Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

INFORMATION SYSTEMS

Aim of the assignment

The aim of this assignment is to assess the information management challenges that face business and the role that information technologies and systems may have in addressing these challenges.
Learning outcomes

After completing this assignment you will have gained experience of:

• The issues raised in the exploitation and management of information technologies and systems

• Current technological opportunities and solutions for meeting business needs Brief

Choose one of the two topics below and prepare an academic report answering the problem posed by your chosen topic. You are required to analyse the business and information management issues posed by the topic and to provide a credible argument for addressing the issues. You should illustrate your discussion with exs taken from an operational context.

Topic

You have been appointed as part of a consultancy team that has been commissioned to assess the management issues concerned with the delivery of an online system for the submission of personal tax returns for a large European country. The expectation is that this system will collect and process returns for 50% of the population within the first three years of operation and that this will represent taxes worth ~€93bn (£65bn, $132bn).

The system will be built and maintained by a private sector company with established expertise in the running of large-scale systems and the management of data centres. The credit rating of the company is AA.

The users of the system will be Government employees (who will have access to all data relevant to their job) and citizens (who will only have access to their personal data) using passwords generated by the Government but modifiable by the citizen.

The operational system will be run from a primary data centre located in a suburb on the outskirts of the capital city. A secondary back-up data centre is located in a nearby town approximately 25km from the capital.

Access to the system will be via a secure Government network (for Government employees) and via the Internet (for citizens). Citizens can download tax return software from the Government’s web-site to complete their returns off-line.

Your client wishes you to assess the business continuity and security issues that will need to be addressed by the supplier of the system in order to assess independently the supplier’s level of preparedness. Your specific role is to identify the ten key risks to which the system will be exposed and to suggest the best technological or procedural solution for mitigating each risk. You should also provide a justification for prioritising the individual risks.

Format

The assignment is individual-based and should be between 3,000 and 4000 words (excluding title page, To C and references). Any wordage in excess of 4000 will be ignored for marking purposes. A statement of the word count must be placed immediately following the main text.
The aim is to set assignments that allow you to demonstrate your understanding of the topics covered in the course and we want you to have the best opportunity to record results which truly reflect your capabilities. However, you will not get credit for material which is not related to the topic so ensure that your assignment is focused on what has been requested.

Structuring your assignment

It is always a good idea to work out a structure for your assignment in advance, and to decide what parts of your explanations and arguments are going into each section, before filling in the detail. It is helpful both to you and to the reader for longer assignments if you provide headings for each of the main sections.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91084

Have any Question?


Related Questions in Computer Engineering

Suppose we have a magnetic disk with the following

Suppose we have a magnetic disk with the following parameters: • Average seek time = 8 ms • Rotation rate = 7200 RPM • Transfer rate = 150 MB/second • Sector size = 512 bytes. What is the average time to read a single se ...

Question provide a real-world example or describe a

Question: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. Need 300-350 words APA sta ...

Recall the linked list data structure from previous week

Recall the linked list data structure from previous week, that follows a structure as given above. Purpose of this lab is to understanding the fundamentals of the Linked Lists. Please check the attached code and implemen ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

Select one of the methods that makes the most sense to you

Select one of the methods that makes the most sense to you, and list the steps in detail. Imagine that you're tutoring another student in how to calculate subnets, and be sure to include enough detail that the steps woul ...

Today is your 35th birthday and it occurs to you that your

Today is your 35th birthday and it occurs to you that your current retirement savings may be insufficient to maintain for you the lifestyle to which you have become accustomed. • The value of your retirement account toda ...

Chebyshevs theorem is used to approximate the proportion of

Chebyshev's theorem is used to approximate the proportion of observations for any data set, regardless of the shape of the distribution. Assume that a distribution has a mean of 255 and standard deviation of 20. Approxim ...

1 a router operates at which osi layer application

1. A router operates at which OSI layer? Application Presentation Session Transport Network Data Link Phsical 2. Suppose application data of size X bytes is transmitted from system A to system B via the OSI layers and th ...

Remembering the pythagorean theorem - the square of the

Remembering the Pythagorean Theorem - The square of the hypotenuse is equal to the sum of the squares of the other two sides Your assignment is to design a Fortran 95 program with three solutions for the quadratic equati ...

Structured programming is a subset of procedural

Structured programming is a subset of procedural programming. If structured programming promotes the creation of good code and procedural programs are easier to maintain, why do you need to shift to OOP? What are the pro ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As