This document discusses the value of SSL's information systems portfolio and the need for an effective IS strategy. It explores the challenges and opportunities in implementing IS investments and highlights the importance of centralized IT management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BUSINESS INFORMATION SYSTEMS BUSINESS INFORMATION SYSTEMS Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
BUSINESS INFORMATION SYSTEMS1 Question 1: For identifying the value which the SSL derives from the portfolio that are belong to the information systems, this is imperative for classifying the applications that are existing, procedures as well as the people in according with the Ward and Griffith Matrix. The IT resources that are physical at the SSL has comprised of the IBM AS/400 minicomputer, PCs as well as the activities of the WAN. At the firm the software are including the budgeting and costing software, Pegasus payroll system, productivity type packages and the rostering and routing software (Changhui, & Ju, 2013). The resources of the IT human at the SSL is including the ex-policeman who are working at the private Transport division, on the other side the twenty four year old business computing graduate that are working in the division of the business security, four programmers, hybrid manager, the programmer or analyst, two computer operator systems and six data entry clerks. The value that considered as the primary value for the resources of the IT offer to the SSL is for acting as one of the support system. All of the assets that have been fallen under the category is including all of the software at the organisation that makes this possible for running the functions of the business (Das, & Samdaria, 2014). As example, the Pegasus payroll packages are easing the procedure of the payment hence associating with the business for maintaining the staffs who are highly motivated. Alloftheothervaluesoftheportfoliois,thisisabletocontributeforthe operationalization of the procedures of the SSL as well as the activities. For the instance, the AutoRoute based applications that can run on the pcs in the department of the transport of the division of the private transport that helps in planning as well as scheduling all of the routes for optimizing the operations of the business (Fabian et al., 2013). The network that is running on the LAN network helps for the maintenance of the communication that is
2BUSINESS INFORMATION SYSTEMS seamless between the various departments that belongs to the Home office service division. One more vale that is delivered by the resources of the IT at the SSL has been steering the organisation that is towards to the realisation of the goals that are set as well as the objectives. For illustrating the package of the business productivity in the PCs of the services of the home office helps to determine the level of the productivity in the organisation. At present the technology, there does not exist any of the denying that the SSL may invest in the infrastructure of the IT.One of the metric is the period of the payback for assessing how much this may take for recuperating the resources that are related to the finance utilized in the investments of the IS. Question 2: Remarkably, many of the parts of the organization come up short on a lucid IS techniqueadeficiencythatmayseveretheorganization'ssupportabilityaswellas aggressiveness. Consequently, there is a requirement for building an IS procedure which is supportive to the business system. One of the ways in which the organization can plan a compelling IS procedure is to lead a basic achievement factor investigation to build up the IT requirements of each office and specialty unit of the organization (Hussain, 2013). Every division or specialty unit is having the basic capacities that if not very much tended to, they can slow down the company's tasks. In this way, recognizing the basic achievement factors in each office would figure out where IT speculations are generally required. To delineate, a vehicle office is probably going to require a course-arranging bundle in excess of a business office or promoting unit. Besides, directing an esteem chain investigation will assist the business with identifying its present IT capacities just as those advantages that provides a focused edge. In the wake of distinguishing the IT resources, which are uncommon, special
3BUSINESS INFORMATION SYSTEMS and important, SSL would then be able to utilize this knowledge to figure out where to make more investments for the IT. Besides, an esteem chain investigation causes a firm for knowing the capacities it is missing however which are fundamental in improving effectiveness. Take for example the way that the present innovation foundation does not bolster computerized correspondence that is between the divisional zones and home office. An esteem chain investigation is able to help in indicating the need put resources into computerized correspondence framework that might improve the association's centre capabilities (Jacobsson, Boldt & Carlsson, 2016). Choosing the IT arranging procedure would likewise be a fundamental advance in causing SSL to structure An IT system, which is steady of the methodology of the business. State that SSL's authoritative structure is a matrix there the heads of specialty units are exclusively responsible for their areas of expertise. In this manner, the IT arranging procedure ought not to veer off excessively a long way from this game plan. Nevertheless, IT arranging is a key capacity,andhence, acentreout or imaginativearranging procedurewould function admirably for SSL's situation. In addition, after that, it would likewise decide whether the system is a long haul or short planned and whether it intends to serve inward or outer needs or both. The present IT system hampers correspondence between the specialty units as well as the base camp, and it additionally prompts repetition. A powerful IT methodology would expel this obstacle and thusly improve the company's ability. Additionally, there is no scope for denying that the newly discovered proficiency would cut down SSL's expense of activities since this should expel duplication of capacities (Leu, Huang & Wang, 2015). To show, there should not be any compelling reason to keep up six information section assistants on the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4BUSINESS INFORMATION SYSTEMS finance since correspondence would be consistent. Thirdly, SSL might pick up an unrivalled upper hand since the innovation foundation should improve the nature of choices as well as help the firm for exploiting new open doors in the market. A business unit director who has another thought which might improve the offer will almost certainly discuss promptly with the headquarter administrators as opposed to holding up till the message lands through manual methods time by that one more firm may have caught the chance. Question 3: At the point when SSL chooses for channelling more assets to IS office, they should assess if these speculations have key advantages to the association in the divisional as well as far-reaching viewpoint. To outline, the residential security division might encounter horde challenges on the off chance that it does not use front line innovation to while promoting new administrations. The clients in the twenty first century are exceptionally requesting as well as require the business for making a special effort to fulfil their needs (Mitropoulos, Othonos & Douligeris, 2013). Likewise, the social stages have expanded purchaser capacity higher than ever. Thusly IS ventures may help improve commitment with clients and at last motivate brand dedication. The providers to SSL's activities, for example, the vehicle vendors and suppliers of regalia are fundamental to the organization's tasks, as well as in the present scene, the IT framework does not encourage trust and correspondence with the providers. For example, in the division of the home security, the firm may utilize the Internet of Things to support security. Another vital potential has the chance to upgrade the centre abilities that are the wellspring of upper hand. For instance, improving a capacity, for example, data handling would convert into the ability of value and opportune choices.
5BUSINESS INFORMATION SYSTEMS The re-engineering of the Business process would prove to be useful in augmenting the capability of IS as well as IT at SSL. BPR should assist the firm with establishing how the business procedures enhance the business. For example, the BPR should take a gander at the obtainment procedure and set up the redundancies as well as the trickeries that make wastefulness simultaneously. Utilizing a VRIO investigation in the BPR would call attention to the procedures, which are most profitable, uncommon, as well as the non-imitable since those are the ones, which are a wellspring of the advantages of the SSL. After this investigation, the BPR procedure would help with building up the procedure, which could accumulate esteem whenever improved via the investments of the IS. The BPR might likewise be the instrumental in distinguishing the procedures, which ought to be wiped out, or those that might be converged with others. Question 4: There is an overwhelming truth about the functions of the IT at SSL; the capacity is circulated over the specialty units with having no focal administration from the central station. It is, hence, no uncertainty that some of the regions that are divisional like the local security division is not having any of the IS ventures while the central command workplaces fall behind to the head office administrations division. Likewise, the disparity in the work force of the IT that is between the different divisions focuses to the absence of a concentrated IT the executives. While the private transport division is overseen by an ex-policeman who has involvement however no preparation in IT, the home office administrations division is plentifullysuppliedwiththeITspecialistsconsideringthenearnessofacrossbreed administrator with IT and money experience and two software engineers. The crumbling in the manner IT is overseen comes from the manner in which the organization has become throughout the years (Muftic,Abdullah & Kounelis, 2016). The firm has developed from natural development from the first centre business, new companies in related security
6BUSINESS INFORMATION SYSTEMS portions and a takeover and merger with organizations offering related administrations. In this manner, in spite of the fact that the business divisions are under the umbrella of one organization they are autonomous in utilitarian zones, for example, displaying, deals and IT prompting the absence of incorporated IT the board. As at per now, the IS not working ideally for serving the organizations targets thus the requirements for investigating a reasonable area for IT benefits later on. About the tasks the executives of the IT foundation, a unified administration framework should help to improve the proficiency and furthermore add to cost decrease since each office does not need to contract its professional. For example, a unified IS activities the executives shall put the obligations scope organization and reinforcement in hands of one division. IT staffing and engineering ought to be interlaced with other vital destinations as this is the best way to infuse a culture of utilizing on IS for advancing the business activities. Database organization additionally should be overseen from a focal area. The main capacity that ought to be decentralized is client bolster capacities like assistance work area backing and shared administrations since these fluctuate from one unit to another.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7BUSINESS INFORMATION SYSTEMS References: Changhui, Y., & Ju, K. (2013). Research on business process and e-business platform design for barter trade.Information Technology Journal,12(19), 5315-5320. Das,M.L.,&Samdaria,N.(2014).OnthesecurityofSSL/TLS-enabled applications.Applied Computing and informatics,10(1-2), 68-81. Fabian, B., Kunz, S., Müller, S., & Günther, O. (2013). Secure federation of semantic information services.Decision Support Systems,55(1), 385-398. Hussain,M.A.(2013).Astudyofinformationsecurityine-commerce applications.International Journal of Computer Engineering Science (IJCES),3(3), 1-9. Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system.Future Generation Computer Systems,56, 719-733. Khanh Dang, T., & Tri Dang, T. (2013). A survey on security visualization techniques for web information systems.International Journal of Web Information Systems,9(1), 6- 31. Leu, F. Y., Huang, Y. L., & Wang, S. M. (2015). A Secure M-Commerce System based on credit card transaction.Electronic Commerce Research and Applications,14(5), 351- 360. Mitropoulos, S., Othonos, C., & Douligeris, C. (2013). An effective and secure web banking system: development and evaluation.International Journal of Business Information Systems,12(3), 335-361.
8BUSINESS INFORMATION SYSTEMS Muftic, S., bin Abdullah, N., & Kounelis, I. (2016). Business information exchange system withsecurity,privacy,andanonymity.JournalofElectricalandComputer Engineering,2016. Nakhumwa, N. J. (2014). Adoption of e-commerce payment systems by commercial banks in Kenya.INTERNATIONALJOURNALOFMANAGEMENT&INFORMATION TECHNOLOGY,9(2), 1600-1622. Rhodes-Ousley, M. (2013).Information security: the complete reference. McGraw Hill Education. Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges.IEEE Access,4, 1375- 1384. Sari,A.,&Onursal,O.(2013).RoleofInformationSecurityinE-Business Operations.InternationalJournalofInformationTechnologyandBusiness Management,3(1), 90-93. Uddin, M. S., & Akhi, A. Y. (2014). E-wallet system for Bangladesh an electronic payment system.International Journal of Modeling and Optimization,4(3), 216. Yang, J. J., Li, J., Mulder, J., Wang, Y., Chen, S., Wu, H., ... & Pan, H. (2015). Emerging information technologies for enhanced healthcare.Computers in industry,69, 3-11.