Apply ethical research and inquiry skills and demonstrate


Case Study Report

Applicable course objective:

• apply ethical research and inquiry skills and demonstrate an understanding of the social impact of information technology and the need for security, privacy and ethical implications in information systems usage;

• demonstrate problem-solving skills by identifying and resolving issues relating to information systems and their components, and proficiently utilise different types of information systems software (especially gaining proficiency in utilising databases, spreadsheets, and presentation applications).

• apply academic and professional literacy skills and demonstrate an understanding of the importance of and differences between information and computer literacy; the basic types of software including system software (operating systems and utilities) and applications software (proprietary, off-the-shelf software applications and cloud computing); the basic hardware components of a computer system, including system unit, storage, input and output devices and the way that they interact to form a single computing system; understanding computer-based telecommunications and networking concepts; the basic concepts surrounding databases, database management systems and understanding the need for information management; the concepts surrounding the Internet, e-commerce/e-business and supply chain activities, and business intelligence, knowledge management and other business information system tools (TPSs, ERPs, MISs, DSSs etc) widely used in organisations today; and the processes involved in information system project management;

• apply written communication skills by understanding basic information, communication and technology (ICT) terminology for effective communication and applying it within a business environment.

Applicable graduate qualities and skills gained from this assessment instrument:

• Problem Solving (Skill U2)

• Written & Oral Communication (Skill U4)

Referencing Requirements

References are required and the Harvard AGPS standard of referencing must be used.

Dr Shirley "Shirl" Lock-Holmeswas extremely impressed with our computing firm's - Moriarty Technologies - development of the Steam Age Emporium'sDatabase Management System (DBMS) utilising Microsoft Access 2007/2010/2013 (Assignment 1) and Decision Support System (DSS) utilising Microsoft Excel 2007/2010/2013 (Assignment 2).

Dr Shirley "Shirl" Lock-Holmes realises that the business has a lot to learn and that the business will need to invest considerable money to bring his business into the modern online business world, from their current single computer mail order set-up. Dr Shirley "Shirl" Lock-Holmes has contracted our firm to advise the business on how they can grow their mail order business into a cutting-edge online presence.The business has asked us to develop a report to provide them with information about the following topics that they see as key to their business' growth:

• What Information Technology Strategies should the Business consider to obtain / retain competitive advantage in their marketspace?
(Baltzan et al Chapters 1& 8 -Competing in the Information Age / Enterprise Information Systems)

• How can the business move from mail order to being an online presence?
(Use Baltzan et al Chapters 2 & 3 - Connectivity and E-Business / Mobile Business to assist you in answering this topic)

• What type of hardware and software, including networking infrastructure, should the business acquire to expand its capabilities to meet their new e-business initiative?
(Use Baltzan Chapter 5 - Technical Fundamentals to assist you in answering this topic)

• What would be the benefits to the business of a solid enterprise architecture?
(Use Baltzan et al Chapter 7 - Enterprise Architecture to assist you in answering this topic)

• What privacy issues should the business be aware of when embarking on an online presence?
(Use Baltzan et al Chapter 11 - Ethics, Privacy and Information Security to assist you in answering this topic)

All phases in this project must be developed with professionalism and user-friendliness in mind.

Mr Hach G Wells, your manager, has set up the following tasks for you to complete this project:

Refer to the marking criteria for details of mark allocations.

Task 1: Journal (maximum 500 words)

Prepare a journal that records your activities and progress related to completing this assignment. In date order, clearly list the following:
• Date of research activity/discussion
• Full description of research activity / discussion (at least 25 words)
• Web sites visited to collect information; other references accessed (using Harvard AGPS Referencing style - submitted separate to the List of References in Task 2).
• Time duration of the activity

If you are working in a team, clearly state the activities of each team member.

Submit this journal as an appendix to Task 2. Any references to web pages and online documents, such as white papers, should be listed at the end of the journal.

Task 2: Case study (max 2,500 words)

Report Structure and Presentation

Your report should include a professional title page, computer generated Table of Contents (including List of Tables and List of Figures) and Appendices.

Note: Make sure to state the names of all students involved in the report on the title page.

Report Letter of Transmittal, Executive Summary and Introduction 5%

Your report should include a letter of transmittal, executive summary, and introduction to the report.

Report Section 1 - Business Strategy 10%

What Information Technology Strategies should the Business consider to obtain / retain competitive advantage in their marketspace?
• Using Porter's Five Forces Model, discuss how each of the five forces relates to Dr Shirley "Shirl" Lock-Holmes' business.
• What should be the business's focus? Discuss the business's focus in relation to Porter's Three Generic Strategies.
• What are the benefits to the business of Supply Chain Management and the types of metrics should the business be using to measure the performance of their Supply Chain Management.
• Discuss what are the Upstream and Downstream steps involved in the business's Supply Chain Management.
o Include a diagram of the business's current Supply Chain based on the information you have from Assignment 1, 2 and 3
(Baltzan et al Chapters 1& 8 -Competing in the Information Age / Enterprise Information Systems)

Report Section 2 - E-Business and Mobile Business

How can the business move from mail order to being an online presence?

• What are the benefits and challenges that the business should be aware of before becoming an e-business?
• What are the characteristics of Web / Business 2.0? How should the business address these characteristics when setting themselves up as an e-business?
• Which type(s) of e-business model(s) should the business be considering implementing? Why?
• What type of e-commerce tools should the business consider utilising to connect and communicate with their customers? Why?
• What tools should the business use to measure their e-business success?
• Should the business also consider implementing m-business? What are the benefits and challenges Dr Shirley "Shirl" Lock-Holmeswill need to be aware of?
(Baltzan et al Chapters 2 & 3 - Connectivity and E-Business / Mobile Business)

Report Section 3 - Hardware, Software and Networking Infrastructure

What type of hardware and software, including networking infrastructure, should the business acquire to expand their capabilities to meet their new e-business initiative?

• Develop a computer hardware proposal (including printer(s)) to allow the business to provide up to twenty-five (25) staff with computer access, including current Australian prices for the equipment. Justify why this hardware is necessary for the business.

• Develop a computer software proposal, including both system and application software, to support the proposed computer hardware proposal, including Australian prices for the software. Justify why this software is necessary for the business.

• Develop a networking and communications proposal, including a suggested network architecture, topology and communication medium to support the proposed computer hardware and software proposal. Justify why this networking infrastructure has been chosen for the business.

• Include a diagram of the proposed hardware and network infrastructure to help Dr Viv Aldi visualise what you are recommending.
(Baltzan Chapter 5 - Technical Fundamentals)

Report Section 4 - Enterprise Architecture

What are the benefits to the business of a solid enterprise architecture?

• How should the business maintain and secure itsinformation architecture to support its business operations? Propose the steps that the business should follow.

• Before Dr Shirley "Shirl" Lock-Holmes acquires the hardware, software and networking infrastructureproposed in part 2, outline the seven (7) primary characteristics of a solid infrastructure architecturehe should be aware of and how they may impact on the business.

• Cloud computing offers an alternative to some of the infrastructure architecture proposed in part 2.
o How could cloud computing be utilised to reduce the acquisition costs for the hardware, software and networking infrastructure to the business?
o What would be the benefits and challenges of these emerging cloud services to the Dr Shirley "Shirl" Lock-Holmes's business?
(Baltzan et al Chapter 7 - Enterprise Architecture)

Report Section 5 - Privacy

What privacy issues should the business be aware of when embarking on an online presence?
• What Australian laws should Dr Shirley "Shirl" Lock-Holmes be aware of regarding privacy? How do these laws affect how the business collects and uses information collected from its customers?
• How should the business communicate its commitment to the privacy of customers? Provide two (2) examples of how similar businesses achieve this communication of commitment to customer privacy.
• As the business's potential client base is international, what other global information privacy issues should Dr Shirley "Shirl" Lock-Holmes be aware of?

(Baltzan et al Chapter 11 - Ethics, Privacy and Information Security)

Report: Conclusions and Recommendations to the Business

Your report should include separate conclusions and recommendationssections.

• Conclusions provide a summary of your key findings from the body of the report.

• Recommendations provide a summary of the recommendations to the business based on the research conducted in the report.

Report: Referencing and Appropriateness of Sources

References are required and the Harvard AGPS standard of referencing must be used. This standard is detailed onUSQ Library Site

Ensure that your reports are fully referenced, including any reference to the text book. Your report should include in-text references and a List of References.

Do not repeat verbatim large slabs of information from other sources such as the text - you must put the ideas/information in your own words.

You must use at least ten (10) academically sound sources other than the textbook in completing this report.

Attachment:- Corporate Finance spread sheet.rar

Request for Solution File

Ask an Expert for Answer!!
: Apply ethical research and inquiry skills and demonstrate
Reference No:- TGS01259882

Expected delivery within 24 Hours