Free Essay

Information Technology

In:

Submitted By vijaypal
Words 3495
Pages 14
The Web Integrated Prototype Architecture Linking with Intranet and Internet Resources: An Application for Knowledge Management Platform and Accounting System
Shanyan Huang*, Yichun Kuo, Chiayen Wu Department of Business Administration, National Dong Hwa University, #1 Sec. 2. Da Hsueh Rd., Shoufeng, Hualien 97401, Taiwan *Corresponding Author: jie18.rore28@msa.hinet.net ABSTRACT This paper exploits the integrated architecture through web service architecture (WSA) aiming the accounting system and the knowledge management platform (KMP) separately to demonstrate the web integrated prototype architecture (WIPA) feasibly. Utilizing Intranet and Internet resources are implemented to increase the efficiency and effectiveness for the KMP and the accounting system. The integrated architecture fit various scenarios that including application service provider (ASP), plug-and-play software or end-user systems when new services enter into the requirement of small and medium enterprises (SMEs). All scenarios should develop and design base on WSA that use of object-oriented technology. The results can promotes interaction to achieve the problems solving expeditiously and association strengthening between the IT and the accounting department. Keyword: Web Service, Knowledge Management, Accounting System, Integrated Architecture 1. Introduction E-business model provides a foundation stone that generated collaborative solutions through internet and intranet, to develop and deploy new information systems. Enterprises adopt e-business model that emergence of new and affordable information and communication technology (ICT), to face dynamic and complex circumstances. ICT can improve performance and enhance the reliability of management (Powell & Dent-Micallef, 1997; OECD, 2003), and offers a large range of innovative or improved mechanisms to build trust in e-business environments (Friedman et al., 2000). Application service provision (ASP) business model was one of most popular acronyms during the high of the dot.com era (IDC, 1999). ASP as a third wave of outsourcing and a new form of application outsourcing with the ability to manage and deliver application capabilities to multiple entities from data centers across a wide are network (Currie, 2000). But the functions of ASP model should fit the company size, Brodsky and Tan (2003) describe the large sized enterprises are likely to accept the

more complex, difficult-to-verify ASP services such as enterprise resource planning (ERP). Furthermore, Small and medium-sized enterprises (SMEs) tend to prefer non-mission-critical easy-to-verify systems where economies of scale almost mandate outsourcing. Using ASPs for more complex software applications hosting exposed the company to additional risks such as data security infringement and theft (Currie, 2004). Companies’ size will affect the abilities to identify and manage those risks by themselves. World Wide Web Consortium (W3C) state web service architecture (WSA) is based on service oriented architecture (SOA). SOA is a composition model that connects the functional units of applications, called services, through well-defined interfaces and contracts between these services (e.g., Sessions, 2004; Pallos, 2001). While WSA-based system can have individual services and the overall system design is service oriented. In particular the service interfaces involve the exchange of business data, not the exchange of objects. Therefore, WSA can enhance the relationship strongly between business goal and system, and provide the advantages for infrastructure investment in information technology (IT); moreover, the business process can improve continually and centrally. This paper provides the web integrated prototype architecture (WIPA) that base on WSA. The WIPA allows an organization to establish an integrated information system within its organization, in which data is shared electronically by the organization through the use of corporate networks. Key business processes can be unified with the use of the WIPA, and all information service can be implemented effortlessly through the WIPA. This paper exploits the WIPA base on WSA and aims the accounting system and the knowledge management platform (KMP) separately from the WIPA. Utilizing the knowledge processes for knowledge management is implemented by increasing the internal control components into accounting system. The integrated architecture fit various scenarios that including ASP, plug-and-play software or end-user systems when new services enter into the requirement of SMEs. All scenarios should develop and design base on the WIPA that use of object-oriented technology. In addition, the integrated architecture promotes interaction to achieve the problems solving expeditiously and association strengthening between the IT and the accounting department. The result can improve the flow of accounting operations, provide the friendly interface to accountants, help managers making better decisions, reach the internal control of enterprises, and show the achievements and financial statements for shareholders. 2. Literature Review WSA provides a unified approach that incorporates messaging flexibility with

