Tuesday, May 12, 2020

una‘是 - 1561 Words

sss s s s Introductions Welcome to EAC 150! This semester we will be working hard on refining your English writing, reading, oral and analytical skills. The EAC150 subject outline is available at http://els.senecac.on.ca. This addendum is your guide to the subject requirements and activities in my class. Texts and Materials Kanurkas, Irene and Darrell Nunn. An Anthology of Readings for College English Online. ISBN 017641579-3 A good quality English-language dictionary such as the Oxford Canadian Dictionary A good quality thesaurus (optional but strongly recommended) A folder/portfolio to keep all work throughout the semester Grading/Assignments â€Å"Pop† Reading Quizzes or Group Work 10% Citation†¦show more content†¦Evaluation Term Work The term work will constitute 75% of the final grade. A minimum of 50% of graded term work must be completed in class. Students will read 8-10 selections and write a minimum of 2500 words during the term, including at least two 500-word analytical essays written in class; a 1000-word analytical essay; and a research assignment. Students will develop arguments based upon a critical appreciation of the themes and literary techniques presented in the readings. They will also support their views with textual references. No more than 10% of the final grade will be allotted to quizzes and/or group work. Final Examination The final exam will constitute 25% of the course grade. It will be a common exam in the form of a textual analysis. Students must pass the term work and the final exam to pass the course. Grading System In addition to the usual passing grades of A+ to D, there are two grades that denote unsuccessful attempts at EAC150: F (0 to 49%) Failure (term work has not been completed) ATT The student has satisfactory attendance and has completed the term work, but has not met the learning outcomes. Any students receiving ATT in EAC 150 will continue their studies in EAC 150 in subsequent semesters until they have met the learning outcomes. In the meantime, the ATT grade does not affect the

Wednesday, May 6, 2020

Apple Inc. Strategic Management - 968 Words

Case 10: Apple Computer and Steve P. Jobs (2006) Issue/Problem Identification 1. Apple is known to provide customers with a personal computer revolution that is easy-to-use machine. It was founded in 1976 by Steve Jobs and Steve Wozniak. Apple was a success at the beginning period of its production due to marketing and technological innovation and the company has invented. Apple grew quickly as the development of the products increases and the revenue continued to grow. Apple’s business strategy is to focus its products on differentiation by providing a unique product that is impossible to clone and charges its products at a premium price. In 1983, Apple faced a difficulty because PC entered the market and was marketing their products at†¦show more content†¦For Apple to sell its products at a premium price, it must be a trusted and well-known brand. As it is obvious today, Apple has created many loyalty customers. Recommendations and Implementation 1. In order for Apple to create more revenues and continue to stay in business, Apple’s management team should not only depend on Steve Jobs. The management team must work as a team and make sure that the company can still be successful without Steve Jobs. It is true that because of Steve Jobs, Apple has become a successful company but Steve Jobs is not going to be with Apple forever and the management team must take that into consideration and be able to carry on the business without Steve Jobs. 2. Some alternatives include developing new products every so often to attract consumers. Apple is already good at doing this because it is always renovating its products in many different ways whether it is a Mac Book, an iPod, or an iPad to attract its customers and keeping up with the society. This alternative is good for both long-term and short-term. People will continue to trust that the brand is still attracting. 3. Some of the implementation that should be considered is to hire the right people to work for the company; people that will bring new ideas to the company. Because Apple is always developing new products, the company should also continue to ensure that the quality of theShow MoreRelatedStrategic Management Of Apple Inc. And Samsung Group2547 Words   |  11 PagesStrategic Management of Apple Inc. and Samsung Group Analyze Apple and Samsung domestic and global environments, industry, internal capabilities, mission and vision. Apple and Samsung, actually, considered as pioneers in technological industry. Every company has chosen different business strategies and models within the marketplace. Apple releases few but highly anticipated high-end products while Samsung inundates the market with a wide variety of products. In the beginning, Apple wasRead MoreStrategic Management Case Analysis: Apple Inc. Essay1027 Words   |  5 PagesStrategic Management Case Analysis: Apple Inc. Veronica R. Hart Kaplan University Strategic Human Resource Management Unit 1 GB 520 p. 1-6 March 9, 2011 The 2008 Harvard Business Case Study on Apple Inc, describes the very popular corporation with 24 billion in revenue as of 2007 and how the company has had some problems yet sustainability over the years. The status of the company was examined in detail by the article which revealed a number of strategic moves under the leadership ofRead MoreStrategic Management: Apple Inc. Case Study Essay1090 Words   |  5 PagesUnit 1 Case Analysis: Apple Inc. GB520 Strategic Human Resource Management About â€Å"Strategic management is an ongoing process that evaluates and controls the business and the industries in which the company is involved; assesses its competitors and sets goals and strategies to meet all existing and potential competitors; and then reassesses each strategy annually or quarterly [i.e. regularly] to determine how it has been implemented and whether it hasRead MoreApple Inc., Strategic Management Case Analysis Essay1091 Words   |  5 PagesApple Inc., Strategic Management Case Analysis GB520 Strategic Human Resource Management: Unit 1 March 13, 2012 Apple Inc., Strategic Management Case Analysis What is Strategic Management and why is it critical to the success of an organization meeting its goals and mission? Strategic management is the application of the basic planning process at the highest levels of the company. Top management sets goals for the performance of the company carefully formulating, implementing and evaluatingRead MoreGb520 Unit1 Apple Case Analysis Essay1486 Words   |  6 PagesCase Analysis – Strategic Management – Apple, Inc. - Unit 1 Anahit Orbelyan GB520-03N Strategic Human Resource Management September 08, 2012 Professor Dr. Kenneth Rauch Case Analysis – Strategic Management – Apple, Inc. Introduction The purpose of this paper is to explain the definition of Strategic Management and why it is critical to the success of an organization in meeting its goals and mission. The paper will include a brief analysis of the situation andRead MoreCase Study : Apple Inc.1417 Words   |  6 Pageschanged the world with Apple Inc Company. Both of them was out of college, they were making so much money in the computer company Apple was started with introduction of computer I computer on April 1, 1976. Apple was incorporated January 3, 1977. The Apple II was introduced on April 16, 1977 at the first West Coast computer Faire. The Apple II was chosen to be the desktop platform for the ground breaking use call spreadsheet program. He was created a business market for the Apple II and gave home usersRead MoreApple Inc. Strategy Formulation1720 Words   |  7 Pagesdescribe the Strategic and Marketing Plan of Apple Inc, Which is the biggest consumer electronics provider in the world. It provides wide range of consumer electronics in the market like MAC computers, IPOD, I Phone, LAPTOP, IPAD. It has about 49,400 employs and over 240 Retails Store all around the world wide out of it 218 are in US and 24 in UK rest in other countries. I personally think that before studying the strategy of any organization we need to understand the basic of Strategic Management likeRead MoreManagement and Planning1251 Words   |  6 Pagesï » ¿Management and Planning Management Planning Management: Theory, Practice and Application/330 Management Planning Planning is identifying the goals to be accomplished and making a decision to move forward the suitable actions needed to achieve those goals (Bateman and Snell, 2009). Examples of planning may include examining current situation, predicting the future, establishing goals, choose what types of activities one will engage, and selecting the resources needed to achieve the said goals (BatemanRead MoreContingency Plan1552 Words   |  7 PagesImplementation, Strategic Controls, and Contingency Plan Tonya Starks STR/581 December 8, 2014 Instructor: Braford James Abstract Apple Inc. is a global innovator of the MacBook, tablets, iPhones, iPods, and other innovative products. Apple is the leader in the electronic market sector for innovative product growth and development. The implementation plan will explain the strategic controls and contingency plan for the organization along with an implementation process. This will allow Apple to assessRead MoreCase Study : Apple Inc.1694 Words   |  7 PagesApple Inc is popular in the computer technology word; Apple Inc leads the computer industry in innovation thanks to the award winning desktop and notebook computer known as OS X operating system (Slind). Based in my researchable Apple Inc is the biggest company in the entire word. It is therefore important to define strategic management, according to (Certo, Peter Ottensmeyer) , strategic managements is a continuous process that directs an organization to be appropriately suited to its internal

Singles Free Essays

A day I will never forget One day I will never forget would be September first 2014. That was the day that Is made the volleyball team. I was eager to tryout since my friends and I did It last year. We will write a custom essay sample on Singles or any similar topic only for you Order Now Everyday I had to wake up at six o clock In the morning and play volleyball. The coaches made us run a mile, pass to the target, serve, and set. After the first day of tryouts were over I went to straight to Walter and bought a volleyball. That night I practiced and watched volleyball videos on youth working on everything that we did in tryouts. During the tryouts I had to deal with negative people who didn’t want to play with me because last year in 7th grade I wasn’t all that great. It really hurt my feelings that people didn’t want to play on the same team with because of last year. Sometimes those girls made me go to the point where I just didn’t want to do tryout anymore because they were so mean and made me feel bad. When tryouts started this year I was determined to make the a team; I had to make it. Through tryouts I striver to be a better volleyball player and a better athlete. When I did really good and got my serves over I would pass to the target the coaches would tell me good Job or keep It up. When they said that It made me want to do better. So I did what they said and kept It up. How to cite Singles, Papers

The Leading Case Of Vines v ASIC 2006 Analyzed By Using IRAC

Question: Discuss about the Leading Case Of Vines v ASIC, 2006 Analyzed By Using IRAC Technique. Answer: Issues and facts Facts of the case Geoffrey Vines (The Appellant) was the auditor and a Charted Accountant and in 1995 he joined GIO Australia Holdings Limited (GIO) as a Chief Financial Officer. In 1998 (25th August), AMP Limited (AMP) announced a takeover bid of the shares of GIO. The board of GIO resisted the bid considering the same as hostile. Later on 16th December 1998, GIO published its Part B statement which contains the profit forecast for 1998-99 wherein the profit forecast for one of the subsidiary of GIO, GIO Re, was declared to be AUD$80 million. This forecast had a significant impact on the takeover bid. When the part B statement is being prepared by GIO, at that time (around 21-28 September 1998) GIO Re was hit by a hurricane Georges.(Wong) On the basis of these facts the ASIC has initiated civil proceedings against Mr Robertson and Mr Fox (two executives) and Mr Vines regarding the claims that are made in Part B. ASIC submitted that no reasonableness was taken while forecasting the profits of AUD$80 million for GIO Re and thus the directors are in violation of section 232 (4) of the Corporation Law. (Farrand, 2007) Based on these facts, the major that is raised is submitted herein under. Issue raised The major issue that was raised in the leading case was whether there is violation of section 232 (4) of the Corporationlaw by Mr Vines? If Yes, then to what extend he is liable as per the provisions of the Corporation law?(Dayman Kinsey, 2007) Relevant laws and principles The relevantlaw and principles that are applicable in order to resolve the raised issues are: (Allens, 2007) The analysis of section 232 (4) of the Corporation Law. The court while interpreting section 232 (4) of the Corporation Law submitted that the level of care that is required in the given statutory provision does not demand the level of care that is needed in cases of negligence. Whether there is reasonableness that was taken by Mr Vines and the other directors while including the profit forecast of $80 million for GIO Re in part B Statement after the Hurricane Georges. The issue of duty of care and reasonableness was dealt by the courts and there are various contraventions that are found to be incurred by Mr Vines. However, prior analyzing the decision of the court, it is important to find out the main arguments that are raised by Mr Vines to support his case. Arguments of the parties and analysis Arguments The main arguments that are raised by Mr Vines and submitted and analyzed herein under:(Farrand, 2007) Argument 1 The main argument of Mr Vine was that Austin J was in error in holding that he has violated section 232 (4) of the Corporation Law. Argument 2 Mr Vines argued that the liability that is imposed upon him under section 1317JA of the Corporation Law was not correct. He argued that section 1317JA grants discretion to the court to alleviate a person from the consequences provided such person should have acted honestly and considering the situation of the case such liability should be excused. Argument 3 It is argued by Mr Vines that the level of care that is required to be prove negligence on the part of Mr Vines in order to hold him liable for the violation of section 232 (4) of the Corporation Law is much higher when the same is compared in common law. he argued that thus to consider that there is breach of section 232 (4) of the Corporation law, the violation must be gross enough so that it become an issue of state interest and public concern. Analysis The arguments that are raised by Mr Vines are rejected by the court. The court submitted that the level of care that is applicable and is required under section 232 (4) of the Corporation law does not require any kind of higher level of negligence in the part of Mr Vine in order to hold him negligent. The arguments of Mr Vines were rejected and he was held to be in contravention of duty of care on his part. The basic reasons for the rejection are:(ASIC, 2007) That he made no attempt to let the due diligence committee be aware that he is fine with the truthfulness of the gains that are forecasted in part B statements; He provide no report or analysis which is the core reason for the forecast of profits that are made in the Part B statements; A statement was made by him on 9th November 1998 regarding the profits but statement is an incompetent declaration of confidence. He gave no opinion whether the forecast that is declared on Part B statement is achievable during the term of after the statements but prior the end of the takeover period. He authenticated a management sign off without indulging in adequate steps to guide the due diligence committee of GIO on the basis of the presupposition which form the basis of $80million profit forecast It is now important to analyse the court outcome and the conclusion. Conclusion and court outcome Court Outcome The court which lay down the final judgment was constituted by Spigelman CJ, Ipp and Santow JJA. The majority of the decision is provided by Spigelman CJ and Ipp JA and the Santow JA is of the minority opinion. The court of Appeal decided the case on 4th April 2007 and submitted that Mr Vine is in contravention of his duty of care as enshrined under section 232 (4) of the Corporation Law. The main outcomes of the court are submitted herein under.(Farrand, 2007) The grounds upon which it was considered that Mr Vines is in violation of his duty of care: The Forth Contravention Part B statements contains a heading Management Sign-off. Mr Vines put his signature under the head on 8th December 1998. The violation incurred when he put his signature on the management sign-off without taking any adequate actions to guide the due diligence committee of GIO of the reasons of his assumption that GIO Re will have a profit of $80 million. One of the reasons for the assumption of the forecast can be that there were chances that a retrocession policy with some another insurer (American Re) could be taken up by GIP Re which would transfer its risk that are incurred because of the Hurricane Georges. All the actions of Mr Vines were based on the agreement that is taken upon with American Re. But, on 7th December (one day before the signing of Part B statement), the auditors of GIO (PricewaterhouseCoopers) did not agree that the agreement with the insurer could be given an accounting treatment which is the basis of the profit forecast. Thus, on 8th December, Mr Vines did not disclose the true facts to the committee of the GIO Also, the court held that as per the terms of the sign off it is the personal responsibility of Mr Vines if there is any contravention of the duties. The Fifth Contravention When he quoted to the Due Diligence Committee that the profit forecast that is made is correct as per his views and he is comfortable with the same. But, this advice that is given to the Committee was not adequate. It was submitted by the court that no reasonable person would act in the manner in which Mr Vines has acted. There was no care and diligence that was undertaken by Mr Vines considering the circumstances in which GIO is operating. No reasonable person will gave an advice to the Committee considering the doubts on retrocession policy that had incurred. It is submitted that instead of giving his own advice and opinion, Mr Vines should have acted with reasonable care and should had disclosed the true facts to the Committee, all necessary information should had been provided. The Seventh Contravention When he gave no opinion whether the forecast that is declared on Part B statement is achievable during the term that is, after the statements but prior the end of the takeover period. On 9th December, AMO decided to increase the bid; however, there were no corrections that are brought in regarding the forecast that are made in Part B statements. It is observed by the court that post 8th December, Mr Vines does not indulge in ay action which would ensure and which would portray that the monitoring arrangements are carrying adequate at the divisional level and are checked by the senior corporate officer so that assessment can be made regarding future disclosures in the market. That Mr Vines was aware that the forecast regarding the GIO Re profits was not achievable and thus knowledge was not shared with the committee. The court also submitted that Mr Vines has not considered to have violated his duty of care on four occasions. The same are: The First Contravention when a statement was made by him on 9th November 1998 regarding the profits but statement is an incompetent declaration of confidence. The second and Third Contravention when he did not succeed in providing the information regarding the reasons because of which the forecast was calculated in a media report and the mail that is sent to the committee on 22nd November 1998. The Sixth Contravention the court also found that no duty of care is violated by MR Vines when he made observations/statements to the GIO auditor and submitted that GIO is not aware of any transaction that would result in believing the fact that the forecast that is made is misleading or incorrect. Conclusion The decision that is laid down in Vines v ASIC 2006) by Santow JA is matter of great significance mainly because: It is the case which has imposed the duty of care and diligence not on the directors of the company but the duty is imposed on a senior executive officer of the company who is also not the director of the company. The actions of the officer and the things that are said and done by him including furnishing advice was considered to be a failure on his part to carry out his conduct with adequate care and diligence which is required in the given circumstances. The skills that are cater by the senior officer was found to be not as per the statutory standards and thus was held to be in violation of section 232 (4) of the Corporation Law. It is necessary and it is the duty of the officers of the company that when information is provided by them to the shareholders of the company then it is necessary that before indulging in any kind of investment decisions it is necessary that all material aspects must be disclosed to the shareholders and it is only after the disclosure of all the relevant information any investment decision should be taken. When any information according as per the company officers is found to be inaccurate then it is his prime duty that such information prior given to the shareholders must be cached as to whether such information is complete or accurate or not. It is the duty of the senior officers that the completeness and accuracy of the information must be checked so that no decision is taken which is not in favor of the company and the shareholders; If apart from the shareholders there are any other persons or parties that are relying on the information then it is the duty of the officer that completeness and accuracy of the information must be checked; It is the most important duty of the officer that unless and until the senior officer is supported with evidences him must not make any declaration regarding the completeness and adequacy of the information upon which the shareholder or other partys are relying. Bibliography Allens. (2007). Mergers and Acquisitions. Retrieved September 22, 2017, from Allens: https://www.allens.com.au/pubs/ma/fomamay07.htm ASIC. (2007). 07-166 Court of Appeal reduces penalty for former GIO Chief Financial Officer. Retrieved September 22, 2017, from ASIC: https://asic.gov.au/about-asic/media-centre/find-a-media-release/2007-releases/07-166-court-of-appeal-reduces-penalty-for-former-gio-chief-financial-officer/ Dayman, A., Kinsey, D. (2007, June). Vines: How much care and diligence is required by executive officers? Retrieved September 22, 2017, from Corporate Law: https://webcache.googleusercontent.com/search?q=cache:eKnpA_rI3D4J:https://www.governanceinstitute.com.au/media/410293/care_diligence_executive_officers_vines_june2007.pdf+cd=8hl=enct=clnkgl=in Farrand, L. (2007). Vines v ASIC: The obligation of care and diligence of company officers. Retrieved September 22, 2017, from Piper Alderman Legal Update: https://www.piperalderman.com.au/__files/f/4017/PA%20eBulletin%20June%202007.pdf Vines v ASIC (2006). Wong, S. (n.d.). Forgiving a Directors Breach of Duty: A review of recent decisions.

Friday, May 1, 2020

Implementing Enterprise Resource Planning †Free Samples to Students

Question: Discuss about the Implementing Enterprise Resource Planning. Answer: Introduction: The main purpose of the project is to develop a network for the information system for the STP and secure the information system from unauthorized access. The information system is developed according the goals of the business for supporting the future growth of the organization. The information system should be developed for improvement of the business goals of the organization and the privacy of the organization should be kept confidential for securing the organizational data. The growth of the business should be kept in mind for management of the employees of the organization. The information system should be developed for increasing the efficiency of the business process of the organization and decrease the response or waiting time of the users. The scope of the project is to include the different functionality of the business process in the information system for increasing the efficacy of the business. The manual process of the organization can be automated with the development of the information system. The cost of operation of the current business process should be minimized with the implementation of the information system. New equipments and technology should be implemented for improvement of the business process and report should be generated from the information system to show the current sales record and the stocks available in the warehouse of the organization. To develop the information system to meet the current requirement of the organization and comply with the regulations. The network administrator is responsible for monitoring the progress of the project and each of the module should be developed for including the functionality The project should increase the efficiency of the current work process and reduce the workload and complexity of the employees working in the organization. To increase the return of investment and the information system should be developed for facilitating employees to get real time monitoring of the sales report and develop the customer relationship. Strategic alignment of the project The project should aligned with the current business process to view the sales and the stock record and monitor the records at a real time for the increasing the efficiency of the current workplace of the organization. The account manager is responsible to maintain the sales record and the information system should be developed to automatically record the sales of the product sold by the sales representatives and record in the database to generate a sales report. The database of the information system should be encrypted with the application of encryption algorithm and provide permission to the users. Read / write permission should be provided for reducing the risk of illegal access. The data residing in the database of the information system should be stored in different tables and the tables should be normalized such that it can be joined to provide an appropriate result of the querry (Sousa and Oz 2014). The database should be regularly backed up to ensuring the protection of the database and password should be used for the access of the data. Authorization should be added for removal of the risk of access of the content by the employees and accidental damage of the files. A secure connection is required to be established between the database and the interface of the information system for increasing the efficiency of the information system (Rouhani, Ghazanfari and Jafari 2012). The standalone system present in different branches of the organization should be replaced with the information system and the interfaces are required to be hosted on a web platform and connected with a central database server for storing the information generated and inputted into the system. The information system should be connected using mobile devices to increase the flexibility of the system and allow the user to access it from remote locations. The mobile device should be encrypted and antivirus program should be installed for the reducing the risk of virus and corruption of the database of the information system (Oseni et al. 2014). The theft or lost of the mobile phones that is connected with the information system can compromise the security of the information system and make it vulnerable for the attackers to exploit the contents of the information system. The mobile device can be used as an intermediate device to access the content of the information system. The encryption of the data in the mobile phone can use of strong password can reduce the risk of illegal access of the cell phone for accessing the resources of the information system (Jouini, Rabai and Aissa 2014). The operating system of the mobile phones used by the employees to connect with the informat ion system should be kept updated for protecting it from harmful software. Plan for hardware purchases Different hardware are required for the development of the information system and they are categorized as follows: Input devices- This are the devices that takes the input from the users of the information system and it can be mouse, keyboard or touch panels. The choice of the input device that is used for providing input to the information system depends upon the users and the data should be entered on different scales. The information system can be based on several features and it may require different input device. Processing devices- The processing device is required for processing the data residing in the database of the information system and different function of the modules developed. The increasing the processing power of the cpu used for the management of the information system increases the efficiency of the system (Fragkiadakis, Tragos and Askoxylakis 2013). The clock speed of the cpu is used for determination of the number of instruction that is required to be processed per second. Memory- the memory of the computer can be divided into internal and external memory and the data that is held on the memory can be stored in the external device for increasing the flexibility of the system. The running process are stored in the computer memory and the size of the memory depends on the handling of the queue (Bernroider, Wong and Lai 2014). The size of the memory used for processing the queue of the information system is dependent on the controlling and the processing power of the information system. Output devices- The output devices the screen of the information system and the monitors used for getting the output of the results of each of the querry. The printer can also be called as an output device because it is used for printing out the report. Mainframe- The mainframe are used for processing the large scale of data and it is used for recognition of the existing processes and meet the needs of the organization and implement a change over ion the organization. Business continuity To maintain a continuity in the business the information system should increase the customer relationship management of the organization. A business continuity plan is important for the success of the business and a strategy is required for the recognition of the threats acting on the information system. The potential risk acting on the information system and their effect are evaluated for the creation of the business continuity plan and the plan should be periodically reviewed for bringing in the changes in the organization and mitigation of the risk (Acemoglu, Malekian and Ozdaglar 2016). The operational risk such as the human errors and the sudden change in the organizational culture should be included in the plan for creation of a fully functional plan. The areas of improvement of the information system and the dependency of the internal and the external factors such as the decision from the management or higher authorities are seen as higher cost and the human interaction should be minimized for minimizing the risk. The recovery of the system and the interruption should be avoided and a proper risk management is necessary for the implementation of the business continuity plan in the organization. The stakeholders included in the business process and their potential to cause harm to the information system should be identified and the permission for accessing the resources of the organization should be defined to them for reducing the impact of the threat and reducing the complexity of the management of the risk associated with the information system (Golriz and Jaber 2015). The recovery point and the time required for the recovery of the information system in case of failure should be analyzed and maximum tolerable data loss should be ensured for the recovery of the critical functions and maintaining a continuity in the current business process. Risk management Risk management is an important process for the success of the information system and it should be able to automate the different business process and minimize the cost of the development and running of the information system. The supply chain of the products should be managed and the information of the supplier and the customer should be recorded for minimizing the loss of data that may occur at one end of the information system (Harmon 2014). The information system should record the data according to different departments and the accessibility of the data should be given to the manager of the department for improvement of the current business process of the organization. An architecture of the information system should be created for the access right should be provided to the users and a maintenance log should be maintained for storage of the evidence of the illegal activity (Kale 2014). The risk can be categorized into different types such as physical security, hardware security, communication security and data storage security. Physical security of the information system- The data storage rooms and the server rooms should be kept under lock and key and entry of the unauthorized persons should be restricted. The physical access of the servers can make the system vulnerable and the data may be access by the people or virus can be implanted in the server to make the information system unavailable for the users. Security of the hardware- Proper air conditioning should be used routers and the servers and the firmware of the software versions should be upgraded with recent patch and updates to protect the information system from sabotage attacks. Communication - The client relationship management employees must be included for taking criticism about the necessity of the system. A self-appraisal polls is utilized that helps the group to distinguish the hazard related with the framework (Jouini, Rabai and Aissa 2014). The eHealth security strategy is dissected by the security group and they are recorded and lined up with the present framework arrangements for checking on. Meetings were led with the distinctive partners for understanding the framework and approve the assembled data in regards to the framework Data storage security- There are different testing tools available and it should be used for accessing the vulnerability of the network and the configuration should be reviewed for protecting the data center and increasing the efficiency of the information system. Conclusions The report expresses the present status of the STP in executing new PC framework and new advances for dealing with the general population customer. The task is contrasted and the sound undertaking administration practices and proposal is given to close the project. Facilitate proposal for the change of the STP future administration rehearse is likewise given in the report. The aptitudes that a task administrator should have to legitimately deal with the undertaking are examined in the report and in conclusion some guidance is given to the CEO for dealing with the project. The data framework is intended to record every one of the records of the items sold by the organization and the points of interest of the clients for expanding the proficiency of the framework. The report is set up to depict the foundation of the undertaking, scope and the objectives of the task. The security of the data is the principle worry for the advancement of the project as per the necessity. The information utilized by the data framework ought to be secured from illicit access and the gadget interfacing with the data framework ought to likewise be secured for evacuation of the hazard related with the improvement of the framework. Recommendations The following recommendations n are made for the improvement of the efficiency of the information system deployed in the organization. Increasing the availability of the information All the organizational information such as the stocks available, shipment details, invoice, payment records, customer information should be recorded in the database of the information system such that it can be used for generating report and reduce the chances of the human errors. Inclusion of accurate information A proper validation should be used and the development of the data entry page using drop down list or check box reduces the chances of wrong entry of data in the information system. The information provided should have the option of modification such that the user go back to the previous stage for solving the errors. Checking the compatibility of the application software The external software used in the information system should be checked if it is compatible and works according to the requirement because a flaw in the application software can cause a loop hole in the information system and open path for the hackers to intrude into the information system and get the access of the data. Identification of the authorization The person who are given the full control of the information system should be listed and the improvement can be made in the authorization for making recommendation and taking appropriate action to revise the organization policy and procedures and ensuring that the policy are followed by the group of employees working on the organization. Submission of the proposal A proposal regarding the problems and the actions that is required to be performed for the improvement of the information system should be submitted by the stakeholders involved in the development and using the information system for the removal of the constraints and increasing the efficiency of the system. Bibliography Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion.Journal of Economic Theory,166, pp.536-585. Bernroider, E.W., Wong, C.W. and Lai, K.H., 2014. From dynamic capabilities to ERP enabled business improvements: The mediating effect of the implementation project.International Journal of Project Management,32(2), pp.350-362. Chang, J.F., 2016.Business process management systems: strategy and implementation. CRC Press. Drumm, O., Lutz, B., Palmin, A. and Wolf, G., Siemens Aktiengesellschaft, 2016.Planning and Engineering Method, Software Tool and Simulation Tool for an Automation Solution. U.S. Patent Application 15/083,525. Fragkiadakis, A.G., Tragos, E.Z. and Askoxylakis, I.G., 2013. A survey on security threats and detection techniques in cognitive radio networks.IEEE communications surveys and tutorials,15(1), pp.428-445. Galy, E. and Sauceda, M.J., 2014. Post-implementation practices of ERP systems and their relationship to financial performance.Information Management,51(3), pp.310-319. Golriz, A. and Jaber, N., 2015, October. A High Assurance Firewall in a Cloud Environment Using Hardware and Software. InInternational Telemetering Conference Proceedings. International Foundation for Telemetering. Harmon, P., 2014.Business process change. Morgan Kaufmann. HassabElnaby, H.R., Hwang, W. and Vonderembse, M.A., 2012. The impact of ERP implementation on organizational capabilities and firm performance.Benchmarking: An International Journal,19(4/5), pp.618-633. Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems.Procedia Computer Science,32, pp.489-496. Kale, V., 2014.Implementing SAP CRM: The Guide for Business and Technology Managers. CRC Press. Kumar, M., Kaur, N., Kaur, S. and Singh, R., 2016. Different Security Threats and its Prevention in Computer Network.International Journal of Advanced Research in Computer Science,7(6). Oseni, T., Rahim, M.M., Smith, S.P. and Foster, S., 2014. An initial empirical evaluation of the influence of erp post-implementation modifications on business process optimisation. Parvizi, R., Oghbaei, F. and Khayami, S.R., 2013, May. Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation. InInformation and Knowledge Technology (IKT), 2013 5th Conference on(pp. 274-278). IEEE. Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016.Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley Sons. Rouhani, S., Ghazanfari, M. and Jafari, M., 2012. Evaluation model of business intelligence for enterprise systems using fuzzy TOPSIS.Expert Systems with Applications,39(3), pp.3764-3771. Schniederjans, D. and Yadav, S., 2013. Successful ERP implementation: an integrative model.Business Process Management Journal,19(2), pp.364-398. Seo, G., 2013.Challenges in implementing enterprise resource planning (ERP) system in large organizations: similarities and differences between corporate and university environment(Doctoral dissertation, Massachusetts Institute of Technology). Sousa, K.J. and Oz, E., 2014.Management information systems. Nelson Education. Teittinen, H., Pellinen, J. and Jrvenp, M., 2013. ERP in actionChallenges and benefits for management control in SME context.International Journal of Accounting Information Systems,14(4), pp.278-296.