Wednesday, May 20, 2009

Finals Question #5



TOPIC: THE VIRTUAL OFFICE

1. Describe or define virtual office.

Virtual office is a workplace that is not based in one physical location but consists of employees working remotely by using information and communications technologies. A virtual office is characterized by the use of teleworkers, telecenters, mobile workers, hot-desking, and hoteling, and promotes the use of virtual teams. A virtual office can increase an organization's flexibility, cost effectiveness, and efficiency.


dictionary.bnet.com/definition/virtual+office.html

2. Distinguish virtual office from MIS.

Virtual office is a workplace that is not based in one physical location but consists of employees working remotely by using information and communications technologies while the (MIS) is a subset of the overall internal control of a business covering the application of people, documents, technologies, and procedures by management accountants to solving business problems such as costing a product, service or a business-wide strategy.

3. Illustrate (give examples) how virtual office can improve company's competitive advantage and organizational performance.


The virtual office can improve company's advantage and organizational performance through to achieve their business objectives, many companies are exploring varying degrees of virtuality or remote working (away from the office location), facilitated by technology. Managers have to decide when, where, and for whom such virtuality is appropriate to ensure that rewards are maximized for the staff and for the organization. This paper explores the challenges for managers in establishing virtual offices or teams. It suggests that successful virtual offices require more than just technology. They require radical new approaches to evaluating, educating, organizing and informing workers. The real challenge in maximizing the virtual experience lies in designing the organization structure and processes to achieve agreed goals.


Monday, May 18, 2009

Finals Question #4

TOPIC: THE DECISION SUPPORT SYSTEMS (DSS)


1. Describe or define DSS

Decision Support Systems
(DSS) are a specific class of computerized information systems that supports business and organizational decision-making activities. A properly-designed DSS is an interactive software-based system intended to help decision makers compile useful information from raw data, documents, personal knowledge, and/or business models to identify and solve problems and make decisions.

2. Distinguish DSS from MIS.

DSS is a problem solving tool used to address ad hoc and unexpected problems while the MIS is viewed as an IS infrastructure generates standard and exceptional reports and summaries
organized along functional areas developed by IS department


3. Illustrate (give examples) how DSS can improve company's competitive advantage and organizational performance.

DSS can be used to help a company better focus on a specific customer segment and hence gain an advantage in meeting that segment’s needs. MIS and DSS can help track customers and DSS can make it easier to serve a specialized customer group with special services. Some customers won’t pay a premium for targeted service or larger competitors also target specialized niches using their own DSS. A sustainable competitive advantage is achieved by developing existing resources and creating new resources and capabilities in response to changing market conditions.


]dssresources.com/faq/index.php?action=artikel&id=84 dssresources.com/faq/index.php?action=artikel&id=84

Finals Question #3


Identify and describe one company that adopts an MIS. Include in your discussion, how MIS helps and supports the company, its managers and other employees, in their problem solving and decision-making.


Offshore company

The offshore company is of major importance to their clients, and as experienced company incorporation professionals we have designed their service to reflect that.
They provide clients with their full expert assistance throughout every step of the formation process, however thier service does not stop there. They will give you any assistance or advice from the moment you choose to incorporate the company and as for long after incorporation as you require.

They will advise you on which jurisdiction is best for you and if neccessary provide nominees and help you open a bank account.

The MIS helps and support the offshore company or managers are easy to find other data and through of MIS they can find an idea how to promote their product. Through of that they can easy to find the solution about their problem or to make a good decision making.

http://www.fletcherkennedy.com/offshore-company.html

Wednesday, May 13, 2009

Tuesday, May 12, 2009

Finals Question #2



A company may adopt specific computerized database system according to their unique needs after thorough MIS planning. However, it has to be noted that MIS if properly planned, and implemented, benefits can be immeasurable on the other hand, if this is misused, then it may mean information or financial losses and opportunity and resources wasted.From this, answer the following.


1.0.a Research one international company from the Internet and describe their MIS strategic plan in 1-2 paragraphs.

Tradequest International (PINKSHEETS: TRDQ) doing business as IP1 Network, Corp., is pleased to report that it is on track and progressing as expected and plans to begin generating revenues after lighting its telecommunications network.

