Business Information Systems Report: SSL Case Study Analysis, MITS4001
VerifiedAdded on 2022/10/01
|11
|2883
|14
Report
AI Summary
This report provides a comprehensive analysis of the Business Information Systems (BIS) of Security Services Limited (SSL). It begins with an introduction to SSL and its growth in the UK security market. The discussion section analyzes SSL's current IS portfolio, evaluating the value gained and different techniques for assessing future IS investments. It then focuses on constructing an IS strategy to support business strategies and the advantages derived from it. The report also explores strategic potentials for better investments in information systems and technology from both company-wide and divisional perspectives, explaining and justifying the use of Business Process Re-engineering (BPR) to increase IS and IT potential. Finally, it describes the current location of IS functionalities within SSL and recommends the most appropriate location for IT services in the future. The report uses various techniques to assess SSL's IS, including dynamic and static methodologies for evaluating future investments. The report highlights the importance of an IS strategy for decision-making, business alignment, and pro-activeness. It also emphasizes the benefits of BPR in streamlining processes and increasing efficiency. Overall, the report offers valuable insights into SSL's BIS and provides recommendations for improvement.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: BUSINESS INFORMATION SYSTEMS
Business Information Systems: Security Services Limited
Name of the Student
Name of the University
Author’s Note:
Business Information Systems: Security Services Limited
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
BUSINESS INFORMATION SYSTEMS
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion..............................................................................................................................2
2.1 Analyses of SSL identifying the Value gained from their Current IS Portfolio with
Evaluation of Different Techniques used in Assessment of future IS Investment................2
2.2 Analyses of Constructing an IS Strategy that can support to the Business Strategies and
Advantages gained from it.....................................................................................................4
2.3 Analyses of Strategic Potentials for Better Investments in the Information System and
Technology from a Company Wide and Divisional Perspective with Explanation and
Justification of Business Process Re Engineering in Increasing IS and IT Potential............6
2.4 Describing about their Current Location of the IS Functionalities in SSL with suitable
Recommendation for the Most Appropriate Location for IT Services in Future...................7
3. Conclusion..............................................................................................................................8
References..................................................................................................................................9
BUSINESS INFORMATION SYSTEMS
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion..............................................................................................................................2
2.1 Analyses of SSL identifying the Value gained from their Current IS Portfolio with
Evaluation of Different Techniques used in Assessment of future IS Investment................2
2.2 Analyses of Constructing an IS Strategy that can support to the Business Strategies and
Advantages gained from it.....................................................................................................4
2.3 Analyses of Strategic Potentials for Better Investments in the Information System and
Technology from a Company Wide and Divisional Perspective with Explanation and
Justification of Business Process Re Engineering in Increasing IS and IT Potential............6
2.4 Describing about their Current Location of the IS Functionalities in SSL with suitable
Recommendation for the Most Appropriate Location for IT Services in Future...................7
3. Conclusion..............................................................................................................................8
References..................................................................................................................................9

2
BUSINESS INFORMATION SYSTEMS
1. Introduction
Business information system or BIS consists of proper analyses as well as
organization of the business related information after incorporation of technology application
[3]. It involves major concepts of information system, operations and management with
different methodologies as well as technologies for better organizational data management.
The overall expenses of storage and transportation of information is quite low and the
advancement within technology is required to ensure that information is getting manipulated
and distributed in an effective manner. It even reduces complexities in management of the
business processes so that the users can design and build a set of different managerial and
technical tools, which can contribute to the solution of problems after realizing business
opportunities [8]. This report will be providing a detailed discussion on the case study of
Security Services Limited or SSL. A proper analysis of different organizational aspects will
be provided in the report with relevant details like information technology functionalities and
strategic potential.
