Discuss your recommendation for e-business systems

Assignment Help Management Information Sys
Reference no: EM131942060

1 - 3: You work for a small store that sells automobile tires. You see an opportunity to expand the business by offering more products and services to customers, including offering products and service via the Internet. The store does not have any computer applications supporting business functions.

1. Discuss your recommendation for e-business systems and Enterprise Business Systems needed to support the business growth?

2. Explain the activities that should be performed in order to justify your recommendations?

3. What challenges do you see in implementing the recommended technology/application software?

4. Discuss and explain the privacy and security concerns AND associated security technologies necessary to protect the following information system.

A health care organization is planning to implement an automated patient care system that will enable the health care organization to electronically share information with their patients. They would like to provide patients with access to medical records, submit consent forms for treatment, and enable electronic payment of bills using the internet.

5. Although ERP (Enterprise Resource Planning) Systems are a great concept, implementation of such systems have a high rate of failure and often after such systems are installed the results may not be as desired. Discuss the reasons for such high failure rates, suggest ways to avoid such failures and if the system is not operating up to expectations, should it be replaced?

Reference no: EM131942060

Questions Cloud

Explain the concept of privacy and its legal protections : Explain the concept of privacy and its legal protections. Describe legal compliance laws addressing public and private institutions.
Summarize your business computer servicing and networking : Please spend some time reviewing all your previous discussion boards, and write down what have you been learning from this assignments.
Decompose home library relation into a set of 3nf relations : Draw a dependency diagram to show the functional dependencies that exist in this relation and Decompose the Home Library relation
Describe detection and decision-making capabilities : Summarize the various types of disasters, response and recovery methods. Describe detection and decision-making capabilities in incident response.
Discuss your recommendation for e-business systems : Discuss your recommendation for e-business systems and Enterprise Business Systems needed to support the business growth?
How were many different estimating techniques : How were many different estimating techniques discussed in the case? If you were the project manager, which estimate would you use?
Develop a comprehensive analysis using irr : In this assignment, use the information above to develop a comprehensive analysis using NPV, Payback Method, and IRR to develop a recommendation on replacing.
Validate an idea with your own experience and research : Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives.
Develop a plan on how to build a form of social capital : This assignment is a team presentation in which you will describe a global mindset and to develop a plan on how to build a form of social capital.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analysis of a nominated emerging trend

Analysis of a nominated emerging trend in terms of its evolutionary timeline and its potential for adoption in a corporate context including consideration of the cost.

  Compare the wired and wireless networks

Compare and contrast two common threats to wireless local area networks (WLANs) and the security controls that could be implemented to combat each.

  Determine the systems requirements

HI5019 STRATEGIC INFORMATION SYSTEMS T1 2017 ASSIGNMENT - BUSINESS REPORT. Develop business requirements, Determine the systems requirements

  Analyze the technical control and the non-technical controls

Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.

  How are the companies in business protecting users

How are the companies in this business protecting their users from such assaults, and how can these companies improve the security of online classifieds?

  Discuss about security threats posed by browser add-ins

Go online and search for information about security threats posed by browser add-ins, such as Java applets and ActiveX controls.

  Explain how virtual meetings affect business management

Define the term "big data." Explain how virtual meetings affect business management. Identify one virtual meeting tools. Identify two ways Management Information Systems has enabled a global economy?

  Explain organization''s people with the change strategy

Why would change leaders need to align the organization's people with the change strategy and Would it be easier to just tell workers of the change and demand compliance?

  Taylor inctaylor inc is interested in providing in-house

taylor inc.taylor inc. is interested in providing in-house professional development for the company. you have been

  Find the capacity of the channel

‘The binary erasure channel has two inputs and three outputs as described in Figure.- Find the capacity of the channel.

  Describe basic hie organizational structures

Discuss the impetus for health information exchange in the United States and describe basic HIE organizational structures, architectures, and services.

  Who should lead a security team

How has computer security evolved into modern information security? Who should lead a security team? Should the approach to security be more managerial?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd