logo

Business Information Systems

   

Added on  2023-04-04

9 Pages2205 Words327 Views
Running head: BUSINESS INFORMATION SYSTEMS
BUSINESS INFORMATION SYSTEMS
Name of the Student
Name of the University
Author Note

BUSINESS INFORMATION SYSTEMS 1
Question 1:
For identifying the value which the SSL derives from the portfolio that are belong to
the information systems, this is imperative for classifying the applications that are existing,
procedures as well as the people in according with the Ward and Griffith Matrix. The IT
resources that are physical at the SSL has comprised of the IBM AS/400 minicomputer, PCs
as well as the activities of the WAN. At the firm the software are including the budgeting and
costing software, Pegasus payroll system, productivity type packages and the rostering and
routing software (Changhui, & Ju, 2013). The resources of the IT human at the SSL is
including the ex-policeman who are working at the private Transport division, on the other
side the twenty four year old business computing graduate that are working in the division of
the business security, four programmers, hybrid manager, the programmer or analyst, two
computer operator systems and six data entry clerks. The value that considered as the primary
value for the resources of the IT offer to the SSL is for acting as one of the support system.
All of the assets that have been fallen under the category is including all of the software at the
organisation that makes this possible for running the functions of the business (Das, &
Samdaria, 2014). As example, the Pegasus payroll packages are easing the procedure of the
payment hence associating with the business for maintaining the staffs who are highly
motivated.
All of the other values of the portfolio is, this is able to contribute for the
operationalization of the procedures of the SSL as well as the activities. For the instance, the
AutoRoute based applications that can run on the pcs in the department of the transport of the
division of the private transport that helps in planning as well as scheduling all of the routes
for optimizing the operations of the business (Fabian et al., 2013). The network that is
running on the LAN network helps for the maintenance of the communication that is

2BUSINESS INFORMATION SYSTEMS
seamless between the various departments that belongs to the Home office service division.
One more vale that is delivered by the resources of the IT at the SSL has been steering the
organisation that is towards to the realisation of the goals that are set as well as the objectives.
For illustrating the package of the business productivity in the PCs of the services of the
home office helps to determine the level of the productivity in the organisation.
At present the technology, there does not exist any of the denying that the SSL may
invest in the infrastructure of the IT. One of the metric is the period of the payback for
assessing how much this may take for recuperating the resources that are related to the
finance utilized in the investments of the IS.
Question 2:
Remarkably, many of the parts of the organization come up short on a lucid IS
technique a deficiency that may severe the organization's supportability as well as
aggressiveness. Consequently, there is a requirement for building an IS procedure which is
supportive to the business system. One of the ways in which the organization can plan a
compelling IS procedure is to lead a basic achievement factor investigation to build up the IT
requirements of each office and specialty unit of the organization (Hussain, 2013). Every
division or specialty unit is having the basic capacities that if not very much tended to, they
can slow down the company's tasks. In this way, recognizing the basic achievement factors in
each office would figure out where IT speculations are generally required. To delineate, a
vehicle office is probably going to require a course-arranging bundle in excess of a business
office or promoting unit. Besides, directing an esteem chain investigation will assist the
business with identifying its present IT capacities just as those advantages that provides a
focused edge. In the wake of distinguishing the IT resources, which are uncommon, special

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Service Limited Case Study
|9
|2477
|359

Security Services Limited Case Study
|8
|2306
|336

Information Technology for Business
|9
|2255
|319

Information Technology for Business
|10
|2211
|374

Business Information Systems
|9
|2225
|479

Business Information Systems
|12
|2358
|185