Edudorm Facebook

The importance of utilizing a code of ethics to direct solid business decision making when managing business information and information systems

Code of conduct is a vital manuscript in every business thus; it can land business into serious troubles with their consumers. Generating a code of ethics styles pronouncement creation easier at all levels of an organization by reducing ambiguity as well as considering individuals and perspectives. On the information sector in a business, code of ethics is essential especially in guiding managerial in creating common framework upon all the decision founded (Brooks, 2010).

2 or 3 examples of code of conduct/ethics policies related to the use and management of information and information systems
Honesty and integrity is one major example of code of ethics in a business especially on the information sector. Honesty is all about building trust as well as credibility thereby; generating the organization’s success and confidence. Esteem also substances in company’s information scheme since all workers deserve to work in an environment where they are treated with dignity. All business organizations are committed to generating such environment for the potential of every individual (De George, 2010).

Summarize your observations about the code of conduct/ethics you reviewed and the major themes you found in your search of these important policy statements as they pertain to the use and management of information and information systems.

According to the major code of ethics especially discussed in George’s article, it is important to avoid any activity that might impair our ability to make objectives and fair decisions while performing our obligations. Code of conduct is the major key in setting all the organization’s values, ethics. Objectives as well as responsibilities thus, it should be encompassed on a huge variety (De George, 2010).

Describe how you, as a manager, will ensure that your conduct and the conduct of your employees as it pertains to the use of data, information, and information systems/technology aligns with the ethical standards of the organization and the applicable regulations that must be followed.

As the manager of a certain business I would always ensure that code of ethic is stressed that if something seems erroneous it ought to be discoursed directly. I would make sure there is the speaking-up policy which requires employees to speak up it they are aware of any Singh of violation of the code, especially those they have committed themselves.  It would be helpful for the company if safeguarded the companies name and property from any personal gain. It will only take few steps in making sure my aims on the business are achieved; supervising on close related workers, serving as a board member on an outside commercial company as well as organizing several meetings with the employees (Mingers, 2010).

References

De George Richard, (2010) T.Business Ethics And The Challenge Of The Information Age.

 

Brooks, Rochelle, (2010).The Development Of A Code Of Ethics: American Journal of Business Education;

 

 Mingers John, (2010). TOWARD ETHICAL INFORMATION SYSTEMS: THE CONTRIBUTION OF DISCOURSE ETHICS1.

 

500 Words  1 Pages

Components of an Information System

Introduction

An information system is an integrated set of components, which serve the purpose of collecting, storing and processing data or the sake of providing information. Also the end result can also be either digital products or even knowledge. Most operations currently both in the business and education world relay on these information systems to carry out and even in the management of their operations (Bravo, Santana & Rodon, 2015). A good example is the corporations where information systems are used to manage the human resources and process all their financial processes.

It is recommendable to note that this system of information is made up of four major components. This components are inclusive of technology, hardware, software and finally data which is a key requirement altogether. Technology is the application of scientific knowledge for practical purposes, it is part of the human life in several ways yet many tend to take it for granted. All the other components of the system, the software, hardware and data fall under technology (Bravo, Santana & Rodon, 2015). The hardware is also another component which is as important as the technology itself. It is the tangible part of the information system which includes the computer, the keyboard and others like the disk drivers.

The software is another component of the information system. This include s the set of instructions which directs the hardware on what to do. This is not tangible and is just a typed list of instructions which will be set to let the computer hardware know what it is expected to do (Raschke, Krishen & Kachroo, 2014). There are two types of software which are the application software like the Microsoft excel and the operating software an example of the Microsoft windows. Data is also another component of the information system, where data is collected to put into practice the other component of the system. Data is also intangible and is used by organizations to make decisions after considerations are made concerning the data in relation to the situation of the organization.

Conclusion

Generally it is true to say that these components of the information system are interdependent. One component depends on the functioning of the other so that the goal which is information to be realized. Therefore it is important to take are and ensure that when designing or installing an information each component is considered equally (Raschke, Krishen & Kachroo, 2014). Each one of them is as important as the other and has a key role to play. Also key to note is that people are as important as the components for the system to be complete and perfectly functioning.

References

Bravo, E. R., Santana, M., & Rodon, J. (2015). Information systems and performance: the role of technology, the task and the individual. Behaviour & Information Technology, 34(3), 247-260. doi:10.1080/0144929X.2014.934287

Raschke, R. L., Krishen, A. S., & Kachroo, P. (2014). Understanding the Components of Information Privacy Threats for Location-Based Services. Journal Of Information Systems, 28(1), 227-242. doi:10.2308/isys-50696

 

507 Words  1 Pages

Electronic Information Scavenger Hunt.

  1. The ebscohost academic database results identify 287,436 items related to the gun on campus topic. All articles relate to the issue of gun in a campus environment.
  2. The search results include articles touching on various topics in black colleges and universities with the one discussing about guns being the first on the search page. The search identifies 76,395 items.
  3. I can access the article in full text but in PDF and HTML formats. It is also possible to send the article my UDC email address
  4. I can access 652,490 eBooks sources from the ecobschost site.
  5. The accessible political science eBooks on the site are 67,082 in number.
  6. The number of titles on political science journals on JSTOR is 14
  7. The search results on Harkness, Suzan (author) are 66 in number
  8. After searching the results brings shows a single item written by this author.

Question 10

The measurement of poverty is carried out by the through a comparison of before tax income – cash – against a threshold which is set thrice the least cost of food diet in the year 1963. This is updated every year to include inflation by the use of Consumer Price Index. It’s then adjusted for family details such as householder’s age, family size and composition. The official poverty measures describe a family as being people who are living together and are related by marriage, birth or adoption. The measurement thresholds are not normally differentiated in accordance to geographical location.  It is the work of U.S Census Bureau to carry out poverty measurement and has thus come up with an info graphic which outlines the manner in which poverty is measured by Census. Threshold on poverty is important for various reasons which include keeping track of poverty levels over a given period of time and performing a comparison of poverty status across groups in different demographics. It is also used as a point from which the federal government determines various assistance programs to be extended to the members of the public.  Estimation of poverty for official use purpose is normally done from Current Population Survey Annual Social and Economic Supplement, and is carried in three months of each year (Februarys, March, and April).It is done with a sample of about 100,000 addresses every year (United States. Bureau of Census, 45).

