Solution Code: 1CGI
This assignment falls under Management Information System which was successfully solved by the assignment writing experts at My Assignment Services AU under assignment help service.
Task: 1
Adapted from Chapter 1: Analyze and Decide
Visit YouTube.com and search for two videos: one on Michael Porter’s strategic model and one on his competitive forces model. For each video, report what you learned.
(Specify the complete URL, video title, who uploaded the video and the date, video length, and number of views).
Do you think these models are important tools in today’s business environment? Explain with appropriate supporting arguments and references.
TASK 2
Adapted from Chapter 3: Analyze and Decide Question 2 (p107)
Visit the Microsoft SQL Server website at Microsoft/com/SQLserver
Click the Cloud Platform tab and search for customer stories.
(Note: make sure to include company names and appropriate references).
Task: 3
Adapted from Chapter 5: Analyze and Decide Questions 1 & 2 (p 176)
Is the investment in cybersecurity a strategic or compliance issue?
Task 4
Adapted from Chapter 6: Critical Thinking question 12 (p215) and Explore question 5 (p216)
Task 5
Case 7.2: Business Case: Social Customer Service (p259-261)
Read Case 7.2 from the text book and answer the questions on page 261.
The assignment file was solved by professional Management
experts and academic professionals at My Assignment Services AU. The solution file, as per the marking rubric, is of high quality and 100% original (as reported by Plagiarism). The assignment help was delivered to the student within the 2-3 days to submission.
Looking for a new solution for this exact same question? Our assignment help professionals can help you with that. With a clientele based in top Australian universities, My Assignment Services AU’s assignment writing service is aiding thousands of students to achieve good scores in their academics. Our Management Information System assignment experts are proficient with following the marking rubric and adhering to the referencing style guidelines.
Business Intelligence
TASK 2
COMPANIES THAT HAVE APPLIED BI AND DATA DISCOVERY
Benefits of the BI solutions
All these stories have one common outcome – improved business processes. BI has been shown to reduce wastage of time, as in generating and analysing reports, to produce reliable consumer pattern projections and to facilitate business-to-business collaboration; all of which increase profitability and increase customer satisfaction (Chen, Chiang & Storey, 2012).
ANOTHER COMPANY THAT COULD OFFER BI SOLUTIONS
IBM (through IBM Cognos) provides a range of BI solutions for both small companies and large corporate companies. It is an online-based and offers over thirty different products including dashboards, analytics, reporting and data integration among others. Perhaps the only problem with IBM Cognos is that it can only be used online and by experienced persons.
TASK 3: INVESTMENT IN CYBER SECURITY
Introduction
The investments in cyber security are undoubtedly. Many security experts agree that compliance in cyber security is an effective strategy (Von Solms & Van Niekerk, 2013). Every other global enterprise feels vulnerable to cyber attacks. According to a survey by Vormetric Inc., an industry leader in data security and cloud solutions, many organisations still handle cyber security as just a question of compliance. But according to Sadrolashrafi, (2015) compliance does not guarantee security; in fact, it offers only very basic protection.
More than half of the respondents in the survey indicated willingness to increase investment in cyber security, but they also indicated that the efforts would be mostly for compliance purposes. Participants from industries that have relatively tighter regulations on cyber security where compliance is a core element affecting a company’s operation, were inclined to the idea that compliance is the way to cyber security. Most of them as well believed in stronger defence strategies like end-to-end protection, network security and incident management.
WHEN A COMPANY’S SECURITY MEASURES ARE SUFFICIENT TO COMPLY WITH ITS OBLIGATIONS
Most organisations' security measures can be seen as partly exists solely for the purpose of fulfilling its obligations. These are the organisations that operate exclusively at the lower threshold of the minimum accepted security standards for that particular industry. However, in my view, a company's security measures can be said to comply with its obligations when they have demonstrated an effort to protect their data as well that of other parties to the best of their ability. Compliance obligations set the lowest standard beyond which a company should not go, but of what good are the lowest standards when the risks of breach of data protection are rising exponentially?
THE NECESSITY FOR AN ORGANISATION TO ENCRYPT ALL ITS ELECTRONIC RECORDS
It is without doubt that encryption provides a very high level of data security and companies invest heavily to protect their information. In my opinion, the answer to the question of whether companies should protect all their electronic records is a definite yes. If a company should choose not to encrypt all its electronic records, the level to which the encryption should be done would remain an arbitrary point. This easily exposes the company’s records to the so-called hack attacks. In case of a sabotage attempt, one strategy likely to be used by hackers to penetrate a protected system is using any information they can lay hands on against the company (Collier & Lakoff, 2015). For those who choose to encrypt only part of their information, they are only inviting unauthorised intruders into their systems. It is therefore vital that a company protects all of its electronic records. After all, the costs of encrypting all of a company's information are way lower than the damages that a company risk by choosing not to encrypt all of its information which quite well agrees with one the basic principles of risk management.
TASK 4: SEARCH ENGINE OPTIMISATION
Question 1
It is important that companies with an online presence (of which every company should have) have their information easily identifiable on the massive web of information there is on the Internet. In fact, it beats logic to place your website on the Internet and not optimise its presence to ensure visitors can find you even when they do not know who you are. Fortunately, all the viable options to improve a company’s visibility on the Internet is available. Some strategies have raised questions on business ethics with regard to whether they really should be used or not. I would make the following recommendations to a website owner with regard to website content to improve their rank in search results listings over time.
Question 2
BRIEF SUMMARY OF THE COMPANY
Company name: The Sea Food Restaurant
URL: www.theseafoodrestaurant.com
Date visited: 15-04-2016
Keywords/ phrases that can be used to optimise searches for this website
Seafood restaurant
Calamari
Where to dine in Scotland
LESSONS LEARNT FROM GOOGLE EXPLORE
The usage of the keywords “seafood restaurant” has been growing, though not at a rapid rate. It has been used in searches mostly from Southern Asia. Search queries including the keyword “calamari” have increased tremendously, especially in Italy and South Africa. From these findings, it has been learnt that there is no problem with the usage of the above keywords except that adding the location of the restaurant would raise its rankings especially for searches outside Scotland.
USE OF SEOS IN UNETHICAL WAYS
Search engine optimisation has obviously been misused by organisations in a manner that can be interpreted as one of the forms of Internet bullying. Some unscrupulous companies break the codes of ethics when it comes to optimisation of their websites to divert all manner of traffic to their websites. Some optimizations are so aggressive that they lead to “irrelevant” results in search listings. This can effectively damage the reputation of a serious company and must be avoided. It is an epitome of the tragedy of commons where these presents the internet as an unfriendly place to search for information. The Internet is a common resource and should be used fairly.
This Management Information System assignment sample was powered by the assignment writing experts of My Assignment Services AU. You can free download this Management Information System assessment answer for reference. This solved Management Information System assignment sample is only for reference purpose and not to be submitted to your university. For a fresh solution to this question, fill the form here and get our professional assignment help.
Trending now
The Student Corner
Subscribe to get updates, offers and assignment tips right in your inbox.
Popular Solutions
Popular Solutions
Request Callback
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....
🚨Don't Leave Empty-Handed!🚨
Snag a Sweet 70% OFF on Your Assignments! 📚💡
Grab it while it's hot!🔥
Claim Your DiscountHurry, Offer Expires Soon 🚀🚀