.

Friday, January 11, 2019

Ms2 Course Review

2013 psychometric test Review Session CGA MS2 reading Systems Strategy 1 order of business Agenda will diversify as inf wholeible to suit your needs 2 pm Start. Introduction &038 Feedback Solicitation 210 230 Fundamentals of vocation Case Analysis 230 345. craft Case employment/s Break 10 mins 355 5pm Review of keystone items from all modules 5pm Finish. 2 Nine-step approach to case asideline Spend about 40% of your metre on the case 90 minutes. 1. 2. 3. 4. 5. 6. 7. 8. 9. thrash the case. Read the case closely. Identify problems, scourges, and opportunities. crumple the info. Generate alternate(a)s.Select the decision criteria. Analyze and rate the alternatives. Make a recommendation or decision. Determine Implementation steps &038 associated happens. 3 Executive Summary (3 marks) Objective of the continue Key problems/threats/opportunities identified State Alternatives (briefly) passs entangle completion date &038 Implementation dodging Key a dventure and mitigation (briefly) It should manage as a Stand just report REVIEW YOUR CASE 4 live Situation (10 marks) List nearly of the powers/ strategical advantages Is there an existing outline? What is wrong? List &038 briefly beg off the problems Categorize them if possible Determine ancestor obtain, if there is one single ca work? phone line fundamental poorcomings? Conflicts? Does the technology utilise align / support the business prototype? Organizational misfits? strategical misfits? 5 Current Situation contd What is the Impact? Cost quantified in $$ Does it meet current or afterlife business needs? nonphysical impacts strategic Threats Opportunities Competitive Technological 6 Criteria (5 marks) What is Criteria?What is it use for? State it at a lofty level where you washbasin Prioritize the criteria and state that you have done so. relieve wherefore you chose to to each one one criterion Measuring each criterion? ($, tr ade sh atomic number 18/Sales, other goals) Does it meet current or coming(prenominal) business needs? $ savings Intangible benefits Strategic Threats Opportunities Competitive Technological 7 Alternatives &038 Recommendation (15 marks) Improvise &038 use your resourcefulness (just be logical). each alternative should be a mostly complete Solution. Each alternative should be feasible.Assess each alternative based upon the criteria show this analysis in your work. Other pros &038 cons (other than in the criteria) Alternatives dont have to be mutually exclusive. They mass be a combination of the options identified. wherefore did you choose the recommended alternative/s? Benefits Explain how it achieves the objective/resolves the problem Limitations / risks 8 Alternatives &038 Recommendation (Continued) Make a recommendation (use a positive voice ) Do non just suggest something Do non say it weakly or ambiguously I believe / In my imprint / My thoughts are Clearly recommend an follow up and explain what it is and why it fits the criteria. (if you have not already in the analysis). 9 take a chance Management Plan (15 marks) Read care salutaryy the requirements of this section. Does it require an Implementation / Action think as well? Narrative commentary Implementation Strategy/Approach (at a high level)? Assumptions / Requirements High level Risks, Ethical, secretiveness issues? (Probability &038 Impact) Mitigation Strategies Plan B material implementation steps and, within each step Step Risk if whatever and mitigation plan if any cartridge clip Lines / Time Frame / Schedule elaborate be Responsibilities determine Phases, if any short term, long term 10 Exam Review Session Go everywhere Business Case Tonys automobile assists Inc. from 2010 June exam 11 some(a) multiple choice tips When answering a true and false question on the Exam simply break bring down complex sentences into smaller parlances . Each phrase has to be true or the consummate sentence is false. And, for multiple choice questions pronounce to answer the question before sounding at the answer choices. Remember that a perfect answer may not be given as a choice.Choose the best answer. Source Certified thespian Examiners (CFE) Exam Coach. 12 Strategic coalescence Look for IT Strategy to support Business strategy. IT to differentiate from competition IT to reduce be IT to bring business Quick to market IT to create unexampled markets / products IT to tie suppliers and nodes 13 Porters five forces threat of sunrise(prenominal) entrants negotiate power of customers bargaining power of suppliers threat of substitute products or services opposition among existing competitors 14 Threat of raw(a) Entrants Mitigation Strategies High entry bell. Equipment, buildings, infrastructure, and so on Mature Information Systems Expertise &038 friendship Compete aggressively on equipment casualty Lock in partners for a militant edge Brand recognition. Product Differentiation. focus on a Market break Operating Efficiencies Pace of change IT 16 Moores impartiality &038 Metcalfes Law Dropping set of computer repositing Dropping cost of processing (million instructions per second) Double the power every 18 months Metcalfes Law The value of the mesh is the square of the sum of the nodes. Therefore rile with popular technology 17 Strategic preparation for IS How is Planning done? blanket Down / Strategic Analysis tin Up / Enterprise Analysis Scenario Planning / What if Analysis When is Planning done? sententious Term Long Term Mergers &038 Acquistions sparing downturns As part of a Budgeting figure After a major(ip) disaster. 18 Planning Issues Scalability Capacity planning normalization vs. differentiation Legacy ashess Upgrade to new system or fuse with new technology but old core. 9 Total Cost of Ownership computer hardware Softw are Installation Training pledge Ongoing Maintenance &038 S/W Upgrades Infrastructure costs Data Backups, Business Continuity, Insurance Down epoch Space, Energy, security department 20 sixer IT Decisions IT should not make 1. 2. 3. 4. 5. 6. How much to extend Allocation amongst Business Processes Firm-wide IT capabilities How much IT Security &038 Privacy issues Blame over affliction 21 IT Governance 22 10. 3 OVERVIEW OF SYSTEMS DEVELOPMENT 23 Achieving Success in IS Projects clearly defined goals excellent communication management involvement definitive timelines Project management skills S. M. A. R. T Objectives. Why do they Fail? lack of understanding of the craved results (imprecise targets) poor estimating techniques for budgeting and scheduling small, unadjusted enrolment slippage, which cumulatively results in a major delivery delay lack of intention management skills or leadership ill trained analysts and programmers conflicting goals and objectives amo ng the project squad members and users use of inappropriate software or hardware machines 25 Make Vs. defile Issues Cost Specialized functionality Ability to integrate with other existing Systems Ability to change the s/w Maintenance / Service Contract Update / Upgrade swiftness of delivery KNOWLEDGE Business vs. assiduity vs. Functional Responsibility vs. Control vs. Risk Conversion 27 Parallel Pros to the lowest degree risk of not meeting objectives equality results to ensure correctness Gentle deprive off of the old system spanking to errors. Cons Duplication of effort Requires additional figuring resources not possible in every situation 28 pilot light Pros Allows for a small, low risk, controlled test bed Allows for a Go-NoGo decision w/o large-mouthed investment Limits disruption &038 harm Helps stamp down user resistance Cons Still high-priced to run 2 systems even if scabrous down Results may not understand to full install Choice of Pilot site is critical 29 Phased Pros incremental approach with functional Phase-in Allows for Phased Systems Development Allows time for orientation of the new technology unremarkably easier to manage the change Cons Still cartroad 2 systems, Longer disruption 30 Direct Cutover Pros Quick Easy on resource utilization (only 1 system running) Low cost Cons Risky Requires full training &038 preparation Requires all hands on deck for Implementation Causes spike in Help desk calls Creates disruption, uncertainty, confusion Errors privy cause Business Loss / gap 31Internet as a business tool Advantages Wider Market exposure New shipway to communicate (text, voice, video) Economical (ISP, programming, Shipping) 24x7x365 Anywhere, Anytime Off piles work to the customer Convenient for the customer if well designed. Quick &038 Easy to modify / Change Real time uniform Information / Prices 32 Internet as a business tool Disadvantages Not everybody has gateion &038 high speed indifferent &038 not so interactive No touch &038 feel of the graves Replacement for good business practice?Lack of consumer conceive Legal challenges Socio-economic factors (availability of portal) Privacy Challenges Groupware &038 Collaborative s/w MS NetMeeting / Communicator / Remote PC support Rolling out s/w updates and self healing s/w IBM Lotus Notes &038 Domino EMC Documentum practical(prenominal) Meeting, avatars , e-Rooms (SDLC Project Mgmt) Private Cloud work out VPN Storage space Applications Virtualization Data memory board Data Mining Business password s/w Strategic use of the Internet Cost Reduction Strategic Alliances Differentiation of products &038 services Customer faithfulness (custom mass production) Value Chains To pursue advantage of Internet Technologies Keep focussed on Business Strategy (Internet doesnt compensate for bad or wanting(p) strategy) Simplify &038 Integrate your customer cladding proc esses to enable self service stick to to evolving IT standards Rationale for E-Business Diminished Information imbalance Richness vs. Reach trim back dealings costs Ways to Reduce Costs Customer Self serve pop off middle person Customer information entry Self research and decrease consultation time Reduced Staffing levels Reduced Re-work Streamlined communication Faster 37 Securing online transactions The key issues in a transaction processing environment are identification (Who are you? ) authentication (How erect I be sure you are who you say you are? ) authorization (What assurance do you have to make whatever transaction you seek? ) privacy (How can we be sure our transaction is occult? nonrepudiation (How can we each be informed that the other will not afterward deny the transaction? ). Benefits / Limitations of Networking Sharing Printers, Drives, Scanners, etc email Centralized arrangement Distribution of S/W, Policies, Patches, A/V Tracki ng, monitoring, Backing up data Remote repair &038 realise Groupware Limitations Cost, Security, Vulnerability 39 Client host cipher Centralized Computing Distributed Computing Advantages Data Security &038 Centralization Administration Off Loads processing to Clients Disadvantages excess complexity Cost 40 Advantages of Outsourcing cost savings through economies of scale and stage setting infusion of cash through village of computer assets facilitate transition of data centre from cost centre to remuneration/loss centre ability to chop-chop introduce new technology and access IT talent Better Scalability focus on core competencies Allows an objective look at process improvement by O/S 41 Limitations of Outsourcing loss of treat managerial control difficulty in reversing decision outsourcers viability (financial strength, responsiveness, service, and so on) dilutes the strength of in-house staff Unique, one of a charitable application support? Will key staff stay permanent or be rotated? vendor doesnt know your business lack of flexibility untenable long-term contracts fixed price versus service trade-off requires skills in confederation management strategic factors Privacy issues monitor / Managing Outsourcers 42 Risk Mitigation Strategies Risk Assessment Restrict Physical access Log all visitors in/out Cameras, Card Readers, Security Guards Alarms &038 monitoring incursion Detection Systems (network) Firewalls Restricted Network access Policies, signoff, and Security Awareness training 43 Risk Mitigation Strategies Cont Authentication (know, have, and are) discussion Strategies, Single Sign-on, Pass Phrase leave (Open / need to know) Access invocation / abrogation procedures Hiring / Firing / Promotion Segregation of Duties fair to middling Supervision &038 Sign offs Monitoring, Logging, Reporting, and Acting on Information. 44 Good Luck 45

No comments:

Post a Comment