logo

Management

4 Pages626 Words92 Views
   

Added on  2022-12-19

About This Document

This document discusses the topic of management, including the implementation of ERP systems and information security threats. It also includes a case analysis on the benefits of fitness and activity trackers in the workplace, as well as the pros and cons of multiple perspectives.

Management

   Added on 2022-12-19

ShareRelated Documents
Running head: MANAGEMENT
Management
6/15/2019
Management_1
MANAGEMENT 1
Part 1
There are many technologies which organizations can implement and automate most of the
work. ERP systems are one most demanding cloud based system which integrates the key
internal operations and create more efficiency and provide quality (Saleh and Zulkifli, 580).
Although there are many ERP system which can provide different kind solutions but for the
donut shop must implement Odoo ERP system. Through implementing this manage its
accounting and finance system, inventory, manufacturing and purchase and other back office
operations. This can help shop keeper to reduce waste and lead time and also reduce labor
cost which leads to increase productivity at every level.
There are two CSF of implementing the system and one is that it will help to increase data
accuracy as while implementing this the shop keeper can plan resource and can do accurate
forecasting which will help to reduce food lose during production. Second one is reducing
labor cost which can provide expected ROI. While ROI exceeds the TCO, material and
resource planning must have great positive impact on profitability.
Here is two KPI for CSF, with the increased accuracy its KPI is the ratio of data errors such
as waste of raw material, missing incompletes and missing financial entries.
On the other side decreased labor and cost of production’s KPI ratio of HR inventory such as
future labor requirement after implementing the ERP technology.
Part 2
In the information security threats could be many such as software attacks, identify theft,
information extortion, sabotage, and theft of information or equipment (Peltier, 150). These
Management_2

End of preview

Want to access all the pages? Upload your documents or become a member.