 The work of the Bureau involves also reports on income and estimation of poverty level from other significant surveys and programs on national household. The reports provide information approximating the number of poor people, the determined rate of poverty and number of people in percentage whose living standards are below the set poverty threshold. The poverty thresholds consist of the original or initial type of poverty measure for the federal government created in 1960s. The thresholds are updated annually by the Bureau so that they offer a measuring standard for either progress or regress in efforts aimed at curbing poverty.  Therefore households whose income is above 100 % of their set threshold is said to be above poverty level, between 100-125 % are nearly poor , at or less than 100 % are in poverty and those with below 50 % are severely poor (United States. Bureau of  Census, 45).  The poverty threshold for a household consisting of two parents and two children as per the year 2015 is $49,114 (Carey, Landvogt & Barraket, 95).

References

United States. Bureau of the Census .Current Population Reports: Consumer income .U.S. Department of Commerce, Bureau of the Census, 2005. Series. Vol. 3. 45-60

 

 Carey Gemma, Landvogt Kathy , Barraket Jo. Creating and Implementing Public Policy: Cross-sectoral Debates. Routledge Critical Studies in Public Management. Routledge. 2015.94-96

                                                                                                   

 

 

 

 

618 Words  2 Pages

Economics

1.

    According to the video, there is a clear exploration of the systematic variation between the distinctive capitalism of America and Britain and Japan and German. Both America and Britain fall in the Capitalist nations while Japan and German fall in the communitarian capitalism category. This system indicates the way in which both Japan and German nation embrace more integrative interrelations. This is seen in the management and labor strategy, government and business and also among the enterprises. However, the American system is more of individualistic entrepreneurship that is basically made up of the laissez-faire. Both Japan and the German nations are connected with high investment on the work training that enables the people to be knowledgeable of the work and thus they are able to gain work experiences that enhance them to offer quality services effectively and efficiently. Thus the employees are guaranteed of long-term employment in these nations. The Japanese system in specific is involved in the financing of each other’s companies by families which end up owning them. The German system, on the other hand, involves the financing of companies by banks which are regarded as both lenders and also investors. The American system is usually carried out by the entrepreneurs and absentees while the owners of the companies and the managers who hold a high position and with great power mutually finance the companies.

2.

    Each and every nation provides a structure of reference for the other nation. The culture as it basically refers to the way of doing things forms the basis for each and every nation to form their own beliefs, values, and strategies to follow within their operations.

 Thus it is important to note that culture is important as it determines the way each nation conducts itself. The common interest that exists in a nation makes corporation important while their values within that culture make it possible for the success of their operations. Thus culture forms the strength from which each nation draws strength from thus enabling the capitalism in that nation to be established, oriented and made a success.

3.

    There is an increased global challenge and this has greatly affected those nations that have inadequate as well as weak strategies. For instance nations such as the United States, is facing a lot of difficulties from the competitive environment. The competition has increased globally and thus leaving America in a state where they are facing fierce competition from the economies which have varying social systems, business strategies, and cultures. Thus it is evident that the United States requires formulating and also implementing better ways in which they will be in a position to be competent thus allowing them to succeed amongst their competitors. Each and every economy is unique as each one of them hold different strengths and weaknesses. The communitarian system adopted by the Japan and German nation has enabled them to be more productive and successful as compared to the American and Britain nation. It is thus clear that the communitarian system is far better than the individualistic system. Thus the United States companies should pioneer towards new and efficient strategies so that they can be able to meet their challenges of the new period of the global competition and global issues facing them. This will thus allow their capitalist economy to increase as the companies in these nations will be competent and thus successful.

 

References

    Smith, Hedrick. The Culture of Commerce. , 1994.

574 Words  2 Pages

Simulation modeling software applications

            Simulation software is a system to conduct an operation where the user uses simulation. The modeling process makes a real phenomenon and improves process.  Example of simulation modeling software applications includes AnyLogic and NEi Nastran (El & Abu-Taieh, 2008).  AnyLogic as a multimethod modeling potentials and it is very potent and well-designed.  This simulation software can customize with Java and it represents dynamic modeling, motion modeling, and graphic modeling and so on.  The simulation modeling helps in problem solving and offers a real system.   Nei Nastran software is very useful and well known for CAE innovation.  It provides Nastran Finite Element Analysis (FEA)   for thermal and structural analysis such as advanced analysis, heat transfer and so on (El & Abu-Taieh, 2008).  Nei Nastran is very important as engineer can use it in modeling cohesive materials, evaluating creep strain and rubber fatigue among other uses. When comparing these two applications in terms of cost, AnyLogic has a cost of $6,199.00 while Nei Nastran has $2,000.00 (El & Abu-Taieh, 2008). In terms of features, AnyLogic has System Dynamics, Agent Based, Java models and Discrete Event. Nei Nastran features in Advanced Dynamics, Linear Statics, Nonlinear Analysis, Normal Modes and Nonlinear Transient (El & Abu-Taieh, 2008). AnyLogic offers training in Documentation, Discrete Event, System Dynamics, In Person and Webinars.  The training courses provide learners with modeling techniques and approaches in specific problems.  AnyLogic offer customized courses in any location at any time. Nei Nastrtan offers training in FEA software, Shock and Vibration, Nei explicit, Fatigue Analysis Nonlinear Analysis, Composite Analysis among other training classes (El & Abu-Taieh, 2008).  Students are provided with effective knowledge to apply in engineering problems, process analysis and gain experience and confidence.  Nie Software also offers distance learning and students are provided with new skills.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference

El, S. A. A. R., Al, A. A., & Abu-Taieh, E. M. O. (2008). Simulation and modeling: Current technologies and

applications. Hershey: IGI Pub.

328 Words  1 Pages


1.0 Introduction

The importance of ICT in the educational and learning setting cannot be over stressed. The utilization of ICT in contemporary learning environment involves slice use of computers in practical areas and online learning experience which promotes and advances learners’ intellectual and learning behavior (Balanskat, 2006). The role of technology in teaching and learning is rapidly becoming one of the most important and widely discussed issues in contemporary education policy (Akubuigwo & Maria, 2013). Most experts in the field of education agree that, when properly used, Information Communication Technology holds great promises to improve teaching and learning in addition to shaping workforce opportunities. This has actually gingered a new and strong desire to equip schools with computer facilities and qualified personnel necessary to produce technologically proficient and efficient students’ in developed countries of the world. Computer can aid the instructional process and facilitate students’ learning.

ICT motivate teachers and students. There seems to be some agreement that teachers and students feel that ICT utilization in the class significantly contributes to learners’ motivation for and engagement in learning. Majority (86%) of the teachers consent that learners are motivated and attentive if computers and the Internet are utilized in class. Therefore, ICT has a powerful motivational and positive impact on students’ learning behavior, communication as well as process skills (Balanskat, 2006).

2.0 The Reasons for Using ICT in Education

The use of ICT in realizing educational goals and the involvement of higher learning institutions cannot be over stressed as number of ICT projects are done these institutions. The reasons of using ICT is realized in many areas like improved access to learning via creation of a conducive learning environment, gender equality knowledge delivery, expanded secondary and post-secondary education, and reduction of expenditure on training among many others (Ansari, 2006).

This is the benefit of advances in ICT that has varied ways of communication in education, learning as well as delivery of knowledge to the society. Some new delivery technologies using like electronic learning in virtual programs, internet courses delivery strategies, and audio and video communications have altered and challenged the means of knowledge delivery in education sector (Harris & Kington, 2002).

According to Becker (2002) teachers are getting new and better skills of teaching from the internet hence improving their abilities of teaching. Students are challenged by the technology and they are capable of learning efficiently for they acquire knowledge and skills from the internet. Some of the students who did not complete their school and are in need of gaining higher and more knowledge, they are given a chance by technology to continue their education. Technology has proof how efficient it is giving knowledge to most of the student who are learning.

Morgan and Ritter (2002) articulate that since most of the students believe that there are some of the difficult subjects and with technology, students have changed their attitude towards all subjects. Becker (2002) indicates that student pay more attention since the modern technology was introduced hence better understanding and positive attitude towards the subjects’ as well giving students more self-assured. Therefore, technology in education has proofed the improvement of high performance in all subjects. The computer is highly motivating and engaging students, writing leading to producing lengthily and qualitative work particularly at the inferior level.

2.1 ICT and Students’ Motivation

The last few years have seen ICT prolific development. Content delivery through ICT components can be more efficient in motivating learners to learn than that which is offered in traditional classrooms (Abdous & Yoshimura, 2010). ICT can stimulate, motivate as well as spark learners’ appetite to learning, and assists in creating a culture of success. This can be demonstrated via their growing commitment to the learning task, their improved enjoyment, interest and achievement in learning when utilizing ICT, and their improved self-esteem.

Also, ICT increases motivation by offering a context for the student that is challenging and stimulates curiosity. Activities that are internally motivating carry other significant advantages like personal satisfaction, challenge, relevance, as well as promotion of a positive view on lifelong learning. Moreover, ICT, as opposed to learner-controlled, can get in the way of the student by requiring them to study all of the given subject matter in place of the only elements the learners’ need (Mayer, 2007). Additionally, ICT makes it possible for the students to make certain choices in an activity and to impact learning outcomes.

Cox (2007) argues that regular use of ICT across in diverse curriculum subjects may have a beneficial motivational impact on students’ learning. Online learning interests de-motivated and disaffected learners fully in subject matter. Passey (2000) further notes that ICT use among learners improves confidence, motivation as well as self-esteem especially for students with special educational needs along with disaffected students. Learners who use educational technology in school feel more successful in school and are more motivated to learn and have progressed self-confidence and self-esteem.

According to Van Daal and Reitsma (2002), the amount of non-directed behavior decrease during computer and classroom session, after the use of multimedia programs for reading as well as spelling. Laptops motivate learners to work longer and harder with growing pride in their work. Using a computer networked learning environment support discovery-based, student-centered learning via a range of collaborative and individualized activities. Van Daal and Reitsma (2002) asserts those students with online access and who have more frequent use of computers and grow an intellectual learning experience.

2.2 ICT and Students’ Retention of Subject Matter

The objective of education is to help students learn, and to measure this learning, assessments are commonly used. Students who use ICT devices score higher (Barrow & Markman, 2009). Therefore, ICT has assisted accomplish by enhancing higher level thinking skills, making difficult subject less of a memorization task, especially in relation to high complicated mathematical formulae, creating links between abstract as well as non-abstract concepts.

 ICT grows learners’ interest in task and increases the internal logic as well as organization of the material (Barrow & Markman, 2009) Emerging information can be easily integrated into existing schema if a learners’ name or other familiar contexts appear in an issue. The animation of objects in the explanation of a certain idea, for instance, Newton’s law of motion, grows learning by declining the cognitive load on the students’ memory thus allowing them to perform search and recognition processes and to develop more informational relationships.

Where each learner are at an individual workstation in a network, those needing assistance with an assignment can send a message to the instructor, or to other students, without disrupting others in the group specifically with the help of electronic system scanning the display screens of a certain class member, or the entire class in turns. The teacher can assess learner’s progress, and give feedback immediately, quietly as well as privately without disrupting the class where assistance, encouragement, or even discipline is required (White & Frederiksen, 2005). The feedback can be given by conveying a message to the learner or by interviewing directly in the students’ program to create suggestions, use illustrative examples, and offer online counseling. The instructor can broadcast students’ display screen to all other workstation in the network when he/she is working on a program or an issue that may be of interest to the rest of the class. Thus, ICT increases the extent of learners’ learning process, memory retention, classical and cognitive response as well as teacher-student relationship.

Audio-visual aids as elements of ICT play a vital significance in retention of subject matter. Its most common characteristic is its visual as well as audio aspect. Humans intuitively get the power of images to pass meaning, as can be viewed in the old age that values a picture more than words. Research in the last twenty years has proven what one intuitively knows the brains deal with images and sounds diversely than print (White & Frederiksen, 2005). Words are handled in the neo-cortex an area where the higher thinking capability of the brain exists. However, pictures, are handled in the limbic area of the brain, fast, and trigger instinct, emotion, as well as impulse (Wheeler, 2010). Since the brains are programmed to recall experiences that have an emotional element, visual systems like televisions and projectors have a powerful capability to relay experience via the emotions evoked by images.  Viewing and seeing are interactive processes between the learner and medium instead of a process in which the former is captured by the later. Additionally, responding to what learners see from the screen brings their own experiences as well as expectations to what they view on screen (Anderson & Lorch, 2003).

2.3 ICT and Students’ Engagement in Task

 The benefits in relation to the impact of ICT on learners’ learning process include increased collaboration, significant engagement in task process and persistence, on-task behavior as well as better conceptual understanding (Condie & Munro, 2007).

In assessing learner’s engagement to ICT, perceptions from the learners themselves have been minimal than teachers’ report, and objective forms of assessment as a way of measuring engagement. Learners mostly report positive experiences in engagement in the classroom while using ICT. Kay (2007) indicates that learners benefit and engage more in task if computers are utilized as an instructional device. He further asserts that ICT that use a visual dimension such as digital video, photography and video conferencing that are found to be engaging for learners. The utilization of ICT in classrooms offers a stimulus for collaborative working, discussion amongst fellow learners and teachers that allow the students to control of their learning process (Condie & Munro, 2007).

The students can browse through e-books, sample examination papers, previous year papers and can have easy accessibility to mentors, experts, researchers, and peers across the world. This flexibility has grown the availability of just-in-time learning and offered learning opportunities for many learners who previously were challenged by other commitments (Rockman, 2003). ICT offers opportunities to access an abundance of data using multiple information resources as well as viewing information from many perspectives, thereby fostering the authenticity of learning environments (Alexander, 2008).

With the utilization of ICT like blended classroom environment, learners can get information online even when the instructor is not in the classroom to direct the students. Moreover, students stay more focused on the task when using ICT devices as source of learning material. This grows students’ engagement in tasks thus decreasing students’ absenteeism and also creates students’ cognitive and psychomotor idea thereby enabling them to integrate classroom ideas with home experience.

3.0 Conclusion

The world is migrating to digital world where technology will be daily part and parcel of each and every human being. With the release of the millennium goals education has moved with the pace and has adopted technology to educate. The government should move in to subsidize the prices of software and equipment to boost technology use. The programmers should also increase their speed in developing software and ensuring quality across all the discipline

 

 

 

 

 

 

 

 

 

 

References

Abdous, M., & Yoshimura, M. (2010). Learner outcomes and satisfaction: A comparison of live video-streamed instruction, satellite broadcast instruction, and face-to-face instruction. Computers & Education, 55, 733-741.

Akubuigwo, I. & Maria, B. (2013). Influence of social media on social behavior of post graduate students. A case study of Salford University, United Kingdom. Journal of research and method in education volume 3 issue 6. Pp 39-43.

Alexander, J.O. (2008). Collaborative design, constructivist learning, information technology immersion, and electronic communities: a case study. Interpersonal Computing and Technology: An Electronic Journal for the 21st Century No.7, P. 1 – 2.

Ansari, M. (2006). How can ICT help us to Improve Education. Innovations in Education & Teaching International, Vol.39, No. 4, P. 271-280.

Balanskat, M. (2006). The impact of information and communication technologies on student learning and attainment. Coventry: Becta/London: DfES.

 Barrow, L., & Markman, A. (2009). Locus of control and acquisition of computer literacy. Journal of Computer- Based Instruction, 12(1), 12-16, 1985.

Becker, H. (2002). Pedagogical Motivations for Students. Computer use that lead to student engagement. Educational Technology, 40 (5), pp.5-17

Condie, M & Munro, G. (2007). Design of educational and ICT conditions to integrate differences in learning: Contextual learning theory and a first transformation step in early education. Computers in Human Behavior. Vol.23, No. (3), P. 1499-1530.

Condie, H & Munro, D. (2007). Benchmarking lifelong learning and eLearning in Regions: Measuring what really counts, Paper for the e-Challenges 2007 Conference, 25-27 October, Barcelona

Cox, M. J. (1997). The Effects of Information Technology on Students’ Motivation final report. NCET.

Kay, B. (2007). Effectiveness of computer-based instruction: An updated analysis. Computers in Human Behavior, 7, p. 75-94

Mayer, S, J. (2007). Technology, Text, and Talk: Students‟ perspectives on teaching and learning in a technology-enhanced secondary science classroom. Science Education, 82 (5), pp.569-589

Morgan, P., & Ritter, S. (2002). An experimental study of the effects of Cognitive. Retrieved from www.carnegielea

Passey, D. (2002). Anytime, Anywhere Learning (AAL): Project Evaluation End of First Year Implementation Summary Report. Lancaster: Lancaster University. Pp; 74-76.

Rockman, S. (2003). Computers and Student Learning: Bivariate and Multivariate Evidence on the Availability and Use of Computers at Home and at School. CESifo Working Paper .  No. 1321. November.

Van Daal, V. & Reitsma, P. (2006). Computer-assisted learning to read and spell: results from two pilot studies. Journal of Research in Reading, 23 (2), P. 181-193.

Wesley, D., Krockover, H., & Hicks, J. (2008). ICTS: A catalyst for enriching the learning  process and library services. The International Information & Library Review Vol.39, No. (1), P. 1-11.

Wheeler, S. (2010). The New Smart Devices for Learning. Proceedings from Learning Technologies 2010. Conference, London.

White, G & Frederiksen, N. (2005). Effective learning environments for young children using digital resources: An Australian perspective. Information Technology in Childhood Education(Annual 2001). P. 139.

 

2302 Words  8 Pages

UNIT 5 DISCUSSION

Information Systems in Business Settings

According to the video, it is factual that the reliance on information technology has augmented significantly in the current business sector where different businesses use it strategically for competitive advantage. Therefore, in order to use information technology effectively, business owners should consider factors such as;

  • The size of the business
  • Overall cost of IT
  • Computerization applications
  • Goals that will be achieved after IT implementation
  • Location of the business

After considering these factors, the business benefits from IT implementation in terms of efficiency of the operations, fast and effective processes, and improved working environment.

The differences that will exist between the business using IT and the others are based on the fact that the business will enjoy variety of benefits from information technology. To start with, communication in the business will be fast and effective. Additionally, the business will benefit from effective process since IT promotes automation of processes such as decision making (Passerini, Tarabishy & Karen, 2012). The other benefit is information protection and storage which is enhanced by IT. The last benefit is increasing competitive advantage as the business is able to make quick and effective strategic implementations. Thus, IT can be used in different areas within an organization such as product development, cost efficiencies, communication, competitive advantage, shareholders integration, globalization and process improvement (Passerini, Tarabishy & Karen, 2012). However, despite the variety of benefits that an organization can enjoy from IT, there are corresponding drawbacks associated with using IT in the business. They include the following;

  • High implementation cost
  • Security issues
  • Employment elimination
  • System failures and other related distractions (Passerini, Tarabishy & Karen, 2012)
  • Long working hours for the employees

It is factual that implementing information technology is an expensive strategy especially for small and medium organizations (Passerini, Tarabishy & Karen, 2012). Additionally, the benefit of information technology appears to be more valuable in service organizations than in manufacturing companies. This is based on the fact that IT in a business is projected to enhance communication which translates to fast and effective customer service. Therefore, in this case, it might take long for the manufacturing organizations to adopt information technology than service organizations. In fact, service organizations will implement information technology earlier. However, for the multinational organization, information technology is more ideal especially in communication between the subsidiaries in different markets. Thus, multinational organization requires a fast implementation process for information technology in order to promote effective organizational operation. Generally, these contentions are based on the fact that information technology focuses more on services rather than production. Therefore, service organizations will have more interest on IT than manufacturing organizations.

Reference    

Passerini, K. Tarabishy A. El, & Karen, P. (2012). Information Technology for Small Business: Managing the Digital Enterprise. New York, NY: Springer. Internet resource.

464 Words  1 Pages

INFORMATION TECHNOLOGY IN COUNTY PARK LOUNGE

Introduction

In the contemporary world of business, different organizations have increased their reliance on information technology (Turban, 2005). This has resulted to significant improvements in the overall performance and processes of the businesses. Basically, the major objective of adopting information technology is to increase the competitive advantage of the business (Turban, 2005). Competitive advantage of the business is enhanced through product development, communication effectiveness, and processes efficiency increased by information technology in the business. Therefore, in this case, County Park Lounge will implement information technology as a strategy of adapting to the modern trends and market changes.   

It is factual that digital technology has contributed significantly to the face of the nightclubs, and restaurants in the millennial era (Hasson, 2015). This is based on the fact that nightclub owners and staff do not use traditional bookkeeping which utilized pen and papers. Therefore, nightclubs tend to use digital channel for bookkeeping in the business operations. Digital technology has helped nightclubs optimize business performance by increasing efficiency through tracking, organizing and synchronizing business processes (Hasson, 2015). As a result, County Park Lounge will use several digital technology platforms and software in different segments of the business. In the management segment, the nightclub will use digital management programs such as BookBottles and SocialNightlife Pro (Hasson, 2015).

BookBottles   

This is a technology platform that offers management services and channels all in single software while offering in-depth analytics (Hasson, 2015). The software is developed alongside venues that help the business utilize cloud computing to maximize the profits. Therefore, the business is able to manage all aspects of the venue (including guest lists, inventories and reservations), collecting and analyzing the data about business performance, and data representation in form of charts and graphs (Hasson, 2015).

SocialNightlife Pro

This is a computer application which allows data sharing between the nightclub staff and the customers by bringing them together in a single platform (Hasson, 2015). Therefore, the nightclub staff can use this app for event promotion, advertisements, relationship management and customer rewards.

Therefore, for these two digital platforms, the nightclub will use computers as the channel to access the software.

On the other hand, for marketing, County Park Lounge will use DrinkAdvisor as a marketing tool for the nightclub . This software can be used in mobile phones to keep the customers updated about promotions and night theme events.

Thirdly, for the behind the bar segment, the club will utilize several digital point of sale systems to increase efficiency and accuracy in handling customer orders to make sure that they do not wait longer for services. County Park Lounge will use Digital Dining, The Bindo, and RPower POS systems (Hasson, 2015).

Digital Dining

The system was launched first in Australia and moved to United States in 1984 in Washington DC (Hasson, 2015). The system can be used in iPads basically but not limited to computers. The system offer features that cn take cues from the customers and handle them effectively and quickly.

The Bindo

This is POS system turns the iPad into a cash counter which give the gadget the ability use credit cards. This system is a cloud computing platform used in business management for the nightclubs (Hasson, 2015). The owners of the nightclubs benefit from loyalty programs reservation and payment services, and metric analytics among other services offered by Bindo POS system using the iPad.

RPower    

RPower is POS software that offers establishments platform which include inventory integration to the third party, and video display among others (Hasson, 2015). The software offers unique management tools for the nightclub and bar business. Thus, it is factual that County Part Lounge will benefit from unique customers services and optimizing business operations.

