You are on page 1of 5

NMIMS Global Access

School for Continuing Education (NGA-SCE)


Course: Information Systems for Managers
Internal Assignment Applicable for December 2022 Examination

Question 1:

Some of the Technical and Business Considerations for Farokh should include:

·What are the specific business needs that the new IT infrastructure should address.
·What are the potential technical issues that could arise with the implementation of the new IT infrastructure.
·How can the new IT infrastructure be aligned with the corporate strategy.
·What are the potential risks and benefits associated with the new IT infrastructure?

The elements on the list below cannot in any way be disregarded as they are extremely necessary for the
organization's daily operations: In order to fulfil the unique needs of the company's business operations, the
new information technology infrastructure should be able to support the company's growth, increase
operational efficacy and productivity, and provide a basis for the creation of new applications and services. To
satisfy the unique requirements of the business activities of the company, these objectives should be fulfilled. If
the firm is to meet the specific demands imposed on its business operations, it is imperative that these goals
be accomplished. These objectives must be met if the company is to be able to meet the requirements that
have been placed on the way its business operations are carried out. It is imperative that these goals are
accomplished if the company is to be able to meet the specific standards imposed on the manner in which its
commercial operations are conducted.

In order for the company to be in a position where it can meet the particular criteria that have been imposed on
the manner in which it conducts its business operations, it is imperative that these goals be completed. If the
company is to have any hope of being able to satisfy the unique requirements imposed on it by the daily
operations of its business, it is imperative that it achieve these objectives. This will enable the organisation to
fulfil its commitments and achieve the goals it has set for itself.

Concerns with technique: It's possible that the new information technology infrastructure won't work with the
current systems; additionally, it's possible that it won't have enough storage; and finally, it's possible that it'll
lead to security difficulties. These possibilities coexist at the same time. There is a chance that each of these
events could occur simultaneously. There is a probability that each of these events will occur at the same time.
It's possible that each of these things will happen at the same time. There is a possibility that each and every
one of these situations will ultimately occur. There is a possibility that each and every one of these scenarios
will ultimately come to pass.

Listed below are some problems that could arise as a direct result of the scenario's technological elements:

Ensuring compliance with the complete plan for the company's long-term growth strategy: It is vital to
connect the new IT infrastructure with the corporate strategy in order to better support the company's
growth and increase its efficiency and productivity. This can be achieved by integrating the new
infrastructure with the enterprise's overall strategy. One way to achieve this objective is by integrating the
newly constructed infrastructure with the broader company plan. Thus, it will be possible to provide greater
support for the organization's expansion ambitions. If the recently developed information technology
infrastructure is incorporated into the organization's overall plan, the corporation will be able to achieve its
objective.
Risks and benefits: There is a chance that, during the period of transition, there will be periods of time when
the system is inoperable; there is a chance that there will be a loss of data; and there is a chance that the
total amount of money spent will increase. All of these potential outcomes are plausible. At this time, none
of these potential outcomes should be regarded certain, but they should all be viewed as possibilities. At
this moment, we should not assume that any of these potential outcomes will actually occur; rather, we
should see them all as possibilities. There is a chance that each and every one of these events will actually
occur. Despite this, it may also carry with it the possibility of these types of advantages; despite this, it may
also bring with it the chance of these types of risks. In addition to the promise of these benefits, the new
infrastructure for information technology may also carry the possibility of these dangers.

The new infrastructure for information technology has resulted in numerous advantages, two of which are
an increase in both the achievable level of performance and the degree of efficiency. These are simply two
of the numerous benefits. In addition, the implementation of the new infrastructure has resulted in a number
of good outcomes that are a direct result of the improvement. These are simply two of the numerous
advantages that have become a reality as a direct result of the recent modifications to the physical
infrastructure. There are a huge variety of other benefits. In addition, there have been an abundance of
extra benefits. Overall, there have been a substantial number of occurrences. This solution gives an
additional benefit in the form of the capacity to manage apps and services that have lately emerged due to
technological improvements. It was only possible to perform this function as a direct result of the most
recent advancements made to its fundamental information technology infrastructure. Prior to this time, it
was impossible to implement this function. Prior to the time when such developments were accomplished, it
was at best unimaginable to possess such abilities.

Question 2:

The role of BPCL’s CEO is majorly managerial in nature. The role of the CEO is to ensure that the business
achieves its goals and objectives. The CEO is responsible for developing corporate policy, making strategic
decisions, and overseeing day-to-day business operations. To make decisions that will boost the
company's bottom line, the CEO must have a comprehensive understanding of the company's financial
standing. In addition, the CEO must be able to communicate effectively with the board, shareholders, and
workers.

The CEO's first priority is to ensure the profitability of the business. To accomplish this, the CEO must
choose a plan of action that will steer the company in the right path. To make decisions that will improve the
company's bottom line, the CEO must also have a comprehensive understanding of the company's
financial situation. Additionally, the CEO must be able to communicate effectively with the board,
shareholders, and staff.

Ensure that the company meets its objectives is one of the CEO's most important responsibilities. To
accomplish this, the CEO must set corporate rules and oversee daily business operations. To make
decisions that will improve the company's bottom line, the CEO must also have a comprehensive
understanding of the company's financial situation.

The CEO must also ensure the satisfaction of the company's stockholders. To accomplish this, the CEO
must be able to communicate effectively with the board of directors and shareholders. Additionally, the
CEO must be able to make decisions that boost the company's bottom line.

Additionally, the CEO must be able to effectively communicate with the organization's workforce. The chief
executive officer must be able to motivate employees and ensure that they are contributing to the
organization's goals. Additionally, the CEO must be able to make decisions that boost the company's
bottom line.

If the price of oil begins to rise, the CEO will have to decide how to enhance production in order to profit
from the higher prices. If the price of oil begins to decrease, the CEO will have to determine how to
minimise spending to maintain the business successful.
Additionally, the CEO must choose which places to study for oil and gas. This will require a strong
understanding of the local geology as well as the political and economic situation of the nation. The CEO
will also need to negotiate with the government in order to secure the permission to explore and produce in
the area.

The CEO will also be accountable for the everyday operations of the company. This includes
managing the funds, overseeing the construction of new facilities, and recruiting and terminating people.

The CEO must also communicate with the stockholders of the company. This will involve giving
presentations on the financial performance and growth strategies of the company.

A CEO of an oil and gas company has various responsibilities. They must be knowledgeable about the oil
and gas industry, present market conditions, and the geology of the locations where oil and gas are being
explored. Additionally, they must be able to manage day-to-day business operations and make quick
choices.

Further let’s understand about the primary IS & Supporting IS used:

To fully grasp how BPCL's primary IS works, you must first be familiar with what an ERP system is. ERP
stands for "enterprise resource planning" and is a set of practises used to manage a company's resources.
An enterprise resource planning (ERP) system is a computer programme used by businesses for managing
daily operations. The ERP system collects all of the company's data and stores it in a central repository that
is accessible by all authorised personnel. The ERP system provides a unified data source accessible to all
divisions in an effort to standardise and streamline company processes.

The ERP system of BPCL is linked to several others, which helps the business run smoothly. The ERP
system is interconnected with other business applications such as a data warehouse, SCM, and CRM. The
ERP system feeds data to several auxiliary systems, streamlining operations for BPCL.

The CRM system handles order management and maintains customer records. The enterprise resource
planning system (ERP) shares information with the customer relationship management (CRM) system,
which BPCL employs to keep track of its interactions with customers.

The SCM system is used to track supplier information and monitor the company's supply chain. The SCM
system receives information from the ERP system, which is connected to it. BPCL's ability to manage its
supply chain is enhanced by the SCM software.

The data warehouse is the central repository for all company information. The data warehouse receives
information from the ERP system through an established connection. BPCL is able to better manage and
store its data thanks to the data warehouse.

The Enterprise Resource Planning system (ERP) is the backbone of BPCL's information system (IS). The
ERP system is responsible for monitoring and controlling the company's inventory, finances, and human
resources. The ERP system of BPCL is linked to many other systems, which greatly simplifies business
processes.

The ERP system keeps tabs on inventory, finances, and HR information. The system monitors the supply
chain and maintains records on all suppliers in addition to handling customer orders. BPCL's operations
have been simplified thanks to the ERP system's integration with other programmes.

The CRM system handles order management and maintains customer records. The enterprise resource
planning system (ERP) shares information with the customer relationship management (CRM) system,
which BPCL employs to keep track of its interactions with customers
Question 3 a:

BYOD focuses on the aspect where employees in the workplace are allowed to use and connect their own
personal devices to the organizational network and access the work-related systems. This is majorly evident
with the organization that allows flexible timings and work-from-home operations.

There are three levels of BYOD and they are as follows:

1. The first stage of BYOD is disclosure. This focuses on the aspect that there should be simple disclosure of
the privacy and data protection of the employees in the workplace. This ensures that their fundamental rights
are protected.

2. Another level is reviewing, revising, and reminding them of their changes. This ensures that the usage of
personal devices can be managed in a periodical manner and that privacy can be revised and reminded to the
employees.

3. Another integral stage is the exit aspect of BYOD. This is integral for those times when employers do not
leave the company in a mutually acceptable manner. Having an exit BYOD strategy ensures that the data and
privacy is maintained.

Question 3 b:

Pros of BYOD:

Here are two pros of BYOD and why some companies prefer a BYOD system:

1. Cost Savings
Providing devices for all employees can significantly increase your overall costs, especially if you have a large
organization. Additionally, not all employees may be comfortable or well versed with handling the devices you
provide.

But having a BYOD policy can significantly reduce your expenses of:

Purchasing or renting devices for each employee.


Providing training for using new devices.
Hiring hardware and IT support teams.

Additionally, when employees bring their own devices, they take better care of them and save you the
additional cost of providing alternative devices.

2. Up-to-date Technology
People may not update company-owned devices regularly. They may even choose to ignore any security
updates, which may put your confidential data at risk.

However, they are likely to be more vigilant about keeping their personal laptops and other devices up-to-date
and install the latest available updates.

Also, it may not be financially possible for an organization to keep purchasing new devices for all employees to
keep up with the latest computer and mobile technology. But employees may often change their personal
devices whenever newer versions are available.

When they use these devices for work, you’ll have faster, powerful, and modern devices that can work
seamlessly without too many glitches.
Cons of BYOD:

1. Lack of Uniformity in Devices


A significant drawback of the BYOD model is the diversity of devices used for office work.

For example, some employees may prefer a Windows tablet and laptop, while others would be comfortable
only with an iPad and a MacBook. Additionally, some may keep upgrading their smart devices every 2-3 years,
while others may use the same device for many years.

Having multiple devices may lead to operational and compatibility issues with your company’s software. Your
organization may be using a particular software for completing projects and tasks.

Since the devices are varied, employees may face difficulties while installing or using these programs. The
software may not even work for older devices.

Additionally, the same software may have different shortcuts or versions for different OS. It may make it difficult
for employees to collaborate on different devices, especially if they need to send files to each other and edit
them.

As a result, you may have to create different directives, SOPs (Standard Operating Procedures), and
information packets for all different types of devices used in your organization.

2. Higher Security Risk


When employees use their own device for work, they’re likely to carry it back and forth between their home and
office. It can significantly increase the risk of theft or misplacement.

According to a data breach analysis, 41% of all data breaches have mainly been due to lost devices.

Also, you may not have much control over who uses the employee’s personal devices when they’re not at
work. Children may mistakenly download risky apps or software and jeopardize the entire device, including
your company’s confidential information.

There’s also a risk that the employee may intentionally or unintentionally leak trade secrets or other classified
information to hackers while using unsecured WiFi connections.

But you can take security measures to provide some level of protection to personal devices. These include:

Enterprise Mobility Management (EMM): A set of policies, technologies, and processes that secure and
manage all mobile devices (Android, iPhone, etc.) within an organization.
Mobile Device Management (MDM): A third-party security software that allows IT departments to manage,
monitor, and secure any mobile device, like a smartphone, tablet, and laptop.
Mobile Application Management (MAM): Software and services that control access to internal and commercial
applications used for work purposes.

You might also like