MITS4001 Business Information Systems: Analysis of Security Services
VerifiedAdded on 2023/04/04
|9
|2205
|327
Report
AI Summary
This report provides a comprehensive analysis of Security Services Limited (SSL) through the lens of Business Information Systems. It identifies the value derived from SSL's IT portfolio using the Ward and Griffith Matrix, emphasizing its role as a support system and enabler of operational efficiency. The report addresses the need for a coherent IS strategy, suggesting critical success factor analysis and value chain analysis to align IT investments with business objectives. It also evaluates the strategic benefits of increased IS investment, highlighting potential improvements in client engagement, provider communication, and core capabilities through business process re-engineering (BPR). Furthermore, the report examines the current decentralized IT management structure at SSL, advocating for a centralized approach to enhance efficiency, reduce costs, and integrate IT with strategic objectives, while recommending decentralized client support functions. Desklib offers a wealth of similar solved assignments and study resources for students.

Running head: BUSINESS INFORMATION SYSTEMS
BUSINESS INFORMATION SYSTEMS
Name of the Student
Name of the University
Author Note
BUSINESS INFORMATION SYSTEMS
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BUSINESS INFORMATION SYSTEMS 1
Question 1:
For identifying the value which the SSL derives from the portfolio that are belong to
the information systems, this is imperative for classifying the applications that are existing,
procedures as well as the people in according with the Ward and Griffith Matrix. The IT
resources that are physical at the SSL has comprised of the IBM AS/400 minicomputer, PCs
as well as the activities of the WAN. At the firm the software are including the budgeting and
costing software, Pegasus payroll system, productivity type packages and the rostering and
routing software (Changhui, & Ju, 2013). The resources of the IT human at the SSL is
including the ex-policeman who are working at the private Transport division, on the other
side the twenty four year old business computing graduate that are working in the division of
the business security, four programmers, hybrid manager, the programmer or analyst, two
computer operator systems and six data entry clerks. The value that considered as the primary
value for the resources of the IT offer to the SSL is for acting as one of the support system.
All of the assets that have been fallen under the category is including all of the software at the
organisation that makes this possible for running the functions of the business (Das, &
Samdaria, 2014). As example, the Pegasus payroll packages are easing the procedure of the
payment hence associating with the business for maintaining the staffs who are highly
motivated.
All of the other values of the portfolio is, this is able to contribute for the
operationalization of the procedures of the SSL as well as the activities. For the instance, the
AutoRoute based applications that can run on the pcs in the department of the transport of the
division of the private transport that helps in planning as well as scheduling all of the routes
for optimizing the operations of the business (Fabian et al., 2013). The network that is
running on the LAN network helps for the maintenance of the communication that is
Question 1:
For identifying the value which the SSL derives from the portfolio that are belong to
the information systems, this is imperative for classifying the applications that are existing,
procedures as well as the people in according with the Ward and Griffith Matrix. The IT
resources that are physical at the SSL has comprised of the IBM AS/400 minicomputer, PCs
as well as the activities of the WAN. At the firm the software are including the budgeting and
costing software, Pegasus payroll system, productivity type packages and the rostering and
routing software (Changhui, & Ju, 2013). The resources of the IT human at the SSL is
including the ex-policeman who are working at the private Transport division, on the other
side the twenty four year old business computing graduate that are working in the division of
the business security, four programmers, hybrid manager, the programmer or analyst, two
computer operator systems and six data entry clerks. The value that considered as the primary
value for the resources of the IT offer to the SSL is for acting as one of the support system.
All of the assets that have been fallen under the category is including all of the software at the
organisation that makes this possible for running the functions of the business (Das, &
Samdaria, 2014). As example, the Pegasus payroll packages are easing the procedure of the
payment hence associating with the business for maintaining the staffs who are highly
motivated.
All of the other values of the portfolio is, this is able to contribute for the
operationalization of the procedures of the SSL as well as the activities. For the instance, the
AutoRoute based applications that can run on the pcs in the department of the transport of the
division of the private transport that helps in planning as well as scheduling all of the routes
for optimizing the operations of the business (Fabian et al., 2013). The network that is
running on the LAN network helps for the maintenance of the communication that is

2BUSINESS INFORMATION SYSTEMS
seamless between the various departments that belongs to the Home office service division.
One more vale that is delivered by the resources of the IT at the SSL has been steering the
organisation that is towards to the realisation of the goals that are set as well as the objectives.
For illustrating the package of the business productivity in the PCs of the services of the
home office helps to determine the level of the productivity in the organisation.
At present the technology, there does not exist any of the denying that the SSL may
invest in the infrastructure of the IT. One of the metric is the period of the payback for
assessing how much this may take for recuperating the resources that are related to the
finance utilized in the investments of the IS.
Question 2:
Remarkably, many of the parts of the organization come up short on a lucid IS
technique a deficiency that may severe the organization's supportability as well as
aggressiveness. Consequently, there is a requirement for building an IS procedure which is
supportive to the business system. One of the ways in which the organization can plan a
compelling IS procedure is to lead a basic achievement factor investigation to build up the IT
requirements of each office and specialty unit of the organization (Hussain, 2013). Every
division or specialty unit is having the basic capacities that if not very much tended to, they
can slow down the company's tasks. In this way, recognizing the basic achievement factors in
each office would figure out where IT speculations are generally required. To delineate, a
vehicle office is probably going to require a course-arranging bundle in excess of a business
office or promoting unit. Besides, directing an esteem chain investigation will assist the
business with identifying its present IT capacities just as those advantages that provides a
focused edge. In the wake of distinguishing the IT resources, which are uncommon, special
seamless between the various departments that belongs to the Home office service division.
One more vale that is delivered by the resources of the IT at the SSL has been steering the
organisation that is towards to the realisation of the goals that are set as well as the objectives.
For illustrating the package of the business productivity in the PCs of the services of the
home office helps to determine the level of the productivity in the organisation.
At present the technology, there does not exist any of the denying that the SSL may
invest in the infrastructure of the IT. One of the metric is the period of the payback for
assessing how much this may take for recuperating the resources that are related to the
finance utilized in the investments of the IS.
Question 2:
Remarkably, many of the parts of the organization come up short on a lucid IS
technique a deficiency that may severe the organization's supportability as well as
aggressiveness. Consequently, there is a requirement for building an IS procedure which is
supportive to the business system. One of the ways in which the organization can plan a
compelling IS procedure is to lead a basic achievement factor investigation to build up the IT
requirements of each office and specialty unit of the organization (Hussain, 2013). Every
division or specialty unit is having the basic capacities that if not very much tended to, they
can slow down the company's tasks. In this way, recognizing the basic achievement factors in
each office would figure out where IT speculations are generally required. To delineate, a
vehicle office is probably going to require a course-arranging bundle in excess of a business
office or promoting unit. Besides, directing an esteem chain investigation will assist the
business with identifying its present IT capacities just as those advantages that provides a
focused edge. In the wake of distinguishing the IT resources, which are uncommon, special
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3BUSINESS INFORMATION SYSTEMS
and important, SSL would then be able to utilize this knowledge to figure out where to make
more investments for the IT.
Besides, an esteem chain investigation causes a firm for knowing the capacities it is
missing however which are fundamental in improving effectiveness. Take for example the
way that the present innovation foundation does not bolster computerized correspondence
that is between the divisional zones and home office. An esteem chain investigation is able to
help in indicating the need put resources into computerized correspondence framework that
might improve the association's centre capabilities (Jacobsson, Boldt & Carlsson, 2016).
Choosing the IT arranging procedure would likewise be a fundamental advance in causing
SSL to structure An IT system, which is steady of the methodology of the business. State that
SSL's authoritative structure is a matrix there the heads of specialty units are exclusively
responsible for their areas of expertise. In this manner, the IT arranging procedure ought not
to veer off excessively a long way from this game plan. Nevertheless, IT arranging is a key
capacity, and hence, a centre out or imaginative arranging procedure would function
admirably for SSL's situation. In addition, after that, it would likewise decide whether the
system is a long haul or short planned and whether it intends to serve inward or outer needs
or both.
The present IT system hampers correspondence between the specialty units as well as
the base camp, and it additionally prompts repetition. A powerful IT methodology would
expel this obstacle and thusly improve the company's ability. Additionally, there is no scope
for denying that the newly discovered proficiency would cut down SSL's expense of activities
since this should expel duplication of capacities (Leu, Huang & Wang, 2015). To show, there
should not be any compelling reason to keep up six information section assistants on the
and important, SSL would then be able to utilize this knowledge to figure out where to make
more investments for the IT.
Besides, an esteem chain investigation causes a firm for knowing the capacities it is
missing however which are fundamental in improving effectiveness. Take for example the
way that the present innovation foundation does not bolster computerized correspondence
that is between the divisional zones and home office. An esteem chain investigation is able to
help in indicating the need put resources into computerized correspondence framework that
might improve the association's centre capabilities (Jacobsson, Boldt & Carlsson, 2016).
Choosing the IT arranging procedure would likewise be a fundamental advance in causing
SSL to structure An IT system, which is steady of the methodology of the business. State that
SSL's authoritative structure is a matrix there the heads of specialty units are exclusively
responsible for their areas of expertise. In this manner, the IT arranging procedure ought not
to veer off excessively a long way from this game plan. Nevertheless, IT arranging is a key
capacity, and hence, a centre out or imaginative arranging procedure would function
admirably for SSL's situation. In addition, after that, it would likewise decide whether the
system is a long haul or short planned and whether it intends to serve inward or outer needs
or both.
The present IT system hampers correspondence between the specialty units as well as
the base camp, and it additionally prompts repetition. A powerful IT methodology would
expel this obstacle and thusly improve the company's ability. Additionally, there is no scope
for denying that the newly discovered proficiency would cut down SSL's expense of activities
since this should expel duplication of capacities (Leu, Huang & Wang, 2015). To show, there
should not be any compelling reason to keep up six information section assistants on the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4BUSINESS INFORMATION SYSTEMS
finance since correspondence would be consistent. Thirdly, SSL might pick up an unrivalled
upper hand since the innovation foundation should improve the nature of choices as well as
help the firm for exploiting new open doors in the market. A business unit director who has
another thought which might improve the offer will almost certainly discuss promptly with
the headquarter administrators as opposed to holding up till the message lands through
manual methods time by that one more firm may have caught the chance.
Question 3:
At the point when SSL chooses for channelling more assets to IS office, they should
assess if these speculations have key advantages to the association in the divisional as well as
far-reaching viewpoint. To outline, the residential security division might encounter horde
challenges on the off chance that it does not use front line innovation to while promoting new
administrations. The clients in the twenty first century are exceptionally requesting as well as
require the business for making a special effort to fulfil their needs (Mitropoulos, Othonos &
Douligeris, 2013). Likewise, the social stages have expanded purchaser capacity higher than
ever. Thusly IS ventures may help improve commitment with clients and at last motivate
brand dedication.
The providers to SSL's activities, for example, the vehicle vendors and suppliers of
regalia are fundamental to the organization's tasks, as well as in the present scene, the IT
framework does not encourage trust and correspondence with the providers. For example, in
the division of the home security, the firm may utilize the Internet of Things to support
security. Another vital potential has the chance to upgrade the centre abilities that are the
wellspring of upper hand. For instance, improving a capacity, for example, data handling
would convert into the ability of value and opportune choices.
finance since correspondence would be consistent. Thirdly, SSL might pick up an unrivalled
upper hand since the innovation foundation should improve the nature of choices as well as
help the firm for exploiting new open doors in the market. A business unit director who has
another thought which might improve the offer will almost certainly discuss promptly with
the headquarter administrators as opposed to holding up till the message lands through
manual methods time by that one more firm may have caught the chance.
Question 3:
At the point when SSL chooses for channelling more assets to IS office, they should
assess if these speculations have key advantages to the association in the divisional as well as
far-reaching viewpoint. To outline, the residential security division might encounter horde
challenges on the off chance that it does not use front line innovation to while promoting new
administrations. The clients in the twenty first century are exceptionally requesting as well as
require the business for making a special effort to fulfil their needs (Mitropoulos, Othonos &
Douligeris, 2013). Likewise, the social stages have expanded purchaser capacity higher than
ever. Thusly IS ventures may help improve commitment with clients and at last motivate
brand dedication.
The providers to SSL's activities, for example, the vehicle vendors and suppliers of
regalia are fundamental to the organization's tasks, as well as in the present scene, the IT
framework does not encourage trust and correspondence with the providers. For example, in
the division of the home security, the firm may utilize the Internet of Things to support
security. Another vital potential has the chance to upgrade the centre abilities that are the
wellspring of upper hand. For instance, improving a capacity, for example, data handling
would convert into the ability of value and opportune choices.

5BUSINESS INFORMATION SYSTEMS
The re-engineering of the Business process would prove to be useful in augmenting
the capability of IS as well as IT at SSL. BPR should assist the firm with establishing how the
business procedures enhance the business. For example, the BPR should take a gander at the
obtainment procedure and set up the redundancies as well as the trickeries that make
wastefulness simultaneously. Utilizing a VRIO investigation in the BPR would call attention
to the procedures, which are most profitable, uncommon, as well as the non-imitable since
those are the ones, which are a wellspring of the advantages of the SSL. After this
investigation, the BPR procedure would help with building up the procedure, which could
accumulate esteem whenever improved via the investments of the IS. The BPR might
likewise be the instrumental in distinguishing the procedures, which ought to be wiped out, or
those that might be converged with others.
Question 4:
There is an overwhelming truth about the functions of the IT at SSL; the capacity is
circulated over the specialty units with having no focal administration from the central
station. It is, hence, no uncertainty that some of the regions that are divisional like the local
security division is not having any of the IS ventures while the central command workplaces
fall behind to the head office administrations division. Likewise, the disparity in the work
force of the IT that is between the different divisions focuses to the absence of a concentrated
IT the executives. While the private transport division is overseen by an ex-policeman who
has involvement however no preparation in IT, the home office administrations division is
plentifully supplied with the IT specialists considering the nearness of a crossbreed
administrator with IT and money experience and two software engineers. The crumbling in
the manner IT is overseen comes from the manner in which the organization has become
throughout the years (Muftic, Abdullah & Kounelis, 2016). The firm has developed from
natural development from the first centre business, new companies in related security
The re-engineering of the Business process would prove to be useful in augmenting
the capability of IS as well as IT at SSL. BPR should assist the firm with establishing how the
business procedures enhance the business. For example, the BPR should take a gander at the
obtainment procedure and set up the redundancies as well as the trickeries that make
wastefulness simultaneously. Utilizing a VRIO investigation in the BPR would call attention
to the procedures, which are most profitable, uncommon, as well as the non-imitable since
those are the ones, which are a wellspring of the advantages of the SSL. After this
investigation, the BPR procedure would help with building up the procedure, which could
accumulate esteem whenever improved via the investments of the IS. The BPR might
likewise be the instrumental in distinguishing the procedures, which ought to be wiped out, or
those that might be converged with others.
Question 4:
There is an overwhelming truth about the functions of the IT at SSL; the capacity is
circulated over the specialty units with having no focal administration from the central
station. It is, hence, no uncertainty that some of the regions that are divisional like the local
security division is not having any of the IS ventures while the central command workplaces
fall behind to the head office administrations division. Likewise, the disparity in the work
force of the IT that is between the different divisions focuses to the absence of a concentrated
IT the executives. While the private transport division is overseen by an ex-policeman who
has involvement however no preparation in IT, the home office administrations division is
plentifully supplied with the IT specialists considering the nearness of a crossbreed
administrator with IT and money experience and two software engineers. The crumbling in
the manner IT is overseen comes from the manner in which the organization has become
throughout the years (Muftic, Abdullah & Kounelis, 2016). The firm has developed from
natural development from the first centre business, new companies in related security
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6BUSINESS INFORMATION SYSTEMS
portions and a takeover and merger with organizations offering related administrations. In
this manner, in spite of the fact that the business divisions are under the umbrella of one
organization they are autonomous in utilitarian zones, for example, displaying, deals and IT
prompting the absence of incorporated IT the board.
As at per now, the IS not working ideally for serving the organizations targets thus the
requirements for investigating a reasonable area for IT benefits later on. About the tasks the
executives of the IT foundation, a unified administration framework should help to improve
the proficiency and furthermore add to cost decrease since each office does not need to
contract its professional. For example, a unified IS activities the executives shall put the
obligations scope organization and reinforcement in hands of one division. IT staffing and
engineering ought to be interlaced with other vital destinations as this is the best way to
infuse a culture of utilizing on IS for advancing the business activities. Database organization
additionally should be overseen from a focal area. The main capacity that ought to be
decentralized is client bolster capacities like assistance work area backing and shared
administrations since these fluctuate from one unit to another.
portions and a takeover and merger with organizations offering related administrations. In
this manner, in spite of the fact that the business divisions are under the umbrella of one
organization they are autonomous in utilitarian zones, for example, displaying, deals and IT
prompting the absence of incorporated IT the board.
As at per now, the IS not working ideally for serving the organizations targets thus the
requirements for investigating a reasonable area for IT benefits later on. About the tasks the
executives of the IT foundation, a unified administration framework should help to improve
the proficiency and furthermore add to cost decrease since each office does not need to
contract its professional. For example, a unified IS activities the executives shall put the
obligations scope organization and reinforcement in hands of one division. IT staffing and
engineering ought to be interlaced with other vital destinations as this is the best way to
infuse a culture of utilizing on IS for advancing the business activities. Database organization
additionally should be overseen from a focal area. The main capacity that ought to be
decentralized is client bolster capacities like assistance work area backing and shared
administrations since these fluctuate from one unit to another.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7BUSINESS INFORMATION SYSTEMS
References:
Changhui, Y., & Ju, K. (2013). Research on business process and e-business platform design
for barter trade. Information Technology Journal, 12(19), 5315-5320.
Das, M. L., & Samdaria, N. (2014). On the security of SSL/TLS-enabled
applications. Applied Computing and informatics, 10(1-2), 68-81.
Fabian, B., Kunz, S., Müller, S., & Günther, O. (2013). Secure federation of semantic
information services. Decision Support Systems, 55(1), 385-398.
Hussain, M. A. (2013). A study of information security in e-commerce
applications. International Journal of Computer Engineering Science (IJCES), 3(3),
1-9.
Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation
system. Future Generation Computer Systems, 56, 719-733.
Khanh Dang, T., & Tri Dang, T. (2013). A survey on security visualization techniques for
web information systems. International Journal of Web Information Systems, 9(1), 6-
31.
Leu, F. Y., Huang, Y. L., & Wang, S. M. (2015). A Secure M-Commerce System based on
credit card transaction. Electronic Commerce Research and Applications, 14(5), 351-
360.
Mitropoulos, S., Othonos, C., & Douligeris, C. (2013). An effective and secure web banking
system: development and evaluation. International Journal of Business Information
Systems, 12(3), 335-361.
References:
Changhui, Y., & Ju, K. (2013). Research on business process and e-business platform design
for barter trade. Information Technology Journal, 12(19), 5315-5320.
Das, M. L., & Samdaria, N. (2014). On the security of SSL/TLS-enabled
applications. Applied Computing and informatics, 10(1-2), 68-81.
Fabian, B., Kunz, S., Müller, S., & Günther, O. (2013). Secure federation of semantic
information services. Decision Support Systems, 55(1), 385-398.
Hussain, M. A. (2013). A study of information security in e-commerce
applications. International Journal of Computer Engineering Science (IJCES), 3(3),
1-9.
Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation
system. Future Generation Computer Systems, 56, 719-733.
Khanh Dang, T., & Tri Dang, T. (2013). A survey on security visualization techniques for
web information systems. International Journal of Web Information Systems, 9(1), 6-
31.
Leu, F. Y., Huang, Y. L., & Wang, S. M. (2015). A Secure M-Commerce System based on
credit card transaction. Electronic Commerce Research and Applications, 14(5), 351-
360.
Mitropoulos, S., Othonos, C., & Douligeris, C. (2013). An effective and secure web banking
system: development and evaluation. International Journal of Business Information
Systems, 12(3), 335-361.

8BUSINESS INFORMATION SYSTEMS
Muftic, S., bin Abdullah, N., & Kounelis, I. (2016). Business information exchange system
with security, privacy, and anonymity. Journal of Electrical and Computer
Engineering, 2016.
Nakhumwa, N. J. (2014). Adoption of e-commerce payment systems by commercial banks in
Kenya. INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION
TECHNOLOGY, 9(2), 1600-1622.
Rhodes-Ousley, M. (2013). Information security: the complete reference. McGraw Hill
Education.
Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems
security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-
1384.
Sari, A., & Onursal, O. (2013). Role of Information Security in E-Business
Operations. International Journal of Information Technology and Business
Management, 3(1), 90-93.
Uddin, M. S., & Akhi, A. Y. (2014). E-wallet system for Bangladesh an electronic payment
system. International Journal of Modeling and Optimization, 4(3), 216.
Yang, J. J., Li, J., Mulder, J., Wang, Y., Chen, S., Wu, H., ... & Pan, H. (2015). Emerging
information technologies for enhanced healthcare. Computers in industry, 69, 3-11.
Muftic, S., bin Abdullah, N., & Kounelis, I. (2016). Business information exchange system
with security, privacy, and anonymity. Journal of Electrical and Computer
Engineering, 2016.
Nakhumwa, N. J. (2014). Adoption of e-commerce payment systems by commercial banks in
Kenya. INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION
TECHNOLOGY, 9(2), 1600-1622.
Rhodes-Ousley, M. (2013). Information security: the complete reference. McGraw Hill
Education.
Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems
security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-
1384.
Sari, A., & Onursal, O. (2013). Role of Information Security in E-Business
Operations. International Journal of Information Technology and Business
Management, 3(1), 90-93.
Uddin, M. S., & Akhi, A. Y. (2014). E-wallet system for Bangladesh an electronic payment
system. International Journal of Modeling and Optimization, 4(3), 216.
Yang, J. J., Li, J., Mulder, J., Wang, Y., Chen, S., Wu, H., ... & Pan, H. (2015). Emerging
information technologies for enhanced healthcare. Computers in industry, 69, 3-11.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




