E- commerce Applications

SystemTech organizationThe current organizational structure of the company is shown in Figure 1.1. The three founders have divided the business among themselves. Emeka Steven (who has a sales background) looks after the sales and operations side, Daniel Okw, an accountant, takes care of finance and administration and Ric Nelson who is a lawyer and experience in IT takes care of the IT and company’s legal matters. The small IT department within the administration function consists of the IT manager, Peter Clay, three analyst/programmers and a computer operator/trainee programmer.Figure 1.1 Organization of SystemTechThe projectBecause of the small size of its IT department, and since the department lacks skills in the design of e- commerce applications, SystemTech has decided to entrust the development of its internet service to a consultancy company, Eagles iTechnology. This firm has tendered for the following services:• Analysis of the requirements.• Production of a detailed requirements specification.• Design, development and implementation of the internet systems, including a new website and secure communications links.• Training SystemTech staff in the use of the new systems.• Specification of the interfaces required from SystemTech’s existing customer database and booking system (the development of the links at the SystemTech end to be done by its own IT department).• Specification of the additional hardware required to support the new system (to be obtained from SystemTech’s usual suppliers, the procurement to be managed by the IT department).• ‘Skills transfer’ to SystemTech’s IT department, so that ongoing maintenance and development of the new system can be handled in-house. The development of the MIS aspects of the new system will be dealt with by SystemTech’s IT department.The date now is 1 November 2020 and SystemTech wants to have the new system up and running for the start of the winter season’s bookings at the end of June 2021.The internet booking project is a result of a recent strategic review of SystemTech undertaken by its senior managers – the three directors and their direct reports. The SWOT analysis showed that SystemTech has a good reputation in its marketplace and a lot of ‘brand recognition’ by its target market. However, this target market (reasonably affluent professionals) does make extensive use of the internet and it was felt that being unable to offer this service would increasingly become a weakness. At least one of SystemTech’s competitors already has an internet booking service (albeit not a very good one) and others are sure to follow soon. Applying the internet to SystemTech’s position using Porter’s five forces model also produced some interesting results. The internet tends to increase the power of buyers (as they can shop around more easily) and lowers the cost of entry for new competitors. In addition, the suppliers (the owners of the gîtes and chalets) can also set up their own websites, thereby cutting out brokers like SystemTech and increasing their own relative power. The conclusion of the strategy review was, therefore, that not setting up an internet service was not a viable option. Also, since the competitors’ sites were not very good at present, it was felt that creating a very good and user-friendly site would provide a source of competitive advantage (at least in the short to medium term).The SWOT analysis conducted by SystemTech has already shown that not having an internet service is not a viable scenario, since so many of the company’s customers now regularly use the internet. However, the issue still arises as to how much it would be worth investing in the project, and this means that the company has had to develop a business case for undertaking the internet development. Ric Nelson, as the accountant, has undertaken production of the business case and he has identified three main business options that could be considered:1. Building an internet booking system for SystemTech and interfacing that with the company’s existing systems.2. Building a standalone internet system and operating the internet booking as, in effect, a separate subsidiary business.3. Finding a partner organization with an internet booking system and interfacing SystemTech’s system with that.

Read more

Rationality And Fairness

What are things that negotiators can proactively do to manage the perceptions rationality and fairness?write an initial post (minimum 250 words)and two response posts (minimum 100 words each) (reply to the classmates’ posts, files attached)For your initial post, you must have two academic peer-reviewed articles for references.Discussion must include in-text citations and references in APA style formatting

Read more

Rapport In Negotiation

Journal Article AnalysisSelect one of the key terms listed below and conduct a search to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:Key Terms:Building Rapport in NegotiationIntegrative NegotiationDistributive NegotiationConcessions in Relation to NegotiationDEFINITION: a brief definition of the key term followed by the APA 6 reference for the term; this does not count in the word requirement.SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.REFERENCES: All references must be listed at the bottom of the submission–in APA 6 format.Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Read more

