好好学习,天天向上,一流范文网欢迎您!
当前位置:首页 >> 最新范文 内容页

HND商务信息与通讯技术

HND商务信息与通讯技术 本文关键词:商务信息,通讯,技术,HND

HND商务信息与通讯技术 本文简介:Information&CommunicationsTechnologyinBusiness:AnIntroduction(DE3K35)NAME:SCN:CLASS:ContentsIntroduction3Section1introducedforfunctionsofmanagement3Se

HND商务信息与通讯技术 本文内容:

Information&Communications

Technology

in

Business

:

An

Introduction

(DE3K

35)

NAME:

SCN:

CLASS:

Contents

Introduction3

Section1

introduced

for

functions

of

management3

Section2

Three

types

of

information

system4

Section3:

Two

pieces

of

current

legislation5

Section4

Three

data

communication

systems7

Section5

Two

benefits

for

each

of

the

three

data

communication

systems8

Section6

Three

threats

to

security

of

networked

information9

Section7

Three

ICT

innovations

in

term

of

their

relevance

to

the

company10

Reference11

Introduction

The

body

of

this

report

consists

of

seven

parts

that

includes

different

management

needs

different

information,three

types

of

information

system,two

pieces

of

current

legislation,three

data

communication

systems,two

benefits

for

three

data

communication,three

threats

to

security

of

networked

information,three

ICT

innovation

of

company.

Section1

introduced

for

functions

of

management

Commands

Strategic

Condensed

Reports

Tactical

Operational

coordimtion

Figure1

functions

of

management

Strategic

manager:

Connor

Webster

is

strategic

manager

of

Crown

Catering

Service

Company.

Strategic

manager

need

some

information

to

developing

Catering

Services

Company.

The

information

includes

an

internal

information

staffing

needs.

The

company

should

meet

the

needs

of

staff.

So

that

staffs

work

harder.

External

information

includes

market

trends.

Companies

understands

the

market

trends

conducive

to

the

development.

Catering

Services

Company’s

Strategic

Manager

through

the

information

to

formulate

long-term

planning

and

setting

objectives

and

policy.

The

long-term

planning

is

3-5

year

target.

Catering

Services

Company.

Catering

Services

Company

through

object

and

policy

to

developing

company.

Tactical

Manager:

Crown

Catering

Services

Company

has

about

20

branches

is

tactical

manager.

The

tactical

manager

needs

information

includes

four

kinds

of

internal

information

and

one

external

information.

Four

kinds

of

internal

information

includes

productivity,improve

productivity

can

improve

the

efficiency

of

the

work.

Variance

analysis

can

show

difference

between

the

planned

and

actual

production.

Tactical

manager

needs

Cash

Flows

and

Budget’s

information

to

do

budgetary

control

and

monitoring.

External

information

includes

current

market

data

and

opponent’s

policy

related.

The

tactical

manager

through

information

to

obtaining

resources

monitoring

and

developing

operational

policies

and

objectives.

Operational

Manager:

Crown

Catering

Services

Company’s

sales

manager

is

operational

manager.

Operational

managers

needs

real-time

and

specific

business

information.

Operational

managers

to

responsible

for

routine

activity

business

information,monitoring

of

frontline

staff,ensuring

effective

use

of

resources,rating

to

staff

of

different

levels,monitor

employee

attendance

hours

worked

and

overtime.

Low

levels

of

responsibility

affecting

individuals.

Section2

Three

types

of

information

system

DSS

Operational

manager

using

decision

support

systems.

Decision

support

systems

are

interactive

systems

that

rely

on

hardware

and

software

to

support

managers

in

the

decision

making

process

and

a

highly

flexible

and

interactive

IT

system

that

is

designed

to

support

decision

making

when

the

problem

is

not

structured.

Connor

Webster

can

use

that

to

do

market

survey

project.

The

benefits

of

DSS

for

Crown

Catering

Services

Company

includes

optimization

and

forecasting

work

completed,simulate

scenarios

and

for

easy

to

Crown

Catering

Services

development

of

contingency

plans

in

advance,understand

work

processes,prevent

the

potential

danger.

ES

Expert

System

aimed

to

duplicate

what

an

expert

or

number

of

experts

would

do

in

a

given

situation.

Expert

system

is

suitable

for

tactical

manager.

ES

system

can

help

Crown

Catering

Services

company

solve

complex

problems

and

make

decisions.

The

ES’s

benefits

includes

put

together

structured

data,defined

area

and

hands

complex

logic.

EIS

EIS’s

definition

is

any

kind

of

information

system

which

improves

the

functions

of

an

enterprise

business

processes

by

integration.

Strategic

manage

can

use

EIS

to

precise

find

information

in

many

fields.

Fields

includes

marketing,finance,manufacturing

and

others.

The

EIS’s

benefits

includes

provide

the

efficiency

of

decision

makers,timely

decision,improve

the

tracking

information

for

Crown

Catering

Services,provide

timely

information.

Section3:

Two

pieces

of

current

legislation

The

Date

protection

Act

(1998):

The

Data

Protection

Act

governs

the

processing

of

information

relating

to

individuals.

The

Act

covers

the

obtaining,holding

and

use

or

disclosure

of

information.

This

Act

also

concerns

personal

information

held

about

individuals

and

relates

to

the

following

Data

processed

using

an

electronic

system.

Information

recorded

as

part

of

a

relevant

filing

system.

The

Data

Protection

Principles:

1.

Information

shall

be

obtained

and

processed

‘fairly

and

lawfully’.

2.

Information

shall

only

be

held

for

one

or

more

specific

and

lawful

purposes.

3.

Companies

should

not

hold

information

that

is

excessive

or

is

not

relevant

to

the

purposes

the

company

has

registered

under

the

Act.

4.

Information

held

on

individuals

should

be

accurate

and

up-to-date.

5.

Information

should

not

be

held

for

longer

than

necessary.

6.

Individuals

have

the

right

to

see

the

data

held

about

them

and

have

corrections

made

if

need

be.

7.

Companies

must

take

adequate

security

measures

to

prevent

unauthorized

access.

8.

Data

must

not

be

transferred

to

countries

outside

the

European

Union

(EU)

that

provides

inadequate

protection.

Suggestion

for

Crown

Catering

Services

Company

Crown

Catering

Services

Company

should

lawfully

use

the

collect

data.

Crown

Catering

Services

Company

should

protect

the

security

of

data.

Crown

Catering

Services

Company

should

be

accurate

and

update

of

individuals.

Crown

Catering

Services

Company

should

be

not

be

held

for

longer

than

necessary

of

data.

Computer

Misuse

Act

1990

This

legislation

protects

information

stored

on

computer

from

unauthorized

access,alteration

and

damage.

Unauthorized

access,including

hacking

or

internal

members

of

staff

using

someone

else’s

password

to

access

restricted

information.

Ulterior

intent

with

the

intention

of

committing

a

crime

for

personal

gain.

Unauthorized

modification

to

documents.

Suggestion

for

Crown

Catering

Services

Company

Crown

Catering

Services

Company

often

give

computer

virus.

Crown

Catering

Services

Company

should

put

the

data

in

a

safe

place.

The

company

should

prohibit

employees

from

using

the

data

for

profit.

The

company

should

define

who

can

access

data

Section4

Three

data

communication

systems

A

local

area

network

(LAN)

is

a

computer

network

that

interconnects

computers

within

a

limited

area.

A

local

area

network

is

contrasted

in

principle

to

a

wide

area

network,which

covers

a

larger

geographic

distance

and

may

involve

leased

telecommunication

circuits,while

the

media

for

LANs

are

locally

managed.

Limited

area

includes

residence,school,laboratory,or

office

building.

Ethernet

over

twisted

pair

cabling

and

Wi-Fi

are

the

two

most

common

transmission

technologies

in

use

for

local

area

networks.

A

local

area

network

coverage

is

very

small.

A

wide

area

network

(WAN)

is

a

telecommunications

network

or

computer

network

that

extends

over

a

large

geographical

distance.

Wide

area

networks

are

often

established

with

leased

telecommunication

circuits.

Many

technologies

are

available

for

wide

area

network

links.

Examples

include

circuit

switched

telephone

lines,radio

wave

transmission,and

optic

fiber.

New

developments

in

technologies

have

successively

increased

transmission

rates.

Therefore,the

WAN

communication

requirements

and

complexity

are

high.

The

Internet

is

the

global

system

of

interconnected

computer

networks

that

use

the

Internet

protocol

suite

(TCP/IP)

to

link

billions

of

devices

worldwide.

Common

methods

of

Internet

access

by

users

include

dial-up

with

a

computer

modem

via

telephone

circuits,broadband

over

coaxial

cable,fiber

optics

or

copper

wires,Wi-Fi,satellite

and

cellular

telephone

technology.

The

shortcoming

of

internet

includes

very

vulnerable

to

intentional

attacks.

Section5

Two

benefits

for

each

of

the

three

data

communication

systems

Local

area

network

Enables

the

sharing

of

hardware

on

the

network.

Crown

Catering

Services

Company

can

use

local

area

network

to

share

printer

that

can

improve

work

efficiency.

Saves

duplication

of

work

within

the

organization.

Local

area

network

can

help

Crown

Catering

Services

Company

to

Saves

duplication

of

work.

Internet

The

use

of

email

as

a

communication

tool.

Staff

use

the

internet

to

send

email

that

easy

and

save

time.

It

enables

you

to

create

links

with

customers

and

suppliers.

Crown

Catering

Services

Company’s

staff

can

uses

internet

links

with

customers

and

suppliers

to

handles

business.

Wide

area

network

Increased

security

of

data

that

is

backed

up

on

file

service

and

restricted

access

through

the

use

of

passwords.

Crown

Catering

Services

Company

use

Wide

area

network

to

enhanced

data

security.

Networks

also

allow

data

to

be

exchanged

with

suppliers

and

online

payment

facilities,making

them

much

more

efficient.

Network

can

help

Crown

Catering

Services

Company

with

suppliers

to

exchanged

data

and

online

payment.

Section6

Three

threats

to

security

of

networked

information

Hackers

“Hacker“means

research

outsmart

computer

security

system

staff.

Use

of

public

communications

networks,such

as

Internet

and

telephone

system,without

permission,to

load

other

system

Suggests:

The

Crown

Catering

Services

Company

should

give

data

encryption

in

order

to

prevent

hacker

attacks,the

Crown

Catering

Services

Company

to

supervise

everyone

access

to

data

to

rule

out

the

hackers.

Natural

Disasters

Natural

disasters

can

destroy

hardware

store

data,such

as

earthquakes

and

floods

can

destroy

hardware’s

data.

Suggests

Crown

Catering

Services

Company

can

build

a

database

without

a

place

of

natural

disasters.

The

company

regularly

updates

and

backup

of

data.

Computer

Viruses

Computer

Viruses:

Compilers

is

inserted

in

a

computer

program

function

or

destruction

of

computer

code

data,can

affect

computer

use,a

set

of

computer

instructions,or

self-replicating

code.

Suggests

The

Crown

Catering

Services

Company

save

data

to

a

computer

install

anti-virus

software

upgrade

to

the

latest

version,and

open

real-time

monitoring

and

give

people

complex

passwords

to

access

the

data.

Section7

Three

ICT

innovations

in

term

of

their

relevance

to

the

company

F2b2C

F2b2C

is

a

new

e-commerce

business

model.

F2b2C

is

the

Factory-to-business-to-Consumer.

Consumers

through

the

Internet

and

business

communications

with

company.

Company

give

customers

personalized

products,the

company

can

provided

produces

directly

to

the

customer.

Crown

Catering

Services

Company

can

use

F2b2C

model

to

meet

the

needs

of

individual

customers

and

directly

to

the

hands

of

customers.

So

F2b2C

can

help

Crown

Catering

Services

Company

increase

work

efficiency

and

customer’s

satisfaction

and

cut

costs.

VoIP

Voice

over

Internet

Protocol

is

Allows

you

to

send

voice

communication

over

the

Internet,avoiding

the

long-distance

telephone

charges,you

would

normally

receive

from

your

long-distance

carrier.

Crown

Catering

Services

Company

can

use

VoIP

to

contact

suppliers

and

customers

talk

about

business,the

company

use

VoIP

can

cut

costs.

VoIP

can

Catching

on

quickly

in

the

business

world.

But

VoIP

has

limitations,such

as

not

everyone

has

high-speed

in-home

Internet

access.

Physiological

Interaction

Physiological

interfaces

will

actually

capture

and

use

your

real

body

characteristics.

Crown

Catering

Services

Company

can

uses

physiological

interfaces

to

make

password

for

produced

important

data.

Physiological

interfaces

can

produced

data

and

prevent

hackers

and

virus

attacks.

Physiological

interfaces

is

benefits

for

Crown

Catering

Services

Company

to

produced

data.

Conclusion

Technology

is

become

important

for

business.

The

report

introduce

different

ways

to

developing

Crown

Catering

Services

Company’s

business.

Crown

Catering

Services

Company

can

use

technology

to

provide

better

services

for

customers.

Finally,I

hope

the

Crown

Catering

Services

Company

is

getting

better.

Reference

David

Kroenke,Using

Management

Information

Systems,Chapter

5,Prentice

Hall,2007

David

Kroenke,Using

Management

Information

Systems,Chapter

11,Prentice

Hall,2007

Stephen,Haag;

Maeve,Cummings;

Amy,Phillips.

Management

Information

Systems

for

the

Information

Age.

6ed.

McGraw-Hill,2007

11

TAG标签: