NTUC case study. On June 1, 2003, Income succeeded in the migration of its legacy insurance systems to a digital web-based system

Modernization of NTUC Income CASE STUDY NTUC Income (Income), one of Singapore's largest insurers, has over 1.8 million policy holders with total assets of S$21.3 billion. The insurer employs about 3,400 insurance advisors and 1,200 office staff, with the majority located across an eight-branch network. On June 1, 2003, Income succeeded in the migration of its legacy insurance systems to a digital web-based system. The Herculean task required not only the upgrading of hardware and applications, it also required Income to streamline its decade-old business processes and IT practices. Up until a few years ago, Income's insurance processes were very tedious and paper-based. The entire insurance process started with customers meeting an agent, filling in forms and submitting documents. The agent would then submit the forms at branches, from where they were sent by couriers to the Office Services department. The collection schedule could introduce delays of two to three days. Office Services would log documents, sort them, and then send them to departments for underwriting. Proposals were allocated to underwriting staff, mostly randomly. Accepted proposals were sent for printing at the Computer Services department and then redistributed. For storage, all original documents were packed and sent to warehouses where, over two to three days, a total of seven staff would log and

  • Word count: 1212
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Organisational Information Systems. In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes

In this assignment I will be discussing software used in my chosen department and the key work processes, identify and explain the key mobile devices used and how the internet used by the employees, and which would be the best methodology to improve systems. Task 1 In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes. According to Z.Hussain (2009) a system ‘is a set of interrelated parts, arranged into an organized whole or orderly structure’ systems within accounting are very systematic a methodical as all decisions is made according to plans. A system contains many sub systems, these are smaller systems (departments) within the system that work to run the system effectively and efficiently, these sub-systems may be different but they are interrelated as they share data/information between each other to goals that help towards filling the larger goals of the accounting system. Figure.1 ACCOUNTS MANAGEMENT FINANCIAL Budgeting Sales Absorption Costing Cash Flow Depreciation Break Even Profit/ Loss Ratios Marginal costing Income Statements Investment Appraisal Financial statements Figure.1 – The chart above shows that accounts can be separated into two sub systems, and can further be decomposed into sub-sub systems. By decomposing a

  • Word count: 4826
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Why has database security become such an important issue for companies these days? What are the key principles that should form the basis of a corporate strategy for information security?

Why has database security become such an important issue for companies these days? What are the key principles that should form the basis of a corporate strategy for information security? In order to establish why database security has become such an important issue for companies nowadays it first needs to be established what is database security and why the protection of the aforementioned is of such critical importance to companies. As relates to security it is the protection of assets from threats. Therefore the definition of database security can be taken to be the protection of information from threats, protecting information systems, data, messages, and information processed, stored and communicated through information systems. Through database security a company ensures the protection and security of systems, media and facilities which process and maintain information vital to its operation[1]. This is the reason for the increased importance to this issue by many corporations. In an effort to protect vital information which would be within the systems of these organizations database security over the years has become more stringent. With information such as personal details on employees, customers, and other individuals, their financial information or transactions, trade information, e-mails; videos, software, and loads of other information if access by the wrong

  • Word count: 527
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

What are the legal requirements for ensuring information security relating to business organizations? How can these legal requirements for ensuring information security be met in typical modern companies? Explain your answers with reference to practical examples from your own knowledge and experience wherever possible.

The Legal requirements For data or information to be useful, at the minimum, the key principles of confidentiality, integrity and availability of data upon which the concept of information security is built must be met and this inevitably is in tandem with the legal requirements for any jurisdiction.[1] Legal requirements for most jurisdictions usually have the internal looking requirements[2] which provide for steps that an organization is required to comply with and the outward requirements which are punitive measures in cases of breach or noncompliance.[3] Internationally there is no uniform standard or approach for ensuring information security and different jurisdictions have adopted different approaches.[4] As private data has become increasing vulnerable to exposure, the focus in most jurisdictions is to ensure that the privacy of individuals during transactions is protected[5]. Smedinghoff has summarized the legal requirements generally as the duty to provide security, the legal standard upon which that duty or obligation is based and the duty of notification in case of breach.[6] Therefore in the United States, the approach initially was sector specific[7] but is now increasingly moving towards general requirements,[8] while the approach in Europe[9] for example is the general / omnibus approach. Generally all jurisdictions make provision for protection of

  • Word count: 1086
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

You will see from your reading that the EU considers cybercrime as a very serious issue for business, in and between Member States. What do you see as the main potential threats posed by the widespread use in modern business of information technology and databases of personal information? How can the law be extended to protect against these threats without stifling technical innovation and business activity more than absolutely necessary?

As the development of computers, networks and the Internet has accelerated and become part of everyday life, the new cyberspace has created an environment for criminal offences. Information security is concerned with protecting the information confidentiality, integrity and accessibility1. Cybercrime is on the rise, but its transnational character poses difficulties in implementing statutes and regulations which effectively counter the vulnerabilities. What do you see as the main potential threats posed by the widespread use in modern business of information technology and databases of personal information? The protection of privacy and data is a key challenge in today's society, characterized by extensive amounts of sensitive data being located in databases vulnerable to attacks and misuse. Threats may manifest themselves as physical and environmental, technical and people-based2. The European Convention on Cybercrime3 defines computer related crimes as (a)computer related forgery and fraud, (b)content related offences covering activities related to the distribution of illegal content and (c)infringements of intellectual property rights and related rights4. From a business perspective, forgery and fraud, as well as intellectual property breach, should both pose reasons for concern. E-commerce is reliant on building consumer trust, which would undoubting be breached if

  • Word count: 736
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

SYSTEM ANALYSIS

COURSEWORK REPORT COURSE: SYSTEM ANALYSIS COURSEWORK ID: LECTURER: MAY 2006 TABLE OF CONTENTS TITLE PAGE 1 TABLE OF CONTENTS 2 INTRODUCTION 3 EXECUTIVE SUMMARY 4 PURPOSE OF THE SPECIFICATION 4 USER ENVIROMENT 5 OPERATING ENVIROMENT 5 HARDWARE REQUIREMENT 5 SOFTWARE REQUIREMENT 6 ISSUES 6 FUNCTIONAL REQUIREMENTS 6 DATA DICTIONARY 8 DATA MODEL 10 PROCESS MODELS 13 BEHAVIOURAL STRUCTURE 18 REFERENCES 19 INTRODUCTION According to the specification supplied, the new system to be developed is for a short course institute. "The short course institute runs computing courses for members of the public and IT professionals. The institute offers certification from many of the major computing organizations (e.g. Oracle Certification, .Net Certification, C# etc.). The organizations provide the certification tests. The courses are scheduled a year in advance and then marketed in trade magazines and on the internet. Bookings are received either by phone or over the web. Bookings are taken from individuals or from companies who may choose to take advantage of a discount available for multiple bookings. A multiple booking will be for more than two places and a discount of 20% is available. The number of places on a course is limited based on the size of the room where it will be

  • Word count: 3205
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay