Tuesday, December 10, 2019

Managing Information Systems Financial Times MyAssignmenthelp.com

Question: Discuss about the Managing Information Systems Financial Times. Answer: Introduction To start with, in this period of speedy globalization, growth in information technology as well as continuous marketplace modification, companies all around the globe are investing huge amount yearly for managing both technical and non-technical aspects in highly efficient and effective manner (Muller and Turner, 2010). In the present day, approach of information management is considered as being one among the standalone concept valid within all work spheres for achieving quality outcomes with the accessible resources in the provided time-period (Atkinson, 1999). Moreover, the practices involve several sub steps like analysis, developing of plan, resource allocation, budgeting, risk mitigation, scheduling and quality control (Collyer and Warren, 2009). It is extremely important for each and every organization to take measures to maintain its position and attain competitive advantage. The word Technology seems to be a very simple word on its own but what matters is the way it is perceived differently by different people. From a software developer view point, it is simply a piece of code while from end-users perspective; it is a product which makes work fast and easy. According to Powell Micallef (1997), millions and billions of pounds and dollars every year are invested to possess latest technology and deal with the changing organizational needs. Similarly, in order to tackle the changing needs, Woolworths and Paladin Energy focused on the decentralized approach for management and thus firstly, the information technology management was split up amongst the various working braches. Each firm branch had its own information technology unit dealing with operations, expansion and safeguarding issues. Woolworths and Paladin Energy realized that the centralized data sharing mechanism was not suitable and thus, application programmers, users and management were not getti ng the support they required. There was occurrence of huge data redundancy. For example, data in New Jersey was shared with a large number of companies whereas the Belgium branch provided support only to the European branches including Africa and some parts of Middle East. But the main TCP/IP router was controlled by the European regional centre. Further, in centralised network, the WAN and LAN integration is very rigid and difficult to manage. Moving ahead, the beginning of the year 1995 highlighted several limitations and drawbacks of the Woolworths and Paladin Energy existing IT infrastructure with the view to adopt to changing business needs and requirements. Firstly, proper attention was not being paid to the IT applications and time was being spent on infrastructural management. Secondary, latest technological inventions were absent which were creating obstacles in the networking and communications. Thirdly, proper funding mechanisms and methods were absent and this was one of the major reasons behind the slow growth of the company. Finally, there were absent of information sharing techniques between firms. After analysis of the above described problems, Woolworths and Paladin Energy Group made lots of significant IT changes such as restructuring of IT infrastructure, establishing information standards, funding IST investments in order to developed enhances business ventures and enhance economies of scale. In case if an individual wants highest degree of safety from firewall and is willing to put up with a number of provocations, the most suitable option would be installing Comodo Firewall (Vacca, 2009). This particular Firewall is an extremely effective safety device for the purpose of keeping computers safe from different Internet fears. The firewall efficiently blocks Trojans, hackers trying to control the PC along with other internet and network threats without any charge. At the time of installing Comodo Firewall, the person is provided an option of whether to set up only the basic firewall, firewall having Optimum Proactive Defense or Firewall having Maximum Proactive Defense+. Additionally, the higher the level of safety, greater the firewall invasiveness; as a result one must balance safety against annoyance at the time of making his/her choice. Moreover, the user could at all alter the protection level later, at the time of running the program (Vacca, 2009). Furthermore, on firewall testing through making use of an invited attack, a firewall effectively performs like an obstacle amid the internet and computer and prevents the distrustful contents. Additionally, there are a number of things that personal firewalls could do effectively. Nonetheless, there are also things that they could not do for protecting the personal computers. Firewalls can easily safeguard the computer and personal data from hackers entering the system; Viruses and Worms that spread across Internet along with Outbound traffic from the computer created through a virus contamination (Vacca, 2009). Despite the actuality that personal firewalls are seen as being a valued source of information safety, there are some attacks that personal firewalls couldnt safeguard against such as phishing scams and email interception. For most effective possible safety against several security issues that prevail, personal firewalls need to be utilized along with other safety means such as anti-virus software, encryption packages and spyware software (Vacca, 2009). Additionally, just like the malicious-code nemeses great advancement has been observed in personal firewalls. Current offerings in actuality balance the antivirus software through way of providing security against suspicious and malicious attachments and highlighting if specific operating system or applications aspects have been changes. Even though, personal firewalls provide a high amount of safety for PCs even then there exist few areas where further improvement in needed (Vacca, 2009). As a result, this makes it important for peop le to have anti-spyware and antivirus programs together with firewalls on computers for complete safety. Further, anti-spyware and antivirus software is fundamentally a meansused for detecting, preventing and removingthreats and malware of various different types. Establishing Information Technology Standards Development of new and innovative techniques and methodologies at companies has been made possible due to self-sufficiency of IT entities. Further, the hardware front brings to light the various differences in technologies such as routers and bridges. In contrast, to this the software area highlights several network operating systems, regular debates on desktop products and also, nine different email systems innovated by Woolworths and Paladin Energy. Moreover, it is highly believed that in order to strengthen the infrastructure it is very essential to limit the group of standards. For instance, it is quite impossible to sharpen the skills of several different routers and bridges. Circumstances like monitoring non-standard implements while in a position, sectionalizing and troubleshooting, accessibility of appropriate retailer etc. involve lot of time. It is not easy at all point of time for functioning companies to adopt standards laid down by computing and networking services. Acco rding to Jim, IT organizations should focus on efficient and gainful preferences along with keeping users wants and necessity in mind. Zuboff (1988) states that it is extremely important for firms to develop a socio-technical network which technology envelopes society and organisations around itself. The functioning companies took over the corporate and European network services infrastructural development techniques and were liable to pay for whatever services they received. Moreover, this charging method came up as a hindrance in the trail of infrastructural investments. Moving ahead, it is next to impossible for self-governing associations to gain the benefits of infrastructural savings. Further, it is of utmost importance that the cross company units like HCS should restructure themselves in accordance to benefit of Woolworths and Paladin Energy even if companys cost enhances. As the funding techniques in which the users is expected to pay for infrastructural innovations throws negative impact on investment scale. Creating Data Structures With main aim to remain updated and respond to global market changes, Woolworths and Paladin Energy focused on the establishment of customer support centres. With launch of customer support centres, total numbers of sales were truncated as cross company data was absent which is required for management of franchise braches. For example, Woolworths and Paladin Energy Sweden built up data stores on realizing the necessity of Swedish customer base. Further, as far as the case of global franchise was concerned such as oil business, it was discovered that the product costs, codes, number etc were linked to consumers on a nation level and not on a universal or regional level. However, it should be noted that in special cases similar meaning data is discarded in order to avoid data redundancy such as in case of usage of centralized/joint data sharing systems. The organization also fabricated three different proposals in order to inculcate organization synchronization and collaboration in ord er to ensure easy data sharing. Firstly, setting and following new data standards and definitions for data elements usage and sharing. Secondly, detailing and formulating the IT infrastructure to speed up data sharing process via electronic transfer. Finally, considering IST as an important element of the organization towards corporate decision making process. Several scholars state that if the above stated strategies are implemented appropriately, both efficiency and effectiveness of the firm are assured to increase. To start with, PRINCE2 is considered as being a procedure based concept for information management, making available an easily transformed along with scalable information management approach for dealing with different types of projects (Lim and Mohamed, 1999).Moreover, PRINCE2 that highlights information in well-ordered settingis fundamentally a concept for effective management of projects and information (OGC, 2002).Additionally, its a standard, easy and tailorable information management concept. It involves the way of systematizing, administering and managing projects. It allows the corporation to effectively offer the appropriate goods and services, well on time and within provided budget. Also, it aids greatly in dealing with risk, managing quality and altering competently. The PRINCE2techniqueis within the sphere of community, offering the non-proprietarily highly exceptional practice assistance associated withinformation management. There are a number of key features of PRINCE2 like its focuses upon high concentration for business explanation, a delineated corporate framework for the information management panel, effective planning approach, concentrates on dividing the project into convenient and controllable levels, flexible for being taken up at a level appropriate for the project, obtaining information from experience, well-defined accountabilities and tasks, handled through levels and exclusion and focuses upon offered products as well as their quality. Further, PRINCE2 does not involve all areas of information management. Sections such as leadership and individuals management capabilities, thorough exposure of information management techniques and tools are properly covered by some other prevailing and verified techniques and are as a result not included in PRINCE2 (Muller and Turner, 2010). Recommended Solution PRINCE2 is considered as being an effective worldwide product and is the standard approach for information management, not only because it involves good amount of sound approaches within information information and offers a flexible and bendable approach for going well with every individual project (Burke, 2003). Moreover, PRINCE2is a method for dealing with projects developed for offering a model involving a wide array of actions and regulations required during a project (Wysocki and Lewis, 2001). The focus throughout the PRINCE2 is placed on Business Case, which mirrors the chief values and business rationalization project. Furthermore, the Business Case leads all project management process, from principal information arrangement the effective storage. PRINCE2 is considered as being a procedure based concept for information management, making available an easily transformed along with scalable information management approach for dealing with different types of projects (Lim and Mohamed, 1999).Moreover, PRINCE2 that highlights information in well-ordered settingis fundamentally a concept for effective management of projects and information (OGC, 2002).Additionally, its a standard, easy and tailorable information management concept. It involves the way of systematizing, administering and managing projects. It allows the corporation to effectively offer the appropriate goods and services, well on time and within provided budget. Also, it aids greatly in dealing with risk, managing quality and altering competently. The PRINCE2techniqueis within the sphere of community, offering the non-proprietarily highly exceptional practice assistance associated withinformation management. There are a number of key features of PRINCE2 like its focuses upon high concentration for business explanation, a delineated corporate framework for the information management panel, effective planning approach, concentrates on dividing the project into convenient and controllable levels, flexible for being taken up at a level appropriate for the project, obtaining information from experience, well-defined accountabilities and tasks, handled through levels and exclusion and focuses upon offered products as well as their quality. Further, PRINCE2 does not involve all areas of information management. Sections such as leadership and individuals management capabilities, thorough exposure of information management techniques and tools are properly covered by some other prevailing and verified techniques and are as a result not included in PRINCE2 (Muller and Turner, 2010). Several corporations presently are taking on the capabilities and provisions of external vendors, functioning beside in-house resources, for improving their abilities for providing successful information management and projects. PRINCE2 offers a means of controlling such resources along with allowing the groups to include and function together competently on some project. Moreover, PRINCE was initially developed during by the UK government like the standard approach for IT (Information Technology). Since then, the approach has been enhanced for being a general, unmatched practice approach suitable for administering different types of projects and also, holding an approved record external to IT and government spheres (Boddy et al., 2002). Additionally, the concept of PRINCE2 has been greatly employed and personalized through public and private sectors and is currently UKs the United Kingdom'sleading approach for administering information and projects. There is a rapidly rising global interest. The concept is developed for integrating the requirements along with familiarities of present clients globally. The application of PRINCE2 provides greater and suitable control of resources and the ability for administering project along with business threat more competently that it offers benefits to individuals searching for effective information management capabilities and sound employment prospects, executives, project managers or directors responsible for companies and projects (OGC, 2002).There are various benefits linked with the adoption of PRINCE2 nevertheless primarily itensures that the information management is focused towards on-going project feasibility with respect to its Business Case. Second, itinvolves top management in the project at the right time and right place. Third, itfocuses upon Products, which provide lucidity for all teams part of what a specificproject must offer, why, for whom, when and by whom (OGC, 2002). Fourth, itenables control at all levels, makes project progress highly observable for the management,provides a means of interaction for all project staff mem bers andensures that the work progresses in the suitable progression (Wysocki and Lewis, 2001).Furthermore, itallows the project to be closed and in case if required, started once more completely underthe management control, during any time all through the project life. Finally, PRINCE2involves a properly devised User Group directed towards the support, fortification and promotion of the approach.PRINCE2 is an integrated model of processes together with themes, which manage planning, control, allocation and monitoring of different areas related to every project i.e. quality, costs, timescales, extent, benefits and threats (Gray Larson, 2000). Moving ahead, PRINCE2 concept divides the entire project into controllable stages and offers the individuals responsible for such stages with appropriately outlined goals. Because of the actuality that each phase holds an extremely-described starting point and ending point, companies along with individuals discover it simpler for presenting estimates of the overall resources and duration required for accomplishing a given activity (OGC, 2002). Further, being a structure, PRINCE2 enables all individuals focusing upon the project together with a particular task and accountabilities; thus, if an issue occurs anytime all through the project, other individuals know exactly who is accountable for modifying it. Furthermore, one among the success stories associated with PRINCE2 takes in the case of local authority of Chester City Council. Apart from in-house reservations through stakeholders along with usual included suspicion, the concept of PRINCE2 for information established as being a sound accomplishment during the year 2004. The concept was considered as being simple to use and execute. Conclusion The essay clearly depicted the way ICT can help respond to it. It depicts the way, companies focus on decentralized management techniques since last one hundred years with global expansion as the business and operational strategy. The essay also brought to surface the concept of organizational change and thereby different ICT methods and techniques such as establishing information technology standards, funding infrastructure investments, creating data structures etc which can help increase efficiency and attain sustainable competitive advantage. Further, it has been discovered that in this era of changing market and needs, organizations should continuously frame strategies which align business with technology. Organizations staff and employees should be well trained about the usage of Information Systems and its working. Secondly, influence of performance on payout should be well monitored and lastly, conducting regular market researches in order to figure out what technologies are b eing used by the competitors. As described by Weick and Robert (1999), attempts should be made to maintain equilibrium at all the three stages of the change i.e. freeze, rebalance and unfreeze. In this era of globalization, rapid advancement in information technology and continuous market change, organizations worldwide are investing millions and billions of dollars annually to manage both technical and non-technical projects in the most effective and efficient way (Muller and Turner, 2010). Today, information management approach is recognized as one of the standalone practice applicable in all work sectors to achieve quality results with the available resources within the set deadline (Atkinson, 1999). References: Atkinson, R. (1999) Project management: cost, time and quality, two best guesses and a phenomenon, its time to accept other success criteria, International Journal of Project Management, Vol. 17, No. 6, pp. 337-342 Collyer, S. and Warren, C. M. J. (2009) Project management approaches for dynamic environments,International Journal of Project Management, Vol. 27, No. 4, pp. 335-364 Jones, G. R. (2009) Organisational theory, design change (6th Ed.). Markus, M. L. And Robey, D. (1988) Information Technology and Organizational Change: Causal Structure in Theory and Research, Management Science, Vol. 34, No. 5. Powell, T. C. Micallef, A. D. (1997) Information Technology As Competitive Advantage: The Role of Human, Business and Technology Resources, Strategic Management Journal, Vol. 18, No. 5, pp. 375-405. Zuboff, S. (1988) In the Age of the Smart Machine, New York: Basic Books. Boddy, D., Boonstra, A. and Kennedy, G. (2002) Managing Information Systems, Financial Times Prentice Hall Burke, R. (2003) Project Management: Planning Control Techniques (4th Ed) John Wiley Sons Gray, C. Larson, E. (2000) Project management: the managerial process, Irwin/McGraw-Hill: Boston, USA. Lim, C. S. and Mohamed, Z. (1999) Criteria of Project Success, International Journal of Project Management, Vol. 17, pp. 243-248 Muller, R. and Turner, R. (2010) Leadership competency profiles of successful project managers, International Journal of Project Management, Vol. 28, No. 5, pp. 437-448 OGC (2002) PRINCE2: Business Benefits through Project Management, The Stationery Office OGC (2002) PRINCE2: Tailoring PRINCE2, The Stationery Office Vacca, J. R. (2009)Computer and information security handbook, Amsterdam: Elsevier Wysocki, R. K., Beck, J. R. and Crane, D. B. (2000) Effective Project Management, (2nd Ed.) Wiley Wysocki, R. K. and Lewis, J. P. (2001) The World Class Project Manager: a professional development guide, Perseus Publishing

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.