Is strategy - information system, Computer Engineering

Assignment Help:

IS strategy - Information System

As an operations manager when attempting to navigate your organisation through the information landscape and make best use of the available systems you must develop a strategy in the same way as you would for marketing, product development or human resource management. The information system is no longer only a support to the business but a major force enabling business performance. The focus is no longer on the technical attributes of the IS but on its place as part of the provision of customer solutions.

960_Is strategy - information system.png

  • When developing an IS strategy there are a number of questions to answer. The main ones being:
  • What is the overall context of the company and the position of IS within it? This is illustrated in the diagram above.
  • What level of IS support and integration does the organisation require (Stages 1 to 5)? Remember it needs to add value and still be cost effective.
  • What information does the organisation need to collect and what will it be used for?
  • How should the IS be provisioned? Is it a custom or off-the-shelf solution, what type of vendor, installation and support service do you want?
  • What approach should be taken to keep the IS in-line with upgrades in technology and changes in business needs? Remember the technology will continue to progress long after your system has been installed.

 

Before these questions can be answered it is necessary to understand the following basics. Firstly the nature of information, secondly the processes use by the IS in managing the information and thirdly how organisations use information to add value.


Related Discussions:- Is strategy - information system

What happens to logic after synthesis, What happens to logic after synthesi...

What happens to logic after synthesis, which is driving an unconnected output port that is left open (, that is, noconnect) during its module instantiation? An unconnected out

Disadvantages of unauthenticated sites, Disadvantages of unauthenticated si...

Disadvantages of unauthenticated sites All the Units entering the Intranet must be scrutinised to ensure that they are not coming from the unauthenticated sites or users. It a

Show layout 84-key keyboards, Q. Show layout 84-key Keyboards? PC 83-ke...

Q. Show layout 84-key Keyboards? PC 83-key was the earliest keyboard provided by IBM with its first Personal Computers (PC). This had 83 keys. Afterwards IBM added one more key

Three different types of convergences, Three dissimilar types of convergenc...

Three dissimilar types of convergences are: 1.  The convergence of e-commerce and wireless technology  2.  The Convergence of E-Commerce and IP Business-Grade Messaging 3

By which digits are represented, In a DTMF phone, digits are represented by...

In a DTMF phone, digits are represented by: (A)  Orthogonal frequencies. (B)  Orthogonal Phases. (C)  Orthogonal codes. (D)  Orthogonal pulses. Ans: Di

Show smtp and electronic mail, One of the very useful things about Internet...

One of the very useful things about Internet is that it enables almost instantly exchange of electronic message (e-mail) across the worlds. E-mail is a standard as well as popular

Name the languages introduced in second generation, Name the languages intr...

Name the languages introduced in second  generation During  the time of  second  generation  many  high  level  programming  languages  were introduced, such as FORTRAN (1956),

Matlab, 33.A juice company manufactures one-gallon bottles of three types o...

33.A juice company manufactures one-gallon bottles of three types of juice blends using orange, pineapple, and mango juice. The blends have the following compositions: 1 gallon or

Compute minimum value of the horizontal force, Compute minimum value of the...

Compute minimum value of the horizontal force: Block A of weight 520N rest on horizontal top of block B having weight of 700N as shown in the figure given below. Block A

Linux, Explain about unix file system architecture

Explain about unix file system architecture

3/14/2013 3:41:17 AM

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd