MITS4001 Business Information System Report: Security Services Limited

Verified

Added on  2023/06/04

|11
|2827
|271
Report
AI Summary
Document Page
Running head: BUSINESS INFORMATION SYSTEM
Business Information System
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
BUSINESS INFORMATION SYSTEM
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
1. Analysis of SSL for Identifying the Value to Obtain from the Current Portfolio of IS.....2
2. Analysis of Constructing IS Strategy with Major Benefits................................................4
3. Analysis of Strategic Potential for Greater Investments in Information Systems.............6
4. Description of Current Location of IS functions within SSL with Recommendation.......7
Conclusion..................................................................................................................................8
References..................................................................................................................................9
Document Page
2
BUSINESS INFORMATION SYSTEM
Introduction
Business information system is the set of inter related processes, utilizing the
infrastructure of information technology within the business enterprise for the purpose of
generating as well as disseminating the expected information (Laudon and Laudon 2016).
These business information systems are designed for supporting the decision making process
by the people associated with the enterprise within the procedure of the attainment of the
objectives and goals. This type of business information system could obtain data or any other
resource of the infrastructure of IT as the inputs from the processes and environment for
satisfying the needs of information with the enterprise of business. These systems are the sub
systems of the business systems so that the feedback and control are served properly (Bajdor
and Grabara 2014). The following report outlines a brief discussion on the business
information system about the case study of SSL or Security Services Limited. The analysis of
SSL to identify the values and IS strategies would also be provided here. Moreover, the
strategic potential and IS functions would be described in this report.
Discussion
1. Analysis of SSL for Identifying the Value to Obtain from the Current Portfolio of IS
The organization of Security Services Limited is the major providers of the private
security services within the UK. The turnover was high in various organizations and provides
the wide range of services to its clients (Gallagher and Sixsmith 2014). This organization has
eventually grown for the combination of the factors including the organic growth from the
major businesses. The analysis and the installation of the security devices or regular security
sweep is also done here. The organizational value is identified in this particular organization.
This value is obtained from the current portfolio of the information systems. SSL has
identified the information management as the major enabler of business as well as the
Document Page
3
BUSINESS INFORMATION SYSTEM
government. The performance of the company is increased and they have been utilizing the
information efficiently and effectively (Liu, Liang and Wang 2016). The major situation has
occurred regarding the solutions of the past technology for fulfilling the requirements of the
business of SSL. These solutions could eventually take into account the main requirements of
the company for leading to the incompatibilities as well as duplication of the efforts and
costs. The major aspects that are required to be analysed in this particular case study of SSL
are as follows:
i) Incompatible Systems: The first and the foremost important and significant aspect
that is to be checked for the proper analysis is the incompatible systems. The major
requirement of these systems is to create an integrated as well as unified access to the entire
data holding of the organization (Dahlstrom, Walker and Dziuban 2013). Moreover, the
myriad of the disparate or incompatible storage and the inherited data is also checked
eventually.
ii) Information Impacts on the Decisions: There is a strong impact of the
organizational information of SSL on the various decisions undertaken by them. The
information management system of this particular organization has the capability of handling
all types of complex data and hence enables them in taking the major decisions.
iii) Future Proofing Information and the Technology Investments: SSL has built
certain technique on the principle to be sure that the information system is offering the
flexibility as well as power for managing the current or the future data as well as the storage
management requirements (Dahlstrom and Bichsel 2014). A feature rich system is being
integrated to the existing IT infrastructures and could be readily extended by their customers.
The investment protection is provided by connecting the new as well as legacy storage and
data for enabling the tools to include the cloud based storages.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
BUSINESS INFORMATION SYSTEM
The organization of SSL can evaluate the future information systems with the help of
some of the most significant techniques. These techniques could be distinguished to two
major methods, known as statistical method and the dynamic method (Eason 2014). The first
and the foremost evaluation technique for the future investment of information system is the
static method. This particular method majorly focuses on the monitoring of the cash benefits
to measure the initial expenditures. The respective risk factor of SSL is not included and the
time is taken only within the limited extent. The second type of evaluation method for the
future IS investments of SSL organization is the dynamic evaluation method (Bilbao-Osorio,
Dutta and Lanvin 2013). This particular evaluation method take into account the factors of
time as well as risks on the basis of the discount of the input parameters.
2. Analysis of Constructing IS Strategy with Major Benefits
This organization of SSL do not comprise of a coherent strategy of IS. The
information security strategy is extremely important and significant for all organizations for
building the program of information security that is being aligned with the respective IT
strategies and business (Marchewka 2014). This strategy for the information security
eventually provides the major roadmap to obtain a desired end state usually for the period of
3 to 5 years. The organization of Security Services Limited should construct their information
security strategy for resolving each and every issue related to the information security.
Hence, the strategy of information security is the plan or pattern for the core purpose of
integrating the organizational main IS related security goals, action sequences and policies to
the cohesive whole (Holtshouse 2013). Since, this is the organizational wide framework of
the conceptual elements from the individuals within the level of inter organizational and is
informed by the conditions of the antecedent for the purpose of yielding the measurable
benefits of information security within the company.
Document Page
5
BUSINESS INFORMATION SYSTEM
There are some of the most important and significant advantages of the presence of
the strategy of IS and these are given below:
i) Highly Proactive: The first and the foremost advantage of this type of strategy of
the information security is that it is extremely proactive and not at all reactive. The events
could occur; however they do not lead to the program of security being events driven (Bloom
et al., 2014). This strategic plan of information security would eventually enable the
organization of SSL for being on the front foot.
ii) Better Decision Making Process: The second significant and noteworthy
advantage that is being obtained from the presence of the information security strategy is the
better process of decision making. The organization of Security Services Limited could easily
undertake the major decisions in the most effective and efficient manner. Moreover, the
organizational strengths, weaknesses, threats and opportunities are well identified with this
strategy and thus decision making is quite easier.
iii) Clear Definition: Another important and noteworthy advantage that is being
obtained from the organizational information security strategy is that a clear direction is
being followed with this (Lloyd 2017). This strategy helps in providing the realistic
objectives and goals, which could be easily and promptly communicated as well as measured.
Hence, SSL would be highly benefitted with this strategy.
iv) Business Aligned: The next important and significant benefit that is being
obtained by any specific organization from the respective information security strategy is that
it is completely aligned with the subsequent expectations as well as goals of the business. The
information security could be seen as the business enabler for not the road block within the
organization. Thus, this organization of Security Services Limited should opt for the
information security strategy for obtaining the benefits.
Document Page
6
BUSINESS INFORMATION SYSTEM
3. Analysis of Strategic Potential for Greater Investments in Information Systems
The strategic potential of any organization is highly important for properly assessing
and forming the organizational goals and objectives. The regularities within the dynamics of
the system functioning and also in the context of the units (Schwalbe 2015). There is a basic
assurance of the process of the development of that specific organization to decompose the
strategic potential. The completeness, hierarchy and the integrity are the three major and
basic features of the system that should be established in the organization properly and
perfectly.
The organization of SSL has two perspectives of divisional and company wide. Both
of these divisional and company-wide perspectives would have better strategic potentials for
the greater investments in information systems and technology (Jiao and Onwuegbuzie 2017).
The information systems and technology should be implemented within the organization for
obtaining some of the major advantages. For the divisional perspective of SSL, the strategic
potential for the better investments for the information systems and technology is the better
communication. A better communication is extremely important to reduce the complexity of
communication within the different divisions. Moreover, globalization and cultural gaps are
also eradicated with this process (Alwahaishi and Snásel 2013). Regarding the perspective of
company wide of SSL, the information systems and technology would make the confidential
information available for its users and the attackers could not access them at any cost.
Moreover, the productivity of the organization of SSL would also be increased to a better
level without any type of complexities.
Business process reengineering would be one of the most effective and efficient tool
for SSL for the radical redesigning of their major business processes and hence achieving
significant improvements within the quality, cycle times and productivity. SSL can maximize
the respective potential of the information systems and information technology within their
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
BUSINESS INFORMATION SYSTEM
business. The organization could easily make their tasks easier, achieve the spectacular
improvement and changing the method of working with this tool of business process
reengineering (Wagner, Beimborn and Weitzel 2014). This particular tool is cost effective
and it helps to eliminate the non value adding steps within the organizational processes and
hence improving the cost and quality. The extra layers of the information technology are also
eradicated and the data dissemination is improvised with this specific tool. Hence, SSL would
be highly benefitted if they would use the tool of business process reengineering.
4. Description of Current Location of IS functions within SSL with Recommendation
The current location of the information system functions in SSL is within the
divisional sector of the organization. This divisional sector of the organization refers to the
activities that take place in the organizational headquarters. The general management as well
as the financial management are completed within this particular sector (Schwalbe 2015).
The IT department in the divisional sector is responsible for checking each and every IS
function. There are four divisions in the entire divisional sector of SSL, which are PTD or
private transport division, BSD or business security division, DSD or domestic security
division and HOSD or home office services division.
The major recommendation that could eventually bring the best location for the
various services of information technology in the future is the headquarters. Since, the current
location that is the divisional sector is still following the traditional ways to store the
functions of information security, the headquarters would be the best location for this.
Moreover, the divisional sector is divided into four divisions of PTD, BSD, DSD and HOSD
and thus each sector has its own security, which could be threatened easily. However, with
the presence of only sector of headquarter, this particular issue would be resolved.
Document Page
8
BUSINESS INFORMATION SYSTEM
Conclusion
Therefore, from the above discussion, it can be concluded that the business
information system helps in catering the information requirements to undertake the relevant
decisions within the business. These business information systems are extremely proactive
and they must anticipate the major changes for the requirements of the information and then
adapt themselves in suiting the needs. It is extremely vital for the fact that these managers
might get involved within the routine activities so that the decision making process is easier.
The above report has clearly demonstrated the entire case study of Security Services Limited
or SSL. This particular organization is responsible for providing all types of private security
services within the United Kingdom. They mainly provide services like armoured transport to
convey cash and cheques within banks and businesses, provision of security services and
provision of domestic security services. The several details regarding this specific
organization of Security Services Limited are provided here. The proper identification of the
value obtained from the current portfolio is done here with significant evaluation. Moreover,
IS strategy construction is also done here for the strategies. A strategic potential is analysed
and the current location of the IS functions is described in the report with basic
recommendation.
Document Page
9
BUSINESS INFORMATION SYSTEM
References
Alwahaishi, S. and Snásel, V., 2013. Acceptance and use of information and communications
technology: a UTAUT and flow based theoretical model. Journal of technology management
& innovation, 8(2), pp.61-73.
Bajdor, P. and Grabara, I., 2014. The Role of Information System Flows in Fulfilling
Customers’ Individual Orders. Journal of Studies in Social Sciences, 7(2).
Bilbao-Osorio, B., Dutta, S. and Lanvin, B., 2013, April. The global information technology
report 2013. In World Economic Forum (pp. 1-383).
Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of
information technology and communication technology on firm organization. Management
Science, 60(12), pp.2859-2885.
Dahlstrom, E. and Bichsel, J., 2014. ECAR Study of Undergraduate Students and Information
Technology, 2014. Educause.
Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students
and information technology (p. 2013). 2013.
Eason, K.D., 2014. Information technology and organisational change. CRC Press.
Gallagher, S. and Sixsmith, A., 2014. Engaging IT undergraduates in non-IT content:
Adopting an eLearning information system in the classroom. Interactive Technology and
Smart Education, 11(2), pp.99-111.
Holtshouse, D.K., 2013. Information technology for knowledge management. Springer
Science & Business Media.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
BUSINESS INFORMATION SYSTEM
Jiao, Q.G. and Onwuegbuzie, A.J., 2017. The impact of information technology on library
anxiety: The role of computer attitudes. Information technology and libraries, 23(4), pp.138-
144.
Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education
India.
Liu, D., Liang, D. and Wang, C., 2016. A novel three-way decision model based on
incomplete information system. Knowledge-Based Systems, 91, pp.32-45.
Lloyd, I., 2017. Information technology law. Oxford University Press.
Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.
Schwalbe, K., 2015. Information technology project management. Cengage Learning.
Wagner, H.T., Beimborn, D. and Weitzel, T., 2014. How social capital among information
technology and business units drives operational alignment and IT business value. Journal of
Management Information Systems, 31(1), pp.241-272.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]