Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

INFORMATION SYSTEMS

Aim of the assignment

The aim of this assignment is to assess the information management challenges that face business and the role that information technologies and systems may have in addressing these challenges.
Learning outcomes

After completing this assignment you will have gained experience of:

• The issues raised in the exploitation and management of information technologies and systems

• Current technological opportunities and solutions for meeting business needs Brief

Choose one of the two topics below and prepare an academic report answering the problem posed by your chosen topic. You are required to analyse the business and information management issues posed by the topic and to provide a credible argument for addressing the issues. You should illustrate your discussion with exs taken from an operational context.

Topic

You have been appointed as part of a consultancy team that has been commissioned to assess the management issues concerned with the delivery of an online system for the submission of personal tax returns for a large European country. The expectation is that this system will collect and process returns for 50% of the population within the first three years of operation and that this will represent taxes worth ~€93bn (£65bn, $132bn).

The system will be built and maintained by a private sector company with established expertise in the running of large-scale systems and the management of data centres. The credit rating of the company is AA.

The users of the system will be Government employees (who will have access to all data relevant to their job) and citizens (who will only have access to their personal data) using passwords generated by the Government but modifiable by the citizen.

The operational system will be run from a primary data centre located in a suburb on the outskirts of the capital city. A secondary back-up data centre is located in a nearby town approximately 25km from the capital.

Access to the system will be via a secure Government network (for Government employees) and via the Internet (for citizens). Citizens can download tax return software from the Government’s web-site to complete their returns off-line.

Your client wishes you to assess the business continuity and security issues that will need to be addressed by the supplier of the system in order to assess independently the supplier’s level of preparedness. Your specific role is to identify the ten key risks to which the system will be exposed and to suggest the best technological or procedural solution for mitigating each risk. You should also provide a justification for prioritising the individual risks.

Format

The assignment is individual-based and should be between 3,000 and 4000 words (excluding title page, To C and references). Any wordage in excess of 4000 will be ignored for marking purposes. A statement of the word count must be placed immediately following the main text.
The aim is to set assignments that allow you to demonstrate your understanding of the topics covered in the course and we want you to have the best opportunity to record results which truly reflect your capabilities. However, you will not get credit for material which is not related to the topic so ensure that your assignment is focused on what has been requested.

Structuring your assignment

It is always a good idea to work out a structure for your assignment in advance, and to decide what parts of your explanations and arguments are going into each section, before filling in the detail. It is helpful both to you and to the reader for longer assignments if you provide headings for each of the main sections.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91084

Have any Question? 


Related Questions in Computer Engineering

Assignmentoverviewthe final exam consists of 8 essay

Assignment Overview: The Final Exam consists of 8 Essay Questions. Students will select and answer 4 of the 8 questions. If you answer more than 4 only the first four answered sequentially will be assessed. Students are ...

Write getstring and putstring functions the first

Write getstring () and putstring () functions. The first function should use a file pointer, say ifp, and the macro getc () to read a string from the file pointed to by ifp. The second function should use a file pointer, ...

A company publishes the design of its security software

A company publishes the design of its security software product in a manual that accompanies the executable software. a. In what ways does this satisfy the principle of open design? In what ways does it not? b. Given tha ...

Stakeholders include everyone who are actively involved in

Stakeholders include everyone who are actively involved in the project or whose interests may be affected as a result of the project execution or completion. Why should they be involved in the creation of lessons learned ...

Implement a class roachpopulation that simulates the growth

Implement a class RoachPopulation that simulates the growth of a roach population. The constructor takes the size of the initial roach population. The breed method simulates a period in which the roaches breed, which dou ...

1 for each mux show the values of its data output during

1. For each Mux, show the values of its data output during the execution of this instruction and these register values. 2. For the ALU and the two add units, what are their data input values? 3. What are the values of al ...

Change the implementation of the gettax method in the

Change the implementation of the getTax method in the TaxReturn class, by setting a variable rate1_limit, depending on the marital status. Then have a single formula that computes the tax, depending on the income and the ...

In an 80211 network assume station a has four fragments to

In an 802.11 network, assume station A has four fragments to send to station B. If the sequence number of the first fragment is selected as 3273, what are the values of the more fragment flag, fragment number, and sequen ...

1 run the binary search method on a set of unordered data

1. Run the binary search method on a set of unordered data. What happens? 2. Using the CArray class with the SeqSearch method and the BinSearch method, create an array of 1,000 random integers. Add a new private Integer ...

1 identify the five components of a data communications

1. Identify the five components of a data communications system. 2. What are the three criteria necessary for an effective and efficient network? 3. What are the advantages of a multipoint connection over a point-to-poin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen