Wednesday, December 4, 2019

Deployment of Mobile Device Technology †MyAssignmenthelp.com

Question: Discuss about the Deployment of Mobile Device Technology. Answer: Introduction Most organizations have refrained from managing their information and data manually. Through information systems adoption, companies are now able to utilize comprehensive and advanced databases that contains all required information of the organization. Information system evaluate, update and stores all organizations information which is later used to pinpoint current or future problems solution. In addition, integration of data from various sources, outside and inside the organization ca be enhanced through this system. As such, the company stays updated with the external risks and opportunities and internal performance. This report outlines functions of information systems, business processes and transaction cycle, mapping and documentation of information system, acquisition and deployment of information system, and ethical issues related to information system. Decision making- the sufficiency of strategic plan determines the success of an organization in the long run. Information system is used by the organization management team in formulation of strategic plans and decision making that enhance prosperity and longevity of the organization. Information system is also used by the business in information evaluation from all sources external references like Bloomberg and Reuters included which offer information on the overall economy. This assessment and market trends comparison aids the company in analyzing the quality and sufficiency of strategic plans. (Swanson, Swanson, Bowen, Phillips, Gallup, Lynes, 2010). Business Processes- development of bigger number of systems that are value added in the organization is enhanced through the use Information systems. For instance, an organization can combine manufacturing cycle with the information systems to make sure that the results produced matches with the needs of the several standards of quality management. Acquisition of information systems makes business process simple and eliminates unnecessary operations. Through information systems employees processes are added controls making sure that operation of specific tasks is done only by users with applicable right. In addition, information systems increase accuracy and removes tasks that are repetitive permitting employees to focus on functions that are of high level. Implementation and better project planning through efficient management is enhanced through the use of information system. (Gelinas, Dull, 2010) Business process A business process is a sequence of steps carried out by stakeholders group to obtain a concrete objective. Multiple users repeat these steps severally in an optimized and standardized way. A business process can either be automatic or manual. When processes are done manually, there is no use of assisting technology. Automatic processes on the other hand is when technology is used to help users in implementing operations in a standardized and accurate manner. A business process is seen as a flowchart of logical steps.This method is formalized by Business Process Management(BPM). (Draheim, 2010). The following are some types of business process; Manufacturing this is a corrective maintenance, product assembly, and a quality assurance process. Finance this is a risk management, invoicing, and a billing process. Health this is a medical evaluation and drug approval process Bankingthis is a client on-boarding and credit check process. Travel this is a trip booking, and agent billing process Defense this is a situation room and emergency management process HR this is a vacation request, leavers and starters process Public Sectorthis is a process that deals with government service application Compliance this is a safety audit, and a legal check process Transaction Cycles The following are some the transactions cycle that exist in all kinds of businesses: the conversion cycle, the expenditure cycle, and the revenue cycle. These cycles are present in both profit and non-profit organizations. For example, every organization is subjected to expenditures for the sake of obtaining resources (expenditure cycle). Businesses offers value added through its services or products (conversion cycle). Revenue is received from outside sources by the company (revenue cycle). (Oliver, 2012). The Figure above demonstrates the cycles relationship and the flow of resource between them. The Expenditure Cycle- this is where organization operations begin with materials, labor and property acquisition in exchange for money. Several transactions of expenditure depend on credit relationship between parties of trading. After goods and services receipt is issued, the actual cash disbursement occurs. Between this two occurrence, several weeks or days may pass by. As such this transaction displays two parts, that is financial and physical component. A different subsystem cycle processes every component. This cycle results to purchases and disbursement of cash systems. Purchases systems identifies the necessity of acquiring physical inventory like raw materials and does placement of an order with the supplier. Purchase systems write down the event when the goods are obtained by establishing purchases and increasing inventory to be accounted for at a later date. (Kartseva, 2008). Cash disbursements system distributes the funds and perform transactions recording after the responsibility generated by purchase system is ready. Cash distribution system authorizes payment by minimizing cash and purchases accounts. Collection of data of labor usage, computation of the payroll and payment disbursements to the employees is done by payroll system. Payroll is a unique case cash disbursement and purchase system. Most organizations possess a different payroll processing system due to existence of accounting complexities. (Gupta, 2011). Acquisition, disposal and maintenance transactions of fixed assets are processed