Exploring Business Development: IT Integration, Outsourcing Cases

Verified

Added on  2023/06/07

|6
|1200
|246
Case Study
AI Summary
This document presents a series of case studies addressing various aspects of business development, including IT integration, outsourcing, and global market strategies. The cases cover topics such as the implementation of centralized databases for improved communication and decision-making, the benefits and challenges of outsourcing, and the opportunities and threats presented by international markets like China. Specific examples include Yangtze Power's database implementation, considerations for outsourcing decisions, Yansha's potential international expansion, the integration of IT systems in Australian retail, and the security implications of wireless financial messaging. The analysis also touches on the importance of well-configured software and security measures to combat phishing scams, as well as the impact of online ticketing systems on business sales and customer satisfaction. Desklib provides access to this case study and a wealth of other solved assignments and study resources for students.
Document Page
Running head: CASE STUDY 1
Case Study Questions and Answers
Name
University
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running head: CASE STUDY 2
Case 1
1. Yangtze power previous database did not entail centralization and effective
and reliable flow of information. This hindered decision making between
departments translating to making of uninformed decisions.
2. Yangtze power teamed up with oracle to create a database. The database has
improved business by improving inter-departmental communication and
availability of data on projects.
3. A centralized communication ensures that all the information of an
organization are in one portal. Through this it will be easy to communicate to
employees within the organization and also boost inter-departmental
communication.
4. A centralized databases may not be practice for a small business. This is
because of the cost associated with creating one.
Case 2
1. The major benefit of outsourcing is the reduction of cost to about 30%.
However, outsourcing can come with major challenges to the business such as
increases in overhead charges.
2. I agree with James Hensley Australia should participate actively in the global
market. There are more lucrative business opportunities in the global market
such in the developing economies in Asia and Africa.
3. On determining the systems to be outsourced by the company I will consider
factors such as classified information of the institution and the business culture
of the organization
Document Page
Running head: CASE STUDY 3
4. I will team up with Fooboo to ensure that I have all the information regarding
the Indian labor force. I will be interested with factors such as their
professionalism and software management prowess.
Case 3
1. International businesses are viewing china has lucrative opportunity and at the
same time a threat. The china market is lucrative to international market
because of the large population of china. Moreover, it is a threat because of the
strict business regulation that are in place.
2. The next profitable move for Yansha could be investing in international
business. This move may be successful because already Yansha possess best
information system and the financial muscle.
3. Local business in china have an upper hand over their international
counterparts in the retail industry mainly because local companies are fully
aware of the Chinese market desires.
4. International businesses have the advantage of introducing their products that
are new in the markets. Usually consumers always have the tendency of trying
the new products in the market. To take advantage of this tendency
international business should focus on producing and availing quality goods in
the market.
Case 4
1. Only half of the many Australian retailers have their point of sale fully
integrated with other IT systems. This is because if the high cost of achieving
a fully integrated point of sale system.
Document Page
Running head: CASE STUDY 4
2. The advantages of retailers using end to end package is that it makes business
transactions faster. Moreover, stock determination in the different retail stores
will be first.
3. The high cost of integrated software is not the only challenge hindering them
to use them. One other challenge faced by retail stores Is that they lack skilled
manpower to run and manage the systems.
4. Yes I would consider investing a substantial budget in funding the making and
tailoring of an integrated software package. This is mainly because of the
benefits that my retail shop will accrue such as reduction in lead time and
return on investment
5. The introduction of integrated systems in the business will translate to change
of business process. This involves forming a new IT department to be
mandated at running and maintaining the integrated systems
Case 5
1. Infrared for financial messaging (IrFM) creates both convenience to the buyer
and the seller. To the seller it reduces the amount of liquid cash in the
business. To the buyer it facilitates a faster and swift means of payment.
Moreover, to the buyer it reduces the stress of moving around with large
amounts of liquid cash
2. Harex Company selected japan for the testing of the infrared for financial
messaging software mainly because first they were still relying on old forms
of payments and second because of the large amount of transactions that take
place in japan.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running head: CASE STUDY 5
3. Wireless money transactions such as IrFM are prone to security reasons this is
because of the high levels of cybercrimes reported globally. Cybercrimes
entails theft of personal details of users by unauthorized persons
4. Precautions such as encrypting the software and factoring more security
features need to be taken by Harex Company. This is mainly to mitigate access
of personal details by unauthorized parties.
Case 6
1. I agree with the opinion of increasing greatly making of well configured
software’s and investing in security features mainly because it acts has a
benefit to the business. Some of the benefits accrued is securing information
of the business customers translating to more customer loyalty.
2. Someone could send media such as documents and messages acting as a
supplier of the company asking about software passwords. After that he or she
has gained access to the companies’ soft wares will go on to gain information
personal details about the customers.
3. First I will ensure implementation of a well configured software that is not
prone to break-ins. Secondly I will ensure implementation of strong passwords
to prevent password cracking.
4. Australian business are blatantly not prepared for the increasing phishing
scams. This is because there are still business that still have the stereotypical,
mentality that they are not going to affected by phishing.
Case 7
1. Nakedbus.com works because compared to their competitors they provide
intercity transportation at wallet friendly prices. Moreover nakedbus.com has
Document Page
Running head: CASE STUDY 6
been baker to cut on its administrative overheads by developing an interactive
web page where customers can book there tickets.
2. Online ticketing increases the sales of the business because the customers are
more satisfied booking their tickets online than going to the booking offices.
Moreover, it is easy booking tickets online thus boosting the sales of tickets.
3. I will really consider booking a ticket online form companies such as
nakedbus.com. This is because of saving me the logistical constraints of
getting to the booking office.
4. Trybooking is a successful booking company in England. It is mainly
successful because it reduces the logistics of booking a ticket.
5. One of the main concerns of buying tickets online is security. An unauthorized
persons can hack into the systems of the booking company and then get the
personal details of the passengers and thus compromising their privacy.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]