1. CRM stands for customer relationship management. This is very much necessary to understand and take measures that will effectively manage the customer lifecycle. Customer relationship management follows an approach that ensures managing the company’s interaction with its potential customer and current customer. The customer’s data is being collected with the help of data analysis. The CRM helps to manage the process and this process is controlled by the people of sales department within the organization and this should be considered as the main tool. The three components of Customer relationship management are:
2. a) There are several e policies that will help in protecting the information within the organization. These e policies needs to cover all the aspects so that the data stored within the organization can be kept secured and protected. There is a need to safeguard the information associated with online transactions, thus an organization needs a set of policies that will maintain the privacy while performing electronic transfers. This includes maintaining the privacy of customer data, code of conduct and business procedures. It is the responsibility of e-policy to outline all the features and working of the organization (McPherson and Pincus 2017). This also set rules and policies in which way the organization are allowed to collect information and in what amount. The e-policies in protecting the information includes:
Electronic transaction laws: this helps in protecting the transaction that is taking place electronically. This is very necessary to ensure that the transaction done is secured.
Policies involving use of IT systems: this involves setting rules that enables the users with laws of using and accessing the IT data and information’s. This also involves backing up data protection. This includes policies that defines the behaviour of employees and contractors (Valacich and Schneider 2015).
IT risk management and business continuity plan: this ensures that the organization have been identified all the risks that are likely to come with IT data and systems. This risk management will help in managing the risk that are likely to affect the IT Data and systems.
b. Authentication technology are used to protect the server from unauthorized access. This involves comparing the present credentials given by the user to the already existing ones. The users gets permission only once the user is being verified as authenticate one. In order to authenticating the system. The organization needs to implement passwords for ever system, using of smart card, using fingerprint or biometric method. There are two types of authentication available these are single factor authentication, two factor authentication, multi factor authentication, strong authentication, continuous authentication and digital authentication. The firewall will help in improving and protecting the information from unauthorized users and also saves the important data from hackers. This process will help in protecting the system from hackers and will improve the security provided to the users.
3.a) The essential characteristics offered by cloud computing are on demand self-service. The customer can choose cloud architecture as per their need and can pay only for the resources they are using. The main features of cloud computing includes filer versioning , automatic synchronization, the cloud server allows viewing and editing the file from cloud , security and file encryption is provided by the cloud to their customer (Laudon and Laudon 2016). The storage provided by the cloud to their customer are flexible and at an affordable price. Cloud architecture also provides reliable tech support. Cloud computing also offers better privacy and security services.
This essential characteristics includes:
On demand self-service: consumer are allowed to choose their server time and network storage and this does not requires human interaction.
Resource pooling: the computing resources are being used to provide multiple customers at a time even after having different physical level and virtual resources.
b) Disadvantages offered by cloud computing are , Firstly as the controls are in the hands of cloud provider. Thus, this becomes difficult for the user to know about the exact working. Secondly, the cloud server is vulnerable to attacks (Galliers and Leidner 2014). This is because all the components are online and thus it has the capability to expose all the details on the internet. This will lead to leak in public data. This will also lead to a rising issues related to security. Moreover the control offered is in limited quantity and does not offers much flexibility.
Yes |
The services a firm is capable of providing to its customers, suppliers, and employees are a direct function of its MIS infrastructure. |
No |
The only service that will be affected by the quality of the MIS infrastructure is the service provided to customers. |
Yes |
Ideally, this infrastructure should support the firm’s business and information systems strategy. |
No |
This infrastructure should support the firm’s information systems strategy, regardless of the business strategy. |
Yes |
The above illustration focusses more than anything else on the relationship between Business Strategy and IT strategy. |
Yes |
The above illustration represents the centrality of MIS infrastructure and services to the achievement of firm success. |
Yes |
Amazon is routinely sited as the most popular online shopping site. The main reason for this is that Amazon has been in this business more than any other businesses. |
Yes |
Ultimately, what the firm delivers to customers, its quality, is a direct function of the power of its infrastructure. |
Yes |
New information technologies have a powerful impact on business and IT strategies, as well as the services that can be provided to customers. |
b. this information system is based on the inventory management system. The inventory management system is being used to calculate the product details accurately (Reix et al 2016). As the table contains product description thus it is stated as the information system is following inventory management system.
5. Yes information
Yes research
Yes analysis
Yes data
Yes input
Yes technology
Yes organization
Yes output
Yes management
Yes processing
b. The type of information used in the diagram is payroll payment system. This is being used to manage and analyse the payments within the organization. This is also used to check the employee details and this helps in mainlining the government documents (Dobbs 2014). The organization level in which this system is used is the management level.
IS Type |
Justification |
Organization level |
Transaction processing system |
Transaction is taking place within the payroll payment system |
Technical level |
Management information system |
The whole payroll payment system is based on management information system as the information’s are being managed in these level. |
Management level |
6.
Your order of choices of information systems |
justifications |
Inventory management system |
This will help in defining the products |
Payroll management system |
For managing the payroll |
Artificial intelligence techniques in business |
This will help the organization to manage things quickly |
Decision support system |
This will help in taking right decision on time |
a. With the implementation of information system the sharing capability of the organisation has increased (Zhao, et al 2016). The information system helps in marinating database easily and in an organized manner. The main objectives offered by information system are operational excellence, flexibility, scalability and useful data. Moreover the information system helps in improving the efficiency and helps in achieving higher profitability (Kerzner and Kerzner 2017). With the implementation of new products, business models and services the information system allows the business to avail and launch innovative products. This helps in increasing the profit and also improves the relation between customer and supplier.
b. The three information system trends influencing business interact with employees, customers, suppliers and business with employees, customers, suppliers and also includes business partners. With the help of internet and World Wide Web the components of information system can be used in a better way. With the help of information system one can store and manage a data more properly (Mathooko and Ogutu 2015).
c. The six strategic business objectives are as follows:
d. With the implementation of UPS, the sustainability benefit offered are:
e. Porter’s five forces is used to analyse the framework of UPS (Burns and Dewhurst 2016). The five forces of porters are as follows:
References
Burns, P. and Dewhurst, J. eds., 2016. Small business and entrepreneurship. Macmillan International Higher Education.
E. Dobbs, M., 2014. Guidelines for applying Porter’s five forces framework: a set of industry analysis templates. Competitiveness Review, 24(1), pp.32-45.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and strategies in managing information systems. Routledge.
Kerzner, H. and Kerzner, H.R., 2017. Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.
Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education India.
Mathooko, F.M. and Ogutu, M., 2015. Porter’s five competitive forces framework and other factors that influence the choice of response strategies adopted by public universities in Kenya. International Journal of Educational Management, 29(3), pp.334-354.
McPherson, R.A. and Pincus, M.R., 2017. Henry’s Clinical Diagnosis and Management by Laboratory Methods E-Book. Elsevier Health Sciences.
Miller, R.T. and Pessoa, S., 2016. Role and genre expectations in undergraduate case analysis in Information Systems. English for Specific Purposes, 44, pp.43-56.
Reix, R., Fallery, B., Kalika, M. and Rowe, F., 2016. Systèmes d’information et management. Vuibert.
Safa, M., Shahi, A., Haas, C.T., Fiander-McCann, D., Safa, M., Hipel, K. and MacGillivray, S., 2015. Competitive intelligence (CI) for evaluation of construction contractors. Automation in Construction, 59, pp.149-157.
Valacich, J. and Schneider, C., 2015. Information Systems Today: Managing in a Digital World Plus MyMISLab with Pearson eText–Access Card Package. Prentice Hall Press.
Zhao, Z.Y., Zuo, J., Wu, P.H., Yan, H. and Zillante, G., 2016. Competitiveness assessment of the biomass power generation industry in China: A five forces model study. Renewable Energy, 89, pp.144-153.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download