Sunday, March 3, 2019

Ms2 Course Review

2013 Exam Review academic term CGA MS2 randomness Systems Strategy 1 schedule Agenda leave change as needed to suit your call for 2 pm Start. Introduction & Feedback Solicitation 210 230 Fundamentals of line of descent Case Analysis 230 345. Business Case Example/s Break 10 mins 355 5pm Review of key items from all modules 5pm Finish. 2 Nine- pervert uprise to case analysis Spend about 40% of your time on the case 90 minutes. 1. 2. 3. 4. 5. 6. 7. 8. 9. Skim the case. Read the case closely. Identify worrys, threats, and opportunities. meditate the data. Generate alternatives.Select the decision criteria. Analyze and evaluate the alternatives. fool a recommendation or decision. Determine Implementation steps & associated Risks. 3 Executive thick (3 marks) Objective of the report Key problems/threats/opportunities identified State Alternatives (briefly) Recommendations Include extent date & Implementation strategy Key Risk and mitigation (briefly) It shoul d fulfil as a Stand alone report REVIEW YOUR trip 4 Current Situation (10 marks) List some of the strengths/ strategical advantages Is in that respect an lively system? What is wrong? List & briefly explain the problems categorise them if possible Determine Root catch, if there is one single ca hire? Business fundamental shortcomings? Conflicts? Does the technology employ align / support the phone line model? Organizational misfits? Strategic misfits? 5 Current Situation contd What is the strike? Cost quantified in $$ Does it graceful current or future chore needs? intangible impacts Strategic Threats Opportunities Competitive Technological 6 Criteria (5 marks) What is Criteria?What is it used for? State it at a high level where you can range the criteria and show that you have through so. Explain wherefore you chose each measure Measuring each criterion? ($, grocery store sh be/Sales, other goals) Does it meet current or future business need s? $ savings Intangible benefits Strategic Threats Opportunities Competitive Technological 7 Alternatives & Recommendation (15 marks) Improvise & use your imagination (just be logical). Each alternative should be a mostly complete Solution. Each alternative should be feasible.Assess each alternative base upon the criteria show this analysis in your work. Other pros & cons (other than in the criteria) Alternatives dont have to be mutually exclusive. They can be a combining of the options identified. Why did you choose the recommended alternative/s? Benefits Explain how it achieves the objective/resolves the problem Limitations / risks 8 Alternatives & Recommendation (Continued) Make a recommendation (use a plus voice ) Do non just suggest something Do not swear it weakly or ambiguously I believe / In my opinion / My thoughts are Clearly recommend an action and explain what it is and why it fits the criteria. (if you have not already in the analysis). 9 Ri sk focus political platform (15 marks) Read Carefully the requirements of this section. Does it require an Implementation / Action excogitation as well? Narrative explanation Implementation Strategy/ speak to (at a high level)? As agreeptions / Requirements High level Risks, Ethical, Privacy issues? (Probability & Impact) relief Strategies Plan B Actual implementation steps and, within each step Step Risk if either and mitigation plan if any cartridge h elderlyer Lines / Time Frame / Schedule Detail Costs Responsibilities objectify Phases, if any short term, long term 10 Exam Review Session Go over Business Case Tonys Auto serve Inc. from 2010 June exam 11 Some multiple choice tips When functioning a authentic and false question on the Exam simply push through down complex sentences into smaller phrases. Each phrase has to be true or the entire sentence is false. And, for multiple choice questions try to answer the question before looking at the answer choi ces. Remember that a perfect answer may not be given as a choice.Choose the best answer. Source Certified Fraud Examiners (CFE) Exam Coach. 12 Strategic Alignment Look for IT Strategy to support Business strategy. IT to fork from competition IT to reduce costs IT to bring business promptly to market IT to create reinvigorated(a) markets / products IT to tie suppliers and customers 13 Porters five forces threat of revolutionary entrants bargaining power of customers bargaining power of suppliers threat of substitute products or services rivalry among existing competitors 14 Threat of New Entrants Mitigation Strategies High ledger entry cost. Equipment, buildings, infrastructure, etc. Mature Information Systems Expertise & intimacy Compete aggressively on Price Lock in departmentners for a competitive edge Brand recognition. Product Differentiation. Focus on a Market niche Operating Efficiencies Pace of change IT 16 Moores Law & Metcalfes Law Dropping price of computer terminal Dropping cost of processing (mips) Double the power all 18 months Metcalfes Law The value of the network is the square of the sum of the nodes. Therefore stick with popular technology 17 Strategic be after for IS How is intend done? Top Down / Strategic Analysis back end Up / Enterprise Analysis Scenario Planning / What if Analysis When is Planning done? Short Term Long Term Mergers & Acquistions Economic downturns As part of a Budgeting Exercise After a major disaster. 18 Planning Issues Scalability Capacity planning Standardization vs. differentiation Legacy systems Upgrade to new system or integrate with new technology but old core. 9 Total Cost of Ownership Hardware Software inductive reasoning Training Support Ongoing Maintenance & S/W Upgrades alkali costs Data Backups, Business Continuity, Insurance Downtime Space, Energy, credentials 20 half-dozen IT Decisions IT should not make 1. 2. 3. 4. 5. 6. How a great de al to spend Allocation amongst Business Processes Firm-wide IT capabilities How much IT Security & Privacy issues Blame over failure 21 IT memorial tablet 22 10. 3 OVERVIEW OF SYSTEMS DEVELOPMENT 23 Achieving Success in IS Projects distinctly defined goals excellent communication focus involvement definitive timelines Project management skills S. M. A. R. T Objectives. Why do they Fail? lose of taste of the desired results (imprecise targets) poor estimating techniques for budgeting and scheduling small, unadjusted schedule slippage, which cumulatively results in a major delivery delay lack of project management skills or leadership poorly trained analysts and programmers conflicting goals and objectives among the project squad members and users use of inappropriate software or hardware slits 25 Make Vs. Buy Issues Cost Specialized functionality Ability to integrate with other existing Systems Ability to change the s/w Maintenance / Service pressure Upda te / Upgrade Speed of delivery KNOWLEDGE Business vs. practise vs. Functional Responsibility vs. Control vs. Risk Conversion 27 double Pros Least risk of not meeting objectives Compare results to ensure nicety Gentle weaning off of the old system Resilient to errors. Cons gemination of effort Requires additional computing resources not possible in all(prenominal) situation 28 Pilot Pros Allows for a small, low risk, controlled test contend Allows for a Go-NoGo decision w/o large investment Limits happy chance & harm Helps overcome user resistance Cons Still Costly to agree 2 systems even if scaled down Results may not interpolate to full install Choice of Pilot site is critical 29 Phased Pros Incremental approach with functional Phase-in Allows for Phased Systems Development Allows time for orientation of the new technology Usually easier to manage the change Cons Still running 2 systems, Longer disruption 30 Direct Cutover Pros Quick Easy on r esource utilization (only 1 system running) Low cost Cons high-risk Requires full training & preparation Requires all hands on adorn for Implementation Causes spike in Help desk calls Creates disruption, uncertainty, confusion Errors can draw Business Loss / interruption 31Internet as a business tool Advantages Wider Market exposure New ways to communicate (text, voice, video) Economical (ISP, programming, Shipping) 24x7x365 Anywhere, Anytime glum loads work to the customer Convenient for the customer if well designed. Quick & Easy to update / Change Real time Consistent Information / Prices 32 Internet as a business tool Disadvantages Not everybody has vex & high speed Impersonal & not so synergistic No touch & feel of the goods Replacement for good business usage?Lack of consumer trust Legal challenges Socio-economic factors (availability of access) Privacy Challenges Groupware & Collaborative s/w MS NetMeeting / Communicator / Remote PC suppor t Rolling out s/w updates and self healing s/w IBM Lotus Notes & half mask EMC Documentum Virtual Meeting, avatars , e-Rooms (SDLC Project Mgmt) Private Cloud computing VPN Storage blank Applications Virtualization Data Warehousing Data Mining Business Intelligence s/w Strategic use of the Internet Cost Reduction Strategic Alliances Differentiation of products & services Customer Loyalty (custom mass production) Value gyves To take advantage of Internet Technologies Keep focused on Business Strategy (Internet doesnt compensate for bad or missing strategy) modify & Integrate your customer facing processes to enable self service wedge to evolving IT standards Rationale for E-Business Diminished Information Asymmetry Richness vs. Reach minify traffic costs Ways to Reduce Costs Customer self-importance serve Eliminate middle person Customer data entry Self research and reduced consultation time cut Staffing levels Reduced Re-work Streamlined communicatio n Faster 37 Securing online transactions The key issues in a transaction processing environment are identification (Who are you? ) authentication (How can I be sure you are who you say you are? ) authorization (What authority do you have to make whatsoever transaction you seek? ) privacy (How can we be sure our transaction is private? nonrepudiation (How can we each be assured that the other will not later deny the transaction? ). Benefits / Limitations of Networking Sharing Printers, Drives, Scanners, etc e-mail concentrate Administration Distribution of S/W, Policies, Patches, A/V Tracking, observe, Backing up data Remote repair & Support Groupware Limitations Cost, Security, Vulnerability 39 thickening Server Computing Centralized Computing Distributed Computing Advantages Data Security & Centralization Administration Off Loads processing to Clients Disadvantages extra complexity Cost 40 Advantages of Outsourcing cost savings through economies of sca le and arena infusion of cash through liquidation of computer assets facilitate change of data meat from cost centre to profit/ passing play centre ability to rapidly introduce new technology and access IT endowment fund Better Scalability focus on core competencies Allows an objective look at process improvement by O/S 41 Limitations of Outsourcing loss of direct managerial control difficulty in reversing decision outsourcers viability (financial strength, responsiveness, service, and so on) dilutes the strength of in-house staff Unique, one of a kind application support? Will key staff stay permanent or be rotated? vendor doesnt know your business lack of flexibility untenable long-term contracts fixed price versus service tradeoff requires skills in partnership management strategic factors Privacy issues Monitoring / Managing Outsourcers 42 Risk Mitigation Strategies Risk Assessment Restrict Physical access Log all visitors in/out Cameras, Card Read ers, Security Guards Alarms & monitoring Intrusion Detection Systems (network) Firewalls Restricted Network access Policies, signoff, and Security ken training 43 Risk Mitigation Strategies Cont Authentication (know, have, and are) Password Strategies, individual Sign-on, Pass Phrase Authorization (Open / need to know) Access invocation / revocation procedures Hiring / Firing / Promotion Segregation of Duties Adequate Supervision & Sign offs Monitoring, Logging, Reporting, and playacting on Information. 44 Good Luck 45

No comments:

Post a Comment