This case study analyzes the value derived by Security Service Limited (SSL) from its current portfolio of information systems and the need for an effective IS strategy. It also explores the potential strategic benefits of investing in IS resources and the importance of central management for IT functions.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY SERVICE LIMITED CASE STUDY SECURITY SERVICE LIMITED CASE STUDY Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SECURITY SERVICE LIMITED CASE STUDY1 Question 1: For identifying the value that is derived by SSL from the present portfolio of the information system, this is imperative for classifying the applications that are existing, procedure as well as the people in according with Griffith and ward matrix. The physical resources of the IT at the SSL is comprising of the personal computers, wan connectivity and IBM AS/400 microcomputers. At the firm, the software is including Pegasus payroll package, routing and roasting software, costing and budgeting software as well as the productivity type packages. The human resources at the IT are including the ex-police man who was working at the private transport division, the computer graduate who is 24 years old working at the division of business security, four programmers, the hybrid manager, six data entry clerks, a programmer/analyst and lastly two computer operating systems. The first value that is provided to the SSL by the IT resources is for acting as a support system. The items or assets that can fall under this category are including software of the organisation that make these things possible for running the functions of the business. As an example, it can be said that the Pegasus payroll package can ease the procedure of payment by helping the business for maintain a staff who is highly motivated. The other value of the portfolio that is current is that this have the ability to contribute to the procedures of SSL that are operationalization as well as the activities. The AutoRoute application that can run on the computer in the department of transport of the division of private transport that can help in scheduling and planning the routes for optimizing the operations of the business. The LAN based networks can help for the maintenance the communication that is seamless that also in between several department in the division of the head office services. One more value that has been delivered by the resources of the IT at the SSL to steer the organisation to the way to realize the set of missions as well as the
2SECURITY SERVICE LIMITED CASE STUDY objectives. For illustrating the productivity of the business packages in the computers that are personal that are existed in the division of the services of the home office, it can help for the determination of the productivity level in the organisation as well as how the productivity can be boosted. In addition, all of the experts of the IT like the system analysts and the programmers are having the operational and strategic value to the organisation since for improving the efficiency that are related to the operational value of the company. It is given that the pace of the technologies that can be considered as the present technology, there are no delay that the SSL may have the ability for investing in the infrastructure as well as there are the dire requirement for establishing the metrics for evaluating the investments for the information system. One of the metric is the period of the playback for assessing how long this may take for the organisation for recuperating the resources that are considered as thefinancial resources that have been used in the IS investments. As example, it can be said that if the company can spend 1000 dollars for purchasing one PCs, the period of the playback might show how long this may take for getting the investments back. The company might also considered by utilizing the return on the investment of the invests in the IS.The ROI may indicate that the value, which an organisation may generate through accruing one of the asset or even channelling the cash, related transaction to the project. Furthermore, when it can be considered as the future, the organisation might asses how the investment of the IS can contribute for agitating in making the decision and improving the quality of the decisions that are related to the business. Question 2: Many of the parts of the organisation lack in the coherent of the strategy of the IS, the deficiency that can sever the sustainability as well as the competitiveness of the company. Therefore, there are the requirements for constructing the strategy of the IS that is so much
3SECURITY SERVICE LIMITED CASE STUDY supportive for the strategies for the business. One of the way the organisation is able design one of the strategy of the IS that are effective is for conducting the success that is critical for the analysisof the factor for establishing the requirements of the IT for each of the department as well as the unit of the business of the organisation. Every business unit or the department is having the functions that are essential that if not addressed well. They are able to stall the operations of the organisation. Therefore, to identify the success of the critical factors in each of the department might help for determining where the investments of the IT that are needed the most. For illustrating, a department of the transport is also for requiring the planning of the route package more than one department of the sales or the unit of the marketing. Secondly, the value for conducting the analysis of the chain is having the ability to help the business for identifying the current capabilities of the IT and the assets that are able to offer an edge that is competitive. After the identification of the assets of the IT that are unique and rare as well as valuable, the SSL might be utilized the insight for determining where more investments for the IT can be made. The analysis of the value chain is having the ability to help one organisation for knowing the capabilities that this is lacking however, that are so much critical for the improvement for the efficiency. For the instance the fact that is not supported by the current technology, the digital based communication that is in between the headquarters and the divisional areas. The analysis of the value chain is having the ability for helping to point to requirement for investing in the communication that is digital based infrastructure that might improve the major competition of the organisations. It can be decided that the planning procedure might be a step that is integral for helping the SSL for designing one strategy of the IT that is supportive for the business strategy. This is so much imperative for stating that the organisational structure of the SSL is one matrix where the bosses of the business units are the in charge solely for the departments of them. The process of the IT planning might not
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4SECURITY SERVICE LIMITED CASE STUDY veer off so far for the arrangement but the planning of the IT is a function that is strategic as well as for the reason, the planning that is innovative or a middle out procedure might work well in the cases of the SSL. In addition, this might also associate for determining whether the methodology is a term that is huge or the short limited as well as if this can aim for serving the external or the internal requirement that is required. If the SSL can success for the establishment of a strategy of the IT that is suitable for the strategy of the business. There are also some of the advantages that this might reap. One of the benefits is the improvement in the capabilities of the business. As an example, it can be said that the strategy that is presented at the IT can hamper the communication in between the headquarters and the business units as well as this leads also to the redundancy. An IT strategy that is effective might remove the hurdle as well as in term of enhancing the capabilities of the organisation. In addition, there are no existence for denying the efficiency that has been found as new might bring down the cost operations of the SSL since it might remove the functions that are duplicate. For illustrating the productivity of the business packages in the computers that are personal that are existed in the division of the services of the home office, it can help for the determination of the productivity level in the organisation as well as how the productivity can be boosted. In addition, all of the experts of the IT like the system analysts and the programmers are having the operational and strategic value to the organisation since for improving the efficiency that are related to the operational value of the company. Question 3: When more resources are to be channelled to IS department by SSL, it is necessary to find out that whether the investments have any strategic benefits for the organisation by company and divisional perspective. It is not stated in the case study that by failing to deliver
5SECURITY SERVICE LIMITED CASE STUDY of a particular proposition value, the customers will look for other providers. Thus according to this reason, it is required to deliver certain value to the clients if one invests in the field of IT. In case of new services, without the technology of cutting-edge the division of domestic security will be experiencing myriad challenges. In the time of 21st century, the customers are highly demanding, and at any cost, they wants their demands to be fulfilled though it hampers the business. The consumer power have reached to more heights in the social platforms. By the investments from IS it will certainly help in improving the customers to engage and will inspire loyalty in brand. The car dealers, even the uniform providers who are suppliers in the SSL’s operations are very essential for the company’s operations, even in the current environment the suppliers are not facilitate with IT infrastructure with trust and even communication. In any case, if suppliers wishes to follow the payments of the division of security office, it will be a very difficult as because the process is reached or not is nearly impossible to look up. As calling to the office is a very easy way to get all of the answers so it is not needed to go to the office physically, if the system of art document is present in the department. So, the process of supply chain will be streamlined by IT investment. Even by this process, the company will be able to keep their products different from others. In the current situation, the security divisions of home to bolster their security can use Internet of Things. In the competition, there is a strategic advantage to increase the efficiency. As an example, by improving the processing capability will expertise the timely decisions and the quality. At the SSL by the practice of re-engineering in business, process it will maximize IS and the IT’s potential. As the business process helps in adding value, this will be helped by the BPR. Any type of sacking and faking that creates most amount of inefficiency in the process, and these criteria will be looked up by the BPR. If the BPR uses the VRIO analysis it would be easier to find out they process that are highly important, infrequent as because these
6SECURITY SERVICE LIMITED CASE STUDY are the source of competitive advantage of the SSL. Right after the analysis it is found that if the process of BPR is improved by IS investments the result will be better. It would be better if the BPR will be able to identify all the process that must be eliminated or can be joined with others. Question 4: There is existing one fact that is predominant at the time this comes to the functions of the IT at the SSL, the functions has been distributed all over the business units without any of the central management from the home offices. This is therefore, there are not existing any doubt that some of the divisional areas such as the domestic divisions of the security are not having any investment for the IS while the home offices are lagging behind the services division of the headquarters. The first value that is provided to the SSL by the IT resources is for acting as a support system. Every business unit or the department is having the functions that are essential that if not addressed well. They are able to stall the operations of the organisation.Therefore,toidentifythesuccessof thecriticalfactorsineachofthe department might help for determining where the investments of the IT that are needed the most. For illustrating, a department of the transport is also for requiring the planning of the route package more than one department of the sales or the unit of the marketing. The database administration also required for the management from a location that is central. The one and only function, which might be decentralized, is the functions for the client support such as the help desk support as well as the shared devices, these can vary from one to other unit.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7SECURITY SERVICE LIMITED CASE STUDY Bibliography: Akhter, R. and Ahmed, S., 2013. Behavioral Aspects of Individual Investors for Investment in Bangladesh Stock Market. Berzkalne, I. and Zelgalve, E., 2014. Intellectual capital and company value.Procedia-Social and Behavioral Sciences,110, pp.887-896. De Waal, A., 2013.Strategic Performance Management: A managerial and behavioral approach. Macmillan International Higher Education. Deniz, N., Noyan, A. and Ertosun, Ö.G., 2013. The relationship between employee silence andorganizationalcommitmentinaprivatehealthcarecompany.Procedia-Socialand Behavioral Sciences,99, pp.691-700. Gitlin, L. and Czaja, S., 2015.Behavioral intervention research: Designing, evaluating, and implementing. springer publishing company. Griffiths, M.D., 2013. Social networking addiction: Emerging themes and issues.Journal of Addiction Research & Therapy,4(5). Grunig, J.E. and Hung-Baesecke, C.J.F., 2015. The effect of relationships on reputation and reputationonrelationships:Acognitive,behavioralstudy.InPublicRelationsAs Relationship Management(pp. 95-145). Routledge. Hämäläinen, R.P., Luoma, J. and Saarinen, E., 2013. On the importance of behavioral operationalresearch:Thecaseofunderstandingandcommunicatingaboutdynamic systems.European Journal of Operational Research,228(3), pp.623-634. Huseynov, F. and Yıldırım, S.Ö., 2016. Behavioral Issues in B2C E-commerce: The-state-of- the-art.Information Development,32(5), pp.1343-1358.
8SECURITY SERVICE LIMITED CASE STUDY Kathol, R.G., deGruy, F. and Rollman, B.L., 2014. Value-based financially sustainable behavioral health components in patient-centered medical homes.The Annals of Family Medicine,12(2), pp.172-175. Noe,R.A.,Hollenbeck,J.R.,Gerhart,B.andWright,P.M.,2017.Humanresource management: Gaining a competitive advantage. New York, NY: McGraw-Hill Education. Shmueli, G., 2017. Analyzing behavioral big data: methodological, practical, ethical, and moral issues.Quality Engineering,29(1), pp.57-74. Weiss, B. ed., 2013.Behavioral toxicology(Vol. 5). Springer Science & Business Media.