Friday, December 27, 2019
Nonverbal Communication And Professional And Personal...
Communication is a procedure in which individuals verbally or non-verbally share data and thoughts. Nonverbal communication can be best characterised as a quiet type of speaking with a man without utilising any type of discourse to get a crowd of people. Nonverbal communication is regularly used to make a statement of a however and make your message additionally engaging and intriguing to whom you are identifying with. There are numerous sorts of nonverbal communication utilised as a part of expert and individual environment so this segment offers a succinct outline of the significance of nonverbal communication in professional and personal environment. Miller (2005) gives a fairly oversimplified perspective of nonverbal communication asâ⬠¦show more contentâ⬠¦(Neil and Caswell, 1993), the dominant part is done in a nonverbal way. With regards to nonverbal communication 55% of their weight to the speaker s non-verbal communication and another 38% to the tone and music of their voice (Albert, 1971computer). Nonverbal communication can be adapted certainly before a kid starts the procedure of verbal communication (Miller, 1998). The parts of nonverbal activities are to help with the communication process in ways that basic verbalisation can t care for words can alone have limits. Trehnolm and Jenses (2008) note that nonverbal activities can change and refine simultaneous verbal messages and manage the stream of communication. Likewise, Miller (2005) said that nonverbal communication incorporates outward appearances, eye contact, touching, manner of speaking, dress stance and spatial separation. Zoric, Smid et al (2007) the most exhaustive and exploratory has offered the categorisation of nonverbal communication: kinesics, oculesics, haptics, vocalics and proxemics. Kinesics originates from the word kinesis which is implied development, which alludes to hand, arm, body and face look. Some outward appearances are an indication of for the individual fulfilment with their expert or individual environment (Gukas et al., 2010). Though, a wrinkled temple means that outrage or disarray (Neill and Caswell, 1993). The automatic reflex of yawning means that weariness or weakness (Miller, 2005b). These are a percentage of the outward
Thursday, December 19, 2019
Advantages And Disadvantages Of Central Bank Independence
This essay will, firstly, give a definition of Central Bank Independence (CBI henceforth) and its role in the economy. Secondly, the majority of the essay will critically analyse the benefits (Part A1) and drawbacks (Part A2) of Central Bank Independence using various international literature ââ¬â in Part A. It should be noted that this essay will not be able to compare developing nationsââ¬â¢ literature ï⬠with regards to CBI ï⬠as most of the research is conducted on the OECD (Organisation for Economic Co-operation and Development) nations i.e. the developed nations of the world. Finally, it will also provide my own view on the recent debate surrounding the South African Reserve Bankââ¬â¢s (SARB) independence before concluding. Part A1 There areâ⬠¦show more contentâ⬠¦Furthermore, countries can choose to have varying degrees of government involvement ranging from total governmental control of the central bank (completely dependent central bank) to total independence from government Polillo Guillà ©n, 2005:1767) According to Grilli, Tabellini and Masciandaro (1991), central bank independence should be divided into ââ¬Å"political independenceâ⬠and ââ¬Å"economic independenceâ⬠(Alesina Summers, 1993:153). Political independence is defined essentially as in Bade and Parkin (1982), as the ability of the central bank to select its policy objectives without influence from the government. This is based on whether or not the governor and the board are chosen by the government of the country, how long they will be appointed for, whether or not the government has members who sit on the central bankââ¬â¢s board, whether or not the government has to approve of monetary policy decisions and whether the inflation-targeting (so that the prices remain relatively stable) is an expressed and conspicuous part of the laws of the central bank (Alesina Summers, 1993:153). Economic independence on the other hand could be defined as the capacity to use tools of monetary policy without constraints (Alesina Summers, 1993:153).The most common restriction enforced upon monetary policy decisions of the central bank is the degree to which the central bank has to finance the governmentââ¬â¢s budget deficit i.e. the governmentââ¬â¢sShow MoreRelatedLearning Journal Tasks Of Central Bank929 Words à |à 4 PagesLearning Journal Tasks Central Bank is in charged with the countryââ¬â¢s money supply, provides price stability, attaining economic output and employment goals, regulate commercial banks, stabilizing the macroeconomy by acting as the ââ¬Å"lender of the last resortâ⬠during financial crisis and provide payment system such as check clearinghouses and long-distance payments. The U.S. Central Bank have been around since 1791. The first central bank was called the B.U.S. (Bank of United States). A chronologicalRead MorePros and Cons of the Euro1729 Words à |à 7 PagesIdentityA European currency will strengthen European identity. | Cost of IntroductionConsumers and businesses will have to convert their bills and coins into new ones, and convert all prices and wages into the new currency. This will involve some costs as banks and businesses need to update computer software for accounting purposes, update price lists, and so on.Non-Synchronicity of Business CyclesEurope may not constitute an optimu m currency area because the business cycles across the various countriesRead MoreCosts and Benefits of Poland Joining the European Monetary Union.1115 Words à |à 5 Pagescountries and choose the best offers from the whole Euro zone. When it comes to inflation the goal of the governing European Central Bank is to keep it low (lower than 2%). This might help the countries which have high inflation to maintain it on the reasonable levels. However, it is disputable if it is solely an advantage. On the other hand there are many threats and disadvantages of single currency. The countries that are in the euro zone are diverse and have different economic performances, whichRead MoreEssay about Advantages and Disadvantages of Free International Trade1283 Words à |à 6 Pages1a) Advantages of free international trade 1. Increasing the production. Countries are enabled by free international trade to specialise or to focus in the production of the goods in which they have a comparative advantage. Specialisation countries can take the benefit of efficiencies generated from increased output and economies of trade. The size of the firmââ¬â¢s market are increased by the international trade which results in lower average costs and increasing in productivity, as it ultimately leadsRead MoreIs A Peg Exchange Rate Regime Is The Loss Of Control Over Monetary Policy?2127 Words à |à 9 Pagesthe USA economy s requirements, but it had very severe consequences for Mexico which had pegged its currency to the US dollar. This rise in interest rates of the USA and consequently interest rates of Mexico hurt the balance sheets of households, banks and non-financial business, and it is one of the reasons for the 1994 financial crisis in Mexico. Another flaw of a peg exchange rate regime is its vulnerability to speculative attacks. Depreciation under a floating exchange rate regime is likelyRead MoreManagerial Economics Assignments3979 Words à |à 16 Pagesredefine their PPF. 3 2. Question Two. 7 Recently inflation targeting, a policy that has been used by the South African Reserve Bank, has come under fire from COSATUââ¬Å¸s Zwelinzima Vavi, for a series of reasons. Discuss inflation targeting in detail, noting the case for it, as envisaged by Finance Minister, Trevor Manual in 2000 and the advantages and possible disadvantages and your thoughts in this respect. 7 3. Question Three. 10 The effect of cold and frost weather in Brazil on the economy. 10 TheRead More Poverty in Africa Essay example1470 Words à |à 6 Pagescapita incomes in Africa have also been steadily growing, and poverty falling, measures are still far better in other parts of the world, such as Latin America, which suffers from many of the same disadvantages that Africa has. Africans should not blame Mr. Tony Blair, Prime Minister of Britain, The World Bank, George W. Bush, the president of the United States of America, any western developed country or the United Nations for attempting to redress through the Commission for Africa report, and decadesRead MoreDiscuss Advantages and Disadvantages of Inflation Targeting, with Special References to the Case of the Uk.3333 Words à |à 14 PagesDiscuss advantages and disadvantages of inflation targeting, with special references to the case of the UK. 1.0 Introduction: Prosperity, success and economic growth are largely perceived as created by free markets and private enterprise. However the need for government policy to promote economic growth as well as stability cannot be overlooked. Monetary policy has emerged as one of the most crucial government responsibilities this is due to a number of reasons. Firstly there is now a generalRead MoreDiscuss the Economic Advantages and Disadvantages to the Uk of Participation in the2629 Words à |à 11 PagesDiscuss the economic advantages and disadvantages to the UK of participation in the European single currency (Euro). Will British businesses be better or worse off if the country decides to participate? Introduction of Euro in the worldââ¬â¢s monetary union is a milestone. Eleven countries were going to create EMU at the beginning, now there is a long queue to join in EMU. Most of the EMU members get more advantage then disadvantage to join in Euro. Euro creates a large market in the Eurozone. ThreeRead MoreInflation and Money2003 Words à |à 9 PagesUnit 2: In no more than 300 words, outline the advantages and disadvantages of high leverage ratios for financial institutions. Advantages of high leverage: Leverage allows a financial institution to increase the potential gains or losses. A high leverage ratio may increase a risk but along with this higher risk also increase the potential for higher returns. Economies of scale can reduce transactions costs by developing expertise and take advantage. It can able to encourage higher liquidity.
Wednesday, December 11, 2019
Case study on Information Systems
Question: Case study on Information Systems. Answer: Introduction This assignment consists of A case study which requires you to apply your learning from the systems designmodule. An ethical analysis which requires you to apply both of thereadings provided on the course website. A conceptual development and reflection section which requires you to consider how systems designtasks impact on a systems development project. A learning reflection which requires you to identify what you learned from this assignment and to relate these learning outcomes to the UniSA Graduate Qualities. The feedback sheet lists the assessment criteria. Look for it on the assignments webpage. Take note of which sections carry the most marks. Note that this assignments word count is 4604without your answers, so Dont worry if the final word count seems high. Also, there are some diagrams in this assignment so dont worry if your final word count seems low. I suggest that you draw thediagrams by hand, photograph the drawings and insert the photographs in this file. If you prefer, you can use Words drawing tools (or some other drawing or modelling software) but you may find working with pen and paper is faster, easier to amend, less cumbersome and more reliable with respect to layout. Instructions When referring to the exemplars on the course website, read the old specifications carefully because the assignments differ every study period. Recall: in the previous study period, students spent an average of 24hours on this assignment. Pace yourself accordingly. For best results Do not attempt to complete the whole assignment in one session. Work slowly and carefully. In addition to the instructions on the course website Do not overlook the Why? questions. Read the case study carefully. Keep track of the hours you invest. You are encouraged to make assumptions where necessary. Scope for assumptions has been deliberately included in this assignment because it is often necessary to make assumptions openly when dealing with a client who is under-informed with respect to technology. Please label your assumptions clearly. Heres an example from a previous study period, Assumption: As the passengers of Titanic II may be from any nation, I have assumed a currency converter is required for the ticket-purchasing function. Case study: Socrates Co From the Systems Planning assessment You work at IT Foundry as a Systems Analyst. Socrates Co is a bookshop specialising in new, second hand and rare books. It is located on a busy shopping street, close to several university campuses and has been in business for a long time. Today, its managed by its owner, Joanna Diakou, but it was started in 1938 by Joannas father, Stefanos, who was a well-known local intellectual. When he established Socrates Co, Stefanos gave a lot of consideration to the stores interior design and location. It came to be well known as a place where people are welcome to escape the noise, rest their feet, and sit and read without being disturbed. There are comfortable armchairs between the shelves and people can have snacks if they are careful. Over time, Stefanos came to know many of his customers by name and Socrates Co built a reputation and a loyal customer base almost entirely from word-of-mouth recommendations. Stefanos retired in 1974 and turned the business over to Joanna, who at the time was recently graduated with an honours degr ee in the humanities.She has maintained her fathers practices and has come to know her regular customers by name and people know they can come to Socrates Co and find a warm welcome, insightful and witty conversation, or quiet solitude. Although she draws a salary from Socrates Co, Joanna doesnt consider the time she spends there to be work instead it is simply her lifestyle. She goes to Socrates Co every day except Sundays. Four other people work there: Kavya Amal works on Mondays and Thursdays; Adam Matchoss works on Tuesdays, Wednesdays and Sundays; Rajavel Sulake and Priyam Farrukh both work on Fridays, Saturdays and Sundays. Kavya, Adam, Rajavel and Priyam are postgraduate coursework students whose schedules change every semester. Priyam has worked at Socrates Co for five years and is paid a higher wage because she manages the store on Sundays. All of the staff love the relaxed atmosphere and they deeply appreciate Joannas attitude because, as long the customers have what they need, Joanna doesnt mind if the staff work on their assignments while they are at the store. The stores opening hours are the same every day: 11am to 7pm. However, Joanna has recently been unwell and has come to realise that perhaps Socrates Co could afford her an additional afternoon off if she didnt have to spend so much time on keeping track of inventory, sales, special orders, rosters and all the other little administrative tasks. Also, Kavya and Adam are students in an IT department and they both think Socrates Co really ought to expand into ecommerce, with an app and a website. Joanna is not entirely sure what this would entail, but she trusts Kavya and Adam and she decides to investigate further. One of Joannas regular customers is Andrew Frawley. He is one of your workmates at IT Foundry. When Andrew came into the store, Joanna asked him for advice. He immediately advised Joanna to work with you; you have more experience in ecommerce and publishing than Andrew. She agrees to a meeting, which Andrew arranges between yourself and Joanna. You talk to Joanna about Socrates Co and you realise its significance extends to the wider community: even people who never buy a book can enjoy reading in the peaceful atmosphere. You learn that Socrates Co has long-standing relationships with thirty-four publishers and you know that seventeen of the publishers (the larger ones) offer B2B ordering, returns and invoicing. You talk about various business processes. For example, you discuss how Joanna sources rare books and you discuss the Socrates Co text-book sales service (on a 5% commission) for uni students. You talk about the process for replenishing the second hand stock and the process for when a customer makes a special order. You are sure there are other business processes Joanna has not mentioned; payroll comes immediately to mind and you begin to identify other overlooked business processes. Joanna also tells you about a project she has had in mind for some time: she wants to start a small caf in one corner of the store, for which she has obtained a licence. You can see potential for supporting Socrates Co business processes and for supporting Joannas plans for a small caf, both without disrupting the Socrates Co reputation. However, as you are a seasoned professional, you dont rush in. Instead you suggest that Socrates Co funds a preliminary investigation of a potential future IS project. Joanna agrees to the cost, your manager approves, and when one of your existing projects closes, you begin the Socrates Co preliminary investigation. You now have outlines of the Socrates Co business processes but you need another meeting with Joanna to double check some details and to discuss project constraints. At the meeting, you sketch diagrams on the whiteboard outlining four of the main business processes. Then you ask Joanna if the processes share data, and if not, could they share data in the future. Joanna says, Well, no, they dont share data wait, what do you mean exactly? Because I know what sales are made when I check the days transactions and when I know the sales, it helps me figure out if I need to order more stock. There are other things that overlap too, like the rosters and the payroll. You explain thats exactly what you mean and you ask her to describe more overlaps in the Socrates Co business processes. Well, the cash sales determine the next mornings bank deposits, but the POS transactions just happen automatically. Also, you know how the sales tell me what to order? Well, I also use a bit of knowhow, like when Michael Sandels latest book came out, I knew it was going to sell quickly so I ordered quite a few. Actually, I can say the same for several other authors, like Sam Harris. He sells quite well these days. Hmm come to think of it, if the new system knows how quickly an author sells, then it could keep those authors in a special list, couldnt it? You agree thats one of the functions a system could provide. But you point out that it wouldnt be able to figure out whether to stock new authors because they wouldnt have a sales history. Joanna says, Oh, thats ok, the publishers know the store so well, I can usually rely on their recommendations. Then I just order a few copies of what they recommend, unless I think the author wouldnt work at all. Its especially easy if the publisher takes returns of unsold stock. You say, Like Fractal Publishing? They do that for one of my other clients. You recall that Fractal Publishing is one of the B2B publishers and that they are going to upgrade the security of their B2B system next year; as are Continuum, MUP, OUP and Stanford Law Books. Yes, weve had an account with Fractal for ages! Do you know Jane Berne? Shes my account manager. No, but lets stay on track. If you email me a list of publishers that take returns and a description of the important overlaps we can look at some other things. About the app do you want it to offer the same transactions as the website? Or do you have something else in mind? Im not sure. What do you recommend? To keep costs down, lets keep the transactions the same for now and if you need to review that decision in future, you can do so. But, transactions aside, the website can have other features if you want it to. It doesnt have to be only sales. Really? Thatd be great. We can advertise our different Writers Week events. I need to talk it over with Kavya and Adam, theyre bound to have some suggestions. Oh! Can the customers review the books they have read? Sure. But lets be a little cautious with respect to budget and schedule. So perhaps we ought to The discussion carried on for another fifteen minutes before you shook hands and estimated that you would finish the preliminary investigation within a week. From the Systems Analysis assessment The preliminary investigation you wrote up for the Socrates Co project enabled you to develop a basic understanding of the business context. Your SWOT analysis and scope lists captured the projects key elements and made a positive impression on Joanna and her staff. Jo has approved the projects system analysis. In a JAD-style approach to eliciting requirements, you decide to speak to each of the staff members. Even if they dont contribute to the project, benefits may arise from each of them being able to put your face to your name. However, this is more difficult than it seems as they are not always available on the same days. You discuss this with Joanna and she says that she plans to close the store early on the following Sunday because she and Priyam will be inducting a new employee, Archie Nguyen, who has filled the position previously occupied by Kavya (who recently resigned). She suggests closing the store at 1 and then she will provide a lunch for everyone before your meeting at 2. Once your meeting is adjourned, everyone can go home and she and Priyam will induct Archie. After this meeting, the following requirements are known. The information you presented during the preliminary investigation is confirmed, except where it conflicts with the following. As in most bricks and mortar commerce, sales can be cash or credit card. When a sale is conducted (cash or credit card), a scanner will be used to keep track of which items are being purchased. Priyam described what sales data currently is: the date, the item(s) being sold, the quantity per item, the total price and the receipt number. For a cash transaction, the customer is handed their change and a receipt. For a credit card transaction, the customer is handed a receipt. In the new system, sales data will be used to determine inventory levels. Once inventory is known, other business processes can be supported. In the new system, a weekly inventory report will be used by Joanna and Priyam before they place orders with publishers. It will tell them which items are popular and which items are low in stock. If a popular item is low in stock, it will be highlighted. Also, old stock will be reported so that Joanna and Priyam can discount the price or return it to the publisher. Depending on the publishers capability, ordering will be performed in a traditional manner (a phone call to the publishers agent) or via B2B. Joanna is going to speak to her contacts at each publishing house and compile a list of B2B publishers. Once you have this list, you will embed B2B components in the new systems design. When ordered items arrive in the store, they will be scanned in the back room (this will add them to the inventory database), price tags will be printed and attached. Finally, new stock will be put on the shelves. Joanna will need daily and monthly sales reports, with subtotals for cash and credit card sales. All the staff would like more flexible working hours. So the rostering system will be available to everyone so they can swap shifts online. A shift will be 4 hours duration and there will be two shifts each day. First, staff log in and enter their ongoing availability (this can be changed at any time) and the maximum number of shifts they want to work in a week. Then, every week, any time before Thursday night, staff can make changes to next weeks roster, putting their name down for whichever shifts they prefer. Every Friday morning, the roster is finalised by a process that will fill any empty shifts according to (a) ongoing availabilities (b) a staff members maximum number of shifts and (c) a round-robin allocation scheme (to make sure everyone gets the same number of shifts its important to Joanna that everyone gets an equal chance to develop skills and expertise, so she can call on all staff in an emergency). Then a report will be sent to everyone via SMS or email (whichever the y prefer). This report will show the finalised roster. If staff make sure all empty shifts are filled before the roster is finalised, there will be no surprises in the final roster. However, there has to be some flexibility for when people are unexpectedly unable to come to work. In these cases, Joanna or Priyam will call the people who are available for that day. For this purpose, an ad hoc report of staff availabilities is required. Also, Joanna or Priyam will amend that weeks roster because the payroll process will depend on the previous fortnights shifts. When the roster is amended a thank you SMS or email will be sent to the staff member who filled in on short notice. To support the payroll process, at the end of a shift, each staff member will enter the hours they worked (there are times when a shift unexpectedly runs longer than four hours). This is checked off by Priyam or Joanna before they go home for the evening. Staff are paid directly to their bank account for the hours they have worked, with a small bonus if they have filled in for someone else on short notice. This bonus is currently $10 but it might go up in future. Online sales will be available via the Socrates Co website. Product categories will correlate to the different sections in the shop because these sections evolved over a long time and are effective in supporting the browsing habits of the Socrates Co customers. However, an additional Sale category will be provided. Items in the Sale category are old stock at discounted prices. As in most ecommerce systems, customers can browse different product categories and can add items to their shopping bag as they browse. When a customer is ready to checkout, they can either log in and use their profile data for the transaction or they can checkout as a guest. If they checkout as a guest, they will have to provide a delivery address, credit card details, etc. Also, if a customer checks out as a guest, they will be invited to create a profile which will save their data for future transactions. The caf will be going ahead, but there has been a delay. Although Joanna has a licence, the planning permission has been denied and changes have been requested by the planners. So the cafs information requirements will not be a part of any new system at this point in time. Joanna thinks this is probably a good idea as she is not sure what those requirements might be until the caf is running. Special events will be advertised on the Socrates Co website. A content management system will be required to support this ongoing web-authoring activity. Each event will have its own web page, which will be linked to a splash image on the Socrates Co homepage. Advertised means Announced with the splash image and the web page, on which people can rsvp for a free event or buy tickets for a paid event. Followed (an events page will contain a widget to re-publish tweets that include the events Twitter hash tag). Wrapped up (highlights will be described and celebrated). Some events are annual (eg part of the annual Writers Week Festival), some events are monthly (eg the local writers society meetings, the local poetry slam, the Socrates Co book club) and some events are one-of. Some of these one-of events are held in conjunction with a publishing house (eg readings and book signings to promote a new book) and others are held in collaboration with individual people (eg an author or an illustrator may have been invited to give a talk about their career highlights or about their professional practice). Web pages of events that are held in conjunction with other organisations must contain the logos of these other organisations and those logos must be linked to the other organisations web sites. You make a start on systems analysis. As so many of the business processes impact on service provision, it is clear that several different data stores will be needed. However, you also realise more detailed information will come to light over time, which may require you to amend your current analysis. New information Joanna has approved your systems analysis and asked you to proceed with system design. As the rostering process is not something youve done before, you decide to do it first. The other processes will not be designed yet. You refer to your systems analysis documentation while designing. Recall: you can make assumptions in this assignment (as noted above). Also, you can use the course forum if you have any questions. User interface design Prepare a user interface storyboard for staff to make changes to the preliminary roster. Not sure how to make a storyboard? Storyboards show task flow and information layout. Here are some examples for your consideration: Design the report of staff availabilities. Design a user interface storyboard for amending the roster after it has been finalised (eg, when someone is unexpectedly unable to work Joanna or Priyam have to allocate their shift to someone else). Data design Create an ERD for the rostering process. Normalise the table(s) to 2NF. Two tables will be formed: Employee table and week table. Employee ID will be the primary key of employee table and Week (i.e. week no) will the primary key of Week table. Name Employee ID Phone number Priyam Farrukh 0002 0406765894 Archie Nguyen 0006 0401782988 Adam Matchoss 0003 0406993688 Rajavel Sulake 0004 0402337859 Priyam Farrukh 0002 0406765894 Archie Nguyen 0006 0401782988 Adam Matchoss 0003 0406993688 Rajavel Sulake 0004 0402337859 Priyam Farrukh 0002 0406765894 Week Avail1 Avail2 Avail3 Avail4 Avail5 Avail6 Avail7 Avail8 1 Sunday morning Sunday afternoon Friday morning Friday afternoon Saturday morning Saturday afternoon Monday morning Monday afternoon 1 Monday morning Monday afternoon Thursday morning Thursday afternoon Saturday morning Saturday afternoon 1 Tuesday morning Tuesday afternoon Wednesday morning Wednesday afternoon Sunday morning Sunday afternoon Friday morning Friday afternoon 1 Friday morning Friday afternoon Saturday morning Saturday afternoon Sunday morning Sunday afternoon Tuesday morning Thursday afternoon 2 Sunday morning Sunday afternoon Friday morning Friday afternoon Saturday morning Saturday afternoon Monday afternoon Tuesday morning 2 Monday morning Monday afternoon Thursday morning Thursday afternoon Saturday morning Sunday morning 2 Tuesday morning Tuesday afternoon Wednesday morning Wednesday afternoon Sunday morning Sunday afternoon Monday morning Monday afternoon 2 Friday morning Friday afternoon Saturday morning Saturday afternoon Sunday morning Sunday afternoon 3 Sunday morning Sunday afternoon Friday morning Friday afternoon Saturday morning Saturday afternoon Avail9 Avail10 Avail11 Avail12 Avail7 Avail8 Roster1 Roster2 Roster3 Roster4 Roster5 Roster6 Wednesday afternoon Sunday morning Sunday afternoon Friday morning Friday afternoon Saturday morning Saturday afternoon Monday morning Monday afternoon Thursday morning Thursday afternoon Thursday afternoon Tuesday morning Tuesday afternoon Wednesday morning Wednesday afternoon Sunday morning Sunday afternoon Monday morning Monday afternoon Friday morning Friday afternoon Saturday morning Saturday afternoon Sunday morning Sunday afternoon Tuesday afternoon Wednesday afternoon Because Employee ID and week are primary keys, it shows the functionality dependence of some of the keys on other keys. Employee ID Week Avail1 Roster1 Etc. 0002 1 Sunday morning Sunday morning 0006 1 Monday morning Monday morning 0003 1 Tuesday morning Tuesday morning 0004 1 Friday morning Friday morning 0002 2 Sunday morning 0006 2 Monday morning 0003 2 Tuesday morning 0004 2 Friday morning 0002 3 Sunday morning Normalise the tables to 3NF. In the 3rd normal form, there should not be much redundancy in the table. If there is a non-key field which depends on another field, it should be removed. Starting with Employee table: Name Employee ID Phone number Priyam Farrukh 0002 0406765894 Archie Nguyen 0006 0401782988 Adam Matchoss 0003 0406993688 Rajavel Sulake 0004 0402337859 There is a dependency between the Employee and week which is shown below without any redundancy. Starting from Avail 1 to Avail 12, a new table will formed with following column headings: AvailRoster Avail ID Name of the weekday Shift Name Type WeekNo Avail1 Sunday Morning Availability 1 Avail2 Sunday Morning Roster 1 A new table will be formed which will have primary key composed of employeeID,Availability and Roaster: Employee ID Availability Roaster 0002 Avail1 Avail5 0006 Avail2 Avail1 0003 Avail3 Avail4 0004 Avail1 Avail1 0002 Etc. Etc. 0006 Etc. Etc. 0003 Etc. Etc. 0004 Etc. Etc. 0002 Etc. Etc. If you identified any new tables during normalisation, update the ERD. You have completed the data design. Now you will design the system architecture. You begin by reviewing the system architecture checklist. System architecture System design is a combination of software, hardware, procedures as well as data to deliver an effective system which Is cost-effective, flexible as well as technically sound. This system contains all the informational needs of a business. System architecture is initiated with logical phase of information system which then advances to deliver a physical structure. Output is a physical structure and it includes software, hardware security as well as procedural processors. The elements which arerelevant to the case in question includes: Scalability, Enterprise Resource Planning, Processing Options, Security Options as well as web integration. Prioritise the items that you identified in question 9. Briefly explain (one or two sentences) these priorities. SYSTEM ARCHITECTURE CHECKLIST EXPLANATION PRIORITY WEB INTEGRATION Web based integration includes that the system is capable of using web based protocols to handle input and output for the each set of users of the system. 1 SCALABILITY Scalability means that the system and its logic can be expanded upon later on so as to meet the needs of its environment in which the system is as and when it changes. 2 ERP ERP is the backbone of any small, medium or large scale business. It is important that the system should have basic connectivity to an ERP system. 3 SECURITY A well designed information system should reduce any chance of vulnerabilities present In the system. At the same time, the system should be designed in a way that it reduces chances for users to add to that security vulnerability either deliberately or accidentally. 4 PROCESSING The system should be capable of processing the data 24 by 7 and without any user intervention. At the same time full and intermittent backups should be done without any user input seamlessly in the background. 5 12. Consider Web 2.0. Are you going to recommend any Web 2.0 capabilities for the Socrates Co website? Why? The biggest capabilities from Web 2.0 would be that the content would be dynamic. Such that the system should automatically pull up best authors from the system. This information then would be shared to the publishers who can automatically submit titles from those authors and thereby manage inventory better. Apart from this, there would be other dynamic content throughout the system. For instance, the content on the pages such as authors by popularity or the overall roaster would keep on changing based on the data. Review the sections in a system design specification. Is a system design specification required for the Socrates Co project? Why? System design specification is required for the mentioned case study. This is so because the specification will specify is accessed and manipulate by which user. IT will help the development team to divide the data and provide specific privileges and access permission to the respective administer and staff user. It will also specify the flow of data in the system. Ethical analysis Reflect on your experiences as a student or in your career. Identify an ethical issue that you encountered at some time in your past.[1] Describe the ethical issue. Do not describe how it was resolved. I have been downloading content from the Internet since a long time which includes movies, TV, e-books and music. I understand the terms such as copyrights and piracy that is usually associated with the online content but could not relate it with my act of doing the same as the content was just so easily available. I recently came across an interview of a movie maker who talked about the losses he suffered due to the fact that his movie was leaked online before it reached the theatres. I, then wondered that although there are no prominent laws regulating these activities and download of such content from the web, but was it ethical? I was involved in the losses that other people were facing because of my act. I was just using this content for my personal use and entertainment and not for any commercial sale, but I just kept wondering whether it was justified on the ethical grounds and the rules of morality. Consider the trust model from Grodzinsky, Miller Wolf (2012) and the ethical decision-making process from OBoyle (2002). These readings can be located on the course web site. In analysing the ethical issue you describe above, which is a better choice: the trust model from Grodzinsky, Miller Wolf (2012) or the ethical decision-making process from OBoyle (2002)? I analysed the ethical issue of downloading the content for free from unfamiliar sources from the Internet on the basis of two popular models and processes that is the trust model from Grodzinsky, Miller Wolf (2012) and the ethical decision-making process from OBoyle (2002). I found that the more preferred and relatable choice for the issue was the trust model and the rule three of the same which states that Trust involves risk; the less information the trustor a has about the trustee b, the higher the risk and the more trust is required. (Digitalcommons.sacredheart.edu, 2016). Trustor in my ethical issue would be the maker of the content and trustee would be me or other users who download such content. There are people who download these for fun purpose and there are also many who do it for commercial use. Trustor would not be able to collect all of this information in detail and which would lead to the risk of him/her facing the loss in terms of money and also in terms of trust fa ctor. Ethical decision making theory by OBoyle discussed more on the moral reasoning and perception which could not relate much with my ethical issue in particular (O'Boyle, 2002). In your answer to Question 14, you selected either the trust model or the ethical decision-making process. What are your reasons for rejecting the other approach? The approach of ethical decision making process put forward by OBoyle has not been considered in the ethical issue being discussed is because it basically revolves around the factors such as idealism and relativism when weighing a particular action on the ethical terms. There can be some serious variations in terms of an individuals judgement, morals and beliefs in an ethical situation which did not seem correct for analysing the situation (Forsyth, OBoyle and McDaniel, 2008). The trust model on the other hand fit perfectly in making the analysis on the ethical issue and hence, it has been selected over the other approach. Reflect upon the approaches inGrodzinsky, Miller Wolf (2012) and OBoyle (2002). Would an analysis be more robust if it had included some aspects of both approaches? For example, if you were to apply OBoyles approach (2002), would your analysis be more robust if it included some aspects from Grodzinsky, Miller Wolf (2012)? The analysis would surely be more robust if the certain aspects are chosen from the processes and theories rather than a selection of just one out of the two. The trust model amalgamates information technology with the ethics in its structure and explains the e-trust on the basis of the relationship between the Trustor and the trustee on several aspects in terms of risks associated, outcomes and morality. It also explains the factors that are involved in the face to face trust and the artificial or virtual trust that is more popular in the case of the web or the internet (Grodzinsky, Miller and Wolf, 2010). The ethical decision making process by OBoyle discusses the issues in the terms of logical and analytical basis from the moral resolution and perspective (i-r-i-e.net, 2016). The combination of both of these theories would integrate trust, moral, logical reasoning and perspective in one common platform and would therefore, be very robust in nature. In your explanation, focus on which aspects you would have included and why. The aspects that would be included from the trust model would be: Trust is something that is formed with the relation between the parties that are involved. Risk is also an important aspect that is involved in the trust and the loss of the same. The motive and the expectations behind trust would also be included. Awareness of the trust is another important aspect. The outcomes that would result in the trust process would also play a significant role. The aspects that would be included from the ethical decision making process would be: Perception: I would have included this aspect in my analysis as it would help the user to decide whether to download the content or not. Discernment: This aspect would help me understand whether the same practice would be allowed in future or not and the relationship between the maker and the user as well. Decision: This aspect helped me analyse the decision making process involved in the entire process. Action: This is the final result that would come out of the entire situation from the ethical perspective. Conceptual development and risk identification So far, this assignment has supported the development of skills required in professional practice, including ethics. Now, it supports the development of professional expertise. What is the overall purpose of the systems design phase of a project and how does it differ from the systems analysis and systems planning phases? System design is an important phase in the world of software engineering and development. It holds a significant place and is necessary because of the reasons as described below: System architecture is defined in this phase. Components, interfaces and data that are necessary for the project to develop is explained in this phase in the form of blue-print of the entire system and its components with the help of various design diagrams. Data sources are also identified in this process which helps in the understanding of nature and type of data. This is the process which comes after the requirements phase. The description of how the requirements would be applied in practice is explained in this phase. The overall view of the system and the components can be gathered from this phase (The MITRE Corporation, 2016). The difference between system analysis, system planning and system design is explained below. Basis of difference SYSTEM PLANNING SYSTEM ANALYSIS SYSTEM DESIGN Requirement It is usually the first and the foremost activity that is done to gain an understanding of the system and further processes. On the basis of the requirements, it is used to present a logical model of the system. It is used to bring forward a physical model of the entire system on the basis of business processes and requirements. Significant step Feasibility analysis of the system to find out if it is possible or not, requirement modelling and formation of the plan of action. Step-by-step explanation of the business model on the basis of various fact finding techniques. Identification of the set of inputs and the set of outputs to bring forward a design. Tasks A strategy plan for the system stating the scope, purpose, assumptions and dependencies. SWOT analysis to identify the strengths, weaknesses, opportunities and threats associated with the system and documentation of the same. Transformation of logical design presented in practice and code. Deliverables Feasibility study with keeping the facts such as cost/benefit analysis, budget constraints and schedule constraints in consideration. System Requirement Specification (SRS) document explaining the functional and non-functional requirements along with the features to be included and the ones to be discarded. System Design Specification (SDS) explaining the design of the system with the help of various diagrams such as data flow diagrams, entity relationship diagrams, functional hierarchies and likewise. Consider the case study above and the design you have prepared. You may have completed the tasks with a lot of care. If so, your design is likely to be effective in supporting future project activities. Consider a situation in which the design is careless. With respect to the systems design tasks you completed in the case study section of this assignment, identify risks for each of the following stakeholders. Your answer should have eight unique risks (two per stakeholder). Socrates Co. Decrease in productivity and efficiency due to a lot many changes in the architecture happening all at the same time. Disruption of reputation among the customers owing to the increase in services and mismanagement probable around the same. The wider community. Loss of trust in the business as the personal touch which is more in face-to-face business would be hampered. Getting attracted to the newer names in the business who adapt to automated processes since the beginning that are not familiar and may result in loss in the bigger picture. The IS/IT profession. Attack of malicious software such as viruses, worms, Trojan horses and logic bombs. Network attacks such as man-in-the-middle attack and denial of service. Your own future work tasks (systems implementation tasks). Disturbance in the availability of service at all times. Loss of reliability of the service with introduction of website and mobile app. Select two of these risks and explain why they are important to this project. The two of the eight risks state above which are of primary importance are: Loss of trust in the business as the personal touch which is more in face-to-face business would be hampered. Currently, Socrates Co. Maintains a personal equation with most of the publishers, customers and suppliers. The same may not be the case with the introduction of increased services and use of electronic commerce. It would not be possible for the business owners to have in-person meetings with every stakeholder involved and the same may result in the loss of trust for the other parties. Attack of malicious software such as viruses, worms, Trojan horses and logic bombs is another major risk involved as it may have an adverse effect on the confidentiality, integrity, security, privacy and availability of the information. Unreliable and unauthorized users may get entry to the system and make use of the information which may harm the stakeholders involved. With reference to the two risks from question 19, what are your conclusions about the importance of attention to detail with respect to system design? It is extremely important to have a well-defined risk mitigation and management process explained in the system design phase in order to avoid the risks and detect the same at the correct time. Some of the countermeasures to the two risks discussed are: Providing an option of customer feedback on the website regarding any of the product or service to maintain the same level of trust among the stakeholders. Installing measures to have a minimum downtime in case of an attack, to provide the reliability and availability of services at all times to maintain the trust level. To have an option of 24*7 chat or help facility available on the web site. Access control mechanisms installed on all the system and network entry and exit points. Use of strong anti-virus, firewalls and internet security programs. Use of stronger passwords and PINs to prevent unauthorized access. Adapting encryption measures in the transfer f information over the network. Use of private keys and shared keys with the stakeholders for decoding of the information. Learning reflection Think about the tasks you completed in the Systems Planning, Systems Analysis and Systems Design assessments. Reflect upon any knowledge you have gained from completing these tasks. Read the UniSA Graduate Qualities. Name two learning outcomes. Note: although the Course Objectives on the Course Outline can be informative, please consider your personal learning experience. As you have a unique history, you will have unique learning outcomes; that is, someone who knew a lot about drawing DFDs before starting this assignmentcouldnt identify that skill as a learning outcome;they will identify something else instead. Example: In these assessments, I learned about system design where in the database can reduce high level of redundancy by normalizing the tables and bringing them in 3NF form and I learned system architecture specification where in I found a list of items which should be fulfilled while preparing an architecture. For each of your learning outcomes, name one relevant UniSA Graduate Quality. Example: As noted above, my first learning outcome is This learning outcome correlates to the graduate quality My second learning outcome is This learning outcomes correlates to . ERD and design of tables relate to the learning outcome to GQ3 and system architecture correlates to GQ1. In your previous answer, you correlated two learning outcomes to two Graduate Qualities. Focusing on these two Graduate Qualities and addressing each one separately, explain how this assignments tasks enabled you to further develop these qualities. GQ3: While preparing the ER diagram, a very sharp and high attention towards the case details and along with this application of logical ability is also required. It allows me to develop skills which help in understanding the logical relationship. GQ1: The system architecture checklist items made me to go through the entire system phases of the software development. Also, it made me think over the hardware and software acquisition and gain sufficient knowledge of the professional services. The following questions are for students who engaged in teamwork for the first two assessments. In your previous assessments, your teammates reviewed your teamwork abilities. Why are peer reviews important and what role do peer reviews play in your education? The peer reviews help in identifying the mistakes being done and also the critical feedbacks help in improving and minimizing the errors which may take in future. What is the most important think you learned from your peer reviews? Errors/mistakes can be highly reduced and hence quality of paper gets better. What is the least important think you learned from your peer reviews? Not available. Not for assessment How many hours did you invest in this assignment?This information will be provided to future students in this course. Put your answer here. Thank you for the time and effort you have invested. I look forward to reading your submission. References Grodzinsky, FS, Miller, K Wolf, MJ 2012, 'Moral responsibility for computing artifacts: "The Rules" and issues of trust', SIGCAS Computers and Society, vol. 42, no. 2, pp. 15-25. O'Boyle, E J 2002, 'An ethical decision-making process for computing professionals', Ethics and Information Technology, vol. 4, no. 4, pp. 267-277. Shelly, GB Rosenblatt, HJ 2012, Systems Analysis and Design, 9th edition, Cengage Learning. Digitalcommons.sacredheart.edu, (2016). [online] Digitalcommons.sacredheart.edu. Forsyth, D., OBoyle, E. and McDaniel, M. (2008). East meets west: A meta-analytic investigation of cultural variations in idealism and relativism. [online] Philpapers.org. Grodzinsky, F., Miller, K. and Wolf, M. (2010). Developing artificial agents worthy of trust: Would you buy a used car from this artificial agent?Ã . Ethics and Information Technology, 13(1), pp.17-27.
Tuesday, December 3, 2019
SMART analysis free essay sample
Introduction to Business Decision Making Case study- The Sun Wind Corporation (SMART analysis) Nowadays there is an increasing environmental awareness in the world. I am now given the Job of choosing a site for the construction of a medium-sized wind farm with a potential 100MW generating capacity of Sun and Wind Energy Corporation. There are five potential locations for which the I-JK government will issue a licence, although there will be consultations with interested parties like local residents and environmental groups, which may lead to the company have to pay compensation fees. The Simple Multi-Attribute Rating Technique would be used here to address the problem. It is a technique that aid to help decision makers trade-off advantages and disadvantages appropriately, as sometimes there are a number of objectives involved in the decision problems. A choice needs to be made from a set of discrete alternatives; it is the location of the new wind farm in this case. We will write a custom essay sample on SMART analysis or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Also, the reasons for using SMART is it structures and simplifies decision problem and gain more understanding, as we as maximizes or minimizes scores on an attribute. There are eight steps in the SMART Methodology. Step one: Identify the decision maker(s) We usually assume the person is the business owner. In this case I will be the decision maker of choosing the location of the wind farm. Step two: Identify the alternative courses of action In my case there are different locations of wind farm I can choose, which are Allen Banks, Bingham Heights, Caworth Castle, Deeply Sands and Eppington Plain. They are the five potential locations, for which the I-JK Government will issue a licence, Step three: Identify the attributes that are relevant to the decision problem The attributes that distinguish the different locations will be the factors based on costs and benefits. To determining attributes of alternatives, the initial attributes elicited from the decision maker (me) have to be distinct i. e. choice of the location that is the best for The Sun Wind Energy Corporation. Step 3 output: Constructing A Value Tree for the Wind Farm Location Problem condition apart from the attributes that provided from the company. Then, it is necessary to assess the adequacy of the Value Tree once it has been constructed. It should be Judged in terms of whether or not the tree is accurate and whether it reflects what I concern. It is suggested that there are five criteria are used (Keeney nd Raiffa Criteria,76). ) Completeness As all the main concerned attributes have been included and they were advised from professional consultants, my colleagues and me believed that all attributes are well considered. Result of an optimum wind farm is likely to be built with appropriate strategies. 2) Operability Aspects of costs and benefits are clearly defined by the lowest- l evel attributes. From a monetary angel to weight costs like construction and land costs would give a more concrete and quantitative results while a long term vision of benefits can be given by evaluate qualitative attributes like climate.
Subscribe to:
Posts (Atom)