... |Business Information Systems | Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course provides an overview of Business Information Systems. This includes a broad foundation for both technical and nontechnical business professionals. Special emphasis is placed on how information is used by different types of businesses across different industries. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (2nd ed.). Hoboken, NJ: Wiley. All electronic materials are available on the student website. |Week One: Overview of Information Systems...
Words: 2308 - Pages: 10
...Tony Tyler Director General & CEO International Air Transport Association Annual Report 2012 68th Annual General Meeting Beijing, June 2012 Contents IATA Membership Board of Governors Director General’s message The state of the industry Safety Feature: What is the benefit of global connectivity? 2 4 6 10 18 22 26 30 36 42 48 52 Feature: How safe can we be? Security Feature: Do I need to take my shoes off? Taxation & regulatory policy Environment Feature: What is right for the passenger? Feature: Can aviation biofuels work? Simplifying the Business Feature: What’s on offer? Cost efficiency Feature: Why does economic regulation matter? Industry settlement systems Aviation solutions Note: Unless specified otherwise, all dollar ($) figures refer to US dollars (US$). This review uses only 100% recycled paper (Cyclus Print) and vegetable inks. # IATA Membership as of 1 May 2012 ABSA Cargo Airline Adria Airways Aegean Airlines Aer Lingus Aero República Aeroflot Aerolineas Argentinas Aeromexico Aerosvit Airlines Afriqiyah Airways Aigle Azur Air Algérie Air Astana Air Austral Air Baltic Air Berlin Air Canada Air China Air Corsica Air Europa Air France Air India Air Koryo Air Macau Air Madagascar Air Malawi Air Malta Air Mauritius Air Moldova Air Namibia Air New Zealand Air Nigeria Air Niugini Air Nostrum Air One Air Pacific Air Seychelles Air Tahiti Air Tahiti Nui Air Transat Air Vanuatu Air Zimbabwe Aircalin Airlink Alaska Airlines...
Words: 17801 - Pages: 72
...Risk Management Plan For Smartphone | | | 2/24/2013 | | * Table of Contents 1 Introduction 4 1.1 Purpose 5 1.2 Objectives 5 1.3 Risk Management Scope 5 1.4 Background 5 1.5 Supporting Products 6 1.6 Referenced Products 6 2 Roles and Responsibilities 6 2.1 Roles and Responsibilities 6 2.2 Support Infrastructure Tools 8 2.3 Training 8 3 Risk Management Process 9 3.1 Identity 9 3.2 Analyze 10 3.2.1 Probability of Occurrence 10 3.2.2 Probability of Impact 10 3.2.3 Risk Factor 11 3.3 Plan Response 12 3.4 Monitor/Control 13 3.4.1 Communication 14 3.4.2 Reporting 15 3.4.3 Performance Measurement 16 3.4.4 Continual Process Improvement 16 3.4.5 Audit 16 Document Revision History | Date | Version | Updates Provided By: | Summary of Updates | 02/03/2013 | 1.0 | Komal Shah | New document | | | | | | | | | | | | | Product/Project Manager’s Signature Your signature indicates that risk management plan has been plan has been prepared with input from content experts and is in compliance with applicable project standards Written By: Dept. #: Date: Komal Shah – Project Manager Reviewer’s Signature Your signature indicates that as content expert, you have reviewed this document and it accurately and completely reflects the requirements necessary to implement...
Words: 3606 - Pages: 15
...This page intentionally left blank Download at www.Pin5i.Com Essentials of Systems Analysis and Design Download at www.Pin5i.Com Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Assistant: Ashlee Bradbury Director of Marketing: Patrice Lumumba Jones Executive Marketing Manager: Anne Fahlgren Senior Managing Editor: Judy Leale Production Project Manager: Kelly Warsak Senior Operations Supervisor: Arnold Vila Operations Specialist: Cathleen Petersen Creative Director: Blair Brown Senior Art Director/Design Supervisor: Janet Slowik Text Designer: Michael Fruhbeis Creative Director/Cover: Jayne Conte Cover Designer: Suzanne Duda Cover Art: Fotolia/3d mosaic/©Redshinestudio Manager, Rights and Permissions: Hessa Albader Media Project Manager: Lisa Rinaldi Media Editor: Denise Vaughn Full-Service Project Management: Tiffany Timmerman/S4Carlisle Publishing Services Composition: S4Carlisle Publishing Services Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: ITCCentury Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft...
