Professional Documents
Culture Documents
MODULE 1
Explain briefly.
The reason why do we need to protect the asset it's because it is an information that we
keep private to insure our safety and also our privacy.
To know the information how to avoid threats that can potentially cause of damage or
possible loss your assets.
4. What can you do to minimize the risk of getting your information assets to be stolen
from you?
Answer:
What could I do is to ensure the information only to those authorized people can have the access.
And to know the risk of threats.
5. What other security initiatives can you suggest to help minimize threats in
information asset?
Answer:
Keep your self-updated in information security and having latest antivirus updates also don't share
your password or anything that possible to loss asset. Ensure back up if in case you accidentally
deleted your data. Always alert hackers are everywhere.
MODULE 2
Locate a company that you know and contact the IT manager and HR manager:
1. Show the list of benefits and limitations mentioned in this chapter and find out which
materialized after their systems integration implementations.
List of benefits of System Integration: The Increased revenue and growth, Leveling the
competitive environment, Enhanced information visibility, Increased standardization All of
these is important and useful but for my own opinion the most significant is Increased
Revenue and Growth because In general, one of the biggest benefits is reduction in inventory
and personnel costs due to integrated systems.
Limitation of System Integration: High initial setup costs, Power and interdepartmental
conflicts, Long-term and intangible ROIs, Creativity limitations
2. Ask them for a few ethical or security violation examples that may have occurred in their
organization. Also, how were they handled?
Improper or fraudulent billing are ethics violation that can involve charging customers for
services they did not receive. This most often happens in industries where the party who
receives the bill is not the party who received the services. The prevalence of this specific
ethics violation has led many insurance providers to issue a list of services to client who
could be subject to these offenses, encourage them to report discrepancies.
MODULE 3
Information Integration are dealing with sharing, producing and consuming simple
information that do not need to change the source of the target systems and managing
complex issues is not required. On the other hand, Application Service can be shared either
by hosting them on a central server or by accessing them inter-application and when
abstracted into a larger application, it will have additional value.
MODULE 4
ERP System could replace the manual operation into automated operation, therefore, all the
needed ingredients in my coffee shop will be organized and stored, and can be accessed
easily when time needed, also providing track records of expenditures reports. It will also
replace the manual recording of sales, storing it in a system database for records that can be
accessed anytime for reviewing, as well as it will be helpful in computing and uploading filed
small-business taxes with accurate information.
2. Research the topic of ERP contracts on the Internet. How could ERP vendors make it easier
for customers to understand their licensing models? What could customers do to ensure a
contract contains all possible eventualities?
When selecting an ERP vendor and then negotiating contracts with that ERP vendor, clients
are rightfully concerned about the cost of the software. From a legal perspective, customer
goal as ERP licensing and litigation attorneys is to draft contracts that
protect your legal rights in the event of litigation
allow customer to manage the ERP implementation process to increase the likelihood
of a successful implementation and vendor relationship
allow customer as much flexibility in using the software as is reasonable so as to
minimize unnecessary costs