Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Question: For the Final Project, you are asked to write an eight-to ten-page research report (typed, double-spaced) in which you describe a company of your choice, the nature of its business, a specific product or service, and how that product or service is produced and distributed by the company and then recommend the information technology system you think should be in place and why. Address the following questions in narrative form (according to APA style). Be sure to provide examples and supporting rationale throughout the paper.

- Company Background and Information Systems

- What is the name, nature of business, and specific products or services of your chosen organization?

- How are the products or services produced and distributed by the company?

- Why are information systems essential in managing the organization's business?

- Describe the existing information systems supporting the major business functions of the organization (e.g., sales and marketing, manufacturing and production, accounting, human resources, etc.)

- Information Technology Recommendation

- What is your recommendation for the information technology systems you think should be in place and why? Your recommendation should include the following:

- Information needs:

- What types of decisions do users need to make by accessing the information systems?

- What are the different levels of information groups?

- Need for system automation

- Benefits of the proposed system (savings, quality improvements, faster processing, etc.)

- Types of database data elements (data, images, photographs, sound, video, etc.)

- Networking and interactive processing

- Centralization versus decentralization

- End-user computing needs

- Your recommendation to develop or acquire the system software

- Potential Security Threats

- Describe the various threats and security threats to the proposed information system. What security controls are required to address the threats?

- Social, Political, and Diversity Impacts

- Summarize the social and political issues raised by the proposed information system.

- Discuss the impact of diversity to the development and management of the proposed information system.

- Conclusion

- References

- The Final Project - IT System Recommendation

- Must be eight to ten double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.)Links to an external site..

- Must include a separate title page with the following:

- Title of paper

- Student's name

- Course name and number

- Instructor's name

- Date submitted

- Must use at least three scholarly sources in addition to the course text.

- The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.)Links to an external site. table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.

- Must document all sources in APA style as outlined in the Ashford Writing Center.

- Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92405470
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Management Information System

Enterprise architecture framework research paper

Enterprise Architecture Framework Research Paper Assignment Purpose of this Assignment This assignment gives you the opportunity to apply your research skills, analysis, and critical thinking skills to describe one of th ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Research projecton march 11th 2011 stackoverflow made a

Research Project On March 11th, 2011, StackOverflow made a significant change to their leaderboard. They now show users with top reputation gained in the past week, rather than all-time high reputation users. The rationa ...

Question - are ltc beds the only place to put us are there

Question - Are LTC beds the only place to put us? Are there other alternatives that are more cost-efficient? Given issues of quality -- either perceived or actual -- in many LTCs, do we really even want to keep tradition ...

Preparationuse the organization and characteristics

Preparation Use the organization and characteristics, described in the Mega-Corp Case Study found in the Resources under the heading, Capella Resources, as the context in which to answer the bullet points in this assessm ...

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Quantum cryptographyin this essay you will explain how

Quantum Cryptography In this essay, you will explain how quantum cryptography works and what role you think it will play in the future of cryptography. You will also provide a table that differentiates between traditiona ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

Please answer each question and cite any sources used1

Please answer Each question, and cite any sources used. 1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen. How does the the approach of inf ...

Ransomware to pay or not to pay when it comes to

Ransomware: To pay or not to pay? When it comes to corporate data, should corporations pay? Can you trust paying? What can be done to protect against ransomware? Would you pay if it were your own personal data? How can y ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As