Identify main functions of your proposed information system

Assignment Help Basic Computer Science
Reference no: EM132347606

You've just left an all-hands meeting at your company. The CEO was very upset at the rise of shadow IT projects - a major indicator that the company's internal information system has failed to meet its needs. Because the current information system is inadequate, inefficient, and outdated, the CEO is inviting everyone in the organization to propose a new operational, decision support, or enterprise information system to replace it. The executives have allocated $5 million to fund the most promising idea. This is your chance to make a difference in the company (not to mention your own career). Write your proposal as a memo that the entire C-suite will review. Include at least these points, in your own words, to be persuasive: 1. Identify the main functions of your proposed information system and why they are important to the business. 2. Describe what types of data your information system will hold and how data quality will be ensured. 3. Explain how the old information system handles the functions you mentioned, the problems that occur, and why your information system will handle things better. 4. Offer evidence of feasibility: Show that similar information systems have been built successfully and that they save more money than they cost. The executives are busy, so keep your memo to 1-4 pages and avoid any extraneous content. *You may use a current or former employer, but do not disclose anything confidential. Or, you can pick another organization if you are familiar with their internal (not customer-facing) information systems. You can disguise the organization and populate it with famous names. Made-up companies are problematic because of the amount of detail and realism they require.

Attachment:- Assignment-Template.rar

Reference no: EM132347606

Questions Cloud

Why is feature driven development the best software : Why is Feature Driven Development the best software for large project and can other software be just as good for large projects?
Calculates quantities in chemical reactions : General Certificate of Education Advanced Level-CHEMISTRY-GRADES 12-13-Chemical calculations-Balances equations by using inspection method and the redox method.
Totally anonymous means of accessing the internet : Describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet.
Conclusion slide at the end of the presentation : Include a cover slide, introduction slide at the beginning of the presentation, a conclusion slide at the end of the presentation,
Identify main functions of your proposed information system : Identify main functions of your proposed information system. Describe what types of data your information system will hold and how data quality will be ensured
Reflect on organizational behaviour : Reflect on organizational behaviour and your behaviour throughout the course - Write a clear introduction to introduce your paper that includes
Explains the formation of molecular lattices using examples : General Certificate of Education Advanced Level-GRADES 12-13-CHEMISTRY -Bonding and Structure-Explains the formation of molecular lattices using given examples.
General concept of a challenge-response protocol : Describe the general concept of a challenge-response protocol.
Large or small values the momentum term : Describe the benefits and drawbacks of using large or small values fo the momentum term in a neural network

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Financial manager researching investments for client

Imagine that you are a financial manager researching investments for your client. Your investment should align with your client's investment goals.

  Single quote mark-double quote mark

Write print statement to display the following output (the single quote mark, double quote mark, and the backslash in the output must be printed using escape

  Calculate the actual number of bytes

Although the total number of bytes varies from computer to computer, memory sizes of 65,536 to more than several million bytes are common.

  Information in the segment table consistent

Is the information in the segment table consistent? If there are possible errors that you identify, what will their implication be?

  Image for further instructions on cloud computing

Image for further instructions on Cloud Computing

  Does spokane industries understand project management

Does proper earned value measurement serve as a replacement for interchange meetings?

  Key findings of the rand health insurance experiment

Key findings of the RAND Health Insurance Experiment (HIE) include (choose all that apply):

  Position of being neutral third party

Can you help me propose at least two reasons why a mediator should maintain a position of being neutral third party within the mediation process

  Hacker point of view concerning electronic access

How does the hacker point of view concerning electronic access to information differ from the law and from your point of view concerning access to information?

  World fastest but most inaccurate typist

While taking typing class, I was known as the world's fastest but most inaccurate typist! I could average 80 a minute but 14 of those words

  What differences might you expect to find

What differences might you expect to find

  Role of information security policy

Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd