HND商务通讯ICT.docx

上传人:scccc 文档编号:13629282 上传时间:2022-01-20 格式:DOCX 页数:9 大小:33.13KB
返回 下载 相关 举报
HND商务通讯ICT.docx_第1页
第1页 / 共9页
HND商务通讯ICT.docx_第2页
第2页 / 共9页
HND商务通讯ICT.docx_第3页
第3页 / 共9页
HND商务通讯ICT.docx_第4页
第4页 / 共9页
HND商务通讯ICT.docx_第5页
第5页 / 共9页
点击查看更多>>
资源描述

《HND商务通讯ICT.docx》由会员分享,可在线阅读,更多相关《HND商务通讯ICT.docx(9页珍藏版)》请在三一文库上搜索。

1、1.0 The nature of the informationThis picture shows that different levels (Strategic, Tactical, Operational) have manydifferences on content, responsbility, aims about information and so on.Strategic managers is the most senior managements the organization. These managers are involved in the formula

2、tion of strategies, and theTactical manager is the middle managers, which are responsible for ensuring that the goals of strategic managementare achieved. Operational managers are the first line of managementresponsible for the day-to-day running of each department.Strategic managers is the most sen

3、ior managements the organization, they develop long-term planning and development policies and strategies. They use their own judgment to make a complex decision, the wide range of information, external information and more internal, this level isalways dealing with unstructured issues. In the outsi

4、de, they are subject to policy, the international situation, the impact of industry competition, in the internal, they are subject to market research reports, the impact of productivity.Tactical manager is responsible for the medium-term planning, and sometimes they are responsible for the budget co

5、ntrol, monitoring, develop business policies / objectives, access to resources, to solve the problem, and develop new methods. They have more internal, less external, they decided to affect some people, but not all of the companies. They should follow the facts and statistics of the statistics or hi

6、storical information, and rely on their own judgment, the decision of the tactical management is likely to be a semi structured.Operational Manager are responsible for somebasic problems, such as regular activities, monitoring, ensuring the effective use of resources, staffing levels, but also to so

7、lve structural optimization problems.Operational managers consider internal factors: supplier and training information. External factors: attendance, vacation, equipment.2.0 Information SystemStrategicESSExecutive Support System (ESS) is a reporting tool which allows to turn organization s data into

8、 useful summarized reports. These reports are generally used by executive level managers for quick access to reports coming from all company levels and departments such as billing, cost accounting, staffing scheduling, and more. It is easy to use, and it rely on mathematical modeling, It provide inf

9、ormation in a summarized format.ESSoften helps the companys strategic managementassessment report to the Department quickly. It provides a flow of information. It helps managers to quickly make plans by providing information about it. ESS centralized or decentralized base, which can provide all leve

10、ls of valuable information management to the company.TacticalMISManagement Information System (MIS) provides information that organizations require to managethemselves efficiently and effectively. It collects and presents management information to a business in order to facilitate its control. Manag

11、ement information system involve four primary resources: EDPS, analysis , decision making , and database.MIS can help level tactical planning, organization, command, coordination and control. It can reduce the risk and uncertainty of decision making. Managementinformation systems can help makesome s

12、ales decisions, such as targeted market segmentation should be, or someproduct decisions, in most cases, a decision is required, because it can help managers to solve specific problems.OperationalTPSTransaction processing is a style of computing that divides work into individual, indivisible operati

13、ons, called transactions. A Transaction Processing System (TPS) or transaction server is a software system, or software/hardware combination, that supports transactionprocessing.Transaction processing system consist of computer hardware and software hosting a transaction-oriented application that pe

14、rforms the routinetransactions necessary to conduct business.TPScan help companies solve business decisions. It can meet the needs of daily information, such as sales, inventory and payment. Collect the information from TPS, and the company can produce more profit for the companys products.3.0 The i

15、mplications of current legislation for decision makingThe Data Protection Act1998 Data Protection Act (DPA) is the act of the United Kingdom Parliament on the right of the United Kingdom of Great Britain and Northern Ireland to define the identity of the United Kingdom of law on the identity of the

16、living person data processing. In Britain, it is the main regulations for the protection of personal data. Although the bill itself does not mention the privacy, it is through the British law into the EU data protection directive 1995, the Directive requires Member States to protect the basic rights

17、 and freedoms, in particular their privacy, personal data processing.The billwill be the United Kingdoms law is defined as theidentification of biological data processing. Government procurement and personal or corporate information, must comply with the laws and procedures of data protection, and t

18、o minimize duplication of collection. Data protection law requires that Member States to protect the basic rights and freedoms of the people, in particular the right to privacy of personal data processing. In order to ensure the legitimacy of the collected information, the purpose and the scientific

19、 process of collecting legitimacy is collected.Example, Crown Catering Services company should use this behavior.It can better protect the enterprise data and information, reduce enterprise risk. For example, the establishment of the companydatabase. Different levels of staff through different infor

20、mation to obtain data, thus facilitating the data content of the correctness, data integrity and accuracy.Computer Misuse ActThe Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom,The Act has nonetheless become a model from which several other countries, including Canada and

21、the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws.The Act introduced three criminal offences:Unauthorised access to computer access with intent to commit or facilitate commission of further modification of computer material.Example, Crown

22、Catering Services company should use the Computer Misuse Act. Companies must take adequate security measures to prevent unauthorized access. For example, the company can train the staff of the management, and set a password for the computer. It can help companies to better protect and develop their

23、own security.4.0 data communication systemsA local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media. The defining characteristics of LANs, in contrast to wide area networks

24、 (WANs), include their smaller geographic area, and non-inclusion of leased telecommunication lines.A wide area network (WAN) is a network that covers a broad area ., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommu

25、nication lines. (Ban Wei, 2002 year) Business and government entities utilize WANs to relay data amongemployees, clients, buyers, and suppliers from various geographical locations. In essence, this modeof telecommunication allows a business to effectively carry out its daily function regardless of l

26、ocation. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite(TCP/IP) to link several bi

27、llion devices worldwide. It is an international network of networks that consists of millions of private, public, academic, business, and government packet switched networks, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range

28、 of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW),the infrastructure to support email, and peer-to-peer networks for file sharing and telephony.The local area network is a limited distance within the network usually with

29、in a geographic location. Wide area network is a large-scale network, which can be controlled and shared resources. It is bigger thana local area network. Internet is global, the most extensive. It can obtain a large amount of informationresources, to understand the market demandsurvey. Three data c

30、ommunication system has its own advantages, so it should be combined with each other, the development of enterprises will be better.5.0 Benefits of data communication systemsLocal Area NetworkThrough the sharing of software and hardware, local area network can reduce the cost. Therefore, companies c

31、an share resources, such as printers, to save costs. Secondly, the local area network provides an opportunity to communicate with others, which means that the manager can communicate with the local area network more easily. Third, local area network allows companies to set permissions, so different

32、levels of management can share different information and files.Wide Area NetworkWANis more convenient, when a company needs a long distance communication. Wide area network transmission speed is good, the transmission of large amounts of data. and transmission range is wider .It can help companies s

33、olve the problem of remote communication and management. In addition, the wide area network can save time and money.InternetThe Internet provides a wealth of information resources and services. The Internet can help companies advertise, so as to enhance the companys reputation.6.0 Three ThreatsHacke

34、rsComputer hacker is a computer system which is obtained from the unauthorized access. These hackers enter the system and other reasons to test their computer skills, in some way or cause damage to the system effectiveness. Hackers are usually trying to access access through telecommunications links

35、. Traditionally, hackers have referred to the process of writing code, hackers are skilled computer programmers.Crown Catering Services enterprises should set up different system permissions and install security software. The company may require professional processing system vulnerabilities.VirusCo

36、mputer virus is an artificial program or code segment. But these codes have an unexpected negative impact. It will result in the loss of data, create additional file copy, delete files from hard disk and disable system, and destroy data. Computer viruses are ubiquitous, they are usually downloaded f

37、rom the Internet or via email and they can self replicate.Crowncatering service enterprises to hire network security engineers, and set up a firewall to prevent virus intrusion.Data theftData theft is a mistake and accident caused by human error. This is an increasingly serious phenomenonmainly caus

38、ed by system administrators and office staff access technology such as database servers, and some people can not evaluate their information needs, their emotions will affect performance.Crown catering service enterprises should be rented in the interior of the security and the installation of camera

39、s, so as to better avoid the threat of thieves.7.0 ICT innovationsWi-FiWi-Fi is a wireless local area network technology, which allows the electronic device network, which is mainly used in the MHz (12 cm) and 5 MHz(6 cm) ISM SHFradio frequency band. Onthe one hand, Wi-Fi can help managers and emplo

40、yees to transfer information and decision-making. For example, managers and employees can use Wi-Fi to attend a meeting to discuss the introduction of new products or do performance evaluation.On the other hand, Wi-Fi can provide better service to customers. Customers can connect to the Internet thr

41、ough Wi-Fi, watching movies or browse the title. At present, each public service activityplace providesWi-Fi services. If there is no Wi-Fi service, the company will lose part of the competitiveness.BroadbandBroadband is a high-bandwidth Internet connection, the use of ADSL (Asymmetric Digital Subsc

42、riber Line) to send or download information. Broadband can be connected through telephone lines, cables, modems, and wireless networks. Broadband can be used for video conferencing, it is necessary to. It can help entire firm to access the Internet faster and more easily. A large number of graphics,

43、 images and video can be through broadband. In one word, broadband can save time and money, it is faster, and promotes greater productivity within the organization.Shopping CartA shopping cart is similar to a visit to the supernarket,the difference being that you are able to go shopping online witho

44、ut leavingthe office or you cart software allows you to implement your onlinestorefront on the Internet,The software keeps a record of what users have ordered and allows them to add or remove items from a virtual shoppingcartWhen visitors decide to make a purchase,information including thebuyers name,address and billing instruction is emailed to the sitewebmaster and a receipt is send cart saves time, but also helps to reduce spending, shopping cart will provide a better experience for customers.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 社会民生


经营许可证编号:宁ICP备18001539号-1