Words: 179288 - Pages: 718
...Technology Chalmers University of Technology Contents Abstract ............................................................................................................................. i Acknowledgements........................................................................................................... ii Foreword ......................................................................................................................... iii Introduction ...................................................................................................................... 1 Louis Vuitton and the LVMH group ............................................................................................ 1 Louis Vuitton’s production system...
Words: 9966 - Pages: 40
...CASE: GS-66 DATE: 06/05/09 CISCO SYSTEMS, INC.: COLLABORATING ON NEW PRODUCT INTRODUCTION On November 13, 2007, more than 100 employees of Cisco Systems, Inc. assembled in classic Cisco fashion: they dialed in from multiple locations around the world for an important meeting. The purpose of the gathering was to get the green light from senior management to manufacture a new high-end router that would make the giant networking company more competitive in an age of surging Internet traffic.1 The project’s code name, Viking, said it all. The router for broadband service providers would break ground in power and speed, reminiscent of the Norse warriors and explorers of Europe during the eighth to eleventh centuries. The meeting represented a culmination of several years of development work by a cross-functional, global team of Cisco specialists in engineering, manufacturing, marketing and other areas. Just months earlier, in mid-2007, Cisco overhauled the project by sharply boosting the router’s speed and capacity. This would allow the company to leapfrog competitors and offer a low-cost, powerful new router platform for the next 10 to 15 years. That day in November, the Viking team was seeking an “execution commit” from senior management in manufacturing. If it got the go-ahead, Cisco would be ready to commit the resources to launch the new product. But the Cisco team knew it faced many challenges. The Viking project would be one of the company’s most complex...
Words: 12040 - Pages: 49
...CHAPTER 5 Internal Control Evaluation: Assessing Control Risk LEARNING OBJECTIVES | | | | | |Review |Exercises, Problems, | | |Checkpoints |and Simulations | | | | | |Distinguish between management’s and auditors’ responsibilities |1, 2, 3, 4, 5 | | |regarding a company’s internal control. | | | | | | | |Define and describe internal control. |6, 7, 8 | | | | | | |Define and describe the five basic components of internal control, |9, 10, 11, 12, 13, 14, 15, 16, |62, 66, 69, 70 | |and specify some of their characteristics. ...
Words: 9314 - Pages: 38
...The United States Military Police Corps History and steps to being a Member of the Military Police Corps Why do we study history? the answer to that question is a three-part answer, one not to repeat the mistakes of the past, second to understand how the past affects today and the future and third to see where we are going as we must know where we have come from. The Military Police Corps was established The Military Police Corps is one of the youngest branches of the United States Army. It was officially established on 26 September 1941. It is traditions of duty and service is unsurpassed in our armed services. Soldiers have been performing police duties from the time of the Revolutionary War, when these duties were assigned mainly to a mounted police force called the "troops of the Marechaussee.” Soldiers as the Veteran's Reserve Corps and Provost Corps performed military police duties during the Civil War. MPs served with distinction in the Spanish American War, WWI, WWII, the Korean Conflict, and in Vietnam. Because of their distinguished service in Vietnam, the Military Police Corps was designated a combat support and service of the Army on 14 October 1968. Whenever the United States engaged in warfare, some form of police element emerged to assist its leaders in maintaining various aspects of discipline. Surfacing when necessity dictated, the Military Police Corps evolved through several phases, each meeting the needs of a particular period in American history. Assuming...
Words: 2905 - Pages: 12
...involved the designing and development of a suitable human computer interface to provide a log on module for the Kuwait armed forces computer system. The development focused on relieving the user from the load of creating, remembering and maintaining their passwords for the login process. Based on the fact that the Kuwait information and communication technology literacy levels are still in their infancy stage, the conventional authentication system was proved unfriendly to the user. This system was developed with this in mind. This proposed system relies on the user logging in to the system after identifying five pictures they uploaded earlier from among a grid of twenty five pictures. By selecting the five correct pictures which they uploaded, the system was able to successfully authenticate the user. Using these pictures greatly reduced the mental load on a user who was required to remember strong passwords that ended up being compromised (Badre 2002). The use of pictures or graphical images for authentication or access control is a practice called biometrics that is gaining popularity in establishing system security today. Due to the need to deliver a solution in the shortest time possible the agile methodology was employed here. This project was considered a rapid applications development (RAD) project (Martin 1991). The phases of the project were time bound to ensure the rapidity of development. Prototyping as a rapid application development technique was heavily relied...
