Business Administrator Report: Consequences and Mitigation Strategies
VerifiedAdded on  2023/05/31
|8
|1630
|266
Report
AI Summary
This report, titled 'Business Administrator,' delves into various aspects of information systems and business administration. It begins by outlining the significance of report structure, language, and their dependence on the recipient and the report's purpose. The report then explores problem-solving techniques within information systems, including problem identification, solution listing, and evaluation. Data reliability is addressed through data verification methods, such as double-key data entry. Furthermore, the report examines information system security, covering techniques for managing data and mitigating risks. Potential consequences of breaches of confidentiality and report publishing are discussed, emphasizing the impact on organizational functionality and financial stability. The report concludes by highlighting the role of tools like Mico in monitoring information systems and the importance of reporting techniques tailored to the audience.

Running head: BUSINESS ADMINISTRATOR
BUSINESS ADMINISTRATOR
Name of the Student
Name of the University
Author note
BUSINESS ADMINISTRATOR
Name of the Student
Name of the University
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2BUSINESS ADMINISTRATOR
Table of Contents
Question 01.01.................................................................................................................................3
Question 01.02.................................................................................................................................3
Question 01.03.................................................................................................................................3
Question 01.04.................................................................................................................................3
Question 01.05.................................................................................................................................3
Question 01.06.................................................................................................................................4
Question 01.07.................................................................................................................................4
Question 01.08.................................................................................................................................4
Question 02.01.................................................................................................................................4
References........................................................................................................................................6
Table of Contents
Question 01.01.................................................................................................................................3
Question 01.02.................................................................................................................................3
Question 01.03.................................................................................................................................3
Question 01.04.................................................................................................................................3
Question 01.05.................................................................................................................................3
Question 01.06.................................................................................................................................4
Question 01.07.................................................................................................................................4
Question 01.08.................................................................................................................................4
Question 02.01.................................................................................................................................4
References........................................................................................................................................6

3BUSINESS ADMINISTRATOR
Question 01.01
The report structure directly indicates the format and the language. In most of the cases
the intendent recipient decides which part structure is going to be applicable in the report. If the
recipient of the report is the informal it can be stated that a general structure of the report can be
implemented. On the other hand, it can be stated that if the recipient is a business oriented
approach then the structure would be different in the scenario. In this manner it can be stated that
there is various structure of the report which can be implemented in the structure (Papadopoulos
and Heslop 2014). Hence it can be stated that format and language of the report is directly
dependent on the report and the recipient which is linked to the approach of the report.
Question 01.02
One of the important factor which can be stated in the context of the choice of the
language and the format can be linked to the audience it would be reaching. In some of the sector
it is seen that the audience which would be indulging into the report is one of the event which
can be one of criteria which would be deciding the format of the report (Morschett, Schramm-
Klein and Zentes 2015). There can be two format which the style which would be used in the
report would be deciding the ultimate format of the report. Sometimes the complexity of the
report also determines the choice of report so that it can be easily be accessible from the end of
the person who would be indulging into the report.
Question 01.03
There are various problem solving technique which can be implemented within the
domain of information system. One of the important technique is the identification of the
problem. In this sector it can be stated that there can be different opinion relating to the risk
Question 01.01
The report structure directly indicates the format and the language. In most of the cases
the intendent recipient decides which part structure is going to be applicable in the report. If the
recipient of the report is the informal it can be stated that a general structure of the report can be
implemented. On the other hand, it can be stated that if the recipient is a business oriented
approach then the structure would be different in the scenario. In this manner it can be stated that
there is various structure of the report which can be implemented in the structure (Papadopoulos
and Heslop 2014). Hence it can be stated that format and language of the report is directly
dependent on the report and the recipient which is linked to the approach of the report.
Question 01.02
One of the important factor which can be stated in the context of the choice of the
language and the format can be linked to the audience it would be reaching. In some of the sector
it is seen that the audience which would be indulging into the report is one of the event which
can be one of criteria which would be deciding the format of the report (Morschett, Schramm-
Klein and Zentes 2015). There can be two format which the style which would be used in the
report would be deciding the ultimate format of the report. Sometimes the complexity of the
report also determines the choice of report so that it can be easily be accessible from the end of
the person who would be indulging into the report.
Question 01.03
There are various problem solving technique which can be implemented within the
domain of information system. One of the important technique is the identification of the
problem. In this sector it can be stated that there can be different opinion relating to the risk
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4BUSINESS ADMINISTRATOR
factor and in majority of the cases the mitigation plans are different in each of the cases from
different peoples point of view. In this case another technique which can be implemented is the
listing of the possible solution which can be indulged into the problem domain. Evaluation can
be followed up with the listing to implement the proper mitigation plan (Farrell, Oerton and Plant
2018). The end technique which can be stated here is relating to the occurrence of the problem, it
should be taken into consideration that the problem should not arise again in the near future.
Question 01.04
The problem solving sector which is related to the information system should always be
suitable in the means to mitigate the problem at one instance of a time. It can be stated that the
problem should be mitigated in a one-time manner so that similar form of problem does not arise
again into the working of the organization. There can be various sector of implementation and
various form relating to implementation of plan when a problem arises in the working domain of
the organization (Pina et al. 2016). When the section of working of the organization include
problem internal working would be affecting which should imply a significant modification in
implementation process so that the risk is mitigated.
Question 01.05
One of the most important technique which can be used in the sector of validation of the
reliability of the data is the data verification technique relating to the Information system. The
most common technique of data verification in which data is directly typed into the system of
computer is entering every piece of data twice using different form of operation for each of the
data. The data which is entered is compared electronically by the system. In the process any form
of modification is highlighted and the supervisor in the section makes appropriate changes into
the data for correction (Hesselbarth and Schaltegger 2014). The concept of the Double key data
factor and in majority of the cases the mitigation plans are different in each of the cases from
different peoples point of view. In this case another technique which can be implemented is the
listing of the possible solution which can be indulged into the problem domain. Evaluation can
be followed up with the listing to implement the proper mitigation plan (Farrell, Oerton and Plant
2018). The end technique which can be stated here is relating to the occurrence of the problem, it
should be taken into consideration that the problem should not arise again in the near future.
Question 01.04
The problem solving sector which is related to the information system should always be
suitable in the means to mitigate the problem at one instance of a time. It can be stated that the
problem should be mitigated in a one-time manner so that similar form of problem does not arise
again into the working of the organization. There can be various sector of implementation and
various form relating to implementation of plan when a problem arises in the working domain of
the organization (Pina et al. 2016). When the section of working of the organization include
problem internal working would be affecting which should imply a significant modification in
implementation process so that the risk is mitigated.
Question 01.05
One of the most important technique which can be used in the sector of validation of the
reliability of the data is the data verification technique relating to the Information system. The
most common technique of data verification in which data is directly typed into the system of
computer is entering every piece of data twice using different form of operation for each of the
data. The data which is entered is compared electronically by the system. In the process any form
of modification is highlighted and the supervisor in the section makes appropriate changes into
the data for correction (Hesselbarth and Schaltegger 2014). The concept of the Double key data
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5BUSINESS ADMINISTRATOR
entry can be used in the sector of identifying data entry operator who are not linked with
achieving accuracy of high level.
Question 01.06
There is various technique which can be implemented which is majorly done by means of
taking into consideration the domain of implementation. Information system can be considered
as a domain which emphasis on the sector of implementation which focus on managing the data
and the security of the system so that major issues can be mitigated in the sector of working. In
the information system there are certain parameters which majorly include into the working so
that it is suitable in the sector of mitigation of the risk factor involved into the concept (Arts and
Economics 2017). The techniques conquer process can be used in the section of the gathering of
the information which can be used in the sector of information system security. There are
noticeable changes which are seen within the working if the implementation of an appropriate.
Question 01.07
There can be different potential consequences relating to breach to confidentiality. One of
the penalty which are enforced into the sector of breach of confidentiality is the termination of
the employee. In most of the cases it can be stated that this agreement has a breach contract
which is explicit relating to confidentiality that includes the clause of termination (Wang et al.
2018). There can be also implementation of paying of civil damage of lawsuit from the
employee. The confidentiality aspects play a very vital role in the sector of the internal working
of the organization. There is various technique which can be implemented in the sector of
prevailing of the confidentiality for example encryption of the data which is stored in the system.
entry can be used in the sector of identifying data entry operator who are not linked with
achieving accuracy of high level.
Question 01.06
There is various technique which can be implemented which is majorly done by means of
taking into consideration the domain of implementation. Information system can be considered
as a domain which emphasis on the sector of implementation which focus on managing the data
and the security of the system so that major issues can be mitigated in the sector of working. In
the information system there are certain parameters which majorly include into the working so
that it is suitable in the sector of mitigation of the risk factor involved into the concept (Arts and
Economics 2017). The techniques conquer process can be used in the section of the gathering of
the information which can be used in the sector of information system security. There are
noticeable changes which are seen within the working if the implementation of an appropriate.
Question 01.07
There can be different potential consequences relating to breach to confidentiality. One of
the penalty which are enforced into the sector of breach of confidentiality is the termination of
the employee. In most of the cases it can be stated that this agreement has a breach contract
which is explicit relating to confidentiality that includes the clause of termination (Wang et al.
2018). There can be also implementation of paying of civil damage of lawsuit from the
employee. The confidentiality aspects play a very vital role in the sector of the internal working
of the organization. There is various technique which can be implemented in the sector of
prevailing of the confidentiality for example encryption of the data which is stored in the system.

6BUSINESS ADMINISTRATOR
Question 01.08
The potential consequence of report publishing directly include that it can alter the
functionality of the organization. It can sometimes directly include financial loss for the
organization which can hamper the execution of the different process of working. The data in
any organization can be considered to be crucial in the sector that planning of the execution of
the process depend on the data and if there is any form of alteration of the data it can sometimes
lead to miss-planning which can impact the organization working (Toth and Vigo 2014). There
are few prospective which mainly include the safe guard of the data from the prevention aspect
so that alteration is not implemented within the crucial data of the organization. Information
system security of data can be considered to be very much essential in the internal as well as
external working of the organization.
Question 02.01
Mico can be considered as a tools which can be implemented in the sector of the
monitoring of the information system. There are many specifications which can be easily be
included into the sector such as objective, time scale and technique (Hakansson 2015). The
reporting technique can also be helpful in the sector due to the factor that it directly takes into
consideration different aspect which is related to the audience of the report and who would be
indulging into the report.
Question 01.08
The potential consequence of report publishing directly include that it can alter the
functionality of the organization. It can sometimes directly include financial loss for the
organization which can hamper the execution of the different process of working. The data in
any organization can be considered to be crucial in the sector that planning of the execution of
the process depend on the data and if there is any form of alteration of the data it can sometimes
lead to miss-planning which can impact the organization working (Toth and Vigo 2014). There
are few prospective which mainly include the safe guard of the data from the prevention aspect
so that alteration is not implemented within the crucial data of the organization. Information
system security of data can be considered to be very much essential in the internal as well as
external working of the organization.
Question 02.01
Mico can be considered as a tools which can be implemented in the sector of the
monitoring of the information system. There are many specifications which can be easily be
included into the sector such as objective, time scale and technique (Hakansson 2015). The
reporting technique can also be helpful in the sector due to the factor that it directly takes into
consideration different aspect which is related to the audience of the report and who would be
indulging into the report.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7BUSINESS ADMINISTRATOR
References
Arts, F. and Economics, G., 2017. Business Administration. Social Policy & Administration, 40,
p.46.
Farrell, C., Oerton, S. and Plant, E., 2018. Doing a doctorate in business administration: The case
for critical reflexivity. The International Journal of Management Education, 16(3), pp.370-379.
Hakansson, H., 2015. Industrial Technological Development (Routledge Revivals): A Network
Approach. Routledge.
Hesselbarth, C. and Schaltegger, S., 2014. Educating change agents for sustainability–learnings
from the first sustainability management master of business administration. Journal of cleaner
production, 62, pp.24-36.
Iansiti, M. and Lakhani, K.R., 2014. Digital ubiquity: How connections, sensors, and data are
revolutionizing business.
Morschett, D., Schramm-Klein, H. and Zentes, J., 2015. Strategic international management (pp.
978-3658078836). Springer.
Papadopoulos, N. and Heslop, L.A., 2014. Product-country images: Impact and role in
international marketing. Routledge.
Pina, A.A., MacLennan, H.L., Moran, K.A. and Hafford, P.F., 2016. Doctor of Business
Administration (DBA) &58; A Viable Credential for Faculty in Programmatically Accredited
Business Degree Programs&63. International Journal of Doctoral Studies, 11(unknown),
pp.217-226.
References
Arts, F. and Economics, G., 2017. Business Administration. Social Policy & Administration, 40,
p.46.
Farrell, C., Oerton, S. and Plant, E., 2018. Doing a doctorate in business administration: The case
for critical reflexivity. The International Journal of Management Education, 16(3), pp.370-379.
Hakansson, H., 2015. Industrial Technological Development (Routledge Revivals): A Network
Approach. Routledge.
Hesselbarth, C. and Schaltegger, S., 2014. Educating change agents for sustainability–learnings
from the first sustainability management master of business administration. Journal of cleaner
production, 62, pp.24-36.
Iansiti, M. and Lakhani, K.R., 2014. Digital ubiquity: How connections, sensors, and data are
revolutionizing business.
Morschett, D., Schramm-Klein, H. and Zentes, J., 2015. Strategic international management (pp.
978-3658078836). Springer.
Papadopoulos, N. and Heslop, L.A., 2014. Product-country images: Impact and role in
international marketing. Routledge.
Pina, A.A., MacLennan, H.L., Moran, K.A. and Hafford, P.F., 2016. Doctor of Business
Administration (DBA) &58; A Viable Credential for Faculty in Programmatically Accredited
Business Degree Programs&63. International Journal of Doctoral Studies, 11(unknown),
pp.217-226.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8BUSINESS ADMINISTRATOR
Toth, P. and Vigo, D. eds., 2014. Vehicle routing: problems, methods, and applications. Society
for Industrial and Applied Mathematics.
Wang, J.V., Albornoz, C.A., Hazan, E., Keller, M. and Saedi, N., 2018. Business administration
training for dermatology residents: Preparing for the business of medicine. Clinics in
Dermatology.
Toth, P. and Vigo, D. eds., 2014. Vehicle routing: problems, methods, and applications. Society
for Industrial and Applied Mathematics.
Wang, J.V., Albornoz, C.A., Hazan, E., Keller, M. and Saedi, N., 2018. Business administration
training for dermatology residents: Preparing for the business of medicine. Clinics in
Dermatology.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





