MITS4001 Business Information System: SSL Case Study Analysis Report
VerifiedAdded on 2023/03/30
|10
|2274
|478
Report
AI Summary
This report analyzes the Business Information System (BIS) of Security Services Limited (SSL), a private security services provider in the UK. The report assesses SSL's current IT resources, including hardware, software, and human resources, and evaluates their alignment with business functions. It applies frameworks like the Ward and Griffith Matrix to understand the value of IT assets. The analysis identifies shortcomings in SSL's IS strategy, emphasizing the need for a well-defined IS procedure to support business units and divisions. The report explores the value chain to pinpoint IT capabilities and competitive advantages, recommending IT investments to enhance core competencies. It addresses issues like communication inefficiencies and the need for centralized IT management. Furthermore, the report evaluates the impact of IT investments on suppliers and the supply chain, and suggests improvements to streamline processes. Finally, it discusses the importance of aligning IT with business objectives, including the need for a centralized information management system, improved decision-making, and enhanced communication to drive organizational growth and efficiency.

Running head: BUSINESS INFORMATION SYSTEM
BUSINESS INFORMATION SYSTEM
Name of the Student
Name of the University
Author Note
BUSINESS INFORMATION SYSTEM
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BUSINESS INFORMATION SYSTEM 1
Question one:
The values which the current arrangement of the data arrangement of SSL is having
might be distinguished by characterization of the applications that are as of now existing
alongside the procedures and people groups also in understanding to the Ward and the
Griffith Matrix. A portion of the IT assets that are physical incorporates the PCs, WAN
availability as well as the IBM AS/400. There likewise exists certain product which
incorporates the accompanying:
• Pegasus finance bundle
• Budgeting and costing programming,
• Routing and rostering programming,
• Productivity type bundles;
Notwithstanding this a portion of the information tehnology HR is related with incorporates
the accompanying:
• One ex-policeman who is responsible for the Division of the Private Transport,
• A 24-year-old Business Computing Graduate responsible for the Business Security
Division,
• A crossover chief,
• Four software engineers,
• The investigator/developer,
• Six information section agents,
• A framework investigator, and
Question one:
The values which the current arrangement of the data arrangement of SSL is having
might be distinguished by characterization of the applications that are as of now existing
alongside the procedures and people groups also in understanding to the Ward and the
Griffith Matrix. A portion of the IT assets that are physical incorporates the PCs, WAN
availability as well as the IBM AS/400. There likewise exists certain product which
incorporates the accompanying:
• Pegasus finance bundle
• Budgeting and costing programming,
• Routing and rostering programming,
• Productivity type bundles;
Notwithstanding this a portion of the information tehnology HR is related with incorporates
the accompanying:
• One ex-policeman who is responsible for the Division of the Private Transport,
• A 24-year-old Business Computing Graduate responsible for the Business Security
Division,
• A crossover chief,
• Four software engineers,
• The investigator/developer,
• Six information section agents,
• A framework investigator, and

2BUSINESS INFORMATION SYSTEM
• Two PC administrator frameworks.
The estimations of SSL have been recorded as follows:
1. Values given by the assets that are related to the information technology which is in
charge of supporting the whole framework [1]. This specific classification is related with the
involving of the different sort of programming which are related with aiding in running of the
business capacities.
2. Second value incorporates the commitments as far as operationalisation of the
different sort of procedures and exercises of the SSL. One model is the auto course
alternative of the applications that are believed to be utilized by the PCs in the vehicle office
as well as it is related with creation of plans as well as the planning of the courses in order to
advance the business activities [14]. The LAN systems are utilized for helping in keeping up
the consistent association.
3. Followed by it is the directing of the association towards defining the objectives and
destinations. One model is the efficiency bundle utilized by the business in the personal
computer systems that are present in the Home Office Service Division of the association.
This aides in deciding the dimension of profitability and the methods to boost up the
generation,
The pace of that innovation which is becoming quickly is in charge of advancing of
the necessities identified with creation of speculation by the association, alongside the
desperate needs identified with foundation of specific networks so as to assess the ventures
upon the information structure [2]. One case of the matrix that incorporates the season of
restitution in order to evaluate the time which should be needed for recovering the monetary
assets which has just been built up upon the structure of the information.
• Two PC administrator frameworks.
The estimations of SSL have been recorded as follows:
1. Values given by the assets that are related to the information technology which is in
charge of supporting the whole framework [1]. This specific classification is related with the
involving of the different sort of programming which are related with aiding in running of the
business capacities.
2. Second value incorporates the commitments as far as operationalisation of the
different sort of procedures and exercises of the SSL. One model is the auto course
alternative of the applications that are believed to be utilized by the PCs in the vehicle office
as well as it is related with creation of plans as well as the planning of the courses in order to
advance the business activities [14]. The LAN systems are utilized for helping in keeping up
the consistent association.
3. Followed by it is the directing of the association towards defining the objectives and
destinations. One model is the efficiency bundle utilized by the business in the personal
computer systems that are present in the Home Office Service Division of the association.
This aides in deciding the dimension of profitability and the methods to boost up the
generation,
The pace of that innovation which is becoming quickly is in charge of advancing of
the necessities identified with creation of speculation by the association, alongside the
desperate needs identified with foundation of specific networks so as to assess the ventures
upon the information structure [2]. One case of the matrix that incorporates the season of
restitution in order to evaluate the time which should be needed for recovering the monetary
assets which has just been built up upon the structure of the information.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3BUSINESS INFORMATION SYSTEM
Question two:
From the investigation this has been recognized that numerous segments of the
association are missing suitable IS system which goes about as the inadequacy that are in
charge of being serious for the intensity just as the manageability of the association. Because
of this the requirement of detailing the IS procedure is vital in order to break down the
achievement factors that are significant [3]. This thus is related with giving of help with the
procedure of foundation of the IT requires of the specialty units and different divisions.
Tending to the necessities in an inappropriate manner may be in charge of the business
activities slowing down and therefore the basic elements are to be recognized in a legitimate
manner in order to decide the regions that requirements IT speculations.
Besides there is likewise a requirement of dissecting the esteem chain that is related
with aiding in the distinguishing the abilities of the current IT as well as the advantages
which are related with offering the focused edge. After fruitful distinguishing proof the
uncommon IT resources which are uncommon and novel would be related with causing the
association to end up fit for deciding the zones requiring IT ventures. Pursued by this the
esteem chain investigation is related with aiding in recognizable proof of the abilities that are
having the need yet is significant for making upgrades in the effectiveness [4]. That sort of
examination is related with aiding in pointing out of the requirements for the information
technology foundation speculation in order for improving the centre capabilities of the
association. Another vital piece of progress includes the assurance of the information
technology for arranging procedure as well as the structure of the association is viewed as a
grid which comprises of the business heads who might be altogether in the divisions charge.
One of the key capacities is the arranging of the IT which is in charge of making the centre
out just as the creative arrangement for going well with the association.
Question two:
From the investigation this has been recognized that numerous segments of the
association are missing suitable IS system which goes about as the inadequacy that are in
charge of being serious for the intensity just as the manageability of the association. Because
of this the requirement of detailing the IS procedure is vital in order to break down the
achievement factors that are significant [3]. This thus is related with giving of help with the
procedure of foundation of the IT requires of the specialty units and different divisions.
Tending to the necessities in an inappropriate manner may be in charge of the business
activities slowing down and therefore the basic elements are to be recognized in a legitimate
manner in order to decide the regions that requirements IT speculations.
Besides there is likewise a requirement of dissecting the esteem chain that is related
with aiding in the distinguishing the abilities of the current IT as well as the advantages
which are related with offering the focused edge. After fruitful distinguishing proof the
uncommon IT resources which are uncommon and novel would be related with causing the
association to end up fit for deciding the zones requiring IT ventures. Pursued by this the
esteem chain investigation is related with aiding in recognizable proof of the abilities that are
having the need yet is significant for making upgrades in the effectiveness [4]. That sort of
examination is related with aiding in pointing out of the requirements for the information
technology foundation speculation in order for improving the centre capabilities of the
association. Another vital piece of progress includes the assurance of the information
technology for arranging procedure as well as the structure of the association is viewed as a
grid which comprises of the business heads who might be altogether in the divisions charge.
One of the key capacities is the arranging of the IT which is in charge of making the centre
out just as the creative arrangement for going well with the association.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4BUSINESS INFORMATION SYSTEM
IT system set up effectively would be in charge of bringing of parcel of advantages as well as
one such that is the improved the capacities of the business. One case of the presence of
inappropriate IT technique is the correspondence hampering as a result of the procedure of
the IT which is as of now existing [5]. The procedure of the IT is additionally in charge of the
evacuation of the procedure identified with capacity duplication as well as it would help in
expelling the requirement of the six information section assistants.
IT is additionally useful in having an upper hand and the purpose for this is the IT
should be related with helping a ton in the basic leadership in a way that is improved by
methods for usage of the new chances. Notwithstanding it the unit of the business chief who
might have new thought would likewise be in charge of creation of upgrades during the time
spent making incentive enhancements [6]. the IT should likewise be useful in formation of
legitimate correspondence implies by utilization of appropriate mediums which is useful in
dispensing with the more drawn out holding up times just as the hazard identified with the
seizing of the open-door different contenders.
Question three:
The choices identified with the directing of the assets is to be assessed in a legitimate manner
in order to decide whether the ventures are related with bringing of key advantages for the
association or not. SSL has been available in the privacy area would prompt losing of clients
if there should arise an occurrence of any error. Consequently, there is a requirement of
making IT interests in an appropriate manner in order to cause the association to wind up
equipped for conveying estimations of astounding which would likewise be special in nature
[13]. The structure of the information speculations is additionally connected with helping all
of the organisations for the improvement in the commitment of the clients alongside aiding in
motivating business faithfulness.
IT system set up effectively would be in charge of bringing of parcel of advantages as well as
one such that is the improved the capacities of the business. One case of the presence of
inappropriate IT technique is the correspondence hampering as a result of the procedure of
the IT which is as of now existing [5]. The procedure of the IT is additionally in charge of the
evacuation of the procedure identified with capacity duplication as well as it would help in
expelling the requirement of the six information section assistants.
IT is additionally useful in having an upper hand and the purpose for this is the IT
should be related with helping a ton in the basic leadership in a way that is improved by
methods for usage of the new chances. Notwithstanding it the unit of the business chief who
might have new thought would likewise be in charge of creation of upgrades during the time
spent making incentive enhancements [6]. the IT should likewise be useful in formation of
legitimate correspondence implies by utilization of appropriate mediums which is useful in
dispensing with the more drawn out holding up times just as the hazard identified with the
seizing of the open-door different contenders.
Question three:
The choices identified with the directing of the assets is to be assessed in a legitimate manner
in order to decide whether the ventures are related with bringing of key advantages for the
association or not. SSL has been available in the privacy area would prompt losing of clients
if there should arise an occurrence of any error. Consequently, there is a requirement of
making IT interests in an appropriate manner in order to cause the association to wind up
equipped for conveying estimations of astounding which would likewise be special in nature
[13]. The structure of the information speculations is additionally connected with helping all
of the organisations for the improvement in the commitment of the clients alongside aiding in
motivating business faithfulness.

