Preview

Information Systems Strategy at the Toronto Stock Exchange

Satisfactory Essays
Open Document
Open Document
367 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Systems Strategy at the Toronto Stock Exchange
Noémie Bretton

!
!

September the 10th 2014

Information Systems Strategy at the Toronto Stock
Exchange

!
The exchange industry is undergoing a transformation brought about by globalization of financial markets, consolidation of exchanges, and the introduction of new competitive players due to technological advancements. The Toronto Stock Exchange (TSE) is Canada's largest equity market and has created and started to implement a plan to deal with these threats. Concurrently, the TSE has been recreating its technological platform, moving from its computer assisted trading system to the Torex system purchased from the Paris Bourse.
Implementation problems have delayed the project from its original release date to three years later.
During the time frame of this implementation, the TSE suffered several computer glitches causing closure of the exchange for temporary periods of time. The president and CEO needs to review the priorities of the TSE and consider what actions she should take to ensure the successful implementation of this new technology, and the long term alignment of information technology with
TSE business strategies.
The main issues for the Toronto Stock Exchang (TSE) company has been task of reconstructing the
TSE to succeed in the face of significant industry and technological change.

!
The recommendation for this case would be to focus on the security and the problems related to the system TOREX. Indeed, in this domain programs interruptions or issues with the system can make loose a lot of customers and money. TSE should invest in qualified employees and in Research and
Development to improve his system for trading shares. Advances in technology included extensive connectivity and very low communication costs. Having low cost, advanced tech creates a competitive advantage against other companies.
Furthermore, TSE should focus on the two key ingredients for successful exchange: liquidity and quality. Liquidity is

You May Also Find These Documents Helpful

  • Good Essays

    Case 11-3

    • 1134 Words
    • 5 Pages

    actions cannot be taken without unanimous approval of the Board: appointment and removal of the CEO, decision to make calls for capital contributions, admission of new joint venture…

    • 1134 Words
    • 5 Pages
    Good Essays
  • Good Essays

    question

    • 821 Words
    • 7 Pages

    need to identify the issue, then refer to relevant legislation and/or case law, and apply them…

    • 821 Words
    • 7 Pages
    Good Essays
  • Good Essays

    caregroup

    • 721 Words
    • 4 Pages

    with a contingency plan to deal with failures or breaches to the system should have been in place.…

    • 721 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    SEC571 tips

    • 460 Words
    • 2 Pages

    In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area. You will then identify potential security weaknesses.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3.1. Explain how to support others to understand the need for secure handling of information…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Please see the summary of the issues that arise because of the implementation delay, and the evaluation of possible course of options to resolve them.…

    • 2648 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

     Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    We also see a plan designed to not only implement a new system but also a designed plan to make sure that the system will be adequate for the expected development of this organization. Shown also in this briefing is how the growth of this organization is demanding a growth in the information technology that this organization will need to move forward into the future. The stakeholders’ influence is also covered in this briefing. Showing the benefit of our stakeholders and examples of these benefits gives proof that the move to a new system is beneficially for us all. That being said the belief is that a new system is necessary and needs to be implemented soon. Employees have the important part of implementing the changes that will take place. They are to try and show how using the new information system will benefit the organization, and possibly save money. Investors relay information between the other organizations. The community within which an organization operates shows support to the organization and allows the community to make their decisions, what they want to take place, and what they know about the new…

    • 948 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Inform employees about the existence of the Exchange and give a description of the services provided by the Exchange;…

    • 5324 Words
    • 22 Pages
    Good Essays
  • Best Essays

    Wireless Technology Upgrade

    • 3174 Words
    • 13 Pages

    Since the introduction of the first mobile phone in 1924, there has been a steady climb in developing and enhancing, the mobile phone and its supporting technologies. The cellular network infrastructures as well as service providers have been hard at work; in making sure they are providing the best service as well as devices. The infrastructure alone has gone through several life cycles. Which is required in order providers to keep up with growth and technology changes. Wireless cellular providers, at one point offered services that ran off analog frequencies. Today the wireless networks are built off of an all-digital network, which is considered to be in its 3rd generation. 3rd generation technologies include GSM, GPRS, UMTS and CDMA.…

    • 3174 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Rough Seas on the Link650

    • 909 Words
    • 4 Pages

    INSTRUCTIONS: Read the following case study and answer the questions given at the end of the case.…

    • 909 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Marketing

    • 3647 Words
    • 24 Pages

    if all the conditions for an exchange are in place, then the exchange will be completed…

    • 3647 Words
    • 24 Pages
    Good Essays
  • Powerful Essays

    case study

    • 2398 Words
    • 10 Pages

    is losing customers, because fewer options are available for the customer. And third risk is…

    • 2398 Words
    • 10 Pages
    Powerful Essays