HND商務(wù)信息與通訊技術(shù)_第1頁
HND商務(wù)信息與通訊技術(shù)_第2頁
HND商務(wù)信息與通訊技術(shù)_第3頁
HND商務(wù)信息與通訊技術(shù)_第4頁
HND商務(wù)信息與通訊技術(shù)_第5頁
已閱讀5頁,還剩4頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、Information CommunicationsTechnology in Business :An Introduction(DE3K 35)NAME:SCN:CLASS:ContentsIntroduction 3Section1 introduced for functions of management 3Section2 Three types of information system 4Section3 Two pieces of current legislation 5Section4 Three data communication systems 7Section5

2、Two benefits for each of the three data communication systems 8Section6 Three threats to security of networked information 9Section7 Three ICT innovations in term of their relevance to the company 10Reference 11歡迎下載9IntroductionThe body of this report consists of seven parts that includes different

3、management needs different information, three types of information system, two pieces of current legislation, three data communication systems, two benefits for three data communication, three threats to security of networked information, three ICT innovation of company.Section1 introduced for funct

4、ions of managementCondensedReportscoordimtionFigure1 functions of managementStrategic manager: Connor Webster is strategic manager of Crown Catering ServiceCompany. Strategic manager need some information to developing Catering ServicesCompany. The information includes an internal information staffi

5、ng needs. The company should meet the needs of staff. So that staffs work harder. External information includes market trends. Companies understands the market trends conducive to the development. Catering Services Company sStrategic Manager through the information to formulate long-term planning an

6、d setting objectives and policy. The long-term planning is 3-5 year target. Catering Services Company. Catering Services Company through object and policy to developing company.Tactical Manager: Crown Catering Services Company has about 20 branches is tactical manager. The tactical manager needs inf

7、ormation includes four kinds of internal information and one external information. Four kinds of internal information includes productivity, improve productivity can improve the efficiency of the work.Variance analysis can show difference between the planned and actual production.Tactical manager ne

8、eds Cash Flows and Budget ' s information to do budgetary control and monitoring. External information includes current market data and opponent ' s policy related. The tactical manager through information to obtaining resources monitoring and developing operational policies and objectives.O

9、perational Manager: Crown Catering Services Company s sales manager is operational manager. Operational managers needs real-time and specific business information. Operational managers to responsible for routine activity business information, monitoring of frontline staff, ensuring effective use of

10、resources, rating to staff of different levels, monitor employee attendance hours worked and overtime. Low levels of responsibility affecting individuals.Section2 Three types of information systemDSSOperational manager using decision support systems. Decision support systems are interactive systems

11、that rely on hardware and software to support managersin the decision making process and a highly flexible and interactive IT system that is designed to support decision making when the problem is not structured. Connor Webster can use that to do market survey project. The benefits of DSS for Crown

12、Catering Services Company includes optimization and forecasting work completed, simulate scenarios and for easy to Crown Catering Services development of contingency plans in advance, understand work processes, prevent the potential danger. ESExpert System aimed to duplicate what an expert or number

13、 of experts would do in a given situation. Expert system is suitable for tactical manager. ES system can help Crown Catering Services company solve complex problems and make decisions. The ES s benefits includes put together structured data, definearea and hands complex logic.EISEIS' s definitio

14、n is any kind of information system which improves the functions of an enterprise business processes by integration. Strategic manage can use EIS to precise find information in many fields. Fields includes marketing, finance, manufacturing and others. The EIS' benefits includes provide the effic

15、iency of decision makers, timely decision, improve the tracking information for Crown Catering Services, provide timely information.Section3 Two pieces of current legislationThe Date protection Act (1998):The Data Protection Act governs the processing of information relating to individuals. The Act

16、covers the obtaining, holding and use or disclosure of information.This Act also concerns personal information held about individuals and relates to the followingData processed using an electronic system.Information recorded as part of a relevant filing system.The Data Protection Principles:1. Infor

17、mation shall be obtained and processedfairly and lawfully '.2. Information shall only be held for one or more specific and lawful purposes.3. Companies should not hold information that is excessive or is not relevant to the purposes the company has registered under the Act.4. Information held on

18、 individuals should be accurate and up-to-date.5. Information should not be held for longer than necessary.6. Individuals have the right to see the data held about them and have corrections made if need be.7. Companies must take adequate security measures to prevent unauthorized access.8. Data must

19、not be transferred to countries outside the European Union (EU) that provides inadequate protection.Suggestion for Crown Catering Services CompanyCrown Catering Services Company should lawfully use the collect data. Crown Catering Services Company should protect the security of data. Crown Catering

20、Services Company should be accurate and update of individuals. Crown Catering Services Company should be not be held for longer than necessary of data.Computer Misuse Act 1990This legislation protects information stored on computer from unauthorized access, alteration and damage.Unauthorized access,

21、 including hacking or internal members of staff using someone else ' s password to access restricted information.Ulterior intent with the intention of committing a crime for personal gain.Unauthorized modification to documents.Suggestion for Crown Catering Services CompanyCrown Catering Services

22、 Company often give computer virus. Crown Catering Services Company should put the data in a safe place. The company should prohibit employees from using the data for profit. The company should define who can access dataSection4 Three data communication systemsA local area network (LAN) is a compute

23、r network that interconnects computers within a limited area. A local area network is contrasted in principle to a wide area network, which covers a larger geographic distance and may involve leased telecommunication circuits, while the media for LANs are locally managed. Limited area includes resid

24、ence, school, laboratory, or office building. Ethernet over twisted pair cabling and Wi-Fi are the two most common transmission technologies in use for local area networks. A local area network coverage is very small.A wide area network (WAN) is a telecommunications network or computer network that

25、extends over a large geographical distance. Wide area networks are often established with leased telecommunication circuits. Many technologies are available for wide area network links. Examples include circuit switched telephone lines, radio wave transmission, and optic fiber. New developments in t

26、echnologies have successively increased transmission rates. Therefore, the WAN communication requirements and complexity are high.The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. Common methods

27、of Internet access by users include dial-up with a computer modem via telephone circuits, broadband over coaxial cable, fiber optics or copper wires, Wi-Fi, satellite and cellular telephone technology. The shortcoming of internet includes very vulnerable to intentional attacks.Section5 Two benefits

28、for each of the three data communication systemsLocal area networkEnables the sharing of hardware on the network. Crown Catering Services Company can use local area network to share printer that can improve work efficiency.Saves duplication of work within the organization. Local area network can hel

29、p Crown Catering Services Company to Saves duplication of work.InternetThe use of email as a communication tool. Staff use the internet to send email that easy and save time.It enables you to create links with customers and suppliers. Crown Catering Services Company' staff can uses internet link

30、s with customers and suppliers to handles business.Wide area networkIncreased security of data that is backed up on file service and restricted access through the use of passwords. Crown Catering Services Company use Wide area network to enhanced data security.Networks also allow data to be exchange

31、d with suppliers and online payment facilities, making them much more efficient. Network can help Crown Catering ServicesCompany with suppliers to exchanged data and online payment.Section6 Three threats to security of networked informationHackers"Hacker" means research outsmart computer s

32、ecurity system staff. Use of public communications networks, such as Internet and telephone system, without permission, to load other systemSuggests:The Crown Catering Services Company should give data encryption in order to prevent hacker attacks, theCrown Catering Services Company to supervise eve

33、ryone access to data to rule out the hackers.Natural DisastersNatural disasters can destroy hardware store data, such as earthquakes and floods can destroy hardware s data.SuggestsCrown Catering Services Company can build a databasewithout a place of natural disasters. The company regularly updates

34、and backup of data.Computer VirusesComputer Viruses: Compilers is inserted in a computer program function or destruction of computer code data, can affect computer use, a set of computer instructions, or self-replicating code.SuggestsThe Crown Catering Services Company save data to a computer instal

35、l anti-virus software upgrade to the latest version, and open real-time monitoring and give people complex passwords to access the data.Section7 Three ICT innovations in term of their relevance tothe companyF2b2cF2b2c is a new e-commerce business model. F2b2C is the Factory-to-business-to-Consumer.

36、Consumers through the Internet and business communications with company. Company give customers personalized products, the company can provided produces directly to the customer. Crown Catering Services Company can use F2b2C model to meet the needs of individual customers and directly to the hands o

37、f customers. So F2b2C can help Crown Catering Services Company increase work efficiency andcustomer ' satisfaction and cut costs.VoIPVoice over Internet Protocol is Allows you to send voice communication over the Internet, avoiding the long-distance telephone charges,you would normally receive from your long-distance carrier. Crown Catering Services Company can use VoIP

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論