MITS4001 Business Information Systems: Security Services Limited UK

Verified

Added on  2023/03/30

|10
|2332
|430
Report
AI Summary
This report provides a comprehensive analysis of Security Services Limited's (SSL) business information system, addressing key aspects such as the value of IT assets, the need for a coherent IS strategy, the evaluation of IT investments, and the management of IT functionalities. It identifies the strengths and weaknesses within SSL's current IT infrastructure, highlighting the lack of centralized IT management and the need for strategic alignment between IT investments and business objectives. The report emphasizes the importance of establishing metrics to assess IT investments, improving communication with suppliers, and re-engineering business processes to enhance core capabilities. Furthermore, it suggests a centralized IT management framework to improve efficiency, reduce costs, and promote a culture of utilizing IS to advance business activities, ultimately driving competitive advantage for SSL. Desklib offers a wealth of resources, including similar reports and past papers, to support students in their academic endeavors.
Document Page
Running head: BUSINESS INFORMATION SYSTEM
BUSINESS INFORMATION SYSTEM
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BUSINESS INFORMATION SYSTEM 1
Question 1:
Recognizing the esteem which is inferred by the SSL by utilization of the current data
framework, is viewed as basic for the characterizing the applications procedure and the
people groups which are as of now existing in agreement to the Ward as well as the Griffith
Matrix. The IT assets that are physical of the SSL chiefly comprises of the PCs, IBM AS/400
minicomputer as well as the WAN availability. Other than this the product of the firm
incorporates the Pegasus finance bundle, planning and costing programming, directing and
rostering programming, and profitability type bundles [1]. The IT HR is related with
including the ex-policeman who were working at the Division of the Private Transport, the
24-year-old Business Computing Graduate who were working in the Division of the Business
Security, the half and half director, four developers, the expert/software engineer, six
information passage representatives, a framework investigator, and two PC administrator
frameworks.
The first esteem which is given by the information technology related assets of the
SSL incorporates going about as an emotionally supportive network. The benefits that are
seen to be falling under the classification is related with various sort of programming which
are in charge of making this feasible for that business capacities to run.
One moe esteem is related with the inclusion of the commitments identified with the
operationalization of the progress of the SSL alongside the exercises. For instance, the auto
course application which apparently is running within the PCs of the vehicle office that the
Division of the Private Transport is having as well as it is related with aiding in the arranging
and planning of the courses to advance the activities of that business [2]. Moreover, the LAN
systems are related with aiding in the support of a consistent correspondence.
Document Page
2BUSINESS INFORMATION SYSTEM
Controlling of the association towards the acknowledgment of the arrangement of
objectives and goals is another esteem. For instance, the profitability bundle of that business
which can be done in the PCs of the Division of the Home Office Services that is related with
aiding in the assurance of the efficiency dimension of the organizations as well as how the
efficiency can be supported [3]. Moreover, the IT specialists are additionally connected with
holding of vital and operational incentive for the organization because they are in charge of
improving the organization's operational productivity.
The developing pace that is related to the innovation is one of the significant reasons
that is lying behind the requirement of contributing upon the framework by SSL.
Notwithstanding this there additionally exists a desperate need of setting up specific grids to
assess the speculations upon the data frameworks [4]. One of the measurements is related
with the inclusion of the restitution time frame to survey to what extent it is taking to recover
the budgetary assets which has just been contributed upon the Information structure.
Question 2:
Extensively it tends to be expressed that numerous pieces of the organization
apparently are having an absence of a rational IS methodology which is viewed as the lack
that may be exceptionally serious for the intensity and the maintainability of the association.
Consequently, there exists a basic need of building an IS procedure which would offer help
the whole business technique. One method for planning the IS procedure incorporates the
investigation of the basic achievement factors. It should help in building up each division and
specialty units that are needed by the IT. The improver advised tending to the requirements
would lead slowing down of that business tasks, so the basic factors should be distinguished
for every single division which would help in assurance of the territories that needs the
investments for the IT.
Document Page
3BUSINESS INFORMATION SYSTEM
Second of each is the directing of an examination of the esteem chain which aides in
the recognizable proof of the IT abilities that are existing alongside the benefits offering a
focused edge [5]. When distinguished the IT resources which are uncommon alongside being
one of a kind and important, might make SSL equipped for utilizing the bits of knowledge in
order to decide territories requiring IT ventures.
Furthermore, the examination of the esteem chain is additionally useful in realizing
the capacities having a need however are significant for productivity improvement. This
examination is additionally useful in indicating out the necessities related ventures upon the
framework for advanced correspondence, helping the association for the improvement of the
centre abilities. Deciding the IT arranging procedure goes about as an essential area of the
way toward planning the IT technique. The associations structure is where the heads of the
business are having the total charge for the divisions [6]. Be that as it may, the IT arranging is
related with acting a vital capacity because of which the centre out as well as the creative
arranging procedure would work very good thing for the SSL. Pursued by this this might
likewise be associating in the assurance of the way that if the methodology is present moment
or long haul and, in the event, that it is gone for serving the outside and the interior business
needs.
Achievement in building up the IT procedure would bring a ton of advantages, one of
that is partner with that is including the ability improvement for the business. One example is
the hampering of the correspondence by the current IT system. Also, the IT procedure would
help in expulsion of the obstacles alongside the upgrade of the capacities. The new
established proficiency would likewise be helping by thee bring down of the expense that are
operational because of the evacuation of the duplication of the capacities which thusly would
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4BUSINESS INFORMATION SYSTEM
take out the need of keeping at least six information section assistants in the finance
framework.
Pursued by it is the picking up of upper hand with no sort of adversaries as the
information technology might help in taking of the choices that are improved by helping the
firm in exploiting the new open doors [7]. The specialty unit supervisor having the thought
that is new, might be related with the improvement of the offer would likewise be equipped
for having prompt correspondence with the base camp as opposed to experiencing a more
drawn out procedure of pausing and around then some other association may be related with
catching that specific chance.
Question 3:
At the point when SSL chose for channelling more of the assets to the office of the
information technology, they would have the requirement of assessing the way which
whether the IT speculations are having a key advantage for the association as far as the
divisional as well as the far-reaching viewpoint. Being in the security administration industry
any sort of disappointment would be in charge of losing customers. Because of this the there
is a requirement of IT speculation that should be related with the making of the business
equipped for convey esteem which are remarkable. The IS speculations would help in
improving the client commitment alongside moving the business dedication also.
The providers of the SSL goes about as a fundamental piece of that business activities
and the current IT foundation isn't related with encouraging the trust as well as the
correspondence with the providers, for instance if the provider of the division of the security
office needs for taking a follow up of the payments instalment then this might be hard for
them just as strenuous [8]. Be that as it may, with the nearness of the State of Art archive
Document Page
5BUSINESS INFORMATION SYSTEM
framework would help the provider a great deal and would likewise wipe out the requirement
of making them visit to take development. Interest in the IT should be likewise be in charge
of the streamlining of the store network process alongside helping the association in
separating its own items from the others. Another key potential is the open door for
upgrading the centre capabilities which goes about as a wellspring of the upper hand.
Re-designing of the business might likewise be related with boosting the IS as well as the IT
possibilities. This would likewise associated in the foundation of the ways by which the
esteem might be added to the forms the business. The VRIO investigation of that is partner
with by the that could not be pointing out the fat the procedures which are believed to be
significant alongside being uncommon and non-imitable and the explanation for this is they
are related with going about as the wellspring of the upper hand [10]. The investigation
would likewise be helping in setting up procedure which are equipped for accumulating the
qualities in the event that they are improved by methods for making IS speculations. This
would likewise be going about as instrumental during the time spent recognizing the
procedures which ought to dispense with or can be combined.
Question 4:
O There exists a specific prevail truth at whatever point the IT functionalities are
considered at the association SSL well as the capacity supposedly is circulated the whole way
across various utilitarian units with no sort of presence of focal administration from the
central station. From this it tends to be expressed that there exists most likely that a portion of
the divisional zones, for example, the residential security division isn't having any sort of IS
ventures while the home office is likewise observed to fall behind the home office
administration division. Notwithstanding this the error existing in the IT work force between
the various divisions of the association is related with pointing out the way that there is an
Document Page
6BUSINESS INFORMATION SYSTEM
absence of a brought together IT the executives [11]. Anyway the private transport division
apparently is overseen by an ex-policeman who is seen to having an encounter yet needs
legitimate preparing identified with the IT and the home office division is blessed by the gods
with the IT specialists by thinking about the nearness of the half and half administrator who is
having the IT just as money related understanding alongside the two software engineers.
Other than this the breaking down existing in the manner by which is IT is overseen
supposedly is originating from the ways by which the organization has become throughout
the years. The firm is likewise observed to have developed from the natural development
which is because of the first centre business and the new businesses in connection to the
security fragments alongside dominating and converging with the organizations who are
related with giving of comparable administrations.
The present condition of the association is delineating the way that the IS of the association
isn't working in an ideal route for serving the destinations of the firm and thus it should be
investigated in order to decide a reasonable area for the IT benefits left. Mulling over the
activities of the administration of the IT Infrastructure there exists a brought together
administration framework which would help in making enhancements if the productivity
alongside being related with making commitments during the time spent diminishing the
expense. The purpose for this is every one of the offices would not be requiring the
employing of professional. Considering the IS technique, it tends to be expressed that it is
ideal to consider this as a key capacity which is to be done by the officials existing in the top
dimensions. Notwithstanding this it is likewise basic to entwine the parts of the IS technique
with the other key goals as this goes about as the main method for infusing the way of life of
utilizing upon the IS so as advance the business activities [12]. Notwithstanding this the
database organization ought to likewise be overseen from a focal area and the main
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7BUSINESS INFORMATION SYSTEM
framework which is to be decentralized in the capacities identified with the help from the
client.
Document Page
8BUSINESS INFORMATION SYSTEM
References:
[1] Feng, Junlan, Luciano De Andrade Barbosa, and Valerie Torres. "Systems and
methods for social media data mining." U.S. Patent 9,262,517, issued February 16,
2016.
[2] H. He et al., “The security challenges in the IoT enabled cyber-physical systems and
opportunities for evolutionary computing & other computational intelligence,” in
2016 IEEE Congress on Evolutionary Computation, CEC 2016, 2016.
[3] He, W., Zha, S., & Li, L. (2013). Social media competitive analysis and text mining:
A case study in the pizza industry. International Journal of Information
Management, 33(3), 464-472.
[4] Jakobson, Gabriel. "Collaborative web browsing system integrated with social
networks." U.S. Patent 8,769,004, issued July 1, 2014.
[5] K. Biswas and V. Muthukkumarasamy, “Securing smart cities using blockchain
technology,” in Proceedings - 18th IEEE International Conference on High
Performance Computing and Communications, 14th IEEE International Conference
on Smart City and 2nd IEEE International Conference on Data Science and Systems,
HPCC/SmartCity/DSS 2016, 2017.
[6] Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson
Education India, 2016.. Abelló, Alberto, Jérôme Darmont, Lorena Etcheverry, Matteo
Golfarelli, Jose-Norberto Mazón, Felix Naumann, Torben Pedersen et al. "Fusion
cubes: towards self-service business intelligence." International Journal of Data
Warehousing and Mining (IJDWM) 9, no. 2 (2013): 66-88.
[7] M. Eslahi, M. V. Naseri, H. Hashim, N. M. Tahir, and E. H. M. Saad, “BYOD:
Current state and security challenges,” in ISCAIE 2014 - 2014 IEEE Symposium on
Computer Applications and Industrial Electronics, 2015.
Document Page
9BUSINESS INFORMATION SYSTEM
[8] Rishitha and T. R. Reshmi, “Security in Cloud Computing,” in Proceedings of the
2018 International Conference on Recent Trends in Advanced Computing, ICRTAC-
CPS 2018, 2019.
[9] Stefanidis, Anthony, Andrew Crooks, and Jacek Radzikowski. "Harvesting ambient
geospatial information from social media feeds." GeoJournal 78, no. 2 (2013): 319-
338.
[10] ISO/IEC, “ISO/IEC 27000 Information technology - Security techniques -
Information security management systems - Overview and vocabulary,” ISO/IEC,
2014.
[11] Computer Security - ESORICS 2014. 2014.
[12] Z. Tari, “Security and Privacy in Cloud Computing,” IEEE Cloud Comput., 2014.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]