HND商务信息与通讯技术 本文关键词:商务信息,通讯,技术,HND
HND商务信息与通讯技术 本文简介:Information&CommunicationsTechnologyinBusiness:AnIntroduction(DE3K35)NAME:SCN:CLASS:ContentsIntroduction3Section1introducedforfunctionsofmanagement3Se
HND商务信息与通讯技术 本文内容:
Information&Communications
Technology
in
Business
:
An
Introduction
(DE3K
35)
NAME:
SCN:
CLASS:
Contents
Introduction3
Section1
introduced
for
functions
of
management3
Section2
Three
types
of
information
system4
Section3:
Two
pieces
of
current
legislation5
Section4
Three
data
communication
systems7
Section5
Two
benefits
for
each
of
the
three
data
communication
systems8
Section6
Three
threats
to
security
of
networked
information9
Section7
Three
ICT
innovations
in
term
of
their
relevance
to
the
company10
Reference11
Introduction
The
body
of
this
report
consists
of
seven
parts
that
includes
different
management
needs
different
information,three
types
of
information
system,two
pieces
of
current
legislation,three
data
communication
systems,two
benefits
for
three
data
communication,three
threats
to
security
of
networked
information,three
ICT
innovation
of
company.
Section1
introduced
for
functions
of
management
Commands
Strategic
Condensed
Reports
Tactical
Operational
coordimtion
Figure1
functions
of
management
Strategic
manager:
Connor
Webster
is
strategic
manager
of
Crown
Catering
Service
Company.
Strategic
manager
need
some
information
to
developing
Catering
Services
Company.
The
information
includes
an
internal
information
staffing
needs.
The
company
should
meet
the
needs
of
staff.
So
that
staffs
work
harder.
External
information
includes
market
trends.
Companies
understands
the
market
trends
conducive
to
the
development.
Catering
Services
Company’s
Strategic
Manager
through
the
information
to
formulate
long-term
planning
and
setting
objectives
and
policy.
The
long-term
planning
is
3-5
year
target.
Catering
Services
Company.
Catering
Services
Company
through
object
and
policy
to
developing
company.
Tactical
Manager:
Crown
Catering
Services
Company
has
about
20
branches
is
tactical
manager.
The
tactical
manager
needs
information
includes
four
kinds
of
internal
information
and
one
external
information.
Four
kinds
of
internal
information
includes
productivity,improve
productivity
can
improve
the
efficiency
of
the
work.
Variance
analysis
can
show
difference
between
the
planned
and
actual
production.
Tactical
manager
needs
Cash
Flows
and
Budget’s
information
to
do
budgetary
control
and
monitoring.
External
information
includes
current
market
data
and
opponent’s
policy
related.
The
tactical
manager
through
information
to
obtaining
resources
monitoring
and
developing
operational
policies
and
objectives.
Operational
Manager:
Crown
Catering
Services
Company’s
sales
manager
is
operational
manager.
Operational
managers
needs
real-time
and
specific
business
information.
Operational
managers
to
responsible
for
routine
activity
business
information,monitoring
of
frontline
staff,ensuring
effective
use
of
resources,rating
to
staff
of
different
levels,monitor
employee
attendance
hours
worked
and
overtime.
Low
levels
of
responsibility
affecting
individuals.
Section2
Three
types
of
information
system
DSS
Operational
manager
using
decision
support
systems.
Decision
support
systems
are
interactive
systems
that
rely
on
hardware
and
software
to
support
managers
in
the
decision
making
process
and
a
highly
flexible
and
interactive
IT
system
that
is
designed
to
support
decision
making
when
the
problem
is
not
structured.
Connor
Webster
can
use
that
to
do
market
survey
project.
The
benefits
of
DSS
for
Crown
Catering
Services
Company
includes
optimization
and
forecasting
work
completed,simulate
scenarios
and
for
easy
to
Crown
Catering
Services
development
of
contingency
plans
in
advance,understand
work
processes,prevent
the
potential
danger.
ES
Expert
System
aimed
to
duplicate
what
an
expert
or
number
of
experts
would
do
in
a
given
situation.
Expert
system
is
suitable
for
tactical
manager.
ES
system
can
help
Crown
Catering
Services
company
solve
complex
problems
and
make
decisions.
The
ES’s
benefits
includes
put
together
structured
data,defined
area
and
hands
complex
logic.
EIS
EIS’s
definition
is
any
kind
of
information
system
which
improves
the
functions
of
an
enterprise
business
processes
by
integration.
Strategic
manage
can
use
EIS
to
precise
find
information
in
many
fields.
Fields
includes
marketing,finance,manufacturing
and
others.
The
EIS’s
benefits
includes
provide
the
efficiency
of
decision
makers,timely
decision,improve
the
tracking
information
for
Crown
Catering
Services,provide
timely
information.
Section3:
Two
pieces
of
current
legislation
The
Date
protection
Act
(1998):
The
Data
Protection
Act
governs
the
processing
of
information
relating
to
individuals.
The
Act
covers
the
obtaining,holding
and
use
or
disclosure
of
information.
This
Act
also
concerns
personal
information
held
about
individuals
and
relates
to
the
following
Data
processed
using
an
electronic
system.
Information
recorded
as
part
of
a
relevant
filing
system.
The
Data
Protection
Principles:
1.
Information
shall
be
obtained
and
processed
‘fairly
and
lawfully’.
2.
Information
shall
only
be
held
for
one
or
more
specific
and
lawful
purposes.
3.
Companies
should
not
hold
information
that
is
excessive
or
is
not
relevant
to
the
purposes
the
company
has
registered
under
the
Act.
4.
Information
held
on
individuals
should
be
accurate
and
up-to-date.
5.
Information
should
not
be
held
for
longer
than
necessary.
6.
Individuals
have
the
right
to
see
the
data
held
about
them
and
have
corrections
made
if
need
be.
7.
Companies
must
take
adequate
security
measures
to
prevent
unauthorized
access.
8.
Data
must
not
be
transferred
to
countries
outside
the
European
Union
(EU)
that
provides
inadequate
protection.
Suggestion
for
Crown
Catering
Services
Company
Crown
Catering
Services
Company
should
lawfully
use
the
collect
data.
Crown
Catering
Services
Company
should
protect
the
security
of
data.
Crown
Catering
Services
Company
should
be
accurate
and
update
of
individuals.
Crown
Catering
Services
Company
should
be
not
be
held
for
longer
than
necessary
of
data.
Computer
Misuse
Act
1990
This
legislation
protects
information
stored
on
computer
from
unauthorized
access,alteration
and
damage.
Unauthorized
access,including
hacking
or
internal
members
of
staff
using
someone
else’s
password
to
access
restricted
information.
Ulterior
intent
with
the
intention
of
committing
a
crime
for
personal
gain.
Unauthorized
modification
to
documents.
Suggestion
for
Crown
Catering
Services
Company
Crown
Catering
Services
Company
often
give
computer
virus.
Crown
Catering
Services
Company
should
put
the
data
in
a
safe
place.
The
company
should
prohibit
employees
from
using
the
data
for
profit.
The
company
should
define
who
can
access
data
Section4
Three
data
communication
systems
A
local
area
network
(LAN)
is
a
computer
network
that
interconnects
computers
within
a
limited
area.
A
local
area
network
is
contrasted
in
principle
to
a
wide
area
network,which
covers
a
larger
geographic
distance
and
may
involve
leased
telecommunication
circuits,while
the
media
for
LANs
are
locally
managed.
Limited
area
includes
residence,school,laboratory,or
office
building.
Ethernet
over
twisted
pair
cabling
and
Wi-Fi
are
the
two
most
common
transmission
technologies
in
use
for
local
area
networks.
A
local
area
network
coverage
is
very
small.
A
wide
area
network
(WAN)
is
a
telecommunications
network
or
computer
network
that
extends
over
a
large
geographical
distance.
Wide
area
networks
are
often
established
with
leased
telecommunication
circuits.
Many
technologies
are
available
for
wide
area
network
links.
Examples
include
circuit
switched
telephone
lines,radio
wave
transmission,and
optic
fiber.
New
developments
in
technologies
have
successively
increased
transmission
rates.
Therefore,the
WAN
communication
requirements
and
complexity
are
high.
The
Internet
is
the
global
system
of
interconnected
computer
networks
that
use
the
Internet
protocol
suite
(TCP/IP)
to
link
billions
of
devices
worldwide.
Common
methods
of
Internet
access
by
users
include
dial-up
with
a
computer
modem
via
telephone
circuits,broadband
over
coaxial
cable,fiber
optics
or
copper
wires,Wi-Fi,satellite
and
cellular
telephone
technology.
The
shortcoming
of
internet
includes
very
vulnerable
to
intentional
attacks.
Section5
Two
benefits
for
each
of
the
three
data
communication
systems
Local
area
network
Enables
the
sharing
of
hardware
on
the
network.
Crown
Catering
Services
Company
can
use
local
area
network
to
share
printer
that
can
improve
work
efficiency.
Saves
duplication
of
work
within
the
organization.
Local
area
network
can
help
Crown
Catering
Services
Company
to
Saves
duplication
of
work.
Internet
The
use
of
as
a
communication
tool.
Staff
use
the
internet
to
send
that
easy
and
save
time.
It
enables
you
to
create
links
with
customers
and
suppliers.
Crown
Catering
Services
Company’s
staff
can
uses
internet
links
with
customers
and
suppliers
to
handles
business.
Wide
area
network
Increased
security
of
data
that
is
backed
up
on
file
service
and
restricted
access
through
the
use
of
passwords.
Crown
Catering
Services
Company
use
Wide
area
network
to
enhanced
data
security.
Networks
also
allow
data
to
be
exchanged
with
suppliers
and
online
payment
facilities,making
them
much
more
efficient.
Network
can
help
Crown
Catering
Services
Company
with
suppliers
to
exchanged
data
and
online
payment.
Section6
Three
threats
to
security
of
networked
information
Hackers
“Hacker“means
research
outsmart
computer
security
system
staff.
Use
of
public
communications
networks,such
as
Internet
and
telephone
system,without
permission,to
load
other
system
Suggests:
The
Crown
Catering
Services
Company
should
give
data
encryption
in
order
to
prevent
hacker
attacks,the
Crown
Catering
Services
Company
to
supervise
everyone
access
to
data
to
rule
out
the
hackers.
Natural
Disasters
Natural
disasters
can
destroy
hardware
store
data,such
as
earthquakes
and
floods
can
destroy
hardware’s
data.
Suggests
Crown
Catering
Services
Company
can
build
a
database
without
a
place
of
natural
disasters.
The
company
regularly
updates
and
backup
of
data.
Computer
Viruses
Computer
Viruses:
Compilers
is
inserted
in
a
computer
program
function
or
destruction
of
computer
code
data,can
affect
computer
use,a
set
of
computer
instructions,or
self-replicating
code.
Suggests
The
Crown
Catering
Services
Company
save
data
to
a
computer
install
anti-virus
software
upgrade
to
the
latest
version,and
open
real-time
monitoring
and
give
people
complex
passwords
to
access
the
data.
Section7
Three
ICT
innovations
in
term
of
their
relevance
to
the
company
F2b2C
F2b2C
is
a
new
e-commerce
business
model.
F2b2C
is
the
Factory-to-business-to-Consumer.
Consumers
through
the
Internet
and
business
communications
with
company.
Company
give
customers
personalized
products,the
company
can
provided
produces
directly
to
the
customer.
Crown
Catering
Services
Company
can
use
F2b2C
model
to
meet
the
needs
of
individual
customers
and
directly
to
the
hands
of
customers.
So
F2b2C
can
help
Crown
Catering
Services
Company
increase
work
efficiency
and
customer’s
satisfaction
and
cut
costs.
VoIP
Voice
over
Internet
Protocol
is
Allows
you
to
send
voice
communication
over
the
Internet,avoiding
the
long-distance
telephone
charges,you
would
normally
receive
from
your
long-distance
carrier.
Crown
Catering
Services
Company
can
use
VoIP
to
contact
suppliers
and
customers
talk
about
business,the
company
use
VoIP
can
cut
costs.
VoIP
can
Catching
on
quickly
in
the
business
world.
But
VoIP
has
limitations,such
as
not
everyone
has
high-speed
in-home
Internet
access.
Physiological
Interaction
Physiological
interfaces
will
actually
capture
and
use
your
real
body
characteristics.
Crown
Catering
Services
Company
can
uses
physiological
interfaces
to
make
password
for
produced
important
data.
Physiological
interfaces
can
produced
data
and
prevent
hackers
and
virus
attacks.
Physiological
interfaces
is
benefits
for
Crown
Catering
Services
Company
to
produced
data.
Conclusion
Technology
is
become
important
for
business.
The
report
introduce
different
ways
to
developing
Crown
Catering
Services
Company’s
business.
Crown
Catering
Services
Company
can
use
technology
to
provide
better
services
for
customers.
Finally,I
hope
the
Crown
Catering
Services
Company
is
getting
better.
Reference
David
Kroenke,Using
Management
Information
Systems,Chapter
5,Prentice
Hall,2007
David
Kroenke,Using
Management
Information
Systems,Chapter
11,Prentice
Hall,2007
Stephen,Haag;
Maeve,Cummings;
Amy,Phillips.
Management
Information
Systems
for
the
Information
Age.
6ed.
McGraw-Hill,2007
11