Issuu on Google+

THE UNIVERSITY OF DODOMA

College Of Informatics and Virtual Education ASSIGNMENT NO.2

COURSE NAME: Information System management COURSE CODE: IS 240 COUSE INSTRUCTOR: S/n 1 2 3 4 5 6 7 8 9 10

Name MAKAME, MAKAME H TWALIB,MOHAMED A SEMKIWA,HARUNA MBEYELA, JOAN MWOMBEKI,JUDITH MAKOGA, BARAKA A EDWARD, YUSTO MICHAEL, DANIEL E MOSHA, BAZILI K NKANDI, SAMSON

Registration No. T/UDOM/2010/00410 T/UDOM/2010/00441 T/UDOM/2010/00437 T/UDOM/2010/00415 T/UDOM/2010/00428 T/UDOM/2010/00411 T/UDOM/2010/00392 T/UDOM/2010/00417 T/UDOM/2010/00422 T/UDOM/2010/00431

Program B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS

Tuesday, January 31, 2012


Q1. Change management is the processes, tools and techniques for managing the people-side of change; it also includes steps or activities that a change management team or project leader would follow to apply change management to a project or change. As defined by Prosci the most effective and commonly applied change management process contain the following three phases and their processes respectively. 

Preparing for change o Preparation: change management team preparation. o Strategy development: change management strategy definition. o Assessment: Sponsorship model development. Managing changes o Detailed planning: change management plans development. o Implementation: taking actions and plans implementation. Feedback gathering and analyzing o Data collection: o Corrective actions: correct gaps and resistance management. o Recognitions: celebrate success while recognizing individual or group success.

Q2. The two basic ethical theories are Deontologism – in which an intent and not the actual result that determines whether an action is ethical or not and Consequentialism - an action is ethical if all consequences it produce are proved ethical. These results to ethical dilemma on computer crime and intellectual properties issues such as. 

Piracy, the illegal copying of software. o Some argue that some pirating at least should be permitted as it can help to lead to a more computer literate. o But for corporations, in particular, this is very serious issue and can significantly damage margin. Plagiarism, taking of the ideas, writings, drawings, words, or other similar intellectual property created by others and presenting it as your own. o It is generally not a legal issue, like copyright infringement, but it is an ethical one. For example, you can reuse writings in the public domain without worrying about the legal problem of infringing a copyright. o But presenting them as your own without proper credit to their true origin is an act of plagiarism hence plagiarism is unethical. Hackers break into, or ‘hack’ into a system. o Can be done to damage a system or the wish to understand how a system works, so that money can be made out of it, thus unethical.

Tuesday, January 31, 2012


o Alternatively, there might be a desire to alert people to the fact that a system is insecure and needs improving, this is ethical. Q3. CENTRALIZED APPLICATION

UNIVERSITY ORGANIZATION STRUCTURE

CHAIRMAN OF COUNCIL

VICE CHANCELLOR

DEPUTY VICE CHANCELLOR

DEPUTY VICE CHANCELLOR

ACADEMICS

PLANNING

RESERARCH

FINANCE

CONSULTANCY

ADMINISTRATION

DEANS OF SCHOOLS

HEADS OF DEPARTMENTS

DISTRIBUTED APPLICATION

COLLEGE PRINCIPALS

Tuesday, January 31, 2012


Q4. i.

ii.

iii.

Getting Data into shape can be achieved using Enterprise Resource Planning (ERP). ERP systems integrate all data and processes of an organization into a unified system. A typical ERP will use multiple components of computer software and hardware to achieve the integration. A key ingredient of most ERP systems is the use of a unified database to store data for the various system modules. Creating and building an infrastructure for managing the full range of information types can be achieved using Data Warehouses. Data warehouses house data used to make decisions. Also they address internal and external record-based data. The most common data warehoused is customer data, used to discover how to more effectively market to current customers as well as noncustomers with the same characteristics. Helping the firm leverage the tacit knowledge of its employees can be achieved using Knowledge Management System (KMS). Knowledge management (KM) comprises a range of strategies and practices used in an organization to identify, create, represent, distribute, and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organizations as processes or practices. Knowledge Management System efforts typically focus on organizational objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, integration and continuous improvement of the organization.

REFERENCES:   

Teaching ethical issues in Information Technology: how and when, Ruth Rikowski, London South Bank University, UK. Change Management Tutorial Series. http://www.wikipedia.org

Tuesday, January 31, 2012


Information system management Answers