Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

SLP 1 IT Management – 24

I need help please

I want the business to be a lounge that turns into a night club after hours that sells food, adult beverages and more.

Module 1 – SLP

Information Technology Systems as Socio-Technical Systems

Firms strive to achieve competitive advantage and gain customer loyalty by working with customers and getting to know them. This allows companies to better serve the needs of their customers who with ebusiness can be located anywhere in the world. Customers are diverse with different cultural backgrounds. Building customer relationship management systems requires an information technology infrastructure that collects the information about these customers (diverse customer groups) and provides management the needed analytics to understand the various customers. Many firms realize the need for a new product or service before the customer does. Take Uber or Travelocity for example where both firms are giving the customer control and convenience, integrated with the use of technology. Uber for example has done much to improve safety in riding in Uber vehicles which has been very important for females.

Building CRM capabilities takes time and requires a data warehouse for the analytics. Travelocity started with the building blocks to learn about their customers and the best ways to deliver targeted market campaigns to them. In addition, Travelocity can respond quickly to offers from their suppliers. For example, at 8 AM, a major airline offered travel agencies a special fare from Los Angeles to San Juan, Puerto Rico. Travelocity quickly scanned their customers’ browsing behavior, pulled the e-mail addresses of 30,000 people in the Los Angeles area who had browsed, but not purchased, tickets to the Caribbean, and then generated an e-mail message to them. The response rate was incredible—with 25 percent of the recipients who had been e-mailed booking flights. This was an effective campaign measured by the response rate or take rate, as well as a highly efficient one as measured by the ROI from the profit on sales of those extra tickets.

SLP Assignment Expectations

Go to 

Salesforce, 
and review their solutions.

Write a report in which you identify a business that you, as an entrepreneur, will start. Describe what the business does, the services it sells to its customers, how you will deal with diverse customers from many cultural backgrounds, and how you could use Salesforce.com to jump-start the business. Prepare a diagram of the business processes in your firm, showing how you will use Salesforce.com. This should take 2 to 3 pages.

Module 1 – Resources

Information Technology Systems as Socio-Technical Systems

Required Reading


Enterprise resource planning (ERP)
 – From LinkedIn Learning


Manufacturing BOMs and production orders
 – From LinkedIn Learning


Learning the essentials of Salesforce
 – From LinkedIn Learning


Manage customer relationships for free with HubSpot CRM
 – From LinkedIn Learning

Optional Readings and Video

Read Chapters 2 and 3 in:


Business Information Systems
. (2020). The Saylor Foundation. www.saylorbooks.com. Creative Commons.

Read Chapter 1 in:


Information systems: A manager’s guide to harnessing technology

. (2020). University of Minnesota Publishing, Creative Commons Book Publisher Information – Information Systems (umn.edu).

Enterprise Systems:

Module Overview – Background

A critical area in the Management of Information Systems is to understand how Information Systems have become an integral part of how the firm performs its day-to-day operations and serves its customers. It is important that MSITM majors understand these organizational systems and their value to the firm.

Most organizations have an Information Systems department charged with ensuring that the Information Technology components are provided to keep the organization running. There are key organizational systems for the day-to-day operations of the enterprise: payroll, general ledger, accounts receivable, accounts payable, marketing analysis, customer orders, inventory management, manufacturing, vendor orders, human resources, etc. Nearly every functional area of the business has its own requirements, and Information Systems must support these areas. This has created silos of information in the organization. The solution was to create enterprise systems that linked these operations together to allow for effective systems, where inventory is kept at the appropriate levels, customers have their orders filled, and the company turns a profit. Enterprise software such as SAP has enabled organizations to be more information-connected in terms of their key transaction systems. This requires an information infrastructure for support, which we will discuss in later modules.

The information from these interlinked systems then feeds decision-makers to allow them to have timely and accurate analytics for their short-term and long-term decision making. Information systems tools on the decision-making side interface with the firm’s database to provide dashboards of analysis and graphics to enable this decision making.

Thus, information systems collect, process, and disseminate this information. Computer-based technologies that work tirelessly to carry out the routine tasks of day-to-day operations and to collect and disseminate the data that is collected are used to power these information systems. Computer-based information systems have changed in form from computer systems that fill a large room to interconnected devices that are smaller and connected to storage, perhaps in the cloud, to enable access to cloud-based information by all types of devices, including hand-held devices. These networked devices enable information accessibility from any location.

Decision makers use information to achieve the organization’s goals, while the computer-based information systems need to be carefully architected to enable this information. Implementation of these systems must involve the decision makers to insure the systems capture the information they need. The strategic planning for these systems needs to be carefully considered in the context of the firm’s strategies to ensure that these projects will provide value congruent with the firm’s goals.


Module 1 Lecture Enterprise Systems

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

SLP 2 – 25

I need help with my homework assignment!  Module 2 – SLP IT Services and Cloud Computing If Cloud computing is the greatest thing for business since sliced bread, then by extension, it certainly ought to be the greatest thing for education since chalk. In point of fact, a relatively large

Case 2 – 25

Need help please Module 2 – Case IT Services and Cloud Computing Assignment Overview The Case Assignment for this module involves thinking systematically about the IT services movement in general and about cloud computing as a particular instance of that approach. You will start by reviewing a number of sources

SLP 1 – 25

Need help with my homework Module 1 – SLP Web 2.0 and Social Networks The purpose of the Session Long Project in Trident University classes is to give you the opportunity to explore the applicability of the module to your own life, work, and place in space and time, and

Case 1 – 25

I need help with my homework please.  Module 1 – Case Web 2.0 and Social Networks Assignment Overview In this Case Assignment, you are exploring the technological underpinnings of the Internet. The objective of this Case is to better understand the evolution of the Web from Web 1.0 and Web

SP DB

See attached. In your own words, please discuss a cybersecurity policy with which you are familiar. The example can come from work, school, or a business relationship. You can also research organizational policies posted online. Give a brief description of the policy. What is the purpose and value of the

Changes in existing interview question for Info I’m attaching th topic

Topic:   Enhancing Cybersecurity in IoT Networks: A Comprehensive Study on Threat Detection and Mitigation Strategies · Details about the research (Background, methodology, research questions) · ·  The rapid proliferation of IoT devices has opened up new avenues for cyber threats. Securing these devices has become increasingly complicated, as over 75 billion

Active directory automation

Need help to get an assignment done. Requirements are VMware, windows server core (not the full GUI). PowerShell Automation for Active Directory Submission Template Screenshot 1 Onboarding New Users from CSV Single screenshot showing: Script output (e.g. “Created user: jdoe”). Get-ADUser results for those SamAccountNames. Your custom prompt (server name

HIMS 11

  Assignment Instructions:  Using the Patient Healthcare Data in the attached Excel file (attached below), construct a 3-D Clustered Column Chart depicting the three healthcare parameters (weight, height, age), and title this chart ” Patient Healthcare Data” at the top center and show Legend at the bottom. After reviewing the

Governance, Ethics, and Security

 Assume the role of an IT security consultant who has been contacted by a company to provide them with a written code of IT conduct for its employees and a security policy for the firm. In preparation for undertaking this large job, prepare a proposal explaining what topics you will

Cloud-Based Management and Analytics

Final Project Topic: (5 pages research paper) Topic: Data Management and Analytics: Explore how enterprises use cloud-based data management and analytics tools to drive business decisions and gain competitive advantages. Competitive advantages through cloud analytics: Citation: Cooper, A. (2020). How Netflix Uses Big Data and Analytics to Drive Success. Forbes.

Powtoon commercial

see attached file Powtoon Commercial Project Do not pay for anything on this site! Learning animation can be very challenging yet very fun. Navigate to the Powtoon website, click Pricing in the top menu, scroll down, and click FREE Start Now $0 free. Create an account if you do not

HIMS W12D12

 What is Big Data in healthcare? How is it generated in a typical healthcare facility, like a hospital? What two common formats are used, and what are the advantages and disadvantages of each? How is this data used for unraveling hidden trends, strategic planning, and operational decision-making?  What are the

INFA W12D12

  In the discussion this week, you and your peers are asked to consider and discuss information security career pathways relevant to your personal goals and career plans. Where are you currently in your career? What is the next level up or sideways for you in your desired career field?

CASE 4 – 40

i need help please Module 4 – Case Database Systems and Knowledge Base Assignment Overview The Case Assignment for this module considers the emerging and important trend toward what is called “open-source software.” The Background Information contains material regarding this movement; its effect is being felt in many different areas

SLP 4 -40

I need help Module 4 – SLP Database Systems and Knowledge Base Go to  Kaggle.com  and register with any one of your email addresses. Kaggle is a open-source data repository often used in Data Analytics to practice with datasets. Go to this  Kaggle dataset  that has 9,514 movies on Netflix,

Information Systems Book Assignment

IS 373 Book Chapter Review Project Goal: CHAPTER 2 Each student will be assigned one chapter from the following eBook by the instructor. The student should study the chapter carefully and in depth and do extra research to ensure his/her dominance on all of the concepts in the chapter. The

Module 03 Course Project – Network Diagram

Module 03 Content In this Module, you are responsible for completing a network diagram and creating both a Procurement Plan and a Communication Plan. The following item(s) are required in this Module: Network Diagram Utilize the proper diagramming software (e.g. Visio, draw.io, etc.) to detail the key elements of the

Module 03 Course Project – Network Diagram, Procurement Plan and Communication Plan Module 03 Course Project – Network Diagram, Procurement Plan and Communication Plan

Module 03 Project Procurement Plan [Insert Name] Network Administration Capstone Table of Contents Introduction 1 Procurement Management Approach 2 Procurement Definition 2 Type of Contract to be Used 2 Procurement Risks 2 Procurement Risk Management 2 Cost Determination 2 Standardized Procurement Documentation 2 Procurement Constraints 2 Contract Approval Process 2