HND商务通讯ICT

2019-04-14 14:07

1.0 The nature of the information

High Strategic Tactical Operational Low This picture shows that different levels (Strategic, Tactical, Operational) have many differences on content, responsbility, aims about information and so on.

Strategic managers is the most senior management of the organization. These managers are involved in the formulation of strategies, and the Tactical manager is the middle managers, which are responsible for ensuring that the goals of strategic management are achieved. Operational managers are the first line of management responsible for the day-to-day running of each department.

Strategic managers is the most senior management of the organization, they develop long-term planning and development policies and strategies. They use their own judgment to make a complex decision, the wide range of information, external information and more internal, this level is always dealing with unstructured issues. In the outside, they are subject to policy, the international situation, the impact of industry competition, in the internal, they are subject to market research reports, the impact of productivity.

Responsibility

Tactical manager is responsible for the medium-term planning, and sometimes they are responsible for the budget control, monitoring, develop business policies / objectives, access to resources, to solve the problem, and develop new methods. They have more internal, less external, they decided to affect some people, but not all of the companies. They should follow the facts and statistics of the statistics or historical information, and rely on their own judgment, the decision of the tactical management is likely to be a semi structured.

Operational Manager are responsible for some basic problems, such as regular activities, monitoring, ensuring the effective use of resources, staffing levels, but also to solve structural optimization problems. Operational managers consider internal factors: supplier and training information. External factors: attendance, vacation, equipment.

2.0 Information System

2.1 Strategic 2.1.1 ESS

Executive Support System (ESS) is a reporting tool which allows to turn organization‘s data into useful summarized reports. These reports are generally used by executive level managers for quick access to reports coming from all company levels and departments such as billing, cost accounting, staffing scheduling, and more. It is easy to use, and it rely on mathematical modeling, It provide information in a summarized format.

ESS often helps the company's strategic management assessment report to the Department quickly. It provides a flow of information. It helps managers to quickly make plans by providing information about it. ESS centralized or decentralized base, which can provide all levels of valuable information management to the company.

2.2 Tactical 2.2.1 MIS

Management Information System (MIS) provides information that organizations require to manage themselves efficiently and effectively. It collects and presents management information to a business in order to facilitate its control. Management information system involve four primary resources: EDPS, analysis , decision making , and database.

MIS can help level tactical planning, organization, command, coordination and control. It can reduce the risk and uncertainty of decision making. Management information systems can help make some sales decisions, such as targeted market segmentation should be, or some product decisions, in most cases, a decision is required, because it can help managers to solve specific problems.

2.3 Operational 2.3.1 TPS

Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions. A Transaction Processing System (TPS) or transaction server is a software system, or software/hardware combination, that supports transaction processing. Transaction processing system consist of computer hardware and software hosting a transaction-oriented application that performs the routine transactions necessary to conduct business.

TPS can help companies solve business decisions. It can meet the needs of daily information, such as sales, inventory and payment. Collect the information from TPS, and the company can produce more profit for the company's products.

3.0 The implications of current legislation for decision making

3.1 The Data Protection Act

1998 Data Protection Act (DPA) is the act of the United Kingdom Parliament on the right of the United Kingdom of Great Britain and Northern Ireland to define the identity of the United Kingdom of law on the identity of the living person data processing. In Britain, it is the main regulations for the protection of personal data. Although the bill itself does not mention the privacy, it is through the British law into the EU data protection directive 1995, the Directive requires Member States to protect the basic rights and freedoms, in particular their privacy, personal data processing.

The bill will be the United Kingdom's law is defined as the identification of biological data processing. Government procurement and personal or corporate information, must comply with the laws and procedures of data protection, and to minimize duplication of collection. Data protection law requires that Member States to protect the basic rights and freedoms of the people, in particular the right to privacy of personal data processing. In order to ensure the legitimacy of the collected information, the purpose and the scientific process of collecting legitimacy is collected.

Example, Crown Catering Services company should use this behavior. It can better protect the enterprise data and information, reduce enterprise risk. For example, the establishment of the company database. Different levels of staff through different information to obtain data, thus facilitating the data content of the correctness, data integrity and accuracy.

3.2 Computer Misuse Act

The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom,The Act has nonetheless become a model from which several other countries, including Canada and the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws.

The Act introduced three criminal offences:Unauthorised access to computer

material.Unauthorised access with intent to commit or facilitate commission of further offences.Unauthorised modification of computer material.

Example, Crown Catering Services company should use the Computer Misuse Act. Companies must take adequate security measures to prevent unauthorized access. For example, the company can train the staff of the management, and set a password for the computer. It can help companies to better protect and develop their own security.

4.0 data communication systems

A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their smaller geographic area, and non-inclusion of leased telecommunication lines.

A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines. (Ban Wei, 2002 year) Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite(TCP/IP) to link several billion devices worldwide. It is an international network of networks that consists of millions of private, public, academic, business, and government packet switched networks, linked by a broad


HND商务通讯ICT.doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:2017—2018年最新苏教版六年级数学下册《解比例》教学设计精品优

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: