Tuesday, May 5, 2020
Strategic Information System for Business -Myassignmenthelp.com
Question: Discuss About The Strategic Information System For Business? Answer: Introducation In the assignment regarding the strategic information systems, the attempt has been made to write the literature review on the usage, problems, historical development, and the adaptability of the software of accounting system application in Australia. At the same time attempt has been made for generalizing the discussion such as discussing the accounting softwares in general so that it can be used in any of the company. Nevertheless, here the topic is emphasized on the environment of the university (Barnett, et al., 2013). Hence, here the main focus is on the usage of the accounting softwares in the Australian Universities.In doing so, research has been conducted thoroughly over the topic.As per the given process of research mainly in the phase of the literature review efforts are put in the best way for using the examples of the business practice from scholarly journal papers, books, conferences, and the professional magazines for supporting the arguments that are given in the research (Beynon-Davies, 2013). The current organizational structure that is being followed the Australian University under consideration is highly hierarchical with varied degree of complexity at each of the hierarchical levels. The strategic information system that needs to be implemented needs to cater to all the functional modules of the University. The integrated approach to the information system requirement of the organization is the key to implementing a strategically viable SIS (Cai, 2014). There are several operational challenges that are currently the part of the all the problems faced by the university that dictates the need for the deployment of the strategic information system. Due to the hierarchical structure of the organizational structure that has well differentiated sets of functional requirement at each of the hierarchy levels, data consistency has always been a challenge (Goldberg, et al., 2014). For instance, the accounts related information that is maintained by the organization should ideally relate to the student details data that is maintained by the admissions department. Since the various operations that are being done on the same data set, managing the data inconsistencies is a huge challenge that is faced by the University system (Hinkelmann Pasquini, 2014, August). In the context of the University, the functional requirements that the strategic information system is expected to cater to revolves around the very fundamental organizational structure. As an implication of this, this nature of the system acquisition method that is to be employed needs to consider the various alternatives that are available in the form of commercial software, custom software and Enterprise resource planning system (ERP) (Horkoff, et al., 2014). In the university due to the fact that system would be accessed by a variety of system administrators and users, which in fact would be very specialized and context dependent. Moreover the size of the target users to the system would also play a vital role in the system acquisition methodology adopted in this case (Hovelja, Vasilecas Vavpotic, 2015). Considering all these factors in addition to the fact that due to the handling of a considerable amount of the sensitive data that would be handled by the various functional units of the organization, the use of an ERP system is recommended. The use of the ERP would be a preferable trade off from the cost vs. data security point of view. The use if the ERP would ensure that the veritably hierarchical system that is in place with regard to the organizational structure is preserved (Kasemsap, 2015). This would also enable the selective access and visibility to the various data sets to the users and module administrators. After the deployment of the intended strategic information system, there could be various challenges with regard to the control problems in the form of the handling and maintenance of the master data sets. This would require an elaborate and well implemented plan for the use of the various data sets in a manner that reduces the chances for data inconsistencies in future and could provide a proper resolution, if such condition does come up (Li, Hsieh Rai, 2013). With regard to the various frauds and other tampering that could be done to the system is the possibility of unauthorized access to the data on the system. While most of this would need the physical access to the concerned system module yet it is indeed possible to gain access using other maliciously intent means In the context of the business research for conducting the proper literature review, this stage of the review is of concern and has to adopt the correct methodology.Thefollowing figure gives the brief idea on how theliterature review is conducted and progressed further: It was explained by (Lu, et al., 2013) that it is actually necessary for continuing the search during the research process as it is the strengthening process. As the findings of this research will be weighed and judged with respect to the various other similar researches.Three successive movementshas been found in information technology as per views of (Mayeh, Ramayah Popa, 2014)which has made an attempt for handling the reality of the IT silos remarkably.The meaning of IT silos is that many diversified functionsof the business within the same organization or the company which have the tendency to work independently rather together and during that there are certain features which crawl in. In General Australian companies and in particular universities will not have any exceptions from these movements as the same thing was faced by them as it was common for all.It was mainly realized when there was a development of Bespoke accounting software. As a lot of calculation work is involved in the accounting occurrence of manual errors is quite common, sothe first step was kept forward in developing this software so that it becomes a paperless office and the automation in theorganizations and in the universities will be easy (Shapira, Gk Salehi, 2016). Soon, instead of using the tailor-made or bespoke software, universities started giving preference for using the shelf software like Peachtree and Tally. A lot of general things are included in accounting software so it was necessary for developing the accounting software that is standardized such as Tally and Peachtree. The advantage of using shelf software is that the companies can start using it after purchasing the licenses within a weeks time. For developing the Bespoke software, it took months, while the accounting software that is prepackaged took only 2 weeks for customization before it was bought for the full usage (Trad Kalpi?, 2014). This problem was due to the absence of the centrally defined core of the business intelligence which can define the business logic unambiguously. The accounting department will have their own view regarding certain processes, logic or the data so when there is a situation of exchange of information between the departments there are certain conflicts which arise.As there was an independent application developed in silos with respect to each department it was considered to be the root cause for thebroad integrity and the uniformity problems in the organization (Valentine Stewart, 2015, January). References Barnett, N.J., Parry, G., Saad, M., Newnes, L.B. and Goh, Y.M., 2013. Servitization: is a paradigm shift in the business model and service enterprise required?.Strategic Change,22(3?4), pp.145-156. Beynon-Davies, P., 2013.Business information systems. Palgrave Macmillan. Cai, C., 2014. Study on applying the computer network technology to construct the enterprise information system.BioTechnology: An Indian Journal,10(11). Goldberg, E.M., Sullivan, C.S., Goldwasser, B. and Braud, L.A., NetSuite Inc., 2014.Concise communication of real-time business information in an enterprise network. U.S. Patent 8,838,465. Hinkelmann, K. and Pasquini, A., 2014, August. Supporting Business and IT Alignment by Modeling Business and IT Strategy and Its Relations to Enterprise Architecture. InEnterprise Systems Conference (ES), 2014(pp. 149-154). IEEE. Horkoff, J., Barone, D., Jiang, L., Yu, E., Amyot, D., Borgida, A. and Mylopoulos, J., 2014. Strategic business modeling: representation and reasoning.Software Systems Modeling,13(3), pp.1015-1041. Hovelja, T., Vasilecas, O. and Vavpotic, D., 2015. Exploring the infulences of use of information system development methodologies elements on strategic business goals in enterprises.Technological and Economic Development of Economy. Kasemsap, K., 2015. The role of information system within enterprise architecture and their impact on business performance.Technology, innovation, and enterprise transformation, pp.262-284. Li, X., Hsieh, J.P.A. and Rai, A., 2013. Motivational differences across post-acceptance information system usage behaviors: An investigation in the business intelligence systems context.Information systems research,24(3), pp.659-682. Lu, Y., Panetto, H., Ni, Y. and Gu, X., 2013. Ontology alignment for networked enterprise information system interoperability in supply chain environment.International Journal of Computer Integrated Manufacturing,26(1-2), pp.140-151. Mayeh, M., Ramayah, T. and Popa, S., 2014. The Role of Absorptive Capacity in the Usage of a Complex Information System: The Case of the Enterprise Information System.J. UCS,20(6), pp.826-841. Shapira, P., Gk, A. and Salehi, F., 2016. Graphene enterprise: mapping innovation and business development in a strategic emerging technology.Journal of Nanoparticle Research,18(9), p.269. Trad, A. and Kalpi?, D., 2014. The Selection and Training Framework (STF) for Managers in Business Innovation Transformation Projects-Business enterprise architecture integration.Procedia Technology,16, pp.755-767. Valentine, E. and Stewart, G., 2015, January. Enterprise Business Technology Governance: Three Competencies to Build Board Digital Leadership Capability. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 4513-4522). IEEE.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.