components distribution. It accommodates the heterogeneous systems through the diverse and scaling nature of the network and also promotes web applications development with web services for reusability, interoperability, and scalability. Web services are emerging as a systematic and extensible architecture for application-to-application integration. The service objects supply a new type of communication for the business modules on extensible markup language (XML) basis and provide the interaction of these components with the base communication services. Built upon existing web protocols and open XML standards (Curbera et al., 2002) information can be seamlessly passed between remote applications running in different environments. The web services description language (WSDL) based on XML that is proposed by the W3C for describing the interfaces of web services (W3C, 2002), is used by a server to publish the services that it offers. WSDL is a service description language that gives the service name, location, functions, and specific information about how to bind to and use the service. The universal description discovery and integration standard (UDDI) (UDDI, 2003) is a universal method for description, discovery and integration of the web services, and is suitable in support of the partners’ self service for e-commerce. The web services are based on documents exchange, on appropriately designed interface interactions and on continuous expansion of the simple object access protocol (SOAP) (Curbera et al., 2002). The SOAP messages can be accompanied by appropriate electronic instructions controlling the messages acquisition and processing. The web services standards comprises of four key technologies that include XML, UDDI, WSDL, and SOAP (Vinoski, 2002). Applying the web services standards enables applications to work with other applications via intranet or Interne. Building a complete web service platform should combine hypertext transmission protocol (HTTP) with XML, SOAP, WSDL and UDDI, in order to expand its function and keep simplicity and universality. This paper proposes the WIPA base on the complete web service platform which offers the message structure and reaches the fruitful results that include: 1.Synchronous or asynchronous linking; 2. Delivering the message to distributed systems and soft wares; 3. Dynamic modifying business process. The integrated architecture pushes completeness, flexibility, and capability through the merger between the accounting system and the KMP. Geerts and McCarthy (1999) apply the conceptual model of economic resources, events, and agents base to upgrade the accounting system within knowledge base environment. Ohmori (2003) proposed an internet accounting system that consists of a three-tier structure: web, application and database servers in worldwide operating companies. The new generation accounting system not like the traditional centralized accounting system only provided the operations for accounting department.

Furthermore, it also needs evolution and advancement to fit the requirements from the organizations. This paper is probing into the integrated architecture that aiming the accounting system and the KMP separately. Moreover, Utilizing the WIPA integrates the heterogeneous systems effortlessly and using knowledge management processes increases the internal control components into accounting system. The integrated architecture link up co-ordinate operations with different information systems to obtain the greatest value for business, and promotes interaction to achieve the problems solving expeditiously and association strengthening between the IT and the accounting department. 3. System Analysis and Processes The components parts of WIPA will be presented and considered in this section. Continued developments in enterprise software, database, networking, voice processing, groupware, imaging and optical character recognition have led to a powerful capability for the knowledge organization (Bourdreau & Couillard, 1999). IDC (1999) lists the most important technologies that include messaging of e-mail, document management, search engines, enterprise information portal, data warehousing, groupware, workflow and web-base training in the knowledge management initiatives. Calabrese (2000) indicate the important technologies are parts of the key sub-elements for knowledge management that include data warehousing, database management: software, multimedia repositories, groupware, decision support systems, corporate Intranet, business modeling systems, and intelligent agents. The web-base technologies provide a communication band to bridge the interpersonal network and make available tools to explore the context of knowledge within the interpersonal network. In addition, ASP could be marketed as a revolution in business computing, offering the potential to pay for software applications on a rental or subscription-pricing model (Kern et al., 2002; Currie, 2003; Currie et al., 2004). This paper adopts the WIPA to link with Intranet and Internet resources. Figure 1 shows the WIPA. The aforementioned technologies or expansion in the future could be connected serially or abreast through the WSA base. The WIPA also emphasizes loose coupling between services that could be built on Intranet or Internet. Loose coupling precludes undocumented interactions between services, for example through shared data, and it also supports the independent evolution of interfaces (Beisiegel et al., 2005). The WIPA can connect the internal and external resources effortlessly by way of the usable technologies. A condition about the technologies should deserve to be mentioned, some technologies are applicable to Intranet and Internet for assisting the operation for organizations, and they should be

both appeared on Intranet or Internet. In accordance with the WIPA the infrastructure investment will be utilized completely and effectively to organizations. Moreover, knowledge management can be evolved and circulated continually through the WIPA.

Multimedia Agent

Agent Agent

Agent

Agent Agent

KMP
Accounting System Search Engines Agent

Web-base Training

ASP EIP
Agent

Web Documents

Intelligent Agents

DSS EIP Agent E-mail Collaborative Applications

Agent

Agent Groupware Workflow Database Agent

KMP
Search Engines Agent

Intranet Web Service Architecture Organization Infrastructure

Internet

Figure 1 Web Integrated Prototype Architecture The accounting system assists enterprises to significantly strengthen the control environment and is the key-core system for any organizations. It makes each enterprise act by all effective management and audit. The traditional centralized accounting system, where officers of the accounting department mainly operate the system at the head office, does not appropriately implement in the integrated environment. SMEs adopt the accounting system which selects plug-and-play software or ASP in the accounting department. Those selection ways run short on the internal control; therefore, the material of financial statements fluctuated between reliability and unreliability. This paper proposes the WIPA to connect the accounting system and the KMP. The accounting operations associate the knowledge organization implements with internal control to generate the warrant documentation; moreover, the control components of authorization connect with simultaneously. The accounting operation combines accounting computerization with the flow of voucher and has diversified control activities in the light of the knowledge processes management. Knowledge feedbacks provide the ability to fulfill all control activities of the accounting system. The integrated merger between the accounting system and the KMP, enterprises need

to establish the check points and authorization levels at the accounting system start. Accounting operation correlations of internal control is shown in Figure 2.

Figure 2 Accounting Operation Correlations of Internal Control The check points are organized and located into various check groups, which in turn are linked together to form a directed acyclic graph structure. The relations interdependent among check points, each check point has the factor to influence operating cost, and administrant adjustment and distribute authorization among the levels. Accounting operations generate the warrant documentation, as the audit-check flows conform to check point. The audit-check records, warrant documentations, and formal vouchers will be merged into storages of the accounting department. The authorization flow does not affect the accountant operation, and the warrant documentations will provide the strategic decision for manager. The role of KMP could be viewed as knowledge engineering that judges and turns the knowledge into check points. The transformed check points strengthen the check groups completely by the KMP. Furthermore, it also could be viewed as communication that assists the IT department in solving problems for the accounting department. The KMP reflects the real problems in the presence of the accounting department. The check groups can revise the scale bottom on enterprise requirement planning, and they connect each other with intranet communication infrastructure. The accountants make use of check group via intranet, as accorded the mapping to accounting client. In addition to the accounting server and the KMP server via the

WIPA communicate mutually, the accounting operations access data from the accounting server via intranet and internet. All usable resources through the WIPA could stimulate the checking functions completely of the accounting system and enhance the knowmation circulation freely flowing for the KMP. 4. System Design and Achievements Implementation of an accounting system is influenced by information and network technology gradual progress. The new generation accounting system not like the traditional centralized accounting system only provides the operations for the accounting department, and it should connect with the KMP to enhance the control functions and abilities. This paper utilizes the complete web service platform that includes XML, HTTP, SOAP, WSDL, and UDDI to implement the web integrated architecture. The architecture’s objective is capable of edition, access, and exchange data for the accounting system and the KMP through internet and internet. Combined the accounting system with the KMP is the advantage application of cooperation between IT and business process. Web services have more advantages than traditional way on application of systematic integrated. The implemented steps of web integrated architecture that combine the accounting system with the KMP are as follows: 1. Execute the system analysis of the accounting system and the KMP, and implement the web services function accord with the enterprise's demand. 2. Establish an intermediary service scheme that is a private UDDI of registration center. 3. Define the web services interface of the accounting system and the KMP, and publish it at the private UDDI of registration center. 4. Set up the portal site of the enterprise. 5. Exploit the integrated application program interface (API) of website according to the web services of the accounting system and the KMP. 6. Implement the system completely. Figure 3 is the web integrated simulation of the accounting system and the KMP, and the simulate processes are as follows. First, the different group of staff registers the portal server, and then proposes the inquisition about individual record and the service requests from limits of authority. Then, according to the record and the service requests, acquire the WSDL documents of the accounting system and the KMP by private UDDI of registration center. Second, transmit the related information back that includes the website positions and the WSDL documents of the accounting system and the KMP to the portal server. Third, according to the publishing WSDL documents of the accounting system, website API’s record and service requests

acquire the individual record and the service requests from limits of authority by the Service_ accounting. Fourth, according to the publishing WSDL documents of the KMP, website API’s record and service requests acquire the individual record and the service requests from limits of authority by the Service_ KMP. Fifth, present the aggregated and the formatted inquiries into the requests to the different group of staff.

Figure 3 Web Integrated Simulation of Accounting System and KMP Figure 4 is the web integrated deployment that the accounting system associates with the KMP. Under the principles of the economic cost, the deployment adopts SQL server to be integrated databases. The integrated databases connect with the client of accounting system effectively. According to the setting of function requests for accountants, the limits of authority and data access level should allot to users. Accountants can apply the web interface to link the client of accounting system and database. Exchanging the data between the KMP web and the SQL server platforms establish the only read-out financial statement for managers. Managers can read-out the accurate accounting reports on the spot under the safe structure of information. This system consists of the multimedia and the E-mail through an internal network to enhance the procedure efficiently of audit-check and warrant documentations. The audit-check records, warrant documentations, and formal vouchers will be merged into storages. The storages are useful when managers audit the book surplus or debts. Furthermore, the IT department can solve the discrepancy of systematic demands and the systematic problems. Then, turn the knowledge into check points across the architecture. The integrated architecture assists the IT department in solving problems immediately for the accounting department and strengthens the internal control abilities for enterprises.

Figure 4 Web integrated deployment of Accounting System and KMP 5. Conclusion Enterprises establish the proper accounting system of internal control to help them reaching the operational and financial performance. The KMP has the potential to increase the performance in enterprises. A useful accounting system of internal control embodies the complete accounting functions, the reliability of financial reporting, and the safeguard of assets. The KMP is a potentially valuable tool to achieve this goal. This paper has proposed the WIPA to connect the accounting system and the KMP. All resources from intranet and internet can be utilized to support the accounting operation and knowledge management. The base on the principles of knowledge processes through the WIPA provides the beneficial result for the accounting system. The WIPA derives from WSA. This paper utilizes the base of WIPA to implement the accounting system associates with the KMP. The architecture can accommodate the heterogeneous systems to fit in with IT requirements and expansions in the future.

Further, the interaction between the IT and the accounting department can provide the knowledge feedback to fulfill all audit-check functions of accounting system through the web integrated architecture. The WIPA has been pilot set-up and application in a SME to demonstrate the feasibility of the architecture. The results of the architecture provide the way of utilizing KMP; moreover, they improve the flow of accounting operations, provide the friendly interface to accountants, help managers making better decisions, reach the internal control of enterprises, and show the achievements and financial statements for shareholders. REFERENCES Bourdreau, A. and Couillard, G. 1999. Systems Integration and Knowledge Management, Information Systems Management (Fall), 24–32. Brodsky, L. and Tan, Y. H. 2003, A Risk Management of ASPs, ECIS 2003, Naples, Italy. Beisiegel, M., Blohm, H., Booz, D., Dubray, J., Colyer, A., Edwards, M., Ferguson, D., Flood, B., Greenberg, M., Kearns, D., Marino, J., Mischkinsky, J., Nally, M., Pavlik, G., Rowley, M., Tam, K., and Trieloff, C. 2005. Building Systems Using a Service Oriented Architecture, Service Component Architecture, Whitepaper. Calabrese, F. A. 2000. A Suggested Framework of Key Elements Defining Effective Enterprise Knowledge Management Programs. Doctoral Dissertation. Washington, D.C.: Geroge Washington University. Currie, W. 2000. Expanding IS Outsourcing Services through Application Service Providers, European Conference on Information Systems, Vienna, Austria. Curbera, F., Duftler, M., Khalaf, R., Nagy, W., Mukhi, N., and Weerawarana, S. 2002. Unraveling the Web services Web, IEEE Internet Computing, 6(2), 86-93. Currie, W. 2003. Value Creation from Application Services Provisioning Lessons from Four Vendor Firms, International Conference on Information Systems, Seattle, WA, USA, 14-17. Currie, W. 2004. Value Creation from E-Business Models, Oxford: Elsevier Butterworth-Heinemann. Currie, W., Wang, X. and Weerakkody, V. 2004. Developing Web Services Using the Microsoft. Net Platform: Technical and Business Challenges, Journal of Enterprise Information, 17(4). Friedman, B., Kahn, P. H. and Howe, D. C. 2000. Trust Online. Communications of the ACM 43, 34-40. Geerts, G. and McCarthy, W. E. 1999. An Accounting Object Infrastructure for Knowledge- Based Enterprise Models, I E E E I n t e l l i g e n t S y s t e m s, 89-94.

IDC.1999. Knowledge Management Survey, http://www.idc.com. Kern, T., Willcocks, L. and Lacity, M.C. 2002. Application Service Provision: Risk Assessment and Mitigation. MIS Quarterly Executive, 1(2), 113-126. OECD. 2003. Seizing the Benefits of ICT in a Digital Economy. Paris, Organisation for Economic Co-operation and Development (OECD). Ohmori, K. 2003. An Internet Accounting System, Computational Intelligence and Multimedia Applications, ICCIMA Fifth International Conference, 278-283. Powell, T. C. and Dent-Micallef, A. 1997. Information Technology as Competitive Advantage: The Role of Human, Business, and Technology Resources Strategic, Management Journal, 18(5), 375-405. Pallos, M. S. 2001. Service-Oriented Architecture: A Primer, eAI Journal, December, 32-35. UDDI. 2003. UDDI Version 3.0.1, http://uddi.org/pubs/uddi-v3.0.1-20031014.htm. Vinoski, S. 2002. Web Services Interaction Models Part 1: Current Practice, IEEE Internet Computing, 6(3), 89 -91. Sessions, R. 2004. Interoperability through Service- Oriented Architectures (SOAs), An Object Watch White Paper. W3C. 2002 Web Services Description Language (WSDL) Version 1.2, W3C Note, http://www.w3.org/TR/2003/WD-ws-arch-20030808.

Similar Documents

Premium Essay

Information Technology

...Information & Communications Technology Research Proposal Name: Institution Affiliation: Background There has been developing awareness that the power information technology and computing. This must be, and can be, amplified past its customary client base to achieve individuals who up to this point have not had an entry to such innovation. Being digitally joined has gotten to be continually basic to economic, instructive, and social headway. The objective of this exploration subsidizing activity is to create new information that will help stretch the capacities of figuring engineering better to serve social and economic difficulties of underserved groups, both provincial and urban. The expression Data and Communication Technology for Development are likewise utilized as a part of the scholarly research group to depict this same objective. Information and Communication Technologies must be moderate, available, and important. Novel methodologies in figuring engineering have the potential for the extraordinary effect in a scope of regions, including instruction, human services, and economic improvement. The significance that exploration projects can have around there is noteworthy since there are troublesome mechanical issues to be unraveled to understand that vision. For example, work in last-mile organizing bases, making instinctive client interfaces, creating ease processing gadgets and making applicable applications in regions (Werthner, 2009). Research Purpose ...

Words: 988 - Pages: 4

Premium Essay

Information Technology

...Information Technology (IT) Information Technology (IT) Information technology, in the first instance, brings to us the latest developments in science, technology and the arts in the advanced world. We can make use of the latest techniques and methods in the sciences and the arts within the four corners of our buildings. We can communicate with anyone anywhere in the world and send him messages in a jiffy. The e-mail has made it possible to send any amount of information to any place in a few seconds. The receiver of the information can at once send back the reply or his own information. Talk on programmes like hotmail messenger or yahoo messenger, along with the display of the talkers on the screen, gives a direct personal touch to the exchange of information and ideas. Information technology has, in effect, reduced distance completely between parties sitting in continents separated by the high seas and immeasurable skies. Computer technology can help us to bring about social, political and economic revolution in the country. We can make a complete study of the different social, political and economic systems in the most successful countries. The past, present and possible future of these countries and societies can be studied through computer records, films and programmes.4essay.blogspot.com Computer technology can be used to collect information about the different classes and groups of the people in the country. A thorough study of their educational, professional and social...

Words: 461 - Pages: 2

Premium Essay

Information Technology

...Chapter 1 1. How can information technology support a company’s business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer. The term information technology refers to the various hardware, software, networking, and data management parts that are a necessity for the system to function (pg. 8). Businesses regularly utilize computer-based information systems in order to record customer purchases, keep track of inventory, pay employees, buy new merchandise, and evaluate sales trends. Without the support of information technology, businesses would ultimately fall apart. For example if a business did not choose to use computer-based information systems, they wouldn't be able to evaluate what items were selling better than others and ultimately lose valuable information for future success. Information technology can also aid in decision making for a business. Decisions are made based on analysis provided by computer-based information systems. For example a store manager may make the decision whether to discontinue an item for sale or keep it on the floor due to analysis of sales trends provided by computer-based systems. Lastly information technology helps business gain a competitive advantage. A competitive advantage is gained through computer-based information systems by applying innovative application of information technologies (pg. 9). For example a store manager installing touch screen kiosks throughout the organization...

Words: 1404 - Pages: 6

Premium Essay

Information Technology

...Information technology affects almost every aspect of the business world in today’s modern society. Within a matter of decades both internal and external processes have been transformed. For example, managers no longer handwrite reports for their office staff to type or use mail to correspond with clients or post flyers to communicate with employees. My department at Princeton University has experienced these types’of scenarios over the past five years. Five years ago, our procedures and computers systems were antiquated. The need for technology was essential to provide better communication and improve procedures, especially in a department that has over 200 employees who work in different locations throughout the University such as dorms, academic buildings, and athletic facilities. For instance, my department’s time-off request procedure and the process by which supervisors receive their daily work orders were lengthy, required several steps, and needed to be modernized. Realizing how outdated these procedures were, my department sought out several different types of technology to help improve its overall functionality. Technology acquired included, Sharepoint, Ipads, and EZ Maxmobile App. In just a short period of time, these products have significantly improved communication and procedures throughout the department and enhanced our customer service to our clients. The use of Sharepoint, a web-based intranet that streamlines the management of and access to data,...

Words: 416 - Pages: 2

Premium Essay

Role of Information Technology

...International Journal of Information Science and Technology THE ROLE AND EFFECT OF INFORMATION TECHNOLOGY IN THE CREATION AND MAINTENANCE OF SUSTAINABLE COMPETITIVE ADVANTAGE A. Talebnejad[1] Faculty of Management and Accounting Shahid Beheshti University Email: taleb149@yahoo.com Abstract -By the appropriate use of information technology, organizations can achieve sustainable competitive advantages. This technology because of including some characteristics such as being up-to-date, fast and precise and having different geographic localities all the time, has improved organizational efficiency, effectiveness and performance. In this article, we intend to investigate the role and effect of information technology in the creation and maintenance of sustainable competitive advantages from two different approaches: market-based approach and the resource-based approach. In the Market-based approach, meeting customer's and creating values for them, using information technology and the issue of achieving the competitive advantage and position in the market by organizations are addressed. In the resource-based approach, compatibility of the organization's resources such as those of information technology and organizational skills, particularly managerial ones are investigated. Amongst different organizational skills and resources, only managerial skills of information technology can create a sustainable competitive advantage. Keywords: Information Technology, Sustainable Competitive...

