MITS4001: Detailed Report on SSL's Business Information Systems

Verified

Added on  2022/10/04

|11
|2860
|211
Report
AI Summary
This report analyzes the information systems (IS) of Security Services Limited (SSL), a UK-based security provider. It examines SSL's current IS, including its strengths and weaknesses, and the values derived from it. The report identifies the lack of a coherent IS strategy and proposes the construction of a structured IS strategy, detailing its benefits. It also discusses investment in IS, re-engineering techniques to maximize IT potential, and the location of IS functions within SSL. The report suggests techniques for assessing future IS investments and recommends improvements across various divisions, including private transport, business security, and the Home Office Service Division. The analysis covers areas like automation, financial ledger applications, and the integration of advanced technologies to enhance security and operational efficiency. The report emphasizes the need for a centralized system, expert IT technicians, and the implementation of IS strategies across all levels of the company.
Document Page
Running Head: SSL
Security service Limited
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1SSL
Table of Contents
Introduction......................................................................................................................................2
Identification of Information System by SSL..................................................................................2
Lack of coherent IS strategy, construction of IS strategy and its benefits......................................3
Investment in IS...............................................................................................................................5
Location of IS function in SSL and recommendation.....................................................................6
Conclusion.......................................................................................................................................8
Reference.........................................................................................................................................9
Document Page
2SSL
Introduction
The Security Service Limited Company provides services of security all throughout the
UK and it has developed itself within thirty years. Its turnover have increased up-to 17% from
the last year. However, the structure of the company is not so favourable in term of business.
This report discuss about the information system of SSL and the values that it has acquired from
its current system of information. The techniques used to evaluate the investment in the
information system for the future is also discussed briefly. The construction of a strategy that the
information system can support the business and the ways it will benefit the business as a whole.
The potentials that the strategies can bring into the business by investing into the information
system and SSL’s technology for both the perspectives of company and several divisions. The
ways in which re-engineering can maximise the potential of IT into the business is also discussed
below. The location of IS functions in SSL is discussed too. Therefore, the aim of the report is to
discuss all the aspects of IS of SSL.
Identification of Information System by SSL
The information system is designed with the purpose of collecting, storing, processing
and distributing the information. The information system in a business is set as an inter-related
systems that uses the infrastructure of the Information Technology in order to generate the
information required in the processes of business [1]. The system acquires data from relevant
resources and then manipulate them according to the needs of the business.
The security service limited have evolved itself in last thirty years. It provides security to
a large number of its audience, one of which is the services of private security all over United
Kingdom. The ranges of services that SSL provides are individual persons, public sector as well
Document Page
3SSL
as the large companies [2]. The company of SSL have developed from its core services of
business and now it is associated with several companies’ security services. It has merged itself
with large companies in order to give the benefits of security services.
The values that SSL gets from IS are of secured transfer of cheques and cash within the
banks and business that is associated with high value of conveyance between the parties. The
Private transport Division planned to automate the scheduling of the vehicles along with the
security [3]. The costing of jobs are discovered by the information system that will be included.
The SSL is expected to provide support to the developing information system in the business
industry so that all the activities in the business can run smoothly in the presence of SSL.
The Home Office Service Division uses the most of the benefits of Information System
thus, the SSL have gained its highest values from this division only. The information system of
this division consists of microcomputer IBM AS/400 that can operate the software of costing and
budgeting as well as the financial ledger [4]. Several packages also run within the headquarters
which are directly linked to the AS/400. Therefore, this division processes information of the
management and financial accounting to the headquarters of SSL.
The technique of Net Present Value (NPV) can be used for assessing the Information
System for future investment as the technology is growing exponentially. Therefore, the need of
modifying the infrastructure is always present [5]. In NPV all the inflows and outflows of cash
are estimated for the present time thus, calculating the net loss or gain.
Lack of coherent IS strategy, construction of IS strategy and its benefits
The unavailability of coherent Information System by SSL is very much clear for the
company. This may affect the sustainability of the company [6]. In order to keep the business
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4SSL
running smoothly, construction of an Information Strategy that will be well structured is
necessary.
The strategy for business of a company is an essential part for a structured information
system. The planning of the information system is done is such a way that the business
objectives of the company are fulfilled in the coming future [7]. Therefore, the planning process
of the strategic information system is clearly defined within itself. The parallel relation of
Information System with the strategies of business form the strategic Information System.
A method of chain analysis can support the business strategy. The chain analysis helps in
figuring out strengths of the Information system [8]. The efficiency of the system can be
increased with the discovered strengths of the Information system. The analysis of value chain
shows the requirements that are needed in the infrastructure of the Information Technology
departments of the overall business.
The different systems used in the business forms the entire information system, however,
the systems may not work until the technologies and system follow the single strategic vision.
The Information System must have the focus for the strategic apply of the value chain analysis
into the system [9]. The information System can be used as a tool in order to give advantage to
the business. The SSL can be benefited by the innovation that occurred in the planning process
of the strategy. The goals of the business must be structured along with the long term and short
term goals. The aims of business must meet all the needs of the business as per the goals and
aims length. The Information System that allows the investments are used for the insights that
they provide, and these insights are used by the SSL [10]. The value chain analysis can predict
the investments for the modifications required in the infrastructure of the entire business
communication on a digital platform.
Document Page
5SSL
The benefits that can be derived from the above business strategy is the less costing of the
information technology system in the business [11]. The business computing graduate can easily
handle the Information system functions as the strategy will increase his efficiency of work. The
management of the financial part of the business will be more secured with the emerging
technologies. The interaction between the different departments and headquarter will be
efficient, frequent and fast.
Investment in IS
The greater investment of the Information System in the departments as well as in the
wide perspective of company will benefit the overall infrastructure of the company. The failure
of the SSL will directly affect the company in negative way. In order to save the company from
any security related threats investment in the Information System must be the priority of the
company [12]. The investment will attract more customer to the business as well as it will
provide a guarantee of the working personals’ loyalty to the company.
In the Private Transport Division the series of three personal computer are running the
network in order to manage the applications of Route planning of the transports, financial ledger
and the last one is the duty roistering [13]. With the investment in this department the routing
process of the vehicles can be automated with the emerging technologies. In the financial ledger
application the limited growth of scope can be intensified with advance technologies so that core
business operations can be carried out, and the last application can have self-generated rostering
of duty. The job costing that was done manually can be done on the online platform thus utilising
the investments of the Information System.
In the Business Security Division the different structures can utilise the investment for
sharing of the sales ledger to the Milton Keynes by the information technological applications
Document Page
6SSL
[14]. The standalone PC can be replaced with high functionality computers that increases the
performance of the sales department in tracking the sales record. The hard copies sent to
headquarter from this department can be sent via online transcription through advanced Pegasus
packages of payroll.
The Home Office Service Division can us the investment in the transportation area and
enhance the security in terms of technology, invest in the technologies that will increase the
efficiency of the traffic control so that the movement of prisoners become more secure. The
manual hard copy that is sent to headquarter by this department may not require, in place of that
the online transmitted soft copy can replace that.
The re-engineering technique will aid the Information technology as well as the
Information System of the company. This technique will increase the advantages by the
investment made in the Information system. The structured Information system strategy,
investment in the information system and introduction of reengineering will be implemented in
all the department as well as in headquarter of the company [15]. The thefts have spread from
small technological company to the medium technological company. Introduction of three
different PCs in the Transport division for the three different application running on them, duty
roasting can be done by the Bank of Midwest for payroll rostering as well as the duty rostering of
all the employees. In the emerging technological world the business recovery planning became
much relevant to the business. Therefore, re-engineering of the business process can benefit the
business for SSL.
Location of IS function in SSL and recommendation
The functions of the information technology get associated with the SSL of business and
then the different units tend to acquire those information without involving the headquarter that
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7SSL
manages the functions. Hence, the division for security does not involve in any kind of
investment for the Information System. Along with that the management of the Information
Technology get reduced for the different levels of the divisions. The Private transport division
includes the Information System functions for running of applications like the financial ledger
that carries out business operations related to the sage Sovereign, task transportation on the basis
of ad-hoc, then the auto route system that handles the scheduling of vehicles within a specific
route along with the SSL presence. And the roster of duties for the employees [16]. All this
functions of Information system are managed by the ex-policeman, who have experienced the
technological aspects by working in the force.
The function of Information System was earlier managed by the senior accountant of the
business in the business security division [11]. It has developed itself in the five years of time. It
has started to give response to the thefts happening in the hi-technology companies. The
information system have started to record data on online based ledger for sales and thus send
those to headquarter on monthly basis. A series of standalone PCs functions are introduced
because the PCs available in headquarter are incompatible of the individual PCs. The
implementation of the Pegasus package of payroll processing of the employees have the vast use
of the Information System within the SSL
The information system is most effective in the Home Office Service division it uses the
microcomputer of the IBM AS/400 that contains the software packages of budgeting, ledger and
costing. The software for rostering, route planning are also available with separate PCs. All the
PCs are connected with a single WAN. At last, headquarter of the company uses the traditional
methods for managing the financial background [6]. There is a need of advancement in
headquarter in terms of bringing the Information System into actual work.
Document Page
8SSL
According to the current state of the company, technological advancement are required.
The future investment in the Information System in all the divisional area and headquarter in
highly essential. A centralized system that manages all the divisions are required that will reduce
the overall cost of the company. It technician with high expertise in the field of information
technology is required for all the departments. The strategies of Information System must be
brought to practice in all levels and divisions. A centralized database system can be introduced
too for maintaining all the data generated in all department and managed well.
Conclusion
It can be concluded from the above report that SSL have several services for a varied
range of customer in UK. The information system of the company has several functionalities
however, investment in that system will benefit the company in future. The investment will
increase the efficiency of the company. High skilled IT technician are required for betterment of
the IT department. The company has several divisions and provides variable services starting
from transport routing, duty roistering etc. Therefore, re-engineering can bring several
innovation into the company’s infrastructure. A centralised management and database system
can provide great IT services in the near future.
Document Page
9SSL
Reference
[1] J. Dahmann, G. Rebovich, M. McEvilley, and G. Turner, Security engineering in a system of
systems environment. In IEEE International Systems Conference (SysCon) (pp. 364-369),
IEEE, 2013.
[2] A. Yener, and S. Ulukus, Wireless physical-layer security: Lessons learned from information
theory, Proceedings of the IEEE, 103(10), pp.1814-1825, 2015.
[3] P. Lacomme, M. Larabi, and N. Tchernev, Job-shop based framework for simultaneous
scheduling of machines and automated guided vehicles, International Journal of Production
Economics, 143(1), pp.24-34, 2013.
[4] Coyne, L., Becker, G., Langnor, R., Lindstrom, M., Nymann, P., Peres, F., Pott, N. J.
Sauvanet, and G. Yildirim, IBM Tivoli Storage Manager as a Data Protection Solution, IBM
Redbooks, 2014.
[5] U.M. Dikko, M.N. Alifiah, and I.D. Yahaya, A Critical Review of the Relationship between
Merger and Acquisitions and Firm’s Performance: The Moderation Effect of Corporate
Governance.
[6] E.K. Clemons, R.M. Dewan, R.J. Kauffman, and T.A. Weber, Understanding the
information-based transformation of strategy and society, Journal of Management
Information Systems, 34(2), pp.425-456, 2017.
[7] A.G. Chofreh, F.A. Goni, A.M. Shaharoun, S. Ismail, and J.J. Klemeš, Sustainable enterprise
resource planning: imperatives and research directions, Journal of Cleaner Production, 71,
pp.139-147, 2014.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10SSL
[8] M.A. Darmawan, M.P.I.F. Putra, and B. Wiguna, Value chain analysis for green productivity
improvement in the natural rubber supply chain: a case study, Journal of Cleaner Production,
85, pp.201-211, 2014.
[9] W. Smew, P. Young, and J. Geraghty, Supply chain analysis using simulation, Gaussian
process modelling and optimization, International Journal of Simulation Modelling, 12(3),
pp.178-189, 2013.
[10] K.C. Laudon, and J.P. Laudon, Management information system. Pearson Education
India, 2016.
[11] A. Bharadwaj, O.A. El Sawy, P.A. Pavlou, and N. Venkatraman, Digital business
strategy: toward a next generation of insights, MIS quarterly, pp.471-482, 2013.
[12] M. Pagani, Digital business strategy and value creation: framing the dynamic cycle of
control points, Mis Quarterly, pp.617-632, 2013.
[13] C.J. Woodard, N. Ramasubbu, F.T. Tschang, and V. Sambamurthy, Design capital and
design moves: The logic of digital business strategy, Mis Quarterly, pp.537-564, 2013.
[14] Z.A. Soomro, M.H. Shah, and J. Ahmed, Information security management needs more
holistic approach: A literature review, International Journal of Information Management,
36(2), pp.215-225, 2016.
[15] W.F. Massy, Reengineering the university: How to be mission centered, market smart,
and margin conscious, JHU Press, 2016.
[16] J. Stephens, and R. Valverde, Security of e-procurement transactions in supply chain
reengineering, Computer and Information Science, 6(3), 2013.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]