5BUSINESS INFORMATION SYSTEM
One of the essential pieces of the SSL is related with the Suppliers. The IT
foundation which is as of now existing isn't related with the support of encouraging the
correspondence with the partners one such model is the way toward taking subsequent meet-
ups of the instalments which alongside being troublesome are likewise strenuous in nature
[7]. In any case on the off chance that there are existing a State-of-workmanship
documentation framework, at that point would be most likely be extremely useful for the
providers as well as this would likewise be related with the disposal of the requirements
identified with visiting sea stop take subsequent meet-ups. IT ventures are likewise useful
during the time spent streamlining the diverse sort of various production network process too.
Business Re-building or the BRE is likewise useful really taking shape the IS as well
as the IT possibilities get augmented. Directing of the VIRO investigation point outs the way
that the important procedure is uncommon alongside being non-imitable that thusly is in
charge of going about as the fundamental purpose for giving of upper hand [8]. This
examination is likewise useful during the time spent building up the procedure that are having
the ability of the obtaining the new qualities in the event that they have been improved by the
speculations made upon by the Information Technology.
Question four:
Considering the functionalities of the IT of SSL it very well may be expressed that the
capacities are conveyed over the distinctive useful units as well as there exists no focal
administration from the central command, so it tends to be expressed that there are a few
divisions of SSL that are missing appropriate IS ventures [9]. One such division is the
residential security. Moreover, the disparity which supposedly is existing among the IT
experts are additionally in charge of advancing of the way that here is a nonattendance of
appropriate and concentrated administration of the Information Technology. The vehicle
One of the essential pieces of the SSL is related with the Suppliers. The IT
foundation which is as of now existing isn't related with the support of encouraging the
correspondence with the partners one such model is the way toward taking subsequent meet-
ups of the instalments which alongside being troublesome are likewise strenuous in nature
[7]. In any case on the off chance that there are existing a State-of-workmanship
documentation framework, at that point would be most likely be extremely useful for the
providers as well as this would likewise be related with the disposal of the requirements
identified with visiting sea stop take subsequent meet-ups. IT ventures are likewise useful
during the time spent streamlining the diverse sort of various production network process too.
Business Re-building or the BRE is likewise useful really taking shape the IS as well
as the IT possibilities get augmented. Directing of the VIRO investigation point outs the way
that the important procedure is uncommon alongside being non-imitable that thusly is in
charge of going about as the fundamental purpose for giving of upper hand [8]. This
examination is likewise useful during the time spent building up the procedure that are having
the ability of the obtaining the new qualities in the event that they have been improved by the
speculations made upon by the Information Technology.
Question four:
Considering the functionalities of the IT of SSL it very well may be expressed that the
capacities are conveyed over the distinctive useful units as well as there exists no focal
administration from the central command, so it tends to be expressed that there are a few
divisions of SSL that are missing appropriate IS ventures [9]. One such division is the
residential security. Moreover, the disparity which supposedly is existing among the IT
experts are additionally in charge of advancing of the way that here is a nonattendance of
appropriate and concentrated administration of the Information Technology. The vehicle
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6BUSINESS INFORMATION SYSTEM
division which is overseen by the ex-policeman supposedly is having knowledge yet is
having an absence of preparing as far as dealing with the IT. Alongside this the nearness of a
half breed supervisor who is having a decent encounter with respect to the budgetary and the
IT, in the home office division apparently is plentifully supplied by the IT specialists just as
by the developers who are available in the office [10]. Moreover, the crumbling which
apparently is existing in the methods for dealing with the IT supposedly is in charge of
stemming as far as the ways by which the association has developed over the most recent
couple of years. The presence of the centre business alongside the new businesses as far as
the security sections just as during the time spent dominating and getting converged with
different organizations demonstrating same administrations, has been partner with helping the
association in developing as far as having a natural development.
The current circumstance of SSL depicts the way that the current IS of the SSL isn't
related with working in an ideal path in order for serving the targets which the firm is having
as well as because of this there exists a fundamental need of investigating the IT as well as
the IS in order to recognize the territories that are in basic need of making speculations to
help the association in develop in future [11]. Other than the by considering the different
tasks of the administration office existing in IT foundation helps in deciding the reality there
exists a concentrated administration framework which is related with giving help with the
way toward improving the proficiency alongside being enjoyed making commitments in
order to diminish the expense. The principle reason which apparently is lying behind this is
every one of the branches of SSL would not be requiring any sort of contracting of the
professionals. Notwithstanding this when the IS procedure is being viewed as it portrays the
way that the best alternative is to consider the vital capacities which should be completed to
help the officials existing at the top dimension [12]. Other than such an excess of interlacing
of the various segments that the IS technique is having with the other key goals is related
division which is overseen by the ex-policeman supposedly is having knowledge yet is
having an absence of preparing as far as dealing with the IT. Alongside this the nearness of a
half breed supervisor who is having a decent encounter with respect to the budgetary and the
IT, in the home office division apparently is plentifully supplied by the IT specialists just as
by the developers who are available in the office [10]. Moreover, the crumbling which
apparently is existing in the methods for dealing with the IT supposedly is in charge of
stemming as far as the ways by which the association has developed over the most recent
couple of years. The presence of the centre business alongside the new businesses as far as
the security sections just as during the time spent dominating and getting converged with
different organizations demonstrating same administrations, has been partner with helping the
association in developing as far as having a natural development.
The current circumstance of SSL depicts the way that the current IS of the SSL isn't
related with working in an ideal path in order for serving the targets which the firm is having
as well as because of this there exists a fundamental need of investigating the IT as well as
the IS in order to recognize the territories that are in basic need of making speculations to
help the association in develop in future [11]. Other than the by considering the different
tasks of the administration office existing in IT foundation helps in deciding the reality there
exists a concentrated administration framework which is related with giving help with the
way toward improving the proficiency alongside being enjoyed making commitments in
order to diminish the expense. The principle reason which apparently is lying behind this is
every one of the branches of SSL would not be requiring any sort of contracting of the
professionals. Notwithstanding this when the IS procedure is being viewed as it portrays the
way that the best alternative is to consider the vital capacities which should be completed to
help the officials existing at the top dimension [12]. Other than such an excess of interlacing
of the various segments that the IS technique is having with the other key goals is related
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7BUSINESS INFORMATION SYSTEM
going about as the most ideal method for infusing the way of life identified with the utilizing
of the IS to cause the business activities to get upgraded. Another main consideration that is
to be considered is the administration of the information organization from a brought together
area alongside the framework that might be decentralized incorporates those capacities that
might be related with managing the backings from the clients.
going about as the most ideal method for infusing the way of life identified with the utilizing
of the IS to cause the business activities to get upgraded. Another main consideration that is
to be considered is the administration of the information organization from a brought together
area alongside the framework that might be decentralized incorporates those capacities that
might be related with managing the backings from the clients.

8BUSINESS INFORMATION SYSTEM
References:
[1] Laudon, Kenneth C., and Jane P. Laudon. Management Information Systems: Managing
the Digital Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice
Hall Press, 2015.
[2] Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson
Education India, 2016.
[3] Chang, James F. Business process management systems: strategy and implementation.
Auerbach Publications, 2016.
[4] Hair Jr, Joseph F., Mary Wolfinbarger, Arthur H. Money, Phillip Samouel, and Michael J.
Page. Essentials of business research methods. Routledge, 2015.
[5] Peltier, Thomas R. Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications, 2016.
[6] Smith, Linda C., and Melissa A. Wong, eds. Reference and Information Services: An
Introduction: An Introduction. ABC-CLIO, 2016.
[7] Abbasi, Ahmed, Suprateek Sarker, and Roger HL Chiang. "Big data research in
information systems: Toward an inclusive research agenda." Journal of the Association
for Information Systems 17, no. 2 (2016): I.
[8] Gomez-Uribe, Carlos A., and Neil Hunt. "The netflix recommender system: Algorithms,
business value, and innovation." ACM Transactions on Management Information
Systems (TMIS) 6, no. 4 (2016): 13.
[9] Hammer, Michael. "What is business process management?." In Handbook on business
process management 1, pp. 3-16. Springer, Berlin, Heidelberg, 2015.
[10] Alles, Michael, Gerard Brennan, Alexander Kogan, and Miklos A. Vasarhelyi.
"Continuous monitoring of business process controls: A pilot implementation of a
References:
[1] Laudon, Kenneth C., and Jane P. Laudon. Management Information Systems: Managing
the Digital Firm Plus MyMISLab with Pearson eText--Access Card Package. Prentice
Hall Press, 2015.
[2] Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson
Education India, 2016.
[3] Chang, James F. Business process management systems: strategy and implementation.
Auerbach Publications, 2016.
[4] Hair Jr, Joseph F., Mary Wolfinbarger, Arthur H. Money, Phillip Samouel, and Michael J.
Page. Essentials of business research methods. Routledge, 2015.
[5] Peltier, Thomas R. Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications, 2016.
[6] Smith, Linda C., and Melissa A. Wong, eds. Reference and Information Services: An
Introduction: An Introduction. ABC-CLIO, 2016.
[7] Abbasi, Ahmed, Suprateek Sarker, and Roger HL Chiang. "Big data research in
information systems: Toward an inclusive research agenda." Journal of the Association
for Information Systems 17, no. 2 (2016): I.
[8] Gomez-Uribe, Carlos A., and Neil Hunt. "The netflix recommender system: Algorithms,
business value, and innovation." ACM Transactions on Management Information
Systems (TMIS) 6, no. 4 (2016): 13.
[9] Hammer, Michael. "What is business process management?." In Handbook on business
process management 1, pp. 3-16. Springer, Berlin, Heidelberg, 2015.
[10] Alles, Michael, Gerard Brennan, Alexander Kogan, and Miklos A. Vasarhelyi.
"Continuous monitoring of business process controls: A pilot implementation of a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9BUSINESS INFORMATION SYSTEM
continuous auditing system at Siemens." In Continuous Auditing: Theory and
Application, pp. 219-246. Emerald Publishing Limited, 2018.
[11] Schaltegger, Stefan, Erik G. Hansen, and Florian Lüdeke-Freund. "Business models
for sustainability: Origins, present research, and future avenues." (2016): 3-10.
[12] Dwivedi, Yogesh K., David Wastell, Sven Laumer, Helle Zinner Henriksen, Michael
D. Myers, Deborah Bunker, Amany Elbanna, M. N. Ravishankar, and Shirish C.
Srivastava. "Research on information systems failures and successes: Status update and
future directions." Information Systems Frontiers 17, no. 1 (2015): 143-157.
[13] Zur Muehlen, Michael, and Robert Shapiro. "Business process analytics."
In Handbook on Business Process Management 2, pp. 243-263. Springer, Berlin,
Heidelberg, 2015.
[14] Greasley, Andrew. Simulation modelling for business. Routledge, 2017.
continuous auditing system at Siemens." In Continuous Auditing: Theory and
Application, pp. 219-246. Emerald Publishing Limited, 2018.
[11] Schaltegger, Stefan, Erik G. Hansen, and Florian Lüdeke-Freund. "Business models
for sustainability: Origins, present research, and future avenues." (2016): 3-10.
[12] Dwivedi, Yogesh K., David Wastell, Sven Laumer, Helle Zinner Henriksen, Michael
D. Myers, Deborah Bunker, Amany Elbanna, M. N. Ravishankar, and Shirish C.
Srivastava. "Research on information systems failures and successes: Status update and
future directions." Information Systems Frontiers 17, no. 1 (2015): 143-157.
[13] Zur Muehlen, Michael, and Robert Shapiro. "Business process analytics."
In Handbook on Business Process Management 2, pp. 243-263. Springer, Berlin,
Heidelberg, 2015.
[14] Greasley, Andrew. Simulation modelling for business. Routledge, 2017.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.