by fixed asset system. This items are permanent and represent largest financial investment of an organization. Examples of these assets include; motor vehicles, land, machinery, buildings, and furniture. The Conversion Cycle- cost accounting and production system are the two major subsystem in conversion cycle. Production systems consist of control, planning and scheduling physical goods through the process of manufacturing. This involves determining the requirements of raw materials, authorizing performance of activities, releasing raw materials into production, and instructing on the work-in-process direction through various manufacturing stages. The cost accounting systems on the other hand manages cost information flows associated to production. Information produced by this system helps in performance reporting, inventory valuation, cost control, budgeting and management decisions like buy or make decisions. (Goyal, 2014) Formal conversion cycle helps manufacturing organizations in converting raw materials into finished goods. Although this cycle is not formal, service observant and establishments in retails, organizations still engage in its operations that enhance culmination of salable goods and service development. These operations include; products and services readying and resources allocation like prepaid expenses, depreciation and building amortization to the appropriate accounting time. Merchandizing organizations however, do not use subsystem of conversion cycle to process their operations. (Weske, 2012). The Revenue Cycle- this cycle helps organizations sell their finished products to clients. It involves receipt, cash and credit sales processing. Sales order and cash receipts processing are the physical and financial component of transactions of revenue cycle that are separately processed. Sales order processing- most sales of business are created on credit and consist of duties like transaction recording in the accounts, preparing orders of sales, billing customers, granting credit, and products shipping to the client. Cash receipts- days and weeks passes between sale and cash receipt point. Processing of cash receipts include; cash collection, cash depositing in the bank, and writing down these occurrences in the accounts. (Harmon, 2007). Mapping information system Decision support system- decision making is enhanced through working and evaluating data that can create data techniques and projection of statistics. This system does not replace judgement of the manager, instead it supports it while enhancing quality improvement of his or her decision. Transaction processing systems- these systems offers a way of collection, processing, storage, modification displays or transaction cancellation. Multiple transaction in these systems occurs simultaneously. Data collected is kept in the databases which is later used in production of reports like check registers, billings, schedules, wages, manufacturing, inventory and summaries. (Sample, Ioup, 2010) Information systems in organization-these systems involves collection, storage and processing of data that gives the usefulness and accuracy of the information to the organization. Information systems involves information gathering from machines and individuals that receive data, enhance its processing, output it and then store. It also involves networks that sent and collect data and the processes that controls how data is managed. (Waldron, 2014) Management information systems-these system utilizes the data received from transaction processing systems and generate reports used in making business decisions by managers to solve problems. Some of the reports created by these information systems include; ad hoc, summary and exception reports. This help to increase the effectiveness of managerial operations. Neutral networks and expert systems- an expert system also referred to as knowledge-based system is a system of a computer that is structured to evaluate data and generate recommendations, controlled decisions and diagnosis. A neutral system on the other hand, uses computers to nurture information processing, learning and remembrance through a human being brains. (In Brocke, In Rosemann, 2014). Documenting Information System The goal of documenting information system is to help users to analyze, understand, explain and improve internal controls, business processes and information systems that are complex. It also helps in personnel training. (Information Resources Management Association, 2011). Data flow diagram this is a system graphicalrepresentation. It shows components of a system; flow of data among the components; and the data sources, storage and destinations. Data flow Diagram Symbols- the following are some diagram that shows data flow; Bubble symbol this shows an entity within which flows of data that is incoming are completely changed into outgoing flows of data. Acquisition of information system External Sources- organizations may decide to obtain a system buying a proprietary package from a supplier under a license and have the system personalized either internally or externally by the suppliers or any other outsider contractor. Enterprise system are normally bought in this way. Another option is to redistribute application of an open source which has a free program code and is open for modification under distinct kinds of license that forces application openness in perpetuity. In general, usage cost of software of the open source involves technical support from unique suppliers. (Camenisch, Fischer-Hu?bner, Murayama, Portmann, Rieder, 2011). Internal information systems development- life cycle or rapid application development is used by a company to develop information system internally. Same techniques are used by vendors of the system which requires to offer customized and more general system. Systems of large organization like enterprise systems are normally created and controlled through a process that is systematic referred to as system life cycle. This system involves six stages; system