Preview

Isom Elephant House

Satisfactory Essays
Open Document
Open Document
6088 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Isom Elephant House
Abstract

The project is a discussion document regarding a company’s current market position and how Information Technology is used and how it can be further used to remain competitive in the industry today.

Different analysis models and frameworks are used, analyzed and evaluated in the context of the document, in order to identify the current market and IT position of the company Ceylon Cold Stores (CCS).

After the above said market position identification, the project further discusses of strategies that can help the company to gain future successes with the use of Information Technology.

The project also contains a section explaining the different types of risks, disasters and security vulnerabilities a company might have to face in terms of Information Systems Usage. Proper prevention controls and risk management techniques are provided in the content.

Table of Contents

Acknowledgements 1

Abstract 2

1.0 Introduction 7

1.1 Company Overview 7

1.1.1 History 7

1.1.2 Products 7

1.1.3 Vision 8

1.1.4 Achievements 8

2.0 Business Analysis Models 9

2.1 Porter’s Five Forces 9

2.1.1 Bargaining Power of Suppliers 9

2.1.2 Bargaining Power of Customers 10

2.1.3 Threat of Substitutes 11

2.1.4 Threat of New Entry 11

2.1.5 Competitive Rivalry 12

2.2 Value Chain Analysis 13

2.3 SWOT Analysis 14

3.0 Company’s Current IT position 15

3.1 Mcfarlan’s Strategic Grid 15

4.0 Future IT Strategies 18

5.0 Risk Management and Managing System Security 20

5.1 Information System Risks 21

5.1.1 Cyber Crimes 22

5.2 Loss Analysis 24

5.3 Control Methods 24

5.4 Cost Benefit Analysis 25

6.0 Disaster Recovery 26

6.1 Hot Sites 26

6.2 Cold Sites 26

7.0 Critical Evaluation 27

8.0 Appendices 29

8.1 Reference List 29

8.2 PEST Analysis 33

8.2.1 Political Factors 33

8.2.2 Economical Factors 33

8.2.3 Social Factors 35

You May Also Find These Documents Helpful

  • Powerful Essays

    IS 535 Essay Example

    • 1001 Words
    • 4 Pages

    helps a firm identify points at which information technology can most effectively enhance its competitive position.…

    • 1001 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Assignment 1

    • 1252 Words
    • 6 Pages

    Companies use information as a weapon in the battle to increase productivity, deliver quality products and services, maintain customer loyalty, and make sound decisions. Information technology can mean the difference between success and failure…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U1L1

    • 1084 Words
    • 5 Pages

    Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    How can information technology support a company’s business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.…

    • 1037 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities and map them to the domain that these impact from a risk management perspective.…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    UW 330 Syllabus

    • 1576 Words
    • 7 Pages

    This course is an introduction to the fundamentals of information technologies and to the strategic opportunities and challenges presented by these technologies. The course is based on the belief that business opportunities and challenges are best addressed through a fundamental understanding of management and technological concepts. Topics covered include e-business, collaboration through IT, databases, telecommunication technologies, and IT security. While there is some introduction to technical details, the real impact of this class is gained by understanding the impact of technology on how business is done.…

    • 1576 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Greeting cards, gift wraps, party goods, candles, balloons, stationery and giftware are manufactured and sold by American Greetings and/or its subsidiaries in the United States and through out the world, primarily in Canada, the United Kingdom, Mexico, Australia, New Zealand and South Africa. American Greetings is headquartered in Cleveland, Ohio and employs approximately 26,900 employees worldwide.…

    • 4436 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Cis500 Week 2 Assignment

    • 1948 Words
    • 8 Pages

    Turban / Volonino (2011) Information Technology for Management: Improving Strategic and Operational Performance 8th Edition…

    • 1948 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Best Essays

    British Airways

    • 3116 Words
    • 13 Pages

    This report will be based upon a promotional plan for revenue enhancement, consisting of a marketing audit of British Airways (BA). It is essential to gather and explore most recent published company information, in order to examine the overall marketing performance of the company. This would further permit a detailed and applicable marketing review of British Airways marketing performance for a given period of time, in relation to internal examination covering a Marketing Mix of their performance and undertaking a SWOT analysis. The external audit will scrutinize the PEST factors of the general business environment. In order to fully comprehend the position of British Airways within the market, a Competitive Analysis (Porter’s 5 Forces) will be taken into account in two ways; one being in a traditional sense and two the competitive structure of the industry.…

    • 3116 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    Risk Assessment

    • 1788 Words
    • 8 Pages

    Almost every company in business is face with some risk or potential threat that could cause a huge blow to their organization operations. These risks and threats usually comes from within or outside and organization. In order to prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risk so they could protect themselves from the harm caused by them. Risks involve theoretical effectiveness of security measures, loss of impact, threats and vulnerabilities that are common in today's society.…

    • 1788 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Responding to the Wii

    • 1022 Words
    • 5 Pages

    One of Sony’s largest threat and competitor is Nintendo. Nintendo sold 32.4 million units for the Wii, while Sony sold 15.5 million units. While Sony was occupied retaliating to Microsoft’s X-box video game console, Nintendo rose to take number one position in the video game industry. In 2007, Sony lost 9.7% of its Operating Margin, while Nintendo was up to 58.8% in millions of dollars. This is an important issue because Sony has been at the top of the…

    • 1022 Words
    • 5 Pages
    Good Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    Information security basically refers to the methods and processes which are mainly designed for the safety of electronic, print or any other confidential information. It is designed to prevent the private and confidential information from unauthorized access, disclosure, misuse, destruction, disruption or modification. The terms computer security, information assurance and information security are used interchangeably. All these fields are linked with each other and share the basic targets of protecting the confidential information. These days several vulnerabilities are faced by IT companies and security organizations in Washington DC. They are mainly linked with the erosion of long duration of competitiveness and rational property loss. There are enormous risks associated with these types of security industries and business men. For this purpose, our company has introduced effective solutions to guarantee the security of information system (Pagani, 2005).…

    • 1119 Words
    • 5 Pages
    Best Essays