Tuesday, April 9, 2019
Business Mgt Essay Example for Free
Business Mgt EssayPart I. Assume you induce taken over responsibility to play the lead nurture Technology (IT) circumspection role in Magnum Enterprises. Your boss, Rachel Heigl, is Magnums CIO. The IT prudence group is comprised of six people who you exiting be supervising. Ms. Heigl is an enlightened manager, and she believes that if you be to give a bun in the oven out your responsibilities effectively, you take in to work with her in defining your IT management role. As a first step, she invites you to pen a short statement where you describe what you see to be your role as head of the IT management effort at Magnum. Proper IT Management requires researching and discerning culture technology as a friendship imagination guiding both operational and crucial c exclusivelyer-out capabilities. Using entropy technology to maximize satisfaction of the node alongside productivity and profitability forget take in that our competiveness with other tune stays at a m aximum.In turn IT dischargeister make personal line of credit movees more effective and efficacious to provide said resources to customers. The lead IT shall ensure performance of the comp each through with(predicate) managing technology while cover priorities of the melodic phrase into the role. Striving to be a partner with great initiative this business will go through its leader will have accomplished and achieved what they desired. My first role of business would be to establish the parameters and to rede the IT knowledge areas. These are made up of maturement processes management disputes information technologies, business applications and gentlemans gentleman foot concepts. Concepts of the fanny are devising sure the role of information systems paired with business and technical concepts are a familiarity with the end drug user. Familiarity of concepts in entry level information systems bind with a competitive strategy dissolve lead to an overwhelming strat egic advantage.Educating Magnums squad up upon the significance of information technology with the three roles that the business world performs in format to combine business management, package product, and ironware capabilities. At the Management level, decision make would lead to significant improvements for IT utilization. Business operations see information systems as a huge tin to review and collect info from financial operations, managing manufacturing processes that are very sophisticated, tracking company stock, and productivity. The use of inflection paired with identifying trends to assist the company in making informed decisions faster to provide information about our competitors. ITis used quite often to provide a strategic support advantage for the company. Automated inventory and posting systems an assist with the savings hails. With this information we would pick out to review our mission statement that identifies the companys functions, provides oversig ht on the overall goal, a sense of direction, and guides decision making.Investigating and maturement towards fellow feeling how we concede money and ensuring a customer base for our company. Envisioning the business figurer programme, mission, with current IT structure and the ability to cash in ones chips with senior leadership will guide me with requirement tools to assist the Chief Information Officer (CIO). To ensure a strategic IT stick out is created in which will be shared and implemented with my team. Planning to have Magnums team familiar with data resource management capabilities, hardware, cyberspaces, telecommunications, and software within the company is the bite area of information systems cognise as information technologies. In todays society advertize organizers (personal digital assistants IE. Blackberrys ETC.) Personal computers and profit servers are integral computer hardware and are crucial in our business purlieu. Being extremely knowledgeable i s vital to our team troubleshooting and firmness hardware issues instead of having to call another company for maintenance.We have the ability to break down our companys software into two categories, application software and system software. Both types normally off the consumer ledge as commercial software instead of having an employee on the team write the software codes for these programs. I plan to ensure my teams are extremely familiar with all software programs and have a firm foundation when troubleshooting and resolving technical issues. Additionally, if not already formed, I will institute a configuration curb board and implement test scenarios to ensure future hardware and software cosmos purchased will not have compatibility issues. Also a part of information technologies is data resource management. This is essential in sustaining and maintaining our company. We will require a database management system of good quality that is capable of data consolidating into a datab ase in turn can be accessed my several program applications.Within the past fifteen to twenty geezerhood entanglements and telecommunications software have played a vital role. To ensure the expansion and growth for Magnum Enterprises, we will need out network to be consistent, undeviating, monetary sufficient. I would prepare the team toeither install or review and change as needed our network management system that assists with traffic management, capacity planning, network monitoring, and security in essence that our system will grow and change with modern day business culture and practices as the company expands. In order to have the most dependable and proven with the cost of it a ring network should be put into place. The next area, increment processes, deals with designing, planning, identifying ideas, and implementing information systems to equip potentiality business opportunities. It is critical that we ensure our business management capabilities alongside our hardwa re and software are coordinated successfully within our company. Basis within the development process and depending upon the circumstance, there are a equalise of processes we want our team to employ as resolving problems com along with our business systems. Those processes are considered or known as the prototyping glide slope and he systems development life-cycle.The synopsis of prototyping involves quickly growing or constructing test modules of a desired system in which we will engage when we cannot determine or classify the end user requirements. These systems would be used to assist our personnel with the capabilities to design or create an information system that will be intuitive and easy to navigate for consumers. Prototyping involves four steps with the first organism investigation and depth psychology step. This step, requirements grouped and defined. Second, is the analysis and design step in which a model is developed and constructed to meet consumer business requir ements. Next, in the design and implementation, this finalizes the model that was time-tested and begins the initial installation. The last step to this four step process is implementation and maintenance, which would consist of the business system being accepted, used, and maintained. Prototyping advantages are decrease in the development time, development costs and requires user involvement. This generates higher satisfaction results. I plan to employ this type of approach to broken initiatives.The next area is business application for information systems. This will consist of being familiar with avocation and business applications for our employees and which are used within the company to make strategic leadership and management decisions. A few of the most used business applications within a studyity of companies are accounting, human resource management, enterprise resource planning, supply chain management, customer human relationship management, financial management,and supply chain management. An architectural picture of or IT business applications will ensure that I will have familiarity with all applications that we use. This approach will identify the current interrelationships, interfaces with customer, employees, business applications, and stake holders. We will then need to review the map and see if there are any potential process improvements that we can make to integrate those systems sign functionally and keep operational costs to a minimum. The systems development lifecycle employs the systems approach to create IT solutions.This lifecycle is often utilise for large applications and it is composed of five processes that I expect my team to know and become familiar when employing the systems development lifecycle systems investigation, systems analysis, systems design, systems implementation and systems maintenance. The first process, systems investigation, involves project brainstorming, planning and performing a feasibleness study. D uring the brainstorming and planning initiative, a project management implementation plan is created identifying the detailed steps that will be accomplished during the cosmea and development of the system. The feasibility study is critically distinguished as this outlines all requirements for the system. It also explores four major areas, plaqueal, economic, technical, and operational feasibility, which determines if its worthwhile to invest in potential business ventures.In reviewing the organizations feasibility, we need to determine if the system is in line with and supports our companys strategic objectives. The economic feasibility identifies and evaluates the projects tangible and intangible cost and benefits. Technical feasibility is assessed by confirming if the necessary hardware and software will be available or can be developed and tested before implementation. Operational feasibility is determined by the motivation, desire, willingness, and competence of the stakehol ders (management, employees, customers and suppliers) to use and see to it the proposed system. Systems Analysis consists of consolidating requirements and allows a detailed breakdown of the business take and requirements of the organization. This starts with an organizational analysis from one of the business end users. This unmarried must be keenly aware of the organizational management structure, business requirements, and current IT systems operations and its proposed relationship with the newly created system.Some of the outputs generated from the systems analysis allow in system flowcharts, data flow diagrams, and connectivity diagrams which aid in the development of the analysis report The next process, systems design, focuses on the design, process diagrams, business rules, and maturation specifications for the hardware, software, data resources that will meet the proposed requirements for new business system. The three major outputs produced from the systems design pha se are user data, interface, and process design. The one-fourth process of the systems development lifecycle is system implementation. This encompasses either acquiring the hardware or software or developing it from company resources and then testing the products in a test environment to see how well they operate and integrate with your existing IT architecture. If testing goes well, an implementation plan including training end users and developing system supporting will be accomplished prior to incorporating and executing this system within our IT architecture.The final process, systems maintenance consists of consistently monitoring and evaluating the newly implemented system. This also includes correcting errors and discrepancies not identified during the testing phase and continuously making system improvements, advancements and upgrades. The final area of information systems is management challenges. There are numerous challenges that our IT team whitethorn be faced with at Magnum Enterprises. One challenge is addressing our security concerns which involve several areas. For instance, our IT team needs be constantly vigilant and on the alert for potential competitors trying to or real hacking into our systems to bargain or damage our data. Additionally, we may also be challenged with setting up restrictions and locking down the network for personnel to only use the network and its software applications for official business. Ensuring that our software is stamp downled and that employees are not illegally making copies of software for personal use is another area of concern.Preventing virus attacks to our network and installing anti-virus software to diagnose and remove computer viruses is of utmost concern. Failure to maintain a secure network can potentially halt our business from being productive and resulting in thousands of dollars in lost revenue. Additional challenges the IT team may be faced with may involve expanding our infrastructure and network to address our growing business. Ensuring our network provides our employees accessibility to the data they need, wherever they require it, regardless of their location will test our innovativeness.The company may not have a backup plan to allow it to operate effectively and efficiently in the event of a forced relocation. If that is the case, I will recommend to our management staff that we establish a continuity of operations plan enabling us to relocate with minimum impact to our business operations like a hot site for temporary functionality.In the dynamic world of IT we will evermore be faced with challenges, however, utilizing IT and being on the leading edge of new IT systems provides our business with many benefits and makes our organization more effective and efficient. For example, IT can be used to improve and promote new business processes much(prenominal) as creating an automated inventory system which will save money in add-onal labor costs. Another use of I T in making it more efficient and effective is that using certain software programs enables us to identify and target our top customers in terms of profitability to our business. In summary, IT enables our company to successfully plan, integrate, manage, and carry out strategies which lead to profit.Part II. Six months after you take over the lead IT management role at Magnum, the CIO, Ms. Rachel Heigl, is pleased with your work. She has just attended a run across of Magnums executive perpetration (the committee comprised of the most senior managers of Magnum), where the CEO and Vice President of trade have indicated that Magnums comely e-business capabilities must be strengthened. As CIO, Ms. Heigl is given primary responsibility in improving Magnums e-business performance. She in turn puts you in charge of a small task force comprised of representatives from the marketing, operations, finance, and legal subdivisions. In order to advance and improve Magnums e-business performa nce operations, its vital I establish a sticking team with representatives from the marketing, operations, finance, and legal departments. Their input and perspective is necessary and essential in developing a counseling ahead and strategic plan for the future of our e-business department. Developing success with our e-business begins with marketing the company.Marketing is concerned with developing and creating an innovative plan so that the product or service can be promoted and sold. Promoting our products and services are key and critical in attracting new customers as well as maintaining our current customer base. It is important that I develop an understanding of the marketing role and how it can benefitby using Information Technology systems. Marketing information systems support well established and e-commerce processes that sustain major elements within the marketing function and is described as a continuing and interacting structure of people, equipment and procedures to gather, sort, analyze, evaluate, and distribute pertinent, timely and accurate information for use by marketing decision makers to improve their marketing planning, implementation, and control.The major components of marketing information systems include interactive marketing, gross revenue force automation, customer relationship management, sales management, product management, targeted marketing, and market research. Two of the sevensome components I will be discussing are interactive marketing and customer relationship management. In our environment today, marketing information systems aid marketing personnel in a phase of tasks associated with branding products and customer service initiatives. For instance, interactive marketing is largely dependent on utilizing the internet, which permits the business and its customers and potential customers to become partners in developing, socializing, acquiring and advancing products and services. With the IT department enabling this ty pe of communication, the company benefits from generating new ideas for other products and services as well as establishing strong customer loyalty. Another area within the marketing information systems is node Relationship Management (CRM).This incorporates and automates many customer service processes. It consists of utilizing an IT framework to construct, automate, and integrate marketing processes with the companys business operations. CRM is usually comprised of a software suite that allows a business to provide efficient, effective and reliable service to its customers. Additionally, CRM permits a company to identify and target their most important customers as well as facilitate real-time customization of products and services based on the customers wants and desires. Understanding the marketing departments views and concerns enables the IT department to implement and install an IT infrastructure that will be capable of supporting confused information technologies. Some of the benefits that can be obtained from the marketing department are an opportunity to increase sales and revenue, a chance to touch new market areas, 24/7 accessibility for the customer, and more tractableness and convenience for the customers.The production and operations function is supported bymanufacturing information systems. Manufacturing information systems are knowing to be used specifically in an operations and production environment. Different types of manufacturing information systems consist of computer integrated manufacturing (CIM), process control, machine control and robotics. CIM involves using computers to control the total manufacturing process, from design to distribution, to produce produces products of the highest caliber. assist control involves utilizing computers to oversee and control continuing physical processes. Machine control consists of using a computer based system to direct the actions of a machine. Robotics involves designing, constructing, and building machines that have the intelligence of a computer and human like physical capabilities. Its key I understand how the operations representative depends on these information systems to operate effectively as well as their expectations for these systems. Working together as a team will enable the IT and operations department to develop better ideas to increase the manufacturing and production process.Developing an understanding of all the accounting and financial based systems within our business and discussing these systems with the finance representative enables our IT and finance departments to plan effectively when troubleshooting and performing upgrades. These systems include but are not limited to order processing, inventory control, accounts receivable, accounts collectable, payroll, customary ledger, cash management, investment management, capital budgeting and financial planning. The success of these systems is integrally connected with its information technology an d services. For example, the order processing system captures and processes customer orders and produces data needed for sales analysis and inventory control and the accounts payable system keeps track of data concerning purchases from and payments to suppliers. Communicating with the finance representative is essential in setting up or modifying these systems to meet the needs of our business. Any interruption or degradation in service can lead to severe damage to the business and financial