Building is into our operational processes, Computer Engineering

Assignment Help:

Building IS into our operational processes - Information System

Although information systems are becoming increasingly prevalent they are not always the correct solution to every business problem and a degree of caution must be exercised as there is no need to use technology for technologies sake. The advantages of IS must be considered prior to its implementation with the nature of both the task and the organisation taken into consideration. In addition to defining the degree of use of the proposed IS its level of integration with other business processes should also be considered - while highly integrated systems are becoming the fashion they are not always the best solution. Here are some factors to consider when implementing an information system into your organisation.

The implementation of an information system will be more beneficial when it is used to perform structured tasks. By this we mean activities that have:

  • Precisely known requirements
  • A clear methodology
  • A process that is totally defined
  • Input's and output's that can be measured accurately.

 

On the other hand information systems are less useful when they are called upon to carry out unstructured tasks where there maybe:

  • unclear requirements or process or methodology
  • the need for a degree of intuition, creativity or abstract thought
  • the need to apply experience.

 

In addition the nature of the organisation must be considered. The following features of the organisation should be understood when deciding the extent and level of integration that an IS should bring:

  •  Common culture - does the organisation have a homogenous culture with all parts conforming to the same value-set and norms of behaviour therefore open to the systemic control and resultant organisational alignment that results with the implantation of an integrated IS?
  • Common standards - do disparate parts of the organisation have common definitions, processes, vocabularies etc. that will enable the easy implementation of a common governing mechanism?
  • Information sharing - what information needs to be shared between different processes and people? It maybe that a fully integrated system is not necessary.
  • Co-ordination/collaboration- what processes communicate with each other and work together and which do not. Can two or more processes be merged to become a single streamlined process?

    While lack of integration can cause extra work and delay when pertinent information may not be available, a fully integrated system may not be the best option as there are downsides. Larger more integrated systems are difficult to develop and manage due to the complexity of the overall system in terms of number of active elements and interactions and the associated reliability and maintainability issues. In addition the rhythm of each process must be taken into consideration in terms of its duration, and regularity i.e. constant frequency, event-driven or haphazard. The integration of too many processes that are dissimilar may lead to an inflexible and 'clunky' overall system.

Related Discussions:- Building is into our operational processes

Distinguish between ROM, Distinguish between ROM, PROM, EPROM, EEPROM. ...

Distinguish between ROM, PROM, EPROM, EEPROM. Ans: ROM: It also called Read Only Memory is a Permanent Memory. The data is permanently stored and cannot be changed in Perm

State and describe the iros subsystems, Question: (a) iRoom was constru...

Question: (a) iRoom was constructed based on the guiding principles listed below, discuss on each one of those principles with respect to why the specific principle was adopted

Name the two operations of stack, Name the two operations of stack A st...

Name the two operations of stack A stack has only two operations and they are insertion and deletion of items. The operation insertion is called push (or push-down) as it can b

Define the firewall design policy, Define the Firewall Design Policy ...

Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net

Mathlab , Windy Grid World This assignment is to use Reinforcement Learni...

Windy Grid World This assignment is to use Reinforcement Learning to solve the following "Windy Grid World" problem illustrated in the above picture. Each cell in the image is a

Java, A string S is said to be "Super ASCII", if it contains the character ...

A string S is said to be "Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''a''-''z'') and the asci

Explain signed binary number system, Explain signed binary number system. ...

Explain signed binary number system. Ans. Signed Binary Numbers: In decimal number system positive numbers are signified by (+) sign and negative numbers are represented b

Digital systems and microprocessors, Your logic function for this assignmen...

Your logic function for this assignment is to be derived from your own student number. The number 1224583 will be used as an example as to how you should derive your function and e

Show the decimal equivalent of a binary number, Q. Show the Decimal equival...

Q. Show the Decimal equivalent of a binary number? In binary numbers we have two digits 0 and 1 in addition they can also be signified as a string of these two-digits known as

Explain operation of time multiplexed space switching, With a neat diagram ...

With a neat diagram explain operation of time multiplexed space switching. Time division switches, an inlet or an outlet corresponded to a particular subscriber line with one s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd