Information Systems For Managers - Dec22 PDF
Information Systems For Managers - Dec22 PDF
Information Systems For Managers - Dec22 PDF
Ans 1.
Introduction
Businesses that have personal information about their customers. From a security perspective,
they are among the most advanced enterprises around the globe. One reason is that online
security is closely linked to online shopping. Customers are looking to make sure that they are
safe with their personal information, no matter how it is accessed. Businesses must safeguard
their reputations and brand and highly sensitive personal information. The retail industry has
evolved over the years. The industry is growing rapidly because of globalization and increased
competition. The regulations of the government and their challenges pose a challenge to the
security of data in the retail sector. Retailers are therefore required to implement stronger data
security measures. It is almost impossible to attain complete IT security in an organisation.
FarokhMotorwala is the Chief Innovation Officer at D&C Aosta Spirits (near Hyderabad), which
recently celebrated its 30th anniversary. The CEO of the company explained their growth
strategy. Farokh is eager to integrate Method Planning into his company's IT infrastructure.
Discussion
With the rapid change in the business environment and the importance technology plays across
all aspects of our lives, we have witnessed an increase in need for infrastructure management.
This management technique can help in cost reduction and company management. Because of
this emerging model of management, business leaders as well as service providers have debated
the costs of implementing it. This has resulted in some organizations having difficulty coping
with the growing demand for this management style.
To make IT infrastructure management more adaptable organizations have two models for
managing services. Standard services are provided at a set cost and are consumed on a cost-time-
quantity basis. The total price of the components determines the price. This second element
makes management software more commercial and user-friendly through the development of
standard products.
Some of the business needs that Farokh must take into account include:
The components of the infrastructure which meet business needs: Every business has various
requirements and IT infrastructure plays an important role in ensuring they are met. To ensure
that the IT infrastructure is in place it is first necessary to determine the needs of your business.
Technologies choices have to be based on what specific business needs are being met and can be
anticipated to be in the near future.
Technology is essential for certain business operations: With the ever-changing business
environment, and the ever-growing technological importance, there has been an increase in the
demand for the management of infrastructure. This management technique aids in not just
improving the management of companies but also helps reduce costs.
Some of the technical problems that Farokh must take into account include:
Make sure the technology you select is suitable for the next generation: Technology will
continue to change with the passage of the passage of time. When selecting the technology you
want for your company, be sure to check whether it is still useful in 20 years' time. If yes, then
technology should also be adopted.
Ensure that the technology has been regularly updated: As the technology is updated
regularly that require it to be updated at regular intervals so it should be checked that how soon
or often the technology would be renewed.
Making sure that vendor support is available: Businesses can grow by utilizing various tools
of technology. But, as these technologies are being put into place it is essential to verify that
vendor support is available in order to be able to access and control them.
Mr. Farokh should be well-versed in the rules and laws which govern the development of IT
infrastructure which includes the kind of structure to be built, whether it be cloud-based or
traditional, as well as basic requirements for information technology.
Secure infrastructures manage access to data and its availability. It is a way to protect business
from breaches and hacks, maintaining customer trust.
WANs regulate traffic by prioritizing traffic and giving certain applications greater or lesser
bandwidth depending on their requirements.
High-performance storage systems are able to store and back up data and include a data
recovery mechanism in the event of catastrophes.
Low latency networks make use of elements of the infrastructure of an enterprise to reduce
delay in data flow.
Zero downtime means that there's no downtime. This minimizes interruptions for businesses
and increases profits.
Conclusion
Farokh must address IT infrastructure needs of the business. Farokh should determine the
business's business requirements. IT infrastructure needs will depend on the needs of the
business. If the company has expanded its operations and is now operating at a higher level, it
will require an IT infrastructure that can handle the increasing workload. To support less work
when the company shrinks and shrinks, the IT infrastructure will need to be more adaptable. The
IT infrastructure demands will be determined by the organization's needs. The IT infrastructure
should be capable of supporting massive number of users. If the company has less customers, the
IT infrastructure should be able to handle smaller amount of traffic on websites.
Ans 2.
Introduction
Bharat Oil Corporation Limited (BPCL) can be considered one of the top exploration and
production companies worldwide. K. Padmakar is the current CEO of the BPCL company.
BPCL is an Indian-owned natural gas company that is headquartered in Mumbai. The company
is ranked 367th on the Ton of money Global 500 listing. It is the second largest refiner of crude
oil, with an annual refining capacity of 18.2 million metric heaps. There are two major areas of
business within the company: upstream and downstream. The upstream segment includes
production, marketing of crude oil, and the natural gaz expedition. The downstream business
includes refining, advertising and circulating petroleum products. The business's primary
emphasis gets into oil and gas exploration, production, circulation, marketing and refining. It
also has a strong presence in the petrochemicals sector. BPCL is strongly committed to
sustainable growth, and operates in a way that minimizes its ecological impact.
Discussion
A person visiting a bank to deposit money offers the cashier information regarding their account.
Have you ever thought about the way banks handle customer data? Institutions like banks and
others use information systems for managing their data. A system of information is vital to run
an enterprise. To reap maximum benefits the business should use IS to the maximum extent
possible. Make use of all the capabilities of IS to reap the maximum benefits. IS helps
management functions within an organization.
There are a variety of reasons why an organization might need information systems.
Records: Organizations must find the root of the issue and then take corrective actions. This
organization needs activity records. These activities are needed to monitor and track financial
performance.
Operations: Information system provides complete and updated information which allows you
to perform the business more effectively.
In the case we'll look at the management abilities of BPCL's CEO. A CEO who is effective takes
quick and precise decisions with no inclination. He works with his managers to establish a
computerized network. The CEO should establish a computerised system because many
corporate processes require technology. The following characteristics can be found in systems of
information that are computer-based:
It gathers, organizes, manipulates, and keeps up-to-date both external and internal data.
It accurately and quickly analyzes data by using simulation, operations research, etc.
It can be used with different output formats and is compliant with the current guidelines.
CEOs make long-term choices. Growth and expansion are long-term goals. Business
performance, client details, available resources, etc.
Information systems are accountable for the gathering and processing, storage, distribution, and
management of information. These tasks can be fulfilled by the IT system (CBIS). Most
industries use IT today. Information systems that are computerized are utilized across a wide
range of industries, including banks, investment companies, banks, and thrifts.
Hardware: An organization's hardware is input, output, and processing devices. Such devices
include monitors, printers, CPUs, etc.
Software: Software is computer programs that enable hardware-based data processing. After
processing data, software is saved on a disk and provides important information.
Networks: A network connects computers and allows them to share resources and data.
Data: Data are facts and are used as inputs to CBIS for processing. CBIS manages these kinds of
data and offers useful information to organisations.
Procedures: CBIS procedures explain how components process data in order to produce the
desired output.
People: CBIS is used by individuals to complete different tasks. People are the key to the
success of information systems.
Transaction Processing Systems store, alter, retrieve, and store transactions for an organisation.
Transactions are events that produces or changes data that are later saved in the information
system.
Process control systems monitor monitors and manages the physical processes within an
organization. It manages the manufacturing environment and regulates the process electronically
based on the restrictions set by the user.
Successfully running an organisation's activities requires you to make sound decisions. Making
decisions involves choosing and taking action to implement the most effective option. It's a
method of solving problems that leads to a viable solution.
EIS is a kind of MIS that assists senior executives in making informed decisions. EIS gives you
fast access to and information from both the external and internal worlds. It is frequently referred
to an exclusive type of DSS. EIS lets top executives evaluate their performance and identify
opportunities and concerns.
Conclusion
Chief executive officer is considered to be the most important police officer in any BPCL. He
reports to the directors. It is vital to implement the business instructions and allocate cash.
Additionally, you must establish and supervise the executive group. The CEO is accountable in
making decisions that can affect the business's financial success. CEOs must make brilliant
decisions and have real problem-solving skills. To maintain a smooth system they need to look at
events, identify and solve issues, then apply solutions. The position of CEO is unique within the
company. Executives continue to be, while additionally necessary, completely accountable for
every decision and decision taken by each team member, irrespective of what they don't know
about. The CEO, especially new executives, is permitted to make a few mistakes. This approach
allows CEOs to focus on their main obligation when they design, assess and review long-term
solutions that could extend beyond the immediate future.
Ans 3a.
Introduction
The use of technology to move people around can bring businesses many advantages. In order to
do this, they must first understand the opportunities and challenges that mobility can bring.
Businesses must evaluate the impact that mobility can have on their business and customers. In
addition, it is also necessary that companies identify the various particular problems that an CIO
may face while adopting mobile technologies. Mobile phones have become increasingly popular
among employees and customers in the last 50 years.
Discussion
More than three billion people use the internet each day, and the majority of them do so via their
mobile devices. In terms of mobile technologies and their use, businesses around the world have
a very high adoption rate. Businesses can reap the maximum advantages if they have complete
knowledge of the future as well as the evolution of technology for mobile devices.
In this technological world, tablets, laptops and mobile phones play an important function in
executing the various tasks related to work. These days, employees use their personal mobiles
and laptops at work. The devices are used both for work and personal activities - such as
checking email, editing documents, reading reports, etc.Bring-your-own-device (BYOD) is the
trend of employees bringing their own devices to work. Management issues were more frequent
as the trend was adopted by companies. This included issues with access to data and security
from company systems. Users had a variety of different devices and platforms, so there wasn't a
standard size or layout that could be used to create reports.
Level of BYOD
Beginning BYOD: At the initial level, disclosures regarding BYOD policy are to be made. If
employee's device is monitored, it is essential to ensure that the BYOD policy clearly outlines
the extent of the access (i.e. It is crucial that the policy on BYOD clearly defines the scope of
access and the purpose to access. what information it will have access to) and the purpose of
access (i.e. why it should be able to access the information). The policy should define the manner
in which the company handles private data. To ensure that there are no limitations, employees
should be aware of BYOD guidelines.
Work in conjunction with BYOD Policy: At the second stage, employees are able to follow the
policy and are able to use their devices in various official tasks. The company should notify
employees of any material changes to the policy that affect the rights and responsibilities of
employees. To reduce the risk, employees must immediately report data breaches.
Evaluation of BYOD policy: It's normal for employees to leave an organization due to various
reasons before joining another. But, if they do it is mandatory to permanently delete all data that
is associated with the organization to ensure that they don't misuse. BYOD policies must be
implemented.
Conclusion
BYOD is a benefit for both employees and services. Because they don't need to carry multiple
devices, the newbies are very comfortable for staff members. Additionally, it allows users to
choose the device that they are most familiar with and comfortable using. BYOD can also reduce
the requirement to purchase additional mobile phones for employees by companies IT
departments.
Ans 3b.
Introduction
Before adopting an BYOD strategy, IT executives and CIOs must be able to clearly articulate
why they are doing it. Clearly defining and describing the reasons behind adoption of BYOD
policy helps the business collaborate with employees in the most efficient possible manner.
Discussion
A BYOD policy should include a description regarding aspects such as employees' stipends,
contracts for services currently in place, reimbursement for roaming data charges (if they are
incurred due to official use). Containerization is the process of separating personal data from
work information when employees are using their personal device to fulfill official requirements.
Employees must be able to erase all official data in the event that they lose or steal their device.
Thus, the business must establish a BYOD policy that will benefit both the company and
employees.
Pros
Cost savings: Offering gizmos to all employees could significantly increase the company's
ultimate expenditures particularly when the is large. The employees may not have a good
understanding of someone or a particular use for the gadgets offered by the company. The
employees take great control of their devices when they carry their devices, saving business cash
mainly on offering replacement devices.
Flexibility and familiarity: Employees feel more relaxed using their personal devices. It also
saves time learning them. This results in greater efficiency and decrease in time needed to finish
tasks. Additionally, it will positively affect productivity. The ability of employees to access the
work files they need on their own devices allows them to work from anywhere. BYOD policies
provide greater flexibility to employers, which in turn increases job satisfaction.
Cons
Greater Security Risk: Staff members who use their devices for working tend to shift items
between their home and office. This can dramatically raise the possibility of burglaries or mild
inconsistency. Experts will not be in a position to influence the actions of employees who leave
the organization. When employees use Wi-Fi networks, information that is not secured can be
exposed to cybercriminals. Children may download dangerous software, putting their device and
company's data in danger.
performing certain tasks but when employees are using their own devices it could have software
Software issues and data retrieval: In any organization various software is installed to assist in
issues. To prevent misuse, it is possible that an employee may need to delete personal data of the
company off their device.
Conclusion
It is essential to take into consideration the advantages and disadvantages of implementing this
technology within your business. It might prove difficult to keep control of all gadgets and
protect company confidential information if the company has made a number of significant and
diverse commitments. On the other hand one hand, the BYOD contract could drastically reduce
business expenditures whether the firm is a new company or a limited business and doesn't have
a specialized IT personnel.