1、Consultation Paper for Crown Catering ServicesCase study Report for ICT Assessment Task 1Module Name: Information and Communication Technology in BusinessModule Code: F84W 35Assessment: Task 1Name: Liu LitaoClass: GTB 1SCN: 157052020Date: 11/18Table of Contents1.0 Introduction .22.1 Decision making
2、at strategic, tactical and operational .22.2 Three types of information system.32.3 Legislation governing management and handing of information.42.4 Three data communication systems.52.5 Benefits for Crown Catering Services .52.6 Treats and security procedures.62.7 Innovations.73.0 Conclusion .74.0
3、Reference .81.0 IntroductionThis report is to solve the problems the Crown Catering Services must face about Information and Communication Technology in Business(ICT) at the new age. The main problems are that the company was established in 2001. And they have some trouble because of out of date. So
4、 this report described the following points. The nature of the information required for decision making at strategic ,tactical and operational and its types of system is the first one. Then, legal aspects cannot be avoided. The original key point is the data communication systems. As for security, m
5、ust focus on the threats and the security procedures. Finally, the problem previously mentioned about out of date, is rely on innovation to solve.2.1 Decision making at strategic, tactical and operationalThere is a diagram as follow:The strategic level obtain the internal information about profitabi
6、lity and the external about market trends to make decision. Their decision can affect the whole organization. In the case study, the Crown Catering Services strategic level obtain that the companys work is inefficient, particularly in regard to its ICT systems. And they ask a consult to the company
7、to provide him with clear recommendations on the action.The tactical level obtain the internal information about variance analysis and the external about customers feedback. They decided the tactics to use. In the case, Conner Webster is in this level as its managing director. One major project that
8、 Conner is currently planning is a marketing survey project that will involve him working with a number of key personal in the Marketing Department.The operational level must know the information on hour by hour information update. In the internal way, they can get the information by their work proc
9、ess. And they can get the information by public data in the external way. In the case, the branches team leaders should carry out the plan of the project. Due to the need to complete this survey project in the most effective manner to allow results to be obtained quickly.2.2 Three types of informati
10、on systemManagement information systems employ information technology to collect and communicate all the information a company or institution uses to operate. Each department or function of an organization produces its own operational and financial data and as a result has its own information system
11、 to keep track of it all. There are as many types of management information systems as there are departments or functions in an organization, but there are a few specific systems that almost every organization or institution needs for the whole to operate smoothly.A management reporting system is a
12、database designed to report on the finances and operations of all levels of management in an organization. A companys management reporting system is commonly used by middle managers to generate regular reports comparing current and past financial performance to determine financial growth and to trac
13、k how the middle managers themselves are performing. Upper management uses the data generated by the reporting system to compare the companys current financial position and its efficiency of operations against its predetermined goals for the company.Decision-Support System could used by the strategi
14、c level.Decision-support systems (DSS) are specifically designed to help management make decisions in situations where there is uncertainty about the possible outcomes of those decisions. DSS comprise tools and techniques to help gather relevant information and analyse the options and alternatives.
15、DSS often involves use of complex spreadsheet and databases to create “what-if“ models.The tactical level should use the management information system. A management information system (MIS) is a system or process that provides information needed to manage organizations effectively . Management infor
16、mation systems are regarded to be a subset of the overall internal controls procedures in a business, which cover the application of people, documents, technologies, and procedures used by management accountants to solve business problems such as costing a product, service or a business-wide strateg
17、y. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management methods tied to th
18、e automation or support of human decision making, e.g. Decision Support Systems, Expert systems, and Executive information systems.2.3 Legislation governing management and handing of informationThe main implication for decision-making of two pieces of current legislation governing the management and
19、 handing of information are the norms of behavior for staff about the companys business secrets and the confidentiality of customer information. The company has a network of 20 branches that are based throughout the central belt of Scotland. ICT has offered a range of products in the financial marke
20、ts. The company offers a range of current accounts, saving accounts and mortgage products. ICT realize that it is important to get research result quickly so that it can influence the way in which members of staff, senior manager, branches manager and team manager.The related legislation includes th
21、e Data Protection Act, 1998, the Computer Misuse Act, 1990 and the Copyright, Designs and Patents Act, 1988. Such legislation can ensure that under the companys information in a secure environment.Personal data shall be processed fairly and lawfully and, in particular. Personal data shall be obtaine
22、d only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Personal data shal
23、l be accurate and, where necessary, kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. About the rights of individuals e.g. personal data shall be processed in accordance with the rights of data subj
24、ects. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.2.4 Three data communication systemsThe three data communication systems are local area netwo
25、rk(LAN), wide area network(WAN) and the Internet. A local area network is a network that connects computer within a limited geographical area, usually within a single office or building. The technical features of LAN are in the follows: LAN link computers within a single building or on one site. And
26、 LAN can be linked to other LAN, but LAN cannot span large distances. Finally LAN is under the control of a single authority.WAN cover large geographical areas; computers connect each other through telephone lines or cables. The technical features of WAN are used to communicate across wide distance
27、(anywhere in the world), uses the telephone lines to communicate through a modern and connection is normally through the services of service provider. An Internet is a global network made up of a number of smaller systems as LAN and WAN. The Internet can be used for any number of activities such as:
28、 business transactions, market research, teaching, advertising, group communication, research, teleconferencing and Email. 2.5 Benefits for Crown Catering ServicesThe benefit of LAN is that it enables to share the hardware such as network printer and scanners, and to share useful files and informati
29、on such as stock value. It also can offer simple and quick communication between staffs.The benefit of WAN are the followings: it can offer long-distance communication to solve the issues, ICT can improve the effectiveness of work through video conference offered by WAN; ICT could manage and control
30、 their staff by the remote management offered by WAN.The benefit of Internet are the followings: it can provide a wide range of information searching, ICT wish to do a marketing survey project and the Internet could help to find out their customers and get research result quickly; it could release i
31、nformation through the Internet to let customer quickly update their information of products and services; it could carry out team exchange through the Internet for example the voice conference.2.6 Treats and security proceduresWhile Internet has opened a whole new world of opportunity for interacti
32、on and business by removing many trade barriers, it has also opened up new possibilities and means of criminal acts altogether unheard of in the off-line world. Why do people commit crimes online? Perhaps, some of them attempt to gain unauthorised access to others money. Some people have fun doing s
33、o and there are others who do it to take revenge or to harm others. While the motivation of conducting criminal acts may be the same as in the off-line world, the manner of such criminal acts is unique to the Internet. The vulnerability of the information transmitted over Internet is the root cause
34、of the sprawling of criminal acts over Internet. Both users and vendors become vulnerable to criminal acts that undermine security due to easy accessibility of Internet and easy exploitation of security loopholes in the Internet. These criminal acts can adversely affect Internet users, particularly
35、online vendors and customers. Therefore, it is important that Internet users not only become conversant of such criminal acts but also take suitable measures to counter and avoid becoming victims of these criminal acts. In this article we examine some of the major information security threats to Int
36、ernet users with particular emphasis on electronic commerce and propose plausible solutions for a safer online experience. The information security threats can be categorised into threats to the users, threats to the vendors, and threats to both users and vendors. Electronic embezzlement, sniffing a
37、nd spoofing, and denial-of-service attacks are examples of threat to the vendor. Credit card frauds and malicious codes are examples of threats to the users. In operational effectiveness and continuity of the target application, integrity and optimizing network and application security is an importa
38、nt way to enhance the value of IT network security. Network optimization technology and architecture involved updates, including full network traffic monitoring, application traffic management, security threat management. Today, almost all of the CIO guarantee availability regarded critical applicat
39、ions, or network as a priority. Generally speaking, the network architecture includes six areas: application performance management; secure content management; security event management; user access management; network resource management; endpoint security management. Full network traffic monitorin
40、g. As we all know, network security issues 80% occurred in the internal network. For large-scale networks, traffic within the network can also be very serious adverse impact on the operation of the network-critical applications. Therefore, the whole network flow monitoring is very important and nece
41、ssary. Through the entire network traffic detection, we can understand the data flow among network status, including the size of the flow, source and destination, which is generated by the application, the amount of data size. Network optimization system combined with the ability to direct and gatew
42、ay-based application data protection capabilities to identify, due to its direct protection, can avoid linkage brought lag and is not precise enough protection and other issues, it is possible to ban unwanted traffic and content directly. In addition to protection DDoS, worms, intrusions, P2P and hy
43、brid attacks, but also to prevent internal documents leaked by the network.For network security, the weakest link in addition to security technology lag, the internal staff security awareness is not strong also important factors. A large number of network threats, improper operation and employees ar
44、e closely associated application, such as random access websites containing malicious code, download and use e-mail attachment with a virus, does not update the virus and so on. Therefore, the organizations network security knowledge training is also essential that management but also to develop a c
45、omprehensive network security policy.2.7 InnovationsA technology whose application significantly affects the way a market functions. An example of a modern disruptive innovation is the Internet, which significantly altered the way companies did business and which negatively impacted companies that w
46、ere unwilling to adopt it. A disruptive innovation is differentiated from a disruptive technology in that it focuses on the use of the technology rather than the technology itself.In the case, the ICT innovation can help the strategic level obtain information in time. As mentioned before, the Crown
47、Catering Services work really dependent on ICT. And the company also meet some problems on ICT. So, the ICT innovations is more important for companys development and expand. The strategic level can faster contact to all of the staff, and grasp the whole companys situation. The tactical level know t
48、he information of market needs and front-line staffs attitude by ICT innovations. And the team leader can arrange their project workers better.Communications technology and communications industry since the 1980s one of the fastest growth areas. Whether at home or in the true international. This is an importan