Wednesday, May 13, 2009

Tuesday, May 12, 2009

Finals Question #2



A company may adopt specific computerized database system according to their unique needs after thorough MIS planning. However, it has to be noted that MIS if properly planned, and implemented, benefits can be immeasurable on the other hand, if this is misused, then it may mean information or financial losses and opportunity and resources wasted.From this, answer the following.


1.0.a Research one international company from the Internet and describe their MIS strategic plan in 1-2 paragraphs.

Tradequest International (PINKSHEETS: TRDQ) doing business as IP1 Network, Corp., is pleased to report that it is on track and progressing as expected and plans to begin generating revenues after lighting its telecommunications network.

The network topology was built to ensure 100% redundancy for all network elements with some of the world's best domestic and foreign routes. Additionally, the network backbone and high quality IP based communication services essentially turn each of our partners into a fully functional IP based communications company overnight and allows them to offer a turn-key spectrum of telephony services solutions to their end users at competitive prices,"




http://www.ip1network.com/




1.0.b Discuss too the impact of this strategic plan on the company's management,competitors, customers and the company as a whole.

The impact of that strategic plan on the company is the partners know their local market better than anyone else because they provide the tools, infrastructure and technical support; they just concentrate on sales and service.Customer and Partner satisfaction. Their systems are user friendly; they are branded by the Partner and with technicians available to assist and the Quality of their business is very effective to the people because they are fully redundant in their network infrastructure with worldwide.

2.0.a Evaluate how can this strategic plan be applied to any local company in the Philippines.
2.0.b Discuss too the possible effect on the company.

The possible effect of this strategic plan on the company is the company will have an opportunity to develop a strong brand or enhance an existing brand.

3.0.a What is an Accounting Information System?

An accounting information system (AIS) is the system of records a business keeps to maintain its accounting system. This includes the purchase, sales, and other financial processes of the business. The purpose of an AIS is to accumulate data and provide decision makers (investors, creditors, and managers) with information.
http://en.wikipedia.org/wiki/Accounting_information_sys...

3.0.b Identify or list down different accounting information systems used.


  • An electronic health record (EHR) refers to an individual patient's medical record in digital format. Electronic health record systems co-ordinate the storage and retrieval of individual records with the aid of computers.


  • Electronic Data Interchange (EDI) refers to the structured transmission of data between organizations by electronic means. It is used to transfer electronic documents from one computer system to another (ie) from one trading partner to another trading partner.



  • Law[4] is a system of rules, usually enforced through a set of institutions.[5] It shapes politics, economics and society in numerous ways and serves as a primary social mediator in relations between people.

  • High-definition television (or HDTV) is a digital television broadcasting system with higher resolution than traditional television systems (standard-definition TV, or SDTV). HDTV is digitally broadcast; the earliest implementations used analog broadcasting, but today digital television (DTV) signals are used, requiring less bandwidth due to digital video compression.

  • Electronic mail—often abbreviated as e-mail or email—is a method of exchanging digital messages, designed primarily for human use. A message at least consists of its content, an author address and one or more recipient addresses.
  • Enterprise content management (ECM) refers to the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists
  • Double-Entry Bookkeeping is a system that ensures the integrity of the financial values recorded in a financial accounting system. It does this by ensuring that each individual transaction is recorded in at least two different (sections) nominal ledgers of the financial accounting system and so implementing a double checking system for every transaction.


http://en.wikipedia.org/wiki/Accounting_information_sys...



3.0.c What are the benefits by the management, users and customers derived from these AIS?


  • DIntegration among different functional areas to ensure proper communication, productivity and efficiency
  • Design engineering (how to best make the product)
    Order tracking, from acceptance through fulfillment
  • The revenue cycle, from invoice through cash receipt
  • Managing inter-dependencies of complex processes bill of materials
  • tracking the three-way match between purchase orders (what was ordered), inventory receipts (what arrived), and costing (what the vendor invoiced)
    The
    accounting for all of these tasks: tracking the revenue, cost and profit at a granular level.
http://www.ip1network.com/



3.0.d Cite any threat or misuse of these AIS by a specific company. How were the threats addressed? What were the damages?

AIS THREATS

When planning a security program, the AIS technical manager should be aware of all the types of threats that may be encountered. Not every Navy AIS facility will be faced with each type of threat, especially if the facility is aboard ship. The impact of a given threat may depend on the geographical location of the AIS facility (earthquakes), the local environment (flooding), and potential value of property or data to a thief, or the perceived importance of the facility to activists and demonstrators or subversives. Examples of natural and unnatural threats include:



  • Unauthorized access by persons to specific areas and equipment for such purposes as theft, arson, vandalism, tampering, circumventing of internal controls, or improper physical access to information;


  • AIS hardware failures;


  • Failure of supporting utilities, including electric power, air conditioning, communications circuits, elevators, and mail conveyors;


  • Natural disasters, including floods, windstorms, fires, and earthquakes;


  • Accidents causing the nonavailability of key personnel;


  • Neighboring hazards, such as close proximity to chemical or explosive operations, airports, and high crime areas;


  • Tampering with input, programs, and data; and

  • The compromise of data through interception of acoustical or electromagnetic emanations from AIS hardware.

www.tpub.com/content/istts/14222/css/14222_102.htm




No comments:

Post a Comment