Security Services Limited (SSL) Information System Report
VerifiedAdded on  2025/05/05
|9
|2046
|165
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Business Information Systems
Security Services Limited (SSL)
Autor Name: Author ID:
Security Services Limited (SSL)
Autor Name: Author ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P a g e | 1
Contents
Introduction:...............................................................................................................................2
1- Information System Investigation & Assessment in Agency................................................2
Study of Information System of SSL.....................................................................................2
Assessment of Information system in SSL............................................................................3
2- Innovation in Information System and its assistances...........................................................4
Creation of up-to-date Information system tactic..................................................................4
Why to use the innovative Information System policy inside SSL?......................................4
3- Speculation in Information System and Business Management Strategy.............................5
Financial Assessment in IS & IT in agency...........................................................................5
Using the Business Process Re-engineering tactic.................................................................5
4- Existing extension of IS and IT in SSL and its Scope in Future...........................................6
Current Portfolio of SSL in terms of IS.................................................................................6
Superlative Positions for IT system impending inside SSL...................................................7
References..................................................................................................................................8
Contents
Introduction:...............................................................................................................................2
1- Information System Investigation & Assessment in Agency................................................2
Study of Information System of SSL.....................................................................................2
Assessment of Information system in SSL............................................................................3
2- Innovation in Information System and its assistances...........................................................4
Creation of up-to-date Information system tactic..................................................................4
Why to use the innovative Information System policy inside SSL?......................................4
3- Speculation in Information System and Business Management Strategy.............................5
Financial Assessment in IS & IT in agency...........................................................................5
Using the Business Process Re-engineering tactic.................................................................5
4- Existing extension of IS and IT in SSL and its Scope in Future...........................................6
Current Portfolio of SSL in terms of IS.................................................................................6
Superlative Positions for IT system impending inside SSL...................................................7
References..................................................................................................................................8

P a g e | 2
Introduction:
The special description of about the going for walks of Security Solution Limited (SSL) are
provided in this record and the evaluation and subsidy report of Information System and
Information Technology System also are exact in this document.
Security Services Limited (SSL) is working from last thirty years and in shape itself amongst
one of the main service vendors within the problem of security services in United Kingdom.
The turnover for the monetary twelve months ended April, 1995 end up seventeen percent to
ninety-4 point eight million pounds, from preceding yr. Security Services Limited (SSL)
enables special organizations, people and distinctive personal sectors with its services.
SSL gives the offerings that embody:
ï‚· Transportation among the enterprise websites and banks or between two parties with
protection of the transfer of coins, tests and different precious goods.
ï‚· Security Services of companies consisting of safety guards, analysis, establishment of
protection devices, and normal safety sweeps of premises of firms.
ï‚· The Local security services which consist of the analysis and implementation of best
safety techniques for internal safety wishes.
SSL is based in Buckinghamshire, Milton Keynes. SSL includes four wonderful divisions:
ï‚§ The Private_Transport_Division (PDT).
ï‚§ The Business_Security_Division (BSD).
ï‚§ The Domestic_Security_Division (DSD).
ï‚§ The Home_Office_Service_Division (HOSD).
1- Information System Investigation & Assessment in Agency
Study of Information System of SSL
The Information System in SSL is responsible for the circulation of statistics and information
between:
 Bureaux and departments.
 Various divisions.
 Headquarters and Division.
Introduction:
The special description of about the going for walks of Security Solution Limited (SSL) are
provided in this record and the evaluation and subsidy report of Information System and
Information Technology System also are exact in this document.
Security Services Limited (SSL) is working from last thirty years and in shape itself amongst
one of the main service vendors within the problem of security services in United Kingdom.
The turnover for the monetary twelve months ended April, 1995 end up seventeen percent to
ninety-4 point eight million pounds, from preceding yr. Security Services Limited (SSL)
enables special organizations, people and distinctive personal sectors with its services.
SSL gives the offerings that embody:
ï‚· Transportation among the enterprise websites and banks or between two parties with
protection of the transfer of coins, tests and different precious goods.
ï‚· Security Services of companies consisting of safety guards, analysis, establishment of
protection devices, and normal safety sweeps of premises of firms.
ï‚· The Local security services which consist of the analysis and implementation of best
safety techniques for internal safety wishes.
SSL is based in Buckinghamshire, Milton Keynes. SSL includes four wonderful divisions:
ï‚§ The Private_Transport_Division (PDT).
ï‚§ The Business_Security_Division (BSD).
ï‚§ The Domestic_Security_Division (DSD).
ï‚§ The Home_Office_Service_Division (HOSD).
1- Information System Investigation & Assessment in Agency
Study of Information System of SSL
The Information System in SSL is responsible for the circulation of statistics and information
between:
 Bureaux and departments.
 Various divisions.
 Headquarters and Division.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

P a g e | 3
Vital recommendations of the information system areintended to permit only hard papers
to be sent by division areas.
The records machine within the Private Transport Division is managed by means of an ex-
policeman who isn't an IT professional even though he gained some experience whilst
running in pressure and he had made really apt use of consultant aid due to the fact that his
appointment.
The records system in the Business_Security_Division is quite well controlled now higher
than earlier than due to the fact it is supervised by younger graduate of Business computing
who's recently changed by way of a senior accountant.
The department that offers with the safety of homes and other local security purposes have no
Information System and in the long run there may be no workforce on this department
especially employed for Information System.
In Home_Office_Service_Division, the monetary and control accounting information is
dispatched to the SSL’s headquarters in hard reproduction. Information System on this
specified division does now not exist but however this division own a best Information
Technology machine amongst all the divisions.
Assessment of Information system in SSL
The assessment of Information system of Security Services Limited (SSL) is done and the
results of that assessments suggests that the headquarters and division have one-of-a-type
kinds of Information systems. There turned into no connection between the nearby places of
work and divisional offices have been not connected with the H.Q. Over the Information
System. To make a new Information system that do suppressions over all the hitches and
offers the intense productiveness the investment needs to be accomplished.
The records machine needs to fulfil at the least the subsequent guidelines:
ï‚§ Information System should be solitary.
ï‚§ All the nearby places of work, divisional offices and the headquarters should be
connected to this private Information System. And therefore, all the officials both
weather they belong to nearby office, divisional office or headquarters may have
access to all the present-day data.
ï‚§ The corresponding individuals from each workplace have to have get entry to data
device to collect any form of records.
Vital recommendations of the information system areintended to permit only hard papers
to be sent by division areas.
The records machine within the Private Transport Division is managed by means of an ex-
policeman who isn't an IT professional even though he gained some experience whilst
running in pressure and he had made really apt use of consultant aid due to the fact that his
appointment.
The records system in the Business_Security_Division is quite well controlled now higher
than earlier than due to the fact it is supervised by younger graduate of Business computing
who's recently changed by way of a senior accountant.
The department that offers with the safety of homes and other local security purposes have no
Information System and in the long run there may be no workforce on this department
especially employed for Information System.
In Home_Office_Service_Division, the monetary and control accounting information is
dispatched to the SSL’s headquarters in hard reproduction. Information System on this
specified division does now not exist but however this division own a best Information
Technology machine amongst all the divisions.
Assessment of Information system in SSL
The assessment of Information system of Security Services Limited (SSL) is done and the
results of that assessments suggests that the headquarters and division have one-of-a-type
kinds of Information systems. There turned into no connection between the nearby places of
work and divisional offices have been not connected with the H.Q. Over the Information
System. To make a new Information system that do suppressions over all the hitches and
offers the intense productiveness the investment needs to be accomplished.
The records machine needs to fulfil at the least the subsequent guidelines:
ï‚§ Information System should be solitary.
ï‚§ All the nearby places of work, divisional offices and the headquarters should be
connected to this private Information System. And therefore, all the officials both
weather they belong to nearby office, divisional office or headquarters may have
access to all the present-day data.
ï‚§ The corresponding individuals from each workplace have to have get entry to data
device to collect any form of records.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P a g e | 4
ï‚§ The customers should have constrained get right of entry to the statistics gadget so
that they may take a look at about the portfolio of enterprise, services they provide so
forth.
2- Innovation in Information System and its assistances
Creation of up-to-date Information system tactic
Subsequently the Information System (Lubbe, 2000) tactic possessed by all the regional,
divisional and headquarters, is not comprehensible. So, it's far now they want of the company
that a logo-new Information System must be tossed that pledges the unambiguousness in the
entire Security Services Limited (SSL). To access the Information System, update
information’s will be done by some specific folks working in SSL and the permission for
performing these tasks will be given by the latest Information System and they may be able to
make amendments inside the precise statistics via the innovative Information System.
Every department or local office have their very own Information System and the
Information System of one division is totally different from the Information Systems of other
division so we conclude from this fact that SSL needs such a type Information System that
covers all the workplaces both they're nearby or divisional or even at headquarters
exclusively. All sort of data and statistics will be shared at some point of all the places of
work of nearby, divisional and headquarters, via this new Information System.
Why to use the innovative Information System policy inside SSL?
When the innovative Information System Policy while examined inside the subject then
results shown that this system has unique properties like Properly ordered geared up and
professional. We conclude after performing the evaluation and assessment between new
Information System and vintage Information System that the modern Information System is
preferably more useful than the old one due to following characteristics:
1. All of the offices (local, divisional and headquarters) are connected through WAN
network over the latest Information System that is solo.
2. this new solo Information System is responsible for the circulation of all the
information about the company (Security Solutions Limited) to its customers like new
offers or packages or new services that the company is offering.
3. Some Specific Officers running in Security Solutions Limited (SSL) can make
changes in the new Information System as according to necessities if the ones unique
ï‚§ The customers should have constrained get right of entry to the statistics gadget so
that they may take a look at about the portfolio of enterprise, services they provide so
forth.
2- Innovation in Information System and its assistances
Creation of up-to-date Information system tactic
Subsequently the Information System (Lubbe, 2000) tactic possessed by all the regional,
divisional and headquarters, is not comprehensible. So, it's far now they want of the company
that a logo-new Information System must be tossed that pledges the unambiguousness in the
entire Security Services Limited (SSL). To access the Information System, update
information’s will be done by some specific folks working in SSL and the permission for
performing these tasks will be given by the latest Information System and they may be able to
make amendments inside the precise statistics via the innovative Information System.
Every department or local office have their very own Information System and the
Information System of one division is totally different from the Information Systems of other
division so we conclude from this fact that SSL needs such a type Information System that
covers all the workplaces both they're nearby or divisional or even at headquarters
exclusively. All sort of data and statistics will be shared at some point of all the places of
work of nearby, divisional and headquarters, via this new Information System.
Why to use the innovative Information System policy inside SSL?
When the innovative Information System Policy while examined inside the subject then
results shown that this system has unique properties like Properly ordered geared up and
professional. We conclude after performing the evaluation and assessment between new
Information System and vintage Information System that the modern Information System is
preferably more useful than the old one due to following characteristics:
1. All of the offices (local, divisional and headquarters) are connected through WAN
network over the latest Information System that is solo.
2. this new solo Information System is responsible for the circulation of all the
information about the company (Security Solutions Limited) to its customers like new
offers or packages or new services that the company is offering.
3. Some Specific Officers running in Security Solutions Limited (SSL) can make
changes in the new Information System as according to necessities if the ones unique

P a g e | 5
officials have gotten the right of access to the adminship of recent Information
System.
4. New Information System have a unique function on the way to give customers a
restrained access to the machine thru which they would know all the information of
Security Solutions Limited that they observe.
5. New Information System will give the distinctive statistics of automobiles and
obligation shift (day and night time) of guards to the required personals running at
Security Solutions Limited (SSL).
3- Speculation in Information System and Business Management Strategy
Financial Assessment in IS & IT in agency
Although the company Security Solutions Limited (SSL) do have their personal Information
System and Information Technology System but each of the structures aren't on top of things
and each are less powerful and much less steady. There are a couple of elements of tons much
less usefulness and lots much less steadiness. Some of those factors are that, the Information
System and Information Technology System both are being controlled by the folks that are
not expert in IS or IT.
Even though in some divisions, each of these systems are properly organized, jogging
professionally and are being managed thru the Information Technology expert and
Information System expert person however if we take a look at the poplar’s IS and IT
gadgets of Security Solutions Limited (SSL) then we came to the supposition that there are a
few zones in each (Information System and Information Technology) Systems in which an
top notch outlay need to be made.
Using the Business Process Re-engineering tactic
Business Process Reengineering (BPR) (Hammer, 2006) objectives at slicing down business
enterprise costs and method redundancies. Business Process Reengineering (BPR) wipe out
redundancies, and redecorate techniques in another way.
BPR, Business Process Reengineering is radical as it often ignores the regulations that
practice to the present-day procedures. And it is argued over as it typically needs heavy
investment (study schooling and IT sources), finances cuts across department lines and
typically consequences in worker layoffs. For example, think of it as doing a full resto-
amendment on an antique muscle car. That vintage Corvette worked first-class again within
officials have gotten the right of access to the adminship of recent Information
System.
4. New Information System have a unique function on the way to give customers a
restrained access to the machine thru which they would know all the information of
Security Solutions Limited that they observe.
5. New Information System will give the distinctive statistics of automobiles and
obligation shift (day and night time) of guards to the required personals running at
Security Solutions Limited (SSL).
3- Speculation in Information System and Business Management Strategy
Financial Assessment in IS & IT in agency
Although the company Security Solutions Limited (SSL) do have their personal Information
System and Information Technology System but each of the structures aren't on top of things
and each are less powerful and much less steady. There are a couple of elements of tons much
less usefulness and lots much less steadiness. Some of those factors are that, the Information
System and Information Technology System both are being controlled by the folks that are
not expert in IS or IT.
Even though in some divisions, each of these systems are properly organized, jogging
professionally and are being managed thru the Information Technology expert and
Information System expert person however if we take a look at the poplar’s IS and IT
gadgets of Security Solutions Limited (SSL) then we came to the supposition that there are a
few zones in each (Information System and Information Technology) Systems in which an
top notch outlay need to be made.
Using the Business Process Re-engineering tactic
Business Process Reengineering (BPR) (Hammer, 2006) objectives at slicing down business
enterprise costs and method redundancies. Business Process Reengineering (BPR) wipe out
redundancies, and redecorate techniques in another way.
BPR, Business Process Reengineering is radical as it often ignores the regulations that
practice to the present-day procedures. And it is argued over as it typically needs heavy
investment (study schooling and IT sources), finances cuts across department lines and
typically consequences in worker layoffs. For example, think of it as doing a full resto-
amendment on an antique muscle car. That vintage Corvette worked first-class again within
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

P a g e | 6
the 1970s, however the rusty body wishes some work and a brand-new computerized
transmission could be high-quality.
For the implementation of Business Process Re-engineering, first locate that eighter the
adjustments are required or not, within the Security Solutions Limited (SSL). Business
Process Reengineering (sandberge, 2001) is a dramatic trade initiative that includes 5 most
important steps that managers need to take:
1. Relocate employer values on customer desires.
2. In general, the adjustments to the previous statistics and records concept are made.
3. Reorder an organization into pass-realistic businesses with prevent-to-surrender duty
for a device.
4. The issues of everybody and the troubles of clean enterprise want to be reevaluated.
5. This method of Business approach Re-engineering is accomplished on every and
every branch of Security Solution Limited (SSL).
4- Existing extension of IS and IT in SSL and its Scope in Future
Current Portfolio of SSL in terms of IS
For each of the four divisions of Security Solutions Limited (SSL) there's separate
Information System (Ward J. Taylor, 1996) and is numerous shape the others. And the
Information System of all of the 4-department proceeding in an extraordinary way and they
all have specific tips and regulations.
In the Private Transport Division, the Information System exist but now not that properly
prepared and green and is being controlled via a former policeman who has acquired some
records and revel in corporation computing at some point of his stay at Police Force and
isn't an authorized in this area.
The branch that ensures protection of several businesses has the most systematically
Information System and is strolling in an efficient manner. The Information System is this
division is being supervised by a young guy who is graduate in business computing and is
currently modified by using an antique man who a mile senior and also, he modified right
into a senior accountant.
the 1970s, however the rusty body wishes some work and a brand-new computerized
transmission could be high-quality.
For the implementation of Business Process Re-engineering, first locate that eighter the
adjustments are required or not, within the Security Solutions Limited (SSL). Business
Process Reengineering (sandberge, 2001) is a dramatic trade initiative that includes 5 most
important steps that managers need to take:
1. Relocate employer values on customer desires.
2. In general, the adjustments to the previous statistics and records concept are made.
3. Reorder an organization into pass-realistic businesses with prevent-to-surrender duty
for a device.
4. The issues of everybody and the troubles of clean enterprise want to be reevaluated.
5. This method of Business approach Re-engineering is accomplished on every and
every branch of Security Solution Limited (SSL).
4- Existing extension of IS and IT in SSL and its Scope in Future
Current Portfolio of SSL in terms of IS
For each of the four divisions of Security Solutions Limited (SSL) there's separate
Information System (Ward J. Taylor, 1996) and is numerous shape the others. And the
Information System of all of the 4-department proceeding in an extraordinary way and they
all have specific tips and regulations.
In the Private Transport Division, the Information System exist but now not that properly
prepared and green and is being controlled via a former policeman who has acquired some
records and revel in corporation computing at some point of his stay at Police Force and
isn't an authorized in this area.
The branch that ensures protection of several businesses has the most systematically
Information System and is strolling in an efficient manner. The Information System is this
division is being supervised by a young guy who is graduate in business computing and is
currently modified by using an antique man who a mile senior and also, he modified right
into a senior accountant.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P a g e | 7
The department that offers the security of homes and other community safety features have
no Information System and ultimately there's no body of workers on this department specially
hired for Information System.
The security of dwelling regions and workplaces are ensured with the aid of using the one of
these branches in which the files are dispatched and acquired manually due to the
unavailability of Information System.
Superlative Positions for IT system impending inside SSL
Security Services Limited (SSL) is using the Information Technology System for alluring
all of its duties. The specific Information System is possessed via every of 4 department and
which can Get right of access via manner of concerned focal persons working in SSL.
However, the service providing security in homes and places of work have high-quality
Information Technology System. If we test the IT system of Security Services Limited SSL
then we got here to keep in mind that this division is exquisite in this regard.
The department that offers the security of homes and other community safety features have
no Information System and ultimately there's no body of workers on this department specially
hired for Information System.
The security of dwelling regions and workplaces are ensured with the aid of using the one of
these branches in which the files are dispatched and acquired manually due to the
unavailability of Information System.
Superlative Positions for IT system impending inside SSL
Security Services Limited (SSL) is using the Information Technology System for alluring
all of its duties. The specific Information System is possessed via every of 4 department and
which can Get right of access via manner of concerned focal persons working in SSL.
However, the service providing security in homes and places of work have high-quality
Information Technology System. If we test the IT system of Security Services Limited SSL
then we got here to keep in mind that this division is exquisite in this regard.

P a g e | 8
References
Hammer, M. a. (2006). Reengineering the Corporation: A Manifesto for Buisness Revolution.
HarperBuisness.
Lubbe, S. (2000). Information Technology Investment approches in Namibia: six case studies
. Inforamtion Technology for Development .
sandberge, K. D. (2001). Reengineering Tries a Comeback-This time Just Growth not Just
Cost Saving . Harvard Management Update .
Ward J. Taylor, P. B. (1996). Evaluation and Realisation of IS/IT benefits:an emperial study
of current practices . European Journal of Inforamtion System, 218-232.
References
Hammer, M. a. (2006). Reengineering the Corporation: A Manifesto for Buisness Revolution.
HarperBuisness.
Lubbe, S. (2000). Information Technology Investment approches in Namibia: six case studies
. Inforamtion Technology for Development .
sandberge, K. D. (2001). Reengineering Tries a Comeback-This time Just Growth not Just
Cost Saving . Harvard Management Update .
Ward J. Taylor, P. B. (1996). Evaluation and Realisation of IS/IT benefits:an emperial study
of current practices . European Journal of Inforamtion System, 218-232.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.