Words: 17373 - Pages: 70
...Hertfordshire, Hatfield, Hertfordshire, England ABSTRACT I INTRODUCTION I This article investigates the benefits and supports provided by project management methodologies (PMMs) to project managers for the management and delivery of information technology/ information system (IT/IS) projects. Using a qualitative approach, through case study strategy, the role of PMMs is examined in different business and project contexts. This article evaluates the benefit of PMMs based on their traits and characteristics and investigates PMMs in their operational context: where PMMs come from and how they support practitioners. The findings suggest a misalignment between the intended benefit of PMMs at the strategic level and the reported benefits by project managers at the project level. Additionally, it is shown that practitioners’ expertise, accountability, and attitudes all have a direct influence on the extent to which PMMs contribute to and benefit the management of projects. report from former UK Health Secretary Andrew Lansley captured the attention of many by highlighting that “Labour’s IT programme let down the NHS [National Health Service] and wasted taxpayers’ money by imposing a top-down IT system on the local NHS, which didn’t fit their needs” (BBC News, 2011). This report highlighted significant issues associated with IT/IS project delivery. Successful delivery of projects is essential to the effective functioning of government and has a direct bearing on departments’...
Words: 10351 - Pages: 42
...International Tourism “The tourism in Germany” Essay by Florian Otto BECKER Introduction: Germany is the seventh most visited country in the world with an estimated total of 31,5 Million visitors in 2014. It is a widely diverse country that has to show and offer vast numbers of attractions. From the North - and Baltic Seas with its coasts and islands to the Alps, this nation situated in the heart of Europe, offers nature parks, beautiful landscapes, strongholds from the medieval age and authentic Roman treasures as well as a well-developed infrastructure. But obviously there is not just nature or old notable things to see. Germany likewise offers also some of the absolute most energizing cities on the planet where one can appreciate shopping, celebrating, and the excellent restaurants and cafés in the heart of every city. History: The historical backdrop of tourism in Germany goes back to the ancient Romans who used Germanic healing springs and founded cities with spas as Aquae Granni (Aachen) and Aquae Mattiacorum (Wiesbaden). As a result of teachings of Balneology, the first German Spas like Bad Schwallbach established from 1581. From the late eighteenth century onwards, urban communities like Dresden, Munich, Weimar and Berlin were significant stops on a European Grand tour. In the 19th century, noble spa- and health resorts on the coast and inland established when major train routes were built to connect the seaside spas to urban centers. Main travel destinations...
Words: 3173 - Pages: 13
...INFRASTRUCTURE MANGEMENT Project Report on Benchmarking Janmarg with Transmileno SUBMITTED TO Dr. Preeta Vyas SUBMITTED BY Marketing Group 2 Abhishek Shah Kumar Abhishek Mayank Jain Somadipta Das Seshayagreevan 1 INDEX Topics 1. History of BRTS 2. Bogota TRANSMELINIO System Performance: 3. Core Services of the BRTS system which turn up as the differentiating Factors: 4. Future Service Expansions of Bogota – TransMilenio System 14 Page No. 3 6 11 2 1. History of BRTS The first BRTS, inaugurated in 1974 in Curitiba, Brazil, caught the world’s attention. The city managers boldly demarcated and dedicated bus lanes on roads perceived as a privileged space for cars. These exclusive lanes improved speed and reduced travel time. Well-designed buses turned intra-city travel a pleasure. Intelligent integration of bus network and city planning reduced trip lengths. BRTS in Bogota (TransMilenio) In 18 December, 2000, the city of Bogotá in Colombia improved upon the Curitiba model and launched its own TransMilenio BRTS. Its resounding success silenced the sceptics and reiterated that wise planning does deliver. Cities were enlightened, and more and more of them reinvented their bus transport system. Ahmedabad BRTS (Janmarg) Indian cities, where the usage of private cars still constitutes a small percentage, had a wellworking bus transport in the past. But over the years, they overlooked modernisation and failed to make sufficient investments. Consequently, services quality...
Words: 5444 - Pages: 22
...HOW WILL A SEVERE TERRORIST ALERT EFFECT TOURISM IN SOUTH CAROLINA Brianne Buckner Dr. BRIAN MCCUE PAD 590 JUNE 21, 2010 STRAYER UNIVERSITY CHARLESTON, SC CAMPUS This Directed Research Project (DRP), was conducted and orally presented By ………………………………………………………………………………. Brianne Buckner, Student We hereby certify that this DRP submitted by Brianne Buckner conforms to acceptable standards, and as such is fully adequate in scope and quality. It is therefore approved as the fulfillment of the requirement of the degree of Hospitality and Tourism Management, MBA Approved:_________________________________________ Supervising Faculty__________________________________ Peer Review/Technical Advisor________________________ TABLE OF CONTENTS Page APROVAL PAGE………………………………………………………………………...i ABSTRACT………………………………………………………………………………ii TABLE OF CONTENTS...................................................................................................iii LIST OF TABLES AND FIGURES………………………………………………….….iv CHAPTER 1: INTRODUCTION TO THE STUDY………………………………….….6 Context of the Problem……………………………………………………………6 Statement of the Problem………………………………………………………….7 Main Research Question and Sub-questions………………………………………7 Significance of the Study…………………...…………………………….……….8 Research Design and Methodology………...
Words: 17727 - Pages: 71
... | |E-mail: |E-mail: | |Start Date: |Estimated End Date: | 1. Project Overview 5 1.1 PURPOSE: 5 1.2 KEY STAKEHOLDERS/DEPARTMENTS: 5 1.3 KEY DELIVERABLES: 5 1.4 MAIN OBJECTIVES: 6 1.5 ASSUMPTIONS: 6 1.6 CONSTRAINTS: 6 1.7 PROJECT MANAGEMENT PLAN VERSION CONTROL 6 2. INTEGRATION MANAGEMENT 7 2.1 INTEGRATED CHANGE CONTROL 7 2.1.1 CHANGE REQUEST FORM 7 2.1.2 CHANGE CONTROL BOARD (CCB) 8 2.2 PROJECT CHECKLIST 8 3. SCOPE MANAGEMENT PLAN 11 3.1 SCOPE STATEMENT 11 3.2 OVERALL SCOPE MANAGEMENT PLAN STRATEGY 11 3.2.1 GATHERING REQUIREMENTS 12 3.2.2 WBS EXAMPLE 15 3.3 SCOPE MANAGEMENT CHECKLIST 15 4. SCHEDULE MANAGEMENT PLAN 17 4.1 MILESTONE PLANNING & TRACKING TEMPLATES 17 4.2 SCHEDULE MANAGEMENT CHECKLIST 27 5. COST MANAGEMENT PLAN 28 5.1 RESOURCE PLANNING 28 5.2 COST MANAGEMENT WORKSHEET 28 5.3 PROJECT COST/SCHEDULE SUMMARY REPORT TEMPLATE 31 5.4 COST AND SCHEDULE PERFORMANCE...
Words: 7096 - Pages: 29
...MODULE H Information Systems Auditing LEARNING OBJECTIVES | Review Checkpoints | Exercises, Problems and Simulations | 1. List and describe the general and application controls in a computerized information system. | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 | 52, 53, 54, 55, 57, 58, 59, 60, 61, 62, 66 | 2. Explain the difference between auditing around the computer and auditing through the computer. | 14, 15, 16 | 51, 65 | 3. List several techniques auditors can use to perform tests of controls in a computerized information system. | 17, 18, 19, 20, 21 | 64 | 4. Describe the characteristics and control issues associated with end-user and other computing environments. | 22, 23, 24, 25 | 63 | 5. Define and describe computer fraud and the controls that an entity can use to prevent it. | 26, 27, 28, 29, 30 | 56 | SOLUTIONS FOR REVIEW CHECKPOINTS H.1 Given its extensive use, auditors must consider clients’ computerized information systems technology. All auditors should have sufficient familiarity with computers, computerized information systems, and computer controls to be able to complete the audit of simple systems and to work with information system auditors. More importantly, auditors must assess the control risk (and the risk of material misstatement) regardless of the technology used for preparing the financial statements. In a computerized...
Words: 10310 - Pages: 42