Anda di halaman 1dari 5

Company Property Village Berhad @ Ioi Palm Villa Golf and Country Resort

Club on System (use by 3 departments)

1. Registration Department
Registration system for the golfer.
To update the number of voucher (Receipt).
For daily operation report.
Include booking caddy and facilities, and sales.

2. Marketing Department
Use the system for membership registration (every golfer had different rates and advantages).
Check availability date for room and hall.
Update event.
Membership.
Renew or register membership.
Tax invoice issued.
Provide sales teams with high-quality leads by running advertisements that include a reply mechanism, such as
a coupon or telephone number, or by encouraging visitors to the company website to register their details in
return for a free newsletter or special report.
Setting marketing strategy in line with overall company strategy and objectives.
Plan campaigns and develop communications material to promote products and services to customers and
prospects.

3. Finance Department
Check all the voucher number.
Ensure all the daily operation is working well.
Check all the bill have been issue to customer.
All the mistakes this department will be detect.
Issues Explanation Suggestions
Server problem (double booking for - Most of the customers swap All GUI functions using database
caddy) booking at the morning and queries have been sped up by an
- Cannot involve in double booking evening. appreciable amount when server is
(Caddy) - Many of them had an earlier upgraded. Most responses that took
booking few seconds before are now quick.
- The staff need to cancel off the Only some functions, like reading and
customer booking since the club do filtering longer log histories or
not have enough caddy loading data for therapy protocols,
- Limited for key in the price and
still take several seconds. (Mosthaf,
quantity for cuddy in the system
2011)
- A lot of problem come from the
golfer (add/less caddy)
Out-dated hardware - Computer is too slow The hardware can improve system
- Computer wont turn on throughput through better
- Suited program is not working well replacement policies by allocating
more cache resources to applications
that benefit from the cache and less
to those applications that do not.
(Craeynest, 2012)
Less user friendly - Golfer had difficulties to know how Users can manage the layout of the
many fees that they have paid, interface by resizing and rearranging
recurring charges, and membership the windows. Each window can be
dues. pinned or minimized to the side or
the bottom of the screen.
Furthermore, MASH Suite allows users
to adjust the data analysis criteria
and manually validate the
automatically processed results.
(Guner, 2014)
Limited access to information. - limited time access to sales data Falls in communication costs will
( cannot access report at any time) tend to reduce employee autonomy,
- it cannot interface to the top as decisions will be passed up to the
financing department centre of the firm. Falls in information
acquisition costs will have the
opposite effect, facilitating more
effective employee decisions making.
(Bloom, 2014)

Public Institutions University Malaysia Perlis (UniMAP)

Academic Information System, AMIS (used by 5 departments)

1. Account & Finance economic


2. Marketing Department
3. General Management
4. Technology Management
5. Entrepreneurship

Issues Explanation Suggestions


Server down There are many users in one time Replacing the aging server structure
Too much traffic will cause server to with a new, Blade centers have
lag several advantages over classical
Increasing loading time servers. It has more processing power
in less space, modularity, and ease of
upgrading take out and add in
server blades while the system is up
and running, better consolidation of
power supplies and reduction of
overall power consumption. (Mosthaf,
2011)
Prone to hacking activities Data theft occurs sometimes Using different approach to secure
Stolen information could be the cloud using decoy information
sensitive technology, that we implement Fog
Personal information could be computing. This technology to
wrongly used launches disinformation attacks
against malicious insiders, preventing
them from distinguishing the real
sensitive customer data from fake
worthless data. (Stolfo, 2012)

References
Bloom, N. (2014). The distinct effects of information technology and communication technology on firm organization. .
Management Science, 2859-2885.

Craeynest, V. (2012). Scheduling heterogeneous multi-cores through performance impact estimation. ACM SIGARCH
Computer Architecture News, 213-214.

Guner, H. (2014). MASH suite: a user-friendly and versatile software interface for high-resolution mass spectrometry data
interpretation. Journal of The American Society for Mass Spectrometry, 464-470.

Mosthaf, J. (2011). UPGRADE OF THE SERVER ARCHITECTURE FOR THE ACCELERATOR CONTROL SYSTEM AT THE HEIDELBERG
ION THERAPY CENTER. ICALEPCS2011. Grenoble.
Stolfo, S. J. (2012). Fog computing: Mitigating insider data theft attacks in the cloud. In Security and Privacy . IEEE Workshop,
125-158.

Anda mungkin juga menyukai