Categories
Writers Solution

STRATEGIC INFORMATION SYSTEMS FOR BUSINESS AND ENTERPRISE

HI5019
STRATEGIC INFORMATION SYSTEMS FOR BUSINESS AND ENTERPRISE
TUTORIAL ASSIGNMENT
TRIMESTER T2, 2021
Assessment Weight: 50 total marks
Instructions:
• All questions must be answered by using the answer boxes provided in this paper.
• Completed answers must be submitted to Blackboard by the published due date and time.
Submission instructions are at the end of this paper.
Purpose:
This assessment consists of six (6) questions and is designed to assess your level of knowledge of the key topics covered in this unit

Adapted Harvard Referencing
Holmes has now implemented a revised Harvard approach to referencing:

  1. Reference sources in assignments are limited to sources which provide full text access to the source’s content for lecturers and markers.
  2. The Reference list should be located on a separate page at the end of the essay and titled: References.
  3. It should include the details of all the in-text citations, arranged alphabetically A-Z by author surname. In addition, it MUST include a hyperlink to the full text of the cited reference source.
    For example;
    P Hawking, B McCarthy, A Stein (2004), Second Wave ERP Education, Journal of Information Systems Education, Fall, http://jise.org/Volume15/n3/JISEv15n3p327.pdf
  4. All assignments will require additional in-text reference details which will consist of the surname of the author/authors or name of the authoring body, year of publication, page number of content, paragraph where the content can be found.
    For example;
    “The company decided to implement an enterprise wide data warehouse business intelligence strategies (Hawking et al, 2004, p3(4)).”

Non – Adherence to Referencing Guidelines
Where students do not follow the above guidelines:

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Phenomenon of El Nino-Southern Oscillation (ENSO).

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG
  1. Students who submit assignments which do not comply with the guidelines may be required to resubmit their assignments or incur penalties for inadequate referencing.
  2. Late penalties will apply per day after a student or group has been notified of a resubmission requirements.
    • Students whose citations are identified as fictitious will be reported for academic misconduct.
    Note. References are not mandatory for this assessment. However, please follow the Adaptive Harvard Referencing guidelines if you use any reference(s) to explain any concept or theory.
    Question 1 (11 marks)
    The role of internal audit is to provide independent assurance that an organisation’s risk management, governance and internal control processes are operating effectively. ABCD Limited is concerned about its Internal Audit (IA) function. Recently, ABCD Limited is expanding and reorganizing its Internal Audit (IA) function. Currently the Director of Internal Audit, Shuja Mehboob, reports to the corporate controller, who receives and reviews all internal audit reports. Mehboob forwards copies of the internal audit reports to the audit committee of the board of directors and to the manager directly responsible for the function being audited.
    An issue of contention among the management team pertains to which department or function the Director of Internal Audits should report. Martin Stevens the CEO wants to ensure that ABCD Limited complies with the SOX and that the internal audit department is structured such that it strengthens the company’s internal control system. Also, an overarching objective for the reorganized audit function is that the external auditors are able to rely on the work performed by the internal audit department to a substantial degree. Arguments put forth by interested parties as to where the IA department should be organizationally located are presented below:
    Chief Operations Officer (COO). Robert, the COO of ABCD Limited, believes that the Director of IA should report to him. Under this arrangement the IA staff members would be involved in the preparation of policy statements on internal control regarding safeguarding of assets and in the design of business processes.
    Chief Information Officer (CIO). Marry, the CIO, has pushed hard to have the IA function report to him and take on an active role in the design, installation, and initial operation of a new computerized systems. IA staff will be primarily concerned with the design and implementation of internal accounting controls and conduct the evaluation of these controls during the test runs and audits.
    Corporate Controller. The controller Bailey Eder, believes the IA group should remain within her functional area. Currently the IA staff performs a number of controller related tasks. These include:
    o Internal auditors reconcile bank statements of the corporation each month. The controller believes this strengthens the internal control function because the internal auditor is not involved in either the receipt or the disbursement of cash.
    o Internal auditors review the annual budget each year for relevance and reasonableness before the budget is approved. At the end of each month, the controller’s staff analyzes the variances from budget and prepares explanations of these variances. These variances and explanations are then reviewed by the internal audit staff.
    o Lastly, the internal auditors make accounting entries for complex transactions when employees of the accounting department are not adequately trained to handle such transactions. The controller believes this gives an added measure of assurance to the accurate recording of such transactions.
    Required: We have discussed internal audit independence during our interactive tutorials. Your answer should be based on our discussion. Please answer the following questions.
    a) For each of the proposed tasks to be performed by the IA function, explain whether ABCD Limited’s internal audit independence will be materially impaired. For this explanation, consider each manager’s arguments independently. [6 Marks. Word Limit: Up to 300 words]
    b) To maintain independence, where should the Director of Internal Audits report? Explain your answer. [5 Marks. Word Limit: Up to 200 words]
    ANSWER: ** Answer box will enlarge as you type
    Question 2 (11 marks)
    Richard has been a highly regarded employee of the Brier Corporation for almost 20 years. Her loyalty to the company is reflected in her dedication to her job as general accounting clerk from which she has not taken a vacation in almost 12 years. Because of her dedication and long tenure, she has acquired many related responsibilities, which has allowed the Brier Corp to reduce its work force through attrition, control salary expenses and become more efficient and competitive. The following describes Richard’s responsibilities.
    Richard receives copies of credit sales orders from the sales department. From these documents she accesses the AR subsidiary ledger from her office computer and records the AR. She then records the sale in the sales journal and posts the transactions to the general ledger accounts. Cash receipts in payment of customer AR come directly to her office. She records the cash receipts in the GL cash and AR accounts and updates the AR subsidiary ledger. She then endorses the checks “for deposit only” and deposits them in the bank at the end of each day.
    Required:
    a. Identify any control problems in the procedures described above. [3 Marks. Word Limit: Up to 200 words]
    b. Based on the control problems identified above, what sorts of fraud are possible in this system? [4 Marks. Word Limit: Up to 200 words]
    c. What controls are needed to reduce the risk of fraud? [4 Marks. Word Limit: Up to 200 words]
    ANSWER:
    Question 3 (7 marks)
    Paul Williams recently joined XYZ2 Limited as the head of accounting department. Williams spent the first few weeks to analyse the account information system. Based on this analysis, Williams is concerned about the purchase system of XYZ2 Limited. Here is the details of purchase system.
    The purchasing agent of XYZ2 Limited periodically checks inventory levels from a computer terminal, which is connected to a central accounting system. The agent searches the inventory file for items that need to be ordered. He then selects a supplier, prints a hard copy of the purchase order, and mails it to the vendor. The clerk files one copy of the PO in the department and sends a second copy to the AP Clerk. When the inventories arrive at the receiving department, a receiving clerk reconciles the items with the packing slip, inspects them for condition, and manually prepares a three-part receiving report. The clerk sends one copy to the purchasing department to close out the open PO, files one copy along with the packing slip in the receiving department, and sends one copy with the inventory to the warehouse.
    In the purchase system, account payable clerk performs some key roles. When the accounts payable clerk receives a hardcopy invoice from the vendor, she reconciles the invoice with the purchase order, records the liability in the AP Subsidiary Ledger from the terminal in her office, and assigns a due date for payment. The warehouse clerk receives the inventory, reconciles it with the receiving report, and updates the inventory subsidiary ledger from a terminal in the warehouse.
    Required: Describe the uncontrolled risks in the system of XYZ2 Limited. Against each identified risk, describe the physical controls needed to reduce the risks. [7 Marks. Word Limit: Up to 600 words]
    ANSWER:
    Question 4 (7 marks)
    Part (a). During the week 10 and 11, we have discussed different feasibility studies, including technical, economic, legal, operational and schedules feasibility. Based on this discussion, elaborate cost-benefit analysis as it is performed in the economic feasibility. [4 Marks. Word Limit: Up to 200 words]
    Part (b). The system experts perform the design and implementation phases of the system development life cycle. However, the accountant’s role in these phases cannot be ignored. Comment on the statement. [3 Marks. Word Limit: Up to 150 words]
    ANSWER:
    Question 5 (7 marks)
    Miss Anglea recently joined A2A Limited as an accounting clerk. As a part of financial reporting process, she receives the following source documents to prepare journal vouchers for general ledger entries.
  3. purchase orders,
  4. sales invoices, and
  5. vendor invoices
    At the end of each day, Angela posts the journal vouchers to the general ledger and the related subsidiary ledgers. Each month the clerk reconciles the subsidiary accounts to their control accounts in the general ledger to ensure that they balance.
    Required: Discuss any control weaknesses and risks associated with the accounting information system of A2A Limited. [7 Marks. Word Limit: Up to 400 words]
    ANSWER:
    Question 6 (7 marks)
    You have been working in the accounting department of AAA Limited since 2000. During this period, you have performed various roles, including:
  6. Evaluating the purpose and role of accounting information systems in achieving the overall objectives of the organisation,
  7. Articulating the various transaction cycles, financial reporting, management reporting systems and ecommerce systems to technical and non-technical stakeholders,
  8. Evaluating systems development methodologies and the role of accountants in system development projects,
  9. Appraising the risks inherent in computer-based systems/ERP, including the role of ethics and the various internal control processes that need to be in place, and
  10. Critically evaluating the range of cultural, security, privacy and ethical issues.
    Recently, you joined another company for a senior role as a chief information officer. You are excited to perform this senior role. David is the chief executive officer (CEO) of your organisation, and he is excited to implement an Enterprise Resource Planning (ERP) system. Recently, your CEO has met with a consulting ERP firm based on a friend’s recommendation at his club. During a recent meeting, David invited the chief consultant who is charming, personable, and seemed very knowledgeable. The CEO’s first instinct was to sign a contract with the consultant, but he decided to hold off until he had received your input.
    Required: David wants your opinion on this issue. In particular, he asked you to write a memo presenting the issues and the risks associated with consultants. Your discussion should be based on the relevant, interactive tutorial. Further, outline a set of procedures that could be used as a guide in selecting a consultant. [7 Marks. Word Limit: Up to 200 words]
    ANSWER:
    END OF TUTORIAL ASSIGNMENT
    Submission instructions:
    • Save submission with your STUDENT ID NUMBER and UNIT CODE e.g. EMV54897 HI5019
    • Submission must be in MICROSOFT WORD FORMAT ONLY
    • Upload your submission to the appropriate link on Blackboard
    • Only one submission is accepted. Please ensure your submission is the correct document.
    • All submissions are automatically passed through SafeAssign to assess academic integrity
Categories
Writers Solution

STRATEGIC INFORMATION SYSTEMS FOR BUSINESS AND ENTERPRISE


TUTORIAL ASSIGNMENT
TRIMESTER T2, 2021
Assessment Weight: 50 total marks
Instructions:
• All questions must be answered by using the answer boxes provided in this paper.
• Completed answers must be submitted to Blackboard by the published due date and time.
Submission instructions are at the end of this paper.
Purpose:
This assessment consists of six (6) questions and is designed to assess your level of knowledge of the key topics covered in this unit

Adapted Harvard Referencing
Holmes has now implemented a revised Harvard approach to referencing:

  1. Reference sources in assignments are limited to sources which provide full text access to the source’s content for lecturers and markers.
  2. The Reference list should be located on a separate page at the end of the essay and titled: References.
  3. It should include the details of all the in-text citations, arranged alphabetically A-Z by author surname. In addition, it MUST include a hyperlink to the full text of the cited reference source.
    For example;
    P Hawking, B McCarthy, A Stein (2004), Second Wave ERP Education, Journal of Information Systems Education, Fall, http://jise.org/Volume15/n3/JISEv15n3p327.pdf
  4. All assignments will require additional in-text reference details which will consist of the surname of the author/authors or name of the authoring body, year of publication, page number of content, paragraph where the content can be found.
    For example;
    “The company decided to implement an enterprise wide data warehouse business intelligence strategies (Hawking et al, 2004, p3(4)).”

Non – Adherence to Referencing Guidelines
Where students do not follow the above guidelines:

  1. Students who submit assignments which do not comply with the guidelines may be required to resubmit their assignments or incur penalties for inadequate referencing.
  2. Late penalties will apply per day after a student or group has been notified of a resubmission requirements.
    • Students whose citations are identified as fictitious will be reported for academic misconduct.
    Note. References are not mandatory for this assessment. However, please follow the Adaptive Harvard Referencing guidelines if you use any reference(s) to explain any concept or theory.
    Question 1 (11 marks)
    The role of internal audit is to provide independent assurance that an organisation’s risk management, governance and internal control processes are operating effectively. ABCD Limited is concerned about its Internal Audit (IA) function. Recently, ABCD Limited is expanding and reorganizing its Internal Audit (IA) function. Currently the Director of Internal Audit, Shuja Mehboob, reports to the corporate controller, who receives and reviews all internal audit reports. Mehboob forwards copies of the internal audit reports to the audit committee of the board of directors and to the manager directly responsible for the function being audited.
    An issue of contention among the management team pertains to which department or function the Director of Internal Audits should report. Martin Stevens the CEO wants to ensure that ABCD Limited complies with the SOX and that the internal audit department is structured such that it strengthens the company’s internal control system. Also, an overarching objective for the reorganized audit function is that the external auditors are able to rely on the work performed by the internal audit department to a substantial degree. Arguments put forth by interested parties as to where the IA department should be organizationally located are presented below:
    Chief Operations Officer (COO). Robert, the COO of ABCD Limited, believes that the Director of IA should report to him. Under this arrangement the IA staff members would be involved in the preparation of policy statements on internal control regarding safeguarding of assets and in the design of business processes.
    Chief Information Officer (CIO). Marry, the CIO, has pushed hard to have the IA function report to him and take on an active role in the design, installation, and initial operation of a new computerized systems. IA staff will be primarily concerned with the design and implementation of internal accounting controls and conduct the evaluation of these controls during the test runs and audits.
    Corporate Controller. The controller Bailey Eder, believes the IA group should remain within her functional area. Currently the IA staff performs a number of controller related tasks. These include:
    o Internal auditors reconcile bank statements of the corporation each month. The controller believes this strengthens the internal control function because the internal auditor is not involved in either the receipt or the disbursement of cash.
    o Internal auditors review the annual budget each year for relevance and reasonableness before the budget is approved. At the end of each month, the controller’s staff analyzes the variances from budget and prepares explanations of these variances. These variances and explanations are then reviewed by the internal audit staff.
    o Lastly, the internal auditors make accounting entries for complex transactions when employees of the accounting department are not adequately trained to handle such transactions. The controller believes this gives an added measure of assurance to the accurate recording of such transactions.
    Required: We have discussed internal audit independence during our interactive tutorials. Your answer should be based on our discussion. Please answer the following questions.
    a) For each of the proposed tasks to be performed by the IA function, explain whether ABCD Limited’s internal audit independence will be materially impaired. For this explanation, consider each manager’s arguments independently. [6 Marks. Word Limit: Up to 300 words]
    b) To maintain independence, where should the Director of Internal Audits report? Explain your answer. [5 Marks. Word Limit: Up to 200 words]
    ANSWER: ** Answer box will enlarge as you type
    Question 2 (11 marks)
    Richard has been a highly regarded employee of the Brier Corporation for almost 20 years. Her loyalty to the company is reflected in her dedication to her job as general accounting clerk from which she has not taken a vacation in almost 12 years. Because of her dedication and long tenure, she has acquired many related responsibilities, which has allowed the Brier Corp to reduce its work force through attrition, control salary expenses and become more efficient and competitive. The following describes Richard’s responsibilities.
    Richard receives copies of credit sales orders from the sales department. From these documents she accesses the AR subsidiary ledger from her office computer and records the AR. She then records the sale in the sales journal and posts the transactions to the general ledger accounts. Cash receipts in payment of customer AR come directly to her office. She records the cash receipts in the GL cash and AR accounts and updates the AR subsidiary ledger. She then endorses the checks “for deposit only” and deposits them in the bank at the end of each day.
    Required:
    a. Identify any control problems in the procedures described above. [3 Marks. Word Limit: Up to 200 words]
    b. Based on the control problems identified above, what sorts of fraud are possible in this system? [4 Marks. Word Limit: Up to 200 words]
    c. What controls are needed to reduce the risk of fraud? [4 Marks. Word Limit: Up to 200 words]
    ANSWER:
    Question 3 (7 marks)
    Paul Williams recently joined XYZ2 Limited as the head of accounting department. Williams spent the first few weeks to analyse the account information system. Based on this analysis, Williams is concerned about the purchase system of XYZ2 Limited. Here is the details of purchase system.
    The purchasing agent of XYZ2 Limited periodically checks inventory levels from a computer terminal, which is connected to a central accounting system. The agent searches the inventory file for items that need to be ordered. He then selects a supplier, prints a hard copy of the purchase order, and mails it to the vendor. The clerk files one copy of the PO in the department and sends a second copy to the AP Clerk. When the inventories arrive at the receiving department, a receiving clerk reconciles the items with the packing slip, inspects them for condition, and manually prepares a three-part receiving report. The clerk sends one copy to the purchasing department to close out the open PO, files one copy along with the packing slip in the receiving department, and sends one copy with the inventory to the warehouse.
    In the purchase system, account payable clerk performs some key roles. When the accounts payable clerk receives a hardcopy invoice from the vendor, she reconciles the invoice with the purchase order, records the liability in the AP Subsidiary Ledger from the terminal in her office, and assigns a due date for payment. The warehouse clerk receives the inventory, reconciles it with the receiving report, and updates the inventory subsidiary ledger from a terminal in the warehouse.
    Required: Describe the uncontrolled risks in the system of XYZ2 Limited. Against each identified risk, describe the physical controls needed to reduce the risks. [7 Marks. Word Limit: Up to 600 words]
    ANSWER:
    Question 4 (7 marks)
    Part (a). During the week 10 and 11, we have discussed different feasibility studies, including technical, economic, legal, operational and schedules feasibility. Based on this discussion, elaborate cost-benefit analysis as it is performed in the economic feasibility. [4 Marks. Word Limit: Up to 200 words]
    Part (b). The system experts perform the design and implementation phases of the system development life cycle. However, the accountant’s role in these phases cannot be ignored. Comment on the statement. [3 Marks. Word Limit: Up to 150 words]
    ANSWER:
    Question 5 (7 marks)
    Miss Anglea recently joined A2A Limited as an accounting clerk. As a part of financial reporting process, she receives the following source documents to prepare journal vouchers for general ledger entries.
  3. purchase orders,
  4. sales invoices, and
  5. vendor invoices
    At the end of each day, Angela posts the journal vouchers to the general ledger and the related subsidiary ledgers. Each month the clerk reconciles the subsidiary accounts to their control accounts in the general ledger to ensure that they balance.
    Required: Discuss any control weaknesses and risks associated with the accounting information system of A2A Limited. [7 Marks. Word Limit: Up to 400 words]
    ANSWER:
    Question 6 (7 marks)
    You have been working in the accounting department of AAA Limited since 2000. During this period, you have performed various roles, including:
  6. Evaluating the purpose and role of accounting information systems in achieving the overall objectives of the organisation,
  7. Articulating the various transaction cycles, financial reporting, management reporting systems and ecommerce systems to technical and non-technical stakeholders,
  8. Evaluating systems development methodologies and the role of accountants in system development projects,
  9. Appraising the risks inherent in computer-based systems/ERP, including the role of ethics and the various internal control processes that need to be in place, and
  10. Critically evaluating the range of cultural, security, privacy and ethical issues.
    Recently, you joined another company for a senior role as a chief information officer. You are excited to perform this senior role. David is the chief executive officer (CEO) of your organisation, and he is excited to implement an Enterprise Resource Planning (ERP) system. Recently, your CEO has met with a consulting ERP firm based on a friend’s recommendation at his club. During a recent meeting, David invited the chief consultant who is charming, personable, and seemed very knowledgeable. The CEO’s first instinct was to sign a contract with the consultant, but he decided to hold off until he had received your input.
    Required: David wants your opinion on this issue. In particular, he asked you to write a memo presenting the issues and the risks associated with consultants. Your discussion should be based on the relevant, interactive tutorial. Further, outline a set of procedures that could be used as a guide in selecting a consultant. [7 Marks. Word Limit: Up to 200 words]
    ANSWER:
    END OF TUTORIAL ASSIGNMENT
    Submission instructions:
    • Save submission with your STUDENT ID NUMBER and UNIT CODE e.g. EMV54897 HI5019
    • Submission must be in MICROSOFT WORD FORMAT ONLY
    • Upload your submission to the appropriate link on Blackboard
    • Only one submission is accepted. Please ensure your submission is the correct document.
    • All submissions are automatically passed through SafeAssign to assess academic integrity

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services STRATEGIC INFORMATION SYSTEMS FOR BUSINESS AND ENTERPRISE

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Develop an Operating Systems Design Document with your proposal for an enterprise that you selected by looking at emerging technologies and architectures to see how they might support future requirements

Key Assignment

Project: You will finish your Key Assignment project in this last week, which was to develop an Operating Systems Design Document with your proposal for an enterprise that you selected by looking at emerging technologies and architectures to see how they might support future requirements.

In the previous 4 weeks, you were first asked to select a real or fictitious enterprise that plans to upgrade its operating systems for movement to a distributed and virtual environment. Each week, you contributed with proposals for particular components of the operating system that culminated in an overall Key Assignment operating systems design report as follows:

Part 1 Tasks (Objectives from Week 1–4):

Week 1: Description of the enterprise operating system’s overall technical challenge and the proposed solution as it relates to the processor and core in a distributed environment

Week 2: Description of the proposed solutions as they relate to scheduling algorithms

Week 3: Description of the proposed solution as it relates to an operating system concurrency mechanism

Week 4: Identification of security risks and mitigation strategies to deal with the risks

Part 2 Tasks (Objectives for Week 5):

finally, you are given the assignment to explore emerging computing technology and computer system architectures to assist you in making recommendations on how to extend present operating system functions to support new requirements. This is your final assignment, which is a proposal based on what you perceive are the present operating system challenges as well as near future challenges for the enterprise you selected.

The project deliverables are the following:

Update the Operating Systems Design Document title page with the new date and project name.

Update the previously completed sections based on instructor and peer review feedback.

Add the following new content:

Future considerations using emerging technology

Identify and describe at least 3 emerging technologies or architectures that have the potential for supporting future requirements.

Discuss the specific current or future enterprise strategic requirements that could benefit from the emerging technologies

Discuss the potential benefits for adopting these emerging technologies.

Name the document “YourName_CS_IP5.doc.”

Submit the document for grading.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Develop an Operating Systems Design Document with your proposal for an enterprise that you selected by looking at emerging technologies and architectures to see how they might support future requirements

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

The company decided to implement an enterprise wide data warehouse business intelligence strategies

Unit Title Managerial Accounting
Assessment Type Individual Assignment
Assessment Title Reflective Report
Purpose of the assessment (with ULO Mapping) The purpose of this assessment is to ensure each student is able to provide a critical reflection of their personal learning process, as it relates to fulfilling the learning outcomes of this unit. (ULO 1, 2 and 4).
Weight 10% of the total assessments
Total Marks 10
Word limit 1,000 words. Please use “word count” and include the word count in the assignment cover page.
Submission Guidelines • All work must be submitted on Blackboard by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, no spacing, 12-pt Arial font and 2 cm margins on all four sides of your page with appropriate section headings and page numbers.
• It is the responsibility of the student who is submitting the work, to ensure that the work is, in fact, her/his own work. Incorporating another’s work or ideas into one’s own work without appropriate acknowledgement is an academic offence. Students should submit all assignments for plagiarism checking on Blackboard before final submission in the subject. For further details, please refer to the Unit Outline and Student Handbook.
Adapted Harvard Referencing
Holmes has now implemented a revised Harvard approach to referencing:

  1. Reference sources in assignments are limited to sources which provide full text access to the source’s content for lecturers and markers.
  2. The Reference list should be located on a separate page at the end of the essay and titled: References.
  3. It should include the details of all the in-text citations, arranged alphabetically A-Z by author surname. In addition, it MUST include a hyperlink to the full text of the cited reference source.
    For example:
    Hawking, P., McCarthy, B. and Stein, A. (2004), Second Wave ERP Education, Journal of Information Systems Education, Fall,
    http://jise.org/Volume15/n3/JISEv15n3p327.pdf
  4. All assignments will require additional in-text reference details which will consist of the surname of the author/authors or name of the authoring body, year of publication, page number of contents, paragraph where the content can be found.
    For example,
    “The company decided to implement an enterprise wide data warehouse business intelligence strategies (Hawking et al, 2004, p3(4)).”
    Non – Adherence to Referencing Guidelines Where students do not follow the above guidelines:
  5. Students who submit assignments which do not comply with the guidelines may be required to resubmit their assignments or incur penalties for inadequate referencing.
  6. Late penalties will apply per day after a student or group has been notified of a resubmission requirement.
    • Students whose citations are fake will be reported for academic misconduct.
    Individual Reflective Report Specifications
    Assignment Task:
    In this reflective report, you will be discussing about your learning experience in this unit, the relevance of the unit material and assessments in the unit to your understanding of management accounting in general, and your understanding of how management accounting concepts and techniques assist managers in making decisions to real world business problems.
    Specifically, you are to provide reflections or comments on each of the following:
  7. Comment on what knowledge you have gained about managerial accounting and how will it be useful to you in your future? (4 marks)
  8. Comment on what you learned from the individual assignment. What was interesting, what was challenging and what did you learn from it? (3 marks)
  9. Comment on what you learned about the various management accounting concepts and techniques that will assist managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you learn from it? (3 marks)
    Assignment Structure:
    The reflective report should include the following components:
    a. Assignment Cover Page clearly stating your name and student number b. Table of contents
    c. A brief introduction or overview of what the assignment is about
    d. Body of the assignment with the written answers
    e. Conclusion
    f. List of References (if applicable) – follow the Holmes Adapted Harvard Referencing guidelines on pg. 1-2.
    Marking criteria:
    Marking criteria Weighting
  10. Comment on what knowledge you have gained about managerial accounting and how will it be useful to you in your future? 4%
  11. Comment on what you learned from the individual assignment. What was interesting and what did you learn from it? 3%
  12. Comment on what you learned about the various management accounting concepts and techniques that will assist managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you learn from it? 3%
    TOTAL Weight 10%
    Academic Integrity
    Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Sills link on Blackboard.
    Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
    Table 1: Six categories of Academic Integrity breaches
    Plagiarism Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism.
    Collusion Working with one or more other individuals to complete an assignment, in a way that is not authorised.
    Copying Reproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offence.
    Impersonation Falsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination.
    Contract cheating Contracting a third party to complete an assessment task, generally in exchange for money or other manner of payment.
    Data fabrication and falsification Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images.
    Source: INQAAHE, 2020
    Marking Rubric
    Excellent Very Good Good Satisfactory Unsatisfactory
    Comment on what knowledge you have gained about managerial accounting and how will it be useful to you in your future? (4 marks) (3.6 – 4 marks) Excellent comments on what knowledge you have gained about managerial accounting and how will it be useful to you in your future. (2.9 – 3.5marks) Very good comments on what knowledge you have gained about managerial accounting and how will it be useful to you in your future. (2.1 – 2.8 marks)
    Good comments on what knowledge you have gained about managerial accounting and how will it be useful to you in your future. (1.6 – 2 marks) Reasonable comments on what knowledge you have gained about managerial accounting and how will it be useful to you in your future. (0 – 1.5 mark) Unable to present proper comments on what knowledge you have gained about managerial accounting and how will it be useful to you in your future, or is confusing.
    Comment on what you learned from the individual assignment. What was interesting and what did you learn from it? (3 marks) (2.1 – 3 marks) Excellent comments on what you learned from the individual assignment. What was interesting and what did you learn from it. (1.9 – 2 marks) Very good comments on what you learned from the individual assignment. What was interesting and what did you learn from it. (1.6 – 1.8 marks)
    Good comments on what you learned from the
    individual assignment. What was interesting and what did you learn from it. (1.1 – 1.5marks) Reasonable comments on what you learned from the individual assignment. What was interesting and what did you learn from it. (0 – 1 marks) Unable to present proper comments on what you learned from the individual assignment. What was interesting
    and what did you learn from it, or is confusing.
    Comment on what you learned about the various management accounting concepts and techniques that will assist managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you
    learn from it (3 marks) (2.1 – 3 marks) Excellent comments on what you learned about the various
    management accounting concepts and techniques that will assist
    managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you learn from it.
    (1.9 – 2 marks) Very good comments on what you learned about the various
    management accounting concepts and techniques that will assist
    managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you
    learn from it
    (1.6 – 1.8 marks)
    Good comments on what you learned about the various
    management accounting concepts and techniques that will assist
    managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you learn from it
    (1.1 – 1.5marks) Reasonable comments on what you learned about the various
    management accounting concepts and techniques that will assist
    managers in making decisions to real world business problems. What concepts and techniques you found interesting and what did you
    learn from it
    (0 – 1 marks) Unable to present proper comments on what you learned about the various
    management accounting concepts and techniques that will assist
    managers in making decisions to real world business problems. What concepts and techniques you found interesting
    and what did you learn from it, or is confusing.
    Total Marks (10) /10

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services The company decided to implement an enterprise wide data warehouse business intelligence strategies

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Relational databases, Enterprise Risk Management, Pervasive Controls, and Business Process and Controls.

For this discussion, you will find an article in a scholarly journal dealing with items from the reading of chapters from chapter 5 to 15 of the textbook (Gelinas, Dull, Wheeler, & Hill: Accounting Information Systems (11th ed.). Topics include Relational databases, Enterprise Risk Management, Pervasive Controls, and Business Process and Controls. Then, you will write a summary on this article. 

Thread of at least 1000 – 2000 words.

Must support their assertions with at least 4 scholarly citations, and biblical references as applicable, in current APA format

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Relational databases, Enterprise Risk Management, Pervasive Controls, and Business Process and Controls.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

understanding and knowledge of enterprise systems principles

Assignment 1: Industry Analysis and Report
Submission: Please submit this assignment to provided links in Canvas
Type: Individual
Value: 30% of the total mark
Word Limit 2500 ± 10% words (excluding references)
Aim:
The assignment is designed to demonstrate your:
• understanding and knowledge of enterprise systems principles
• understanding of issues that contribute to current debates in enterprise systems
• use of analytical skills in reviewing academic and practitioners’ sources
• ability to draw meaningful conclusions from your research
Industry Research and Analysis
Read the following case study about the Southern Cross Travel Agency (SCTA) company.
You are required to:

  1. Analyse the case study, identify the problems and opportunities for the company in the case study and create a needs assessment.
  2. Market Assessment: Critically review some possible and suitable Cloud ERP solutions. Collect data about different Cloud ERP vendors (8-10) that you believe could be suitable for the company in the case study and research their ERP products. You may base your argument on following criteria:
    o Point(s) of difference (how is the product different from other vendors?) o Niche market (if any, and do they target a particular market?) o ERP services (what ERP services does the suite offer?) o What sized organisations are supported by this suite/solution?
    o Business Continuity (does the vendor offer any plan for business continuity during a crisis (for example, during the COVID-19 pandemic)?
    o Analytics (does the product provide Analytics features or services?) o And other dimensions/criteria that you could use in order to make your argument richer
  3. Recommendation: Recommend the product that is the most suitable for the company to address its challenges and requirements. Clearly explain how the selected product does this. You should draw on your analysis in step 2 to help justify and support your recommendation.
    In your report, you need to use quality references to argue that your choice of ERP is a suitable solution(s) for problems identified in the case study.
    Your arguments should make explicit links between the technological and organisational solutions of the ERP of your choice, and the short and long-term requirements of SCTA. For instance, issues like the efficiency of the business processes, business continuity, security, and running costs are important issues to be considered. At the end of your report, you should offer relevant recommendations to SCTA. You can also make assumptions wherever needed, for prices, after-sales support, etc.
    Case Study: Travelling in the time of the global pandemic
    The international tourism industry is taking a major hit as COVID-19 circulates into more countries – and fear about it – spreads across the world. Governments around the world have warned and continue warning would-be travelers to stay away from outbreak hotspots, and in some cases, enacting travel bans to forbid travelers from going to high-risk areas. Photos of empty tourist destinations around the world, emptied-out festivals, vacant churches and temples, and quarantined luxury hotels – show the impact of the coronavirus outbreak on the tourism industry has been devastating.
    A new report from consulting firm Tourism Economics has put some estimated numbers to this ravaging situation. The report suggests that for example, it expects the US economy to lose over 3.5 million visitors from Asian countries, translating to a 38% drop for 2020. The report also estimates that around the same number of tourists will not be visiting countries like Australia and New Zealand. The report tallied expected losses from the Asian visitors spending at $US35.7 billion – more than half of which are expected to occur this year.
    Venice Carnival was cancelled because of the coronavirus. Venice, Italy, February 23, 2020. Source: Reuters.
    In such a tough and uncertain business climate, many companies who are involved in tourism are seeking reliable ways of accessing accurate information about their operation and the state of COVID-19 and its impact around the world. Many of them are exploring new ways to redesign their business processes and make them more efficient and cheaper. One of the Australian based companies that also has been affected by the spreads of the coronavirus is the Southern Cross Travel Agency (SCTA) company.
    Empty streets of the Naviglio Grande canal in Milan, Italy, on February 24, 2020.
    Source: AP
    SCTA was established in 2002 and since then has enjoyed steady growth in Australia and the neighbouring countries. As a result, currently, the company has multiple offices across the Australasia region. Its corporate headquarters are in Melbourne but it has more than 10 offices across Australia and 5 in China, 2 in Vietnams, 2 in New Zealand, 2 in Indonesia, 2 in Thailand, 2 in Malaysia and 1 in Nepal. It employs 400 employees and annual sales of $240 million. The company’s administrative structure consists of departments for Sales and Marketing, Human Resource Management, Operations, IT, Research and Development,
    Accounting and Finance, and Public Relations. SCTA offers first-class and affordable holiday
    5
    experiences, mostly to international students and their families. SCTA initially had a manual booking system in each office, but changes and advances in technology have enabled SCTA to transform its business by using an online booking and communication system in 2010. However, the current system can only perform basic functionalities of maintaining current listings of the resorts (uploaded as a PDF file) and student enquiries. Further, during the upgrade the company experienced project delayed and budget overturn. This experience made the company’s board of director hesitate to implement new system.
    However, the general manager of SCTA is aware that the company needs to have a better comprehension of the current business environment and it is clear that the existing system does not provide them with necessary functionalities that enable them to capture and analyse different types of information from their geographically distributed offices. At the moment, different departments in order to satisfy their own needs, tried to develop their own systems or databases to facilitate their work- this is known as “feral or shadow systems”. A lack of trust in the ERP, ineffective training methods and complexity in extracting the data from the ERP were identified as a problem which lead to the development of “Feral Systems” (Kerr, 2007). This causes reductions in the effectiveness and accuracy of business analytics such as data mining and forecasting.
    Furthermore, SCTA not only needs to enhance their current system to promote their business but also needs to inform their clients and partners (resorts, airlines, hotels, Airbnb) about the latest developments concerned with the spread of COVID-19. In a recent board meeting, it was discussed that different types of information should be gathered, analysed, and shared with clients and partners to enhance the travel safety and experience of their clients before, during and after the trip.
    In addition, at this stage, SCTA‘s main clients are international students. However, with the emergence of new challenges, SCTA has to diversify its clients and offer new services. This change demands the provision of further information to different groups of new stakeholders. The current system does not provide expandable functionalities for making timely and multi-way communications with new clients and partners during and after trips.
    SCTA also wants its partners to be able to update all their information online.
    (End of the case study)
    Some guidelines
    The report is to be written to reflect your understanding of enterprise systems. It is up to you as to what aspects, issues or arguments you put forward, but they must be relevant to the enterprise systems field, and they must be grounded in current literature. The report is a piece of academic writing, and all claims and assertions must be adequately substantiated with appropriate evidence. Thus, you are expected to use other literature and references, preferably from other journal papers, to substantiate and justify your arguments.
    All sources used in the report must be appropriately cited and referenced. The research report must be critical and relevant academically, and where appropriate, it should indicate implications for practice. If you are unsure how to write a report, please consult with the resources that are available in the library.
    Please be aware of the plagiarism and collusion policies established by Swinburne University.
    Submission Requirement:
    All students must agree to the Declaration and Statement of Authorship. In addition, students should also be aware of the plagiarism and collusion policies established by FBL and Swinburne University of Technology. Links to this policy are in the Unit Outline.
    Extensions:
    Links to the extension policy are in the Unit Outline. Please note that any request for an extension on or after the due dates will not be considered.
    Assessments
    A detailed assessment guide will be available on Canvas. In general, the assessment criteria will be based on
    • The originality of the work
    • Clarity of the analysis
    • Ability to synthesise ideas and literature, and reflect on relevant issues in enterprise systems
    • Depth and breadth of your analysis and reflections
    • Use of current literature
    • Relevance of references
    • Layout, structure, spelling, etc. and adherence to style guides
    • Adherence to citation and reference standards

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services understanding and knowledge of enterprise systems principles

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Enterprise risk management, a primary element is the business continuity plan (BCP)

Project 3: Business ContinuityStart Here

In the process of enterprise risk management, a primary element is the business continuity plan (BCP), which consists of steps to continue operations should a worst-case scenario event take place. Your work on vulnerabilities, threats, and risk in the first two projects will support this.

The BCP assignment will detail the following elements:

  • resources required and defined stakeholder roles
  • business impact analysis
  • recommended preventative controls
  • recovery strategies
  • contingency plan that includes implementation and maintenance guidelines and defined procedures for testing the plan

Grades are determined on the ability to clearly articulate a developed, effective business continuity plan that considers relevant environmental factors and aligns with organizational objectives.

This is the third of four sequential projects. There are 13 steps in this project. Begin below to review your project scenario.

Transcript

Competencies

Your work will be evaluated using the competencies listed below.

·         1.4: Tailor communications to the audience.

·         2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

·         9.1: Continuity Planning and Implementation: Develop, implement, and maintain a business continuity plan, ensuring alignment with organizational goals and objectives.

Step 1: Review Assigned Organization

The process of business continuity planning addresses the preservation and recovery of business in the event of outages to normal business operations. The output of the process is the business continuity plan (BCP), an approved set of documented arrangements and procedures that enables an organization to facilitate the recovery of business operations, minimize losses, and replace or repair incurred damages as quickly as possible (Ouyang, n.d.).

According to the National Institute of Standards and Technology’s Special Publication 800-34, Contingency Planning Guide for IT Systems, business continuity planning is an ongoing task, the goals of which are to (Ouyang, n.d.):

  • sustain operations
  • recover and resume operations
  • protect assets

 SHAPE  \* MERGEFORMAT

Goals of the BCP Cycle

In the case of your particular organization (use the one assigned to you in CMP 610 or another organization of your choice), the company may have an existing BCP. However, in your organization, as with many others, the BCP was written, put on the shelf, and rarely, if ever, referenced unless an emergency required implementation.

Knowing this, conduct operations as if there were no existing plan and create a new plan.

The next step will involve planning for the BCP, including establishing a need and defining a scope.

References

Ouyang, A. (n.d.). CISSP common body of knowledge: Business continuity & disaster recovery planning domain. http://opensecuritytraining.info/CISSP-9-BCDRP_files/9-BCP+DRP.pdf

Step 2: Define the Scope

In the first step, you reviewed BCP methodologies. You are now ready to continue the first part of the planning process, which involves establishing the need for a BCP and defining an appropriate scope for the company outlined in the scenario.

The BCP should address aspects of business continuity, business recovery, contingency planning, disaster recovery, and related activities. Focus on those elements that are adequate and expedient, based on your risk assessment for the enterprise.

Governmental agencies are required to develop an enterprise continuity of operations program (COOP). A COOP is a detailed framework that documents how the agency will ensure that essential functions continue through an emergency situation until normal operations can resume. Outside of federal, state, and local government, enterprises call that kind of framework a BCP. Both COOPs and BCPs are created to help organizations recover from disasters.

Consider what aspects of business continuity the BCP will address, such as business recovery, contingency planning, and disaster recovery. Submit a brief description for feedback (one page or less) of the topic areas to be covered in the BCP.

Submission for Project 3: BCP Scope

Previous submissions

0

Top of Form

Drop files here, or click below.

Add Files

Bottom of Form

In the next step, you will use a risk management framework to put together a business impact analysis.

Step 3: Conduct a Business Impact Analysis

You’ve defined the scope for the BCP. Next, use an established risk management framework to conduct a business impact analysis (BIA).

The BIA provides written documentation to assist Maria and the other executives in understanding the business impact should an outage occur. Such impacts may be financial, in terms of lost revenues and additional expenses; operational, in terms of inability to deliver products and services; or even intangible, in terms of damage to the organization’s reputation and loss of public confidence.

This analysis should include all departments and facilities of the enterprise, list what it would take for each to resume adequate operations to meet the needs of the enterprise, and must include each phase of the recovery activities.

Remember, a key element to “business impact” is the financial aspect. What will it “cost” to take a particular action and, equally important, what could be the “cost” of inaction?

Prioritization is a key to the successful recovery of operations. The sequence of activities is an essential element in your contingency planning.

Use the Business Impact Analysis Template and then upload your BIA here for feedback.

Submission for Project 3: Business Impact Analysis

Previous submissions

0

Top of Form

Drop files here, or click below.

Add Files

Bottom of Form

In the next step, you will take a look at needed resources and who will be responsible for meeting those needs.

Step 4: Identify Key Resources and Stakeholders

After the BIA, the next step is to identify the key resources necessary and the stakeholders (executives and management) responsible for those resources. Remember, some resources necessary for a successful BCP might be external to the company. Be sure to include these aspects in the plan.

Now that all resources and stakeholders are identified and listed, answer these two questions: What resources are needed? Who are the players?

Expand the table for the BCP by including a column for accountability. With an assumed and reasonable job title, make a list of probable stakeholders responsible for execution of each recovery effort. Clearly identify their respective responsibilities during the reactivation of business processes.

Use the Key Resources and Stakeholders Template to indicate key resources and stakeholders involved in the recovery for feedback.

Submission for Project 3: Key Resources and Stakeholders

Previous submissions

0

Top of Form

Drop files here, or click below.

Add Files

Bottom of Form

In the next step, you will look at what can be done to prevent or reduce the impact of a significant event.

Step 5: Consider Preventive Controls

After identifying the key stakeholders and resources, take a look at what can be put in place in advance to prevent or reduce risk. Based on previous research, plus what you have learned in the business impact analysis, what could be done to eliminate or minimize the impact of a major event? These are called preventive controls in the business process realm, or risk countermeasure implementation in technology language.

Either way, the BCP should contain controls that can be classified as measures taken in advance of a catastrophe that are designed to reduce the risk of a negative impact. In the process of itemizing the controls, make sure they are properly aligned with organizational goals and the strategic direction of the enterprise.

The preventative controls selected should be aligned with the organizational goals and strategies. You will list these controls in the next step.

Step 6: List Preventive Controls

In this step, you will write a description of the preventative controls that you considered in the previous step. These controls could eliminate or minimize the impact of a major event.

Upload a description of the preventative controls to be used in the BCP here for feedback.

Submission for Project 3: Preventive Controls List

Previous submissions

0

Top of Form

Drop files here, or click below.

Add Files

Bottom of Form

In the next step, you will conduct research on recovery strategies.

Step 7: Research Recovery Strategies

A BCP is uniquely different from a complete disaster recovery plan (DRP), neither of which is a small undertaking. Both are required to return the enterprise to 100 percent functionality. The view for the enterprise is to have one BCP that contains multiple DRPs generally broken into department or business function categories.

The BCP is an overarching strategic approach to getting any business back “in” business with all mandatory functionality as soon as possible after disaster strikes. This is why the previous steps and projects have required these elements to be identified and prioritized. As such, the BCP is not as detail-oriented as the DRP and only contains DRP requirements that are absolutely mandatory to get the business back in action at the earliest opportunity.

The DRP is usually more technical, very specific, and very much a necessity in today’s highly connected technology infrastructure. The DRP includes descriptions of data backup strategies, recovery sites, and postincident requirements.

There will naturally be several aspects of the rebuild that might not go exactly as planned. This exercise will be to demonstrate an ability to follow multiple paths in a decision tree environment. The objective will be to create a drawing or descriptive list that follows both options to each decision of “yes” or “no” or “success” or “failure” to the reconstructive effort.

Specifically, for each step, conclude with an answer to the question “was the action successful?” If “yes,” what is the next step? Or, if “no,” what is the alternative step to take next? Continue this process until you have successfully returned to operational status or determined you cannot reactivate under current circumstances. If the result of the plan is an inability to recover, the plan needs additional work to make it successful.

In the next step, you will document the selected recovery strategies.

Step 8: Document Recovery Strategies

Now that you have researched recovery strategies as they pertain to a BCP, list or map multiple strategic options to accomplish the recovery effort. Upload a description of the planned recovery strategies here for feedback.

Submission for Project 3: Viable Recovery Strategies

Previous submissions

0

Top of Form

Drop files here, or click below.

Add Files

Bottom of Form

When that is complete, move to the next step, where you will consider how the contingency plan will be implemented and maintained.

Step 9: Develop Implementation and Maintenance Procedures for the Contingency Plan

You’ve documented recovery strategies and are well on the way to completing the BCP. But writing a BCP is not enough. You must also have a clear plan for implementing and maintaining the BCP. Answer these questions:

  • What resources are needed?
  • Under what conditions, such as fire, natural disasters, occurrence of a terrorist attack, etc., will the BCP will be activated?
  • How will stakeholders be made aware of the policies and procedures of the BCP?
  • How will employees be trained on the plan? How often will training occur? Will there be a general training for all employees or role-based trainings for people in specific functional areas?
  • How/where will the plan for stored for safekeeping and accessibility when needed?
  • When and how will BCP maintenance reviews be scheduled?
  • How will updates and changes to the plan be handled? How often will the plan be updated?

In this step, begin to develop a strategy for how the BCP will be implemented and maintained. This information will be used in Step 11, in which the contingency plan will be documented. Next, you will develop testing procedures for the plan.

Step 10: Develop Testing Procedures for the Contingency Plan

You’ve begun to outline your strategy for how to implement and maintain a BCP. It is also important to conduct business continuity testing to evaluate the effectiveness of a preparedness program in practice. This will give insight into whether the parts of the preparedness program will work and can help identify aspects of the BCP that work on paper but are ineffective or impractical in reality.

Examples of BCP Tests

Types of Tests

Description

Structured walk-through

Step-by-step review of BCP plans with organization’s functional representatives

Checklist test

Functional representatives review BCP plans and check off the points that are listed to ensure concerns and activities are addressed

Simulation

A scenario-based practice execution of the BCP plans.

Parallel test

Operational test conducted at the alternate site(s).

Full interruption test

Full-scale operational test including shutdown of primary site and recovery of business operations at alternate site(s).

Source: Ouyang, A. (n.d.). CISSP common body of knowledge: Business continuity & disaster recovery planning domain. Used under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported license.

Taking time to develop, document, and test consistent processes and controls will also help you prepare for the annual audit of your information security system under any of the commonly used security and audit frameworks. Under these security and audit methodologies, auditors will gather information about the organization’s security systems, confirm that appropriate security measures are in place, and provide a report on their findings.

Now develop your strategy for how the BCP will be tested. Your plan will be included in the contingency plan to be submitted in the next step.

Step 11: Document the Contingency Plan

You’ve developed testing procedures. However, an effective BCP must outline how the plan will be implemented and maintained and also how it will be tested to ensure its viability in a real emergency situation. Therefore, an integral part of the BCP should be a discussion of plans for implementation and maintenance and for business continuity testing.

Upload your contingency plan with a description of how the BCP will be tested and plans for ensuring the proper implementation and maintenance of the plan here for feedback.

Submission for Project 3: Contingency Plan

Previous submissions

0

Top of Form

Drop files here, or click below.

Step 12: Consolidate and Update Your Work

You’ve documented testing and implementation procedures, and the plan is nearly complete. In the next step, you will submit your final BCP. Take some time now to update your work on the project to this point and make updates based on feedback received or new information uncovered.

In the final step, you’ll complete and submit the BCP.

Step 13: Write the Business Continuity Plan (BCP)

Use the results from the previous steps to create a five- to seven-page business continuity plan. Explain the thought process of creating the specific plan steps and how each is related to business strategy considerations.

Use this Business Continuity Plan Template to submit your final assignment.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

·         1.4: Tailor communications to the audience.

·         2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

·         9.1: Continuity Planning and Implementation: Develop, implement, and maintain a business continuity plan, ensuring alignment with organizational goals and objectives.

Submission for Project 3: Business Continuity Plan

Previous submissions

0

Top of Form

Drop files here, or click below.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Enterprise risk management, a primary element is the business continuity plan (BCP)

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Microsoft Dynamics 365 Enterprise resource planning (ERP).

Cybersecurity plan

Name

Institutional Affiliation

date

Cybersecurity Plan

1. Information System Name/Title:

· List 3 major systems that South Balance would have and assign a unique identifier and name given to the system.

System IDSystem Description
SB-12012489Microsoft Dynamics 365 Enterprise resource planning (ERP). This system is an amalgamated procedure of collecting and systematizing data through an incorporated software suite. The ERP system comprises applications for smoothing South balance’s functionalities across all departments
SB- 12112421AT&T Wireless networks (WLAN). The company uses Local Area Network which is a computer network connecting all devices and computers within the firm’s building.
SB-12117832Gusto Payroll system. This system computes the amount of wages each worker is to be salaried centered on factors like hourly earnings, taxes, and other withholding sums.

2. Information System Categorization:

· For the 3 systems above, identify the appropriate FIPS 199 Availability categorization (place an X in the appropriate column). See the FIPS 199 document for definitions.

System IDLOWMODERATEHIGH
SB-12012489X
SB- 12112421X
SB-12117832X

3. Information System Owner:

· For the 3 systems above, identify the name and title of the system owner. In a real Security plan, this would also include agency, address, email address, and phone number.

System IDSystem Owner NameSystem Owner Title
SB-12012489Antonio Lazzeri. 115 Glann Rd Apalchin, New York (NY), 13874 Tel- (984) 895- 7997 Email- alazzeri@hotmail.comChief information officer
SB- 12112421Christian Ivanov 17 N Middleton Rd, New York (NY), 12867 Tel- (440)212-1784 Email- ivanova@gmail.comChief IT security, Science Soft Inc.
SB-12117832Louise Gehrig 4744 transit Rd Depew, New York (NY), 14123 Tel- (508) 739-8971 Email- gehriglouise@hotmail.comChief financial officer and vice president of finance

4. Assignment of Security Responsibility:

· For the 3 systems above, identify the name and title of the person responsible for the security of that system. In a real Security plan, this would also include address, email address, and phone number.

System IDSystem Owner NameSystem Owner Title
SB-12012489Walter Johnson. 103 S Railroad Ave Bronxville, New York (NY), 10708 Tel- (515) 127-1218 Email- walterjohnson@hotmail.comChief information security officer and director of IT security
SB- 12112421Lawrence Berra. 242 Hudson St Long Beach, New York (NY), 11462 Tel-(516)-107-2424 Email: berraL@ Hotmail.comDirector of IT operations
SB-12117832Mariana Rivera. 18 Willett Ave, New York (NY), 11575 Tel- 516) 108-2014 Email- riveramariana@hotmail.comDirector of finance

5. Information System Operational Status:

· For the 3 systems above, indicate the operational status of the system (place an x in the appropriate column).

System IDOperationalUnder DevelopmentMajor Modification
SB-12012489X
SB- 12112421X
SB-12117832X

6. Information System Type:

· For the 3 systems above, indicate if the system is a major application or a general support system. If the system contains minor applications, list them in Section 9. General System Description/Purpose.

System IDMajor ApplicationGeneral Support System
SB-12012489X
SB- 12112421X
SB-12117832X

7. General System Description/Purpose

· For the 3 systems above, describe the function or purpose of the system and the information it processes.

System IDDescription
SB-12012489The ERP system of South Balance has major application in amalgamating the company’s fiscal recording by incorporating financial data in one network. Also, the ERP interconnects order managing, thereby making order acquiring, inventory, dissemination, and bookkeeping a much effortless and less error-predisposed procedure. (Bjelland, E. (2020). The ERP systems can also be used as an overall support system in the procurement of products and raw materials and the human resource department for automated duty allocation and candidate selection. The ERP system process information on the financial stance of the firm, procurement and supplier’s data, accounting information, and supply chain data. Generally, the ERP will process data from divisions across all departments.
SB- 12112421The wireless LAN system serves as a router to enable faster and safer cableless communiqué between divisions in the office building. The staff can also use the system to access the internet for research and other work-related activities. WLAN systems do not really process data as it serves as a medium in which connected computers and devices send and receive signals and data.
SB-12117832The major role of the payroll system in South Balance company is to oversee the procedures of paying workers. The system is also responsible for the production and distributing pay-checks to appropriate persons. The system is also used for paying and filling occupation taxes and other subtractions such as mortgages, credits, and loans. (Rainer, R. K. (2020). The payroll system processes the employee information such as their names, social security numbers, addresses, particulars on current payment and contributions, and tax filing standing. The pay amount and regularity for every worker, their state and local tax reserving identification number are also processed by the payroll system.

8. System Environment

· For the 3 systems above, provide a general description of the technical system. Include the primary hardware, software, and communications equipment.

System IDDescription
SB-12012489The ERP used in south Balance is founded on the cloud and it enables the users to entree ERP software through the internet. The primary hardware needed for the implementation of cloud ERP includes computer servers used for storage and databases. The primary software needed is Microsoft Dynamics 365. Access point/base station is the type of communication equipment used in the ERP system. (Bjelland, E. (2020).
SB- 12112421The WLAN system uses microwave or radio transmission to convey data from one processor to another without wires. A WLAN consists of connections and access points. A node could be a peripheral or a computer having a system connecter or antenna. The access point or base station serves as transmitters and delivers data among the nodes or between the computers and the additional network. (Rainer, R. K. (2020).
SB-12117832The payroll system incorporates all things that go into waging and onboarding of the company’s workers. The system requires computers for data input and servers for information storage. The software utilized is the GUSTO payroll system. Communication equipment is the WLAN router.

11. Risk Assessment and Future Plan

• For the 3 systems above, provide a general description of overall cybersecurity risks. Include the primary hardware, software, and communications equipment.

System IDDescription
SB-12012489The computers and servers would be infected by malware through backdoors. Also, individuals with malicious intentions could obtain passwords to computers and would thereby manipulate or alter data in the servers. the software could be attacked by viruses, trojan, botnets, rootkits, and phasing attacks, which would result in a breach or data destruction. (Turner, L. (2020). When using an access point as communication equipment, online invaders might attempt to piggyback, shoulder surf, or use wireless sniffing to gain entree to the company data, which would be disastrous.
SB- 12112421WLAN networks are predisposed to unlawful admittance over network capitals such as wardriving, piggybacking, and evil-twin strikes, subsequent in susceptibility of confidential and private company data.
SB-12117832Viruses and worms could infect the hardware used by the payroll system thereby damaging or manipulating the data which would incur huge financial losses to the company. Also, the use of wireless routers as communication equipment predisposes the system to attacks such as shoulder surfing and wireless sniffing. (Turner, L. (2020).

12. Related Laws/Regulations/Policies

• For the 3 systems above, list any laws or regulations that establish specific requirements for the confidentiality, integrity, or availability of the data in the system.

System IDDescription
SB-12012489Sarbanes-Oxley Act encompasses obligations intended to aid businesses to avert financial reportage fraud.
SB- 12112421FCC rules, which are below title 47 of the code of national guidelines. Section 15 (47CFR15) outlines that when using computers or devices falling in the approved range, the user must register the computer or devices, conduct tests, and so on.
SB-12117832The company guidelines including pay strategy, benefits and leave policy, and attending policy must be adhered to when implementing this system.

13. Minimum Security Controls

· Provide 30 controls (of your choice) from the NIST 800-171 Security Controls documentation. Each one will be to cover all three of the above systems or, if control is specific to one of the three notate that in the control writeup. Copy and paste the below to provide all 30 controls.

NIST 800-171 Control Number:

Control Family:

NIST 800-53 Mapping:

Relevant 20 Critical Control:

Control Summary:

Implementation Status:

Immediate Action Plan (6 months):

Action Plan (12-24 months):

Long Range Action Plan (3-5 years):

References

Bjelland, E., & Haddara, M. (2018). Evolution of ERP systems in the cloud: A study on system updates. Systems6(2), 22.

Rainer, R. K., Prince, B., Splettstoesser-Hogeterp, I., Sanchez-Rodriguez, C., & Ebrahimi, S. (2020). Introduction to information systems. John Wiley & Sons.

Turner, L., Weickgenannt, A. B., & Copeland, M. K. (2020). Accounting information systems: controls and processes. John Wiley & Sons.

Tulane University – SOPA

CPST – 3900

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. bank robbery would be property theft of money
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

management enterprise system

IT Business Application Case Study Identify and describe a business problem with an IT solution from your work or personal experience. Are there any specific artificial intelligence (AI) applications that can be considered as part of the solution? If you don’t have specific personal experience, select 1 management enterprise system (MIS) solution with a specific use case. Then, answer the following questions: What have you identified as the existing business problem? What is your expected deliverable of the business process? What specific IT application did you identify to provide an effective solution? What are the specific features and benefits of the new IT application? How does the new application provide long-term support to the business process by maintaining data integrity in cases of disaster recovery and continuity planning? Submitting your assignment in APA format means, at a minimum, you will need the following: Title page: Remember the running head. The title should be in all capitals. Length: 5 pages minimum Abstract: This is a summary of your paper, not an introduction. Begin writing in the third person. Body: This begins on the page following the title page and abstract page and must be double-spaced (be careful not to triple- or quadruple-space between paragraphs). The typeface should be 12-pt. Times Roman or 12-pt. Courier in regular black type. Do not use color, bold type, or italics, except as required for APA-level headings and references. The deliverable length of the body of your paper for this assignment is 5 pages. In-body academic citations to support your decisions and analysis are required. A variety of academic sources is encouraged. Reference page: References that align with your in-body academic sources are listed on the final page of your paper. The references must be in APA format using appropriate spacing, hanging indent, italics, and uppercase and lowercase usage as appropriate for the type of resource used. Remember, the Reference page is not a bibliography but a further listing of the abbreviated in-body citations used in the paper. Every referenced item must have a corresponding in-body citation.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Get Professionally Written Papers From The Writing Experts 

One of the major existing problem that business experience as they grow from medium size to large size is the management of time as well as attendance of the workforce. As the size of the workforce grows, it becomes challenging to keep track of all the employees at any given time. For instance, it may not be humanly possible to identify the employees who came to work and those who were absent from work at any one given time when the workforce is huge. Moreover, it is not possible to notice employees who leave work earlier than expected or report to work later than expected. In addition, existing human resource laws require employers to account for and pay employees who work for overtime (Collins & Birkin, 2008). However, accounting for such overtime when the workforce is huge becomes a challenge. The overall impact of this is that employee productivity is greatly reduced.  Moreover, managing employees in a manner that reduces the cost of labor is equally a challenge.

There are several process deliverables that relate to the problem identified above. The first process deliverable is time management. It is important that…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………………………………………………………………………………………….management enterprise system

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

description of enterprise risk management.

 400 words

After reading below two articles and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

 Readings:

 Requirements: