Explore BrainMass
Share

Information Systems-Insurance

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Insurance Insurance, a multi million-dollar life insurance firm, has asked you to help troubleshoot the network at its corporate headquarters. The network manager admits that he has not kept very close tabs on the network's growth over the last year, and he thinks this omission has something to do with the congestion problems.

The Marketing Department, which is experiencing the worst network response, has added 40 people in the last six months to make a total of 146 people. At some times during the day, the marketing director has complained of waiting 10 minutes before one small e-mail message can get across the wire.

He shows you to the telecommunications closet that serves the troubled department. Inside, you find a stack of eight expensive new hubs, blinking away.

In 2-3 paragraphs, complete the following:

-Discuss with your classmates your thoughts about why these users might be getting such poor response.
-Provide examples as to why you believe this.
-What recommendations would you make to increase the speed of e-mails.

© BrainMass Inc. brainmass.com October 25, 2018, 7:08 am ad1c9bdddf
https://brainmass.com/business/management-information-systems/information-systems-insurance-492379

Solution Preview

The main problem in this scenario is that the network manager has not kept close watch on the network's growth over the last year, which the manager believes is contributing to the congestion issue. The marketing dept. alone added 40 people to bring their head count to 146, and this is where the congestion appears to be the most problematic. The marketing manager opens a closet that has eight expensive new hubs. Why are hubs being used to control a system that serves this many employees? Hubs shouldn't even exist ...

Solution Summary

-Discuss with your classmates your thoughts about why these users might be getting such poor response.
-Provide examples as to why you believe this.
-What recommendations would you make to increase the speed of e-mails.

$2.19
See Also This Related BrainMass Solution

Security, Privacy, and Other AIS Issues

1. Security, Privacy, and Other AIS Issues
You've been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization's AIS. She is also interested in learning more about new and emerging AIS technologies that the organization should consider. You have been asked to provide a report on these areas. Your report will be used as a basis for planning and developing improvements to the AIS.

Prepare a paper to deliver your findings to the CEO. In your paper, include the following:

a. A disaster recovery/contingency plan that includes the following:
b. Identification and analysis of procedures to detect vulnerabilities and security threats (i.e., controls)
c. Identification and analysis of risks and risk mitigation measures, including plans for
i. Systems and data recovery
ii. Off-site data storage
iii. Business continuity
c. An analysis of the impacts of privacy considerations on AIS (i.e., HIPAA)

Use at least two academically peer-reviewed sources and/or your text author to support your work or your text authors. Be sure to properly cite any references used in your summary. Format the summary according to APA style.

peer-reviewed sources :

HIPPA engagement help. (2003, April). Practical Accountant, 36(4), 10.

Justices: FERPA does not give student right to sue. (2002, Summer). News Media & the Law, 26(3), 34.

Abu-Musa, A. A. (2002, September). Computer crimes: How can you protect your computerized accounting information system? Journal of American Academy of Business, 2(1), 91.

Abu-Musa, A. A. (2002, September). Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, 2(1), 150.

Blackwell, R. (2002, June 17). With N.D. vote, privacy debate returns to fore. American Banker, 167(115), 1.

Bradbury, D. (2003, October 28). How to stay on the right side of the law. Computer Weekly, 48.

Crane , B. (2003, June 30). Small business and the new HIPPA privacy and security requirements -- what every Utah CEO needs to know. Enterprise/Salt Lake City, 33(1), 3.

Greenblatt, R. E. & Bakker, J. J. (2004, Spring). HIPAA privacy compliance: It''s time to take it seriously. Benefits Law Journal, 17(1), 102.

McCarthy, E. (2004, May). The best-laid plans. Journal of Accountancy, 197(5), 46.

Millman, G. J. (2004, July/August). Keeping data under lock & key. Retrieved on July 16, 2004 from Smartpros.com at http://www.smartpros.com/x44287.xml.

Naumann, J. W. (2004, May). Tap Into XBRL''s power the easy way. Journal of Accountancy, 197(5), 32.

Odell, P. (2003, February). HIPPA changes require close study, DMA exec says. Direct, 15(2), 9.

Parker, R. G. (2003, May). How to profit by safeguarding privacy. Journal of Accountancy, 195(5), 47.

Phelan, S. & Hayes, M. (2003, April). Before the deluge -- and after. Journal of Accountancy, 195(4), 57.

Richards, J. & Tower, G. (2004, March). Progress on XBRL from an Australian perspective. Australian Accounting Review, 14(1), 81.

Stewart, D. L. (2001, June 29). To protect and to serve. Intelligent Enterprise, 4(10), 42.

View Full Posting Details