Friday, 15 January 2016

TUTORIAL CHAPTER 4 AND 5

oh hye bloggers, entry kali ni sis update skali gus tutorial chapter 4 and 5. Chapter 4 and 5 lecturer sis cover dalam masa 1 hari sebab chapter 5 tu sikit je. Chapter 4 tu aaaaaa quite easy to understand sebab ianya pasal IT. so tahu-tahu jela sekarang generasi y, yakni pemegang dunia IT terhebat. LOL .. ehehe .. and yeah, happy reading :)


CHAPTER 4 : MEASURING THE SUCCESS OF STRATEGIC                             INITIATIVES..


    -   Efficiency IT metric is to measure the performance of the IT system itself including throughput, speed, and availability. ‘doing things right’..

    -     Effectiveness IT metric is to measure the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increase. ‘doing the right thing’..

    -     Benchmarking is a process of continuously measuring system results, comparing those result to optimal system performance (benchmark values) and identifying steps and procedures to improve system performance. 


Efficiency IT metrics focus on technology and includes :

-          Throughput (can archieve information at a time)
-          Transaction speed (take a second time in doing any kinds of works, for example online banking)
-          System availability (the number of hours a system is available for users)
-          Information accuracy (the extent to which a system generates the correct results when executing the same transaction numerous times).
-          Web traffic (system slowdown ,for example many visitors viewing the page, so to get the information is slow).
-          Response time (the time it takes to respond to user interactions such as a mouse click).


THE INTERRELATIONS OF EFFICIENCY AND 
EFFECTIVENESS IT METRICS.


     ·         Security is an issue for any organization offering products or services over the internet.


  • It is inefficient for an organization to implement Internet security, since it slows down processing.
-          However, to be effective it must implement internet security.
-          Secure internet connections must offer encryption and Secure Sockets Layers (SSL denoted by           the lock symbol in the lower right corner of a browser).




WEBSITES METRICS :

ü  Abondoned registeratios (number of visitors who started the process of completing a registration page and then abandon the activity.)

ü  Abondoned shopping cards (Number of visitor who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise.)

ü  Click-through (Count of the number people who visit a site, click on an add, and are taken to the site of the advertiser.)

ü  Conversation rates (Percentage of potential customers who visit a site and actually buy something.)

ü  Cost-per-thousand (Sales follars generated per dollar of advertising. This is commonly used to make the case for spending money to appear on a search engine.)

ü  Page exposure (Average number of page exposures to an individual visitor.)

ü  Total hits (Number of visits to a Web site, many of which may be by the same visitor.)

ü  Unique visitor (Number of unique visitor to site in a given time.)


Supply Chain Management (SCM) Metrics :-

  Back Order (An unfilled customer order. For example out of stock.)

   Customer order promised cycled time (It’s a gap between the purchase order creation date and requested delivery.)

Customer order actual cycle time (Average time it takes to actually fill a customer’s purchase order.)

  Inventory replenishment cycle time (Measure of the manufacturing cycle time plus the time included to deploy the product to the appropriate distribution centre.)

Inventory turnover (The number of thimes that a company’s inventory cycles of turns over per year.)



CUSTOMER RELATIONSHIP MANAGEMENT METRICS :

 sales metrics
services metrics
marketing metrics 







CHAPTER 5 : ORGANIZATION STRUCTURES THAT 

                     SUPPORT STRATEGIC INITIATIVES 





  •  Information Technology (IT) is a relatively new functional area, having only been around formally for around 40 years.
  •   Recent  IT-related strategic positions :

-          Chief Information Officer (CIO)
-          Chief Technology Officer (CTO)
-          Chief Security Officer (CSO)
-          Chief Privacy Officer (CPO)
-          Chief Knowledge Office (CKO)

IT roles and Responsibolities :-
 CTO - responsible for ensuring the throughput, speed, accuracy, availability and reliability of IT.
 CSO - responsible for ensuring the security of IT systems.
 CPO - responsible for ensuring the ethical and legal use for information.
 CKO - reponsible for collecting, maintaining and distributing the organization's knowledge. 




ORGANIZATIONAL FUNDAMENTALS ETHICS AND SECURITY :

 Ethics and scurity are two fundamental building blocks that organizations must base their businesses on to be successful.

ETHICS is the principles and standards that guide our behaviour toward other people.

PRIVACY is a major ethical issue. The right to be left alone when you want to be, to have control over your own personel possessions and not to be observed without your consent.

·         Issues affected by technology advances :

-          Intellectual property (Intagible creative work that is embodied in physical form)
-          Copyright  (The legal protection afforded an expression of an idea such a song, video games).
-          Fair use doctrine (In certain situations, it is legal to use copyrighted material.)
-          Pirated software (The unauthorized use, duplication, distribution or sales of copyrighted software.)
-          Counterfelt software (Software that is manufactured to look like the real thing and sold as such.)




SECURITY
·        Information security is the protection of information from accidental or intentional misuse by persons inside or outside an organization. 


   




xoxo,
dakwatsblogspot

No comments:

Post a Comment