services that Magnum Enterprises relies on to function and operate.As with any business, competitors are always looking for an advantage to get them ahead in their particular discipline or industry. Unfortunately, being extremely aggressive and ambitious can sometimes cloud your decision making capabilities to the occlusive that you maybe committing breaking privacy laws and monitoring and copy slump violations. As the IT lead manager for Magnum Enterprises, Im charged with ensuring our network infrastructure and IT systems are operating proficiently. However, when it comes to addressing privacy issues from an IT perspective, opinions and viewpoints from a legal good are necessary. In regards to privacy, several websites accumulate usernames and passwords and personal information such as home addresses and recollect numbers without authorization from users.Applying internet monitoring technology within the workplace raises concerns about where the boundaries lie between personal use and public resource use. Copyright concerns and violations has become an issue with the development of the Internet and upgrades to technology. Discussing these concerns with a legal expert and implementing and adhering to strict guidelines will do prevent our company from committing these violations. In addition to the goals of fortify the capabilities of the e-business, attention must be paid to some key technical challenges. Overseeing secure information throughout our business is extre mely difficult to implement and maintain successfully. Key technical issues that may be encountered when re-engineering our e-business include privacy and confidentiality, authenticity, data integrity, access control, availability and infrastructure. Privacy and confidentiality involves businesses protecting and securing personal information while being stored or transmitted through email. This can be accomplished by utilizing encryption devices or firewalls. hallmark is used to confirm an individuals identicalness and during e-business dealingss, the purchaser and buyer wants assurance that proper identity is established. A secure way to assist with confirming identity to both individuals is to utilize a virtual(prenominal) private network. Data integrity means the data is correct and has not been altered while being stored or transmitted. The use of firewalls assists in preventing unauthorized users and safeguarding data. Another way to ensure data integrity is through the use o f antivirus software which also aids in keeping your data free from viruses. Access control exists when youre authorizing certain individuals permission to restricted systems or data. Several measures that can help with access control include firewalls, access privileges, passwords, digital certificates and virtual private networks.Availability is an issue when customers and employers need informationwithout any disruptions. Uninterrupted Power Supply (UPS) systems, data backups and the use of anti-virus software assist with ensuring data is always available. Our e-business infrastructure constantly needs to be monitored to ensure its meeting the needs of our business. An infrastructure that is inefficient to consistently support the network traffic load can potentially cost our company thousands of dollars in lost sales. If the network is continually slow, increasing the speed of the network backbone will assist in providing faster and reliable support for our customers. In additi on to increasing the speed of the network backbone, implementing cross-functional enterprise systems will assist in improving critical business processes throughout Magnum enterprises. A final technical challenge is ensuring all of our systems are compatible and can operate on several different hardware platforms. By having this capability, our operating costs from a technical refresh perspective will decrease. While strengthening capabilities and addressing technical issues, there are management challenges within the e-business that must be addressed.As discussed earlier, our team must be vigilant in addressing security challenges such as hacking into our systems, software theft, and protecting our software applications. In addition to security issues, there are ethical concerns that must be addressed. Privacy has always been a solid and contentious issue amongst employers and employees. For instance, computer monitoring is considered by many personnel to be an infringement on the employees privacy and shouldnt be allowed. However, employers argue that since the computer is a company owned resource, they should be allowed to monitor the work of their employer. In reality, many employers are concerned as to whether or not the employee is actually working and producing or just goofing off and surfing the internet. Utilizing IT equipment at work has been mentioned to cause a variety of wellness issues which management must address.For example, if your job consists of being in front of a computer all day, some of the health problems you may experience damage to the neck and arm muscles, eye strain, carpal delve syndrome, job stress, poor posture and poor circulation. Resolutions to some of these health concerns can be through the erudition of ergonomics. The objective of ergonomics is to devise and create safe health work conditions with the goal of decreasing health issues and increasing employee morale and work productivity. IfMagnum Enterprises has customer s internationally, they also may be faced with governmental, geo-economic and cultural challenges. From a political concern, there are countries that have restrictions regulating or denying the transfer of data across their borders which can potentially result in customers or businesses from having to pay import or export fees.Geo-economic concerns involve issues such as identifying and locating personnel with IT skills to work at remote sites and communicating with personnel across all 24 time zones. Cultural challenges include differences in languages, cultural interests, religions, customs, social attitudes, and political philosophies. For example, if Magnum Enterprises was conducting a business transaction via a Video Teleconference it would be disrespectful to look them in the eye when introducing yourself. Before meeting an international customer, it would prudent to review their customs and courtesies to ensure a smooth business relationship. Improving Magnums e-business per formance faces several challenges. Consulting with key department personnel from operations, marketing, finance and legal as well as addressing technical and management obstacles will assist me in charting a plan to put our e-business on the right track towards success.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.