In addition, the nightclub can use digital technology for the in front of the bar services. Businesses use digital technology to replace positions in the club with computers that are cost-effective and precise. Thus, some of the applications that will be utilized by the nightclub include iPourit, Tablelist and Coherent Design (Hasson, 2015).

iPourit     

This is a digital technology that directs customers to pour their drinks through a system of controlled valves and taps (Hasson, 2015). The benefits of this technology include cost-saving, efficient customer services, fast in eliminating waste, and it acts as fun to the customers. The efficiency of iPourit is based on the fact that the bartender can count every ounce of the drink poured to the customer which means that the business enjoys maximum profit. Other benefits associated with iPourit include increased sales, data mining and increased effectiveness of the business processes (Hasson, 2015).

Tablelist   

This is a mobile application that offers promotion services to the club owners and table-booking services to the customers. That application is accessed in both Android iOS operating systems which helps the user utilize and manage table inventory in the app (Hasson, 2015). On the other hand, the customer can be able to reserve a table, share it with friends, book drinks, pay for them and access other related services. This app helps the business owner to open up table bookings to potential customers who can afford them by filtering the rest. This means that County Park Lounge will be able to select potential customers to open the table bookings up to them exclusively. In making this selection, the customer can only hit the specified spending level which will direct him or her to the Tablelist Platinum staff (Hasson, 2015).

Coherent Design  

This is a design consultancy application that offers specifications on the appropriate design that the club can execute to enhance customer experience (Hasson, 2015). The application utilizes sound systems, lighting system and other forms of technological programming and planning. This software adheres to innovation, technology planning and enhancing customer experience thus helping the company in customer retention and attraction (Hasson, 2015).

For the website, County Park Lounge will open its own business website that will offer ultimate design to help customers access services easily and swiftly. For instance, the website will have an icon for contacting the club’s staff directly while making inquiries (Hasson, 2015). Additionally, the site will help the customers access relevant information regarding the club based on location, promotions, products and services offered, and special offers.

Disaster Recovery Plan

In order to control information, County Park Lounge will implement management control system (MCS) to evaluate the performance of IT systems in the business and execute control strategies. The system will increase the dependence of information and IT systems in order to detect the problem that might develop during delivery (Lainhart, 2001). This will decrease information threats vulnerability on the IT systems. Therefore, through MCS, the manager will be able to coordinate, allocate resources, and measure the performance of the information systems (Lainhart, 2001).

The weaknesses of the management control system in the nightclub include increasing costs, operation and processes delay, long working hours for the employees and vulnerability to ineffectiveness (Lainhart, 2001). Thus, the manager of the nightclub will have to planning for the control measure of these weaknesses and risks of implementing a management control system.

Conclusion

Generally, it is perceptible that adopting the digital technology by County Park Lounge nightclub is one of the strategies of adapting to the changes in the modern nightclub sector. Therefore, this will increase the competitive advantage of the nightclub by synchronizing customer services with objectives of the business. Additionally, digital technology will optimize the performance of the business by improving customer relations and enhancing business process. As a result, the nightclub will utilize applications and software such as BookBottles, SocialNightlife Pro, Digital Dining, The Bindo, RPower POS systems and the business website. Basically, executing information technology in the business will be intended to enhance customer experience and services in order to increase the competitive advantage of the business.     

References       

Hasson, B. (2015). Digital Technology for Nightclubs. Nightclub & Bar. Retrieved from http://www.nightclub.com/product-watch/technology/digital-technology-nightclubs            

Lainhart, J.W. (2001). A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities. Journal of Information Systems, vol. 4. Pp 21-25       

Top of Form

Turban, E. (2005). Introduction to information technology. Hoboken, NJ: J. Wiley.

Bottom of Form

     

1356 Words  4 Pages

Linear programming (LP)

Linear programming is a methodology used in the operational management to solve problems on market allocation. In market research and management as well, LP has played a vital role in solving problems which arise from scheduling, financial planning, transportation, capital budgeting among others.  Marker researchers have greatly benefited from using LP by gaining flexibility, creating applications and optimization algorithms and gaining reliability (Dorfman, 2012).  Researchers have produced measurable improvements in market performance. One can count immeasurable benefits from using LP, as the mathematics contains powerful capabilities which helps in cost reduction, effective use of resources, risk reductions and improves profitability (Dorfman, 2012). In addition, managers counts benefits from optimization by   gaining skills on how to focus on critical uncertainties and ways to speed up responses. In market research, LP gives solution to optimization problems where it is used in workload assignments, inventory routing and scheduling task (Dorfman, 2012).  In problem solving, LP has a simple linear combination   which is used in optimization problems. LP has benefits which arise from real time application such as production planning, plant layout, logistic management and equipment acquisition.  It also provides computational advantages from its special structure.

 

For example, a market researcher can use LP in market optimization.  Customers use various channels to attain the maximum value from competitors and enterprises.  They buy products on cheaper channel and for this reason; the big question with marketers is how to connect customers regularly.  The important thing here is to optimize budget allocation in order to achieve the objective.   This is where the LP will be applied in problem formulation.  For example in this case, there is a scarcity of resources and the client is focusing on allocation of optimal resources.  In this example, the client is a carpenter who makes furniture (tables and chairs) but does not get higher profits as he expects.  The carpenter is interested to   know what he is supposed to do or else the number of chairs and tables he should make in a weekly basis to maximize net income ( Arsham, 2011).  

In LP, X2 and X2 stands for tables and chairs and F1 and F2 stand for fixed costs. Therefore;

Maximize 9X1 + 6X2 – [(1.5X1 + X2) + (2.5X1 + 2X2) + F1 + F2],

Maximize 5X1 + 3X2

Maximize 5 X1 + 3 X2

=2 X1 + X2 £ 40 labor constraint
=X1 + 2 X2 £ 50 material constraint

 

 

 

 

 

 

 

 

 

 

 

Reference

Dorfman, R. (2012). Linear Programming and Economic Analysis. Dover Publications.

 

Arsham HOSSEIN (2011). Deterministic Modeling: Linear Optimization with Application,9th Edition. 2011.

Retrieved from: http://home.ubalt.edu/ntsbarsh/business-stat/opre/partVIII.htm#rCarpenterPr

436 Words  1 Pages

IT Support for Virtual Teams

It is factual that building and managing virtual teams is based on the advances made in information communication technology. Virtual teams encompass staff members with unique skills who engage in similar task to accomplish organizational goals and objectives. As a result, in maintaining and supporting virtual teams, the IT department is likely to face the following issues;

  1. Initiating trust in the teams in order to promote successful virtual work progress (Kirkman et al, 2002)
  2. Optimizing process outputs while minimizing process losses within the virtual teams
  3. Promoting teamwork within the virtual teams by eliminating the sense of detachment and segregation (Kirkman et al, 2002)
  4. Synchronizing interpersonal and technical skills of the team members
  5. Assessing and recognizing the performance of the virtual teams (Kirkman et al, 2002).

Citing from the fact that virtual teams involves skilled workforce in different locations who collaborate to derive the organizational achievements, there are several benefits that the company enjoys by supporting virtual teams (Pauleen, 2004). They include the following;

  • Low overhead costs
  • Promotes employees retention
  • Pool of skills and talents
  • Flexibility of the workforce
  • Access to different markets (Pauleen, 2004).

On the other hand, alluding to the diversity of the virtual team members, it is factual that an organization that supports virtual teams endures corresponding drawbacks (Pauleen, 2004). These shortcomings include the following;

  • Affected by negative perception from the investors (Pauleen, 2004)
  • Hard to adhere to the parent organization’s culture
  • Depends on new skills and conduct
  • It is hard to track the teams’ performance
  • Low communication bandwidth (Pauleen, 2004).

Challenges imposed by IT/IS Standards 

  • Standards are attached to the school subjects. Instead of attaching the standards to the school subjects, they should be attached to the mind’s quality that determines the study of the subject (Strauss, 2012).
  • Technology and the overall world changes. The standards should not adhere to static strategies in a rapidly changing world. In fact, they should adopt flexible strategies that will comply with the changing world.
  • Common core skills are detrimental to invention (Strauss, 2012). The national standards should implement other alternatives instead on relying solely on common core skills

 Challenges imposed by protocols

  • Divergent organizational policies that affects communication. The organization should adopt similar organization policies that do not affect the effectiveness of communication network. This can be achieved by using same ICT infrastructure and similar communication channels.
  • Misunderstanding resulted by lack of situational information regarding the teams. The organization should conduct a situational analysis regarding the virtual teams in order to avoid misattribution.
  • Complexity in building relationships with different virtual teams. In order to deal with this strategy, the company ought to make synchronous meetings in order to build relations between the company and the virtual teams.     

Challenges imposed by procedures on virtual teams

  • Sharing best practices. Citing from the divergence of the virtual teams, sharing business best practices becomes a challenge. Therefore, through similar organization policies, the company can help virtual teams share similar best practices in order to achieve overall organizational goals.
  • Quick problem solving. The organization should use effective risk management strategies that will be used all over the organization in order to enhance instant problem solving.
  • Tackling cultural divergence. This challenge can be tackle using effective communication skills that help in avoiding cultural divergence relate issues.
  • Collaboration and commitment. By understanding situational information regarding the virtual teams, the organization should use effective management strategies that promote employee engagement in order to promote commitment and collaboration among the team members.    

Virtual Teams and Traditional Teams

From the definition of teamwork, virtual and traditional teams consist of different individuals who collaborate to achieve a single pre-defined goal (Godar & Ferris, 2004).  Precisely, traditional teams involve both collocated and co-located members who work in physical proximity whereas virtual teams consist of individuals who work in different geographical locations whose their collaboration is mediated by information technology medium (Godar & Ferris, 2004). However, both teams adhere to flatter organization structure for effective performance. Additionally, information exchange in both virtual and traditional teams is done through discussions. It is noteworthy that face-to-face interaction factor for traditional teams is the privilege for the teams over virtual teams (Godar & Ferris, 2004). This is based o the fact that it minimizes the number of challenges for traditional teams.

References

Kirkman, B. L., Rosen, B., Gibson, C. B., Tesluk, P. E., & McPherson, S. O. (2002). Five challenges to virtual team success: Lessons from Sabre, Inc. Academy Of Management Executive, 16(3), 67-79. doi:10.5465/AME.2002.8540322

Pauleen, D. (2004). Virtual teams. Hershey, Pa: Idea Group Pub.

Strauss, V. (2012). Eight problems with common core standards. The Washington post. Retrieved from https://www.washingtonpost.com/blogs/answer-sheet/post/eight-problems-with-common-core-standards/2012/08/21/821b300a-e4e7-11e1-8f62-58260e3940a0_blog.html

Godar, S. H., & Ferris, S. P. (2004). Virtual and collaborative teams: Process, technologies, and practice. Hershey, Penns: Idea Group Pub.

 

Virtual Teams Collaboration Diagram

 
   

 

 

            

Queries                                                                          Requirements

                               Updates                        Queries                   

Client                                                                  Offshore Project Manager                                              Offshore Team
                                                                                                                                                                                                                                                                                                                                                                                            
Updates                    

                                                                                                                        Updates                          

812 Words  2 Pages

SnapChat

Evan Spiegel is the entrepreneur behind the Snapchat mobile application. He has led a luxurious and privileged life with both of his parents who are lawyers. Just like the founder of FaceBook, he was brought up with technology whereby he got his first computer while at the sixth grade which gave him enough exposure to technology. Much of his school time was spent in experiments such as photoshopping. He also spent most of his free weekends at the art lab of a local high school. In addition, he also spent time in promotions especially in clubs and bars while he was still in high school (Swant 38).

Evan Spiegel joined Stanford University and met Bobby Murphy who was the co-founder of the Kappa Sigma fraternity. Murphy hired him in designing a certain online social network with much of the inspirations being obtained from Google. As a result, he developed his first project of online software that would facilitate the admissions of college students as well as the coordination of parents, high scholars and the counselors (Swant 38). The project soon collapsed but Evan Spiegel gained recognition from it. While at Stanford, he engaged in aggressive networking with an aim of meeting the influential people such as the executive chairman of Google and the co-founder of Intuit. His interaction with the prominent and co-founders enabled him to get a job at the tech company at Scott while he was still a student. Evan Spiegel has loved a luxurious lifestyle whereby he bought a car worth $75, 000, getting in lavish parties and other expensive hoodies (Swant 39).

The basic idea of Snapchat was developed by Evan Spiegel, Murphy and Brown. It started as a school project at Stanford. The initial name was Picaboo which was based on enabling the users to communicate using short-lived images. This idea was presented to the class and with the help of Murphy, the source code of the program was written down. The launching and re-launching of the project was done in 2011 with the application being given the new name of Snapchat. The application soon gained popularity and developed into a mixture of both the private and public content messaging app (HEMPEL, JESSI, et al 1).

The spontaneous growth of Snapchat has been marked by various improvements. First, in 2012, users were sharing photos with the images sent per second. Evan Spiegel however cited some problems because Snapchat was facing some difficulties in delivering some images. Furthermore, Snapchat was only compatible with IOS operating system and this locked out the android users ((HEMPEL, JESSI, et al 1).

Snapchat for android operating system was released in October 2012 which included some added abilities such as the sharing of video snaps. In June 2013, an updated version of snapchat was released for IOS. Some speed and design advancements such as double tapping to reply, swipe navigations and an improved friend finder were introduced. The Snapchat also released the snapkidz which was a Snapchat designed for children under the age of 13 (HEMPEL, JESSI, et al 1).

In 2014, the Snapchat was further developed to enable chatting via a video call. The update also allowed the Snapchat users to share ephemeral texts while saving the important information. Finally, Snapchat managed to acquire an application called Looksery which allows the users to utilize various specific photoshopping graphics. From the statistics published for Snapchat’s progress, it is estimated that users have sent 6 billion videos each day (HEMPEL, JESSI, et al 1).

 

 

 

 

 

Work cited:

HEMPEL, JESSI, et al. "3, 2, 1 Countdown To The Snapchat Revolution." Fortune 169.1 (2014): 82. Business Source Complete. Web. 25 July 2016.

Swant, Marty. "Evan Spiegel Executive Of The Year." Adweek 56.41 (2015): 38-39. Business Source Complete. Web. 25 July 2016.

631 Words  2 Pages

COMPUTER SYSTEMS ADMIN

    Most of the organizations rely on their networks for most of their operations and any occurrence of a problem must be rectified quickly and completely. The computer system career, therefore, comes in as they maintain the operation flow within the business and ensures that the lines of communication remain open. The core task of a computer system admin is to maintain, configuration and reliable workflow of the computer systems. They also ensure that they update all the equipment in the organization and all the software.

    The system administrators are advantageous as they ensure that they troubleshoot the systems software and hardware. They as well are advantageous to the company as they ensure that they manage the performance and operation of computers without increasing the company’s budget. The major disadvantage with the systems administrators is that they are more than often overworked in any organization as their task is so crucial to the success of the company’s operations.

    The server administrator is one of the types of a computer system administrator basing on its role as the administrator is tasked with the role of operating system of the servers as well as troubleshooting of any hardware and any other application related setbacks (Lucas 2014). Another type of administrator is the database administrator where the administrator is tasked with the role of maintaining the database system used by the organization.

    Database management is another area of interest as it involves the organization of data in a database using a software tool. This area of interest is important as most of the organizations deals with large amounts of data that requires being organized. The system ensures that the data is secured, has concurrent accessibility and it has a backup for recovery of data.

References

Lucas, M. W. (2014). Networking for systems administrators.

 

302 Words  1 Pages

NETWORKING

  1. Fiber-optic cable leaves more room for growth and future needs for increased bandwidth than twisted pair does

As much as networking is concerned, the easiness of effectiveness of leaving room for growth as well as for future needs for its increased bandwidth comes form from various factors. One of these reasons is that the relatively low attenuation and advanced signal integrity which is found in the optical system enhances the transmission of signals for longer intervals (Vidyarthi 31). Despite the fact that it is unusual for this system to span for over 100 kilometers without active or passive processing, the continuous advancement in technology is still promising much greater coverage in the future.

Moreover, being that the current applications calls for an escalating amount of bandwidth, it means then that it is important to first consider the space available for its end users. Thus the light weight and relatively small diameter of the fiber-optic cables ends up making such installations more easier, practical or saving the valuable conduit space in environments for instance within the existing dust systems (Bond 39). Their small diameter also makes it more practical in manufacturing as well as installing longer lengths unlike the twisted pair.

In addition to that, the much longer length of the fiber optic cables makes their installation to be much easier and less costly. It should be noted that these cables can be installed effectively with similar equipments used for installing coaxial and copper cables due to there limited pull of tension, small size, and bend radius. As stated, although they can normally be installed in dust systems depending on the condition of the dust environment, some of the longer cables can get coiled at some transitional sections and then pulled more into the dust system (Abdul 34). Nonetheless, usually fiber-optical cables system designers do plan for its growth needs for a lifespan of about 15 to 20 years. Despite the fact that that is somehow difficult to predict, such a growth remains to be accommodated through the installation of spare fibers for its upcoming requirements. This is to say that general installation of spare fiber-optical cables nowadays is becoming more economical as compared to the installation of extra cables later.

 

 

Work cited

Bond. Foc 81 East Fiber Optics & Communications Proceedings. Information Gatekeepers Inc, 1981. Print

Vidyarthi, Deo P. Technologies and Protocols for the Future of Internet Design: Reinventing the Web. Hershey, PA: Information Science Reference, 2012. Print.

Abdul A.. (Fiber Optics: Principles and Practices. CRC Press, 2006. Print

 

420 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...