Azorian Computer Forensics

Best Practices for Obtaining Evidence from an ISLearning Objectives and Outcomes· Identify best practices for obtaining evidence for a digital forensic investigation from an Internet service provider (ISP).Assignment Requirements You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been asked to assist in an investigation of a possible cybercrime involving theft of intellectual property. The information will need to be obtained from an Internet service provider (ISP) while complying with any applicable laws and regulations. Your manager wants to update staff on details about best practices for working with ISPs and obtaining electronic evidence.Your manager has asked you to find a resource on the web that contains information useful to this investigation and write a report about the resource.For this assignment:1. Research the Internet for information on working with an ISP to legally obtains electronic evidence in a digital forensic investigation.2. Write a report that describes best practices for obtaining electronic evidence from an ISP.Required Resources. Course textbook. Internet accessSubmission RequirementsFormat:Microsoft WordFontArial, size 12, double-spaceCitation Style:Follow your school’s preferred style guidLength:1-2 pagesSelf-Assessment Checklist. I selected researched the Internet for information on working with an ISP to legally obtain electronic evidence in a digital forensic investigation.. I wrote a report that describes best practices for obtaining electronic evidence from an ISP.. I followed the submission guidelines.Assignment: Digital Forensic ConferencesLearning Objectives and Outcomes. Research digital forensic conferences.. Identify a conference that is most suited to advancing your career.Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. You’re interested in obtaining some additional training to further your career and advance within the company. You recently sent a message to your team leader, Chris, mentioning that you would like to attend a conference in the field of digital forensics.Chris responded by saying he’s all for it! To get the expense approved, he needs you to identify which conference would you like to attend and explain why. In other words, what skills or knowledge will you gain by attending?For this assignment:1. Research at least three applicable conferences.2. Write a report that describes the three conferences.3. Identify the one you would most like to attend and describe the specific skills or knowledge you think you would gain at this conference.Required Resources. Course textbook. Internet accessSubmission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spacCitation Style:Follow your school’s preferred style guideLength:1-2 pagesSelf-Assessment Checklist. I researched at least three applicable conferences.. I wrote a report that describes the three conferences. I identified the one I would most like to attend and described the specific skills or knowledge I think I would gain at this conference.. I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

Read more

Types of Dashboards

Which of the Harrah’s data applications are most likely implemented using neural networks?What other applications could Harrah’s develop using the data it is collecting from its customers?What are some concerns you might have as a customer at this casino?Real-Time Dashboards at Western Digital. (see the attachment i have attached the answers, please change the words no plagrism )What is VIS?In what ways is the architecture of VIS similar to or different from the architecture of BPM?What are the similarities and differences between the closed-loop processes of BPM and the processes in the OODA decision cycle?What types of dashboards are in the system? Are they operational or tactical, or are they actually scorecards? Explain.What are the basic benefits provided by Western Digital’s VIS and dashboards?What sorts of advice can you provide to a company that is getting ready to create its own VIS and dashboards?Writing RequirementsThe deliverable will be a written paper 6 pages that will be written according to APA guidelines. This does not include Title, Abstract and Reference page

Read more

Custom T-shirt Business

Your best friend, Susan Stewart, has started a highly successful custom T-shirt business from your dorm room. Susan is an art major, and each week she creates a limited edition T – shirt focusing on the lyrics from up – and – coming indie bands. You, as an MIS major, see the advantages Susan could reap by porting her business to the Internet. Susan, as an art major, does not like technology and does not believe she needs it to grow her business. Do you agree or disagree that Susan needs to compete online? How can creating an ebusiness benefit Susan? What are the challenges Susan will face as she moves her business to the Internet? How could Susan use Web 2.0 to build loyalty among her followers?

Read more

Course Feedback

This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.Items to include in the initial thread:“Interesting Assignments” – What were some of the more interesting assignments to you?“Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”“Perspective” – How has this course changed your perspective?“Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?

Read more

Blockchain And Crypto Currency

Practical Connection AssignmentAt UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.Assignment:Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.Submission: Upload/attach your completed paper to this assignment by the due date. Please see the Course Syllabus for the actual due date.

Read more

Quantitative Risk Analysis

In your final meeting with the CIO, she asks that you complete and present a risk analysis on outsourcing the critical IT function chosen in Week 4. Your risk analysis should include quantitative and qualitative risks, a risk response plan, and a risk monitoring plan in a briefing paper.Part 1Complete the following spreadsheets using the Risk Register Template:Risk IdentificationRisk AnalysisExplain techniques for quantitative risk analysis for selected critical IT function.Explain techniques for qualitative risk analysis for selected critical IT function.Risk ResponseAnalyze techniques for risk response planning for selected critical IT function.Risk MonitoringAnalyze techniques for risk monitoring planning for selected critical IT function.Part 2Write a 700- to 1,050-word paper to discuss the importance of regulatory requirements, security and privacy laws, and monitoring compliance. Your paper should:Explain the major regulatory requirements that have a direct effect on IT in a healthcare organization when outsourcing the identified IT function.Explain how security and privacy laws affect the design and operation of the outsourced IT function.Explain the role of IT in monitoring compliance with the organization’s risk management policies and plans when outsourcing the identified IT function.Cite at least 3 reputable references. One reference must be your textbook, Managing Risk in Information Systems. Reputable references include trade or industry publications, government or agency websites, scholarly works, or other sources of similar quality.

Read more

Infrastructure as a Service

1. cloud computing2. IaaS (Infrastructure as a Service)3. virtualization in cloud computingFrom the above 3 topics answer the following questions- It should be an APA format (add references if any).What you learned about the topicWhy you selected the topicHow you will utilize the topic in the futureAlso, write a reflection of the material you’ve learned in the course. What did you like? What could be improved?

Read more
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Save More. Score Better. Use coupon code SPECIAL for a 15%discount