MITS4001 Case Study: Security Services Limited - Business Analysis

Verified

Added on  2023/03/29

|9
|2477
|359
Case Study
AI Summary
This case study solution analyzes Security Services Limited (SSL) and its business information systems. It identifies the value derived from the current IT portfolio using the Griffith and Ward matrix, focusing on IT's role in supporting business functions, operational activities, and strategic objectives. The solution also addresses the need for a coherent IS strategy aligned with business strategies, suggesting critical success factor analysis and value chain analysis. Furthermore, it explores the strategic benefits of increased IS investment, emphasizing customer engagement, supply chain streamlining, and competitive advantage through business process re-engineering. The analysis concludes by highlighting the importance of central IT management for SSL.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: SECURITY SERVICE LIMITED CASE STUDY
SECURITY SERVICE LIMITED CASE STUDY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
SECURITY SERVICE LIMITED CASE STUDY 1
Question 1:
For identifying the value that is derived by SSL from the present portfolio of the
information system, this is imperative for classifying the applications that are existing,
procedure as well as the people in according with Griffith and ward matrix. The physical
resources of the IT at the SSL is comprising of the personal computers, wan connectivity and
IBM AS/400 microcomputers. At the firm, the software is including Pegasus payroll package,
routing and roasting software, costing and budgeting software as well as the productivity type
packages. The human resources at the IT are including the ex-police man who was working at
the private transport division, the computer graduate who is 24 years old working at the
division of business security, four programmers, the hybrid manager, six data entry clerks, a
programmer/analyst and lastly two computer operating systems. The first value that is
provided to the SSL by the IT resources is for acting as a support system. The items or assets
that can fall under this category are including software of the organisation that make these
things possible for running the functions of the business. As an example, it can be said that
the Pegasus payroll package can ease the procedure of payment by helping the business for
maintain a staff who is highly motivated.
The other value of the portfolio that is current is that this have the ability to contribute
to the procedures of SSL that are operationalization as well as the activities. The AutoRoute
application that can run on the computer in the department of transport of the division of
private transport that can help in scheduling and planning the routes for optimizing the
operations of the business. The LAN based networks can help for the maintenance the
communication that is seamless that also in between several department in the division of the
head office services. One more value that has been delivered by the resources of the IT at the
SSL to steer the organisation to the way to realize the set of missions as well as the
Document Page
2SECURITY SERVICE LIMITED CASE STUDY
objectives. For illustrating the productivity of the business packages in the computers that are
personal that are existed in the division of the services of the home office, it can help for the
determination of the productivity level in the organisation as well as how the productivity can
be boosted. In addition, all of the experts of the IT like the system analysts and the
programmers are having the operational and strategic value to the organisation since for
improving the efficiency that are related to the operational value of the company.
It is given that the pace of the technologies that can be considered as the present
technology, there are no delay that the SSL may have the ability for investing in the
infrastructure as well as there are the dire requirement for establishing the metrics for
evaluating the investments for the information system. One of the metric is the period of the
playback for assessing how long this may take for the organisation for recuperating the
resources that are considered as the financial resources that have been used in the IS
investments. As example, it can be said that if the company can spend 1000 dollars for
purchasing one PCs, the period of the playback might show how long this may take for
getting the investments back. The company might also considered by utilizing the return on
the investment of the invests in the IS. The ROI may indicate that the value, which an
organisation may generate through accruing one of the asset or even channelling the cash,
related transaction to the project. Furthermore, when it can be considered as the future, the
organisation might asses how the investment of the IS can contribute for agitating in making
the decision and improving the quality of the decisions that are related to the business.
Question 2:
Many of the parts of the organisation lack in the coherent of the strategy of the IS, the
deficiency that can sever the sustainability as well as the competitiveness of the company.
Therefore, there are the requirements for constructing the strategy of the IS that is so much
Document Page
3SECURITY SERVICE LIMITED CASE STUDY
supportive for the strategies for the business. One of the way the organisation is able design
one of the strategy of the IS that are effective is for conducting the success that is critical for
the analysis of the factor for establishing the requirements of the IT for each of the
department as well as the unit of the business of the organisation. Every business unit or the
department is having the functions that are essential that if not addressed well. They are able
to stall the operations of the organisation. Therefore, to identify the success of the critical
factors in each of the department might help for determining where the investments of the IT
that are needed the most. For illustrating, a department of the transport is also for requiring
the planning of the route package more than one department of the sales or the unit of the
marketing. Secondly, the value for conducting the analysis of the chain is having the ability
to help the business for identifying the current capabilities of the IT and the assets that are
able to offer an edge that is competitive. After the identification of the assets of the IT that
are unique and rare as well as valuable, the SSL might be utilized the insight for determining
where more investments for the IT can be made.
The analysis of the value chain is having the ability to help one organisation for
knowing the capabilities that this is lacking however, that are so much critical for the
improvement for the efficiency. For the instance the fact that is not supported by the current
technology, the digital based communication that is in between the headquarters and the
divisional areas. The analysis of the value chain is having the ability for helping to point to
requirement for investing in the communication that is digital based infrastructure that might
improve the major competition of the organisations. It can be decided that the planning
procedure might be a step that is integral for helping the SSL for designing one strategy of
the IT that is supportive for the business strategy. This is so much imperative for stating that
the organisational structure of the SSL is one matrix where the bosses of the business units
are the in charge solely for the departments of them. The process of the IT planning might not
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4SECURITY SERVICE LIMITED CASE STUDY
veer off so far for the arrangement but the planning of the IT is a function that is strategic as
well as for the reason, the planning that is innovative or a middle out procedure might work
well in the cases of the SSL. In addition, this might also associate for determining whether
the methodology is a term that is huge or the short limited as well as if this can aim for
serving the external or the internal requirement that is required.
If the SSL can success for the establishment of a strategy of the IT that is suitable for
the strategy of the business. There are also some of the advantages that this might reap. One
of the benefits is the improvement in the capabilities of the business. As an example, it can be
said that the strategy that is presented at the IT can hamper the communication in between the
headquarters and the business units as well as this leads also to the redundancy. An IT
strategy that is effective might remove the hurdle as well as in term of enhancing the
capabilities of the organisation. In addition, there are no existence for denying the efficiency
that has been found as new might bring down the cost operations of the SSL since it might
remove the functions that are duplicate. For illustrating the productivity of the business
packages in the computers that are personal that are existed in the division of the services of
the home office, it can help for the determination of the productivity level in the organisation
as well as how the productivity can be boosted. In addition, all of the experts of the IT like
the system analysts and the programmers are having the operational and strategic value to the
organisation since for improving the efficiency that are related to the operational value of the
company.
Question 3:
When more resources are to be channelled to IS department by SSL, it is necessary to
find out that whether the investments have any strategic benefits for the organisation by
company and divisional perspective. It is not stated in the case study that by failing to deliver
Document Page
5SECURITY SERVICE LIMITED CASE STUDY
of a particular proposition value, the customers will look for other providers. Thus according
to this reason, it is required to deliver certain value to the clients if one invests in the field of
IT. In case of new services, without the technology of cutting-edge the division of domestic
security will be experiencing myriad challenges. In the time of 21st century, the customers
are highly demanding, and at any cost, they wants their demands to be fulfilled though it
hampers the business. The consumer power have reached to more heights in the social
platforms. By the investments from IS it will certainly help in improving the customers to
engage and will inspire loyalty in brand.
The car dealers, even the uniform providers who are suppliers in the SSL’s operations
are very essential for the company’s operations, even in the current environment the suppliers
are not facilitate with IT infrastructure with trust and even communication. In any case, if
suppliers wishes to follow the payments of the division of security office, it will be a very
difficult as because the process is reached or not is nearly impossible to look up. As calling to
the office is a very easy way to get all of the answers so it is not needed to go to the office
physically, if the system of art document is present in the department. So, the process of
supply chain will be streamlined by IT investment. Even by this process, the company will be
able to keep their products different from others. In the current situation, the security
divisions of home to bolster their security can use Internet of Things. In the competition,
there is a strategic advantage to increase the efficiency. As an example, by improving the
processing capability will expertise the timely decisions and the quality.
At the SSL by the practice of re-engineering in business, process it will maximize IS
and the IT’s potential. As the business process helps in adding value, this will be helped by
the BPR. Any type of sacking and faking that creates most amount of inefficiency in the
process, and these criteria will be looked up by the BPR. If the BPR uses the VRIO analysis it
would be easier to find out they process that are highly important, infrequent as because these
Document Page
6SECURITY SERVICE LIMITED CASE STUDY
are the source of competitive advantage of the SSL. Right after the analysis it is found that if
the process of BPR is improved by IS investments the result will be better. It would be better
if the BPR will be able to identify all the process that must be eliminated or can be joined
with others.
Question 4:
There is existing one fact that is predominant at the time this comes to the functions of
the IT at the SSL, the functions has been distributed all over the business units without any of
the central management from the home offices. This is therefore, there are not existing any
doubt that some of the divisional areas such as the domestic divisions of the security are not
having any investment for the IS while the home offices are lagging behind the services
division of the headquarters. The first value that is provided to the SSL by the IT resources is
for acting as a support system. Every business unit or the department is having the functions
that are essential that if not addressed well. They are able to stall the operations of the
organisation. Therefore, to identify the success of the critical factors in each of the
department might help for determining where the investments of the IT that are needed the
most. For illustrating, a department of the transport is also for requiring the planning of the
route package more than one department of the sales or the unit of the marketing. The
database administration also required for the management from a location that is central. The
one and only function, which might be decentralized, is the functions for the client support
such as the help desk support as well as the shared devices, these can vary from one to other
unit.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7SECURITY SERVICE LIMITED CASE STUDY
Bibliography:
Akhter, R. and Ahmed, S., 2013. Behavioral Aspects of Individual Investors for Investment
in Bangladesh Stock Market.
Berzkalne, I. and Zelgalve, E., 2014. Intellectual capital and company value. Procedia-Social
and Behavioral Sciences, 110, pp.887-896.
De Waal, A., 2013. Strategic Performance Management: A managerial and behavioral
approach. Macmillan International Higher Education.
Deniz, N., Noyan, A. and Ertosun, Ö.G., 2013. The relationship between employee silence
and organizational commitment in a private healthcare company. Procedia-Social and
Behavioral Sciences, 99, pp.691-700.
Gitlin, L. and Czaja, S., 2015. Behavioral intervention research: Designing, evaluating, and
implementing. springer publishing company.
Griffiths, M.D., 2013. Social networking addiction: Emerging themes and issues. Journal of
Addiction Research & Therapy, 4(5).
Grunig, J.E. and Hung-Baesecke, C.J.F., 2015. The effect of relationships on reputation and
reputation on relationships: A cognitive, behavioral study. In Public Relations As
Relationship Management (pp. 95-145). Routledge.
Hämäläinen, R.P., Luoma, J. and Saarinen, E., 2013. On the importance of behavioral
operational research: The case of understanding and communicating about dynamic
systems. European Journal of Operational Research, 228(3), pp.623-634.
Huseynov, F. and Yıldırım, S.Ö., 2016. Behavioral Issues in B2C E-commerce: The-state-of-
the-art. Information Development, 32(5), pp.1343-1358.
Document Page
8SECURITY SERVICE LIMITED CASE STUDY
Kathol, R.G., deGruy, F. and Rollman, B.L., 2014. Value-based financially sustainable
behavioral health components in patient-centered medical homes. The Annals of Family
Medicine, 12(2), pp.172-175.
Noe, R.A., Hollenbeck, J.R., Gerhart, B. and Wright, P.M., 2017. Human resource
management: Gaining a competitive advantage. New York, NY: McGraw-Hill Education.
Shmueli, G., 2017. Analyzing behavioral big data: methodological, practical, ethical, and
moral issues. Quality Engineering, 29(1), pp.57-74.
Weiss, B. ed., 2013. Behavioral toxicology (Vol. 5). Springer Science & Business Media.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]