Strategic Information Systems for Business and Enterprise Analysis

Verified

Added on  2023/01/06

|10
|2272
|33
Homework Assignment
AI Summary
Document Page
Strategic Information
Systems for Business and
Enterprise
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Question 1........................................................................................................................................3
QUESTION 2...................................................................................................................................3
QUESTION 3...................................................................................................................................4
QUESTION 4...................................................................................................................................5
QUESTION 5...................................................................................................................................5
QUESTION 6...................................................................................................................................5
REFERENCES................................................................................................................................6
Document Page
Question 1
A) Advanced technology transaction processing system
The TPS provides a secure database which decreases the possibility of user knowledge losses in
the event of terminal malfunction or network problems. Based on what point the operation was at
before the mechanical failure happened, it is capable of successfully recovering from operational
malfunction and even managing system failures. It is adaptable as it promotes this same real-
time use of such an online system and boosts more forms of money TPS can run everywhere.
This suggests that location, environment, culture or procedures are an obstacle to the use of a
payment processing device. A crucial aspect for enhancing the customer support and loyalty with
the use of TPS in organisations. A TPS helps the user / customer to get a sense of trust and
consistency during payments. A TPS makes sales simpler for business as it facilitates the
advantage of executing a purchase somewhere in the globe. This offers the brand a broader scope
and encourages the businesses to achieve and acquire clients from all over the world. It decreases
the potential of error by using an effective algorithm and will save time and money. A TPS offers
organisations of all sizes with real-time advantages as well as new age companies, particularly
someone with a massive web business, are very critical.
B) Types of frauds possible in business environment.
From the flowchart, it has been determined that every department within an organisation faces
serious fraud possibilities due to improper or weak control system such as:
Sales department: There may be chances of creating wrong invoices by the manager in
order to take the commission from company are also because of weak control system.
Accounting department: Overstating of revenue in order to create a false image of
financial status and driving up the share price. This lead the customer to get fake idea
about company financial position and the use to invest huge amount in buying the
company share which further lead to losses.
Warehouses: Due to weak controlling system, mismanagement or even theft of raw
material happen which impact the entire operating activity of company.
Shipping department: The major chances of fraud in this department are related with
wrong documentary fraud which leads to uneven delivery of products. Sometime the
recorders mention the name and address intently about their known people in order to use
the shipment for their personal use.
Document Page
QUESTION 2
1. Advantage of Alternative 2.
The method is seen in alternative two speeds up the buying process by immediately
delivering the sales orders to the retailers and internal customers, thus totally circumventing the
sales team. This reduces the amount of time between acknowledging a need for more stock and
sending the PO to just the seller. Therefore, inventory protection inventory volumes may be
lowered, thus minimising the expense of inventory carrying.
2. Difference
An intelligence report wherein one agency asks another agency for approval to purchase a
particular product seems to be a purchase requisition. Just after authorization, a purchasing
schedule is placed and is a documentation used only to directly procure certain service or product
from a certain seller.
3. Circumstance
Additional one is over the shopping process is given by the intermediate one. For eg, odd
order amounts or frequencies caused by a machine error could be manually identified by the
buying agent. This solution could be favoured by managers whose programmes lack effective
computer checks and those who want to pay for living thing-independent verification. The
increased cost of inventory is the market value of this additional control.
4. Objective
In order to remove the receiving function the discussed requirements in needed to be
implemented:
Lower the supplier number.
One product to one vendor
Proper agreement term among seller and buyer
Direct payment to the supplier.
The account for invoices when there are no recipient employees is indeed a final hurdle to
address. The solution is to conclude that if the goods of which they would be often used parts
were constructed, pieces were obtained. Output documents are then burst into their individual
components in the machine to assess which parts are being used and then compensate for
those pieces.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
QUESTION 3
A) Risks for payroll fraud in the HARDA Limited payroll system:
Some of the main risk which happens within the HARDA case inside the department of payroll
is as follows:
No proper exit practice and no approval of the suitable authority.
Employee continues to increase about their remuneration by asserting to be
having performed more working days than they truly did which is a Timesheet
fraud occurs.
Dishonest compensation requests can be approved by anyone with no knowledge
or skill in the organisation. Or perhaps authorizing expense accounts is a small
"desk hand" job that does not receive sufficient attention.
B) Controls implement to reduce the risks of payroll.
Automation of payroll: A variety of payroll products now explicitly provide an automated
timekeeping component in the payroll system. Managers can sign further into system
only at end of every week and authorise staffing costs, which will then be immediately
passed to the system for accounts payable.
Implement access controls: Companies can incorporate physical entry restrictions, in
addition to having online access to just the payroll system. In locked cabinets, personnel
files should be secured. In addition, any employee file updates should be approved
mostly by the HRM department and the corresponding guidance counsellor.
Regularly perform variance analyses: Predicated on statistics by dept., function centre,
or conflict, companies must run payroll variability assessments on a regular basis. Such
analyses must be conducted against the entire spending plan and the previous year, and
adjustments outside of perceptions must be examined.
Establish duty segregation: For small companies, this authority can be the most difficult
to enforce. Ideally, this same following descriptions should be performed by different
staff:
(a) Processing payrolls inside the scheme
(b) Connect directly to and feedback into another accounting system
(c) Maintaining and managing physical personnel records
(d) Approving time monitoring
Document Page
(e) Distributing payroll controls. Separating responsibilities sufficiently would then help to
manage the threat of unauthorised access or transactions.
QUESTION 4
Risk Associated
From the above case mention, it has been discussed that there are certain risk which needed to
be
Supply Chain Risk: Supply chains are incredibly diverse and vulnerable to a variety of diverse
threats on an on-going basis. Also, if not properly handled, it may lead to potential detrimental
effects on the marketing and brand credibility of suppliers. To proactively fix essential
weaknesses, producers should create durability in distribution networks. In addition, to reduce or
rebound rapidly through risk-related disturbances, they can manage costs and risks.
Reputational Risk: The organisation and the management must please remember the possibility
of reputational harm involved with some of these threats outside the particular regulatory
structure connected with most of these risks areas. In addition, the brand name and integrity of
the company will directly influence its revenue, revenue and a number of other significant
strategic fields. Reputation and reputation can be significantly affected by unfavourable media
coverage, ads resulting from adverse lawsuits, activism by shareholders, demonstrations and
protests by special interests, and the particular danger of poverty means that the income, some of
which might result from either an inability to adequately supervise and mitigate risk. Of course,
not all risk would be applicable to every sector, and the importance of different risks will
therefore vary from sector to company. Risk recognition is also a significant starting point for
developing a robust framework of risk assessment and risk monitoring. In the light of annual
assessments of the risk control position of the organization, senior managers should dedicate
time and resources to identifying the most important risks facing their corporation and make
recommendations to the board or relevant committee regarding these risks.
QUESTION 5
To: David
Subject: Risk and issues related with consultant.
Changing client behaviour
Document Page
Professional resources for business customers have been more demanding, moving out toward
ideas such as checkable hours, and seeking service charges and better cost control. Customers
now demand more value, better quality of work, and delivers substantial of services and
solutions inside a progressively agile world, exacerbated by accelerated digital innovation.
Unhappy clients can spell trouble
There are several roots of consumer frustration and consultancy risk. Popular grounds for
grievances include:
Deadlines Missed
Misrepresenting
Overruns on expenses
Failure to adhere to standards
Utilization of sub-par contractors
Setting realistic expectations and meeting the obligations is the most important thing. Yet good
contact with consumers from the outset is also a strong weapon for keeping customers happy.
Data breaches
A hack could do the credibility permanent harm, and rehabilitation can cost hundreds of dollars.
There could be no survival for companies which are not ready for the economic fallout.
Check their compliance protocols to validate the form of liability protection they framework to
ensure the store company or consumer data with such a information services provider. In the
event of their databases being hacked, these acts will secure the company.
Blindsided by scope creep
Scope creep happens where in the initial scope of operation a customer demands deliverables and
extended time not decided to. Particularly as you start off first, they may be inclined to finish
these new things to escape an awkward discussion about cash or compromising other project's
goals. That might sound like a perfect way to develop the reputation, but this can quickly
backfire, but receive a glowing endorsement. The scope creep always starts due to inadequate
coordination and finishes on both ends of missing deadlines and frustration. To never say the
time and money users have lost available to give job away.
This might also like a loyalty bond unless they are a leadership professional working in IT.
When one of the workers commits stealing, fraud, or fraud against and the customers, it prevents
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
company. As a prerequisite of employing consultant is that many consumers would need this
bond.
QUESTION 6
A) TELOS and elaborate cost-benefit
Technical: Technical research, using price history graphs and industry data, is a way of analysing
and forecasting price changes in the stock markets. It is built on the presumption that
manager will form a reasonably precise forecast of possible price paths if an investor will
recognise past market trends.
Economic: The process of economic processes is theoretical science which can also be an
analysis of a manufacturing process or a market. The purpose of the study is to decide if the
economy or anything within it is working effectively. An economic review of a business, for
instance, focuses primarily as to how much revenue it generates.
Legal: In the general context, legal interpretation applies to a statement made by a judge, legal
proceeding or legal professional as to the lawfulness or unlawfulness of an action, circumstance
or intent. It may be writing where an attorney offers his as well as her experience of the laws as
applicable to presumed evidence.
Operational: Operational analysis is a means to analyse the actual value of an investment in an
operating (or steady-state) and to assess that output against such a collection of cost, plan and
specific requirements.
Schedules: Schedule Review is the process through which project managers consider success,
measure limits on money and time as well as evaluate options for restoring lost time. In real-time
computing, the term strategy study focuses on understanding the analysis and assessment of the
scheduler scheme as well as the methodologies used during real-time applications.
B) Development life cycle.
It has been determined that Accountant or Bookkeeper must be responsible for the entire results
of the software development cycle life procedure such as financial economy of any organisation
is depended upon internal accountant. Bookkeepers are users and the accounting role is affected
in some manner by all processes that handle financial transactions. Like other customers,
accounting professionals should provide the applications specialist with a good image of their
challenges and needs. Accountants should, define accounting methods to be used; specifications
Document Page
for internal monitoring, such as record keeping; and special algorithms, such as depletion
templates.
Document Page
REFERENCES
Books and Journals
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]