Is strategy - information system, Computer Engineering

Assignment Help:

IS strategy - Information System

As an operations manager when attempting to navigate your organisation through the information landscape and make best use of the available systems you must develop a strategy in the same way as you would for marketing, product development or human resource management. The information system is no longer only a support to the business but a major force enabling business performance. The focus is no longer on the technical attributes of the IS but on its place as part of the provision of customer solutions.

960_Is strategy - information system.png

  • When developing an IS strategy there are a number of questions to answer. The main ones being:
  • What is the overall context of the company and the position of IS within it? This is illustrated in the diagram above.
  • What level of IS support and integration does the organisation require (Stages 1 to 5)? Remember it needs to add value and still be cost effective.
  • What information does the organisation need to collect and what will it be used for?
  • How should the IS be provisioned? Is it a custom or off-the-shelf solution, what type of vendor, installation and support service do you want?
  • What approach should be taken to keep the IS in-line with upgrades in technology and changes in business needs? Remember the technology will continue to progress long after your system has been installed.

 

Before these questions can be answered it is necessary to understand the following basics. Firstly the nature of information, secondly the processes use by the IS in managing the information and thirdly how organisations use information to add value.


Related Discussions:- Is strategy - information system

Implementation of a simple arithmetic, Q. Implementation of a Simple Arithm...

Q. Implementation of a Simple Arithmetic? So, by now we have concerned how logic and arithmetic micro-operations can be applied individually. If we combine these 2 circuits alo

Write a program to input an address, Write a program to input an address i....

Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address   Answer   include void main() { char prompt; Date: 26th August 2012

Emerging cloud computing technology, A chart illustrating the differences a...

A chart illustrating the differences among the new cloud-based technologies (Workday) and the traditional . a. The new cloud-based solutions benefit Workday from every facet wh

Linux, Explain about unix file system architecture

Explain about unix file system architecture

Artificial intelligence, Artificial intelligence ( AL) is a field of scien...

Artificial intelligence ( AL) is a field of science and technology based on disciplines such as computer science biology psychology linguistics mathematics and engineering. The g

What is polling, What is polling? Polling is a scheme or an algorithm t...

What is polling? Polling is a scheme or an algorithm to recognize the devices interrupting the processor. Polling is employed when multiple devices interrupt the processor by o

Characteristics and features of client/server computing, What are the chara...

What are the characteristics and features of Client/Server Computing? Several of client/server computing architecture is listed below: a. It comprises a networked webs of sm

Explain the resolution of an ADC, Explain the Resolution of an ADC. ...

Explain the Resolution of an ADC. Ans. Resolution- It  is  the  smallest  possible  change  in  input  voltage  the same as  the  fraction  of percentage of the full s

Types of addressing modes in assembly language, Types of Addressing Modes: ...

Types of Addressing Modes: Each instruction of a computer mentions an operation on certain data. There are many ways of specifying address of the data to be operated on. These

Why does ftp use two standard ports, Why does FTP use two standard ports wh...

Why does FTP use two standard ports whereas other protocols, in general use only one port? Justify. File transfer protocol uses a control connection just to send commands and r

3/14/2013 3:41:17 AM

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd