Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Mits4001 | Case Study Of Assessment Answers

  82 Download     📄   11 Pages / 2553 Words

Considering the above description of SSL, write a report by answering the following questions. It is recommended that up to 1 hour should be spent on each question.

1.Analyse how SSL may identify the value that it obtains from its current portfolio of information systems and evaluate the techniques that may be used in assessing future IS investments.
2. In many parts of the company, it is clear that SSL do not have a coherent IS strategy. Analyse how it may construct an IS strategy that is supportive of its business strategy and the benefits that it would derive from this.
3. Analyse the strategic potential for greater investment in information systems and technology at SSL both from a divisional and company-wide perspective. Could business process re-engineering be a useful tool in maximising the potential of IS and IT within the company? Explain and justify your answers.

4. Describe the current location of IS functions within SSL. Recommend the best location for IT services in the future

Answer:

Introduction

Business information system is the set of inter related processes, utilizing the infrastructure of information technology within the business enterprise for the purpose of generating as well as disseminating the expected information (Laudon and Laudon 2016). These business information systems are designed for supporting the decision making process by the people associated with the enterprise within the procedure of the attainment of the objectives and goals. This type of business information system could obtain data or any other resource of the infrastructure of IT as the inputs from the processes and environment for satisfying the needs of information with the enterprise of business. These systems are the sub systems of the business systems so that the feedback and control are served properly (Bajdor and Grabara 2014). The following report outlines a brief discussion on the business information system about the case study of SSL or Security Services Limited. The analysis of SSL to identify the values and IS strategies would also be provided here. Moreover, the strategic potential and IS functions would be described in this report.

Discussion

1. Analysis of SSL for Identifying the Value to Obtain from the Current Portfolio of IS

The organization of Security Services Limited is the major providers of the private security services within the UK. The turnover was high in various organizations and provides the wide range of services to its clients (Gallagher and Sixsmith 2014). This organization has eventually grown for the combination of the factors including the organic growth from the major businesses. The analysis and the installation of the security devices or regular security sweep is also done here. The organizational value is identified in this particular organization. This value is obtained from the current portfolio of the information systems. SSL has identified the information management as the major enabler of business as well as the government. The performance of the company is increased and they have been utilizing the information efficiently and effectively (Liu, Liang and Wang 2016). The major situation has occurred regarding the solutions of the past technology for fulfilling the requirements of the business of SSL. These solutions could eventually take into account the main requirements of the company for leading to the incompatibilities as well as duplication of the efforts and costs. The major aspects that are required to be analysed in this particular case study of SSL are as follows:

i) Incompatible Systems: The first and the foremost important and significant aspect that is to be checked for the proper analysis is the incompatible systems. The major requirement of these systems is to create an integrated as well as unified access to the entire data holding of the organization (Dahlstrom, Walker and Dziuban 2013). Moreover, the myriad of the disparate or incompatible storage and the inherited data is also checked eventually.
ii) Information Impacts on the Decisions: There is a strong impact of the organizational information of SSL on the various decisions undertaken by them. The information management system of this particular organization has the capability of handling all types of complex data and hence enables them in taking the major decisions.

iii) Future Proofing Information and the Technology Investments: SSL has built certain technique on the principle to be sure that the information system is offering the flexibility as well as power for managing the current or the future data as well as the storage management requirements (Dahlstrom and Bichsel 2014). A feature rich system is being integrated to the existing IT infrastructures and could be readily extended by their customers. The investment protection is provided by connecting the new as well as legacy storage and data for enabling the tools to include the cloud based storages.

The organization of SSL can evaluate the future information systems with the help of some of the most significant techniques. These techniques could be distinguished to two major methods, known as statistical method and the dynamic method (Eason 2014). The first and the foremost evaluation technique for the future investment of information system is the static method. This particular method majorly focuses on the monitoring of the cash benefits to measure the initial expenditures. The respective risk factor of SSL is not included and the time is taken only within the limited extent. The second type of evaluation method for the future IS investments of SSL organization is the dynamic evaluation method (Bilbao-Osorio, Dutta and Lanvin 2013). This particular evaluation method take into account the factors of time as well as risks on the basis of the discount of the input parameters.

2. Analysis of Constructing IS Strategy with Major Benefits

This organization of SSL do not comprise of a coherent strategy of IS. The information security strategy is extremely important and significant for all organizations for building the program of information security that is being aligned with the respective IT strategies and business (Marchewka 2014). This strategy for the information security eventually provides the major roadmap to obtain a desired end state usually for the period of 3 to 5 years. The organization of Security Services Limited should construct their information security strategy for resolving each and every issue related to the information security. Hence, the strategy of information security is the plan or pattern for the core purpose of integrating the organizational main IS related security goals, action sequences and policies to the cohesive whole (Holtshouse 2013). Since, this is the organizational wide framework of the conceptual elements from the individuals within the level of inter organizational and is informed by the conditions of the antecedent for the purpose of yielding the measurable benefits of information security within the company.

There are some of the most important and significant advantages of the presence of the strategy of IS and these are given below:

i) Highly Proactive: The first and the foremost advantage of this type of strategy of the information security is that it is extremely proactive and not at all reactive. The events could occur; however they do not lead to the program of security being events driven (Bloom et al., 2014). This strategic plan of information security would eventually enable the organization of SSL for being on the front foot.
ii) Better Decision Making Process: The second significant and noteworthy advantage that is being obtained from the presence of the information security strategy is the better process of decision making. The organization of Security Services Limited could easily undertake the major decisions in the most effective and efficient manner. Moreover, the organizational strengths, weaknesses, threats and opportunities are well identified with this strategy and thus decision making is quite easier.

iii) Clear Definition: Another important and noteworthy advantage that is being obtained from the organizational information security strategy is that a clear direction is being followed with this (Lloyd 2017). This strategy helps in providing the realistic objectives and goals, which could be easily and promptly communicated as well as measured. Hence, SSL would be highly benefitted with this strategy.

iv) Business Aligned: The next important and significant benefit that is being obtained by any specific organization from the respective information security strategy is that it is completely aligned with the subsequent expectations as well as goals of the business. The information security could be seen as the business enabler for not the road block within the organization. Thus, this organization of Security Services Limited should opt for the information security strategy for obtaining the benefits.

3. Analysis of Strategic Potential for Greater Investments in Information Systems

The strategic potential of any organization is highly important for properly assessing and forming the organizational goals and objectives. The regularities within the dynamics of the system functioning and also in the context of the units (Schwalbe 2015). There is a basic assurance of the process of the development of that specific organization to decompose the strategic potential. The completeness, hierarchy and the integrity are the three major and basic features of the system that should be established in the organization properly and perfectly.

The organization of SSL has two perspectives of divisional and company wide.  Both of these divisional and company-wide perspectives would have better strategic potentials for the greater investments in information systems and technology (Jiao and Onwuegbuzie 2017). The information systems and technology should be implemented within the organization for obtaining some of the major advantages. For the divisional perspective of SSL, the strategic potential for the better investments for the information systems and technology is the better communication. A better communication is extremely important to reduce the complexity of communication within the different divisions. Moreover, globalization and cultural gaps are also eradicated with this process (Alwahaishi and Snásel 2013). Regarding the perspective of company wide of SSL, the information systems and technology would make the confidential information available for its users and the attackers could not access them at any cost. Moreover, the productivity of the organization of SSL would also be increased to a better level without any type of complexities.

Business process reengineering would be one of the most effective and efficient tool for SSL for the radical redesigning of their major business processes and hence achieving significant improvements within the quality, cycle times and productivity. SSL can maximize the respective potential of the information systems and information technology within their business. The organization could easily make their tasks easier, achieve the spectacular improvement and changing the method of working with this tool of business process reengineering (Wagner, Beimborn and Weitzel 2014). This particular tool is cost effective and it helps to eliminate the non value adding steps within the organizational processes and hence improving the cost and quality. The extra layers of the information technology are also eradicated and the data dissemination is improvised with this specific tool. Hence, SSL would be highly benefitted if they would use the tool of business process reengineering.

4. Description of Current Location of IS functions within SSL with Recommendation 

The current location of the information system functions in SSL is within the divisional sector of the organization. This divisional sector of the organization refers to the activities that take place in the organizational headquarters. The general management as well as the financial management are completed within this particular sector (Schwalbe 2015). The IT department in the divisional sector is responsible for checking each and every IS function. There are four divisions in the entire divisional sector of SSL, which are PTD or private transport division, BSD or business security division, DSD or domestic security division and HOSD or home office services division.

The major recommendation that could eventually bring the best location for the various services of information technology in the future is the headquarters. Since, the current location that is the divisional sector is still following the traditional ways to store the functions of information security, the headquarters would be the best location for this. Moreover, the divisional sector is divided into four divisions of PTD, BSD, DSD and HOSD and thus each sector has its own security, which could be threatened easily. However, with the presence of only sector of headquarter, this particular issue would be resolved.

Conclusion

Therefore, from the above discussion, it can be concluded that the business information system helps in catering the information requirements to undertake the relevant decisions within the business. These business information systems are extremely proactive and they must anticipate the major changes for the requirements of the information and then adapt themselves in suiting the needs. It is extremely vital for the fact that these managers might get involved within the routine activities so that the decision making process is easier. The above report has clearly demonstrated the entire case study of Security Services Limited or SSL. This particular organization is responsible for providing all types of private security services within the United Kingdom. They mainly provide services like armoured transport to convey cash and cheques within banks and businesses, provision of security services and provision of domestic security services. The several details regarding this specific organization of Security Services Limited are provided here. The proper identification of the value obtained from the current portfolio is done here with significant evaluation. Moreover, IS strategy construction is also done here for the strategies. A strategic potential is analysed and the current location of the IS functions is described in the report with basic recommendation.

References

Alwahaishi, S. and Snásel, V., 2013. Acceptance and use of information and communications technology: a UTAUT and flow based theoretical model. Journal of technology management & innovation, 8(2), pp.61-73.

Bajdor, P. and Grabara, I., 2014. The Role of Information System Flows in Fulfilling Customers’ Individual Orders. Journal of Studies in Social Sciences, 7(2).

Bilbao-Osorio, B., Dutta, S. and Lanvin, B., 2013, April. The global information technology report 2013. In World Economic Forum (pp. 1-383).

Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of information technology and communication technology on firm organization. Management Science, 60(12), pp.2859-2885.

Dahlstrom, E. and Bichsel, J., 2014. ECAR Study of Undergraduate Students and Information Technology, 2014. Educause.

Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students and information technology (p. 2013). 2013.

Eason, K.D., 2014. Information technology and organisational change. CRC Press.

Gallagher, S. and Sixsmith, A., 2014. Engaging IT undergraduates in non-IT content: Adopting an eLearning information system in the classroom. Interactive Technology and Smart Education, 11(2), pp.99-111.

Holtshouse, D.K., 2013. Information technology for knowledge management. Springer Science & Business Media.

Jiao, Q.G. and Onwuegbuzie, A.J., 2017. The impact of information technology on library anxiety: The role of computer attitudes. Information technology and libraries, 23(4), pp.138-144.

Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education India.

Liu, D., Liang, D. and Wang, C., 2016. A novel three-way decision model based on incomplete information system. Knowledge-Based Systems, 91, pp.32-45.

Lloyd, I., 2017. Information technology law. Oxford University Press.

Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.

Schwalbe, K., 2015. Information technology project management. Cengage Learning.

Wagner, H.T., Beimborn, D. and Weitzel, T., 2014. How social capital among information technology and business units drives operational alignment and IT business value. Journal of Management Information Systems, 31(1), pp.241-272.


Buy Mits4001 | Case Study Of Assessment Answers Online


Talk to our expert to get the help with Mits4001 | Case Study Of Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Mits4001 | Case Study Of Assessment Answers Assignment Help Online


Copyright © 2009-2023 UrgentHomework.com, All right reserved.