Friday, December 6, 2019

Factors for Transforming Pedagogy with Mobile Web

Questions: 1. Your university wants to recruit high-quality high school students from your state. Provide examples of (1) the data that your recruiters would gather in this process, (2) the information that your recruiters would process from these data, and (3) the types of knowledge that your recruiters would infer from this information? 2. Describe the five forces in Porters competitive forces model and explain how the internet has affected each one? 3. Differentiate between data warehouses and data marts. Describe a few of characteristics of a data warehouse? 4. Discuss the strategic benefits of BI systems? 5. Why are authentication and authorization important to e-commerce? 6. List 3 Web 2.0 social networking tools and describe how you would use each for marketing your products? 7. Discuss the major limitations of e-commerce. Which of these limitations are likely to disappear? Why? 8. Describe the benefits of integrated accounting software packages? 9. Explain why web-based customer interaction centers are critical for successful CRM systems? 10. Explain the important role that information systems play in supporting a supply chain strategy? Answers: 1. The grade marks are not sufficient for evaluating the students of the high school within any recruitment. The concerned universities generally gather the students in order to gather data for evaluating their knowledge and experiences within the field of employment. In contrast with this fact, the quality of student merit should be evaluated on both the intelligence and academic knowledge. According to (Swider et al., 2015, p.880), this is found that the quality of student knowledge cannot be measured with the help of evaluating it on quantitative way. The universities can consider the grade marks for evaluating the knowledge of students. In addition to these facts, the recruiters consider the technical skills, extracurricular activities, home town and other beneficial marking that make the student one individual in the crowd. The recruiters considers the competitive examination scores such as CAT, SAT, MAT and GPA etc. These scores will set the benchmark to the recruiter for selecting any student in the recruitment. These competitive scores show academic qualification of the student. In addition to this, the recruiter will get the information about the home space of the student when they will give the information about their native places. The technical skills and features of the students provide the qualitative information about the student. The processing of information reveals the accessible functionalities to the recruiter about the students qualification. If the score of the student is high then the chances of selection in recruitment increased. In addition to this, the students quality or efficiency is evaluated based on the technical and other feasibility study checked by the recruiters (Archambault et al., 2014, p.2127). The students background of the student is revealed to the recruiters when they share their information about their native places. In contrast with this fact, all of these data will reveal the important information to the recruiters that is necessary to them. 2. Figure 1: Porters Five Forces (Source: E. Dobbs 2014, p. 32) The framework of the Porters Five Forces is generally used for the analyzing the competitive marketplace of any product or services involved within any industry. This framework helps the organization as well as the industry in gaining competitive potential and profitability within the target market. Important aspect involved in the porters five forces model is elaborated in this part of the assignment: Threats of New entrants: Two organizations generally compete for profitability and existence. This aspect porters five forces increase the competence in the market. Threats of Substitutes: The products and services having same or equal quality that increases the threats to the older products. Bargaining power of Buyers: The increase in the buyer reduces the profitability of the organizations offering products and services (Yunna Yisheng, 2014, p.798). Bargaining power of Suppliers: Increase in supplier power also increases the chances of reduced profitability within the organizational culture of industry. Potential rivalry: The increase in potential rivalry increases the effective competitive level of the market place. Effect of Internet on the Porters Five Forces In accordance with the technical feasibility of the internet application, the effective growth of E-Commerce and E-Business has been introduced into the technical domain. In contrast with this fact, the Internet activities have greatly impacted upon the Porters five forces. The light of technology enablement of business to e-business, the concerned Porters five forces has been affected from various perspectives. The increase in information accessibility increased the bargaining power of supplier and customer (E. Dobbs 2014, p. 33). The information gap is reduced with respect to this technical advancement. In addition to this, the customer reach is increased by increase in e-business enablement. This aspect has negative impact on the bargaining power of customers. As a result of these aspects, e-business models enabled the entry of new industries into the market. All of these aspects directly impacted upon the new entrants within the market. This reduced the threat of new entrants. 3. The difference between the Data Mart and Data Warehouse is provided in this part of the assignment: Data Mart Data Warehouse The data warehouse generally collects the data in order to manage all of these databases with respect to various needs of the clients and consumers. The data mart is the part of the data warehouse that focuses on the single functional area. In addition to this, every organization has individual data mart. The data involved in the data marts generally sponsored and the individual level of handling is followed in this data marts (Kimball et al., 2015, p.800). The data warehouses generally follows non-volatile and variable timing for various identifiable departments. The subject oriented data are generally used in order to maintain the system architecture. Data marts involved in databases are available for particular department and divisions. Data warehouses are mainly used in the enterprise level for effective solutions. This manages different kinds of data for operating various data related to the databases. Data marts are generally developed from the specific departments in order to manage various databases. Data warehouse is mainly used for integrating the data marts that are mainly used for strategic decision making perspective. The data mart generally stores the summarization of data. The data warehouse provide support to the information storage and stores detailed information to the users, clients and consumers. Characteristics of Data Warehouse Subject orientation: The data warehouse is subject oriented and for analyzing a particular subject area. As an example the sales can be considered as a particular subject. Integrated: The data warehouse integrates the various kinds of data that are collected from different data resources (Cuzzocrea et al., 2013, p.67). This helped the data warehouse in identifying the individual characteristics of data identification process. Time variant: The data warehouse is considered as the time variant in nature. Any user or authenticated person can easily collect or retrieve the data from the data warehouse. Non-volatile: The data ware house has the most significant data storages over the database networks. These aspects should be considered for managing the databases for the user convenience. The users or clients can easily retrieve the data with at any time. 4. Business Intelligence is one of the most effective technical advancements that are considered for improving the business analytics and data analysis process. In addition to this, the Business Intelligence perspective is also helpful in taking various decisions in order to make any organization sustainable within the target market (Wixom et al., 2014, p.1). Business Intelligence tools are helpful in solving various decision making issues involved within the business process. There are various benefits of Business Intelligence within the technical field; these benefits are being elaborated in this part of the assignment: Actionable intelligence: The business intelligence is famous its providence of actionable intelligence. There are various decision making comes into the business operations, the organizational heads deals with these kinds of issues with the help effective decision making tools. BI is one of them as it provides critical decision making support to the organizational heads at this point of time. Sales personalization: the contribution to the business is one of the most effective facts that needs be considered while managing the effective solution for improving business operations. In contrast with this fact, personalization of economy and business perspectives are general aspects that are managed with the help of Business Intelligence tools. Speedy answers: Traditional business intelligence tools provide the data support from the small set of databases (Laursen Thorlund 2016). In contrast with this fact, this process was time taking and the system heads only get responses when they get the reply of department heads or specialists. In addition to these facts, the improvised Business Intelligence tools are helpful in providing effective speedy answers to the organizational heads. Information Integration: Data integration providence is another effective benefits related to the system architecture of the Business intelligence tools. Business Intelligence tool provides effective information integration services to the organizational heads and industries in order to remove the barriers from the business operations. 5. Authentication and Authorization both are considered as the critical enablers of E-Commerce over the internet. This aspect is mainly considered as the internet is considered as the open public network. This open public network has the capability of providing open access to all of the users of network. In addition to this, these users need to be connected with ISP. In contrast with these facts, two users having transactions ad they that particular transactions needs authentication of the users and this aspect should be verified by every users (Chang et al., 2014, p.400). These authentications involve various company policies and security aspects involved in this particular transaction process. In case of face to face communication in real world the authentication is done with the help of ID, certificates and letters. In contrast with this, in case of the internet, the parties exchanging their data that may be personal email id, important documents etc. can be malicious for the users. These aspects should be concerned in order to ensures the transactions security perspective within the web network. Therefore, in the web servers, the authentication and authorizations are done with the help of electronic measures that provides more security perspectives to the users or clients. Security technologies are generally used for authentication and for mandating the authorization the Business Rules should be followed. In case of E-Commerce applications, the users must verifies the end user name and qualification details before providing their personal details and other important information that are genuinely original (Hummen et al., p.292). Online authorization process verifies the third party that is making deal with the users. Authorization protects the system from economic damages. In contrast with these facts, the authorization as well as authentication process prevent the economic damages within the industrial distribution. Therefore, both these aspects authorization and authentication are important for managing effective service structure within the E-Commerce domain in order to provide effectiveness. 6. The application of Web 2.0 has changed the entire process of communication measures going on with the help of internet or social media. The most significant social networking tools that can be used for marketing products and services are being elaborated in this part of the assignment. Facebook Twitter Linked In Facebook for marketing products Facebook is the most popular media of communication in among all of the social networking sites. The advertisers create the pages for making their customer attracted to their products and services. In addition to this, social perspectives of the customers can easily be analyzed with the help of following their likes and followings (Cochrane 2014, p.65). Therefore, this social media application is helpful in marketing any product or services according to the customer demands and needs. Twitter for marketing products Twitter is another important social networking site that also helps the advertiser in launching their products and services in to the competitive marketplace. In addition to this, Twitter provides the opportunities to the advertiser that helps them to grab their opportunities and target customers. The advertisers can easily Tweet about their products and services in order to provide the customers an overview about the product or services. Hash tagging phenomenon is famous in Twitter that makes the product or services highlighted towards the customers. Linked In for Marketing Products This social networking site can be recognized as one of the most effective advertising media for products and services in the competitive market. In contrast with these facts, the advertisers can reach to the huge numbers of decision makers. In contrast with this, the advertisers can easily select their target group of customers (Chou et al., 2013, p.e9). This selection will be helpful in getting more number of customers. The advertisers within the linked In can easily select their target customers (Industry sector, job function, company size, Gender and age). 7. Major Limitations of E-Commerce Security: This is one of the effective risks involved within the system architecture that stops the users from making any kind of financial transaction through e-commerce websites. There are various encryption and security perspectives that protects users personal information but these are not enough to protect the user data. Privacy: The user privacy is another aspect that needs to be managed with the help of e-commerce website, but the hackers are revealing their personal information within the network or literally misuse the data for their own perspectives. High Start up cost: Any kind of E-Commerce business needs a huge amount of startup cost that needs to be managed by the organizational heads (Chiu et al., 2014, p.85). In contrast with this fact, this aspect is considered as one of the most effective negative aspects involved in the E-Commerce business implementation process. Lack of Skilled Personnel: E-Commerce business perspective is much complex than any other conventional business process. In addition to this, the E-Commerce process needs effective and skilled personnel for effective maintenance of the system architecture within the competitive market. Products effectiveness: Effectiveness of the product is another limitation of the E-Commerce business process that makes the system architecture of the advanced business process weak in the competitive market. The customers are only impressed with advanced features of the products and services with respect to evolving trends. Cost involved in Labour: Labour is very important factor involved in this business process that needs an additional investment to be maintained. The labors are skilled enough in E-Commerce filed, therefore they demands for high amount of money that increase the cost involved in to the E-Commerce business process. Technical Issues: Technical issues can be evolved within the system architecture of the E-Commerce any time (Wang et al., 2016, p.625). The technical aspects are very important in order to mandate the system architecture of the business process. All of the above mentioned aspects are concerned as the limitations of the E-Commerce. Among all of these aspect Security and privacy issue can be mandated if the E-Commerce websites and organizations mandate their security structure with the help of authorization and authentication user and clients within the system architecture. 8. There are various benefits of integrated software accounting packages. These benefits are elaborated as follows: Speed This is one of the most effective benefits of Integrated Accounting Software. In addition to this, the computerized process makes the accounting process faster and easily operable. The technology in this particular field uses invoices in order provide faster operating speeds to the users (Ggs zer 2014, p.1). The manual operation involves good speeds in order to provide effective operating measures. In contrast with this fact, the accounting software set provides the effective speedy measures to the users in order to provide effective solutions. Minimizing Errors Minimizations of errors are another effective benefit of the automated accounting software used in the accounting operations. Previously all possible calculations were introduced manually but in the contemporary time, accounting software reduces the chances of errors within the calculation. In case of invoices that needs minimizing errors as this includes huge amount of calculation and billing during this invoice. Reporting This is one of the major advantages of using computerized invoice system within the system architecture. In addition to this, the reports can be evaluated in this process. These evaluations of reports are effective and efficient in case of controlling financial details within organizations. In contrast with this fact, the authority has concern for minimization of losses and late payers. All of these aspects can be checked with the help of reporting aspect involved within the accounting software. Organization This is very easy to forget about invoices when these are prepared manually. This information may be lost within the mail or any other network where it was transmitted (Lipi et al., 2015, p.553). These data should be managed and structured with respect to the demanding structure. The accounting software is able to provide accurate data to the system architecture. and the users and clients are benefitted with these services. 9. The CRM system involved in this system architecture of any organization generally uses various strategies and web capabilities and management methodologies that help the customer maintaining the relation with the business process. There are various applications of CRM system. In contrast with these facts, the CRM system enables the user satisfaction with respect to the organizational demands. Any kind of business process considers their customer as their core assets. In addition to this, the internet is another flourishing element for the student (Chataway et al., 2014, p.2213). CRM system is one advancement of the information technology that enables the customers as well as organization for making communication in between them. The CRM system provides the organizations and customer an innovative way for managing their communication in an effective way. The organizations generally use the e-business applications and social media for interacting with their concerned customers. In case of the CRM system the business has main focus on the customer loyalty programs. The increased level of satisfaction from the end of customer allows the organization in being popular within the competitive marketplace. This aspect increases the profitability of the business process. Besides this aspect, the customers are mainly fond of effective and cost effective products and services. If the e-commerce organization becomes successful in providing appropriate responses towards customer demands, that can make themselves sustainable in the competitive market. In contrast with these facts, the web based applications allows quick processing of user requests and demands. This aspect supports the customers. In contrast with this, the web based customers interactions with the help of social media also create communication process that ensures quick services (Butt Zeegers 2015, p.100). Live chats, emails and other important communication mediums allow the employees of organization in being more conscious about the system architecture. This aspect allows the customer based interaction in being effective and efficient. 10. Supply chain management is one of the most important and effective aspect that every organization needs to manage with their internal and external resources. A well managed supply chain connects the suppliers, manufacturers, and distributors as well as customers. All of these facts are managed with the help of suitable information system within the organizational structure. These information systems are used for controlling for maximizing optimum productivity. In addition to this, the organization also demands for joyful relation, overall satisfaction and cheaper cost structure. Quick and effective information systems are helpful to the managers in managing all the activities related to the customer responses, demands, inventory management and stock related queries (Pieterse et al., 2014, p.347). In this case the internet plays a great role with the help of customer relationship management information system. This technological advancement helps the manager in make the business process aligned with the organizational objectives and goals. All of these aspects make the organizational structure competitive in relation with SCM partners. The need for IT are mainly evaluated with respect to the following aspects: IT provides less cost involvement, IT is environment friendly, IT is not location specific, and IT does not requires expensive infrastructure (Van der Does et al., 2013, p.744). In contrast with these aspects, the organizations use IT solutions in order to improve Supply Chain Management process. These aspects are Communication measures, electronic mails, enterprise resource planning. All of these aspects are mandatory to be incorporated within the supply chain management in order to maintain effectiveness of solutions for the organization. As a result of IT solutions, the organizations can have better control over their inventory management systems. With the help of internet and SCM the organizations easily connects the users and clients with respect to their demands and needs with respect to evolving trends. Better utilization of manpower, inventory tracking are achieved with the help of SCM implementation within organizations. References Archambault, B., Le Pape, O., Bousquet, N. Rivot, E., 2014. Density-dependence can be revealed by modelling the variance in the stockrecruitment process: an application to flatfish.ICES Journal of Marine Science: Journal du Conseil,71(8), pp.2127-2140. Butt, C.R.M. Zeegers, H. eds., 2015.Regolith exploration geochemistry in tropical and subtropical terrains(Vol. 4). Elsevier, pp. 100-600. Chang, D.Y., Benantar, M., Chang, J.Y.C. Venkataramappa, V., International Business Machines Corporation, 2014.Authentication and authorization methods for cloud computing security. U.S. Patent 8,769,622, pp.400-500. Chataway, J., Schuerer, N., Alsanousi, A., Chan, D., MacManus, D., Hunter, K., Anderson, V., Bangham, C.R., Clegg, S., Nielsen, C. Fox, N.C., 2014. Effect of high-dose simvastatin on brain atrophy and disability in secondary progressive multiple sclerosis (MS-STAT): a randomised, placebo-controlled, phase 2 trial.The Lancet,383(9936), pp.2213-2221. Chiu, C.M., Wang, E.T., Fang, Y.H. Huang, H.Y., 2014. Understanding customers' repeat purchase intentions in B2C e?commerce: the roles of utilitarian value, hedonic value and perceived risk.Information Systems Journal,24(1), pp.85-114. Chou, W.Y.S., Prestin, A., Lyons, C. Wen, K.Y., 2013. Web 2.0 for health promotion: reviewing the current evidence.American journal of public health,103(1), pp.e9-e18. Cochrane, T.D., 2014. Critical success factors for transforming pedagogy with mobile Web 2.0.British Journal of Educational Technology,45(1), pp.65-82. Cuzzocrea, A., Bellatreche, L. Song, I.Y., 2013, October. Data warehousing and OLAP over big data: current challenges and future research directions. InProceedings of the sixteenth international workshop on Data warehousing and OLAP(pp. 67-70). ACM. Dobbs, M., 2014. Guidelines for applying Porter's five forces framework: a set of industry analysis templates.Competitiveness Review,24(1), pp.32-45. Ggs, C.G. zer, G., 2014. The Roles of Technology Acceptance Model Antecedents and Switching Cost on Accounting Software Use.Journal of Management Information and Decision Sciences,17(1), p.1. Hummen, R., Shafagh, H., Raza, S., Voig, T. Wehrle, K., 2014, June. Delegation-based Authentication and Authorization for the IP-based Internet of Things. InSensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference on(pp. 284-292). Ieee. Kimball, R., Ross, M., Becker, B., Thornthwaite, W. Mundy, J., 2015.The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence Remastered Collection. John Wiley Sons, pp.800-1000. Laursen, G.H. Thorlund, J., 2016.Business analytics for managers: Taking business intelligence beyond reporting. John Wiley Sons, pp.100-400. Lipi, I., Rama, R. Agaraj, X., 2015. Implications of Accounting Information System Implementation in SMEs: A Study on Retail Business in Vlore Region.Mediterranean Journal of Social Sciences,6(3), p.553. Pieterse, C.M., Zamioudis, C., Berendsen, R.L., Weller, D.M., Van Wees, S.C. and Bakker, P.A., 2014. Induced systemic resistance by beneficial microbes.Annual review of phytopathology,52, pp.347-375. Swider, B.W., Zimmerman, R.D. Barrick, M.R., 2015. Searching for the right fit: Development of applicant person-organization fit perceptions during the recruitment process.Journal of Applied psychology,100(3), p.880. Van der Does, D., Leon-Reyes, A., Koornneef, A., Van Verk, M.C., Rodenburg, N., Pauwels, L., Goossens, A., Krbes, A.P., Memelink, J., Ritsema, T. and Van Wees, S.C., 2013. Salicylic acid suppresses jasmonic acid signaling downstream of SCFCOI1-JAZ by targeting GCC promoter motifs via transcription factor ORA59.The Plant Cell,25(2), pp.744-761. Wang, W.T., Wang, Y.S. Liu, E.R., 2016. The stickiness intention of group-buying websites: The integration of the commitmenttrust theory and e-commerce success model.Information Management,53(5), pp.625-642. Wixom, B., Ariyachandra, T., Douglas, D., Goul, M., Gupta, B., Iyer, L., Kulkarni, U., Mooney, J.G., Phillips-Wren, G. Turetken, O., 2014. The current state of business intelligence in academia: The arrival of big data.Communications of the Association for Information Systems,34(1), p.1. Yunna, W. Yisheng, Y., 2014. The competition situation analysis of shale gas industry in China: Applying Porters five forces and scenario model.Renewable and Sustainable Energy Reviews,40, pp.798-805.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.