Words: 4885 - Pages: 20

Free Essay

Policing Information Technology

...Policing Information Technology Bill Smith BIS/220 July 11, 2012 Alisha Johnson Abstract Policing Information Technology Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the company’s...

Words: 529 - Pages: 3

Premium Essay

Information Technology Tool

...partner in a new business, one of your roles is to review information technology tools available to assist you in a certain aspect of your business (e.g., marketing, accounting, sales, quality assurance). Select a technology that emerged within the last five years and consider its impact on your business. Make a decision on whether to adopt this technology. B. Information Technology Tools 1. How technology helps business grow * SBA. (December 13, 2010).New Technology Guide Helps Entrepreneurs Grow Their Small Businesses and Create Jobs. Retrieved April 10, 2012 from, http://archive.sba.gov/idc/groups/public/documents/sba_homepage/news_release_10-71.pdf * Smart Business Information Technology. (2012). Information technology aids in business growth. Retrieved April 10, 2012 from, http://bizitc.com/performance/information-technology-aids-in-business-growth/ * SBA. (2012). New technology guide helps entrepreneurs grow their small businesses and create jobs. Retrieved April 10, 2012 from, http://www.asbdc.org/Library/SBA%20Technology%20Guide.pdf * Entrepreneurs’ Organization. (2012). How I leveraged technology to grow my business. Retreived April 10, 2012 from, http://www.eonetwork.org/knowledgebase/specialfeatures/Pages/HowILeveragedTechnologytoGrowMyBusiness.aspx 2. How technology lessens the geographical gap between countries * Net Industries. (2012). The international gap in technology. Retrieved April 10, 2012 from, http://education.stateuniversity...

Words: 2563 - Pages: 11

Free Essay

Information Technology Acts

...Information Technology Acts Chad T Lane BUS/220 30 June 2014 Mrs Colette Gardner Information technology is a dynamic and rapidly changing industry. Up until roughly two hundred years ago, all communication required walking, horseback, or some other form of manual labor. The telegraph was the first step down the path of information technology when Claude Chappe first invented it in 1794 (Bellis, ). The telegraph was the gateway to a plethora of other forms of communication that lead to social media, email, blogging, text messaging, etc. The internet is probably the biggest and most powerful breakthrough in information technology. With that, comes a lot of potential for people to do things they should not, say things they would not say in person, and target an audience that might have gone otherwise unreached. The Children’s Internet Protection Act of 2000 was passed in order to prevent children from exposure to pornographic material and things that are not age appropriate for young children in situations where schools or libraries receive internet at a discounted rate  (FCC,). Prior to the internet, someone wishing to purchase pornography or R-rated movies would be required to prove legal age to do so because these transactions largely took place in person. The internet has no hard and fast way of verifying age so keeping children away from things they should not see, requires use of filters and other resources to block certain material and websites. Many people will...

Words: 467 - Pages: 2

Premium Essay

Information Technology in Business

...Riordan Manufacturing business chose to outsource their information technology (IT) systems and services for a variety of reasons. This choice carries with it some obvious benefits and some often not so obvious risks. Companies choosing to outsource IT must weigh the benefits and risks carefully, take measures to attenuate the associated risks and prepare their employees for the change by launching a campaign about the benefits of outsourcing. The risks involved with outsourcing mainly involve accessibility to service. According to Applegate (1995), if you rely on an outside contractor who generally has to come onsite to support your network, then [consider removing "then"] you live in a world where you simply hope critical services don’t [Contractions are inappropriate in academic writing--write it out] go down at a time when your ability to conduct business will be interrupted. Busy IT contractors may take days before they can come in to help, and this will likely be unacceptable if the problem is making it impossible for your staff to work. All the money saved by using a pay-as-you-go contractor can be lost with one serious issue within your network. With remote IT support such as managed services, some business owners are uncomfortable with having less personal touch and immediate feedback. When you have your own network administrator onsite, you can call them into your office and get a report or have questions answered. A remote based service will never be able to match...

Words: 991 - Pages: 4

Premium Essay

Communication and Information Technology

...Communication and Information Technology Latasha Wright HCS/320 June 18, 2012 Patricia Bird Communication and Information Technology Communication and information technology is frequently used as way to deliver effective communication messages. Many standard organizations such as hospitals and medical facilities continue to find ways to implement and improve communication channels. For these reasons, the use of e-mail communication in the hospital setting should be used as a way to enhance communication and information technology. First, I will explain how efficient and effective e-mail communication improves hospitals’ communication between personnel and patients. Because implementing new forms of technology comes with some advantages and disadvantages; I will discuss the incentives and drawbacks as well as its influences on consumers. Next I will explain the short and long-term financial impact that e-mail communication has on organizations. Then, I will provide technical improvements with e-mail communication in the future and why. Last, I will make necessary recommendations to improve e-mail communication in the hospital environment. My hope is that this essay will provide a better understanding about the use of e-mail communication and how organizations can benefit from its use. Efficient and Effective A popular form of communication, e-mail communication, is both efficient and effective for organizational use. E-mail communication is said to...

Words: 1070 - Pages: 5

Free Essay

Information Technology Acts

...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...

Words: 1432 - Pages: 6

Premium Essay

Communication and Information Technology

...Communication and Information Technology HCS/320 January 28, 2012 Dr. B Communication and Information Technology Communication has been a key element in the health care field for many years. A patient communicates to the physician what is wrong with them, the physician communicates with the nurse what is to be done, and the information is entered into the patient file. The medical biller then bills the insurance or patient by sending an electronic claim, and the payer sends back a statement of payment. All this is considered communication. Over the years technology has advanced and the ways these communications have been used have changed. Now communication is done electronically, sent by email and even text message; there is even a way to teleconference over video phone with a patient or physician. After researching new technology I found Vocera, a communication system that makes communicating between team members faster and easier. The system uses a hand held device as well as a computer based program to communicate messages even alerts to get in touch with team members. The voice activated hand held device is the size of a cell phone and is typically hung around the neck. The hand held voice activated device can be used to call another team member, or can be used to access a paging system in case of emergency situations. Physicians can use the device to turn on their status, such as on call or on lunch break. When the computer based program is accessed by a nurse looking...

Words: 777 - Pages: 4

Free Essay

Information Technology Acts

...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list. As technology has expanded, it has become increasingly...

Words: 556 - Pages: 3

Premium Essay

Information Technology Agenda

...IT Agenda 1 IT Agenda and Organizational Strategies HCI 510 November 19, 2012 Mr. Lee Edwards IT Agenda 2 To achieve success in this information economy, IT is a critical facet of any organization. IT goals exists to help organizational leaders understand why IT goals must align with those of the business, how IT delivers value, and how its performance is measured, its resources properly allocated and its risks mitigated. In this paper, I will be discussing the relationship between the IT Department and organizational strategies, along with strategies that make an effective IT Department. Effective organizational strategies should be looked at like a wheel. It comprises five components: Leadership, Decision-making and structure, People, Work processes and systems and of course, culture. Leadership comprises a clear vision and priorities and a cohesive leadership team. The decision making portion makes up clear roles and accountabilities for decisions and an organizational structure that supports objectives. The people portion of the wheel includes organizational and individual talents necessary for success, and performance measures and incentives aligned with objectives. Work processes and systems encompass superior execution of pragmatic work processes and effective and efficient support processes and systems. And, finally the last portion is the organization culture. The culture covers high performance values and behaviors and a...

Words: 867 - Pages: 4

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 BSAH16ZDG6 Facilitator: Dr. Charles A. von Urff Week 1 Individual Assessment Due March 11, 2013 Submitted March 11, 2013 Executive Summary In today’s age and society, information technology is a growing necessity in the functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information technology...

Words: 994 - Pages: 4