Boots is evaluating their information management system and eMarketing strategies. Their current database is decreasing in performance so they need a better solution. The document performs a SWOT and PEST analysis of Boots and evaluates their strengths, weaknesses, opportunities, and threats. It also discusses the impact of a new IT/IS system, eMarketing strategies Boots should adopt like email marketing and SEO, and the proposition value of balancing online and offline promotions. Finally, it covers important legal and ethical issues around cookies, privacy policies, unsolicited emails, and preventing social exclusion.
NayLinnKo Information Requirements Analysis BITNay Linn Ko
This document provides a requirement analysis for a proposed new eLegal system to support collaboration between London Help Forum (LHF) and Leyton Community Legal Centre (LCLC). It includes a rich picture diagram depicting the current environment and stakeholders. It also includes a CATWOE analysis of customers, actors, transformation, worldview, owners, and environment. The document discusses people/stakeholders, organizational structures, systems needed, issues/conflicts, individual concerns, organizational culture, and high level processes. It then provides a use case diagram and documents use cases and scenarios. Finally, it critiques the differences and connections between rich pictures and use cases in requirements analysis.
The document provides background information on Grunge Hotels, a hotel group in the UK that is implementing an information technology system. It discusses conducting a SWOT analysis, identifying key processes that would benefit from an IT system like a financial management system. It compares the different information needs of the managing director versus hotel managers. Implementing the new IT system will require major organizational changes like training staff on the new systems and addressing employee resistance to changes in their work processes.
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...Nay Linn Ko
This document provides a summary of high level requirements analysis and prioritization for a management information system for a youth charity project called Dig-it. It identifies appropriate and inappropriate requirements for a high level analysis. Appropriate high level requirements are grouped into categories like managing data entry, operating a scheduling system, and extracting reports. Additional high level requirements are identified from the case study, resulting in a complete list of 8 key requirements. These include managing projects, controlling search functions, and monitoring work assignments. Requirements will later be prioritized using MoSCoW methodology.
The document discusses requirements for a new IT system for Children Support Agency (CSA). It recommends the DSDM Atern methodology as it supports active user involvement and frequent delivery of products. High-level requirements are identified, such as collecting data accurately and securely. Requirements are prioritized using MoSCoW rules, with collecting data and producing management reports as "Must Haves". The document also discusses legal, social and ethical issues for CSA to consider, such as privacy laws, and the need for a data controller to manage authorization and security. Codes of conduct for developers around security, business perspectives and patient safety are also proposed.
Information System Management Coursework by May Hnit Oo KhinMay Hnit
Sun Microsystems implemented IT governance using the COBIT framework to better align its IT processes with business objectives and comply with regulatory requirements like SOX. It mapped its existing IT processes to the 34 control objectives in COBIT. While some staff were initially resistant, IT governance provided defined roles and responsibilities for IT processes. An assessment found Sun had achieved a maturity level of 2.5 but needed to close gaps to improve. IT governance helped Sun better manage its IT functions and resources to enhance business value.
The document discusses the development of a new management information system (MIS) for Children Support Agency (CSA). CSA currently faces issues with its outdated information system, including inconsistent data collection and a lack of reporting capabilities. The new MIS aims to address these issues by standardizing data entry, producing reports, and allowing authorized access to financial and project data. An agile development method called DSDM is proposed for building the MIS in increments. High-level requirements focus on collecting accurate data, generating management reports, and including performance indicators to measure projects. Stakeholder interviews helped identify additional key requirements.
Accessories Shop Management System on Advance JAVAMd. Mahbub Alam
The company maintains basically 4 registry copies which are accordingly:
• Sales registry book
• Servicing registry book
• Download registry book
• Laser registry book
This document contains an 18-page strategic evaluation report for Dell Inc. prepared by a student. It includes a table of contents, introduction on Dell's background and a case study, and sections on SWOT analysis, PEST analysis, Dell's e-marketing strategy, legal and ethical issues, and conclusion. The SWOT analysis identifies Dell's strengths as its direct sales model, strong customer intimacy, and brand name, as well as weaknesses in product recalls, lack of retail places, and underinvestment in R&D. The PEST analysis examines political, economic, social and technological factors affecting Dell. Opportunities for Dell include growth in PC markets, increased online usage, and diversifying its product range. Strong competition is
NayLinnKo Information Requirements Analysis BITNay Linn Ko
This document provides a requirement analysis for a proposed new eLegal system to support collaboration between London Help Forum (LHF) and Leyton Community Legal Centre (LCLC). It includes a rich picture diagram depicting the current environment and stakeholders. It also includes a CATWOE analysis of customers, actors, transformation, worldview, owners, and environment. The document discusses people/stakeholders, organizational structures, systems needed, issues/conflicts, individual concerns, organizational culture, and high level processes. It then provides a use case diagram and documents use cases and scenarios. Finally, it critiques the differences and connections between rich pictures and use cases in requirements analysis.
The document provides background information on Grunge Hotels, a hotel group in the UK that is implementing an information technology system. It discusses conducting a SWOT analysis, identifying key processes that would benefit from an IT system like a financial management system. It compares the different information needs of the managing director versus hotel managers. Implementing the new IT system will require major organizational changes like training staff on the new systems and addressing employee resistance to changes in their work processes.
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...Nay Linn Ko
This document provides a summary of high level requirements analysis and prioritization for a management information system for a youth charity project called Dig-it. It identifies appropriate and inappropriate requirements for a high level analysis. Appropriate high level requirements are grouped into categories like managing data entry, operating a scheduling system, and extracting reports. Additional high level requirements are identified from the case study, resulting in a complete list of 8 key requirements. These include managing projects, controlling search functions, and monitoring work assignments. Requirements will later be prioritized using MoSCoW methodology.
The document discusses requirements for a new IT system for Children Support Agency (CSA). It recommends the DSDM Atern methodology as it supports active user involvement and frequent delivery of products. High-level requirements are identified, such as collecting data accurately and securely. Requirements are prioritized using MoSCoW rules, with collecting data and producing management reports as "Must Haves". The document also discusses legal, social and ethical issues for CSA to consider, such as privacy laws, and the need for a data controller to manage authorization and security. Codes of conduct for developers around security, business perspectives and patient safety are also proposed.
Information System Management Coursework by May Hnit Oo KhinMay Hnit
Sun Microsystems implemented IT governance using the COBIT framework to better align its IT processes with business objectives and comply with regulatory requirements like SOX. It mapped its existing IT processes to the 34 control objectives in COBIT. While some staff were initially resistant, IT governance provided defined roles and responsibilities for IT processes. An assessment found Sun had achieved a maturity level of 2.5 but needed to close gaps to improve. IT governance helped Sun better manage its IT functions and resources to enhance business value.
The document discusses the development of a new management information system (MIS) for Children Support Agency (CSA). CSA currently faces issues with its outdated information system, including inconsistent data collection and a lack of reporting capabilities. The new MIS aims to address these issues by standardizing data entry, producing reports, and allowing authorized access to financial and project data. An agile development method called DSDM is proposed for building the MIS in increments. High-level requirements focus on collecting accurate data, generating management reports, and including performance indicators to measure projects. Stakeholder interviews helped identify additional key requirements.
Accessories Shop Management System on Advance JAVAMd. Mahbub Alam
The company maintains basically 4 registry copies which are accordingly:
• Sales registry book
• Servicing registry book
• Download registry book
• Laser registry book
This document contains an 18-page strategic evaluation report for Dell Inc. prepared by a student. It includes a table of contents, introduction on Dell's background and a case study, and sections on SWOT analysis, PEST analysis, Dell's e-marketing strategy, legal and ethical issues, and conclusion. The SWOT analysis identifies Dell's strengths as its direct sales model, strong customer intimacy, and brand name, as well as weaknesses in product recalls, lack of retail places, and underinvestment in R&D. The PEST analysis examines political, economic, social and technological factors affecting Dell. Opportunities for Dell include growth in PC markets, increased online usage, and diversifying its product range. Strong competition is
This document provides an overview of user interface design for a project titled "User Interface Design". It contains sections on design issues, legal ethical and social issues, colour theory, font terminology, guidelines for Microsoft and Apple platforms, and evaluation techniques. The document discusses common user interface design issues such as messages, menus, icons, shortcuts, and controls. It also covers legal, ethical and social considerations for crowdsourcing health data. Colour theory, font terminology, and guidelines for both Microsoft and Apple operating systems are explained. Finally, evaluation techniques like heuristic evaluation and cognitive walkthroughs are mentioned.
IT Project and Quality Management Coursework 2 by May Hnit Oo KhinMay Hnit
The document summarizes a netbook procurement project carried out to purchase suitable netbooks for managers and sales executives. It describes how the project was managed using a tailored methodology combining PRINCE 2 and PMBOK. Quality management involved planning, assurance, and control processes. Four netbook models were compared based on defined factors and criteria, with Toshiba recommended due to its storage, performance, usability, durability, services and reasonable price.
This document is a dissertation submitted by Myint Oo in partial fulfillment of the requirements for a BSc (Hons) in Business Information Technology from the University of Greenwich. It presents the development of a website for Unique, an online shopping and auction site. The dissertation contains 9 chapters that cover all aspects of analyzing the requirements, designing, developing, and delivering the project. Methodologies like DSDM and UML modeling are used to manage the project development. PHP and MySQL are selected as the programming language and database to create the dynamic website.
This is my University Assignment and it is about analyzing the scenarios using UseCase and Rich Diagram. In this project, also include discussion about conflict between different management levels of Organization.
The document provides a strategic evaluation report for Boots, a major UK retailer. It includes a SWOT analysis that identifies Boots' strengths as its reputation for quality products and customer service, as well as its sophisticated IT systems. Weaknesses include a broad product range that limits branding and lengthy innovation processes. Opportunities exist in expanding markets and improving technology. Threats include increased competition from supermarkets and online retailers. The new IT systems at Boots have improved sales, productivity, and targeting of customers through analyzing purchase data. Overall the report evaluates Boots' strategic position and competitive environment.
Information_Technology_Planning_comp_1647Aung Zay Ya
This document discusses information technology planning for Reguero-Almandeel-Purohit, an estate agency with 16 branches. It begins with an executive summary and introduction to the company's background and issues. A SWOT analysis identifies the company's strengths, weaknesses, opportunities, and threats. The biggest impact would come from a new property management system, which is analyzed in terms of key functional requirements and discussions with staff. The document also covers preparing for the biggest organizational changes when implementing the new system and having a disaster restoration procedure.
The document discusses requirements for a new IT system for Children Support Agency (CSA). It includes:
1) A rich picture diagram showing key actors like administrators, children/members, and funding bodies, and processes like training, education and tackling crime.
2) Use case diagrams for the current system showing scenarios like recording personal data, assessments, and reporting.
3) Analysis of critical factors for the new system like improved reporting, data security, and meeting future requirements.
The new system aims to better manage and secure information to support CSA's work of helping young people through programs like education, housing and reducing crime.
This document provides an analysis of the information requirements for a skills training provider called SSG. It includes a rich picture diagram that identifies the key stakeholders in SSG's operations, including employees, students, tutors, partners, funders, and managers. It also provides use case diagrams and descriptions of the current course management system used by one of SSG's partners, LFLG. The analysis identifies issues with the existing system and outlines requirements for a new integrated management system to address challenges in coordinating operations across multiple training centers.
Information System Engineering coursework by May Hnit Oo KhinMay Hnit
The document describes key actors and issues in AgeCare's Green Drive project based on analyzing tasks and use cases. Six main use cases are identified: recording received funds, registering clients, adding driver information, recording monthly shopping trip rotas, filling daily project routines, and reporting project performance. Primary actors include the center accountant, administrative staff, Doris Smith (who plans trips and records routines), and Claire Graham (project leader). Secondary actors are the center manager, head office, funders, and supermarkets. The document also discusses secondary scenarios and assumptions made in drawing the use case diagram to model the project's operations.
Rapid Development Method Coursework by May Hnit Oo KhinMay Hnit
The class diagram models the key entities in a customer order processing system for a fashion belts company. It includes classes for belt specifications, sizes, styles, colors, stock, orders, deliveries, invoices and more. Relationships indicate that a belt specification is defined by a size, style, color and can be included in multiple orders. The diagram aims to capture the attributes and operations of each class and relationships between classes to help analyze the current system and design an improved proposed system.
This document provides details for a requirement analysis coursework project on developing a Key Performance Indicator (KPI) information system for Talentset Gateway Ltd. It includes a rich picture analysis of the current environment and issues. It also includes a use case diagram and documentation of key use cases for the new KPI system, including recording KPI data, employees, bookings, clients, sales activities, courses, and feedback. The goal of the new system is to help address issues in collecting and reporting KPI data across departments.
The document provides an analysis of information requirements for a Homeless Help Mission organization. It includes a rich picture diagram depicting the stakeholders and processes. The key stakeholders identified are the CEO, finance director, information quality officer, director of central administrative support, external funders and agencies, volunteers, lead workers, assistant/center managers, and administrative assistants. The organizational structure has four levels - an executive committee that makes decisions, a head office that manages transactions and local centers, local project centers that implement projects, and volunteers. The analysis also describes primary and secondary use case scenarios to justify system requirements.
The document provides an overview of requirements analysis for the Homeless Help Mission charity. It includes:
1) A rich picture diagram showing the people, processes, and information flows within the organization.
2) An analysis of the key issues including inconsistent data systems, conflicts over developing a new management information system, and ensuring projects meet key performance indicators.
3) Use case diagrams and descriptions of primary and secondary scenarios for activities like assigning gardening tasks, volunteer registration, and reporting within the "Dig-it" project.
4) The document is divided into sections covering rich picture analysis, use case modeling, and a planned critique of the models.
Information Technology Planning (University of Greenwich BIT Coursework) by N...Nay Linn Ko
This document provides a summary of a strategic evaluation report for Amazing Destinations travel agency. It identifies two new IT systems that would help address issues related to increased competition and limited IT use: a Web Based Online Booking System (WBBS) and a Package Tour Management Information System (PTMIS). The WBBS would allow customers to book tours online, while the PTMIS would help manage dealings with third parties like airlines and hotels. Implementing these systems would solve data duplication problems and require major organizational changes to procedures, policies, structures, and attitudes.
This document provides an overview of strategic plans for Amazing Destinations, a travel agency that is looking to transform its business model from luxury tours to more adventure-based travel. It outlines a proposed evaluation of the current business through a SWOT analysis. It then discusses information system requirements, including a proposed booking system and payment system to modernize operations. The document also covers how the company can transform, including recruiting more IT staff, training existing employees, and appointing a head of IT. It evaluates the feasibility of in-house vs. outsourced development and discusses disaster recovery plans.
The document discusses requirements for a new system called Alive being developed by Walk2Live (W2L) to manage its health and fitness franchise business. Section A provides a management summary of W2L and the need for the new Alive system. It analyzes whether the Dynamic Systems Development Method (DSDM) would be suitable for the Alive system. Section B discusses high level requirements for the system and prioritizes them using MoSCoW techniques. It identifies some inappropriate requirements that are not essential. Section C covers legal, social, ethical and professional issues to consider.
This document contains a summary of a student project to develop an e-commerce website called "Senorita Online Shopping and Web Selling System". The project report contains 8 chapters and appendices documenting the research, analysis, design, and development of the system. The first chapter introduces the project background and objectives, which are to develop functionalities for online purchasing, item management, sales, delivery, payments, and reporting. The second chapter provides a literature review on e-commerce studies, models, features, methodology, techniques and tools to be used. A feasibility study is presented in chapter 3, analyzing the economic, financial, technical and legal feasibility of the project and suitability of the DSDM methodology.
This document outlines a database design project for an avatar application called MORP. It includes assumptions for the database design, conceptual and relational schemas, normalization, the Microsoft Access database, SQL queries, a user registration form, a report, a master-detail form, and outputs of queries, forms and reports. The relational schema satisfies 3NF and the conceptual model diagram shows the relationships between entities like species, avatars, weapons, and users. The conclusion states the student learned about ERDs, forms, and reports through completing the coursework.
This document describes a coursework project to design a high-fidelity multimedia prototype mobile website for tourists. It discusses cognitive psychology and frameworks considered in the design, including attention, perception, memory, problem solving and decision making. It outlines design principles of consistency, simplicity, accessibility, usability and accommodation of users. The document details the methodology, rationale for using multimedia, and conceptual, low-fidelity and high-fidelity prototype development. It describes design elements like layout, color, images, navigation and evaluation techniques. The conclusion recaps the key points addressed in the project.
This document provides an overview of user interface design for a project titled "User Interface Design". It contains sections on design issues, legal ethical and social issues, colour theory, font terminology, guidelines for Microsoft and Apple platforms, and evaluation techniques. The document discusses common user interface design issues such as messages, menus, icons, shortcuts, and controls. It also covers legal, ethical and social considerations for crowdsourcing health data. Colour theory, font terminology, and guidelines for both Microsoft and Apple operating systems are explained. Finally, evaluation techniques like heuristic evaluation and cognitive walkthroughs are mentioned.
IT Project and Quality Management Coursework 2 by May Hnit Oo KhinMay Hnit
The document summarizes a netbook procurement project carried out to purchase suitable netbooks for managers and sales executives. It describes how the project was managed using a tailored methodology combining PRINCE 2 and PMBOK. Quality management involved planning, assurance, and control processes. Four netbook models were compared based on defined factors and criteria, with Toshiba recommended due to its storage, performance, usability, durability, services and reasonable price.
This document is a dissertation submitted by Myint Oo in partial fulfillment of the requirements for a BSc (Hons) in Business Information Technology from the University of Greenwich. It presents the development of a website for Unique, an online shopping and auction site. The dissertation contains 9 chapters that cover all aspects of analyzing the requirements, designing, developing, and delivering the project. Methodologies like DSDM and UML modeling are used to manage the project development. PHP and MySQL are selected as the programming language and database to create the dynamic website.
This is my University Assignment and it is about analyzing the scenarios using UseCase and Rich Diagram. In this project, also include discussion about conflict between different management levels of Organization.
The document provides a strategic evaluation report for Boots, a major UK retailer. It includes a SWOT analysis that identifies Boots' strengths as its reputation for quality products and customer service, as well as its sophisticated IT systems. Weaknesses include a broad product range that limits branding and lengthy innovation processes. Opportunities exist in expanding markets and improving technology. Threats include increased competition from supermarkets and online retailers. The new IT systems at Boots have improved sales, productivity, and targeting of customers through analyzing purchase data. Overall the report evaluates Boots' strategic position and competitive environment.
Information_Technology_Planning_comp_1647Aung Zay Ya
This document discusses information technology planning for Reguero-Almandeel-Purohit, an estate agency with 16 branches. It begins with an executive summary and introduction to the company's background and issues. A SWOT analysis identifies the company's strengths, weaknesses, opportunities, and threats. The biggest impact would come from a new property management system, which is analyzed in terms of key functional requirements and discussions with staff. The document also covers preparing for the biggest organizational changes when implementing the new system and having a disaster restoration procedure.
The document discusses requirements for a new IT system for Children Support Agency (CSA). It includes:
1) A rich picture diagram showing key actors like administrators, children/members, and funding bodies, and processes like training, education and tackling crime.
2) Use case diagrams for the current system showing scenarios like recording personal data, assessments, and reporting.
3) Analysis of critical factors for the new system like improved reporting, data security, and meeting future requirements.
The new system aims to better manage and secure information to support CSA's work of helping young people through programs like education, housing and reducing crime.
This document provides an analysis of the information requirements for a skills training provider called SSG. It includes a rich picture diagram that identifies the key stakeholders in SSG's operations, including employees, students, tutors, partners, funders, and managers. It also provides use case diagrams and descriptions of the current course management system used by one of SSG's partners, LFLG. The analysis identifies issues with the existing system and outlines requirements for a new integrated management system to address challenges in coordinating operations across multiple training centers.
Information System Engineering coursework by May Hnit Oo KhinMay Hnit
The document describes key actors and issues in AgeCare's Green Drive project based on analyzing tasks and use cases. Six main use cases are identified: recording received funds, registering clients, adding driver information, recording monthly shopping trip rotas, filling daily project routines, and reporting project performance. Primary actors include the center accountant, administrative staff, Doris Smith (who plans trips and records routines), and Claire Graham (project leader). Secondary actors are the center manager, head office, funders, and supermarkets. The document also discusses secondary scenarios and assumptions made in drawing the use case diagram to model the project's operations.
Rapid Development Method Coursework by May Hnit Oo KhinMay Hnit
The class diagram models the key entities in a customer order processing system for a fashion belts company. It includes classes for belt specifications, sizes, styles, colors, stock, orders, deliveries, invoices and more. Relationships indicate that a belt specification is defined by a size, style, color and can be included in multiple orders. The diagram aims to capture the attributes and operations of each class and relationships between classes to help analyze the current system and design an improved proposed system.
This document provides details for a requirement analysis coursework project on developing a Key Performance Indicator (KPI) information system for Talentset Gateway Ltd. It includes a rich picture analysis of the current environment and issues. It also includes a use case diagram and documentation of key use cases for the new KPI system, including recording KPI data, employees, bookings, clients, sales activities, courses, and feedback. The goal of the new system is to help address issues in collecting and reporting KPI data across departments.
The document provides an analysis of information requirements for a Homeless Help Mission organization. It includes a rich picture diagram depicting the stakeholders and processes. The key stakeholders identified are the CEO, finance director, information quality officer, director of central administrative support, external funders and agencies, volunteers, lead workers, assistant/center managers, and administrative assistants. The organizational structure has four levels - an executive committee that makes decisions, a head office that manages transactions and local centers, local project centers that implement projects, and volunteers. The analysis also describes primary and secondary use case scenarios to justify system requirements.
The document provides an overview of requirements analysis for the Homeless Help Mission charity. It includes:
1) A rich picture diagram showing the people, processes, and information flows within the organization.
2) An analysis of the key issues including inconsistent data systems, conflicts over developing a new management information system, and ensuring projects meet key performance indicators.
3) Use case diagrams and descriptions of primary and secondary scenarios for activities like assigning gardening tasks, volunteer registration, and reporting within the "Dig-it" project.
4) The document is divided into sections covering rich picture analysis, use case modeling, and a planned critique of the models.
Information Technology Planning (University of Greenwich BIT Coursework) by N...Nay Linn Ko
This document provides a summary of a strategic evaluation report for Amazing Destinations travel agency. It identifies two new IT systems that would help address issues related to increased competition and limited IT use: a Web Based Online Booking System (WBBS) and a Package Tour Management Information System (PTMIS). The WBBS would allow customers to book tours online, while the PTMIS would help manage dealings with third parties like airlines and hotels. Implementing these systems would solve data duplication problems and require major organizational changes to procedures, policies, structures, and attitudes.
This document provides an overview of strategic plans for Amazing Destinations, a travel agency that is looking to transform its business model from luxury tours to more adventure-based travel. It outlines a proposed evaluation of the current business through a SWOT analysis. It then discusses information system requirements, including a proposed booking system and payment system to modernize operations. The document also covers how the company can transform, including recruiting more IT staff, training existing employees, and appointing a head of IT. It evaluates the feasibility of in-house vs. outsourced development and discusses disaster recovery plans.
The document discusses requirements for a new system called Alive being developed by Walk2Live (W2L) to manage its health and fitness franchise business. Section A provides a management summary of W2L and the need for the new Alive system. It analyzes whether the Dynamic Systems Development Method (DSDM) would be suitable for the Alive system. Section B discusses high level requirements for the system and prioritizes them using MoSCoW techniques. It identifies some inappropriate requirements that are not essential. Section C covers legal, social, ethical and professional issues to consider.
This document contains a summary of a student project to develop an e-commerce website called "Senorita Online Shopping and Web Selling System". The project report contains 8 chapters and appendices documenting the research, analysis, design, and development of the system. The first chapter introduces the project background and objectives, which are to develop functionalities for online purchasing, item management, sales, delivery, payments, and reporting. The second chapter provides a literature review on e-commerce studies, models, features, methodology, techniques and tools to be used. A feasibility study is presented in chapter 3, analyzing the economic, financial, technical and legal feasibility of the project and suitability of the DSDM methodology.
This document outlines a database design project for an avatar application called MORP. It includes assumptions for the database design, conceptual and relational schemas, normalization, the Microsoft Access database, SQL queries, a user registration form, a report, a master-detail form, and outputs of queries, forms and reports. The relational schema satisfies 3NF and the conceptual model diagram shows the relationships between entities like species, avatars, weapons, and users. The conclusion states the student learned about ERDs, forms, and reports through completing the coursework.
This document describes a coursework project to design a high-fidelity multimedia prototype mobile website for tourists. It discusses cognitive psychology and frameworks considered in the design, including attention, perception, memory, problem solving and decision making. It outlines design principles of consistency, simplicity, accessibility, usability and accommodation of users. The document details the methodology, rationale for using multimedia, and conceptual, low-fidelity and high-fidelity prototype development. It describes design elements like layout, color, images, navigation and evaluation techniques. The conclusion recaps the key points addressed in the project.
User Interface Design (University of Greenwich BIT Coursework) by Nay Linn KoNay Linn Ko
This document provides details for a student coursework project on developing a low fidelity prototype for an educational game for children ages 7-11. It includes a literature review covering user interface design guidelines and principles. Several existing games are evaluated against identified usability and UX criteria. The document outlines plans to develop a prototype for a game called "Buildings Professional" to teach basic programming concepts to children. It discusses designing the prototype to work on different screen sizes while targeting 1024x768 pixels. The conclusion recaps what was learned and discusses opportunities for further enhancing the prototype.
This document is a student's coursework submission for an Interaction Design course. It includes an introduction outlining the development of a mobile website prototype called "Myanmar Academic Institutes Directory". It then discusses investigating current issues in mobile design and how they will address these issues in their prototype. The document continues by exploring how cognitive psychology will be applied to the prototype design, including evaluating how similar mobile sites have used cognitive principles. They justify the use of multimedia like images and text in their prototype. The submission includes sections on design principles, developing high and low fidelity prototypes, testing and concludes with discussing future enhancements.
NayLinnKo Information Systems Management BITNay Linn Ko
This document provides a strategic evaluation consultation for Blue Nile Company. It includes a SWOT analysis that identifies Blue Nile's strengths as its cost effectiveness and exclusive supplier relationships, and weaknesses as weak brand recognition and difficulties with payment transactions. Opportunities include expanding markets and innovating new products, while threats are increasing competition and potential hacking. A PEST analysis examines political factors like new regulations, economic issues such as currency fluctuations, and social trends that may impact demand. The document aims to analyze Blue Nile's situation and identify strategic considerations.
This document provides a requirement specification for redesigning two primary school websites. It includes an introduction, objectives, assumptions, selected websites, guidelines, and user groups. The objectives are to analyze the existing websites using guidelines, identify issues, create prototypes for website and mobile, and redesign based on accessibility and usability guidelines. The document outlines five Nielsen usability guidelines and three WCAG accessibility guidelines that will be used. Four main user groups are identified: parents, teachers, school staff, and students, with examples of the types of information needed by each.
The document contains details about the entities, attributes, and relationships for a veterinary clinic database system. It defines 12 entities including Owner, Animal, Doctor, Branch, etc. It also defines 12 relationships between the entities such as Animal needing a Breed, Doctor working in a Branch, etc. Finally, it shows the normalized tables for 3 core entities: Owner, Animal, and Doctor with attributes, primary keys, foreign keys, and data types.
This document provides an overview and outline for an undergraduate final year project report that will implement a "Good Church Finder" system for the Evangelical Fellowship of Zambia. The proposed system will address challenges people in Zambia face in finding legitimate churches. The report will include an introduction to the problem and organization, a literature review on similar systems and relevant topics, an analysis of requirements, a design for the system, implementation details, testing procedures, and a discussion of ethical and legal issues. The project aims to create a database-driven web portal that allows users to search for and view profiles of churches registered with the Evangelical Fellowship of Zambia.
This document describes a project to develop a national career guidance system for Zambia's Ministry of Education using a decision support system. The system will help users, especially students, identify suitable careers and training programs by providing information on universities, colleges, courses and admission requirements in Zambia. It aims to address the lack of guidance available to help Zambians choose careers and institutions after secondary school. The online system will allow the Ministry of Education and other organizations to provide comprehensive information to the public on educational and training options in the country.
The document discusses plans for implementing an ecommerce website called eMusic to sell music and film products. It covers 7 key areas: 1) Background on eMusic and research on similar websites, 2) Design of the website interface, 3) Establishing customer relationships through CRM programs, 4) Ensuring security, 5) Estimating budgets, 6) Perspectives on implementing eMusic, and 7) Marketing strategies using both online and offline methods. The document provides details on each area, including website features, security measures, costs, and how CRM and targeted marketing can attract and retain customers.
This document provides an overview of Owen Muzi's undergraduate final year project to develop an occupation and college guidance system for TEVETA using a model-view-controller framework. The project aims to create a dynamic website that will showcase all training institutions registered with TEVETA, including information on the courses and programs offered at each institution and their locations. The proposal includes chapters on literature review of relevant technologies, TEVETA's mandate, guidelines for user interface design, and the methodology to be used. Front-end and back-end technologies proposed include HTML, CSS, XHTML, and databases.
Database Design and Implementation Coursework by May Hnit Oo KhinMay Hnit
The document describes assumptions and business rules that were made when developing a database system for a quorum party planning application. It discusses what types of data were assumed to be important, such as details about party goers, parties, venues, and commercial subscribers. Relationships between entities like parties and venues, and business rules like a party needing a minimum number of attendees, were also determined. Conceptual and relational data models were created based on the assumptions to structure the database.
Case study 3 piloting procter & gamble from decision cockpits- is & ec - gs...HjZulkiffleeHjSofee
Procter & Gamble implemented several decision-making tools to improve business analytics and decision making. Business Sufficiency provided executives with 6-12 month predictions on key metrics. Business Sphere gave executives a command center to visualize data and answer specific questions in real-time. Decision Cockpits provided all employees with real-time business data dashboards. These tools helped P&G anticipate events, respond faster to changes, and focus on business decisions using accurate and up-to-date data. The tools supported P&G's strategy of pursuing new IT to maintain a competitive advantage through faster and better-informed decision making.
Case study 3 piloting procter & gamble from decision cockpits- is & ec - gs...HjZulkiffleeHjSofee
Procter & Gamble implemented several decision-making tools to improve business analytics and decision making. Business Sufficiency provided executives with 6-12 month predictions on key metrics. Business Sphere allowed executives to visualize and explore data to answer specific questions. Decision Cockpits gave more employees access to real-time data and alerts through customizable dashboards. These systems helped P&G align analytics with its strategy of pursuing new technologies to maintain a competitive advantage through faster, better-informed decisions across 180 countries.
E-commerce for Small and Medium Enterprises (SMEs)Unilog Corp
Small and Medium Enterprises (SMEs) are incubators for the growth of innovation and of employment. They not only play an important role in the United States where they account for 99% of all business establishments, and have generated 9.8 Million jobs between 1993 and 2009, but also contribute a chunk of profit to the global economy. In spite of this, SMEs face umpteen challenges like non-availability of suitable technologies, small production capacities, non-availability of skilled labour at affordable costs, and inability to compete with the marketing muscle of larger organizations.
Age Friendly Economy - Improving your business with dataAgeFriendlyEconomy
The objective of this module is to gain an overview how you can use the data you already have available to improve your business.
Upon completion of this module you will:
- Learn the tips of how take advantage of the existing data you already have
- Be able to locate where internal data already lies within your company
- See how data can help you to build your brand
Testing Transformation: The Art and Science for SuccessTechWell
Technologies, testing processes, and the role of the tester have evolved significantly in the past few years with the advent of agile, DevOps, and other new technologies. It is critical that we testing professionals evaluate ourselves and continue to add tangible value to our organizations. In your work, are you focused on the trivial or on real game changers? Jennifer Bonine describes critical elements that help you artfully blend people, process, and technology to create a synergistic relationship that adds value. Jennifer shares ideas on mastering politics, maneuvering core vs. context, and innovating your technology strategies and processes. She explores how new processes can be introduced in an organization, what the role of organizational culture is in determining the success of a project, and how you can know what tools will add value vs. simply adding overhead and complexity. Jennifer reviews critically needed tester skills and discusses a continual learning model to evolve your skills and stay relevant. This discussion can lead you to technologies, processes, and skills you can stake your career on.
NMIMS Dec 21 Assignment Questions Solved palaniappann
Sir / Madam,
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD. has 15 years of teaching experience in MBA Business schools. For last fifteen years Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD has taught various subjects from Marketing, Finance, Human Resource Management, Information Systems, International Business and General Specializations. He has written many research papers and case studies.
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD organizes online MBA subject coaching / MBA Assignment help and MBA Project help. Many clients national and international has appreciated Prof.Dr.N.Palaniappan.,MBA., MCom.,MPhil.,PhD for his timely help in the assignments and projects and MBA subject coaching.
You can call him on his mobile no. 09025810064 (whatsapp available) or mail him at palaniappanmail@gmail.com. He does help/guide for the below question. If urgent or any query’s, Please feel free to call him on his mobile no. 9025810064 (whatsapp available) or do mail on palaniappanmail@gmail.com. He does help/guide for the below question
Contact:
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD
Mail ID: palaniappanmail@gmail.com
Ph: - 9025810064 (whatsapp available)
This document contains a copyright notice for a presentation on information systems prepared by Arianto Muditomo for Perbanas Institute. It states that the presentation is for educational purposes only and cannot be altered or used commercially without permission. It includes references used in the presentation and an outline of topics that will be covered in the lecture series.
This document provides information on becoming a data-driven business, including recognizing opportunities where big data can benefit a company. It discusses integrating big data by identifying opportunities, building future capability scenarios, and defining benefits and roadmaps. It also outlines six data business models: product innovators, system innovators, data providers, data brokers, value chain integrators, and delivery network collaborators. An example is given for each model.
Best NMIMS Assignment Solutions Dec 21palaniappann
Sir / Madam,
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD. has 15 years of teaching experience in MBA Business schools. For last fifteen years Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD has taught various subjects from Marketing, Finance, Human Resource Management, Information Systems, International Business and General Specializations. He has written many research papers and case studies.
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD organizes online MBA subject coaching / MBA Assignment help and MBA Project help. Many clients national and international has appreciated Prof.Dr.N.Palaniappan.,MBA., MCom.,MPhil.,PhD for his timely help in the assignments and projects and MBA subject coaching.
You can call him on his mobile no. 09025810064 (whatsapp available) or mail him at palaniappanmail@gmail.com. He does help/guide for the below question. If urgent or any query’s, Please feel free to call him on his mobile no. 9025810064 (whatsapp available) or do mail on palaniappanmail@gmail.com. He does help/guide for the below question
Contact:
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD
Mail ID: palaniappanmail@gmail.com
Ph: - 9025810064 (whatsapp available)
Gartner - The art of the one page strategyDeepak Kamboj
The document is a transcript from a Gartner webinar on developing one-page strategies. It provides examples of one-page strategies from various companies and industries. It outlines the process for building a one-page strategy, including understanding how the company wins in the marketplace, identifying differentiators, choosing a viewpoint, and answering a question. It emphasizes that the strategy should tell a story and be refined through an iterative process. The webinar recommends related Gartner research on effective communications and one-page strategies.
This document discusses components of a modern marketing information system. It explains that a marketing information system consists of people, equipment, and procedures to gather, analyze, distribute market data to decision makers. It relies on internal records, marketing intelligence, and marketing research. The document provides details on internal records, marketing intelligence systems, trends/megatrends analysis, and analyzing demographic factors like population, age, ethnicity, education, households.
Creating Intelligent Infrastructure for Extreme Automationwiseio
This whitepaper, created jointly by TSIA and Wise.io, discusses the technology infrastructure needed to put extreme automation into production. Covering a range of industries and use cases, this paper provides a framework to explore and evaluate how to automate manual processes in your business.
This document discusses how a big box retailer utilized big data to improve its business. It outlines the steps the retailer took:
1) It identified where big data could create advantages, such as predictive analytics to forecast sales declines. This would allow the retailer to be more proactive.
2) It built future capability scenarios to determine how to leverage big data, such as using social media data to predict problems.
3) It defined the benefits and roadmap for implementing big data, including investing millions over 5 years for a positive return. Benefits would include more consistent, faster information and insights.
The document provides details on how the retailer methodically planned and aligned its big data strategy to its business needs
Using Analytics to Grow the Small Business PortfolioSaggezza
This document discusses how data analytics can help financial institutions grow their small business portfolios. It begins by outlining how data analytics can provide a competitive advantage. It then discusses how large banks are using data analytics to predict customer needs and increase sales. The document proposes five key steps for becoming a data-driven organization: 1) set goals; 2) assess talent and capabilities; 3) uncover valuable insights; 4) take action on insights; and 5) create a data-driven culture. Finally, it provides 13 specific action items that financial institutions can take to grow their small business portfolios using data analytics.
Project Opportunity Finding or Account Mining is an approach used by companies, especially software companies, to find new opportunities from existing clients during economic downturns. It involves gathering detailed information about client accounts, analyzing client needs and capabilities, and creating documents that propose new projects or services based on gaps identified. Studies show companies using this approach gained 10-20% more projects compared to those relying solely on goodwill. The approach builds stronger client relationships and allows companies to provide more value-added consulting.
NMIMS Dec 2021 Assignment Answer Sheet palaniappann
Sir / Madam,
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD. has 15 years of teaching experience in MBA Business schools. For last fifteen years Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD has taught various subjects from Marketing, Finance, Human Resource Management, Information Systems, International Business and General Specializations. He has written many research papers and case studies.
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD organizes online MBA subject coaching / MBA Assignment help and MBA Project help. Many clients national and international has appreciated Prof.Dr.N.Palaniappan.,MBA., MCom.,MPhil.,PhD for his timely help in the assignments and projects and MBA subject coaching.
You can call him on his mobile no. 09025810064 (whatsapp available) or mail him at palaniappanmail@gmail.com. He does help/guide for the below question. If urgent or any query’s, Please feel free to call him on his mobile no. 9025810064 (whatsapp available) or do mail on palaniappanmail@gmail.com. He does help/guide for the below question
Contact:
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD
Mail ID: palaniappanmail@gmail.com
Ph: - 9025810064 (whatsapp available)
Age Friendly Economy - Improving your business with external dataAgeFriendlyEconomy
The objective of this module is to gain an overview how you can use the data available outside of your company to improve your business.
Upon completion of this module you will:
- Learn the basics of external data and where to find it
- Be able to recognize there is a lot of Open Data already out there for you to use – especially about Older People
- See the benefits of using the external data in order to improve your business
This document discusses competitive intelligence and provides an overview of the topic. It covers the following key points:
1. The history and evolution of competitive intelligence over the past 30 years due to changes in technology and difficulties justifying large CI departments.
2. An overview of competitive intelligence, defining it as more than just information about competitors and emphasizing its role in developing winning strategies through leveraging knowledge assets.
3. The competitive intelligence process involving planning, collection from internal and external sources, analysis using techniques like SWOT and modeling, and dissemination of insights.
4. Categories of competitive intelligence like market intelligence, competitor intelligence, and customer intelligence.
NMIMS Assignment Solution December 2021palaniappann
Sir / Madam,
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD. has 15 years of teaching experience in MBA Business schools. For last fifteen years Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD has taught various subjects from Marketing, Finance, Human Resource Management, Information Systems, International Business and General Specializations. He has written many research papers and case studies.
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD organizes online MBA subject coaching / MBA Assignment help and MBA Project help. Many clients national and international has appreciated Prof.Dr.N.Palaniappan.,MBA., MCom.,MPhil.,PhD for his timely help in the assignments and projects and MBA subject coaching.
You can call him on his mobile no. 09025810064 (whatsapp available) or mail him at palaniappanmail@gmail.com. He does help/guide for the below question. If urgent or any query’s, Please feel free to call him on his mobile no. 9025810064 (whatsapp available) or do mail on palaniappanmail@gmail.com. He does help/guide for the below question
Contact:
Prof.Dr.N.Palaniappan.,MBA.,MCom.,MPhil.,PhD
Mail ID: palaniappanmail@gmail.com
Ph: - 9025810064 (whatsapp available)
Dealing in a digital world - strategies to future-proof your businessEY
As the world goes digital, developing innovation in-house is no longer enough, according to a new study from EY. Instead, with constraints around time and capital, non-tech firms are turning to mergers and acquisitions (M&A), joint ventures and alliances to acquire the innovation they need.
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...Donc Test
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck maria r mitchell.docx
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck maria r mitchell.docx
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck maria r mitchell.docx
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
OJP data from firms like Vicinity Jobs have emerged as a complement to traditional sources of labour demand data, such as the Job Vacancy and Wages Survey (JVWS). Ibrahim Abuallail, PhD Candidate, University of Ottawa, presented research relating to bias in OJPs and a proposed approach to effectively adjust OJP data to complement existing official data (such as from the JVWS) and improve the measurement of labour demand.
The Impact of Generative AI and 4th Industrial RevolutionPaolo Maresca
This infographic explores the transformative power of Generative AI, a key driver of the 4th Industrial Revolution. Discover how Generative AI is revolutionizing industries, accelerating innovation, and shaping the future of work.
The Rise and Fall of Ponzi Schemes in America.pptxDiana Rose
Ponzi schemes, a notorious form of financial fraud, have plagued America’s investment landscape for decades. Named after Charles Ponzi, who orchestrated one of the most infamous schemes in the early 20th century, these fraudulent operations promise high returns with little or no risk, only to collapse and leave investors with significant losses. This article explores the nature of Ponzi schemes, notable cases in American history, their impact on victims, and measures to prevent falling prey to such scams.
Understanding Ponzi Schemes
A Ponzi scheme is an investment scam where returns are paid to earlier investors using the capital from newer investors, rather than from legitimate profit earned. The scheme relies on a constant influx of new investments to continue paying the promised returns. Eventually, when the flow of new money slows down or stops, the scheme collapses, leaving the majority of investors with substantial financial losses.
Historical Context: Charles Ponzi and His Legacy
Charles Ponzi is the namesake of this deceptive practice. In the 1920s, Ponzi promised investors in Boston a 50% return within 45 days or 100% return in 90 days through arbitrage of international reply coupons. Initially, he paid returns as promised, not from profits, but from the investments of new participants. When his scheme unraveled, it resulted in losses exceeding $20 million (equivalent to about $270 million today).
Notable American Ponzi Schemes
1. Bernie Madoff: Perhaps the most notorious Ponzi scheme in recent history, Bernie Madoff’s fraud involved $65 billion. Madoff, a well-respected figure in the financial industry, promised steady, high returns through a secretive investment strategy. His scheme lasted for decades before collapsing in 2008, devastating thousands of investors, including individuals, charities, and institutional clients.
2. Allen Stanford: Through his company, Stanford Financial Group, Allen Stanford orchestrated a $7 billion Ponzi scheme, luring investors with fraudulent certificates of deposit issued by his offshore bank. Stanford promised high returns and lavish lifestyle benefits to his investors, which ultimately led to a 110-year prison sentence for the financier in 2012.
3. Tom Petters: In a scheme that lasted more than a decade, Tom Petters ran a $3.65 billion Ponzi scheme, using his company, Petters Group Worldwide. He claimed to buy and sell consumer electronics, but in reality, he used new investments to pay off old debts and fund his extravagant lifestyle. Petters was convicted in 2009 and sentenced to 50 years in prison.
4. Eric Dalius and Saivian: Eric Dalius, a prominent figure behind Saivian, a cashback program promising high returns, is under scrutiny for allegedly orchestrating a Ponzi scheme. Saivian enticed investors with promises of up to 20% cash back on everyday purchases. However, investigations suggest that the returns were paid using new investments rather than legitimate profits. The collapse of Saivian l
Dr. Alyce Su Cover Story - China's Investment Leadermsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
New Visa Rules for Tourists and Students in Thailand | Amit Kakkar Easy VisaAmit Kakkar
Discover essential details about Thailand's recent visa policy changes, tailored for tourists and students. Amit Kakkar Easy Visa provides a comprehensive overview of new requirements, application processes, and tips to ensure a smooth transition for all travelers.
2. 2 | P a g e
Acknowledgement
It is my pleasure and privilege to prepare this assignment. It gave me immense
interest and aroused curiosity and I believe that the experience gathered in this
assignment will help me extremely in career building.
I am especially grateful to our respectable teacher – Mr. Monjur Ahmed for giving me
valuable suggestion and support me to prepare this project. Without his advice and
support, it would not be possible for me to prepare this assignment.
3. 3 | P a g e
Strategic EvaluationStrategic EvaluationStrategic EvaluationStrategic Evaluation
Document for BootsDocument for BootsDocument for BootsDocument for Boots
Submitted To:
Boots Senior Management
Boots
Submitted by:
Md. Mahbub Alam
Consultant
4. 4 | P a g e
Table of ContentsTable of ContentsTable of ContentsTable of Contents
1. Management Summery ......................................................................................................................5
2. Introduction ........................................................................................................................................6
3. Strategic Evaluation ............................................................................................................................7
Strengths:............................................................................................................................................7
Weakness:...........................................................................................................................................7
Opportunities:.....................................................................................................................................8
Threats: ...............................................................................................................................................8
Political:...............................................................................................................................................8
Social...................................................................................................................................................8
Economical..........................................................................................................................................8
Technological ......................................................................................................................................9
4. Impact of IS .........................................................................................................................................9
4.1. Investigate the impact of new IT/IS system.....................................................................................9
5. eMarketing Strategic.........................................................................................................................10
5.1. Strategies which organization has to adopt ..................................................................................10
5.2. Proposition value and differential advantage of this strategy ......................................................12
6. Legal and ethical issues.....................................................................................................................13
6.1 Cookie Policy...............................................................................................................................13
6.2 Privacy Policy...............................................................................................................................13
6.3 Sending Unsolicited Email...........................................................................................................15
6.4 Social Exclusion ...........................................................................................................................15
6.5 Policy on Handing Over the Data................................................................................................15
7. Conclusion.........................................................................................................................................16
8. References ........................................................................................................................................16
5. 5 | P a g e
1.1.1.1. Management SummeryManagement SummeryManagement SummeryManagement Summery
Boots is an organization which sales product to customer. They need an information
management system which capable to manage all type of job in a single platform. All
type of job has to be integrated with this system. This management system can help
customer and also management of Boots. This system has to high efficiency of
performance. User friendly user interface so, this system does not need any kind of
user training. Report manipulations for user and management perspective. Sales and
purchase integration to the system. Users can easy ecommerce by helping this
system. System has to be secure by external threat. Management and user have to
happy using this system.
6. 6 | P a g e
2.2.2.2. IntroductionIntroductionIntroductionIntroduction
Boots is providing service to customer by sale products. They sales various types of
goods as customer require. Sales products are such as skin care products, hair care
products, Boots health & Travel Cover and baby care products etc. The customer can
shop in peace and perhaps earn extra points as well.
They have many types of goods. Customers can purchase those goods from their
retail shop. Customer can purchase product using Card and customer can get an
extra advantage using this card. Boots lunched this card scheme nationally in
September 1997 following a two year research programme that had included
extensive in the Norwich and Plymouth area. The majority of their customers are
women. They record customer information in a database which is soft system. Some
time Boots provide some discount to customer for better customer relation and
grater sale.
Boots is a long-established IBM customer. They looking for better Information system
solution. Their database system started in spring 1997. Their database is now
decreasing performance and so, they need a better solution which is better than
now. They have huge information of customer. New system has to achieve the Boots
requirement. Database has to be capable to process of analysis. All previous data
have to have in new database. Previous customer data is a greatest asset of Boots.
Boots wanted to at least eight million signup and they got ten million card holders in
December 1998. As a result their new system has to be strong and entity query have
to faster processing result provide able.
7. 7 | P a g e
3.3.3.3. Strategic EvaluationStrategic EvaluationStrategic EvaluationStrategic Evaluation
To be successful and make advancement in the business, it is very important for a
company to plan its futures strategies to the business. To settle on its strategy, the
company first needs to know about its present position. At the present time to
analyze a company’s present position, an accepted tool is often used named SWOT
analysis and PEST analysis. SWOT is the acronym of strength, weakness,
opportunities and threats. PEST is the acronym of Political factor, Economical factor,
Social factor and Technical factor. It is provides compassionate information for
correct organizations abilities and resources to the ready for action environment it
operates inside.
SWOT Analysis:
StrengthsStrengthsStrengthsStrengths::::
• Boots is well known to customers, respected and recognized
• It have huge number of card holder
• Huge number of customer information
• Customer email and contact information
• Low budget products as user required
• Many shops in different of location
• Various types of products
• Boots always able to understand customer required goods
• Financial growth
• Useful promotional strategies
WeaknessWeaknessWeaknessWeakness::::
• Need more time to generate report or query
• All activity are not centralised
• Not have fully integrated system
• Not have experience employee
8. 8 | P a g e
OpportunitiesOpportunitiesOpportunitiesOpportunities::::
• Existing customers are the key ambassadors for a organization
• Customer have no objection
• They can expand their fleet by acquiring more shops
TTTThreatshreatshreatshreats::::
• Increase of environmental taxes
• Dependencies on third party shop providers
• IT system breakdown
PEST analysis
Political:Political:Political:Political:
• In this case they need to aware about recent threat of war in Middle East
(Among Israel, Iran and Palestine) and in Africa (recent chaos in Egypt). There
is also chaos happening in Syria
• Taxes may be change
SocialSocialSocialSocial
• Increasing terrorists attack across the globe
• People are normally quite sociable to the prospect of low-priced product
EconomicalEconomicalEconomicalEconomical
• Some countries financial system might downfall
• Improbability due to the cost instability of product
• Long term loans
• Europe becomes more united
• Unemployment rate across Europe is increasing gradually
• Recently GBP value has fallen down
9. 9 | P a g e
TechnologicalTechnologicalTechnologicalTechnological
• Most of the bookings are complete through Internet
• The advancement in technology also makes sure the convenience of
replacements and maintenance services to its convoy of airplanes.
4. Impact of IS4. Impact of IS4. Impact of IS4. Impact of IS
The execution of Boots e-marketing strategy has been achieved on the company’s
system. The Boots system has been designed to propose high usability to visitor and
is simple to use compare to some of its competitor. It is simply designed, with an
intuitive navigation – allowing users to move from page to page without the need to
go via main interface. It has high functionality and is without excess baggage. It was
created with the intention not to tire the visitor with redundant graphics and
advertisements which would distract its visitors and make them walk away from the
system. It employs moderate use of text eliminating time wastage while conveying
accurate message to guide users through various links. Each page on the system
consist enough required information without abstract marketing banners to
sidetrack real buyers.
4.1. Investigate the impact of new IT/IS system4.1. Investigate the impact of new IT/IS system4.1. Investigate the impact of new IT/IS system4.1. Investigate the impact of new IT/IS system
The implementation of the strategy has an impact on the business performance
because the site is well integrated into Boots’s existing systems and business process.
A good case in point is the ability to feed press release into the site through
electronic and new destination appearing automatically once fed into the business’s
information system. According to the case study, the effectiveness of the system was
proved when the dedicated cell number on the site hit six months target within six
10. 10 | P a g e
weeks. The log file recorded 8 minutes average time spent on the system per person
and almost each caller made a purchase. The system proved that Boots phone
operators were busy selling product rather than answering questions over the
phone.
5. eMarketing Strategic5. eMarketing Strategic5. eMarketing Strategic5. eMarketing Strategic
E-marketing means the focus of marketing on the customers, even as inferring they
require linking other business operation to achieve the required efficiency. E-
marketing is for that reason defined as achieve marketing objectives through the
make use of electronic communication technology which includes internet, eBooks,
e-mail, mobile phones etc.
According to the case study, at the beginning of its long run Boots did not give that
much significance on the digital marketing, though later it was realized by the
administration that the digital marketing activities were needed to adopt for further
success for Boots. The activities that were adopted have been outlined in the
conversation below.
5.1. Strategies which organization has to adopt5.1. Strategies which organization has to adopt5.1. Strategies which organization has to adopt5.1. Strategies which organization has to adopt
Because the Internet gives the most cost-effective distribution channel, Boots has
uncompromisingly pursued its strategy of encouraging customers to book their
product online.
• Boots first initiate the thought of offering a discount to Internet customers, an
ingenuity that has been widely copied by competitors. Any Boots promotions
11. 11 | P a g e
are exclusive to the Internet, so that customers must get online if they wish to
take benefit of discounted.
• On the system they added new services which are all meant to attract the
customers.
• Boots arrange different competition through the system for the users where
successful competitor is rewarded.
• Another e-marketing strategy which Boots has taken is E-mail marketing. It is
one of the usual ways of on-line or digital promotion where a people are sent
emails to notify about the services offered by the business. On the other hand,
there are also many other ways of digital marketing which Boots can consider
to adopt. Some of the ways are included below.
• SMM (Social Media Marketing) – Social media is a proven and very successful
means of reaching people on an all-purpose basis or a targeted group basis. In
its simplest form, this kind of service could be treated as the provision of
reaching people by means of utilizing the control of the social media
platforms like “Facebook.com” or “Twitter.com” or “MySpace.com” where
thousands of people can be reached easily and it is a great form of cost-
effective means of digital advertising.
• SEO – SEO is the acronym of Search Engine Optimization. It is an indirect way
of digital marketing which was popular and very necessary for the success of
the commerce. It was very important for the business to be optimized for the
search engines so that the search engines can show the commerce in their
search listing when people search with relevant keyword to find a business or
service similar to the selling.
• Backlines – By means of Backlines, it was possible to obtain an increased
number of visitors to the system and thus getting more dealing. Thus this
indirect approach of promoting the business and spreading the word were
adopted as one of the digital marketing means for the dealing.
12. 12 | P a g e
• Mobile Marketing – Advertising were based on distribution the words through
cell as it was possible for people to be online by means of smart phones.
The e-marketing strategies that are planned above are attached with the business
and other policies and objectives of the selling so that a proper mapping of the
resources and activities could take place to portray the above advertising strategies
for the total success of the business.
5.2.5.2.5.2.5.2. Proposition value and differential advantage of this strategyProposition value and differential advantage of this strategyProposition value and differential advantage of this strategyProposition value and differential advantage of this strategy
We can see that Boots is balancing their online and offline promotion by the
following ways.
• Boots frequently provides promotional offers
• Specific campaign to encourage customer
• If we look into the case study, Buy baby product and get a picture frame
promotional offer
• For increasing the online customers they have put the company URL
everywhere.
Above list it is that Boots is evaluation their online and offline promotion smoothly.
13. 13 | P a g e
6. Legal a6. Legal a6. Legal a6. Legal and ethical issuesnd ethical issuesnd ethical issuesnd ethical issues
Legal and ethical issues are one of the key factors to success of a business. Legal
issues are those rules which are bounded by the law and everyone must have to
follow those rules. If someone breaks those rules, he/ she must be punished.
In this part, it has been discussed what legal and ethical issues “Boots” needs to
consider with regard to the gathering, processing, distribution and use of information
on the internet.
6.1 Cookie Policy
While using cookies in the system, they must follow the laws concerning the cookies
and must let the system visitors’ percept about that. The company must have a
cookie policy which should contain the following details-
• General Explanation about what cookie is.
• What kind of information they gather by cookies.
• Clear information about how they use cookies.
• What types of cookies they use and explanation for each of those cookies.
• Specific information about why they need to use cookies.
• The ways to manage or opt out of cookies.
• If any of their supplementary partner sites use cookies or not
The cookies must not to be used for personal information gathering.
6666.2 Privacy Policy.2 Privacy Policy.2 Privacy Policy.2 Privacy Policy
According to the case study, it is mentioned that to order online for product, every
customer must have an open an online account in the Boots’s system. This means
that the company has the access to the personal data of its users. For using those
personal information the company must bound to the “Data Protection Act 1998” in
UK/ EU. To do this they must have a privacy policy which should contain the
following details-
14. 14 | P a g e
• Which information they required, such as transaction information, card
information, social security number etc. It also needs to be declaring why they
need this information.
• Clear information about for which purpose all information will be used, such
as accounting, billing, and audit, credit or other payment card verification and
screening, immigration and customs control, safety, security, health,
organizational and legal purposes, statistical and marketing analysis, systems
testing, maintenance and development, customer surveys, customer relations
etc.
• What will happen if a user doesn’t want to share personal information?
• Information about if the system is using any technology such as (site tracker,
use of pixel for email tracking etc.) to track user and if it uses, why it’s using
that technology.
• Security policy- what kind of technology it’s using to protect its user’s data
once it is collected from the users and what will happen if any security
breech occur (e.g. user information get hacked).
• Liability issue- it is very important for users to know what will happen if the
data is abused and who is responsible for that. The company must provide
clear information about this. Proprietary issue- information about who owns
the data and how the ownership can be transferred.
• Accessibility- information about who is allowed to access the user data and
under which condition they can access those data.
• Information about what technical and organizational process will be taken
from the company against unauthorized or unlawful processing of personal
data and against accidental loss or destruction of, or damage to, personal
data.
• The data that is collected must be accurate and should keep up to date
whenever possible.
• How long they are going to retain user information.
15. 15 | P a g e
• What measures they have taken to ensure the credit cards security of users.
6666.3 Sending Unsolicited Email.3 Sending Unsolicited Email.3 Sending Unsolicited Email.3 Sending Unsolicited Email
For marketing purpose the company may require to send frequent email to its users
which some users may feel very annoying. In these cases, the company must give its
users an option to stop getting those emails. An example - with every mail an option
can be added which will tell users how they can stop those email.
6666.4 Social Exclusion.4 Social Exclusion.4 Social Exclusion.4 Social Exclusion
As the company gives more importance in online promotion than offline promotion,
which results a certain group of people (older people, people who don’t have access
to internet) don’t even get to know about the promotion and when they hear about
it from some other people, they can feel socially excluded. In these cases, Boots must
ensure that they are not limiting access to information from certain section of
society.
6666....5555 Policy on Handing Over the DataPolicy on Handing Over the DataPolicy on Handing Over the DataPolicy on Handing Over the Data
Boots must ensure that they are not handing over or transferring their customer’s
personal data to a country or territory outside the European Economic Area unless
that country or territory ensures an adequate level of protection for the rights and
liberties of data subjects in relation to the processing of personal data.
16. 16 | P a g e
7.7.7.7. ConclusionConclusionConclusionConclusion
It is my pleasure to working in this project that has some critical and functional
analysis and Boots is best as I ever seen. I have gathered new experience from Boots.
Boots is vast information based organization which is managing their projects
smoothly. When new system implements it will more user friendly and organised
information based organization. I want to give thanks to Boots to give me the
opportunity to work with them.
8.8.8.8. ReferencesReferencesReferencesReferences