2. Discussion
2.1 Analyses of SSL identifying the Value gained from their Current IS Portfolio with
Evaluation of Different Techniques used in Assessment of future IS Investment
SSL is one of the most significant and important providers of various private security
service in the entire United Kingdom. The overall turnover was extremely high in previous
year and they have gained higher profitability of around 9.2% for 3 consecutive years. They
are providing a wider range of different services to various organizations, public sector and
individuals. Security Services Limited have grown and developed after combining various
factors like organic growth from several businesses. They even ensure effective and efficient
analyses as well as installation of different security devices, so that these services are not
BUSINESS INFORMATION SYSTEMS
1. Introduction
Business information system or BIS consists of proper analyses as well as
organization of the business related information after incorporation of technology application
[3]. It involves major concepts of information system, operations and management with
different methodologies as well as technologies for better organizational data management.
The overall expenses of storage and transportation of information is quite low and the
advancement within technology is required to ensure that information is getting manipulated
and distributed in an effective manner. It even reduces complexities in management of the
business processes so that the users can design and build a set of different managerial and
technical tools, which can contribute to the solution of problems after realizing business
opportunities [8]. This report will be providing a detailed discussion on the case study of
Security Services Limited or SSL. A proper analysis of different organizational aspects will
be provided in the report with relevant details like information technology functionalities and
strategic potential.
2. Discussion
2.1 Analyses of SSL identifying the Value gained from their Current IS Portfolio with
Evaluation of Different Techniques used in Assessment of future IS Investment
SSL is one of the most significant and important providers of various private security
service in the entire United Kingdom. The overall turnover was extremely high in previous
year and they have gained higher profitability of around 9.2% for 3 consecutive years. They
are providing a wider range of different services to various organizations, public sector and
individuals. Security Services Limited have grown and developed after combining various
factors like organic growth from several businesses. They even ensure effective and efficient
analyses as well as installation of different security devices, so that these services are not

3
BUSINESS INFORMATION SYSTEMS
disrupted under any circumstance [2]. Overall organization value can be identified for the
specific company and this value has been gained from their current portfolios of the IS. SSL
even has recognized this type of management of information as one of the most significant
requirement in the government and business.
The overall performances of the organization gets incremented in this manner and
they have used information in the most effective manner [14]. One of the most distinctive
situation has taken place and these solutions of their previous technology to fulfil their
current needs in the business. Such solutions can be taken into consideration as the most
important needs of organization to lead to any type of incompatibility and even duplication of
costs as well as efforts. The most important aspects, which are needed to be properly
analysed for Security Services Limited are provided below:
i) Major Information Impacts over the Decisions: This is the first as well as the most
important aspect, which is needed to be taken into consideration for proper analysis of SSL.
A stronger impact of all type of organizational information for the different decisions is
present for them [2]. This system for managing information of SSL comprises of the core
ability to handle every kind of complicated data, thus allowing them to undertake the most
relevant decisions.
ii) Future Proof Information as well as Technological Investment: The second vital
aspect, which is needed to be taken into consideration for proper analysis of SSL would be
future proof of information and technological investments. SSL has eventually built up a
distinct technique over the principle for being sure that IS can offer higher flexibility and
power to manage their future and current data in the most effective manner [9]. A feature
based system can be integrated to every existing IT infrastructure and can be extended by the
BUSINESS INFORMATION SYSTEMS
disrupted under any circumstance [2]. Overall organization value can be identified for the
specific company and this value has been gained from their current portfolios of the IS. SSL
even has recognized this type of management of information as one of the most significant
requirement in the government and business.
The overall performances of the organization gets incremented in this manner and
they have used information in the most effective manner [14]. One of the most distinctive
situation has taken place and these solutions of their previous technology to fulfil their
current needs in the business. Such solutions can be taken into consideration as the most
important needs of organization to lead to any type of incompatibility and even duplication of
costs as well as efforts. The most important aspects, which are needed to be properly
analysed for Security Services Limited are provided below:
i) Major Information Impacts over the Decisions: This is the first as well as the most
important aspect, which is needed to be taken into consideration for proper analysis of SSL.
A stronger impact of all type of organizational information for the different decisions is
present for them [2]. This system for managing information of SSL comprises of the core
ability to handle every kind of complicated data, thus allowing them to undertake the most
relevant decisions.
ii) Future Proof Information as well as Technological Investment: The second vital
aspect, which is needed to be taken into consideration for proper analysis of SSL would be
future proof of information and technological investments. SSL has eventually built up a
distinct technique over the principle for being sure that IS can offer higher flexibility and
power to manage their future and current data in the most effective manner [9]. A feature
based system can be integrated to every existing IT infrastructure and can be extended by the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
BUSINESS INFORMATION SYSTEMS
respective customers. Protection to the investments is also eventually provided only after
connection of every new and old data and storage to enable various relevant tools.
iii) Incompatible System: Another effective and efficient aspect, which is needed to
be taken into consideration for proper analysis of SSL would be incompatible system [7]. The
most significant requirement of such system is for creation of the unified and integrated
accessibility to organizational data holding capacity.
Security Services Limited could easily and promptly evaluate the futuristic IS after
considering help from few important techniques. These distinct techniques can even be
distinguished to main methodologies, which are dynamic methodology and static
methodology. In the static methodology, the subsequent monitoring of various cash
advantages are being eventually focused for the core purpose of measuring every initial
expense. The risk factors of this organization are not involved and proper time is being
undertaken only in limit [15]. The next distinct methodology for evaluating the futuristic
investments of information system in the company of SSL would be dynamic methodology.
This methodology considers the major time factors and risks, based on discounts from input
parameter.
2.2 Analyses of Constructing an IS Strategy that can support to the Business Strategies
and Advantages gained from it
This particular organization of Security Services Limited does not consist of 1
coherent information system strategy. The strategy is quite vital and efficient for all the
companies to build there is program that gets aligned with all other business processes and IT
strategies [4]. This specific strategy for better security of information helps in providing a
proper roadmap for obtaining expected end state for around time period of three to five years.
SSL should effectively construct the strategy of IS to resolve all the issues that are associated
BUSINESS INFORMATION SYSTEMS
respective customers. Protection to the investments is also eventually provided only after
connection of every new and old data and storage to enable various relevant tools.
iii) Incompatible System: Another effective and efficient aspect, which is needed to
be taken into consideration for proper analysis of SSL would be incompatible system [7]. The
most significant requirement of such system is for creation of the unified and integrated
accessibility to organizational data holding capacity.
Security Services Limited could easily and promptly evaluate the futuristic IS after
considering help from few important techniques. These distinct techniques can even be
distinguished to main methodologies, which are dynamic methodology and static
methodology. In the static methodology, the subsequent monitoring of various cash
advantages are being eventually focused for the core purpose of measuring every initial
expense. The risk factors of this organization are not involved and proper time is being
undertaken only in limit [15]. The next distinct methodology for evaluating the futuristic
investments of information system in the company of SSL would be dynamic methodology.
This methodology considers the major time factors and risks, based on discounts from input
parameter.
2.2 Analyses of Constructing an IS Strategy that can support to the Business Strategies
and Advantages gained from it
This particular organization of Security Services Limited does not consist of 1
coherent information system strategy. The strategy is quite vital and efficient for all the
companies to build there is program that gets aligned with all other business processes and IT
strategies [4]. This specific strategy for better security of information helps in providing a
proper roadmap for obtaining expected end state for around time period of three to five years.
SSL should effectively construct the strategy of IS to resolve all the issues that are associated

5
BUSINESS INFORMATION SYSTEMS
to such security. Thus, this strategy for securing information can be referred to as the proper
pattern or plan to integrate each and every IS associated security objective, policy and
activity sequencing [13]. As it is the specific organizational framework of every conceptual
element from employees in inter organizational levels, it becomes quite easier to yield every
measurable advantage of securing information in the organization. Moreover, this particular
framework of SSL even provides basic information to the management regarding other
conditions.
Few vital and noteworthy benefits to the subsequent presence of this information
security strategy are provided in the following paragraphs:
i) Excellent Process of Decision Making: This is the first important and noteworthy
advantage of IS strategy [8]. It helps in reduction of the complexities faced in decision
making and thus the company of SSL gets opportunity to effectively undertake proper
decisions in an efficient method. Furthermore, every organizational strength, weakness, threat
as well as opportunity gets identified in a better manner with the strategy.
ii) Business Alignment: The second vital and distinctive advantage of IS strategy is
that it provides better business alignment. Every expectation and business goal is being
aligned effectively with these strategies. It provides several advantages and can ensure
providing road map in the business [10]. Hence, the company of SSL should choose such
distinctive strategy for securing their information and gain relevant advantages. Moreover, a
successful business alignment can even reduce complexities in business process execution
effectively.
iii) High Pro-activeness: The next distinct and vital advantage of an information
security strategy is that it provides high pro activeness in the business. The business related
activities and events can easily take place, however these events never lead to the subsequent
BUSINESS INFORMATION SYSTEMS
to such security. Thus, this strategy for securing information can be referred to as the proper
pattern or plan to integrate each and every IS associated security objective, policy and
activity sequencing [13]. As it is the specific organizational framework of every conceptual
element from employees in inter organizational levels, it becomes quite easier to yield every
measurable advantage of securing information in the organization. Moreover, this particular
framework of SSL even provides basic information to the management regarding other
conditions.
Few vital and noteworthy benefits to the subsequent presence of this information
security strategy are provided in the following paragraphs:
i) Excellent Process of Decision Making: This is the first important and noteworthy
advantage of IS strategy [8]. It helps in reduction of the complexities faced in decision
making and thus the company of SSL gets opportunity to effectively undertake proper
decisions in an efficient method. Furthermore, every organizational strength, weakness, threat
as well as opportunity gets identified in a better manner with the strategy.
ii) Business Alignment: The second vital and distinctive advantage of IS strategy is
that it provides better business alignment. Every expectation and business goal is being
aligned effectively with these strategies. It provides several advantages and can ensure
providing road map in the business [10]. Hence, the company of SSL should choose such
distinctive strategy for securing their information and gain relevant advantages. Moreover, a
successful business alignment can even reduce complexities in business process execution
effectively.
iii) High Pro-activeness: The next distinct and vital advantage of an information
security strategy is that it provides high pro activeness in the business. The business related
activities and events can easily take place, however these events never lead to the subsequent

6
BUSINESS INFORMATION SYSTEMS
security program to be driven by them. The entire strategic planning of such information
security can allow the respective business of Security Services Limited to remain on their
business efficiently.
iv) Provides Clear Definition: A proper IS strategy even provides clear definition and
direction to the business processes [1]. It would ensure that these business processes get
proper results and every realistic goal and objective can be well measured and communicate.
Thus, this organization of SSL will be properly benefitted with the subsequent strategy.
2.3 Analyses of Strategic Potentials for Better Investments in the Information System
and Technology from a Company Wide and Divisional Perspective with Explanation
and Justification of Business Process Re Engineering in Increasing IS and IT Potential
A significant strategic potential of a specific company is extremely vital to properly
assess as well as form all types of organizational objectives and goals. These regularities in
the system function dynamics are well analysed according to the unit contexts [5]. A major
assurance of this procedure of developing the company for decomposing these strategic
potentials. The major integrity, hierarchy and completeness can be referred to as 3 basic and
important characteristics of information system, which must be established within the
business in a perfect manner.
Security Services Limited comprises of 2 distinct perspectives for companywide and
division. These 2 perspectives will comprise of effective strategic potential for high
investment within information technology and system [11]. Such technology and system must
be deployed in the company to obtain several distinct benefits. Regarding divisional
perspective for Security Services Limited, effective communication is the major strategic
potential in better investment for IT and IS. It would help in reducing major complexities for
communication in various divisions. Furthermore, various issues related to cultural gaps and
BUSINESS INFORMATION SYSTEMS
security program to be driven by them. The entire strategic planning of such information
security can allow the respective business of Security Services Limited to remain on their
business efficiently.
iv) Provides Clear Definition: A proper IS strategy even provides clear definition and
direction to the business processes [1]. It would ensure that these business processes get
proper results and every realistic goal and objective can be well measured and communicate.
Thus, this organization of SSL will be properly benefitted with the subsequent strategy.
2.3 Analyses of Strategic Potentials for Better Investments in the Information System
and Technology from a Company Wide and Divisional Perspective with Explanation
and Justification of Business Process Re Engineering in Increasing IS and IT Potential
A significant strategic potential of a specific company is extremely vital to properly
assess as well as form all types of organizational objectives and goals. These regularities in
the system function dynamics are well analysed according to the unit contexts [5]. A major
assurance of this procedure of developing the company for decomposing these strategic
potentials. The major integrity, hierarchy and completeness can be referred to as 3 basic and
important characteristics of information system, which must be established within the
business in a perfect manner.
Security Services Limited comprises of 2 distinct perspectives for companywide and
division. These 2 perspectives will comprise of effective strategic potential for high
investment within information technology and system [11]. Such technology and system must
be deployed in the company to obtain several distinct benefits. Regarding divisional
perspective for Security Services Limited, effective communication is the major strategic
potential in better investment for IT and IS. It would help in reducing major complexities for
communication in various divisions. Furthermore, various issues related to cultural gaps and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
BUSINESS INFORMATION SYSTEMS
globalization would be reduced by this particular procedure. For the subsequent
companywide perspective in SSL, these information technologies and systems will ensure
that sensitive information is accessed by the respective users and any cyber attacker or hacker
will not get the scope for accessing or hacking these data under any circumstance [16].
Furthermore, the overall organizational productivity in SSL will even be incremented to a
high level without much issues.
BPR is being considered as one of the major and the most significant tool for this
company regarding radical re designing of every business procedure, thus obtaining major
improvement in production and quality of work. They could even increase the IS potential for
ensuring that every task is being executed effectively. The entire methodology for working
with BPR tool can even change the existing business methodology. BPR is extremely cost
effective, since it is helpful in eradicating non-value adding steps to improve quality and cost
[12]. Every extra layer of this IT is being removed so that data dissemination gets improved
effectively. Thus, SSL will get advantages with BPR tool in their business.
2.4 Describing about their Current Location of the IS Functionalities in SSL with
suitable Recommendation for the Most Appropriate Location for IT Services in Future
The IS functionalities within SSL is currently located in the organizational divisional
sector. This particular sector allows functions of financial management and general
management to get completed for the business [6]. The respective IT department has the
responsibility to check all the information security functions and four divisions of this sector,
include private transport division, business security division, domestic security division and
finally home office services division.
A suitable recommendation, which can bring the most appropriate location for several
important and significant information technology services in future would be their subsequent
BUSINESS INFORMATION SYSTEMS
globalization would be reduced by this particular procedure. For the subsequent
companywide perspective in SSL, these information technologies and systems will ensure
that sensitive information is accessed by the respective users and any cyber attacker or hacker
will not get the scope for accessing or hacking these data under any circumstance [16].
Furthermore, the overall organizational productivity in SSL will even be incremented to a
high level without much issues.
BPR is being considered as one of the major and the most significant tool for this
company regarding radical re designing of every business procedure, thus obtaining major
improvement in production and quality of work. They could even increase the IS potential for
ensuring that every task is being executed effectively. The entire methodology for working
with BPR tool can even change the existing business methodology. BPR is extremely cost
effective, since it is helpful in eradicating non-value adding steps to improve quality and cost
[12]. Every extra layer of this IT is being removed so that data dissemination gets improved
effectively. Thus, SSL will get advantages with BPR tool in their business.
2.4 Describing about their Current Location of the IS Functionalities in SSL with
suitable Recommendation for the Most Appropriate Location for IT Services in Future
The IS functionalities within SSL is currently located in the organizational divisional
sector. This particular sector allows functions of financial management and general
management to get completed for the business [6]. The respective IT department has the
responsibility to check all the information security functions and four divisions of this sector,
include private transport division, business security division, domestic security division and
finally home office services division.
A suitable recommendation, which can bring the most appropriate location for several
important and significant information technology services in future would be their subsequent

8
BUSINESS INFORMATION SYSTEMS
headquarters. As, their present location of division sector is eventually following the distinct
traditional methodologies for storing the information security functionalities; the selection of
headquarters as the location would be appropriate for them. Furthermore, this divisional
sector gets sub divided into 4 specific divisions, namely, HOSD, DSD, BSD and PTD and
hence every division comprises of its own distinct security aspect that comprises of the
chance of getting threatened. This issue will be resolved with selection of the new location of
headquarter in SSL.
3. Conclusion
Thus, conclusion could be drawn that a BIS is solely responsible for catering different
requirements of information for undertaking the most relevant decisions in any particular
business. Such distinctive systems can be termed as quite proactive and it should anticipate
all types of changes in the information requirements, before adapting themselves to get suited
to the requirements. It is quite important to consider that all organizational managers may get
completely involved in the regular activities for making the entire procedure of decision
making extremely easier. This report has properly outlined a complete case scenario of SSL
organization. It has the major responsibility to provide every possible kind of service related
to private security in the UK. SSL is providing different services such as armoured transport
for conveying cheque and cash in business and banks, provisioning services of domestic
security and different security aspects. Various details about SSL are described in this report
after identifying value obtained from current portfolio as well as strategic potential to ensure
better analysis of the organization.
BUSINESS INFORMATION SYSTEMS
headquarters. As, their present location of division sector is eventually following the distinct
traditional methodologies for storing the information security functionalities; the selection of
headquarters as the location would be appropriate for them. Furthermore, this divisional
sector gets sub divided into 4 specific divisions, namely, HOSD, DSD, BSD and PTD and
hence every division comprises of its own distinct security aspect that comprises of the
chance of getting threatened. This issue will be resolved with selection of the new location of
headquarter in SSL.
3. Conclusion
Thus, conclusion could be drawn that a BIS is solely responsible for catering different
requirements of information for undertaking the most relevant decisions in any particular
business. Such distinctive systems can be termed as quite proactive and it should anticipate
all types of changes in the information requirements, before adapting themselves to get suited
to the requirements. It is quite important to consider that all organizational managers may get
completely involved in the regular activities for making the entire procedure of decision
making extremely easier. This report has properly outlined a complete case scenario of SSL
organization. It has the major responsibility to provide every possible kind of service related
to private security in the UK. SSL is providing different services such as armoured transport
for conveying cheque and cash in business and banks, provisioning services of domestic
security and different security aspects. Various details about SSL are described in this report
after identifying value obtained from current portfolio as well as strategic potential to ensure
better analysis of the organization.

9
BUSINESS INFORMATION SYSTEMS
References
[1] K.C. Laudon and J.P. Laudon. Management Information Systems: Managing the Digital
Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice Hall Press. 2015.
[2] A. Cassidy. A practical guide to information systems strategic planning. Auerbach
Publications. 2016.
[3] R. Rajnoha, J. Kádárová, A. Sujová and G. Kádár. Business information systems: research
study and methodological proposals for ERP implementation process
improvement. Procedia-social and behavioral sciences, 109, pp.165-170. 2014.
[4] J.V. Brocke and M. Rosemann. Handbook on business process management 1:
Introduction, methods, and information systems. 2014.
[5] M. Rosemann and J.V. Brocke. Handbook on business process management 1:
introduction, methods, and information systems. Springer. 2015.
[6] Y.K. Dwivedi, D. Wastell, S. Laumer, H.Z. Henriksen, M.D. Myers, D. Bunker, A.
Elbanna, M.N. Ravishankar and S.C. Srivastava. Research on information systems failures
and successes: Status update and future directions. Information Systems Frontiers, 17(1),
pp.143-157. 2015.
[7] D. Veit, E. Clemons, A. Benlian, P. Buxmann, T. Hess, D. Kundisch, J.M. Leimeister, P.
Loos and M. Spann. Business models. Business & Information Systems Engineering, 6(1),
pp.45-53. 2014.
[8] D.T. Bourgeois. Information systems for business and beyond. 2018.
[9] M. Hammer. What is business process management?. In Handbook on business process
management 1 (pp. 3-16). Springer, Berlin, Heidelberg. 2015.
BUSINESS INFORMATION SYSTEMS
References
[1] K.C. Laudon and J.P. Laudon. Management Information Systems: Managing the Digital
Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice Hall Press. 2015.
[2] A. Cassidy. A practical guide to information systems strategic planning. Auerbach
Publications. 2016.
[3] R. Rajnoha, J. Kádárová, A. Sujová and G. Kádár. Business information systems: research
study and methodological proposals for ERP implementation process
improvement. Procedia-social and behavioral sciences, 109, pp.165-170. 2014.
[4] J.V. Brocke and M. Rosemann. Handbook on business process management 1:
Introduction, methods, and information systems. 2014.
[5] M. Rosemann and J.V. Brocke. Handbook on business process management 1:
introduction, methods, and information systems. Springer. 2015.
[6] Y.K. Dwivedi, D. Wastell, S. Laumer, H.Z. Henriksen, M.D. Myers, D. Bunker, A.
Elbanna, M.N. Ravishankar and S.C. Srivastava. Research on information systems failures
and successes: Status update and future directions. Information Systems Frontiers, 17(1),
pp.143-157. 2015.
[7] D. Veit, E. Clemons, A. Benlian, P. Buxmann, T. Hess, D. Kundisch, J.M. Leimeister, P.
Loos and M. Spann. Business models. Business & Information Systems Engineering, 6(1),
pp.45-53. 2014.
[8] D.T. Bourgeois. Information systems for business and beyond. 2018.
[9] M. Hammer. What is business process management?. In Handbook on business process
management 1 (pp. 3-16). Springer, Berlin, Heidelberg. 2015.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
BUSINESS INFORMATION SYSTEMS
[10] R.D. Galliers and D.E. Leidner. Strategic information management: challenges and
strategies in managing information systems. Routledge. 2014.
[11] G. Paré, M.C. Trudel, M. Jaana and S. Kitsiou. Synthesizing information systems
knowledge: A typology of literature reviews. Information & Management, 52(2), pp.183-199.
2015.
[12] J.F. Chang. Business process management systems: strategy and implementation.
Auerbach Publications. 2016.
[13] N.A. Ismail and M. King. Factors influencing the alignment of accounting information
systems in small and medium sized Malaysian manufacturing firms. Journal of Information
Systems and Small Business, 1(1-2), pp.1-20. 2014.
[14] Z. Sun, K. Strang and S. Firmin. Business analytics-based enterprise information
systems. Journal of Computer Information Systems, 57(2), pp.169-178. 2017.
[15] W.M. Van Der Aalst, M. La Rosa and F.M. Santoro. Business process management.
2016.
[16] K.D. Gronwald. Integrated Business Information Systems (Vol. 20). Springer. 2016.
BUSINESS INFORMATION SYSTEMS
[10] R.D. Galliers and D.E. Leidner. Strategic information management: challenges and
strategies in managing information systems. Routledge. 2014.
[11] G. Paré, M.C. Trudel, M. Jaana and S. Kitsiou. Synthesizing information systems
knowledge: A typology of literature reviews. Information & Management, 52(2), pp.183-199.
2015.
[12] J.F. Chang. Business process management systems: strategy and implementation.
Auerbach Publications. 2016.
[13] N.A. Ismail and M. King. Factors influencing the alignment of accounting information
systems in small and medium sized Malaysian manufacturing firms. Journal of Information
Systems and Small Business, 1(1-2), pp.1-20. 2014.
[14] Z. Sun, K. Strang and S. Firmin. Business analytics-based enterprise information
systems. Journal of Computer Information Systems, 57(2), pp.169-178. 2017.
[15] W.M. Van Der Aalst, M. La Rosa and F.M. Santoro. Business process management.
2016.
[16] K.D. Gronwald. Integrated Business Information Systems (Vol. 20). Springer. 2016.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.