You are on page 1of 11

Question A: AC palace chief information officers

plan to implement the internet of things to stay


efficiently with their suppliers. The two system
strategy constraints that AC palace limited may face.
The information strategy is an essential feature in IT
to provide them with better bargaining power. One
of the strategies that can be used in the company is
Short term: It enables stability and quick wins, as
well as more frequent target achievement and
achievement of goals. However, on the long run, it
can result with massive problems. Existences only of
a short-term focus will lead to a long-term deceive
or death of the company. It is like running with your
head down and your sight on just couple of meters in
front of you. For example, Nokia, A world market
leader producing mobile phones known for their
reliability, hardware, battery etc. won all the battery
against other productions but lost the war with heavy
casualties. They did not predict that mobile software
such as android. Lack of awareness on the impact
of IS: The impact of IS on today’s organizations are
huge. IS are everywhere, IS enables efficiency and
control and transparency in business, due to the IS
organization can produce. -custom data to help with
a specific task or decision making. -custom format
which can be tailored to the user’s need. -real time
data, particularly useful where fast action is needed.
And many more operations efficiencies, cost
reduction, better customer service. Due to the
different pandemic such as disaster, the company
revenue is being affecting on the market share. It
has to redefine business the strategy that been
concluded is to improvise the long term business for
organization to produce more product to serve the
AC more sufficient product with lowering the cost
as well so that they would not want to switch to
other supplier for the products. Moreover, the focus
of the organization should not be left in short term as
they need to grow and expand the business to reach
the expected target of revenue and sales in a year to
sustain the business throughout.
Question B) Data mining is a process of segregating
informational data from a vast ocean of data in a
company, resulting in obtaining of valuable
information that helps the organization to optimize
its performance. Data mining can be done using
several tools such as R-Programing, WEKA, Data
Melt, etc. The information obtained from data
mining can be used for management analysis, risk
management, corporate analysis, and customer
management. Therefore, given AC’s current
situation, data mining process could be used to
obtain data to estimate possible risks that they could
face due to the pandemic – such as reduced revenue
and loss of customer engagement. Therefore, AS’s
could use the data obtained via data mining,
collaborate with delivery partners to venture in
online delivery systems – to encourage customers to
continue purchasing their goods although they are
unable to physically go to the stores. Therefore, an
element of business intelligence is at place here,
helping the company to analyze the risks that could
challenge their revenue increase and strategize
contingency plans that will help them redefine their
business. Expert systems: combination of computer
equipment and software to resemble human
reasoning. Expert systems are a form of artificial
intelligence that could provide organizations with
specific, focused explanations to users including
facts, numbers, cases, and models. Systems like
these are often used in the pharma field, sales, and
finance. Expert systems help companies in solving
problems that had or may arise given the market
situation. The expert systems have four main roles –
diagnosing, interpreting, predicting, and instructing.
Therefore, AC’s may use and expert system that
could collect data on possible problems the company
might face and generate adequate solutions and
suggestions that could help the company to keep its
business afloat and obtain revenue. The advantage of
using an expert system is that the diagnosis and
solutions are based on human logic, hence it is
assured that the initiatives and decision made by
AS’s would be effective.
Question c) Supply chain uncertainty factors are
known as decision making process that helps to
make decision when a decision cannot be decide due
to the lack of transparency in the supply chain
towards the impact of possible action. The
uncertainty factors that AC may experience by all
the suppliers due to this pandemic is late deliveries.
Late deliveries may happen by receiving the stocks
from all the supplier may be late because of the
lockdown areas that the partners are not allowed to
send the products out on the current date. Thus, the
prices might fluctuate and the discounts from the
suppliers might be affected to since the price can be
vary despite shipping and this may cause AC to
invest more money towards the product and stock
they been receiving. Due to this, it may cause
inaccurate demand forecasting towards the suppliers
and inflated orders might increase the prices of the
due to the demand of the product and stocks that
needs by the company which is AC. Inaccurate
demand forecasting: Inaccurate demand
forecasting can lead to the accumulation of excess
stock or, the reverse – issues with product
availability. Both are unwelcome problems for
inventory planners! Customers have zero tolerance
for out of stock scenarios. Ensuring stock
availability keeps positive reviews flowing. The
information technology that can be recommended to
overcome the uncertainty factors Information
technology could help AC in ensuring effective
tracking and delivery services. Technology plays a
vital role in increasing product delivery service,
which could increase customer retention and
encourage them to repeat business with AC. IT
could develop mechanisms where customers could
interact with delivery partners to track their
packages – increasing customer’s sense of control
leading to a sense of fulfilment. When customers
perceive effective communication with delivery
partners and are satisfied with the customer service
facilities, they are more likely to repeat orders and
continue being in business with AC. Moreover, IT
could help companies by providing increased
visibility over the production process. A vital
component to production processes is having a clear
sight on the manufacturing activities. Technology
helps companies to oversee the production in stage –
providing opportunity to predict any delays they
might face and align schedules accordingly. The use
of technology could help AC to experience
transparency of the whole production and
manufacturing process – having more control on the
product and information flow across the supply
chain. Question D) i. Increased Employee
Productivity: A disaster recovery will have to be
executed by the right people. When specific roles
and responsibilities are assigned in advance,
effectiveness and productivity will both increase.
Disaster recovery can mean having at least two
people that are capable of handling the same task.
Such redundancies can prove to be incredibly
beneficial in the long run. When multiple employees
are capable of handling a given task, organizations
can benefit from peace of mind relating to overall
the integrity of the network. Greater Customer
Retention: Clients today expect nothing short of
perfection and reliability. They are not forgiving in
the case of failures or downtime. When a certain
business cannot meet their expectations, clients will
simply move on to another service provider. Disaster
recovery enables businesses to maintain a high
service quality, regardless of the circumstances.
Reacquiring an old customer in the result of an IT
disaster can be nearly. It is especially true for B2B
service providers. The integrity of your business
will affect the integrity of client enterprises. ii. The
backup Location that is suitable for AC is Hot Site
for CIO. It is a backup which is up and running
continuously. A hot sites allows a company to
continue normal business operations with every
short period of time after a disaster. A Hot Site can
be defined as a backup site, which is up and running
continuously. A Hot Site allows a company to
continue normal business operations, within a very
short period of time after a disaster. Hot Site can be
configured in a branch office, data center or even in
cloud. Hot Site must be online and must be available
immediately. Hot site must be equipped with all the
necessary hardware, software, network, and Internet
connectivity. Data is regularly backed up or
replicated to the hot site so that it can be made fully
operational in a minimal amount of time in the event
of a disaster at the original site. Hot Site must be
located far away from the original site, in order to
prevent the disaster affecting the hot site also. Fully
redundant equipment, zero data loss, near real time
data synchronization, Although hot site is expensive,
but it keeps running continuously and update. Hot
site allows a company to work in a very short period
of time after a disaster whereby this can be
configured from any location and the data is also
regularly backup or replicated to the hot site so that
it can be made fully operational in a very minimal
amount of time. Moreover, this must be located
distance away from the current site to prevent
disaster to happen. iii. Malicious Attack means
intentional hacking, damaging, corrupting or
misusing the Insured’s Computer Systems, including
Unauthorized Access or the insertion of Malicious
Code by a third party or an employee. A Malicious
Attack does not include hacking or the insertion of
Malicious Code by a Senior Executive if such
insertion of Malicious Code by a Senior Executive is
intentional and with intent to cause harm. The
malicious software that can be used in the AC is
Firewall. It is meant to provide protection against
external damages. When talking about computers, it
means providing protection against threats lurking
on the internet or other networks. One example of
such a threat is malicious software known as
malware. Malware is a virus or spyware that infects
or infiltrates your computer to collect or modify
sensitive data or to disrupt certain system functions.
In extreme situations, it can completely cripple the
operating system. A firewall can prevent this from
happening. By definition, a firewall acts as a kind of
checkpoint positioned between the internet or
another network and the local computer. It checks
the access rights of programs and remote computers
in both directions. The firewall’s configuration thus
determines whether programs installed on your
computer can access the internet and vice versa. The
firewall also controls communication between your
computer and other computers within a network. It is
important to understand that a firewall does not
recognize whether something is malicious or
harmless. All it does is monitor access between your
computer and a network in both directions. The
firewall uses a set of previously defined rules to
determine whether it is malicious or not.

You might also like