The Role of the Operating Manager in Information Systems, page 10 (graded). Using the Case Study Template format found in Doc Sharing, submit your recommended course of action. Your case study should be no more than five pages long, including the title page.
Case Study 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems
It was 7:30 P.M. on September 22, 2006, and Leon Lassiter, Vice President of Marketing with the Midsouth Chamber of Commerce (MSCC), was still in his office, reflecting on the day’s frustrations. Lassiter had met with four territory managers, his marketing support supervisor, and a number of other members of his staff. All were upset about their lack of access to the new computer system and the problems they were having using their old systems. Lassiter had assured them that the problems were being addressed. He stressed that patience was needed during the ongoing conversion to the new system.
Now, during his private moment, Lassiter was beginning to recognize the problems and complexities he faced with the system conversion. The work of his marketing staff, who were unable to access the new computer system to handle their accounts, had ground to a halt. Even worse, something had happened to the data in most of the workstations, which meant that conference registrations and other functions had to be done manually. These inconveniences, however, were minor compared to Lassiter’s uneasy feeling that there were problems with Midsouth’s whole approach to the management of information technology. Lassiter knew that time was of the essence and that he might have to step in and manage the conversion, even though he had no information technology background. He wondered what he should do next.
Background of the MSCC
In the early 1900s, economic development in the Midsouth area was highly dependent on transportation systems. As a result of legislative decisions, many communities in the Midsouth area could not gain access to reasonable transportation services, thus retarding business and economic development. With no one to represent their concerns to the state government, a group of powerful businesspeople formed the MSCC to lobby the legislature on the issue of transportation access.
The MSCC dealt with this single issue until the 1930s, when its charter was changed to include a broader range of issues affecting the business community, including state banking laws, transportation, industrial development, and business taxes. By the mid-1990s, the MSCC, under the new leadership of President Jack Wallingford, became an aggressive advocacy organization for the business community.
The broadening of MSCC’s role brought substantial change to the organization. In 1988 the MSCC had a staff of 14, a membership of 3,000 businesses and individuals, and an annual budget of $1,720,000. Over the years, the MSCC had been able to develop a reserve account of just over $1.5 million.
By 2000, the staff had gr.
IRJET - Roles of Management Information System in Business and How it Hel...IRJET Journal
This document discusses the roles and importance of management information systems (MIS) in business decision making. It begins by defining MIS as a system that generates information from raw data to help managers at different levels make strategic decisions. The document then discusses the history and evolution of MIS, from early manual systems to modern computerized systems. It explains the key components and types of information produced by MIS, such as descriptive, diagnostic, predictive, and prescriptive information. The document emphasizes that MIS is crucial for business success and survival in today's competitive environment by providing timely access to necessary information to help managers make better decisions.
RUNNING HEAD MISSION STATEMENT MISSION STATEMENT OF DREAM C.docxcowinhelen
RUNNING HEAD: MISSION STATEMENT
MISSION STATEMENT OF DREAM COMPANY 5
Mission Statement of Dream Company
Jackie L. Howell JR
Columbia Southern University
In any company in the industry that brings many people together to work for a common goal, they need something that guides them (Dewitz, 2014). For example, the workers need to be informed their job description by the human resource manager. The human resource manager should guide, protect and nurture them to help in the delivery of desired results. As a result, the human resources mission statement plays a very significant role. It helps guides the workers and makes them stay committed to the tasks assigned to them (Dewitz, 2014). Therefore, a company should have a clear defined mission statement understood by every stakeholder. The paper provides an analysis of a company of choice and looks at some of the mission statements to help come up with a suitable mission statement.
Several big companies around the world offer various goods and services, and they tend to have one similarity. It involves their humble beginnings which leave a person wondering how they have made their up to the current state (Dewitz, 2014). After seeing how there has been a great rise in the number of businesses, there is a need for more banking systems. As a result, the company of choice involves a banking system that will help potential investors obtain the required starting capital. The current business persons face a lot of frustration from the existing banks due to high-interest rates (Dewitz, 2014). Some of them have considered leaving their business idea as they cannot meet the process of acquiring the startup capital.
The mission statements of the already operating companies do not favor many customers who mostly constitute business people (Dewitz, 2014). The mission statement forms a primary marketing strategy for any business that wants to thrive in the industry (Dewitz, 2014). It helps in capturing the company’s chief brand position and makes it remain competitive among the rivals. By studying the samples of human resources mission statements provided, they differ in some aspects. In the first example, the company here only stresses on the idea offering quality products and services to the customers. It does not indicate how the employees will be equipped, motivated and guided to implement the quality customer service.
The second sample seems to the most attractive and suitable to market the company as compared to the rest. It ensures that all customers receive quality products and services. Also, it first provides that every worker is equipped with appropriate skills through training to enable them to deliver what customers need. The mission statements work well when it addresses both the needs of the consumers and workers (Fazlzadeh, & Malekpour, 2015). It ensures that employees have a safe and comfortable working environment. ...
This document provides an overview of management information systems (MIS). It defines MIS as using information technology, people, and processes to record, store, and process data into useful information for decision-making. The document then discusses the evolution of MIS from the 1950s to the present day, covering transaction processing systems, management information systems, decision support systems, executive information systems, knowledge management systems, and e-business. It also outlines the key components, objectives, and characteristics of an effective MIS.
The document discusses what's new in Microsoft SharePoint 2013. It explores enhancements to external lists, including performance improvements and the ability to limit records returned. The document is provided for application specialists, line-of-business specialists, and IT administrators to learn about updates in SharePoint 2013. It notes that the most up-to-date information can be found on Microsoft's technical library website.
The document discusses the history and evolution of management information systems from initially manual internal reporting to more advanced transaction processing, management information, and decision support systems. It notes how MIS helps companies understand strengths/weaknesses, improve processes and operations, and understand customer needs. However, MIS has also brought issues like job redundancies, privacy concerns, and lack of job security. The document concludes by defining system development as creating an information system to solve organizational problems and notes system analysis identifies the problem and information requirements.
The document discusses Management Information Systems (MIS). It defines MIS as the study of people, technology, organizations, and the relationships between them. The goal of MIS is to help organizations realize maximum benefit from investments in personnel, equipment, and business processes. MIS uses information systems at all levels of businesses to collect, process, store, and disseminate data needed for daily operations and strategic decision making. The document also discusses typical career paths for MIS professionals and the traits that make someone well-suited for a career in MIS.
This document is the 2010 annual report of the National Minority Supplier Development Council (NMSDC). It summarizes that in 2010, NMSDC certified over 16,000 minority-owned businesses which were matched to supply goods and services to NMSDC's 3,500 corporate members, resulting in over $100 billion in purchases. It also describes NMSDC's leadership, programs like Centers of Excellence, and the transition to a new president.
James Holt is a General Manager at Microsoft responsible for a $179M federal civilian services business. He has grown new work sold by 265% and service delivery by 222% over the past 5 years. Holt leads diverse teams providing consulting, support, and cloud services to federal agencies and partners. As GM, he cultivates innovation, adapts strategies to market changes, and ensures an inclusive work environment. Previously, Holt held leadership roles at Oracle and CGI-AMS growing their federal civilian practices and turning around struggling projects and portfolios.
IRJET - Roles of Management Information System in Business and How it Hel...IRJET Journal
This document discusses the roles and importance of management information systems (MIS) in business decision making. It begins by defining MIS as a system that generates information from raw data to help managers at different levels make strategic decisions. The document then discusses the history and evolution of MIS, from early manual systems to modern computerized systems. It explains the key components and types of information produced by MIS, such as descriptive, diagnostic, predictive, and prescriptive information. The document emphasizes that MIS is crucial for business success and survival in today's competitive environment by providing timely access to necessary information to help managers make better decisions.
RUNNING HEAD MISSION STATEMENT MISSION STATEMENT OF DREAM C.docxcowinhelen
RUNNING HEAD: MISSION STATEMENT
MISSION STATEMENT OF DREAM COMPANY 5
Mission Statement of Dream Company
Jackie L. Howell JR
Columbia Southern University
In any company in the industry that brings many people together to work for a common goal, they need something that guides them (Dewitz, 2014). For example, the workers need to be informed their job description by the human resource manager. The human resource manager should guide, protect and nurture them to help in the delivery of desired results. As a result, the human resources mission statement plays a very significant role. It helps guides the workers and makes them stay committed to the tasks assigned to them (Dewitz, 2014). Therefore, a company should have a clear defined mission statement understood by every stakeholder. The paper provides an analysis of a company of choice and looks at some of the mission statements to help come up with a suitable mission statement.
Several big companies around the world offer various goods and services, and they tend to have one similarity. It involves their humble beginnings which leave a person wondering how they have made their up to the current state (Dewitz, 2014). After seeing how there has been a great rise in the number of businesses, there is a need for more banking systems. As a result, the company of choice involves a banking system that will help potential investors obtain the required starting capital. The current business persons face a lot of frustration from the existing banks due to high-interest rates (Dewitz, 2014). Some of them have considered leaving their business idea as they cannot meet the process of acquiring the startup capital.
The mission statements of the already operating companies do not favor many customers who mostly constitute business people (Dewitz, 2014). The mission statement forms a primary marketing strategy for any business that wants to thrive in the industry (Dewitz, 2014). It helps in capturing the company’s chief brand position and makes it remain competitive among the rivals. By studying the samples of human resources mission statements provided, they differ in some aspects. In the first example, the company here only stresses on the idea offering quality products and services to the customers. It does not indicate how the employees will be equipped, motivated and guided to implement the quality customer service.
The second sample seems to the most attractive and suitable to market the company as compared to the rest. It ensures that all customers receive quality products and services. Also, it first provides that every worker is equipped with appropriate skills through training to enable them to deliver what customers need. The mission statements work well when it addresses both the needs of the consumers and workers (Fazlzadeh, & Malekpour, 2015). It ensures that employees have a safe and comfortable working environment. ...
This document provides an overview of management information systems (MIS). It defines MIS as using information technology, people, and processes to record, store, and process data into useful information for decision-making. The document then discusses the evolution of MIS from the 1950s to the present day, covering transaction processing systems, management information systems, decision support systems, executive information systems, knowledge management systems, and e-business. It also outlines the key components, objectives, and characteristics of an effective MIS.
The document discusses what's new in Microsoft SharePoint 2013. It explores enhancements to external lists, including performance improvements and the ability to limit records returned. The document is provided for application specialists, line-of-business specialists, and IT administrators to learn about updates in SharePoint 2013. It notes that the most up-to-date information can be found on Microsoft's technical library website.
The document discusses the history and evolution of management information systems from initially manual internal reporting to more advanced transaction processing, management information, and decision support systems. It notes how MIS helps companies understand strengths/weaknesses, improve processes and operations, and understand customer needs. However, MIS has also brought issues like job redundancies, privacy concerns, and lack of job security. The document concludes by defining system development as creating an information system to solve organizational problems and notes system analysis identifies the problem and information requirements.
The document discusses Management Information Systems (MIS). It defines MIS as the study of people, technology, organizations, and the relationships between them. The goal of MIS is to help organizations realize maximum benefit from investments in personnel, equipment, and business processes. MIS uses information systems at all levels of businesses to collect, process, store, and disseminate data needed for daily operations and strategic decision making. The document also discusses typical career paths for MIS professionals and the traits that make someone well-suited for a career in MIS.
This document is the 2010 annual report of the National Minority Supplier Development Council (NMSDC). It summarizes that in 2010, NMSDC certified over 16,000 minority-owned businesses which were matched to supply goods and services to NMSDC's 3,500 corporate members, resulting in over $100 billion in purchases. It also describes NMSDC's leadership, programs like Centers of Excellence, and the transition to a new president.
James Holt is a General Manager at Microsoft responsible for a $179M federal civilian services business. He has grown new work sold by 265% and service delivery by 222% over the past 5 years. Holt leads diverse teams providing consulting, support, and cloud services to federal agencies and partners. As GM, he cultivates innovation, adapts strategies to market changes, and ensures an inclusive work environment. Previously, Holt held leadership roles at Oracle and CGI-AMS growing their federal civilian practices and turning around struggling projects and portfolios.
James Holt has over 30 years of experience managing technology services businesses. He currently serves as General Manager of Microsoft's $179M Federal Civilian Services business, where he has grown revenue 265% over 5 years. Previously, Holt held leadership roles at Oracle, CGI, and Unisys, turning around struggling business units. Holt has extensive experience developing strategies, managing teams and resources, and delivering results for clients such as the VA, SSA, and World Bank.
This document discusses the evolution of information systems from electronic data processing (EDP) systems in the 1960s to today's enterprise systems and e-commerce applications. It outlines the development of different types of information systems including transaction processing systems, management information systems, decision support systems, executive information systems, expert systems, knowledge management systems, and enterprise resource planning systems. It also describes how information systems now support strategic, tactical, and operational management decision-making and enhance the value of information through data warehousing and data mining.
The document discusses the IT strategy at Addison Bank. It describes Addison Bank as one of Canada's largest financial institutions with over 50,000 employees and hundreds of billions in assets. It then discusses the bank's Credit Control Group, which oversees collections of delinquent loans. The IT systems supporting this group include databases to store loan information, software to track contacts and payments, analytics software, and hardware. The strategy evaluated the current state of the bank's Credit Control Group IT systems and recommended modernizing the systems to improve collections and reduce costs.
1. The document discusses the development of a new Management Information System (MIS) for Glyndwr Bank. The objectives are to develop applications to support the bank's operations and competitive strategy.
2. The IT Manager's objectives are to lay out a framework for understanding the existing systems and designing appropriate planning and control systems to migrate data to the new MIS. The MIS should allow collection, storage, and transformation of data into useful business information and reports, provide data security controls, and automate processes.
3. Key features of the new MIS include enhancing employee communication, delivering information throughout the bank, providing an objective system for recording data, reducing manual work, and supporting strategic goals. The IT Manager will create a
Major challenges of information systems include: 1) addressing globalization needs, 2) designing effective information architectures, and 3) maximizing the benefits of technology competitively. Management information systems aim to provide managers with historical data to aid planning and control decisions. They systematically collect and organize data to transform it into useful information for management. However, information systems also face limitations such as inability to replace human judgment and decreased effectiveness over time.
The annual report summarizes NMSDC's activities and achievements in 2013, including restructuring its affiliate network from 36 councils to 24. It overviews NMSDC's mission to certify, develop, connect, and advocate for over 12,000 certified minority-owned businesses. Key events in 2013 included improving its technology and matching services for corporations, and assessing programs to better serve stakeholders. The report provides statistics on NMSDC's membership base and certified minority-owned businesses.
Managers face many challenges in managing information systems as organizations and systems continuously change. First-order effects are direct outcomes of a new system while second-order effects are indirect outcomes. Whether a system is successful depends on factors like the organization's competitive environment, culture, structure, processes, and existing IT infrastructure. Privacy is important for individuals in organizations because electronic monitoring can track sensitive personal data like internet usage, medical information, and physical movements. Organizations should consider balancing oversight with employees' reasonable expectations of privacy.
The document discusses the role of Management Information Systems (MIS) in organizations. It states that MIS involves collecting, processing, storing, and disseminating data to users. The objectives of MIS are data capturing, processing, storage, retrieval, and dissemination of information. It then describes key characteristics of MIS like being system-oriented, management-oriented, need-based, exception-based, integrated, and having a central database. Finally, it discusses how MIS plays a vital role in decision making, coordination, problem finding, performance comparison, and strategy development for organizations.
This document discusses management information systems (MIS). It defines MIS as a system that processes data into information to facilitate decision making across departments in an organization. The document outlines the objectives, characteristics, types, advantages, and need for MIS. It concludes that MIS helps analyze operational systems to support planning and control activities across an organization by automating and supporting human decision making.
The document discusses how a company can legally and ethically profit and gain additional
audiences through data mining and collecting information while addressing the main issue. It
analyzes ways for the company to profit through data in a lawful and moral manner, such as by
only collecting data from users who consent and ensuring proper security measures are in place to
protect user information. The goal is for the company to successfully expand its audience and make
money through data-driven methods that do not compromise ethics or the law.
This document provides information about obtaining fully solved assignments from an assignment help service. It lists the email and phone contact information for the service and provides instructions to include semester and specialization name when reaching out. It also lists the subject codes and names for assignments that are available for various MBA programs and semesters, including Business Intelligence & Tools for semester 3.
This document provides a program guide for the Dbriefs webcast series from July to September 2013. It outlines various webcast topics within the areas of Financial Executives, Industries, Markets, HR Executives, Technology Executives, Tax Executives, and Our Presenters. Some of the highlighted webcasts include discussions on emerging markets opportunities and competition, IT infrastructure transformation challenges, risk management lessons, executive compensation trends, cybersecurity issues for boards, and information reporting and withholding tax liabilities. The guide encourages subscribers to look ahead at emerging business trends and gain insights from these convenient live webcasts.
This document provides a program guide for the Dbriefs webcast series from July to September 2013. It outlines various webcast topics within the areas of financial executives, industries, markets, HR executives, technology executives, and tax executives. The webcasts will discuss emerging issues leaders need to address, including driving enterprise value, governance and risk, financial reporting, transactions and business events, and specific industry topics. The guide provides details on subscription information and accessing materials from past Dbriefs webcasts.
The document discusses the key concepts of management information systems (MIS). It defines MIS as an integrated system that provides information to support management decision making. The objectives of MIS are to facilitate decision making, provide requisite information to all management levels, and support structured and unstructured problem solving. MIS has various applications in areas like accounting, finance, marketing, materials management, and production management. It provides the right information to the right people at the right time. Business intelligence systems allow companies to analyze corporate data for strategic planning and decision making.
The document discusses the functions and roles of management information systems (MIS) in organizations. Some key points:
1) MIS acts as the "heart" of the organization, collecting, processing, and distributing essential information to various parts of the organization, similar to how the heart circulates blood in the body.
2) MIS supports decision-making at all levels by providing relevant and timely data and reports to managers. It helps ensure accurate, complete information is available for strategic planning, operations management, and other business functions.
3) By systematizing data collection and reporting, MIS streamlines operations, creates a shared understanding of business concepts, and allows managers to leverage analytical tools for better insights and decisions.
The document discusses the functions and roles of management information systems (MIS) in organizations. Some key points:
1) MIS acts as the "heart" of the organization, collecting, processing, and distributing essential information to various parts of the organization, similar to how the heart circulates blood in the body.
2) MIS supports decision-making at all levels by providing relevant and timely data and reports to managers. It helps ensure accurate, complete information is available for strategic planning, operations management, and other business functions.
3) By systematizing data collection and reporting, MIS streamlines operations and creates efficiencies. It brings structure and clarity to communication across an organization.
Manufactured in Mississippi Magazine SPRING ISSUE 2015Fran Riddell
The document summarizes the story of Larry White, owner of AA Calibration Services in Yazoo City, Mississippi. When White lost his job in 2004, he saw it as an opportunity to start his own calibration business by purchasing equipment from his former employer. Since then, AA Calibration has grown from 1 employee to 18 employees. White funds expansions through savings and views challenges as things to adapt to, adjust for, and overcome. He has addressed the shortage of skilled technicians in his area by training local residents interested in career opportunities.
The document provides an overview of management information systems (MIS). It discusses key topics such as:
1. The definition and purpose of MIS, which is to provide managers with reports and displays of information to support decision-making.
2. The major components of an MIS including hardware, software, databases, procedures, and personnel.
3. The functions of an MIS such as collecting data, storing and processing it, and presenting information to managers.
4. The types of MIS like executive information systems, marketing information systems, business intelligence systems, and transaction processing systems.
So in summary, the document defines MIS and discusses its purpose, components, functions, and types to provide managers with the
This document contains a summary of an MIS project focused on logistics. It includes 4 case studies of advanced MIS systems implemented by various companies:
1) An ERP system implemented by Colgate to address issues with misdeliveries and delays.
2) A procurement management system implemented by HUD to better manage contracts and obligations.
3) A CRM system implemented by Telestra to improve customer service and increase customer base.
4) A supply chain management system used by a pizza company to ensure efficient delivery and customer satisfaction.
The document also provides an overview of MIS, its components and capabilities, and how it supports decision making and helps achieve business objectives. Screenshots of an MIS report
The response form teacherHi Talal,I think your discussion of pa.docxkathleen23456789
The teacher provides feedback on a student's discussion of painting and figuration, recommending that the student refer to texts by Deleuze on painting and sensation as well as a text by Jencks on collage in postmodern architecture. The teacher asks the student to differentiate between Jencks' definition of collage and their reference to "iconic", identify techniques used in specific projects, and compare how contemporary architectural legibility differs from discussions of postmodern iconicity and collage in Jencks. The teacher suggests reviewing all readings on figuration and speculating on contemporary cultural aspects prompting shifts in architectural legibility.
The response form teacher Hi Talal, I think your discussio.docxkathleen23456789
The response form teacher:
Hi Talal,
I think your discussion of painting in relation to figuration relates to some of the issues raised in Gilles
Deleuze's texts "Painting and Sensation," and "The Diagram" (in the readings for week 9). You should
also definitely refer to the attached text by Charles Jencks as a primary source for how collage was
defined in the context of Postmodern architecture. It would be useful to differentiate between collage as
defined by Jencks and what you refer to as 'iconic'. You should identify specific techniques that are used
in several projects in order to facilitate legibility. How does this contemporary form of architectural
legibility differ from discussions of Postmodern iconicity and collage (Jencks)? It would be good to
review all the readings in the Figuration topic in order to present your position in that context. It would
also be useful to speculate on what aspects of our contemporary cultural moment have prompted this
shift in forms of legibility in architecture. I look forward to seeing the essay develop.
Best, Marcelyn
.
More Related Content
Similar to The Role of the Operating Manager in Information Systems, page 10 (g.docx
James Holt has over 30 years of experience managing technology services businesses. He currently serves as General Manager of Microsoft's $179M Federal Civilian Services business, where he has grown revenue 265% over 5 years. Previously, Holt held leadership roles at Oracle, CGI, and Unisys, turning around struggling business units. Holt has extensive experience developing strategies, managing teams and resources, and delivering results for clients such as the VA, SSA, and World Bank.
This document discusses the evolution of information systems from electronic data processing (EDP) systems in the 1960s to today's enterprise systems and e-commerce applications. It outlines the development of different types of information systems including transaction processing systems, management information systems, decision support systems, executive information systems, expert systems, knowledge management systems, and enterprise resource planning systems. It also describes how information systems now support strategic, tactical, and operational management decision-making and enhance the value of information through data warehousing and data mining.
The document discusses the IT strategy at Addison Bank. It describes Addison Bank as one of Canada's largest financial institutions with over 50,000 employees and hundreds of billions in assets. It then discusses the bank's Credit Control Group, which oversees collections of delinquent loans. The IT systems supporting this group include databases to store loan information, software to track contacts and payments, analytics software, and hardware. The strategy evaluated the current state of the bank's Credit Control Group IT systems and recommended modernizing the systems to improve collections and reduce costs.
1. The document discusses the development of a new Management Information System (MIS) for Glyndwr Bank. The objectives are to develop applications to support the bank's operations and competitive strategy.
2. The IT Manager's objectives are to lay out a framework for understanding the existing systems and designing appropriate planning and control systems to migrate data to the new MIS. The MIS should allow collection, storage, and transformation of data into useful business information and reports, provide data security controls, and automate processes.
3. Key features of the new MIS include enhancing employee communication, delivering information throughout the bank, providing an objective system for recording data, reducing manual work, and supporting strategic goals. The IT Manager will create a
Major challenges of information systems include: 1) addressing globalization needs, 2) designing effective information architectures, and 3) maximizing the benefits of technology competitively. Management information systems aim to provide managers with historical data to aid planning and control decisions. They systematically collect and organize data to transform it into useful information for management. However, information systems also face limitations such as inability to replace human judgment and decreased effectiveness over time.
The annual report summarizes NMSDC's activities and achievements in 2013, including restructuring its affiliate network from 36 councils to 24. It overviews NMSDC's mission to certify, develop, connect, and advocate for over 12,000 certified minority-owned businesses. Key events in 2013 included improving its technology and matching services for corporations, and assessing programs to better serve stakeholders. The report provides statistics on NMSDC's membership base and certified minority-owned businesses.
Managers face many challenges in managing information systems as organizations and systems continuously change. First-order effects are direct outcomes of a new system while second-order effects are indirect outcomes. Whether a system is successful depends on factors like the organization's competitive environment, culture, structure, processes, and existing IT infrastructure. Privacy is important for individuals in organizations because electronic monitoring can track sensitive personal data like internet usage, medical information, and physical movements. Organizations should consider balancing oversight with employees' reasonable expectations of privacy.
The document discusses the role of Management Information Systems (MIS) in organizations. It states that MIS involves collecting, processing, storing, and disseminating data to users. The objectives of MIS are data capturing, processing, storage, retrieval, and dissemination of information. It then describes key characteristics of MIS like being system-oriented, management-oriented, need-based, exception-based, integrated, and having a central database. Finally, it discusses how MIS plays a vital role in decision making, coordination, problem finding, performance comparison, and strategy development for organizations.
This document discusses management information systems (MIS). It defines MIS as a system that processes data into information to facilitate decision making across departments in an organization. The document outlines the objectives, characteristics, types, advantages, and need for MIS. It concludes that MIS helps analyze operational systems to support planning and control activities across an organization by automating and supporting human decision making.
The document discusses how a company can legally and ethically profit and gain additional
audiences through data mining and collecting information while addressing the main issue. It
analyzes ways for the company to profit through data in a lawful and moral manner, such as by
only collecting data from users who consent and ensuring proper security measures are in place to
protect user information. The goal is for the company to successfully expand its audience and make
money through data-driven methods that do not compromise ethics or the law.
This document provides information about obtaining fully solved assignments from an assignment help service. It lists the email and phone contact information for the service and provides instructions to include semester and specialization name when reaching out. It also lists the subject codes and names for assignments that are available for various MBA programs and semesters, including Business Intelligence & Tools for semester 3.
This document provides a program guide for the Dbriefs webcast series from July to September 2013. It outlines various webcast topics within the areas of Financial Executives, Industries, Markets, HR Executives, Technology Executives, Tax Executives, and Our Presenters. Some of the highlighted webcasts include discussions on emerging markets opportunities and competition, IT infrastructure transformation challenges, risk management lessons, executive compensation trends, cybersecurity issues for boards, and information reporting and withholding tax liabilities. The guide encourages subscribers to look ahead at emerging business trends and gain insights from these convenient live webcasts.
This document provides a program guide for the Dbriefs webcast series from July to September 2013. It outlines various webcast topics within the areas of financial executives, industries, markets, HR executives, technology executives, and tax executives. The webcasts will discuss emerging issues leaders need to address, including driving enterprise value, governance and risk, financial reporting, transactions and business events, and specific industry topics. The guide provides details on subscription information and accessing materials from past Dbriefs webcasts.
The document discusses the key concepts of management information systems (MIS). It defines MIS as an integrated system that provides information to support management decision making. The objectives of MIS are to facilitate decision making, provide requisite information to all management levels, and support structured and unstructured problem solving. MIS has various applications in areas like accounting, finance, marketing, materials management, and production management. It provides the right information to the right people at the right time. Business intelligence systems allow companies to analyze corporate data for strategic planning and decision making.
The document discusses the functions and roles of management information systems (MIS) in organizations. Some key points:
1) MIS acts as the "heart" of the organization, collecting, processing, and distributing essential information to various parts of the organization, similar to how the heart circulates blood in the body.
2) MIS supports decision-making at all levels by providing relevant and timely data and reports to managers. It helps ensure accurate, complete information is available for strategic planning, operations management, and other business functions.
3) By systematizing data collection and reporting, MIS streamlines operations, creates a shared understanding of business concepts, and allows managers to leverage analytical tools for better insights and decisions.
The document discusses the functions and roles of management information systems (MIS) in organizations. Some key points:
1) MIS acts as the "heart" of the organization, collecting, processing, and distributing essential information to various parts of the organization, similar to how the heart circulates blood in the body.
2) MIS supports decision-making at all levels by providing relevant and timely data and reports to managers. It helps ensure accurate, complete information is available for strategic planning, operations management, and other business functions.
3) By systematizing data collection and reporting, MIS streamlines operations and creates efficiencies. It brings structure and clarity to communication across an organization.
Manufactured in Mississippi Magazine SPRING ISSUE 2015Fran Riddell
The document summarizes the story of Larry White, owner of AA Calibration Services in Yazoo City, Mississippi. When White lost his job in 2004, he saw it as an opportunity to start his own calibration business by purchasing equipment from his former employer. Since then, AA Calibration has grown from 1 employee to 18 employees. White funds expansions through savings and views challenges as things to adapt to, adjust for, and overcome. He has addressed the shortage of skilled technicians in his area by training local residents interested in career opportunities.
The document provides an overview of management information systems (MIS). It discusses key topics such as:
1. The definition and purpose of MIS, which is to provide managers with reports and displays of information to support decision-making.
2. The major components of an MIS including hardware, software, databases, procedures, and personnel.
3. The functions of an MIS such as collecting data, storing and processing it, and presenting information to managers.
4. The types of MIS like executive information systems, marketing information systems, business intelligence systems, and transaction processing systems.
So in summary, the document defines MIS and discusses its purpose, components, functions, and types to provide managers with the
This document contains a summary of an MIS project focused on logistics. It includes 4 case studies of advanced MIS systems implemented by various companies:
1) An ERP system implemented by Colgate to address issues with misdeliveries and delays.
2) A procurement management system implemented by HUD to better manage contracts and obligations.
3) A CRM system implemented by Telestra to improve customer service and increase customer base.
4) A supply chain management system used by a pizza company to ensure efficient delivery and customer satisfaction.
The document also provides an overview of MIS, its components and capabilities, and how it supports decision making and helps achieve business objectives. Screenshots of an MIS report
Similar to The Role of the Operating Manager in Information Systems, page 10 (g.docx (20)
The response form teacherHi Talal,I think your discussion of pa.docxkathleen23456789
The teacher provides feedback on a student's discussion of painting and figuration, recommending that the student refer to texts by Deleuze on painting and sensation as well as a text by Jencks on collage in postmodern architecture. The teacher asks the student to differentiate between Jencks' definition of collage and their reference to "iconic", identify techniques used in specific projects, and compare how contemporary architectural legibility differs from discussions of postmodern iconicity and collage in Jencks. The teacher suggests reviewing all readings on figuration and speculating on contemporary cultural aspects prompting shifts in architectural legibility.
The response form teacher Hi Talal, I think your discussio.docxkathleen23456789
The response form teacher:
Hi Talal,
I think your discussion of painting in relation to figuration relates to some of the issues raised in Gilles
Deleuze's texts "Painting and Sensation," and "The Diagram" (in the readings for week 9). You should
also definitely refer to the attached text by Charles Jencks as a primary source for how collage was
defined in the context of Postmodern architecture. It would be useful to differentiate between collage as
defined by Jencks and what you refer to as 'iconic'. You should identify specific techniques that are used
in several projects in order to facilitate legibility. How does this contemporary form of architectural
legibility differ from discussions of Postmodern iconicity and collage (Jencks)? It would be good to
review all the readings in the Figuration topic in order to present your position in that context. It would
also be useful to speculate on what aspects of our contemporary cultural moment have prompted this
shift in forms of legibility in architecture. I look forward to seeing the essay develop.
Best, Marcelyn
.
The resources needed to support operations and implement strategic i.docxkathleen23456789
The resources needed to support operations and implement strategic initiatives often surpass those available. What role does the board of directors (or executive leadership, if there is no board) play in establishing organizational priorities? How do you know how to prioritize the wants and needs of all departments? How can an organization tackle ambitious plans while ensuring that operations stay on track? PLEASE INCLUDE IN-TEXT CITATION AND REFERENCE
.
The research team met again to consider data sources. A research.docxkathleen23456789
The research team met again to consider data sources. A research consultant facilitated the discussion and identified issues to be addressed in order for the results to be credible. Three key areas needed further study before they went into the field. These areas included:
1. How is the program
positioned
in the community, particularly regarding trust, diversity, and access? (Or as one team member said, “How do we see ‘them’? And, how do we think they ‘see’ us?”)
This issue initiated an action plan for an organizational self-study to produce
reflexive
data before, during, and after field data collection.
2. What data sources would best answer the research questions?
Multiple sources
, including families who had used program services as well as those that did not; field observations (going out into neighborhoods to become acquainted with local, non-professional resources); and the materials collected from the self-study.
3. How many participants should be included in the sample?
The consultant clarified that the purpose of the sample was not to generalize to the target population—so bigger is not better. Rather, the team was encouraged to focus on selecting
typical cases
—homogenous, sub-groups—in order to efficiently
saturate
and develop a “solid understanding” (Guest, Bunce & Johnson, 2006, p. 77) of the phenomenon of the childcare experience in this community. The saturation goal means that the sample process is emergent and may change as the data become available.
As you can see in the ongoing scenario, before venturing out into the field, researchers must consider how they will manage credibility of the data. As a qualitative researcher, you too will have to address the sources of data as well as your credibility.
For this week, you will examine research questions, explore qualitative research design, and consider purposeful sampling and saturation as a qualitative researcher.
The answer lies in how clearly you articulate the criteria for selecting data sources; (b) your ability to purposefully select cases; and (c) the extent to which those cases are “information-rich… for in-depth study” (Patton, 2015, p. 264) with respect to the purpose of the study.
As you prepare for this week’s Discussion, consider turning your attention to the variety of purposeful sampling strategies you may consider in developing your research plan. Also consider that qualitative researchers seek a threshold or cut-off point for when to stop collecting data. There is no
magic number
(although there are guidelines). Rather, saturation occurs as an interface between the researcher and the data and (b) between data collection and data analysis to determine when enough is enough.
For this Discussion, you will critique a sampling strategy used in a research article.
To prepare for this Discussion:
· Review the Guest, Bunce, and Johnson article; the Yob and Brewer article; and the Learning Resources related to sampling and saturation for this .
The research process theoretical framework and hypothesis develop.docxkathleen23456789
The research process: theoretical framework and hypothesis development
the social network
The growing use of social network sites (such as Facebook) and online communities (such as for instance the apple computer community, the community of Harley-Davidson riders, and the community of Starbucks customers) provides exciting opportunities for organizations. Online brand communities allow organizations to engage and interact with customers, obtain market information, sell and advertise products, rapidly disseminate information, develop long-term relationships with the community, and eventually to influence consumers’ preferences and behavior (Dholakia and Bagozzi, 2001, Dholakia, Bagozzi, and Pearo, 2004, Franke and shah, 2003, Muniz and Schau, 2005, Tedjamulia, Olsen, dean, and Albrecht, 2005). “brand community” is a term that is used to describe like-minded consumers who identify with a particular brand and share significant traits, such as for instance “a shared consciousness, rituals, traditions, and a sense of moral responsibility” (Muniz and O’Guinn, 2001, p. 412). Online brand communities are based on their core value - the brand - and grow by building relationships with and among members interested in the brand (Jang et al. 2008). There are several possible categorizations of online brand communities, but they are generally grouped into two categories based on who initiates and manages the community; (1) company initiated communities, built by the company that owns the brand and (2) user-initiated communities, voluntarily built by their members (that is, the consumer) (e.g., Armstrong and Hhagel 1996; kozinets1999). These two types of brand communities provide different opportunities for marketers. For instance, a brand community on a company website is one of the key determinants of attracting consumers to and retaining customers on the website (Nysveen and Pedersen, 2004). Consumer initiated online brand communities may provide consumers with useful information about other
Consumers’ experiences with the product or service and the strengths and weaknesses of products or services (Jang et al. 2008).
The success of online brand communities is heavily dependent on consumer participation in the online brand community. To determine why consumers, participate in online brand community’s business student Jesse Eisenberg has developed a model based on extant service marketing literature. The main idea in this literature is that perceived value and satisfaction are antecedents of the intention to use a product or service (Anderson, Fornell, and Lehmann 1994; Bolton and drew1991; Grönroos 1990; Hocutt 1998; Kang, lee, and Choi 2007; Ravald and Grönroos 1996).
Jesse wants to apply this idea to consumer participation in online brand communities. According to Jesse, “members will probably be satisfied with an online brand community and have the intention to participate in the community when they deri.
The Research Process for the Informative Speech . .docxkathleen23456789
This document outlines the research process for an informative speech, beginning with determining the general and specific purpose, developing a thesis statement, gathering relevant information from databases, creating an outline, developing a PowerPoint presentation, and finally presenting the speech. The process involves choosing a topic, identifying the main points to be discussed, finding an attention-grabbing opener, connecting with the audience, and concluding with a impactful closing statement. Sources must be properly cited using MLA format and included on a works cited page. Following these steps will help produce an informative speech backed by credible research.
The Research PaperMust be eight- to ten double-spaced pages i.docxkathleen23456789
The Research Paper:
Must be eight- to ten double-spaced pages in length and formatted according to APA style as outlined in the Writing Center.
Must include a title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must begin with an introductory paragraph that has a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a conclusion that reaffirms your thesis.
Must use at least seven scholarly sources.
Must document all sources in APA style, as outlined in the Writing Center.
Must include a separate reference page, formatted according to APA style as outlined in the Writing Center.
.
The Research PaperSix Double-Spaced Content Pages Minimum10pt .docxkathleen23456789
The Research Paper
Six Double-Spaced Content Pages Minimum
10pt or 12pt Font Size
MLA Format In-Text Citations
MLA Format Works Cited Page
An Annotated Bibliography Page
Research Paper Guidelines and Topics to be considered:
· Selecting entire countries or continents are too broad but individual genres within those specific countries such as Shona Music from Zimbabwe, Japanese Enka, Portuguese Fado, Haitian Hip-Hop, Cuban Son, and Klezmer are good because they represent a specific genre of Music.
· Specific instruments—the history and use of the gamelan orchestra, the tres, the bandonion, the sitar, and the kora are a few of the many instruments to consider. Here, you should locate recordings or videos of your selected instrument being played alone (by itself) and recordings or videos of it being played together with other instruments or voices.
· A performing artist or music group
· Skim through our textbook and be sure to listen to the music by accessing our World Music Textbook Listening Selections located in the Modules section of our online course in Canvas.
· A performing artist or music group—be careful not to submit only a biography as this is not a research paper, rather you must take a stand on why you believe this musician/group is important. An argumentative paper is a good approach here as it will develop why you believe—and importantly, why the reader should believe what you do about the significance of your selected performing artist or music group.
· Skim through our textbook and be sure to listen to the music by accessing our World Music Textbook Listening Selections with links to each of the 4 textbook CD's located in the Modules section of our online course in Canvas. Read about and listen to a variety of music from different parts of the world.
· As you explore, list areas (topics) that are of interest to you. These areas of interest can be quite broad--genres of music, specific instruments, singing styles, composers, performing artists, ceremonial music, sacred music, social and political events, evidence of acculturation, urbanization, etc. Please understand that you do not need to know anything about the topics you select--a sincere interest and curiosity is all that is necessary.
· Listen to/view as many recordings/videos as you can find. You will select examples from the music itself (listening and responding to recordings) and opinions/descriptions from experts which directly supports your thesis. The body of your paper turns into a site for laying out the proof you've collected rather than a canvas for delineating a topic.
· The final product will be a unique and appropriate integrationof information you have located outside yourself along with your personal insights.
· The paper should reflect a balance between the sharing of factual information, quotes from writers you have read during the research process (cited in MLA), along with your own response, descriptions, and analysis of that information—which m.
The research paper will be a formatted APA paper. It is 12 pages, d.docxkathleen23456789
The research paper will be a formatted APA paper. It is 12 pages, double-spaced. Paper length requirement is 12 pages of content from Title Page through References with no plagiarism. The Final papers will contain a
title page, TOC, abstract, introduction/topic paragraph, summary/conclusion, and references page.
This is the abstract
Information technology has been one of the critical aspects and an accelerator in driving the global economy with computational technology tools. ICT can be defined as systems whose fundamental functions are anchored in the generation, processing, storage, communication, and presentation of digital data (Masanet, E., & Matthews, H. S. 2010). When we are speaking of the global economy, there is an e-government or electronic government. This is a digital interaction among governments, parliament, central & state governments, and connecting citizens with the governance. Using information technology, when implementing e-governance, the (central and local) government has to redefine how the state interacts with the community, and central interacts with the states and brings it closer to the citizen. It involves him in the government process (Iovan, S., & Daian, G. I. 2013). Companies competing in the worldwide market are seeing and taking advantage of operating at a global level. They are profiting from the international markets, and consumer and production diversity are the main factors. Globalization is what matters in doing business with different countries. These include and are not limited to international competitors, investment strategies, infrastructure, local government stability, global rivalry, physical and elusive ventures, etc.
This research paper aims to present some aspects of the use of Information technology for the betterment of society and how it transforms information society, which in turn develops a country's economy.
.
The research paper should contain the following components• Tit.docxkathleen23456789
The research paper should contain the following components:
• Title page,
• Five to seven pages of content
• A reference sheet with a minimum of three to five sources from peer-reviewed journals or approved websites.
• All sources listed on the reference page must be cited in the text using Author, Year format, e.g. (APA, 2010),
• and any citations in the text must have a complete reference in APA format at the end of the paper.
.
The research paper should be composed as follows. 5 paragraphs1.docxkathleen23456789
The research paper should be composed as follows. 5 paragraphs:
1- Introduction. Include a topic sentence (Hook)
2- Background
3- Background
4- Background
5- Conclusion. Last sentences should be my opinion about my topic sentence.
3 references
APA style
.
The research paper must be at least 1500 words in length. The fina.docxkathleen23456789
The research paper must be at least 1500 words in length. The final project paper MUST include a minimum of 5 different sources
. Make sure to cite the sources in the body of your paper and include a works cited page. All sources must be format in either APA or MLA style.
The
Research Paper Topic is
Third Genders.
.
The research paper is on Our Shiniest and the Brightest Stars of.docxkathleen23456789
The research paper is on Our Shiniest and the Brightest Stars of all: The Sun and will include information on the following characteristics - The Sun's formation, Atmosphere, Sun Spots, the major Activities and Cycles, the Energy formations, and the Sun's influence on the Earth.
Submit as a Word (.doc) file or a Rich Text Format (.rtf) file.
Guidelines
1. A
15-Pages Full Paper
with minimum 8 different, cited references is offered with the same caveats; one source must be your textbook(Discovering the universe 11th edition by Neil F. Comins). typed double spaced pages following the MLA Style Sheet format requirements. Papers with less than 15 full pages,
Excluding
all of the Supporting Documents and References
, will be returned ungraded and will receive a zero. Use a word processor with New Times Roman in 12-point font and one inch margins on ALL pages (or equivalent font).
2. Supporting Documents like:
Pictures, Stats, Charts, Pies, and drawings must be used, but they cannot count as part of the 15 full plus
, typed pages. Your title or your name or any footnotes cannot count as part of the pages.
3. A minimum of
8 cited references or footnotes from 8 different sources
; one source must be your textbook. URLs from Internet sites are acceptable. Add the date you accessed the site.
4. In addition to the 15 pages you must have a cover page with your name, the title of the paper, the topic and number, the semester, and the date submitted.
5. You must research these
5-Sub_Topic
assigned about The SUN with minimum
Two Pages PLUS Each
, Excluding the
Pictures, Diagrams, ets...,
for Each of the
FIVE Sub Topics as early as possible
. Please Note:
Each Subtopic
will be worth
20%
.
***** The Research Topic
: Our Shining
Star
,
the "Sun"(100-Points or
10%)
, must including all of these
5-Subtopics in Details Below
(20%
each
Sub Topic
)
:
The Sun formation and its Classifications among other Stars
(
20%
).
The Structure of the Sun
(
20%
).
The Role of the Sun's Spots on its surface and the Solar Winds
(
20%
).
The Solar Eclipses and how it has been used by Scientists to further study the Corona's (the Utmost region of the Sun's Atmosphere).
(
20%
).
The Role of the Sun in supporting life on Planet Earth
(
20%
).
.
The research paper is to be at least 15 pages in length (size 12 Tim.docxkathleen23456789
The research paper is to be at least 15 pages in length (size 12 Times New Roman font, default margins, double spaced). The "15 pages" refers to content excluding the title, abstract, and reference pages. The paper must follow a formal research paper presentation in APA Style (e.g., Abstract, Introduction, Headings/ subheadings, Discussion/conclusion). Please present a comprehensive presentation of your topic using adequate resources (at least “academic” 8 sources; e-journals
Topic: Racial Discrepancies in Death Penalty sentencing
.
The research paper assignment is to write a research paper that expl.docxkathleen23456789
The research paper assignment is to write a research paper that explains "
how Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process"
. Cite specific examples.
You must reference two (2) peer-reviewed articles or papers that support your thesis statement.
One of these papers may be from your annotated bibliography assignment
. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.)
So in summary, here are the research paper requirements:
1. 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
2. Paper MUST address: How Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples.
3. Cited sources must directly support your paper (i.e. not incidental references)
At least 500 words
in length (but NOT longer than
1000
words)
.
The requirements for the persuasive speech are the same as the infor.docxkathleen23456789
The requirements for the persuasive speech are the same as the informative speech except the intention of your speech is persuasive. This means in your introduction your specific purpose must persuade. For example, "Today I want to persuade (convince, or stimulate) you about being compassionate." Your thesis should break down "being compassionate" to two or three good reasons. And yes, your good reasons may sound like main points in your informative speech.
.
The requirements for the assessmentIn May 2013, the International .docxkathleen23456789
The requirements for the assessment
In May 2013, the International Accounting Standards Board in conjunction with the US Financial Accounting Standards Board published for public comment a revised exposure draft to deal with accounting for leases (currently IAS 17)
The IASB suggests that the proposals aim to “improve the quality and comparability of financial reporting by providing greater transparency about leverage, the assets an organisation uses in its operations and the risks to which it is exposes from entering into leasing transactions.”1
IAS 17 has been subject to criticism on a number of grounds and the issue of the updated exposure draft is the next stage on a long process to review and update the current reporting requirements after having taken due account of the criticisms and comments received from stakeholders.
Required:
Consider the importance of the current work programme examining Leases to the work of the IASB and the development of high quality international financial reporting standards. Review the extent to which the Exposure Draft (“ED”) issued in May 2013, discussions in the literature and comments on the ED identify current underlying weaknesses, and critically assess the significance of proposed revisions on the reporting framework and subsequent views of the IASB. Analyse and evaluate the impact of proposed changes on the financial statements of entities, and whether the proposals in the ED will serve to enhance reporting in this area.
.
The Research Paper is distinguishable from a report by the inclusion.docxkathleen23456789
The Research Paper is distinguishable from a report by the inclusion of an original thesis.
Research Paper will be at least five pages in length, include at least ten references.
The outline needed must be at least one page long (not including cover sheet)
original thesis, describe the approach to research the subject thesis and have five references
APA format
.
The research paper is about Security in Cyberspace. All aspects of h.docxkathleen23456789
The research paper is about Security in Cyberspace. All aspects of how we handle security in today’s world of information privacy, purchase, banking, etc...... A minimum of 3 references. a title page, table of contents, and a reference page. 3 pages
Title Page
Table of Contents
Introduction
Body of the report
Summary of the topic
Results or Conclusion
Reference Pag
.
THE REQUIREMENTFormat your report similar to Structural Analysis.docxkathleen23456789
THE REQUIREMENT
Format your report similar to Structural Analysis of GET OUT.
Write a one-page, double-spaced report where the first half is dedicated to the Set-Up sequence.
Identify the PROTAGONIST and what his/her PROBLEM is in the first 10 minutes. Which WEAKNESS does he/she struggle with, and is it connected to a GHOST in the past? Does this weakness also cause the protagonist to display BAD BEHAVIOR? What is the story’s INCITING INCIDENT, and to which goal does the protagonist commit at the FIRST ACT BREAK? Identify the ANTAGONIST and explain why he/she is a great challenge for the protagonist’s weakness. Also, what happens at the MID POINT, and how does the protagonist escape from the Big Gloom at the SECOND ACT BREAK? What is the CLIMAX CHOICE, and what must be sacrificed to win? How can we tell that the protagonist has changed in the RESOLUTION?
WHIPLASH
by
Damien Chazelle
BLACK...
We hear a HIT. A drumstick against a drum head. Crisp, sharp.
Then a second hit. Then a third and a fourth. The hits
growing so fast they start to blur together. Like gunfire...
INT. NASSAU BAND REHEARSAL STUDIO - GEHRING HALL - NIGHT1 1
A cavernous space. Sound-proofed walls. And in the center, a
DRUM SET. Seated at it, in a sweat-marked white T, eyes
zeroed on his single-stroke roll, is ANDREW NEIMAN.
He’s 19, slight, honors-student-skinny -- except for his
arms, which have been built from years and years of drumming.
Suddenly -- a MAN enters the practice room. Stopping, rising--
ANDREW
Sorry... I’m -- I’m sorry--
MAN
It’s ok. Stay there.
The MAN steps forward, removes his coat. He’s tall. Late
fifties. Black T-shirt, black slacks, black shoes. We’ll know
him as FLETCHER.
The room is silent now. And then, softly, as he’s one of
those people whose whisper can scare the crap out of you--
FLETCHER
What’s your name?
ANDREW
Andrew Neiman, sir.
(It’s pronounced “Nayman”.)
FLETCHER
What year are you?
ANDREW
I’m a first-year, sir.
FLETCHER
You know who I am?
ANDREW
Yes...
FLETCHER
You know what I do?
ANDREW
Yes...
FLETCHER
So you know I’m looking for players.
ANDREW
Yes...
FLETCHER
Then why did you stop playing?
Beat. Andrew nods, smiles. He gets it. Summons up all his
remaining energy and resumes playing, trying to really show
off this time. Rolls, fills, speedy stick-work. He finishes.
FLETCHER (CONT’D)
Did I say to start playing again?
Andrew looks at him.
ANDREW
I thought--
(then, blanching,)
I’m sorry, I misun--
FLETCHER
I asked you why you stopped playing. Your
version of an answer was to turn into a
wind-up drummer monkey.
ANDREW
I’m sorry -- I--I stopped playing becau--
FLETCHER
Show me your rudiments.
Andrew nods. Plays one rudiment after another: double-stroke
roll, paradiddle, ratamacue, flam, flamadiddle.
FLETCHER (CONT’D)
Uh-huh. Double-time swing.
Fletcher begins clapping his hand in time. Fast. Andrew plays.
FLETCHER (CONT’D)
No. Double-time. Double it. Bop.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
The Role of the Operating Manager in Information Systems, page 10 (g.docx
1. The Role of the Operating Manager in Information Systems,
page 10 (graded). Using the Case Study Template format found
in Doc Sharing, submit your recommended course of action.
Your case study should be no more than five pages long,
including the title page.
Case Study 1 Midsouth Chamber of Commerce (A): The Role
of the Operating Manager in Information Systems
It was 7:30 P.M. on September 22, 2006, and Leon Lassiter,
Vice President of Marketing with the Midsouth Chamber of
Commerce (MSCC), was still in his office, reflecting on the
day’s frustrations. Lassiter had met with four territory
managers, his marketing support supervisor, and a number of
other members of his staff. All were upset about their lack of
access to the new computer system and the problems they were
having using their old systems. Lassiter had assured them that
the problems were being addressed. He stressed that patience
was needed during the ongoing conversion to the new system.
Now, during his private moment, Lassiter was beginning to
recognize the problems and complexities he faced with the
system conversion. The work of his marketing staff, who were
unable to access the new computer system to handle their
accounts, had ground to a halt. Even worse, something had
happened to the data in most of the workstations, which meant
that conference registrations and other functions had to be done
manually. These inconveniences, however, were minor
compared to Lassiter’s uneasy feeling that there were problems
with Midsouth’s whole approach to the management of
information technology. Lassiter knew that time was of the
essence and that he might have to step in and manage the
conversion, even though he had no information technology
background. He wondered what he should do next.
Background of the MSCC
In the early 1900s, economic development in the Midsouth area
was highly dependent on transportation systems. As a result of
2. legislative decisions, many communities in the Midsouth area
could not gain access to reasonable transportation services, thus
retarding business and economic development. With no one to
represent their concerns to the state government, a group of
powerful businesspeople formed the MSCC to lobby the
legislature on the issue of transportation access.
The MSCC dealt with this single issue until the 1930s, when its
charter was changed to include a broader range of issues
affecting the business community, including state banking laws,
transportation, industrial development, and business taxes. By
the mid-1990s, the MSCC, under the new leadership of
President Jack Wallingford, became an aggressive advocacy
organization for the business community.
The broadening of MSCC’s role brought substantial change to
the organization. In 1988 the MSCC had a staff of 14, a
membership of 3,000 businesses and individuals, and an annual
budget of $1,720,000. Over the years, the MSCC had been able
to develop a reserve account of just over $1.5 million.
By 2000, the staff had grown to 24, the $1.5 million cash
reserve had been drawn down to $250,000, and membership had
dropped to 2,300, largely because of the loss of some major
manufacturers in the region, the bursting of the Internet bubble,
and the resulting economic slowdown. The reserve reduction,
supported by the Board of Directors, had fueled considerable
internal growth in terms of staff and capabilities. During this
time, the MSCC also moved into larger offices and upgraded
their workstations.
In the early 2000s the MSCC was considered the most powerful
business advocacy organization in the Midsouth area and one of
the most innovative chambers of commerce in terms of its
approaches and techniques in dealing with problems facing the
business community. The greatest problem facing the
management of the MSCC at the time was the growing concern
that its aggressive growth might have to be curtailed because it
could no longer fund its annual operating budget.
Leon Lassiter
3. In mid-2000, Wallingford was faced with a serious dilemma.
The MSCC was projecting a $330,000 deficit for the 2001 fiscal
year. Wallingford realized he was going to have to reduce both
the number of staff and the number of programs or find some
way to grow revenue more aggressively in the organization.
Wallingford asked his Vice President of Public Affairs and
Operations, Ed Wilson, to find someone new to lead the sales
and marketing function.
Leon Lassiter came to the MSCC in December 2000 with 12
years of experience in sales management and marketing with
American Brands, where he had recently turned down a
promotion to regional sales manager. The MSCC, he reasoned,
offered more of an opportunity to have an impact than at
American Brands. As Vice President of Marketing and
Membership, Lassiter reported directly to Wallingford. After
settling in to the organization, he initiated a thorough review of
all programs, departments, and processes. He found that the
marketing support functions were better coordinated and
managed than the sales functions. Additionally, although the
MSCC had purchased workstations for sales and marketing and
had installed some custom software, the information system was
quite limited in capability. Due to concerns over security, no
staff member had access to all the data necessary to operate the
marketing and sales activities of the MSCC. Each workstation
was equipped to perform particular functions with the needed
data resident on the workstation. With his analysis completed,
Lassiter began to develop an entirely new sales and marketing
process based on measurable goals, documented operating
procedures, and regular training programs. He knew that
eventually a new information system would have to be
developed.
Information Technology Use at the MSCC
The Marketing and Sales Division
For a few years, Lassiter was able to operate his organization’s
tasks with the existing set of individual workstations, all of
which were connected to a print server. The marketing
4. division’s primary information technology activities were to
track the activity occurring in membership. Primary uses
included:
• Developing the membership database
• Developing the prospective member database
• Making daily changes to both databases
• Generating a series of letters for personalized mail contact
• Generating prospect and member lists and labels by industry
sector, firm size (sales, employment), zip code, mailing
designator, and other criteria
• Processing call-record activity by the territory managers
• Tracking member activities and concerns through a comment
field
• Creating audit trails for reviewing changes
• General word processing
EXHIBIT 1 MSCC Organizational Structure
The marketing support area performed most of the computing
tasks for the marketing division via their local workstations.
They filled all requests for labels, lists, and changes from the
sales and marketing staff. Requested changes to the member
database sometimes backed up as much as two or three days.
Lassiter felt this was unacceptable and hoped to achieve a two-
hour turnaround on member-change activity.
Four territory managers, a marketing support supervisor, and
five clerical people staffed the marketing division. The territory
managers generated 75 to 80 call records per day that required
database changes, letters, and invoice processing. These
requests were processed by the clerical staff. In addition, the
clerical staff processed commissions on membership sales,
member cancellations, and general database maintenance. The
clerical staff also prepared special-letter requests from the
territory managers and performed all normal secretarial duties.
Operations Division
Ed Wilson managed the operations division. Eight managers and
support staff worked in operations. This group was responsible
for providing financial information and insuring accounting
5. controls. The operations staff maintained:
• The general ledger system
• Fund balances
• Accrual accounting functions
• Payment history tracking
• Commission schedules
• Membership cancellation tracking
• Report generation
Wilson also planned to be able to track legislative bills from
their introduction, through their demise in committee or
chamber, their passage, or their veto by the governor. This
information would be keyed into the system, updated as changes
occurred, printed, and sent to selected staff members on a daily
basis.
Human Resources Division
The human resources division, with two managers and two
support staff, was responsible for developing a conference and
seminar tracking and reporting mechanism that would also have
the capability of printing out badges for conference or seminar
attendees. The division also maintained personnel records.
Changing Times
By 2002, as a result of Lassiter’s marketing and sales
reorganization and Wilson’s aggressive management of
expenses, the MSCC was experiencing solid financial growth.
While the two men were primarily responsible for the success,
Wilson and Lassiter clashed on numerous occasions. Lassiter
felt that much of the territory managers’ work and marketing
support activities could be automated to provide the MSCC with
a significant reduction in labor and allied costs. Lassiter
believed that a fulltime systems analyst should be hired to meet
the growing information needs of the MSCC. Wilson, on the
other hand, was worried about the cost of the MSCC’s
information systems. In the past, the MSCC had hired a
consultant, Nolan Vassici, to make recommendations on
hardware and software and to develop the custom software used
by each division. Wilson felt that continuing to hire Vassici
6. whenever additional or corrective work was needed was the best
option. He did not want to increase the number of employees.
Wilson knew that as a small, nonprofit agency, MSCC had
limited funds for the expansion of computing capabilities.
Adding a full-time systems analyst to the staff would make it
significantly more difficult to respond to growing staff demands
in other areas. Continuing the relationship with Vassici
provided Wilson with the ability to specify exactly what Vassici
worked on and what should be tabled until there was the time
and budget for it.
Although Lassiter and Wilson continued to clash, Lassiter
understood Wilson’s desire to control costs in light of the
limited resources of the MSCC. Lassiter knew that the slowly
growing computer sophistication of the staff would explode
once the tap was fully opened. However, Lassiter felt that the
demand could be dealt with effectively once the MSCC
determined the extent of the staff’s needs.
In early 2003, Lassiter and Wilson joined forces on a concept
by which the MSCC would offer a health insurance program to
its members, now more than 4,500 businesses and individuals.
Although the proposal was eventually rejected by the Board of
Directors, Wilson and Lassiter, as a result of the study,
recognized that there were many revenue-producing
opportunities the MSCC could pursue that would require a much
higher level of information systems use. Wilson soon hired a
systems analyst to increase the MSCC’s capabilities.
Simon Kovecki, a young computer science graduate with no
experience in a membership organization like the MSCC or with
accounting software, joined the MSCC in June 2003 and spent
his first three months on the job learning the organization and
its computing systems. He worked exceptionally long hours as
he struggled to understand software for which there was no
documentation. Calls to Vassici for help were useless because
his business had closed.
Through early 2004, Wilson continued to manage the computer
systems and, with the help of Kovecki, upgraded the hardware
7. in the workstations. With Kovecki’s constant attention, the
software continued to work relatively well. In 2005 Wilson,
with Kovecki’s assistance, developed an online legislative
information system on a workstation that was considered state
of the art in the chamber of commerce industry. With this
application and the growth in members and types of computer
applications, the MSCC senior management began to worry
about the separation of systems for membership and marketing,
finance, conferences, and other applications which required
frequent data reentry.
With 2005 dues revenue approaching $2.8 million and
approximately 4,750 member firms, the MSCC was among the
largest statewide chambers of commerce in the country. The
staff had swelled to 42 and the financial reserve was nearly $2.6
million. Although Lassiter felt some satisfaction with the
MSCC’s growth and financial strength, he was bothered with
the lack of forethought as to how the MSCC might develop a
comprehensive plan to use information for the future. Wilson,
too, recognized the value of information systems to an
organization in the business of gathering, analyzing, and using
information to affect legislative outcomes.
Catalyst for Change
By 2005, the MSCC had reached a point where some
organizational changes had to occur. Wallingford, at the urging
of the Board of Directors, assigned Lassiter the additional areas
of communications, graphic arts, and printing operations.
Controller duties were assigned to Harry Taska, and Jeff
Hedges, the new Vice President of Public Finance, was assigned
responsibility for computer operations. Wilson, nearing
retirement, retained his public affairs activities and was asked
to focus his efforts on developing an important public affairs
project.
Just after the staff changes took place, Kovecki confided to
Lassiter that he was disappointed by the changes in staff
responsibility. He felt he should have been elevated to manager
of information systems and given additional staff. Hedges, who
8. had little computer background, was also in charge of research
on various issues of interest to the members of the MSCC as
well as oversight of the Controller’s function. Kovecki was
concerned that Hedges would not have the time to manage the
growing computer operations properly.
Lassiter shared Kovecki’s concern over the lack of top
management attention to the information systems area. His
concern led him to send out requests for information to a
number of firms servicing the software needs of organizations
like the MSCC. Primarily interested in sales and marketing
software, he focused on software from Cameo, MEI Colorado
Association of Commerce and Industry, Connecticut Business
and Industry Association, TelePro 2000, and Data Link. Lassiter
sent the information he received from these vendors to other
senior managers but received little response. Wilson was
involved in his new project, Taska was learning his new duties
as Controller, and Hedges had little time to examine the
computer activities.
In August 2005, Lassiter attended a national association
meeting where a session on management software led to his
discovery of a small software firm called UNITRAK. The
company had developed a software suite that Lassiter was
convinced would meet the MSCC’s needs. He based his
assessment on the MSCC’s current and anticipated future needs
for computing capability that had been developed by Kovecki in
2004. (See Exhibit 2.)
EXHIBIT 2 MSCC Information Systems Needs
Planning the New Information Technology System
Lassiter had identified areas in UNITRAK where he felt this
more powerful information system would allow the MSCC to be
more efficient. These improvements would enable staff
members to:
• Input special member information into a notes field (not
then available)
• Generate telemarketing scripts that would allow “tree
scripting” based on various sales objections (not then available)
9. • Utilize a statistical inquiry feature that would provide
quantitative analysis of sales activity figures from all marketing
activities (not attempted with the separate workstation systems)
In addition, the new information systems would allow territory
managers to:
• Access their account information from their workstations
rather than asking a staff member
• Develop letters and attachments from their workstations,
using information in a central database rather than manually
linking information contained in several separate databases
In a memo to the management group, Lassiter commented, “The
UNITRAK system not only meets our needs now, but it is also
powerful enough to provide the MSCC with the room to grow
over the next 5 years.” The software also appeared to be user
friendly, which Lassiter believed was the key to freeing up
Kovecki’s time. Lassiter explained the software to Hedges, who
wanted the current accounting software left intact but agreed
that now was the time to move forward in finding a more
powerful software solution for the MSCC’s problems. Hedges
also agreed that other modules in the UNITRAK system could
be activated at a later time.
In October 2005, Lassiter contacted Greg Ginder, President of
the UNITRAK Software Corporation, and invited him to the
MSCC for a demonstration of the system’s capabilities. Wilson
observed about 30 minutes of the three-hour demonstration and
told Lassiter, “I’ll support it if you want it. It will work for my
project for public affairs.” Hedges agreed that the new system
would free up Kovecki’s time and allow him to become more
involved in planning and systems development. Kovecki’s
comments were different. He remarked, “Yeah, the software has
its strengths and weaknesses and it probably would save some
of my time. But I don’t like the idea of staff having
uncontrolled access to so much data. It’s not clear what they’ll
do with it.”
The Proposal
Lassiter decided to move ahead quickly with a proposal to
10. Wallingford and the Board of Directors. He developed simple
flow charts that showed the hours it took to conduct certain
activities, e.g., the staff time new member sales took with the
current workstation arrangement, versus the time it would take
with the new software. Lassiter knew that the Executive
Committee of the Board would require considerable justification
to approve an “off-budget” capital expenditure that would
significantly reduce reserves. He had also done some
calculations to show that if the new system performed as he
hoped, each territory manager would be able to generate
$150,000 in increased sales through increased contacts.
Although Lassiter knew this goal was aggressive and very
difficult to justify, he wanted to be able to demonstrate a less-
than-six-month payback if challenged by a member of the
Executive Committee.
Lassiter believed that UNITRAK would reduce the price of the
software. The software was new, and UNITRAK had sold it to
only one other statewide chamber of commerce organization,
the Northern State Chamber of Commerce. Jeff Fritzly, Vice
President of Marketing and Development of the NSCC, told
Lassiter:
We looked at quite a few software packages as well as writing
our own custom software, but our consultant chose the
UNITRAK software. We purchased the software from
UNITRAK and got a good discount on the needed new
hardware. They have been very helpful and supportive of our
needs.
A week before the Executive Committee meeting, Ginder and
Lassiter agreed on a price for the software. Lassiter was pleased
that the price was 30 percent less than Northern State had paid.
With the help of Ginder and a member of the Executive
Committee who headed the local branch office of a computer
equipment manufacturer, Lassiter was also able to achieve an
excellent discount on new server hardware. He felt this low cost
was another justification for approval of the project. Lassiter
also made it a point to meet with both Wilson and Hedges to
11. keep them abreast of the negotiation and seek their advice. He
felt that by increasing the level of communication with Hedges
and Wilson, he would be able to gain their interest and support,
which he felt was important to the success of the project.
When the Executive Committee of the Board met in November
2005, Lassiter explained that the MSCC had reached the limit of
its current system design, and that an investment in a central
server connected to networked workstations was needed to
allow the MSCC to meet current and future opportunities for
growth. During his presentation, Lassiter said:
While the MSCC has made significant and appropriate
investments in the workstations necessary for the MSCC to
increase its operational sophistication, we have reached the
limit of these smaller machines. With the spectacular growth in
revenue we’ve enjoyed over the last five years, our
requirements and demands have increased dramatically. Without
an immediate investment in increased capability, the MSCC’s
continued growth and services will be in jeopardy.
In response to challenges from the Executive Committee
regarding what the new system would mean to the bottom line
and the MSCC’s reserves, Lassiter responded, “I believe we will
see a 10–15 percent increase in sales and a 20 percent increase
in staff productivity once the new system is operational.” With
these assurances and a price that would consume only 10–15
percent of reserves, the members of the Executive Committee
complimented Lassiter on his work and approved the purchase
of the software.
Implementation
Greg Ginder of UNITRAK was ecstatic over the decision and
promised unlimited support at no charge to install the new
system. But Kovecki continued to express concern about staff
members using the new capabilities of the system. He said:
I know that Lassiter expects this new software to be user
friendly, but I’m uncomfortable with how strongly he feels
about training the staff to use as many of the features as
possible. He thinks that training the staff on whatever they want
12. to learn will make the MSCC more effective, but I disagree. We
would be opening Pandora’s box and we would lose control over
what was going on. The last thing we need is for people to be
getting into things they don’t need to be in.
By February 2006, Lassiter had heard nothing regarding the
purchase of the new system. Kovecki told Lassiter that no one
had approved the purchase order. Lassiter then questioned
Hedges, who responded that he had heard nothing more and had
been busy with research on issues of interest to the MSCC
members. “Go ahead and purchase the software,” Hedges told
Lassiter. “It’s your system anyway.” Although Lassiter tried to
explain that it was not his responsibility to implement the
purchase or conversion, he felt the project would not move
forward without his purchasing the software. After signing the
purchase order, Lassiter handed it to Kovecki and said, “You
and Hedges are the project managers. I shouldn’t be involved at
this point. It’s up to you guys to complete the project.”
Near the end of March, Lassiter asked Kovecki how the project
was proceeding. Kovecki stated that the hardware had been
delivered but that he was busy with a project of Wilson’s and
didn’t have time to work on the new software. Lassiter went to
Wilson to inquire about the anticipated length of the project
Kovecki was working on, and Wilson indicated it should be
finished by mid-April.
Although Lassiter felt uncomfortable about pushing Hedges and
Kovecki, he was beginning to feel that he would have to use his
influence to get things moving. Lassiter held a meeting with his
staff, informing them that a new system had been purchased that
would improve operations in several areas. Several staff
members expressed concern that they had not been consulted or
informed of the idea before its approval. Specific questions
were asked regarding word processing, new member recruiting,
and commission processing. Lassiter, anticipating that Kovecki
had studied the documentation, asked Kovecki to answer the
questions. Kovecki was unable to answer the questions and
indicated he needed more time to study the documentation.
13. Lassiter set up an appointment with UNITRAK for training for
Kovecki and himself. After a positive training visit, Lassiter
asked Kovecki to spend half a day with him to set up a project
flow chart and anticipate potential problems, but May and June
passed with little forward progress on the conversion. Lassiter
had told the Executive Committee that the project would be
completed by the end of March 2006, yet little had been
accomplished.
Upon Kovecki’s return from a two-week vacation at the end of
June, Lassiter asked Wallingford to intervene and to strongly
urge Hedges and Kovecki to complete the project. Lassiter
stated:
It really bothered me that I had to go over Hedges’ head but we
were coming up on the seventh month of what should have been
an easy three-month project. It’s partly my fault because I
didn’t establish teamwork up front, nor did I make clear early in
the process the responsibilities of those participating.
The Final Phase
With Hedges’ agreement, Lassiter set up two days of staff
training for the third week in August 2006. Kovecki had assured
Lassiter that the system would be up by the last day of training
so that the staff could immediately use the new system. Lassiter
broke the training into major segments and had Kovecki set up
training sites in two separate conference rooms for staff.
UNITRAK sent a two-person team that would act as project
managers and trainers.
The training went well with the exception of the conference and
seminar segment of the software. The users brought up
significant complaints that the new software servicing this area
was not as functional and user friendly as the existing custom-
written workstation software. Although Lassiter suspected that a
large part of the problem was that the new software was just
different, he asked UNITRAK to work with the users in
adapting the UNITRAK software to better meet their needs.
Ginder commented:
Because our software is relatively new to the marketplace, we
14. are open to adjusting and changing certain aspects of the
software without rewriting major portions. We feel we could
learn a great deal from the MSCC which would make our
software more marketable.
On the final day of training, Lassiter asked Kovecki to migrate
and integrate the data in the current workstations to the new
system. Kovecki told Lassiter that he was having a few
problems and would conduct the migration after work, and it
would be ready first thing in the morning. The next morning
Kovecki, in responding to Lassiter’s query as to why the system
was not up, said:
When I attempted the migration last night, less than 15 percent
of the data rolled over into the proper assignments. With no
documentation on the old software to refer to, it will probably
take me a week to work out the bugs. In the meantime, the new
system won’t work and some of the data in our current
workstations seems to have been corrupted. I hope we can
recover the latest backup, but some of the systems haven’t been
backed up for more than three months.
Although one of the marketing division’s systems had been
backed up recently, the rest of the MSCC’s workstations were
basically inoperable. Requests for lists and labels for mailings
could not be fulfilled. Word processing, payment and invoice
posting, changes, list management, and so on were all
inoperable or partially inoperable. UNITRAK was finding it
difficult to help because Kovecki had forgotten to order a new
telephone connection that would allow UNITRAK experts to
have remote access to the system.
Lassiter was finding it very difficult to gain information from
Kovecki on the progress and status of the system conversion. It
seemed that Kovecki, frustrated with the problems he was
having and irritated with the staff coming to him to ask for
assistance, was going out of his way to avoid the staff. Lassiter
said:
I explained to Kovecki that I wasn’t trying to grill him for
information, but because the staff now considered me to be the
15. project director, I needed information with which to make
decisions affecting the work flow of the staff and determine
what kind of help we could request from UNITRAK.
Although Lassiter knew that the staff felt he was responsible for
the new system, he felt frustrated that there was little he could
do in managing the conversion. Hedges remained disengaged
from the project, and Kovecki did not report to Lassiter.
The Future
It was in this situation that Lassiter found himself as he sat in
his office at 7:30 P.M. in late September of 2006. Kovecki had
promised that the new system would be up on each of the last
several Mondays. Each Monday brought disappointment and
compounded frustration to the staff. Lassiter knew that the two
days of training had been wasted because the staff had long
forgotten how to use the new system. He also had heard that
Kovecki was interviewing for a new job and was out of town on
a regular basis. Something had to be done—but what? (Brown
10)
Brown, Carol V., Daniel DeHayes, Jeffrey Hoffer, Wainright
Martin, and William Perkins. Managing Information Technology
for DeVry University, 7th Edition. Pearson Learning
Solution
s. VitalBook file.
The citation provided is a guideline. Please check each citation
for accuracy before use.