This document discusses the value derived by SSL from its existing information systems, the importance of developing an IS strategy, evaluating IT investments, and the need for centralized IT management. It also highlights the challenges and opportunities in the field of business information systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BUSINESS INFORMATION SYSTEMS Business Information Systems [Name of the Student] [Name of the University] [Author note]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1BUSINESS INFORMATION SYSTEMS Question 1: Identifying the value which is derived by the SSL by usage of the existing information system, is considered to be imperative for the classifying the applications process and the peoples which are already existing in accordance to the Ward and the Griffith Matrix. The IT physical resources of the SSL mainly consists of the PCs, IBM AS/400 minicomputer and the WAN connectivity. Besides this the software of the firm includes the Pegasus payroll package, budgeting & costing software, routing and rostering software, and productivity type packages [1]. The IT human resources is associated with including the ex-policeman working at the Private Transport Division, the 24-year-old Business Computing Graduate working in the Business Security Division, the hybrid manager, four programmers, the analyst/ programmer, six data entry clerks, a system analyst, and two computer operator systems. The 1stvalue which is provided by the IT resources of the SSL includes acting as a support system. The assets which are seen to eb falling under this category is associated with different kind of software which are responsible for making it possible for the business functions to run. Anothervalueisassociatedwithincludingthecontributionsrelatedtothe operationalization of the Process of SSL along with the activities. For example the auto route application which is seen to be running in the computers of the transport department that the Private Transport Division is having and this is associated with helping in the planning and scheduling of the routes for the purpose of optimizing the operations of the business [2]. Additionally the LAN networks are associated with helping in the maintenance of a seamless communication.
2BUSINESS INFORMATION SYSTEMS Steering of the organization towards the realization of the set of goals and objectives is another value. For example the productivity package of the business in the personal computers of the Home Office Services Division which is associated with helping in the determination of the productivity level of the companies and how the productivity can be bolstered. Additionally the IT experts are also associated with holding of strategic and operational value for the company as they are responsible for improving the company’s operational efficiency. The growing pace of the technology is one of the major reason lying behind the need of investing upon the infrastructure by the SSL. In addition to this there also exists a dire need of establishing certain matrices for the purpose of evaluating the investments upon the information systems [3]. One of the metric is associated with including the payback period for the purpose of assessing how long it would be taking to recuperate the financial resources which has already been invested upon the IS. Question two: Considerably it can be stated that many parts of the company is seen to be having a lack of a coherent IS strategy which is considered to be the deficiency that might be very severe for the competitiveness and the sustainability of the organization. For this reason there exists an essential need of constructing an IS strategy which would be providing support the entire business strategy [4]. One way of designing the IS strategy includes the analysis of the critical success factors. This would help in establishing every departments and business units IT needs. Improper addressing the needs would lead stalling of the business operations, so the critical factors needs to be identified for each and every department which would be helping in determination of the areas which needs IT investment.
3BUSINESS INFORMATION SYSTEMS Second of all is the conducting of an analysis of the value chain which helps in the identification of the Existing IT capabilities along with the assets offering a competitive edge. Once identified the IT assets which are rare along with being unique and valuable, would make SSL capable of using the insights so as to determine areas requiring IT investments. Additionally the analysis of the value chain is also helpful in knowing the capabilities having a lack but are important for efficiency improvement. This analysis is also helpful in pointing out the needs related to investments upon the infrastructure for digital communication, helping the organization in improving the core competencies. Determining the IT planning process acts as an integral section of the process of designing the IT strategy [5]. The organizations structure is a matrix where the business heads are having the complete charge of the departments. But the IT planning is associated with acting a strategic function due to which the middle out or the innovative planning process would be working very well for SSL. Followed by this it would also be helping in the determination of the fact that if the strategy is short term or long term and if it is aimed at serving the external and the internal business needs. Success in establishing the IT strategy would be bringing a lot of benefits, one of which is associate dwith including the business capability improvement. One example is the hampering of the communication by the existing IT strategy. Additionally the IT strategy would be helping in removal of the hurdles along with the enhancement of the capabilities. The new founded efficiency would also be helping in bringing down of the operational cost due to the removal of the duplication of the functions which in turn would eliminate the need of keeping six data entry clerks in the payroll system. Followed by this is the gaining of competitive advantage without any kind of rivals as the IT would be helping in taking of improved decisions helping the firm in taking advantage of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4BUSINESS INFORMATION SYSTEMS new opportunities [6]. The business unit manager having the new idea would be associated with improving the value proposition would also be capable of having immediate communication with the headquarters instead of going through a longer process of waiting and at that time some other organization might be associated with seizing that particular opportunity. Question three: When SSL decided to channel more resources to the IT department they would be having the need of evaluating the fact that if the IT investments are having a strategic benefit for the organization in terms of the divisional and the company wide perspective. Being in the security service industry any kind of failure would be responsible for losing customers[7]. Due to this the there is a need of IT investment which would be associated with making the business capable of deliver value which are unique. The IS investments would be helping in improving the customer engagement along with inspiring the business loyalty as well. The SSL suppliers acts as an integral part of the business operations and the existing IT infrastructure is not associated with facilitating the trust and the communication with the suppliers, for example if the supplier of the security office division wants to take a follow up of their payment then it would be very difficult for them as well as strenuous [7]. But with the presence of the State of Art document system would be helping the supplier a lot and would also eliminate the need of making them visit so as to take follow up. Investment in the IT would also beresponsibleforthestreamliningofthesupplychainprocessalongwithhelpingthe organization in differentiating its own products from the others [8]. Another strategic potential is the opportunity for enhancing the core competencies which acts as a source of the competitive advantage.
5BUSINESS INFORMATION SYSTEMS Re-engineering of the business would also be associated with maximizing the IS and IT potentials. This would also help in the establishment of the ways by which the value would be added to the business processes [9]. The VRIO analysis of this is associate with pointing out the fat the processes which are seen to be valuable along with being rare and non-imitable and the reason behind this is that they are associated with acting as the source of the competitive advantage. The analysis would also be helping in establishing process which are capable of accruing the values if they are improved by means of making IS investments. This would also be acting as instrumental in the process of identifying the processes which should eliminated or can be merged. Question four: There exists a particular predominate fact whenever the IT functionalities are considered at the organization SSL and the function is seen to be distributed all across different functional units without any kind of existence of central management from the headquarters [10]. From this it can be stated that there exists no doubt that some of the divisional areas such as the domestic security division is not having any kind of IS investments whereas the headquarters office is also seen to be lagging behind the home office service division. In addition to this the discrepancy existing in the IT personnel between the different divisions of the organization is associated with pointing out the fact that there is a lack of a centralized IT management [11]. However the private transport division is seen to be managed by an ex-policeman who is seen to having an experience but lacks proper training related to the IT and the home office division is well endowed with the IT experts by taking into consideration the presence of the hybrid manager who is having the IT as well as financial experience along with the two programmers. Besides this the disintegration existing in the way by which is IT is managed is seen to be stemming from
6BUSINESS INFORMATION SYSTEMS the ways by which the company has grown over the years. The firm is also seen to have grown from the organic growth which is due to the original core business and the startups in relation to the security segments along with taking over and merging with the companies who are associated with providing of similar services. The current state of the organization is depicting the fact that the IS of the organization is not working in an optimal way for serving the objectives of the firm and for this reason it needs to be explored so as to determine a suitable location for the IT services in the future [12]. Taking into consideration the operations of the management of the IT Infrastructure there exists a centralized management system which would be helping in making improvementsif the efficiency along with being associated with making contributions in the process of reducing the cost [13]. The reason behind this is that each of the department would not be requiring the hiring of technician. Considering the IS strategy it can be stated that it is best to consider this as a strategic function which is to be carried out by the executives existing in the top levels. In addition to this it is also essential to intertwine the components of the IS strategy with the other strategic objectives as this acts as the only way of injecting the culture of leveraging upon the IS so as optimize the business operations [14]. In addition to this the database administration should also be managed from a central location and the only system which is to be decentralized in the functions related to the support from the user.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7BUSINESS INFORMATION SYSTEMS References: [1]Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,”Wirel. Networks, 2014. [2]M. Alotaibi, S. Furnell, and N. Clarke, “Information security policies: A review of challenges and influencing factors,” in2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, 2017. [3]M. Eslahi, M. V. Naseri, H. Hashim, N. M. Tahir, and E. H. M. Saad, “BYOD: Current state and security challenges,” inISCAIE 2014 - 2014 IEEE Symposium on Computer Applications and Industrial Electronics, 2015. [4]K.BiswasandV.Muthukkumarasamy,“Securingsmartcitiesusingblockchain technology,” inProceedings - 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, 2017. [5]H. Heet al., “The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence,” in2016 IEEE Congress on Evolutionary Computation, CEC 2016, 2016. [6]Rishitha and T. R. Reshmi, “Security in Cloud Computing,” inProceedings of the 2018 International Conference on Recent Trends in Advanced Computing, ICRTAC-CPS 2018, 2019. [7]R. Klahret al., “Cyber Security Breach Survey 2016,” 2016. [8]Kamesh and N. Sakthi Priya, “Security enhancement of authenticated RFID generation,” Int. J. Appl. Eng. Res., 2014. [9]L. Kappelman, E. R. McLean, V. Johnson, and R. R. Torres, “The 2016 SIM IT key issues and trends study,”MIS Q. Exec., 2016. [10]ISO/IEC, “ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary,”ISO/IEC, 2014. [11]Computer Security - ESORICS 2014. 2014. [12]Z. Tari, “Security and Privacy in Cloud Computing,”IEEE Cloud Comput., 2014. [13]J.-M. Brook, S. Field, and D. Shackleford, “The Treacherous 12 Cloud Computing Top Threats in 2016,” 2016.
8BUSINESS INFORMATION SYSTEMS [14]D. Harris, “Security,” inHandbook of Human Factors in Air Transportation Systems, 2017.