Friday, December 6, 2019

Business Commerce Development of Organization

Question: Describe about the Business Commerce for Development of Organization. Answer: 1: The success and the development of the organization depend upon the training and are fruitful to the employer as well as employees. The training of employees would help in making the employees productive and efficient and they would deliver quality performance and the wastage of time, resources and money would reduce. Training helps in providing job satisfaction and job security to employees. It will make the employees well acquainted with the tasks and will need less supervision and thus cutting down the organizations expenditure. Under simulation, the employees are asked to perform the job that they would encounter while being on the job. Say, the sales people in an organization might role play the situations of sales to simulate interacting with the customers. 2: 2a: Involvement of the end users in the organizational change is very important and there can be various factors responsible for the resistance of the end users. This can be lack of support from management; lack of involvement in the process of implementation, technical quality of the new warfare system might be poor which leads to innate resistance. Due to the poor interaction between the users of the system and designers, the end users resist to adapt to the new system. The new system might not have clear benefits and the training facilities might be inadequate. 2b: The training program should engage the employees effectively and the organization should seek the feedback from the employees. Therefore, the training should have two way communications as this would enhance the employees participation. The changes should be communicated effectively in the training program. The training program should be so designed to overcome the opposition and explaining the employees about the need for the change should be done in the training program. 3: Ergonomics helps in assuring the legitimacy of the overall process of the electronic voting system. It has a important role to play in producing the electoral usability and electoral users experience. This ergonomics would help in accommodating all the voters on the day of election. The HCL provides the guidance about the usability of designing of the privacy mechanism in the electronic voting system. It considers the privacy more fully and the designs apply to the security. The reviews and the study by the experts oh HCI would help in designing the electronic voting system[1]. 4: The questions developed are as follows: What is the need of evaluation? The need of evaluation is that the designers become too entranced and this may include the likings and the fallacy concerning sunk cost. How to test? The test is carried out such as usability test and acceptance test. The usability testing includes the remote usability testing which is done via web, discount usability testing and competitive usability testing. Acceptable test is done by setting the performance goals such as measurement and objectivity. What is the budget for testing? The testing would include the budget so that all the cost in carrying out the evaluation is sufficed. What is the timing of testing and mode of carrying test? The test is carried out either using the websites or the traffic control system. The timing of test would be that is carried out at regular interval. Is the test required? Yes, the test is required and it may about the matter concerning the government, military and safety issues. The test is the usability and it is highly diverse and it is carried out in the portable labs and field test What is an expert? The review from the experts can be conducted during the process of designing and rather that improving the specific things and focus on being comprehensive. What gets logged? Logging is important and sometimes tedious and there is need to focus on user interface and it is done using new approaches and the software that would help in logging are Morae, Live logger and Spectator. What is need for logging? There is continuous logging and the system gets logged for evaluating the performance speed and keeping the track record of errors, web analytics and tracking the features which have been used in the product. What are privacy ways? The privacy of the various software is done by making use of the software installed in the product. Privacy is an important factor for the user interface. What about companies? The companies selected for the purpose of preparing the interface questionnaire is the software companies and the companys manufacturing and producing the video games. What is the analysis basis? The basis of evaluation is that the software used is user friendly or not What is the technique and basis of evaluation? The evaluation is done after the product is released and the evaluation basis is case study, interview with users on individual basis and group discussion. The results deducted from the above questionnaire is that the user interface needs to be tested and evaluated on various basis. 5: The various issues faced are regarding the lack of willingness to share the informations. The hospitals are reluctant in sharing the information about the propriety and funding system and do not show the positive attitude toward sharing the critical information and they fear about the criticism. There is the issue regarding the allocation of funds and the availability of the funds. The standard concerning this is difficult to follow because there is lack of national approach and does not have clear planning and the framework of governance. The centre should ensure that there is the availability of sustainable funds and the government should reallocate the budgets. The government should provide the guidance to the medical centers regarding the standards, policies, framework and the system of development and the implementation. There should be laws governing the protection of privacy of these migrating data and the records of the medical centers. Professionals would be educated with the codes and the designs required for the privacy purpose. 6: The push and pull delivery model is the approach used for exchanging the data between the distinct entities. The pull model is based on response paradigm and conversely push model is based on the distribute or publish paradigm. The function of pull model is similar to the client pulling off the data from the server. Under the pull model, the transferring of the data is initiated by the client. On the other hand, under the push model, the data is individually transferred by the agent to the client either asynchronously or on a regular basis via a scheduler. The example of push model is the network monitoring. 7: The threats to the information security are due to the vulnerability which is associated with the platform of internet itself and there might be problems with the clients computer. The automated buying of vote is another threat which would lead to comprising of election. The system of voting may be attacked by the insiders and electronic the voting system might be attacked with the specific virus which leads to loss of privacy, disenfranchisement and vote theft. Another threat to voting system is spoofing. Overcoming the threats: The public and individual PCs needs to be protected and the compliance have to be assured. There needs to be adequate documentation and audit should be carried out independently and there is the control over the physical assets. The threat of spoofing can be overcome by using the encrypted personal identification number. 8: Non repudiation can hardly be achieved in the paper based communications. Non repudiation is for the authentication and the requirement is stronger. The authentication comes from convincing the other parties and there is a need of proving to the third party. The transaction has a need for non repudiation of the service. Repudiation is one of the issues in the paper based communication and the transactions and services is the key role in the non repudiation services. Non repudiation is a parameter which modifies the different requirements and the policy of non behavior depends upon the legal and technical supports. 9: The change management is crucial for the organizations to remain competitive. The company is forced to respond in view of changing technology and globalization of markets. The organizations after adapting the change are able to increase the engagement and the performance of the employees. The cost of operation of the company would be reduced in lights of the implemented change. Change management would also minimize the resistance and enhance the innovation[2]. The change management can be done through restructuring the organization. For example, the British airways have restructured the entire organization due to the inefficiency and the wastage of the resources. For the company to embrace the change, the company had to be restructured. 10: The VCF was developed without the inadequate assessment of the various alternatives and it did not conform to the architectural standards. This was done in the way that there was no incorporation of the significant commercial off the shelf softwares. The requirement of the system was not consistent and did not map to the needs of the users. The system of architecture, operations and the documentation was not incomplete that lead to the failure of the VCF. The designing of the documentation and the requirement were imprecise and not complete and there was gap in the tracing of designs and it was difficult to maintain the softwares. 11: The post implementation review is important and essential component of the project and it identifies the opportunities for further improvement and provides for the checking of the benefits. The PIR gives the surety about the investment done in any project. The achievement, deliverables and the success of the project is determined by the post implementation review. The PIR should be undertaken some time after the solution has been deployed. Depending upon the type of environment and solutions, the period ranges from six weeks to six months. The PIR need to be drafted in consultation with the portfolio regulatory reform and the area of the PIR can be improved in accordance with the regulation practices. 12: The Queensland treasury was not the professional managers and was not experienced system implementers and it was not standardized system which was headed by the prime contractor. There was absence of the internal requirement and the contract schedule did not document properly the requirement if the government and the government did not communicate properly its requirement. The failure was also attributable to the delay that it suffered during the roll out of the SAP based system. The government did not detail the specifications accurately. The delay in establishing the mutually agreed baseline impacted the aspect of the project that impacted the phase of testing and implementation. Reference: Burton, Craig, Chris Culnane, and Steve Schneider. "vVote: Verifiable Electronic Voting in Practice."IEEE Security Privacy14, no. 4 (2016): 64-73. Hayes, John.The theory and practice of change management. Palgrave Macmillan, 2014.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.