Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

INFORMATION SYSTEMS

Aim of the assignment

The aim of this assignment is to assess the information management challenges that face business and the role that information technologies and systems may have in addressing these challenges.
Learning outcomes

After completing this assignment you will have gained experience of:

• The issues raised in the exploitation and management of information technologies and systems

• Current technological opportunities and solutions for meeting business needs Brief

Choose one of the two topics below and prepare an academic report answering the problem posed by your chosen topic. You are required to analyse the business and information management issues posed by the topic and to provide a credible argument for addressing the issues. You should illustrate your discussion with exs taken from an operational context.

Topic

You have been appointed as part of a consultancy team that has been commissioned to assess the management issues concerned with the delivery of an online system for the submission of personal tax returns for a large European country. The expectation is that this system will collect and process returns for 50% of the population within the first three years of operation and that this will represent taxes worth ~€93bn (£65bn, $132bn).

The system will be built and maintained by a private sector company with established expertise in the running of large-scale systems and the management of data centres. The credit rating of the company is AA.

The users of the system will be Government employees (who will have access to all data relevant to their job) and citizens (who will only have access to their personal data) using passwords generated by the Government but modifiable by the citizen.

The operational system will be run from a primary data centre located in a suburb on the outskirts of the capital city. A secondary back-up data centre is located in a nearby town approximately 25km from the capital.

Access to the system will be via a secure Government network (for Government employees) and via the Internet (for citizens). Citizens can download tax return software from the Government’s web-site to complete their returns off-line.

Your client wishes you to assess the business continuity and security issues that will need to be addressed by the supplier of the system in order to assess independently the supplier’s level of preparedness. Your specific role is to identify the ten key risks to which the system will be exposed and to suggest the best technological or procedural solution for mitigating each risk. You should also provide a justification for prioritising the individual risks.

Format

The assignment is individual-based and should be between 3,000 and 4000 words (excluding title page, To C and references). Any wordage in excess of 4000 will be ignored for marking purposes. A statement of the word count must be placed immediately following the main text.
The aim is to set assignments that allow you to demonstrate your understanding of the topics covered in the course and we want you to have the best opportunity to record results which truly reflect your capabilities. However, you will not get credit for material which is not related to the topic so ensure that your assignment is focused on what has been requested.

Structuring your assignment

It is always a good idea to work out a structure for your assignment in advance, and to decide what parts of your explanations and arguments are going into each section, before filling in the detail. It is helpful both to you and to the reader for longer assignments if you provide headings for each of the main sections.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91084

Have any Question? 


Related Questions in Computer Engineering

1 show that the approximate diffusion equations derived for

1. Show that the approximate diffusion equations derived for a constant electric field, (750.3A) and (750.4A), are also valid if E is not spatially constant but the region is quasi-neutral. This enables a derivation of a ...

In the segregation model the agents look to their

In the Segregation model, the agents look to their neighborhood composition to decide if they are happy. Can you make the size of shape of the neighborhood a parameter? How does this change the results of the model?

Can you please help me to write a cover letter applying for

Can you please help me to Write a Cover Letter applying for an IT position in Computer Programming.

1 assume we want to connect two isolated hosts together to

1. Assume we want to connect two isolated hosts together to let each host communicate with the other. Do we need a link-layer switch between the two? Explain. 2. If there is a single path between the source host and the ...

1 write a program that can read an indefinite number of

1. Write a program that can read an indefinite number of lines of VB.NET code and store reserved words in one linked list and identifiers and literals in another linked list. When the program has finished reading input, ...

Lab assignmentsmethodsobjectivesin this lab assignment

Lab Assignments Methods Objectives In this lab assignment, students will learn: - How to define methods and functions - How to call methods or functions - How to specify parameters and how to pass arguments by value Goal ...

1 draw the pipeline execution diagram for this code

1. Draw the pipeline execution diagram for this code, assuming there are no delay slots and that branches execute in the EX stage. 2. Repeat 4.14.1, but assume that delay slots are used. In the given code, the instructio ...

Open the rope model from the chemistry and physics section

Open the Rope model from the Chemistry and Physics section of the NetLogo models library. This model simulates a wave moving along a rope. The right end of the rope (shown in blue) is fixed to a wall. The left end of the ...

A printed circuit board can be modeled as a network of

A printed circuit board can be modeled as a network of pathways that either inerge into other paths as terminate into a node. Develop a vision system for isolating defects such as breaks (open circuits) and leaks (short ...

Consider the following binary treea show the order the

Consider the following binary tree (a) Show the order the nodes will be visited in a: (b) Identify all of the leaf nodes. (c) Identify all of the interior nodes. (d) List all of the nodes on level 4. (e) List all of the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro