Sunday, December 29, 2019

Management Information Systems Report London Olympics 2012 - Free Essay Example

Sample details Pages: 9 Words: 2595 Downloads: 9 Date added: 2017/06/26 Category Information Systems Essay Level High school Did you like this example? Management Information Systems Report London Olympics 2012 This report analyses the need and the reasoning for a management information system for the security department during the Olympics London 2012. This report looks at the functions of the security department and how they will benefit from an effective information management system. Furthermore, the report discusses how management information systems are used for decision making and the importance of implementing such systems within any organization. Executive summary One of the most fundamental functions in any organization is the decision making process. When one considers the economy we face today, many organizations come to appreciate the importance of being able to challenge competitors, gain advantages and make intelligent use of their resources. The core element of this is the process of making decisions. Information can be central in achieving management goals successfully. To facilitate decision making it is imperative that managers have the correct information at the correct time to overcome the gap between needs and prospects. Furthermore to aid improvements in communication of information adequate management information systems (mis) are indispensable. Thus it is vital to have an appreciation of the management information systems used in an organization and have effective integration, by all levels of management. It is only then that there will be effective, profitable and constructive decision making. Don’t waste time! Our writers will create an original "Management Information Systems Report London Olympics 2012" essay for you Create order Terms of reference On the instruction of the senior manager, the security department was asked to evaluate and analyse the requirements for the duration of the London Olympics 2012. Details of the importance of information required and detailing what information will be required plays an important role in the reporting back to the senior manager. Introduction Regardless of the nature of an organization, every organization is filled with information. The information content of organizations is what makes the business function. The role of information in an organization is crucial. Information is important in order to allow for an organization to plan, control, measure performance, record movements and assist with decision making. Management information systems are the conversion and collaboration of this information, from both internal and external data sources into a format which is easily communicated and understood by managers at all levels. Ensuring that information is well structured and effectively stored allows ease of access and timely and effective decision making. Larry long and nancy long (2005, p. 370) describe an information system as: â€Å"a system is any group of components (functions, people, activities, events, and so on) that interface with and complement one another to achieve one or more predefined goals† (donald, 2005). Information system may also be considered to be a generic reference to a technology-based system that does two things: providing information processing capabilities and providing information people need to make better, more informed decisions (donald, 2005). Management information systems are the result of a combination of internal and external sources; they provide a means by which data/ information can be easily manipulated, stored, amended etc. Furthermore, management information systems coalesce all the essentials which assist in the decision making process. Security is by no means limited to any one aspect of an organization, particularly when on consider an event as large and as globally involving the London Olympics – 2012. For any organization, security cover the physical security of those involved, security of buildings and offices and security if information technology, both physical equipment and cyber security. Assistant commissioner chris allison released a brief on the security issues and concerns surrounding London 2012; his brief included all the ordinary security concerns, such as terrorism and petty crime, but also the danger of online ticket scams, potential protesters hijacking olympic websites and also the more sinister criminals (hervey, 2010). The overall vision for the London 2012 olympic games and paralympic games, agreed by the olympic board is, ‘to host an inspirational, safe and inclusive olympic games and paralympic games and leave a sustainable legacy for London and the uk (London2012, 2010). In order to achieve this there any many threats and many angles from which threats can occur which need to be taken in to consideration. Furthermore, in order to manage and ensure security the information systems implemented must allow for effective decision making prior to the event and most importantly in the event of an untoward happening. Findings and analysis The security department cannot be limited to one specific function. The security department, especially for London Olympics 2012, will involve the handling of many aspects of potential threats to the people and systems involved for the Olympics. There are two primary areas which the security department will be responsible for. Firstly, cyber security and secondly the security of the public. Cyber security As technology, its uses and abuses expand at hasty rates, so does the level of threat faced by organizations and their information systems. Information technology forms an important feature of the information systems in place today. Information systems define what needs to done or managed and the information technology aspect is how this is done. Therefore, technological advancements and the increase in their abuse is a major threat where London Olympics 2012 is concerned. A case study by students of the pennsylvania state university looked into some of the major threats which organization face in the form of it threats. These included; wireless network security, cryptography, access control, privacy control, risk management, operating system security, including server threats, vulnerabilities and firewalls. These are just a handful of examples (bogolea wijekuma, n.d.). Amongst these examples and besides these examples are many others which are an easy cause for concern f or London Olympics 2012. For any organization it is imperative to exercise control over their computer based information systems. London 2012 needs to ensure that the computer based systems, those which rely on it are protected from threats, as the cost of errors and irregularities that may arise in these systems can be high and may even challenge the very survival of the event. An organizations ability to survive can be severely undermined through corruption or destruction of its database; decision making errors caused by poor-quality information systems; losses incurred through computer abuses; loss of computer assets and their control on how the computers are used within the organization (mandol verma, 2004). Cyber security expert professor peter sommer of the London school of economics warned that computer security would be extremely important during the games (hervey, 2010). A case study which looks at the tragic death of two boys 18, and 10 years of age discusses h ow cyber security was the issue in relation to the gasoline leak of olympic pipelines pipeline (abrams weiss, n.d.). This is an example of the devastation to human life which cyber threats can cause, and when one considers this on the scale of London 2012, it becomes clear the number of people depending on optimum security. In order to combat this threat, information needs to be obtained from both internal and external sources. External information may include information from professionals in the cyber security industry to information from intelligence agencies. Terrorism is as much of a cyber-threat as is the computer virus or any other infection. Information systems will only be able to cope with and combat these threats by ensuring they all well informed through risk assessments of potential dangers. Furthermore, in order to overcome any unexpected threats contingency planning forms an essential element of information systems development. Risk assessment is an impor tant step in a risk management procedure. Risk assessment is the determination of the quantitative or qualitative value of a risk related to an actual situation and a recognized threat. Maroochy water services, australia, are an organization a world apart from London olympic 2012, however for the purpose of their cyber security improvement program; risk assessment establishment played a key role (abrams weiss, 2008). This example shows that important of risk assessments if by no means limited by industry, size of organization, or any other feature for that matter. Risk assessments provide a means for any organization to help avoid potential threats through prior consideration. In addition to information required for a risk assessment, is the information required for a contingency plan. A contingency plan is a plan of action for if things were to go wrong. It is a backup plan. In order to overcome any type of disaster information must be collated into a contingency plan. Thi s would again form an essential part of the information systems, as it would be crucial in the event of a disaster. People London Olympics 2012 will see several thousands of people from all over the globe in London. Amongst visitors will be players, key visitors and reporters. Those visiting, and then those who already reside in the uk, accumulate to an increase in population, and thus there is a risk of increase in crime. The crime can range from petty crime, to terrorism. The common factor amongst all, is that people need to be protected. Security has been a crucial concern at the Olympics since the killing of 11 israeli athletes and coaches at the 1972 munich games. Olympic planners have ramped up security following the september 11, 2001, attacks in the united states (wilson, 2010). Inefficient management of the people involved in the Olympics and the public, can have devastating effects. This is a major concern during and time and for a city where terrorism is a real and potential threat. In order to be able to implement information systems which can cope with, and appreciate the requir ements with regards to security, information needs to collated from many sources. First of all, predictions are one of the very first decision making elements which need to be fulfilled by an information system in this situation. Information regarding the number of athletes expected to be present during the Olympics, statistics from previous olympic games will be required regarding the number of spectators/visitors the country had, and finally the number of security staff and resources available at present. By means of prediction and analysis through a computer being able to protect and serve the public can be achieved. The information system may be used to obtain information concerning the number of staff which will be required to patrol the streets. The number of security staff which will need to be put in to place to sufficiently protect the athletes and their trainers. Also, the locations which are expected to be busiest can be recognized, and thus will require more staff and concentration of cctv cameras. In addition to predictions, is the actual information which will need to be included in an information system, this is information about the number of police officers, or security guards in other areas, or cities besides London that can assist in providing security in this situation. This information may well form a part of the contingency planning. Where cctv cameras are concerned, or access controls, id badges etc there is the need for information systems to collate and manage all this information. Systems will be need to record information of who accessed which area or building at which time for access/ id cards, cctv will need to keep a recording of all activities captured, and there will be the need for databases to log people working for the period of the Olympics and athletes. This information will help to deter crime, provide an element of security and protect people. Conclusions Information systems come in not set type or standard. They are the collation of several information sets to provide a well-integrated system used to make decisions. The London Olympics 2012 are like no other organization, and are on a scale grander and vast the most other organizations deal with. It is this grandness and this large scale involvement of people, which in turn increases the risks and potential threats. London Olympics 2012 is an enormous event and is expected to employ several thousands of people. And furthermore have several thousand spectators, reporters etc. An effective and accurate management information system is essential in order to ensure that the city hosting the event is able to effectively plan, control, record people and protect systems. Hudson bank managed to overcome the problems it faced with adaptation of its information system, some of this was done using off the shelf software and the majority through establishment of customer requirements and communication essentials (anon., 2008). The security department is involved with many people and many types of threats; the most important two being, securing people and securing systems. Cyber threats can not only damage systems, but even cease functioning of the event. In order to avoid this it is important that the potential risks are assessed, all that can be done to avoid them striking is done and contingency plans are set for action. Another important aspect is protecting people. In order to do more staff would be required, police, community support, security guards etc. This is a large amount of shifting people around, staff from other cities, new recruits etc. Therefore it is vital that this information is managed efficiently. The information systems should be able to cope with large numbers of peoples and provide effective and accurate predictions and decision making results. As with all information systems, the number of information sources will need to extensi ve in order to provide optimum results. Recommendations Taking in to consideration the need and scope of the management information systems for the Olympics in London 2012, particularly the security departments involvement and requirements the following recommendations are made: The security department need to ensure that all staff involved with the use of the information systems for them is full trained. Any glitch can have dire effects on the rest of the system and ignorance of any warnings of threats can also be horrific in consequence. Training is not only limited to the staff working with the systems, it is also important that staff working with people are trained to handle a large number of people, overcome any problems, identify potential threats, maintain the cooperation of people in the event of a disaster etc. Risk assessments and contingency plans should be in place for each and every aspect of security. Furthermore, all staff should be made aware of both of these reports, particularly contingency planning. This will only help them do their job better and overcome any disasters. Informing staff will provide a more thoroughly aware work force and maintenance of security in the event of a disaster. References Abrams, m. weiss, j., 2008. Malicious control system cyber security attack case study. Case study. Australia: maroochy water services. Abrams, m. weiss, j., n.d. Bellingham, washington, control system cyber security case study. Case study. Anon., 2008. Banking on customer service. New jersey: hudson bank. Bogolea, b. wijekuma, k., n.d. Information security creation. Case study. Pennsylvania: the pennsylvania state university. Donald, a., 2005. Mastering information management. Prentice hall. Fitzpatrick, k., Fujimoto, y., Hartel, c. strybosch, v., 2007. Human resource management: transforming theory into innovative practice. Malaysia: pearson australia group pte ltd. Hervey, l., 2010. Sky news. [online] available at: hyperlink https://news.sky.com/skynews/home/twin-terror-threat-to-London-Olympics-security-expert-warn/article/201003415579707 https://news.sky.com/skynews/home/twin-terror-threat-to-London-Olympics-security-expert-warn/article/201003415579707 [accessed 16 august 2010]. London2012, 2010. London 2012 sustainability policy. [online] London 2012 available at: hyperlink https://www.London2012.com/documents/locog-publications/London-2012-sustainability-policy.pdf https://www.London2012.com/documents/locog-publications/London-2012-sustainability-policy.pdf [accessed 6 august 2010]. Mandol, p. verma, m., 2004. Formulation of it auditing standards. Case study. China: national audit office. Wilson, s., 2010. Yahoo news. [online] available at: hyperlink %20https://news.yahoo.com/s/ap/20100806/ap_on_sp_ol/oly_London2012_security https://news.yahoo.com/s/ap/20100806/ap_on_sp_ol/oly_London2012_security [accessed 16 august 2010]. Bibliography Http://news.yahoo.com/s/ap/20100806/ap_on_sp_ol/oly_London2012_security [accessed 16 august 2010].

Saturday, December 21, 2019

Dorothy Parker’s Big Blonde - 1037 Words

The struggle for power between men and women in this story is mainly witnessed through interactions in which the female is not living up to what the men want. This makes women, like Hazel, easily replaceable in the lives of men. Women only control the power when they are agreeable therefore Parker creates women who are tapped with no plausible way to obtain power, other than being agreeable and well liked. The reader sees how detached Hazel appears to be from other women in this story. She can’t understand why they are allowed to be sad but when she appears sad she’s told to smile and how nobody wants to hear about other’s troubles. In fact there are only three women who Hazel holds conversations with at all in the story. The first is her†¦show more content†¦The irony in this is after her failed suicide attempt she hears very similar statements from her maid Nettie. Nettie cannot understand Morse’s need to end her life and instead scold the character for her thoughtlessness. In this way the maid could be seen as the final reinforcement of the society that both created and nearly destroyed Hazel. Nettie herself pushes Mrs. Morse to cheer up because that is what she needs to do. This act brings Hazel to understand her place in the world and for the first time she agrees with the advice that has been given to her for years. The story concludes with a toast while the maid encouraging Hazel to continue cheering up and she replies with a yeah, sure. The significance of this moment was also noted by Simpson as being the moment of recognition â€Å"[hazel] has emerged finally from a verbal world of formula—where small talk is all the talk there is.† (Simpson) By attempting to break out of the role society has given her Hazel goes against social norms but upon her reawakening she is reminded of her place in this world. Her job is to only exist in the realm of small talk and smiles. Hazel seems to by the end of the story have an epiphany to this idea. She realizes that her life will continue to pass the same way it has been going for years, this idea hardens her as she accepts that this is the life she will continue to lead. This is Parker’s way of explain that for women in this life style there is no escape. They areShow MoreRelated A Glimpse of Dorothy Parkers Life Essay examples1355 Words   |  6 PagesA Glimpse of Dorothy Parkers Life Dorothy Rothschild, later to become the famous writer Dorothy Parker, was born on August 22, 1893 to J. Henry Rothschild and Eliza A (Marston) Rothschild in West End, New Jersey. Parker’s father, Mr. Rothschild, was a Jewish business man while Mrs. Rothschild, in contrast, was of Scottish descent. Parker was the youngest of four; her only sister Helen was 12 and her two brothers, Harold and Bertram, were aged 9 and 6, respectively. Just before herRead MoreDorothy Parker : The Feminist Movement1306 Words   |  6 Pages Dorothy Parker An Inspiration Dorothy Parker was a famous poet who lived from August twenty-second, 1893 to June first, 1967. From the feminist movement in 1848, to the modernist movement and the jazz age in the twentieth century, Dorothy Parker made a long lasting impact, and was also an inspiration to both movements. Dorothy parker’s common themes were anxiety and female passivity which shined through many of her poems. Dorothy Parker was born two months premature

Friday, December 13, 2019

British Patrol Free Essays

British Patrol started way back in 1908 (Yergin 18). Its commencement was marked when oil was found in Persia in a very rugged place after seven years of intensive oil search. The Company had invested a lot of fortunes into this search and this almost ended up in failure. We will write a custom essay sample on British Patrol or any similar topic only for you Order Now This oil was found in the field of Naphtha. British Patrol has grown over the years from a local oil company to an international energy group. Its operations run over a hundred countries and it has an employment capacity of eighty thousand people (Yergin 20). It is ranked as the fourth largest company in the world and it is the largest corporation in the United Kingdom. This paper explains how the British Patrol created a global brand name and how their partnership with Amaco, Castrol acquisition and Aral acquisition affected the process of creation of the global brand name (Corbett 80). It also explains the issues and the challenges that BP faced as well as the problems encountered. Who is BP? BP is a British energy company that is global. It is the third largest energy company in the world. Its headquarters are in St James’s, City in London. It is mainly engaged in oil exploration and in the marketing of petroleum and of natural gas (Ellis 93). The roots of BP date back to 1901 when the Shah of Iran granted William Knox a concession to search for oil. He searched for seven good years and found oil in 1908 (Yergin 67). This discovery gained commercial importance in April 1909 when the Anglo Persian Oil Company (APOC) started to exploit the rugged deposit of oil discovered by William Knox. In 1935, it was known as the Anglo Iranian Oil Company. This became the British Petroleum Company in 1954 (Ellis 67). Activities of BP The company expanded to Alaska in 1959. It struck oil in the North Sea in 1965. it also acquired control over Standard oil of Ohio. It operated in Iran until the Islamic revolution in 1979. The regime of Ayatollah Khomeini confiscated all the assets of BP and it closed down. It was not compensated for the loss (Yergin 67). BP was led by Sir Peter Walters between 1981 and 1990. when Robert Horton took over he did a major downsizing in the company. Under his jurisdiction, BP bought many stations in South Eastern US. Lord Browne became the managing director in 1995 (Ellis 79). The companies acquired Amoco, ARCO and Burma Castro under his jurisdiction. Strategies employed by BP One of the leading strategies that BP uses is the acquisition of leading oil companies and getting into partnership with them. This is well exhibited in the acquisition of Amaco, Castrol and Aral. For example in the case of Amaco in December 1998 after merging, it was known as Amaco BP. It was then renamed BP (Beyond Petroleum) in 2000. Most Amoco stations in the US was renamed to the brand name BP (Yergin 89). It used the strategy of selling the gasoline from Amaco under the name Amoco. The reason they did not change the name was that for the previous sixteen years Amoco’s gasoline had been rated as the best gasoline. This was there fore a marketing strategy that further saw the company’s image being boosted. They then changed the name to Amoco ultimate. They then improved their brand (Corbett 45). They also use the strategy of ensuring their products are quality products. The quality of a product always attracts and maintains the loyalty of the customers. Quality of the leaders has also to a great extent enabled the company to create a brand name. A closer look at their history leaders or managing directors is chosen from the management team. This allows the continuation of the activities of the organization without delay. An example is Lord Browne who was in the board. It also uses the strategy of owning reserves in most regions where oil is found. For example in Russia, they own fifty percent. They are also planning to expand into further regions. Challenges and problems encountered Some of the challenges encountered were the confiscation of the company’s assets by the government. This was in 1979 and it resulted into a major loss for the company. Another major challenge has been the occurrence of accidents such as explosions (Yergin 89). These have led to massive losses. An example is the explosion that occurred in the company’s Texas City refinery. This led to a massive loss of oil as well as to fatal injuries and deaths that cost the company a lot of money as compensation to the families affected (Ellis 90). This also led to lawsuits being filled against the company. Leaking wells are also a challenge to the company. It sometimes has to close these wells as it did in 2006 when it closed its twelve wells. The company also faces the challenge of recovering its self-image from the explosions that are fatal and they occur out of negligence from the company (Yergin 90). This affects the customer’s attitude towards the company. The company has to build confidence in the eyes of these customers and it is an uphill task. Conclusion BP has grown into one of the leading corporations from its humble beginnings. This has been through employment of various strategies such as acquisitions and mergers. This has also been necessitated by the ability to keep their products at a very high quality thus creating loyalty among the workers. It has also expanded into other regions thus acquiring the larger markets. However, there have been challenges that the company has faced and it has had to combat the challenges and problems to remain at the top. References Corbett Michael. The outsourcing revolution: Why it makes sense and how to do it, right. London: Kaplan Publishing, 2004. Ellis Charles. The partnership: the making of Goldman Sachs. London: Penguin Press, 2008. Yergin Daniel. The Prize: The Epic Quest for Oil, Money Power. New York: Simon Schuster, 2008. How to cite British Patrol, Papers