The network topology was built to ensure 100% redundancy for all network elements with some of the world's best domestic and foreign routes. Additionally, the network backbone and high quality IP based communication services essentially turn each of our partners into a fully functional IP based communications company overnight and allows them to offer a turn-key spectrum of telephony services solutions to their end users at competitive prices,"




http://www.ip1network.com/




1.0.b Discuss too the impact of this strategic plan on the company's management,competitors, customers and the company as a whole.

The impact of that strategic plan on the company is the partners know their local market better than anyone else because they provide the tools, infrastructure and technical support; they just concentrate on sales and service.Customer and Partner satisfaction. Their systems are user friendly; they are branded by the Partner and with technicians available to assist and the Quality of their business is very effective to the people because they are fully redundant in their network infrastructure with worldwide.

2.0.a Evaluate how can this strategic plan be applied to any local company in the Philippines.
2.0.b Discuss too the possible effect on the company.

The possible effect of this strategic plan on the company is the company will have an opportunity to develop a strong brand or enhance an existing brand.

3.0.a What is an Accounting Information System?

An accounting information system (AIS) is the system of records a business keeps to maintain its accounting system. This includes the purchase, sales, and other financial processes of the business. The purpose of an AIS is to accumulate data and provide decision makers (investors, creditors, and managers) with information.
http://en.wikipedia.org/wiki/Accounting_information_sys...

3.0.b Identify or list down different accounting information systems used.


  • An electronic health record (EHR) refers to an individual patient's medical record in digital format. Electronic health record systems co-ordinate the storage and retrieval of individual records with the aid of computers.


  • Electronic Data Interchange (EDI) refers to the structured transmission of data between organizations by electronic means. It is used to transfer electronic documents from one computer system to another (ie) from one trading partner to another trading partner.



  • Law[4] is a system of rules, usually enforced through a set of institutions.[5] It shapes politics, economics and society in numerous ways and serves as a primary social mediator in relations between people.

  • High-definition television (or HDTV) is a digital television broadcasting system with higher resolution than traditional television systems (standard-definition TV, or SDTV). HDTV is digitally broadcast; the earliest implementations used analog broadcasting, but today digital television (DTV) signals are used, requiring less bandwidth due to digital video compression.

  • Electronic mail—often abbreviated as e-mail or email—is a method of exchanging digital messages, designed primarily for human use. A message at least consists of its content, an author address and one or more recipient addresses.
  • Enterprise content management (ECM) refers to the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists
  • Double-Entry Bookkeeping is a system that ensures the integrity of the financial values recorded in a financial accounting system. It does this by ensuring that each individual transaction is recorded in at least two different (sections) nominal ledgers of the financial accounting system and so implementing a double checking system for every transaction.


http://en.wikipedia.org/wiki/Accounting_information_sys...



3.0.c What are the benefits by the management, users and customers derived from these AIS?


  • DIntegration among different functional areas to ensure proper communication, productivity and efficiency
  • Design engineering (how to best make the product)
    Order tracking, from acceptance through fulfillment
  • The revenue cycle, from invoice through cash receipt
  • Managing inter-dependencies of complex processes bill of materials
  • tracking the three-way match between purchase orders (what was ordered), inventory receipts (what arrived), and costing (what the vendor invoiced)
    The
    accounting for all of these tasks: tracking the revenue, cost and profit at a granular level.
http://www.ip1network.com/



3.0.d Cite any threat or misuse of these AIS by a specific company. How were the threats addressed? What were the damages?

AIS THREATS

When planning a security program, the AIS technical manager should be aware of all the types of threats that may be encountered. Not every Navy AIS facility will be faced with each type of threat, especially if the facility is aboard ship. The impact of a given threat may depend on the geographical location of the AIS facility (earthquakes), the local environment (flooding), and potential value of property or data to a thief, or the perceived importance of the facility to activists and demonstrators or subversives. Examples of natural and unnatural threats include:



  • Unauthorized access by persons to specific areas and equipment for such purposes as theft, arson, vandalism, tampering, circumventing of internal controls, or improper physical access to information;


  • AIS hardware failures;


  • Failure of supporting utilities, including electric power, air conditioning, communications circuits, elevators, and mail conveyors;


  • Natural disasters, including floods, windstorms, fires, and earthquakes;


  • Accidents causing the nonavailability of key personnel;


  • Neighboring hazards, such as close proximity to chemical or explosive operations, airports, and high crime areas;


  • Tampering with input, programs, and data; and

  • The compromise of data through interception of acoustical or electromagnetic emanations from AIS hardware.

www.tpub.com/content/istts/14222/css/14222_102.htm




Sunday, May 10, 2009

Finals Question#1


1.For those who are working, interview your IT in-charge and ask him/her to describe the computer database systems used in the company. Write your answer in 1-2 paragraphs.



The Jonah Group

The Jonah Group is a team of software experts skilled in the design, construction, and management of web-based enterprise systems and business intelligence solutions.


Jonah has successfully developed and deployed a wide range of enterprise systems including online banking applications, equity and mutual fund trading systems, credit adjudication and provisioning portals, health care benefits and claims management systems, and fleet management solutions. Jonah clientele includes many leading names in the financial services and health care industries.



2.Further, ask also the benefits and/or disadvantages derived from these database systems.For those who are not working, research one company in the net who is using computerized database systems. Describe the use and/or nature of these systems and describe too the benefits/disadvantages from these systems. Include your reference.


  • Record for on-time, on-budget delivery is unparalleled in industry

  • Well-documented software development methodology

  • The core value of Jonah methodology is to be “as agile as you can be”

  • Jonah assembles development teams as a whole, not as a list of capabilities

  • The Jonah Group has a distinct “culture of delivery”, which puts it a unique position for success

  • Extensive distributed and large-scale software systems experience.
    Clients: • Algorithmics • Blue Care Network • Canadian Imperial Bank of Commerce • Large Health Insurance Client • Route One • Blue Cross Blue Shield of Michigan • Toronto Regional Conservation Authority • Ontario Ministry of Government Services

Tuesday, May 5, 2009

Midterm Question #3

Tuesday, May 5, 2009


Internet if properly maximized can be used as a medium to the advantage of the company. However, risks and threats are there. Thus, research the following:



1. Identify the possible risks and threats (eg. virus) that can potentially attack a company with internet connection.

Although you’ve gathered a considerable amount of data to this point, you will need to analyze this information to determine the probability of a risk occurring, what is affected, and the costs involved with each risk. Assets will have different risks associated with them, and you will need to correlate different risks with each of the assets inventoried in a company. Some risks will impact all of the assets of a company, such as the risk of a massive fire destroying a building and everything in it, while in other cases; groups of assets will be affected by specific risks.


Assets of a company will generally have multiple risks associated with them. Equipment failure, theft, or misuse can affect hardware, while viruses, upgrade problems, or bugs in the code may affect software. By looking at the weight of importance associated with each asset, you should then prioritize which assets will be analyzed first, and then determine what risks are associated with each.



The option is to do nothing about the potential threat, and live with the consequences (if they occur). This happens more often than you’d expect, especially when you consider that security is a tradeoff. For every security measure put in place, it makes it more difficult to access resources and requires more steps for people to do their jobs. A company may have broadband Internet connectivity through a T1 line for employees working from computers inside the company, and live with the risk that they may download malicious programs. While this is only one possible situation where a company will live with a potential threat (and gamble that it stays “potential” only), it does show that in some situations, it is preferable to have the threat rather than to lose a particular service.

www.windowsecurity.com/articles/Risk_Assessment_and_Threat_Identification.html - 45k -


2. Case research and analysis:



2.a Identify one company that had experienced an attacked from the internet.

Global Crossing--Hannan's company

2.b Describe the attack.



While the biggest hacker attack in Web history loomed like a tsunami on the virtual horizon last Monday, Alan Hannan was looking for nothing more dangerous than soda and cookies in a San Jose, Calif., hotel lobby. Like hundreds of techies who help keep the backbone of the Internet properly aligned, Hannan had spent the morning at the North American Network Operators' Group conference listening to a talk on something called denial-of-service (DOS) attacks. "I thought I knew about them well enough," says Hannan. "I didn't pay much attention. I wish I had."



2.c Identify the damages done and the solutions adopted to reverse the damages and to protect the company from future threats.


Although neither man knew it yet, the Web's most popular portal was being bombarded with enough confusing information to cause the digital equivalent of a nervous breakdown. Normally, Yahoo absorbs a couple hundred million bits of data each second, meaning it can handle millions of Yahoo users asking simultaneously for, say, the lowdown on Ricky Martin without breaking much of a sweat. But now Yahoo's Internet service provider, Global Crossing--Hannan's company--was clogging up with as many as 1 billion bits a second.


But it was the type of information that did the most damage. This was no Ricky Martin request. It was millions of phantom users suddenly screaming "Yes, I heard you!"--which was very unusual since Yahoo hadn't said anything. Worse, the phantoms had all given Yahoo fake return addresses. Yahoo got so hung up trying to get back to them all, it couldn't get around to dishing up those Ricky links to regular users. Service, in other words, was denied. Visitors to Yahoo saw an empty screen.


Hannan and his team zipped back to Global Crossing's HQ. In an hour they figured out they were under a DOS attack. It took another couple hours of monitoring their $500,000 routing machines to figure out which one was being attacked and to install the kind of filters that would scare the phantoms away. It wasn't brain surgery. Kids make DOS attacks all the time. But when the engineers saw the size of the barrage--10 times as large as anything ever recorded--they gasped. "We all agreed," says Hannan, "that we had a very formidable opponent."
The next three days were marked by serial slowdowns at some of the biggest sites on the Web: Amazon.com, eBay, (owned by Time Warner, parent company of TIME), ZDNet, ETrade, Excite. Like so many virtual vandals before him, the phantom foe clearly craved attention. He got it in the shape of a front-page media frenzy, a full-scale FBI investigation and a hastily convened White House conference on Web hacking. And yet he stubbornly refused to show up at his own party, prompting PC paranoia and all manner of conspiracy theories.
So why do it if you're not going to brag about it? Some saw an economic motive or a Quixotic tilt at the commercialization of the Internet. After all, our phantom had managed to interrupt one of Wall Street's sacred rituals: the dotcom IPO of , which was hit by a DOS attack on Tuesday afternoon, before the end of its first day as a publicly traded company. The stock had reached a peak of $30.25, then closed at an unspectacular $25.12. Just when chief executive Gregory Hawkins should have been popping champagne corks, he was hunkering down in an emergency session with his techies. "I'm not going to kid you," says Hawkins. "My stomach did drop." That sinking-stock feeling spread the next day as the hack attack contributed to a market-wide sell-off.


Even more surprising than Wall Street's reaction was how much the hackers had done with so little. The kind of software used for the attack is practically public property. You can download it in the form of programs, or scripts, like Trin00, Tribal Flood Network or the nightmarish-sounding Stacheldraht (German for barbed wire). Each program can accept a kind of plug-in to make it even more adaptable, with names like Stream, Spank or Raped. "These tools have been out there for years," says Emmanuel Goldstein, editor of the hacker journal 2600. "Hackers have known about these for years. They haven't done anything about it. To me, that shows great respect and restraint."


It was hard to find a hacker last week who wasn't in full sneer about the so-called script kiddies--newcomers who would dare commit such ignoble attacks with prefab software. "A lot of us hackers feel insulted, because it's a no-brainer," says Val Koseroski, 32, a self-confessed "old-school" hacker with a wife, a child and a mortgage. "When I was growing up, hacking was about learning how a computer operates. You always tried to push it to the edge. Kids these days, they just want to do any damage they can."


But this was not mere vandalism either; too much planning had gone into it. Phase 1 took place as early as last year. The culprit first scanned the Internet for vulnerable networks to use as unwitting allies in the final attack. Small businesses and universities, where security is often more lax, are prime targets. Both Stanford and the University of California at Santa Barbara had been co-opted. A UCSB computer participated in the CNN website attack. Even the Navy's computers may have been enlisted as unwilling dupes.


www.time.com/time/magazine/article/0,9171,39177-1,00.html
Blog Question #2

1. Research one Philippine company and international company that have employed e-commerce.

-PLDT

2. Describe how e-commerce operates in these companies.


-Philippine e-commerce has grown rapidly in recent years. Scores of businesses now operate their own websites or use the Internet for customer and supply-chain transactions.



3. Identify the benefits/constraints/desired/by these companies from e-commerce.

-They are the leading national telecommunications service provider in the Philippines. Through
our three principal business groups — wireless, fixed line, and information and communications
technology — they offer a wide range of telecommunications services to approximately 26 million
subscribers in the Philippines across the nation's most extensive fiber optic backbone and fixed line,
cellular and satellite networks.


www.pldt.com/NR/rdonlyres/DAFE2C8E-7662-47A6-9917-A1F0A178C0EA/8749/PLDT2006Form17A.pdf

Monday, April 27, 2009

Midterm Question #1

MNC's are complex organizations however, they dominate the worldwide market. Knowing the background and nature of MNC's, answer the following:


1. Identify the benefits and disadvantages of MNC's.

Benefits to Nations

Benefits of Multinational Investment :

To Host Nations :

  • Access to Foreign Capital
  • Development of Resources
  • Technology and Productivity Improvement
  • Management and Marketing Skills

To Host Governments :

  • Revenue and Taxation
  • Diplomatic and Economic Alliances

Benefits to Individuals

Multinational Benefits to Individuals :
  • Employment and Jobs
  • Skills and Education
  • Entreprenurial Opportunities
  • Consumer Products and Services
  • Modern Commercial Institutions



Disadvantages of MNC's

A.On the home country:

1.Loss of jobs.
2.Loss of tax revenue.
3.Flexibility of operation is reduced in a foreign political system and thus causes instability.
4.Competitive advantage of multinationals over domestic firms.

B.On the host country:

1.Remittance of dividends and profits that can result in a net outflow of capital
2.MNCs engage in anticompetitive activities such as formation of cartels and dumping..
3.MNCs offer higher wages to its employees in the host countries,which is much more than any other domestic firm.
4.Obsolete technology may be used in the host country.

wiki.answers.com/Q/What_are_disadvantages_of_multinational_corporations - 49k -

2. Identify one MNC company and describe its operation.

Business Monitor Online’s Company Intelligence Service features 149,000 fully researched senior executives at 55,000 leading multinational company sites located across Asia, Latin America, Europe, Africa and the Middle East. The Company Intelligence Service includes multinational company profiles and site networks; competitive intelligence covering sales volume, employee size, market share, ownership structure, foreign direct investment and project activity, and analysis of latest company developments. The service can be customised according to your geographic or sectoral requirements, and can be taken in conjunction with your choice of the Industry Services (see industry links to the left).

The Company Intelligence Service is used by business development teams, and by corporate analysts and strategists for benchmarking and competitive analysis. The end-user relies on data accuracy, which is why company profiles are systematically researched each year at source, by a combination of web, email and telephone validation. In addition, company updates and new company profiles and executive appointments are added to the database daily through continuous desk research.

http://www.businessmonitor.com/bmo/companydata/?gclid=CNOKz7btl5oCFRUupAodgFMG9w

3. Describe how the parent control/coordinates with its subsidiaries in other countries or region.

Answer:

FedEx Corporation

Today's FedEx is led by FedEx Corporation, which provides strategic direction and consolidated financial reporting for the operating companies that compete collectively under the FedEx name worldwide: FedEx Express, FedEx Ground, FedEx Freight, FedEx Office, FedEx Custom Critical, FedEx Trade Networks and FedEx Services.

Originally called FDX Corp., FedEx Corp. was formed in January 1998 with the acquisition of Caliber System Inc. Through this and future purchases, FedEx sought to build on the strength of its famous express delivery service and create a more diversified company that included a portfolio of different but related businesses. Caliber subsidiaries included RPS, a small-package ground service; Roberts Express, an expedited, exclusive-use shipping provider; Viking Freight, a regional, less-than-truckload (LTL) freight carrier serving the Western U.S.; Caribbean Transportation Services, a provider of airfreight forwarding between the U.S., Puerto Rico, the Dominican Republic and the Caribbean Islands; and Caliber Logistics and Caliber Technology, providers of integrated logistics and technology solutions. These companies, along with worldwide express shipping


4. How is IT maximized or used by this MNC?

Answer:


The growth of the multinational corporation (MNC) is one of the most revolutionary and controversial phenomena in the development of the world economy during this century. MNCs are business firms that own or control production in more than one country. In practice, the largest MNCs orchestrate an ensemble of investments scattered across dozens of countries. Tied together by a vast communications web, these firms match various corporate functions, such as research and development, production, and marketing, with locales around the globe that feature the right mix of necessary ingredients, whether these be the skills and wage rates of local labor, the tax and regulatory policies of governments, the availability of needed infrastructure, or the supply of natural resources. The sheer size of many MNCs, combined with their economic efficiency and international mobility, not only provides such firms with a key place in the world economy, but also endows them with considerable political power and influence.

In recent decades, MNCs have expanded in numbers, size, and economic clout. Between 1980 and 1997, global foreign direct investment grew at an annual rate of 13%, compared with 7% per year for exports. In 1999, total FDI outflows from developed countries reached $595 billion. The number of firms worldwide that engage in FDI has more than tripled over the past three decades. By 1997, 54,000 parent MNCs controlled 449,000 foreign affiliates around the world representing an overall investment valued at $3.4 trillion. The worldís two hundred largest corporations now account for more than 25 percent of all global economic activity. U.S. MNCs earn twice as much in revenue from manufacturing operations abroad as from exports. Indeed, one third of all world trade takes place on an intrafirm basisóamong different units of the same global company. The yearly sales of the largest MNCs dwarf the annual GNPs of a vast majority of Third World countries and the annual sales of the world's largest MNCs exceed the combined national incomes of 182 countries. Among the 200 largest MNCs, 62 are based in Japan, 53 in the United States and 23 in Germany. Only two of the top 200 are headquartered in the developing world.

5. What were the weaknesses/problems encountered by this MNC from its environment and global setup?

Answer:

A corporation that has its facilities and other assets in at least one country other than its home country. Such companies have offices and/or factories in different countries and usually have a centralized head office where they co-ordinate global management. Very large multinationals have budgets that exceed those of many small countries.


Sometimes referred to as a "transnational corporation".

Investopedia Says:
Nearly all major multinationals are either American, Japanese or Western European, such as Nike, Coca-Cola, Wal-Mart, AOL, Toshiba, Honda and BMW. Advocates of multinationals say they create jobs and wealth and improve technology in countries that are in need of such development. On the other hand, critics say multinationals can have undue political influence over governments, can exploit developing nations as well as create job losses in their own home countries.






Reference
: fedex.designcdt.com/.../company_information/fedex_history

ww.answers.com/

Fullname: Melbert Estorpe

Wednesday, April 22, 2009

Prelim Question #4

Tuesday, April 21, 2009

Prelims Question 4

Ethics is relevant regardless of the type of organization and style of management. It is by this ethics that legal and moral laws are established. IT is not at all excluded from this.Answer then the following.

1. List down the ethics for computer usage.

Answer:Over the past 50 years, computers have undergone transformation from monolithic number crunchers, to centralized repositories of management information systems, to distributed, networked, cyberspace support systems. During the same period, uses of computers have moved from computational problems to life support, from machine language to GUIs, from abstractions of work to virtual reality on the World-Wide Web. These transformations have brought with them situations that have ethical implications.

2.What common norms of ethics violation happen in the internet and in the organization.

Answer: If you have good computer ethics, you won't try to harass or hurt people with your computer, and you won't commit crimes such as information theft or virus creation. The problem that often arises when some of us are on a computer is that we don't see the harm in snooping in another person's private information or trying to figure out their passwords. It seems smart to copy and paste information into a school report and pretend that we wrote it. (Even if the information were public property --which most of it isn't-- that would be dishonest.) The crimes committed with hacking or gaming scams may not seem harmful because the victims lack faces. Flaming (aiming abusive, insulting messages at another person online) seems risk-free since we are anonymous. Indulging in obscenities and other offensive behavior online might feel empowering simply because no one knows who we really are. No one is going to come knocking on the door and demand a physical confrontation. However, every one of those activities is a violation of computer ethics.


ecommerce.hostip.info/pages/243/Computer-Ethics-COMPUTER-ETHICS-IN-WORKPLACE.html - 11k

3. How does ethics affect the decision making of mangers?

Answer:Typically, there are four critical criteria ethical decision-making—Utilitarianism, Individualism, Rights approach and Justice approach. A company may have to identify the relevant area to judge ethics of business decisions. This paper provides a brief tutorial on how companies can manage business ethics and social responsibility.
Business ethics consists of a set of moral principles and values that govern the behavior of the organization with respect to what is right and what is wrong. It spells out the basic philosophy and priorities of an organization in concrete terms. It also contains the prohibitory actions at the...

resources.bnet.com/topic/decision…management.html - More from this site - Similar pages


4. Cite a company which experienced legal or social conflicts because of its violation of ethics. You may check as example the problem of pre-need insurance companies in the Philippines.

Answer: Petron or gasoline station

a. Describe briefly the nature of the problem.

Answer: How to stay as a competitive gasoline station even if their are many gasoline station company build.

b. How was this resolved?

Answer: To become an affordable gasoline station company so that the owners of cars users still be their client.

c. Who were affected?

Answer: The owners of cars etc.

d. What were the damages?

Answer: The gasoline.







Fullname: Melbert Estorpe

Tuesday, April 21, 2009

Prelim Question #3

Tuesday, April 21, 2009

Prelims Question 3


A company has basically four (4) levels of organizational hierarchy and each level makes use of unique IT technology and software to address and/or support their works.

Answer then the following:

1. Identify and describe information systems (IS) used in each level.

Operational-level Systems
Support operational managers by keeping track of the elementary activities and transactions of the organisation. The principle purpose of systems at this level is to answer routine questions and track the flow of transactions through the organisation. Covers things such as sales, receipts, cash deposits, payroll, credit decisions, flow of materials.

Knowledge-level Systems
Support knowledge and data workers in an organisation. The purpose of these systems is to help the organisation discover, organise and integrate new and existing knowledge in to the business, and to help control the flow of paperwork. These systems, specially in the form of collaboration tools, workstations, and office systems, are the fastest growing applications in business today.


Management-level Systems
Designed to serve the the monitoring, controlling, decision-making, and administrative activities of middle managers. These typically provide periodic reports rather than instant information on operations. Some of these systems support non-routine decision-making, focusing on less-structured decisions for which information requirements are not always clear. This will often require information from outside the organisation, as well as from normal operational-level data.


Strategic-level Systems
Help senior management tackle and address strategic issues and long-term trends, both within the organisation and in the external environment. Principal concern is matching organisational capability to changes, and opportunities, occurring in the medium to long term (i.e. 5 - 10 years) in the external environment.

www.macs.hw.ac.uk/~trinder/DbInfSystem/typesOflS.ppt


2. How do these IS help the employees and managers achieve their objectives.

The Infomation System(IS) help the employees and managers achieve their objectives to facilitate their work and to learn about new hardware,software and methods to improve their performance.

3. Cite a local or national company that makes use of these IS and identify the benefits and drawbacks/lapses of these IS.



Fullname: Melbert Estorpe


Thursday, April 16, 2009

Prelim Question #2


An organizational may adopt a closed-system or open-system model.

1. Discuss the pro's and con's of each model.

Answer: If you use internet connection your work finish a little bit of time, the con's can affect to our health.

2. Cite a company that uses any of this model. Describe briefly how this chosen model affect the entire company.

Answer: In the IT world, an appliance is a complete stack of functionality in a single, closed system. Typically this will include the hardware, operating environment, any required middleware, and the application functionality itself, all in a single pre-built, pre-configured device.
The analogy is often drawn to basic household appliances like washing machines, and to more ‘high-tech’ devices such as digital video recorders (DVRs), which are increasingly complex and computerized. The TiVo, for example, is a sophisticated Linux-based multi-media computer, yet it is entirely plug-and-play, requiring no software installation or knowledge of the underlying computing capabilities.


http://www.cloupdate.com/trends/article.php/3670581/the-Pros-and-cons-of-virtual-appliances.htm


3. Evaluate how an environment affects the organization and its management. Discuss the pro's and con's of not responding to the demands of the environment.

Answer: The pro's of not responding to the demand of the environment the internet connection they are slow in information, and the cos;s is that using the computers can cause stress.








Reference: My opinion
Fullname: Melbert Estorpe


















Tuesday, April 14, 2009

Prelim Question #1

Question:

1. How do you perceive information as a resource of a company?

To perceive information as a resource of a company. A survey of Human Resource practitioners' perceptions of pre-employment screening procedures was conducted. The results indicated differences between tests in terms of perceived accuracy and offensiveness, as well as other attributes. Regression analyses suggested that beliefs about validity, the number of other companies using these procedures, perceived offensiveness of the test, and ease in passing the test were important factors in the willingness to use a particular test. Conversely, perceptions regarding the discriminatory impact of the test and the cost of using the test generally were not related to willingness to use the test. Limitations of this study, which was primarily exploratory, are noted.

http:www.springerlink.com/




2. Cite a company, its nature. Describe how the information from its environment improve its management and business as a whole.

Dole Food Company, Inc. offers a variety of more than 200 products, including fresh fruit, fresh vegetables, packaged foods and value-added products. Learn more about Dole Food Company and its many offerings in All About Dole - 2005.As the world's largest producer and marketer of high quality fresh fruit and fresh vegetables and with a growing line of packaged and frozen foods, the DOLE brand is synonymous with high quality standards and satisfaction. Dole has earned this reputation over the last 154 years thanks to its unwavering commitment to fulfill its customers' needs and consumers' expectations in the critical areas of quality assurance, food safety, traceability, environmental responsibility and social accountability.


http:www.dole.com/company info/




Fullname: Melbert Estorpe








mgt7 #1

wajajajajajaj