design, feasibility study, programming and testing, installation, system analysis, and operation and maintenance. The five stages that is feasibility study, system design, installation, system analysis and programming and testing are used in system development and the last stage which is operation and maintenance is the exploitation of the long term. In regard to the usage period, information system may be upgraded or phased out. A system enters another life cycle development in case there is need of a major upgrade. The diagram bel ow shows the six stages; Deployment of information system Identifying and understanding deployment audience. Some of the unique groups that should be considered include; operation staffs who run the software, end users and the support staff who aid users with the system. The level of management over the actual deployment of each group should be identified. (Gelinas, 2014). Identifying deployment strategy early- the organization should determine whether the system is executed parallel with the current system or will a cutover be carried out. Executing the system with parallel provides the benefits of backing out to the old system if the new one gets some challenges. However, parallel activities need great effort from all involved individuals. Cutover is used mainly by organizations supporting online clients Installation testing. Installation scripts should be tested. The best method is to build installation scripts as the system is being developed and use them in promoting software between sandbox that the team is integrating into pre-production testing areas. The diagram below shows the installation testing. (Beynon-Davies, 2013) Release regularly- development releases are delivered by developers of Agile software into areas of pre-production staging at the end of every iteration. Development release of a software is something delivered into production if it goes through quality assurance of pre-production, process of deployment and testing. (Khosrow-Pour, 2009). Start planning early. In order to be successful planning early is required as deployment process can be complex, especially when there is a variety of configurations in the system or if the user is physically distributed. Acknowledge deployment is harder than it seems- several operations should be considered before system is deployed into production. Planning of an agile strategy should be enhanced. Plans should be kept at high level first targeting on the main dependencies.(National Research Council, 2010). Reduce efforts of pre-production testing safely with time - amount of time taken in pre-production testing efforts can be minimized by agility, thus increasing the speed of deployment. Agility offers artifacts of high quality and consists of suite of regression test to show that the system is functioning well. Deployment is easier if software are Well-tested organization must performObject-oriented testing even if it is a difficult and complex endeavor. Testing should be done early and more often. reflection of organizational culture through planning- the organization should determine the individuals whom the system is deployed to, their daily roles and policies, willingness to tolerate the amount of change to be enhanced, and the impact of the system once deployed. (Wiley, 2017). EB ay, google and Facebook are among the businesses that have become successful through the use of information systems. However, inappropriate use of information system can generate issues for the employees and companies. Loss of finances to individuals or financial institute can occur due access gained by criminals to information of the credit card. Lawsuits and business loss can occur if individuals post improper details on twitter or Facebook using organizations account. (Schweiger, 2011). Cyber-crime- this is committing crimes using information systems. Cyber can start simply with annoying users of computer, then progress to losses of huge finances, and maybe cause loss of life. Some of things that have led to cyber-crime growth are smartphones and other high-end mobile machines growth. Types of cyber-crimes include; Identity theft- this is where malfunction is practiced by a criminal through impersonating identity of someone else. Cyber-criminals access someone else personal identity. Content used in such crimes involves passport numbers, social security numbers, debit and credit card numbers, and date of birth among others. Information obtained by these criminals is used to make orders online by pretending to be the person that owns the account. Acquisition of personal data is done through phishing. Phishing is generation of websites that are fake and similar to emails or business websites that are legitimate. (Wang, Wang, 2012) For instance, the user may be tricked to updates details through a request to verify personal details such as passwords and contact number from an email that pretend to come from GMAIL. As such the criminal gains access to victims personal details. The attacker can transfer funds or make online orders if the victim uses services of PayPal. Other techniques of phishing include use of WI-FI hotspots that are fake but similar to legitimate ones. This commonly happens in airports and restaurants. If the user fails to suspect and logs in to the network then attackers may attempt gaining access to information that is sensitive like credit card numbers, usernames and passwords. Copyright infringement- also known as piracy is the use of materials that are copyrighted without authority. It is one of the largest challenge with digital goods. Distribution of materials that are copyrighted like audio, software and audio are done using websites like pirate bay. (Hercheui, 2012). Click fraud- organizations like Google AdSense advertises services where pay per click is offered. Click fraud happens when the user clicks a link with the intentions of making money but not gaining knowledge of information. This can also happen through the use of software that are automated which create those links. Advance Fee Fraud- the targeted victim receives an email that request them to demand the attackers inheritance money and in return they are promised huge amounts of money. Attackers pretend to be related with dead relatives and claims to be entitled to wealth inheritance and requires assistance in claiming it. The criminal will sometimes request for financial assistance and ascertains to reward later. If the victims fall to the trick and transfers the money to the scammer, he or she loses the cash. (Greene, 2013) Hacking- this is where security is by-passed to gain system access without authority. Attackers can do anything they feel like once they gain that access. Some of the operations carried out when hacking occurs are; installation of applications that permits attackers to monitor the user or manage their system remotely. (Kizza, 2010) Deface websites- this is stealing information that is sensitive. This can be performed using methods like injection of SQL, vulnerabilities exploitation in the database program to gain access, techniques of social engineering that make users submit passwords and ids. Conclusion In conclusion information system is associated with several advantages which include; communication becomes cheaper, much effective and quicker, elimination of geographical, cultural, and linguistic boundaries is enhanced, most business are now available 24/7, facilitates creation of new jobs, and it enhances productivity and cost effectiveness. However, adoption of information system in the organization is also associated with some disadvantages which include; lack of job security and unemployment since these systems replaces the roles of individuals in the firm, implementation of information system is expensive, there are security issues where attackers access someone else personal details, and it is argued that dominating culture like USA influences others on some things like dressing, and behavior. Efficiency through the use of information systems in an organization is enhanced. Information system continues to grow overtime and have improved largely the quality of life. Most organizations such as health centers has benefited through the use of new information system. Recommendations Considerations-Implementation of information systems within a company can be expensive. Cost of implementation involves system installations and sessions of employee training. Working staff may think of system adoption as unreasonable change and so resisting it. resistance can lead to turnover of employee and cause hindrances in business activities. Organizations should ensure that leadership is in place to evaluate decision adequacy in obtaining information system and provide guidance through the phase of transition in the company and compare the cost of information system against its benefits. References Beynon-Davies, P. (2013).Business information systems. Houndmills, Basingstoke ; New York : Palgrave Macmillan Camenisch, J. L., Fischer-Hu?bner, S., Murayama, Y., Portmann, A., Rieder, C., (2011).Future challenges in security and privacy for academia and industry: Proceedings. Berlin: Springer. Draheim, D. (2010).Business process technology: A unified view on business processes, workflows and enterprise applications. Heidelberg: Springer. Gelinas, U. J. (2014).Accounting information systems. Australia : South-Western Gelinas, U. J., Dull, R. B. (2010).Accounting information systems. Australia: South-Western/ Cengage Learning. Australia ; Mason, Ohio : South-Western/ Cengage Learning Goyal, A. P. (2014).Management information systems: Managerial perspective. Noida: Vikas Publishing House. Noida : Vikas Publishing House Greene, S. S. (2013).Security program and policies: Principles and practices. Indianapolis, Indiana : Pearson IT Certification Gupta, H. (2011).Management information system: (an insight). New Delhi: International Book House. Harmon, P. (2007).Business process change: A guide for business managers and BPM and six sigma professionals. Amsterdam: Elsevier. Hercheui, M. D. (2012).ICT critical infrastructures and society: 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, the Netherlands, September 27-28, 2012. Proceedings. Berlin: Springer. In Brocke, J. ., In Rosemann, M. (2014).Handbook on business process management: 1. Berlin : Springer Information Resources Management Association. (2011).Enterprise information systems: Concepts, methodologies, tools and applications. Hershey: Business Science Reference. Kartseva, V. (2008).Designing controls for network organizations: A value-based approach. S.l: s.n.. Khosrow-Pour, M. (2009).Encyclopedia of information science and technology. Hershey, PA: Information Science Reference. Kizza, J. M. (2010).Ethical and social issues in the information age. London: Springer. National Research Council (U.S.).,(2010).Achieving effective acquisition of information technology in the Department of Defense. Washington, D.C. : The National Academies Press Oliver, G. R. (2012).Foundations of the assumed business operations and strategy body of knowledge (BOSBOK): An outline of shareable knowledge. Sydney: Sydney University Press. Sample, J. T., Ioup, E. (2010).Tile-based geospatial information systems: Principles and practices. New York: Springer. Schweiger, C. L., (2011).Use and deployment of mobile device technology for real-time transit information. Washington, D.C: Transportation Research Board. Swanson, M., Swanson, M., Bowen, P., Phillips, A. W., Gallup, D., Lynes, D., (2010).Contingency planning guide for federal information systems. Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology Waldron, M. (2014).Mapping information. Place of publication not identified: Raintree. Wang, S., Wang, H. (2012).Information systems analysis and design. Boca Raton: Universal-Publishers. Weske, M. (2012).Business process management: Concepts, languages, architectures. Berlin: Springer. Wiley, J., (2017). study guide: Auditing and attestation. Wiley Sons Inc.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.