This week’s assignment reflects a consolidation of the individual assignments from Weeks One through Six, which include the following:
- A description of the relationship between processes and information systems including a flowchart and a discussion of security ethical concerns
- A description of how you plan to select the appropriate hardware and software and the different approaches for managing data
- A description of the benefits of using transaction processing systems, customer relationship systems, and supply chain management
- A description of the potential benefits of using business intelligence
- A description of systems planning and potential methodologies
- A description of utility and cloud computing services, and how these services might replace or augment the initial system design
Consolidate this week’s assignment about utility and cloud computing services with the Mary’s MediBracelets assignments from all previous weeks to create a final client report. Depending on the length of your previous assignments, your report will be approximately 12- to 18 pages.
Running head: INFORMATION SYSTEMS 1
INFORMATION SYSTEMS 3
Mary’s Medibraclets
Derrick Hobbs
David Conway
Information Systems
A description of the relationship between business processes and information systems
Business processes refers to the logical set of activities that are related which defines how the specific activities in a business are performed. They can also be said to be ways in which organizations coordinate and also organize work activities, knowledge and information so that they can produce valuable products and services. Information systems are related to the business processes in that they automate the manual business processes and increase the efficiency in a business. Through the information systems, the customers can now be in a position to order the bracelets online because the manual steps have already been automated. Information systems also enhances the business processes in that they eliminate the delays in the process of decision making, changes the information flow and also replaces the sequential steps that needs to be followed when making orders manually with the parallel steps. Lastly, information system speeds up the completion of the business processes and also acts as a drive to new business models that cannot be employed without the help of technology (Heinrich, 2014).
A flowchart for handling an online order
The flow chart below depicts the process of handling an online order when a potential client goes through the purchasing process. From the flowchart, a client is first required to complete the purchase requisition form and if it is approved, he or she chooses the method of payment which can be either cash or the credit card. If it is not approved, the order is taken back to the purchase requisition step. If one opts for cash payments, if they are an independent contractor, the IC’s agreement is filled out and if they are not an independent contractor, they directly go ahead and obtain a P.O from the controller just like the independent contractors. After this, they obtain an invoice which is sent to the controller for approval. On the other hand if the client is paying via a credit card, they are first required to fill out CCPR, then the invoice CCPR and later the documents are sent for approval by the controller.
Areas for Information Systems (IS) use and security concerns
Information system has proved to be very useful to many businesses operating in the various industries such as Google, EBay and Facebook among others. However, the use of information system in an improper manner can raise security concerns in a business. When criminals try to gain access to the credit card information of the clients, the business can incur great financial losses and also the clients who are the owners of the cards and can also compromise their private information. One of the security concerns that are posed by information systems is the cyber-crimes. This refers to the use of the information systems in committing crimes. This can result to huge financial losses and also the loss of human life. It has been on the rise due to the increased use of the smartphones and the high end mobile devices which has increased the ability of the people to access the internet (Vacca, 2009).
A list of areas of concern for ethical handling of customers’ private information
Businesses are required to exercise caution and practice ethicality while handling the private information for their customers. Due to the advancement in the internet technology, it has become easy for businesses and individuals to gather assemble and also circulate customer’s information. This has led to the fear on the proper use of the customer’s data and also on the protection of the people’s privacy especially in the buying and the selling of the customer’s private information. The following is a list of concerns when handling customer’s private information;
· Ensure that the customers data that is collected do not land on the hands of unauthorized individuals
· Engage with other companies to keep the customers data private and protected
· Avoid selling customers information without the knowledge of the clients and if this is done, the business should ensure that its aware of the individual purchasing the data and the reason behind this.
References
Heinrich, R. (2014). Aligning business processes and information systems : new approaches to continuous quality engineering. Wiesbaden: Springer Vieweg.
Vacca, J. (2009). Computer and information security handbook. Amsterdam Boston Burlington, MA: Elsevier Morgan Kaufmann.
Running head: HARDWARE, SOFTWARE, AND NETWORK REQUIREMENTS 1
HARDWARE, SOFTWARE, AND NETWORK REQUIREMENTS 2
Hardware, Software, and Network Requirements
Derrick Hobbs
Hardware, Software, and Network Requirements
· Describe how you would select appropriate hardware and software to develop her internal business infrastructure
When one wants to buy computer hardware or software, there are a number of considerations that they ought to make. To start with is quality. The quality of a computer hardware or software encompasses how the product can perform the required functions. In other words, quality is about the suitability of the product to the required needs. For instance, some of the features that they can look into are whether it has features that would enable it to perform the intended functions effectively. The second feature is the price. If the business is at start up, the systems that can handle the available client base can be considered. More sophisticated software and hardware can be bought later on when the business expands. The after sale services and products is also critical. For instance, it is important to understand that computer systems are prone to breakdown due to attacks by malware and viruses that may harm the functionality of the system completely (Kendall, 2015). Hence, return policy should hence be given consideration. Warranty is also key and applies to the state of the product when it is purchased. Some of the fundamental questions that one can ask herein include would the seller repair the product if it breaks down or the cost of repairing is extended to the final consumer?
· Explain at least two possible approaches to managing her data for easy access and security
Data management refers to the practice of maintaining and organizing data in a manner that is secure to meet the ongoing information lifecycle needs. One possible approach to data management is IT system consolidation. A popular way to eradicate some of the challenges associated with data management is by use of this technique. It encompasses both ERP and EMR data solutions (Gray, 2017). It makes it possible to consolidate all the data belonging to an organization such that everything is stored in the organization’s master data. This is done in such a manner that there is a central management system such that all actions undertaken in the system are fast-tracked centrally. This minimizes chances of unwarranted access to data which can be significantly detrimental if it happens.
Upstream MDM implementation is another important approach to data management. In this approach, organizations can maintain their disparate IT systems. They master their data via a third party tool like enterprise master patient index (EMPI). Despite the fact that master data issues are not reconciled at the source, they are reconciled near the source. This allows extensive manual adjudication even when the system fails or is nor working.
· Describe possible networks that might be used to support her business needs
There are various networks that can be used to support the business herein. To start with are social networks. The company will need to advertise its products and services online, and social media provides a quick and cost-effective way of doing this. These include Facebook, Instagram, Twitter among others. The business will also need financial networks. It is important to understand that the customers will be required to pay for the products before are delivered to them. Hence, the business will need to utilize financial networks to facilitate the payment process.
· Create a network diagram showing possible internal connections as well as those between her site and her potential customers
References
Gray, P. M. (2015). The functional approach to data management: modeling, analyzing, and integrating heterogeneous data. Berlin: Springer.
Kendall, J. E. (2017). Systems analysis and design. Boston: Pearson.
Running head: BUSINESS MANAGEMENT
1
BUSINESS MANAGEMENT
2
Information systems
Derrick Hobbs
CIS/568
David Conway
12/11/2017
Information systems
Technology advancement has enabled most organization to incorporate contemporary intelligent business systems that facilitates the achievement of competitive advantages in the market. The information technology system has enabled the business to operate efficiently and effectively hence reducing most operational cost and facilitates the production levels significantly.
The transactional process system (TPS) is a business information systems the entails the collection of transactional data, modification, and retrieval of all the information within the system. Due to its reliability and effectiveness, the system is also referred to the real-time processing system. This is one of the benefits that the system portrays hence once implemented in the MediBracelets it will facilitate the processing of transactional information in real time hence saving a lot of constructive time and resources. On the other hand, the transactional processing system will enable MediBracelets to reduce the operational cost that is associated with handling inventory, huge numbers of personnel and ordering cost as there will be a significant reduction of their cost once implemented in the business. Furthermore, the transactional processing systems will significantly increase the production levels in the organization and due to the high speed transactional and response-ability, the customer will be satisfied with the services provided. The system will also guarantee data stability effect in the organization as they will be stored prevented from data lost and automatic data recovery in case of failures.
On the other hand, Customer Relationship Management systems (CRM) are technological incorporated strategies or practices that the organization utilizes in facilitating an effective interaction between the customers and the organization. The systems are developed to ensure that there is with improving business relationships with customers, assist customer retention and driving sales growth to other higher levels. The system can assist Mary’s MediBracelets in developing better customer relationships that will enable them to identify customer preference and needs and develop strategies to cross-sell and meet the needs effectively. In addition, the system will facilitate effective team collaboration in the workplace as there will be effective communication platforms and common goals that will bring the employee together. Except for the initial high cost of implementation, the system comes with vast cost-effective advantages like increasing profitability, revenues, and reduction of operational cost (Turban, Shardam & Delen, 2011). On the other hand, the system also facilitates the development of strategic measures that identify customer needs, wants and feedback hence developing effective platforms to ensure customer and employee satisfaction.
Supply Chain Management (SCM) is the information system that entails the overseeing of the information, strategies, material, and finance from the external market segments to the organization and back to the market once again as final or finished products. Effectual supply chains give businesses a competitive advantage in the marketplace and assist moderate risks connected with acquiring raw materials and delivering products or services. This system will ensure that Mary’s MediBracelets organization achieves the best quality of raw material or services in the market as they monitor the procurement to ensure that the organization receives the best of the best from the market. The system will also ensure that Mary’s MediBracelets have the right amount of inventory and reduce the costs associated with overstocking or under stocking. Effective supply chain management system enables the organization to mitigate risks associated with suppliers in the market hence facilitates the constant and reliable supply of quality material or services to Mary’s MediBracelets.
In conclusion, the various business intelligence systems that have been discussed in this paper are essential in the business sector in order to facilitate the organization in achieving the competitive advantages in the market (DeBenedett, n.d.). Training and educational programs need to be implemented simultaneously with the systems in order to train and prepare the staff for working with them effectively for the best interest of Mary’s MediBracelets. There might be the high initial cost associated with the implementation but the subsequent benefits are way fruitful and profitable to the organization.
References
DeBenedett, J. (n.d.). The Advantages of Supply Chain Management Systems. Retrieved from:
http://smallbusiness.chron.com/advantages-supply-chain-management-systems-77606.html
Turban, E., Sharda, R., & Delen, D. (2011). Decision support and business intelligence systems. Pearson Education India.
Running head: BUSINESS INTELLIGENCE
1
BUSINESS INTELLIGENCE
2
Business intelligence
Derrick Hobbs
David Conway
Business intelligence
How business intelligence can use data collected from business applications to improve an organization’s competitiveness.
Business intelligence refers to the systems and software that are put into use to retrieve data from a variety of sources (Herschel, 2012). The aim of the collection of the data is to create an opportunity for the businesses to be in a position to draw reports that can be depended on by the management. Additionally, the retrieval of the information creates a chance for the businesses to be in a position to keep up-to-date information that explains the current performance level of the businesses. Moreover, with the assessment of the large amounts of data, it becomes achievable to make the right decisions that are triggered by the evaluations that have been based on what is most effective than others.
Business intelligence creates a chance for companies to review large amounts of vital information and data that pertain to the past and current performances of the businesses. With the review of the information, it becomes easier to get informed about all the challenges and issues that have hit the companies at that moment. Therefore, the identification of the effective solutions that will counteract the problems can be identified with ease. Additionally, with the use of the business intelligence, the businesses can run and assess the solutions that have been chosen to realize whether they will be functional as it has been anticipated or not. The business intelligence helps to come up with a more intelligent business that with the utilization of a model that is analytical.
Therefore, business intelligence is appropriate when it comes to advancing organizations’ competitiveness since the different tools are effective when initiated to analyze large amounts of reliable data. In other words, the tools are chosen wisely and implemented appropriately creating it attainable to discover all the metrics that can be initiated to transform the available data in the most functional manner possible. The software creates aid when researching how other firms have managed to become competitive in the market. Therefore, with the use of their ideas and other advanced strategies, firms tend to run and perform their procedures according to the set standards.
Moreover, business intelligence has been associated with processes that run the assessment on the existing policies and programs. With these assessments, chances arise to improve the internal systems, policies, structures, and procedures leading to opportunities such as advanced productivity and developed returns (Quaddus, & Woodside, 2015). Additionally, market intelligence can be attained with the implementation of business intelligence software. With the utilization of the business intelligence tools, firms manage to assess the clients’ buying patterns, and how they behave with the existence of some goods. Therefore, the goods that are discovered to be stars are supported to maintain and increase the returns while the items that are considered to be dogs are eliminated. It results in a position where the businesses do away with all their incompetence.
Therefore, it evident that with business intelligence software, firms run their businesses strategically, since once they realize what supports their achievement of more returns, they work to support the actions. Moreover, the anticipation of various objectives becomes attainable, and they tend to maintain the sales strategy personalization creating access to more information about the other companies. Competitiveness is advanced with time, and the firms never lack to come up with creative decisions that once initiated, resulting in a scenario where all the members pool their qualities and skills together to ensure that they prevent having losses that might arise from competition.
References
Herschel, R. (2012). Organizational applications of business intelligence management : emerging trends. Hershey, PA: Business Science Reference.
Quaddus, M. & Woodside, A. (2015). Sustaining competitive advantage via business intelligence, knowledge management, and system dynamics. Bingley, UK: Emerald Group Publishing Limited.
Running Head:
Information Systems Planning
1
Information Systems Planning
4
Information Systems Planning
Derrick Hobbs
David Conway
CIS / 568
An information system planning refers to the process of translating organizational and strategic objectives into initiatives of the development of systems. It helps to determine the alignment of IS goals with organizational goals. The systems development process is also termed as the life cycle of system development. There are various methods of planning development which are considered appropriate for implementation of a new system; they include the life cycle of traditional systems of development and the Rapid development of application.
Traditional Systems Development Life Cycle involves a number of steps which include system investigation, design, analysis, implementation, review and maintenance. Systems investigation is where opportunities and challenges are identified and considered because of the business objectives. Systems analysis is then conducted through studying of existing work processes and systems to determine weaknesses, strengths, and improvement opportunities. Systems design follow which define the manner in which the information system will operate in order to attain the solution to the problem. The system is then implemented whereby the different components of the system are acquired, assembled and placed into operation. The system must be maintained and reviewed regularly so as to ensure it meets the ever dynamic business requirements. Rapid application development is another method of system development which employs techniques, tools, and methodologies which have been designed to increase development of the application. RAD uses the Joint Application Development process extensively for the purpose of requirement analysis and data collection.
Apart from In-House built information systems, applications can be obtained through other options such as leasing, purchasing, making use of open source software, using the software as a service or even outsourcing. The Off the Shelf approach could be time-saving and cost-effective when compared to applications that are developed in-house. The application should consider carefully confirming the software has all the needed features to meet the future and current needs of the company. The company could purchase many packages in order to fulfill various needs. This option is attractive in case the software vendor permits modification of the technology. In case customization is the sole method that can be used to provide the required flexibility which can address the needs of the company, the option is not attractive. The application bought through this method may not be the best where it is expensive or could get obsolete within a short period. The advantage of this option is that most of this software is available. The challenges come in where the software may not meet the exact needs of the company, the software may also not permit modification, or it could need huge changes in the processes of business to implement.
Leasing an application could be another option which can save the company both money and time. This approach is attractive to enterprises that are small and medium as they cannot afford great investments. They lease applications to establish in the market a quicker presence from external resources. There are three methods of leasing; installing an application on the premises after leasing the application from a software developer, using application service providers and utilizing the software as a service.
Various tools could be used to attain the best outcomes from the new application. They include; cost-benefit analysis, payback analysis, and the present value analysis. The cost-benefit analysis compares the projected costs of the system with the benefits of the same system. The payback analysis determine the system’s duration to start paying for it through the benefits. Present value analysis is also a tool that puts into consideration the manner in which the value of money changes over time.
References
Gallaugher, J. (2015). Information systems: a manager’s guide to harnessing technology. Washington, DC: Flat World Knowledge, Inc.
NoAuthorFound. (2015). Gamification: concepts, methodologies, tools, and applications. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA: IGI Global.
Running head:
UTILITY AND CLOUD COMPUTING
2
UTILITY AND CLOUD COMPUTING
Utility and Cloud Computing
Derrick Hobbs
David Conway
CIS/568
Utility computing refers to a system where computer services are rendered at a pay-per-user billing and when on demand (John, 2016). The provider takes control of the system regarding operation and management of the computing infrastructure. Users have access to the services when required and as they may dim fit, but on a rental basis. Due to the economy and the flexibility it provides, it is one of the most popular computing service models available today. The principle on which utility computing is built is where the provider has the back-end infrastructure of the computing services while the consumer is allowed access the services over a private or a virtual network whenever they need the services.
Cloud computing is a much broader concept than utility computing. However, it is also built on the principle of utility computing (Geva, 2008). It is difficult to get a precise definition of cloud computing but the idea behind it is that applications run somewhere nobody can tell hence the name cloud. End users have been using computers and running system without caring to know where they actually run from. For developers and IT operators, cloud computing allows them to deploy and run systems that can grow capacity, improve performance with reduced possibilities of failure. Cloud computing infrastructure is self-driven, allows for multi-tenancy, virtualized and deals specifically with data management.
Utility computing has significantly changed the economics of information technology. Initially, upfront capital investments and lead times were required to obtain computing resources. Utility computing apart from making cloud computing a success, has reduced the upfront payments and lead times and companies and individuals can access computing services on demand. Utility and cloud computing has also made it possible for consumers to view their charges in real time. the systems are designed programmatically such that at the request of computing resources, the system has a billing platform that automatically processes the data.
Today, the company has a few computers it for the computing services of data storage and bandwidth the company is charged per hour. Due to cloud computing the company can scale up and reduce the operation costs related to computing services. The company can do this through automatic scaling by making more requests using an API. The cloud computing is such that it offers more discounts where prices reduce as you use more of the service.
The other issue of data security. Data is the most important element for companies and its security is, therefore, of critical importance. Companies have started to realize that the data they have is growing and securing it might be a problem leave alone the storage space. Cloud computing is bringing on board a platform that is efficient not only in data storage but also in security. Cloud storage is one of the safest way to store information today because eve its security is much more guaranteed that the previous data storage methods.
Companies are headed to a point where they will source external storage services for their databases. This is the essence utility and cloud computing. Utility and cloud computing are becoming mainstream options for businesses as storage and data safety continues to become an issue (John, 2016). In this regard, it is important for businesses and companies to start appreciating the relevance of utility and cloud computing in business environment.
References
John S. (2016). What is Utility Computing? Retrieved from:
https://simplicable.com/new/utility-computing
on 1/11/2018
Geva P. (2008). How Cloud & Utility Computing Are Different. Retrieved from:
https://gigaom.com/2008/02/28/how-cloud-utility-computing-are-different/
on 1/11/2018