Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

INFORMATION SYSTEMS

Aim of the assignment

The aim of this assignment is to assess the information management challenges that face business and the role that information technologies and systems may have in addressing these challenges.
Learning outcomes

After completing this assignment you will have gained experience of:

• The issues raised in the exploitation and management of information technologies and systems

• Current technological opportunities and solutions for meeting business needs Brief

Choose one of the two topics below and prepare an academic report answering the problem posed by your chosen topic. You are required to analyse the business and information management issues posed by the topic and to provide a credible argument for addressing the issues. You should illustrate your discussion with exs taken from an operational context.

Topic

You have been appointed as part of a consultancy team that has been commissioned to assess the management issues concerned with the delivery of an online system for the submission of personal tax returns for a large European country. The expectation is that this system will collect and process returns for 50% of the population within the first three years of operation and that this will represent taxes worth ~€93bn (£65bn, $132bn).

The system will be built and maintained by a private sector company with established expertise in the running of large-scale systems and the management of data centres. The credit rating of the company is AA.

The users of the system will be Government employees (who will have access to all data relevant to their job) and citizens (who will only have access to their personal data) using passwords generated by the Government but modifiable by the citizen.

The operational system will be run from a primary data centre located in a suburb on the outskirts of the capital city. A secondary back-up data centre is located in a nearby town approximately 25km from the capital.

Access to the system will be via a secure Government network (for Government employees) and via the Internet (for citizens). Citizens can download tax return software from the Government’s web-site to complete their returns off-line.

Your client wishes you to assess the business continuity and security issues that will need to be addressed by the supplier of the system in order to assess independently the supplier’s level of preparedness. Your specific role is to identify the ten key risks to which the system will be exposed and to suggest the best technological or procedural solution for mitigating each risk. You should also provide a justification for prioritising the individual risks.

Format

The assignment is individual-based and should be between 3,000 and 4000 words (excluding title page, To C and references). Any wordage in excess of 4000 will be ignored for marking purposes. A statement of the word count must be placed immediately following the main text.
The aim is to set assignments that allow you to demonstrate your understanding of the topics covered in the course and we want you to have the best opportunity to record results which truly reflect your capabilities. However, you will not get credit for material which is not related to the topic so ensure that your assignment is focused on what has been requested.

Structuring your assignment

It is always a good idea to work out a structure for your assignment in advance, and to decide what parts of your explanations and arguments are going into each section, before filling in the detail. It is helpful both to you and to the reader for longer assignments if you provide headings for each of the main sections.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91084

Have any Question? 


Related Questions in Computer Engineering

1 prove that two users who perform a diffie-hellman key

1. Prove that two users who perform a Diffie-Hellman key exchange will have the same shared key. 2. In the example enciphering HELLO WORLD using the RSA cipher (the second example in Section 9.3.2), the modulus was chose ...

Modify your implementation of the big integer adt from the

Modify your implementation of the Big Integer ADT from the previous question by adding the assignment combo operators that can be performed on the self and rhsInt big integers. Allow for any of the following operations t ...

Questionconsider the following case of decision-making on

Question. Consider the following case of decision-making on loan applications.  You are a bank executive with thousands of records on customers who were given loans.  Each record has many fields, such as amount of loan, ...

How can us companies protect their digital assets

How Can U.S. Companies Protect their Digital Assets Overseas? Prepare a 3 to 5 paragraph briefing statement that can be used to answer the above question. Your audience will be attendees at a conference for small busines ...

1 overviewin this assignment you will learn how to

1 Overview In this assignment, you will learn how to implement a priority-based scheduler forxv6. To get started, download a new copy of the xv6 source code fromhere. Do NOT use the source code of project 1. You'll do tw ...

1 what is a project plan list what a project plan can

1. What is a project plan? List what a project plan can accomplish. 2. What is the value of a statement of vision and objectives? Why is it needed before a project plan is developed?

1 in a very small as using ospf is it more efficient to use

1. In a very small AS using OSPF, is it more efficient to use only one single area (backbone) or several areas? 2. Why do you think we need only one RIP update message, but several OSPF update messages? 3. OSPF messages ...

In autocad is there a way to move my items from paper space

In AutoCAD is there a way to move my items from paper space directly to model space, but have them scale accordingly?

How do screened host architectures for firewalls differ

How do screened host architectures for firewalls differ from screened subnet firewall architectures? Which of these offers more security for the information assets that remain on the trusted network? What a sacrificial h ...

1 what is a mantrap when should it be used2 what is the

1. What is a mantrap? When should it be used? 2. What is the most common form of alarm? What does it detect? What types of sensors are commonly used in this type of alarm system?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro