Wednesday, May 20, 2009

Finals Question #5



TOPIC: THE VIRTUAL OFFICE

1. Describe or define virtual office.

Virtual office is a workplace that is not based in one physical location but consists of employees working remotely by using information and communications technologies. A virtual office is characterized by the use of teleworkers, telecenters, mobile workers, hot-desking, and hoteling, and promotes the use of virtual teams. A virtual office can increase an organization's flexibility, cost effectiveness, and efficiency.


dictionary.bnet.com/definition/virtual+office.html

2. Distinguish virtual office from MIS.

Virtual office is a workplace that is not based in one physical location but consists of employees working remotely by using information and communications technologies while the (MIS) is a subset of the overall internal control of a business covering the application of people, documents, technologies, and procedures by management accountants to solving business problems such as costing a product, service or a business-wide strategy.

3. Illustrate (give examples) how virtual office can improve company's competitive advantage and organizational performance.


The virtual office can improve company's advantage and organizational performance through to achieve their business objectives, many companies are exploring varying degrees of virtuality or remote working (away from the office location), facilitated by technology. Managers have to decide when, where, and for whom such virtuality is appropriate to ensure that rewards are maximized for the staff and for the organization. This paper explores the challenges for managers in establishing virtual offices or teams. It suggests that successful virtual offices require more than just technology. They require radical new approaches to evaluating, educating, organizing and informing workers. The real challenge in maximizing the virtual experience lies in designing the organization structure and processes to achieve agreed goals.


Monday, May 18, 2009

Finals Question #4

TOPIC: THE DECISION SUPPORT SYSTEMS (DSS)


1. Describe or define DSS

Decision Support Systems
(DSS) are a specific class of computerized information systems that supports business and organizational decision-making activities. A properly-designed DSS is an interactive software-based system intended to help decision makers compile useful information from raw data, documents, personal knowledge, and/or business models to identify and solve problems and make decisions.

2. Distinguish DSS from MIS.

DSS is a problem solving tool used to address ad hoc and unexpected problems while the MIS is viewed as an IS infrastructure generates standard and exceptional reports and summaries
organized along functional areas developed by IS department


3. Illustrate (give examples) how DSS can improve company's competitive advantage and organizational performance.

DSS can be used to help a company better focus on a specific customer segment and hence gain an advantage in meeting that segment’s needs. MIS and DSS can help track customers and DSS can make it easier to serve a specialized customer group with special services. Some customers won’t pay a premium for targeted service or larger competitors also target specialized niches using their own DSS. A sustainable competitive advantage is achieved by developing existing resources and creating new resources and capabilities in response to changing market conditions.


]dssresources.com/faq/index.php?action=artikel&id=84 dssresources.com/faq/index.php?action=artikel&id=84

Finals Question #3


Identify and describe one company that adopts an MIS. Include in your discussion, how MIS helps and supports the company, its managers and other employees, in their problem solving and decision-making.


Offshore company

The offshore company is of major importance to their clients, and as experienced company incorporation professionals we have designed their service to reflect that.
They provide clients with their full expert assistance throughout every step of the formation process, however thier service does not stop there. They will give you any assistance or advice from the moment you choose to incorporate the company and as for long after incorporation as you require.

They will advise you on which jurisdiction is best for you and if neccessary provide nominees and help you open a bank account.

The MIS helps and support the offshore company or managers are easy to find other data and through of MIS they can find an idea how to promote their product. Through of that they can easy to find the solution about their problem or to make a good decision making.

http://www.fletcherkennedy.com/offshore-company.html

Wednesday, May 13, 2009

Tuesday, May 12, 2009

Finals Question #2



A company may adopt specific computerized database system according to their unique needs after thorough MIS planning. However, it has to be noted that MIS if properly planned, and implemented, benefits can be immeasurable on the other hand, if this is misused, then it may mean information or financial losses and opportunity and resources wasted.From this, answer the following.


1.0.a Research one international company from the Internet and describe their MIS strategic plan in 1-2 paragraphs.

Tradequest International (PINKSHEETS: TRDQ) doing business as IP1 Network, Corp., is pleased to report that it is on track and progressing as expected and plans to begin generating revenues after lighting its telecommunications network.

The network topology was built to ensure 100% redundancy for all network elements with some of the world's best domestic and foreign routes. Additionally, the network backbone and high quality IP based communication services essentially turn each of our partners into a fully functional IP based communications company overnight and allows them to offer a turn-key spectrum of telephony services solutions to their end users at competitive prices,"




http://www.ip1network.com/




1.0.b Discuss too the impact of this strategic plan on the company's management,competitors, customers and the company as a whole.

The impact of that strategic plan on the company is the partners know their local market better than anyone else because they provide the tools, infrastructure and technical support; they just concentrate on sales and service.Customer and Partner satisfaction. Their systems are user friendly; they are branded by the Partner and with technicians available to assist and the Quality of their business is very effective to the people because they are fully redundant in their network infrastructure with worldwide.

2.0.a Evaluate how can this strategic plan be applied to any local company in the Philippines.
2.0.b Discuss too the possible effect on the company.

The possible effect of this strategic plan on the company is the company will have an opportunity to develop a strong brand or enhance an existing brand.

3.0.a What is an Accounting Information System?

An accounting information system (AIS) is the system of records a business keeps to maintain its accounting system. This includes the purchase, sales, and other financial processes of the business. The purpose of an AIS is to accumulate data and provide decision makers (investors, creditors, and managers) with information.
http://en.wikipedia.org/wiki/Accounting_information_sys...

3.0.b Identify or list down different accounting information systems used.


  • An electronic health record (EHR) refers to an individual patient's medical record in digital format. Electronic health record systems co-ordinate the storage and retrieval of individual records with the aid of computers.


  • Electronic Data Interchange (EDI) refers to the structured transmission of data between organizations by electronic means. It is used to transfer electronic documents from one computer system to another (ie) from one trading partner to another trading partner.



  • Law[4] is a system of rules, usually enforced through a set of institutions.[5] It shapes politics, economics and society in numerous ways and serves as a primary social mediator in relations between people.

  • High-definition television (or HDTV) is a digital television broadcasting system with higher resolution than traditional television systems (standard-definition TV, or SDTV). HDTV is digitally broadcast; the earliest implementations used analog broadcasting, but today digital television (DTV) signals are used, requiring less bandwidth due to digital video compression.

  • Electronic mail—often abbreviated as e-mail or email—is a method of exchanging digital messages, designed primarily for human use. A message at least consists of its content, an author address and one or more recipient addresses.
  • Enterprise content management (ECM) refers to the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists
  • Double-Entry Bookkeeping is a system that ensures the integrity of the financial values recorded in a financial accounting system. It does this by ensuring that each individual transaction is recorded in at least two different (sections) nominal ledgers of the financial accounting system and so implementing a double checking system for every transaction.


http://en.wikipedia.org/wiki/Accounting_information_sys...



3.0.c What are the benefits by the management, users and customers derived from these AIS?


  • DIntegration among different functional areas to ensure proper communication, productivity and efficiency
  • Design engineering (how to best make the product)
    Order tracking, from acceptance through fulfillment
  • The revenue cycle, from invoice through cash receipt
  • Managing inter-dependencies of complex processes bill of materials
  • tracking the three-way match between purchase orders (what was ordered), inventory receipts (what arrived), and costing (what the vendor invoiced)
    The
    accounting for all of these tasks: tracking the revenue, cost and profit at a granular level.
http://www.ip1network.com/



3.0.d Cite any threat or misuse of these AIS by a specific company. How were the threats addressed? What were the damages?

AIS THREATS

When planning a security program, the AIS technical manager should be aware of all the types of threats that may be encountered. Not every Navy AIS facility will be faced with each type of threat, especially if the facility is aboard ship. The impact of a given threat may depend on the geographical location of the AIS facility (earthquakes), the local environment (flooding), and potential value of property or data to a thief, or the perceived importance of the facility to activists and demonstrators or subversives. Examples of natural and unnatural threats include:



  • Unauthorized access by persons to specific areas and equipment for such purposes as theft, arson, vandalism, tampering, circumventing of internal controls, or improper physical access to information;


  • AIS hardware failures;


  • Failure of supporting utilities, including electric power, air conditioning, communications circuits, elevators, and mail conveyors;


  • Natural disasters, including floods, windstorms, fires, and earthquakes;


  • Accidents causing the nonavailability of key personnel;


  • Neighboring hazards, such as close proximity to chemical or explosive operations, airports, and high crime areas;


  • Tampering with input, programs, and data; and

  • The compromise of data through interception of acoustical or electromagnetic emanations from AIS hardware.

www.tpub.com/content/istts/14222/css/14222_102.htm




Sunday, May 10, 2009

Finals Question#1


1.For those who are working, interview your IT in-charge and ask him/her to describe the computer database systems used in the company. Write your answer in 1-2 paragraphs.



The Jonah Group

The Jonah Group is a team of software experts skilled in the design, construction, and management of web-based enterprise systems and business intelligence solutions.


Jonah has successfully developed and deployed a wide range of enterprise systems including online banking applications, equity and mutual fund trading systems, credit adjudication and provisioning portals, health care benefits and claims management systems, and fleet management solutions. Jonah clientele includes many leading names in the financial services and health care industries.



2.Further, ask also the benefits and/or disadvantages derived from these database systems.For those who are not working, research one company in the net who is using computerized database systems. Describe the use and/or nature of these systems and describe too the benefits/disadvantages from these systems. Include your reference.


  • Record for on-time, on-budget delivery is unparalleled in industry

  • Well-documented software development methodology

  • The core value of Jonah methodology is to be “as agile as you can be”

  • Jonah assembles development teams as a whole, not as a list of capabilities

  • The Jonah Group has a distinct “culture of delivery”, which puts it a unique position for success

  • Extensive distributed and large-scale software systems experience.
    Clients: • Algorithmics • Blue Care Network • Canadian Imperial Bank of Commerce • Large Health Insurance Client • Route One • Blue Cross Blue Shield of Michigan • Toronto Regional Conservation Authority • Ontario Ministry of Government Services

Tuesday, May 5, 2009

Midterm Question #3

Tuesday, May 5, 2009


Internet if properly maximized can be used as a medium to the advantage of the company. However, risks and threats are there. Thus, research the following:



1. Identify the possible risks and threats (eg. virus) that can potentially attack a company with internet connection.

Although you’ve gathered a considerable amount of data to this point, you will need to analyze this information to determine the probability of a risk occurring, what is affected, and the costs involved with each risk. Assets will have different risks associated with them, and you will need to correlate different risks with each of the assets inventoried in a company. Some risks will impact all of the assets of a company, such as the risk of a massive fire destroying a building and everything in it, while in other cases; groups of assets will be affected by specific risks.


Assets of a company will generally have multiple risks associated with them. Equipment failure, theft, or misuse can affect hardware, while viruses, upgrade problems, or bugs in the code may affect software. By looking at the weight of importance associated with each asset, you should then prioritize which assets will be analyzed first, and then determine what risks are associated with each.



The option is to do nothing about the potential threat, and live with the consequences (if they occur). This happens more often than you’d expect, especially when you consider that security is a tradeoff. For every security measure put in place, it makes it more difficult to access resources and requires more steps for people to do their jobs. A company may have broadband Internet connectivity through a T1 line for employees working from computers inside the company, and live with the risk that they may download malicious programs. While this is only one possible situation where a company will live with a potential threat (and gamble that it stays “potential” only), it does show that in some situations, it is preferable to have the threat rather than to lose a particular service.

www.windowsecurity.com/articles/Risk_Assessment_and_Threat_Identification.html - 45k -


2. Case research and analysis:



2.a Identify one company that had experienced an attacked from the internet.

Global Crossing--Hannan's company

2.b Describe the attack.



While the biggest hacker attack in Web history loomed like a tsunami on the virtual horizon last Monday, Alan Hannan was looking for nothing more dangerous than soda and cookies in a San Jose, Calif., hotel lobby. Like hundreds of techies who help keep the backbone of the Internet properly aligned, Hannan had spent the morning at the North American Network Operators' Group conference listening to a talk on something called denial-of-service (DOS) attacks. "I thought I knew about them well enough," says Hannan. "I didn't pay much attention. I wish I had."



2.c Identify the damages done and the solutions adopted to reverse the damages and to protect the company from future threats.


Although neither man knew it yet, the Web's most popular portal was being bombarded with enough confusing information to cause the digital equivalent of a nervous breakdown. Normally, Yahoo absorbs a couple hundred million bits of data each second, meaning it can handle millions of Yahoo users asking simultaneously for, say, the lowdown on Ricky Martin without breaking much of a sweat. But now Yahoo's Internet service provider, Global Crossing--Hannan's company--was clogging up with as many as 1 billion bits a second.


But it was the type of information that did the most damage. This was no Ricky Martin request. It was millions of phantom users suddenly screaming "Yes, I heard you!"--which was very unusual since Yahoo hadn't said anything. Worse, the phantoms had all given Yahoo fake return addresses. Yahoo got so hung up trying to get back to them all, it couldn't get around to dishing up those Ricky links to regular users. Service, in other words, was denied. Visitors to Yahoo saw an empty screen.


Hannan and his team zipped back to Global Crossing's HQ. In an hour they figured out they were under a DOS attack. It took another couple hours of monitoring their $500,000 routing machines to figure out which one was being attacked and to install the kind of filters that would scare the phantoms away. It wasn't brain surgery. Kids make DOS attacks all the time. But when the engineers saw the size of the barrage--10 times as large as anything ever recorded--they gasped. "We all agreed," says Hannan, "that we had a very formidable opponent."
The next three days were marked by serial slowdowns at some of the biggest sites on the Web: Amazon.com, eBay, (owned by Time Warner, parent company of TIME), ZDNet, ETrade, Excite. Like so many virtual vandals before him, the phantom foe clearly craved attention. He got it in the shape of a front-page media frenzy, a full-scale FBI investigation and a hastily convened White House conference on Web hacking. And yet he stubbornly refused to show up at his own party, prompting PC paranoia and all manner of conspiracy theories.
So why do it if you're not going to brag about it? Some saw an economic motive or a Quixotic tilt at the commercialization of the Internet. After all, our phantom had managed to interrupt one of Wall Street's sacred rituals: the dotcom IPO of , which was hit by a DOS attack on Tuesday afternoon, before the end of its first day as a publicly traded company. The stock had reached a peak of $30.25, then closed at an unspectacular $25.12. Just when chief executive Gregory Hawkins should have been popping champagne corks, he was hunkering down in an emergency session with his techies. "I'm not going to kid you," says Hawkins. "My stomach did drop." That sinking-stock feeling spread the next day as the hack attack contributed to a market-wide sell-off.


Even more surprising than Wall Street's reaction was how much the hackers had done with so little. The kind of software used for the attack is practically public property. You can download it in the form of programs, or scripts, like Trin00, Tribal Flood Network or the nightmarish-sounding Stacheldraht (German for barbed wire). Each program can accept a kind of plug-in to make it even more adaptable, with names like Stream, Spank or Raped. "These tools have been out there for years," says Emmanuel Goldstein, editor of the hacker journal 2600. "Hackers have known about these for years. They haven't done anything about it. To me, that shows great respect and restraint."


It was hard to find a hacker last week who wasn't in full sneer about the so-called script kiddies--newcomers who would dare commit such ignoble attacks with prefab software. "A lot of us hackers feel insulted, because it's a no-brainer," says Val Koseroski, 32, a self-confessed "old-school" hacker with a wife, a child and a mortgage. "When I was growing up, hacking was about learning how a computer operates. You always tried to push it to the edge. Kids these days, they just want to do any damage they can."


But this was not mere vandalism either; too much planning had gone into it. Phase 1 took place as early as last year. The culprit first scanned the Internet for vulnerable networks to use as unwitting allies in the final attack. Small businesses and universities, where security is often more lax, are prime targets. Both Stanford and the University of California at Santa Barbara had been co-opted. A UCSB computer participated in the CNN website attack. Even the Navy's computers may have been enlisted as unwilling dupes.


www.time.com/time/magazine/article/0,9171,39177-1,00.html
Blog Question #2

1. Research one Philippine company and international company that have employed e-commerce.

-PLDT

2. Describe how e-commerce operates in these companies.


-Philippine e-commerce has grown rapidly in recent years. Scores of businesses now operate their own websites or use the Internet for customer and supply-chain transactions.



3. Identify the benefits/constraints/desired/by these companies from e-commerce.

-They are the leading national telecommunications service provider in the Philippines. Through
our three principal business groups — wireless, fixed line, and information and communications
technology — they offer a wide range of telecommunications services to approximately 26 million
subscribers in the Philippines across the nation's most extensive fiber optic backbone and fixed line,
cellular and satellite networks.


www.pldt.com/NR/rdonlyres/DAFE2C8E-7662-47A6-9917-A1F0A178C0EA/8749/PLDT2006Form17A.pdf