Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

INFORMATION SYSTEMS

Aim of the assignment

The aim of this assignment is to assess the information management challenges that face business and the role that information technologies and systems may have in addressing these challenges.
Learning outcomes

After completing this assignment you will have gained experience of:

• The issues raised in the exploitation and management of information technologies and systems

• Current technological opportunities and solutions for meeting business needs Brief

Choose one of the two topics below and prepare an academic report answering the problem posed by your chosen topic. You are required to analyse the business and information management issues posed by the topic and to provide a credible argument for addressing the issues. You should illustrate your discussion with exs taken from an operational context.

Topic

You have been appointed as part of a consultancy team that has been commissioned to assess the management issues concerned with the delivery of an online system for the submission of personal tax returns for a large European country. The expectation is that this system will collect and process returns for 50% of the population within the first three years of operation and that this will represent taxes worth ~€93bn (£65bn, $132bn).

The system will be built and maintained by a private sector company with established expertise in the running of large-scale systems and the management of data centres. The credit rating of the company is AA.

The users of the system will be Government employees (who will have access to all data relevant to their job) and citizens (who will only have access to their personal data) using passwords generated by the Government but modifiable by the citizen.

The operational system will be run from a primary data centre located in a suburb on the outskirts of the capital city. A secondary back-up data centre is located in a nearby town approximately 25km from the capital.

Access to the system will be via a secure Government network (for Government employees) and via the Internet (for citizens). Citizens can download tax return software from the Government’s web-site to complete their returns off-line.

Your client wishes you to assess the business continuity and security issues that will need to be addressed by the supplier of the system in order to assess independently the supplier’s level of preparedness. Your specific role is to identify the ten key risks to which the system will be exposed and to suggest the best technological or procedural solution for mitigating each risk. You should also provide a justification for prioritising the individual risks.

Format

The assignment is individual-based and should be between 3,000 and 4000 words (excluding title page, To C and references). Any wordage in excess of 4000 will be ignored for marking purposes. A statement of the word count must be placed immediately following the main text.
The aim is to set assignments that allow you to demonstrate your understanding of the topics covered in the course and we want you to have the best opportunity to record results which truly reflect your capabilities. However, you will not get credit for material which is not related to the topic so ensure that your assignment is focused on what has been requested.

Structuring your assignment

It is always a good idea to work out a structure for your assignment in advance, and to decide what parts of your explanations and arguments are going into each section, before filling in the detail. It is helpful both to you and to the reader for longer assignments if you provide headings for each of the main sections.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91084

Have any Question? 


Related Questions in Computer Engineering

1 research the effects of industrial espionage and write a

1. Research the effects of industrial espionage, and write a detailed account of a profi le of a person who sells and buys industrial secrets. What type of industrial secrets is likely to be traded? 2. The main reasons b ...

Discussion questionsthe design discipline continues the

Discussion Questions The design discipline continues the modeling process by creating new models and expanding or refining business and requirements models. However, the purpose and nature of modeling changes. Though pro ...

Computer sciencewrite a program for an automatic teller

Computer Science Write a program for an automatic teller machine that dispenses money. The user should enter the amount desired (a multiple of 10 dollars) and the machine dispenses this amount using the least number of b ...

The random class implements a random number generator which

The Random class implements a random number generator, which produces sequences of numbers that appear to be random. To generate random integers, you construct an object of the Random class, and then apply the nextInt me ...

Network design for schoola network has to be designed for a

Network Design for Schoola network has to be designed for a school. There are100 computers in the school. And has 5 Labs each of them consisted of 31 computersThe users in the lab should belong to a single domain and rec ...

Research the internet to determine if there are any ddbmss

Research the internet to determine if there are any DDBMSs that follow all 12 rules. Explain on examples.

Write an application that retrieves a student name and

Write an application that retrieves a student name and three scores per line from a text file. Process the values by calculating the average of the scores per student. Write the name and average to a different text file. ...

1 show that there are 2n entries in a truth table for a

1. Show that there are 2n entries in a truth table for a function with n inputs. 2. One logic function that is used for a variety of purposes (including within adders and to compute parity) is exclusive OR. The output of ...

1 what is a discontiguous subnet why do some enterprise

1. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don't classful routing protocols support discontiguous subnets? 2. Discuss the configuration of IP addresses. When manual ...

Annuity payment jeremy is saving money to open an indoor

Annuity Payment: Jeremy is saving money to open an indoor skate board park. He needs $10,000 in three years to purchase equipment and initiate a building lease. He's investing his savings in an annuity yielding an annual ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro