Internal Contacts * Director, DLA Information Operations (J6) and Chief Information Officer * Primary IT personal for the entire organization * Deputy Director, DLA Information Operations (J6) * Deputy General Counsel * Chief of Staff, Defense Logistics Agency * Will report any information that is important...

Words: 606 - Pages: 3

Free Essay

Technology

... | |10/1/09 JC |Pg 3: reworded first sentence to clear up confusion. | Cyber Incident Support Annex Coordinating Agency: Arkansas Department of Information Systems (DIS) Support Agencies: Office of the Governor Arkansas Department of Emergency Management Multi-State Information Sharing and Analysis Center (MS-ISAC) Cooperating Public Organizations: All Arkansas agencies, boards and commissions Institutions of Higher Education Public Schools (K – 12) Authorities and References Act 751 of 2007 National Response Framework (NRF) National Incident Management System (NIMS) Introduction Purpose The Cyber Incident Support Annex discusses policies, organizations, actions, and responsibilities for a coordinated approach to prepare for, respond to, and recover from cyber-related incidents impacting critical state government and educational processes. Scope This appendix describes the framework for state cyber incident response coordination among state and local government, institutions of higher education, and the public schools of Arkansas. The framework may be utilized in any incident of state significance with cyber-related issues, including significant cyber threats, disruptions, and crippling cyber attacks against state critical infrastructure information systems. Concept of Operations Large scale cyber incidents have overwhelmed government resources...

Words: 1011 - Pages: 5

Premium Essay

Mcbride Financial Services:

...Cathy Bryant BSA 310 Week 2 -individual assignment William Zhang 5/9/2011 Critical Information Systems: Huffman Trucking: Founded in 1936, out of Cleveland, Ohio, Huffman Trucking had one truck and trailer. By 1945 Huffman Trucking had 16 trucks and 36 trailers. With continuous growth from internal sales, and the acquisition 5 Eastern regional carriers, the company continues to be privately held. Huffman’s corporate office is located in Cleveland Oh. They have hubs located in St. Louis, Bayonne N.J, and in Los Angeles. Huffman’s trucking has a fleet of 800 trucks. Each truck is equipped with a GPS tracking system. This allows each truck and it’s cargo to be tracked to and from its destination. The dispatch is vital to operations, by allowing the truck and cargo to be tracked, and monitored. The companies driver’s are tracked from the moment he and his freight leave the warehouse. It also allows for real time access. Without real time access, remote locations would not be able to access the specific data on the trucks, in real time. Each truck is connected to the system through the real time access. Keeping these systems up to date will increase the speed of delivery and information. Each truck is equipped with a GPS system that is connected to the hub. Each hub has specific information, on all trucks and freight. This way the company knows which trucks are carrying which freight and going to which...

Words: 547 - Pages: 3

Premium Essay

Assignment 3

...SCHOOL OF INFORMATION TECHNOLOGY MASTER OF INFORMATION TECHNOLOGY [pic] INDIVIDUAL ASSIGNMENT COVER PAGE |Name of Student |PETER J. MAKIWA | |Student Number |14299896 | |Name of Module |CORPORATE I.T SYSTEMS | |Module Code |MIT853 | |Name of Lecturer |DR. PATRICIA E.N. LUTU | |Date of Submission |24 AUGUST 2014 | |Contact telephone number |+263712501179 | |E-mail address |pmakiwa@gmail.com | |Declaration: |I declare that this assignment, submitted by me, is my own work and that I have | | |referenced all the sources that I have used. | |Signature...

Words: 2878 - Pages: 12

Premium Essay

Is305 Project

...Risk Management Plan Project Name: IS305 Project Manager: Paul Bettinger Date: October 1, 2013 RISK management PLAN INTRODUCTION 2 PURPOSE AND SCOPE 2 RISK MANAGEMENT PLANNING 3 RISK MANAGEMENT ASSIGNMENTS 6 RISK MANAGEMENT TIMELINE 7 MITIGATION PLAN Introduction 8 Cosiderations 8 Prioritizing 9 Cost benefit analysis 10 Implementation 11 Follow-up 11 Buisness impact analysis Introduction 12 Scope 12 PURPOSE AND objectives 13 Steps of bia 13 final review 15 BUSINESS CONTINUITY PLAN Introduction 16 oBJECTIVES 16 BCP PLANNING 17 PLAN UPDATES AND TRAINING 21 computer incident response team Introduction 22 Purpose 22 elements of the plan 23 incident handling process 23 cirt members 23 detection 24 containment 24 recovery and review 24 cirt policies 25 FINAL THOUGHT RISK MANAGEMENT PLAN INTRODUCTION A risk management plan is a process for identifying, assessing, and prioritizing risks that could cause the company a loss. Identifying these risks, threats and vulnerabilities and taking action to prevent or control them now and in the future. Creating a risk management consists of measuring and prioritizing risks involved and taking actions to reduce any loss the company may encounter. Being that indirectly we work with the Department of Defense, which as you knows is a department of the United States Government dealing with national security, a well-developed risk management plan is of the upmost importance. Without updating...

Words: 5009 - Pages: 21

Premium Essay

Security Policies and Implementation Week Four Lab

...Continuity Plan (BCP) * Align the major elements of a Business Continuity Plan with required policy definitions * Review the results of a qualitative Business Impact Analysis (BIA) for a mock organization * Review the results of defined Recovery Time Objectives (RTOs) for mission-critical business functions and applications * Create a BCP policy defining an organization’s prioritized business functions from the BIA with assigned RTOs Week 4 Lab Part 1: Assessment Worksheet (PART A) Sample Business Impact Analysis for an IT Infrastructure Overview When conducting a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission-critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what type of business continuity and recovery steps are needed to maintain IT operations within the specified time frames. 1. Fill in the sample BIA with prioritization in (parentheses): Business Function Business Impact RTO/RPO IT Systems/Apps Or Process Factor Infrastructure Impacts Internal and external voice communications with customers in real-time | (Medium) Depends on the...

Words: 1852 - Pages: 8

Premium Essay

Approaches to Critical Thinking

...Approaches to Critical Thinking Critical Thinking is defined by the process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and evaluating information to reach an answer or conclusion. (Dictionary.com, 2014) One may think critical thinking is a process to come to a conclusion but never really think about the approach used. There are various type of approaches for critical thinking. Some approaches allow for feeling and experiences to be a factor. Everyone has their own way of critical thinking of approaching conclusions. Everyone has a basis to think but never really know how ones thought reached that point of view. There is the way of assumption, information and purpose to Critical Thinking. The assumption approach allows ones thinking to make a justified conclusion. The level of thought that allows one to think this way can be biased or one-sided. (Elder and Paul, 2010) Thoughts that come from assuming can be hurtful and can have a negative solution. For example, if I believed that everyone should own a gun; people would immediately say how can you think that way. This is because everyone have different beliefs. This way of thinking can be good only if you are unbiased and allow for a justified conclusion by sound evidence. This approach can also be a quick solution that allows for feelings to reach the believed goal or perception. Though there are various approaches; these are the approaches...

Words: 985 - Pages: 4

Premium Essay

Bis 220 Week 2

...Information Systems Proposal Vince Wainwright BIS/220 2/16/2014 Instructor Alizadeh Scenario: Imagine that you and a business partner are considering starting a small, brick & mortar, nostalgic record store. Your friend does not have much experience with information systems or technology, and needs a basic understanding of the different types of information systems available to businesses. Write a 350 to 700 word proposal of the types of information systems that would work well for your chosen business, and their benefits and drawbacks. A brick and mortar record store must rely on its information systems for the smooth operation of daily operations. The types of information systems that are critical to a record store are Office Information System (employee tasking and email), Transaction Processing System (buying), and a Management Office System (tracking). These three systems are the key components for day to day operation of a successfully ran record store. Employees run the store thereby communication and work hours are important to log on a daily basis. An Office Information System will enable the managers and employees to engage in communications of daily activities, send emails, create reminders, maintain work hours and schedules. Communications of daily activities range from tasking to weekly schedules. Emails are used for fast communication and storing a paper trial of previous conversations and tasking. The maintenance of a weekly schedule...

Words: 368 - Pages: 2

Premium Essay

Data Table Analysis

... Organizations rely heavily on receiving accurate data and information to make strategic business decisions. The concept is a critical aspect for modern commerce, since technological advances allows any business to track, trace, and predict inventory usage up to the moment. Each diagram in an analyses alludes to how accurate an organization’s methodology for operations is. Data tables are a useful tool for organizations to determine a cost-effective method for improving inventory control and for creating methods to improve business processes. Evaluate Data Table Design Elements from an Accounting Perspective Kudler’s Fine Foods’ requires the use of data tables for management to perform an accurate analysis for controlling inventory. Personnel must possess information with little effort to perform daily operations. A data table’s ability to organize information is a large contributor in management’s ability to order adequate inventory. The information available also helps management calculate the Just in Time (JIT) inventory method. Supplemental, the inventory information is crucial to determine when to order more inventory and the amount to order as well. The grocery store’s current inventory data table illustrates critical information such as, item codes, inventory items, locations, and the total value of the inventory (and each individual item’s price). Kudler’s Fine Foods’ current inventory data table system is capable of identifying locations, inventory items, and prices...

Words: 673 - Pages: 3

Premium Essay

Success of Mis

...Contributing to Success of MIS If a Management Information Systems (MIS) is to be success then it should have all the features listed as follows: * The MIS is integrated into the managerial functions. It sets clear objectives to ensure that the MIS focuses on the major issues of the business. * An appropriate information processing technology required ton meet the data processing and analysis needs of the users of the MIS is selected. * The MIS is oriented, defined and designed in terms of the user’s * The MIS is kept under continuous surveillance, so that its openn system design is modified according to the changing information needs. * MIS focuses on the results and goals, and highlights the factors and reasons for non achievement. * MIS is not allowed to end up into an information generationn mill avoiding the noise in the information and the communication system. * The MIS recognizes that a manager is a human being andn therefore, the systems must consider all the human behavioral factors in the process of the management. * The MIS recognizes that the different information needs forn different objectives must be met with. The globalization of information in isolation from the different objectives leads to too much information and information and its non-use. * The MIS is easy to operate and, therefore, the design of the MIS has such features which make up a user-friendly design. * MIS recognizes that the information needs become obsolete and newn needs...

Words: 559 - Pages: 3

Premium Essay

Accounting Information Systems

...……………………………………………………………………………………….3 Critical aspects of Accounting Information Systems………………………………….................3 People…………………………………………………………………………………….3 Procedure and Process Analysis…………………………………………………………4 Data Analysis…………………………………………………………………………….4 Decision Analysis………………………………………………………………………..4 Design…………………………………………………………………………………….5 Importance of Safeguarding Information ………………………………………………………..6 Network Security………………………. ……………………………………………………….6 Advantages of Accounting Information Systems..……………………………………................7 Disadvantages of Accounting Information Systems……………………………………………..7 Conclusion………………………………………..………………………………………………8 References ……………………………………………………………………………………….9 Introduction The Accounting information systems network is an interactive human interface that enables organizations to make key business decisions. These decisions include strategies, goals and cost saving procedures. Companies must increasingly rely on evolving technology to help manage this data. Technology serves the Accounting information systems as a whole to help an organization and top management make informative decisions. The design of the technology in such a way that it accommodates each critical aspect of the organization - people, procedure and processes analysis, data analysis, decision analysis, and design - is paramount. This paper will look at accounting information system from a macro point of view...

Words: 1633 - Pages: 7

Premium Essay

Ggao-09-232g

...United States Government Accountability Office GAO February 2009 GAO-09-232G FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL (FISCAM) This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office Washington, DC 20548 February 2009 TO AUDIT OFFICIALS, CIOS, AND OTHERS INTERESTED IN FEDERAL AND OTHER GOVERNMENTAL INFORMATION SYSTEM CONTROLS AUDITING AND REPORTING This letter transmits the revised Government Accountability Office (GAO) Federal Information System Controls Audit Manual (FISCAM). The FISCAM presents a methodology for performing information system (IS) control 1 audits of federal and other governmental entities in accordance with professional standards, and was originally issued in January 1999. We have updated the FISCAM for significant changes affecting IS audits. This revised FISCAM reflects consideration of public comments received from professional accounting and auditing organizations, independent public accounting firms, state and local audit organizations, and interested individuals on the FISCAM Exposure Draft issued on July 31, 2008 (GAO-08-1029G)...

Words: 174530 - Pages: 699

Premium Essay

Project Management for Information Systems

...Project Management for Information Systems Project Management for Information Systems Abstract Information systems (IS) projects are vulnerable to resource cutbacks and the increasing complexity of systems and advances in information technology make finding the right personnel difficult and the associated development costs high. Good project management is essential for success. Some alignment methodologies include IBM's business systems planning (BSP), Robert Holland's strategic systems planning, James Martin's (1989) information engineering and method/1 from Anderson Consulting. Critical success factors (Rockart, 1979) methodology focuses on identifying key information needs of senior executives and building information systems around those key needs. Williams, (1997) identified four steps to system planning. Earl (1989) proposed five alternate strategy frameworks which project managers should consider when deciding how the system will enhance the business function. Standard business strategy...

Words: 3679 - Pages: 15

Premium Essay

Critical Issues

...Critical issues Mary E Rios CJS210 July 1, 2012 Amanda Dean Critical issues Criminals today are using technology to their advantage when committing crimes; therefore law enforcement must also use technology when taking down the criminal. Technology can be used to prevent crimes as well as to solve crimes after they have happened. Law enforcement today is focusing more on the less then lethal weapons whenever possible. Police officers are faced with many dangers in their daily jobs. Police officers are constantly faced with the unknown and the unpredictable. A routine call could turn out to be deadly or contamination of infectious disease. The Internet has changed how police officers can complete their daily jobs; the Internet has opened doors to so many technological advancements and if all departments are updating their processes and up with technology their jobs could be much more adequate and less room for error or delays. Major technological advancements include database technology, computer aid dispatch, record keeping, and mobile computing. What was once known as the card file index is now known as databases or COMPSTAT, these databases hold criminal information, management information, reports that can be used for statistics or analytical information, trends in crimes, and also can be used for staffing based on geographic crime history. All of this information is at the fingertips of an officers or management personnel to quickly make a decision when...

Words: 3141 - Pages: 13