Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Management Information Systems

The case study assessment item involves the preparation of an academic report with the following topic:

Select an information systems case study for which you are familiar and are able to get access to Appropriate information. The information system of concern should have experienced some sort of significant incident or failure sometime over the last 2 years. Details of the report are specified below.

Preliminary report Already DONE

You will need to provide a preliminary report that provides a description of the system, the incident of concern and the key stakeholders. Your description of the system should include a rich picture diagram along with an activity diagram (business process model) providing details of the associated business processes the information system is embedded within.

Presentation Slides: From both Preliminary report and Final Report.

Final report

Word Limit: 2500 words plus Diagrams

You final report should start by describing the information system and the incident of concern - it is recommended that this is essentially an updated version of the material provided in the preliminary report, taking account of the feedback received for that report. You should then provide an analysis the information system with respect to the major topics that have been covered in this unit. The issues you should cover in the report include:

• A description and the major components of the information system. This should be facilitated by using models of the information system and its associated business processes using the tools covered in the unit - for example, you should provide, as a minimum, a rich picture of the situation and at least one business process model. The description of the system should include an identification of key stakeholders and their needs with respect to the system and a brief description of any significant technical elements of the system;

• The organisation this information system sits in, and the connections the system has with organisational innovation. The strategic context for the system is likely to be relevant to this, and you might find that the Porter's Five Forces model might assist with the analysis in this area;

• A brief summary of issues that may appear in a business case for this system. For example, consider the rationale that management may have used to justify an investment in the system and the risks they may have attempted to mitigate during its implementation;

• A discussion of the decisions that the information system might provide support for. Are there any business intelligence applications associated with this system? If not, do you see that there could be a potential for such application to be created?

• a discussion of the information security issues associated with the information systems. A useful starting point for this discussion would be the CIA model as discussed in class;

• an analysis of the incident and/or failure of the system. What caused the incident or failure? What impact did this have on the system? How were key stakeholders impacted? Was the system able to fully recover following the incident? Were there any information security connections with the incident?

In compiling the information about your case study, you may need to draw on news reports (written and video), press releases, interviews, and company reports. As an academic report, you are generally expected to draw on academic sources outside of the materials provided in this unit if you are looking for a distinction or higher grade for this report.


Attachment:- Enterprise Information System implementation in Rolls-Royce.docx

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91424787
  • Price:- $85

Priced at Now at $85, Verified Solution

Have any Question?


Related Questions in Management Information System

Ransomwareto pay or not to paywhen it comes to corporate

Ransomware: To pay or not to pay,When it comes to corporate data,should corporations pay? Can you trust paying? What can be done to protect ransomware? Would you pay it if it were your own personal data? How can you prot ...

Scenario you as the him director has been asked to give a

Scenario: You, as the HIM Director, has been asked to give a presentation to a group of new directors from other departments to explain Master Data during an informational session. You need to at minimum cover the use an ...

Assignment application perform data gathering and

Assignment Application: Perform Data Gathering and Footprinting on a Targeted Website You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet ...

Research the it security policy used by your university or

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or ...

Case study 1read the article in the attachmentan overview

Case Study 1 Read the Article in the attachment An overview of cyber-attack and computer network operations simulation Write a four to five (4-5) page paper in which you: Identify at least three (3) benefits or key knowl ...

Assessment instructionsfor this assessment you will

Assessment Instructions For this assessment, you will complete your perimeter security strategy. Each organization or company would need to show how their data, assets, and networks are protected. In this assessment, you ...

1 discuss the difference between a business continuity plan

1. Discuss the difference between a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP). 2. What would be your recommendation for training personnel on your BCP and DRP if your plan documents were adopted ...

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

Read assess the risk by zurier from sc magazine for it

Read "Assess the Risk," by Zurier, from SC Magazine: For IT Security Professionals (2015). The first step in the creation of an effective risk-management system is understanding the types of risks an organization may fac ...

In chapter 2 of the text - managing amp using information

In Chapter 2 of the text - Managing & Using Information Systems: A Strategic Approach, the chapter discusses why information systems experience failure often because of organizational strategy. A classic example of this ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As