You are on page 1of 11

Information System for Managers

Ans 1.

Introduction

Cybercriminals target businesses that keep customer's personal data they also are among the
most advanced businesses in the world regarding security. The close connection between
security shopping on the internet and online security is a major reason why they're extremely
safe. The companies are responsible for protecting their brand, reputation and highly sensitive
personal data. The retail sector has seen major transformations. Due to globalization, increased
competition, demand for pioneer products and latest technology trends, this sector is developing
at a rapid pace. Due to the rules and the difficulties faced by the government and the retail
industry, it is imperative to improve its data security. It is nearly impossible to achieve the
complete IT security for an enterprise. FarokhMotorwala is the Chief Innovation Officer at D&C
Aosta Spirits (near Hyderabad), which recently celebrated the 30th anniversary of its
establishment. The CEO of the company has laid out their growth plan. Farokh wants to integrate
Method Planning into the company’s IT infrastructure.

Discussion

Because of the changes in business environment and the significance technology has in all
aspects of our lives, the management of infrastructure has become more important. It is a
management method that can help reduce costs and improve management of companies. Service
providers and business leaders are debating whether or not to use this model of management.
Some organisations find it difficult to manage the increasing demand for this style of
management which includes hardware, software operational support, and other services.

Companies are using two different service management approaches to make IT infrastructure
management more adaptive. Standard services are offered for a fixed cost and then consumed
according to the price-time-quantity model. The price will not be dependent on random
estimates, but rather on the total value of the components. Another aspect is making management
software more user-friendly and commercial by creating standard options and solutions.

Farokh must consider the following requirements for business:

 Infrastructure components would satisfy the needs of business: In any business, there could
be various types of needs and to satisfy all of them, the IT infrastructure plays a vital role. All
necessary needs should be identified for that you will require IT support. It is important to
consider the business requirements that will be met by IT assistance in the near future.

 Technology is required to play a part in certain business operations: With changing


business environment and the growing importance of technology in all spheres of life,
infrastructure management is becoming more important. It does not just improve the efficiency
of the organization and reduces company's overall costs.

 Reliable and cost-effective IT infrastructure: When a business is small or mid-sized it's not
likely to be concerned over its IT infrastructure. However, functional departments don't always
understand what is in this idea.

Some of the technical issues Farokh has to consider include:

 Check that the technology is appropriate for the future: Technology is constantly evolving.
When choosing the most suitable technology for a company, you should also check whether the
technology is appropriate in the future. If so, then technology should be utilized.

 The technology has to be interoperable: Components in an IT infrastructure must be able to


work together. They must have built-in capabilities that allow them to work with various data
standards, different formats for files, various communication protocols, and so on.

 Keep your technology current: Because technology has frequent updates, it is necessary to be
kept current on a regular basis. It is essential to know how often and how quickly it will be
renewed.
 Assuring the support of vendors: Although technology has numerous benefits, companies
can continue to expand. It is essential to make sure the support for vendors is in place prior to
implementing any new technology.

Infrastructure Law Farokh is to be adhered to:

When developing the best IT infrastructure In order to create the most efficient IT infrastructure,
Mr. Farokh should be acquainted with the following elements:

 Secure infrastructures permit data access and accessibility to be controlled. Secure


infrastructures are able to protect companies from hacking and other threats, while maintaining
customer trust.

 Networks are managed by WANs, which prioritize traffic and giving certain applications more
or less bandwidth in line with their needs.

 High-performance storage systems can be used to store and backup data and offer disaster
recovery in case of data loss.

 Low-latency networks use enterprise infrastructure components to reduce the time it takes for
data to flow.

 Zero downtime means that there's never any downtime. This helps reduce disruptions to
business and helps boost profits.

Conclusion

Farokh must tackle IT infrastructure problems. Farokh should identify what the requirements of
the business of the company are. IT infrastructure requirements will depend on the needs of the
business. If the company has expanded its operations that will require an IT infrastructure that is
able to handle the increasing workload. In order to sustain an encroaching workload as the
company grows and shrinks, the IT infrastructure must be more flexible. The requirements of the
company's organization will determine the requirements for IT infrastructure. For instance, if an
company is required to accommodate a large number of users will be able to support many users,
the IT infrastructure should be capable of handling the increasing traffic on the internet. If the
organisation has fewer customers, its IT infrastructure must handle fewer requests for website
access.

Ans 2.

Introduction

Bharat Oil Corporation Limited (BPCL) can be considered one of the top oil and energy
exploration and production companies worldwide. K. Padmakar is the current CEO of the BPCL
company. BPCL is an Indian state-owned oil and gas company headquartered at Mumbai. The
second largest refining company in India, with an annual capacity of 18.2 Million metric heaps
annually It is India. There are two main segments of the business that are downstream and
upstream. The downstream company comprises production, marketing, and natural gas, crude oil
expedition. Its downstream division is comprised of refining, marketing and petroleum products
that circulate. The main focus of this business is on exploration of natural gas and oil, production
circulation and refining. The company is also a well-established participant in the petrochemicals
industry. BPCL is committed to lasting growth and functions in the direction of reducing its
environmental impact.

Discussion

Concept Information Systems

When a person goes to the bank to deposit money gives the cashier information regarding their
account. However, you may be interested in the way banks manage the details of their customers.
Institutions like banks and others utilize information systems for managing their customer data.
Organizations need an information system to run their business. To reap the maximum benefit
from IS businesses must utilize it to its fullest. It is important to fully utilize IS's capabilities to
reap the maximum benefit of it. IS aids in managing functions in an organisation.

There are many reasons an organization should have information systems.


Communication: IS helps in communication of an organisation and accomplishes the
information needs of an organization when it comes to defining its goals.

Records: The organizations must discover the fundamental cause of challenges and then take the
appropriate actions. This organisation requires activity records. These are essential for
monitoring and financial purposes.

Operations: The information system provides accurate and current information that lets you to
run your business more effectively.

Decisions: An organisation needs an information system to make better decisions.

We'll be discussing the managerial skills of the CEO of BPCL in this instance. Effective CEOs
make fast, precise decisions, without instinct. He collaborates with his supervisors to build a
computerized information network. Because most operations in the corporate world require
technology, a CEO must implement a computerized process. Computer-based information
systems have these features:

 It organizes and collects data, then manipulates it and also updates internal and external data.
 It is able to quickly and precisely process data using operations research, simulations, etc.
 It is possible to use it in various output formats.
 It gives instantaneous information in a flash.
 It provides structured information at all management levels.
 It helps with data storage retrieval, management, and storage.

CEOs make long-term decisions. Both expansion and growth are long-term objectives. Business
performance, client details, available resources, etc.

Primary information system

Information systems are accountable for the gathering data, processing, storage distribution and
management of information. These tasks can be fulfilled through the IT system (CBIS). Most
industries use IT today. Investment firms, airlines and banks as well as thrifts use computerised
information systems. Primary information systems include the following elements:
Hardware: The equipment of an organization includes input, output, processing, and storage.
Such devices include monitors, printers, CPUs, etc.

Software: Software can be defined as programs that allow hardware to process data. After
processing data, software is saved to a hard drive and provides valuable information.

Networks: A network connects computers, allowing them to exchange data and resources.

Data: Data is factual. They are fed into CBIS to process. CBIS is responsible to process these
data as well as providing valuable information to organizations.

Methods: CBIS Procedures explain how the components process data and produce the desired
output.

People: Utilize CBIS for a variety of tasks. Success in the Information System relies on the
individual.

Supporting data system

Operations supporting systems: OSS software was specifically developed for


telecommunications service businesses and used to assist process of network. This includes
maintaining network inventory, enabling components of the network to be set up in order to
provide services and handling faults. It will allow us to:

 Transaction Processing Systems gather, store, alter and retrieve the transactions of an
organisation. A transaction is a process that produces or alters data that is later stored within the
information system.

 Process control system monitors and regulates physical processes within an organisation. It
controls and monitors manufacturing processes according to user-defined limitations.

Management support systems: Management Support Systems support managerial decision-


making. MSS is a management system that uses computers. information system. MSS use
advanced computer technologies to solve problems. There are many of development techniques
for MSS, which are:
 Management Information System (MIS), a computer-based program which assists the
leadership of executives and decision-making is an application.

 Decision-making plays a significant and essential part in executing the activities of an


organisation effectively. The most important factor in a successful decision-making process is
choosing the best option. It's a method of problem solving to come up with a feasible solution.

 EIS is a kind of MIS which assists executives with making informed decisions. EIS allows
rapid access to relevant external and internal information. EIS is frequently described as a special
form of DSS. EIS is an enterprise-wide DSS that allows executives to analyze their performance
and identify potential opportunities and issues.

Conclusion

Chief executive officer is considered to be the most important officer in any BPCL. He reports to
the directors. Essential responsibilities include creating and implementing business guidelines
and distributing cash in addition to establishing and running a monitoring team. The CEOs have
to make decisions that influence the business's worth each day. CEOs need to make smart
decisions and demonstrate real problem-solving skills. They should be able to assess and spot
issues as well as come up with solutions. The CEO's position is unique within the company. The
CEO remains accountable for the actions of the team regardless of whether they know. The
CEO, particularly new executives, is permitted to make a few mistakes. The CEOs that have this
system believe they have a primary duty to establish, assess and evaluate long-term strategies
that may extend beyond the immediate future.

Ans 3a.

Introduction

The mobility technology can provide significant value to businesses. To achieve this, they must
first understand the potential and risks that mobility can bring. Businesses must assess the effect
that mobile technology has on their business and customers. Additionally to that, it is essential
that businesses determine various unique problems that a CIO might face when implementing
mobile technologies. In the last two decades, employees and clients of businesses have embraced
more mobile devices like tablets, smartphones as well as laptops.

Discussion

Over three billion people access the internet every day and the majority of them use mobile
devices. In terms of mobile technologies and their usage, companies across the globe have a high
acceptance rate. Businesses can benefit from the full benefits of mobility technology by
understanding its evolution and future.

Bring your device (BYOD)

In this technological world tablets, laptops, and mobile phones play a vital role in managing the
various tasks related to work. Today, employees use their personal laptops , laptops, or mobile
phones for work. The devices are used both for work and personal activities - such as checking
email, editing documents, reading reports, etc. Bring-your-own-device (BYOD) is the trend of
employees bringing their own devices to work. This trend has caused problems for managers.
These concerns included data access and security of company systems. Because users had a
range of devices and platforms, there was no uniformity of dimensions or formats available in
the creation of reports from systems.

Level BYOD

BYOD start: BYOD in the first level disclosure of BYOD policy has to be provided. If
employees will have their devices monitored it is crucial that the BYOD policy is clear about the
nature of the access (i.e. the extent of access i.e. which information is accessible to the company,
as well as the reason why access is required (i.e. what reason the business has access to that
data). why the company will have access to the information? This policy should clarify how the
company monitors private data. All employees should know BYOD guidelines to avoid
restrictions.
Work with BYOD Policy: At the second level, employees begin to work according to this
policy and can use their devices in different tasks for which they are authorized. Employers must
inform employees of any changes to the policy that could affect their rights or obligations. Staff
should immediately report suspected data breaches to reduce the risk.

Evaluation of BYOD policy: It's common for employees to leave an organization for various
reasons and then join another. But, if they do so it is mandatory to permanently delete any data
associated with the organization to ensure that they don't misuse. A valid BYOD policy should
be made mandatory.

Conclusion

BYOD is advantageous to staff members and also to the services. People who are brand new to
the organization will be pleasantly surprised not to have to carry multiple devices. People can
pick the device and software they are more comfortable with. BYOD allows employees to pick
their personal mobile phones.

Ans 3b.

Introduction

IT managers or the CIO of an organisation should explain the rationale behind adopting BYOD
policies before framing them. Businesses can effectively work with employees when they are
able to clearly state and justify the reasons for BYOD policies.

Discussion

BYOD policies must include information about the amount of stipends employees receive or any
current service contracts as well as reimbursement for roaming charges (if applicable) It is
essential to separate personal and work information when employees use their personal devices
to carry out official tasks. This is known as containerisation. The company should be able to
remove all data of employees in the event that the device is stolen or lost. Thus, the business
must establish an BYOD policy that is beneficial to both the business and the employees.

Pros and cons of BYOD

Pros

Savings on Costs: Providing gizmos to employees can significantly increase company


expenditures especially if the firm is huge. Many employees may not be familiar with the
gadgets of the company. Employees care for their devices and can save the business money by
not needing to purchase replacements.

Flexibility and comfort: Employees who have their own devices feel more comfortable and feel
less anxious. This will result in a greater efficiency and decrease in time to complete tasks.
Additionally, it will improve productivity. When employees are allowed to utilize their own
devices they will be able to access work documents wherever they are. BYOD policies offer
greater flexibility to employers, which ultimately improves employee satisfaction.

Cons

High Security Risk: Staff employees who use their devices for work are far more likely to
transport a object between their home or office. This can drastically increase the possibility of
theft or minor misalignment. Furthermore, experts will not influence how workers use their
devices when they leave the organization. If employees are using WiFi networks, unprotected
information can be exposed to cybercriminals. Youngsters may accidentally download harmful
software, putting their device as well as company information at risk.

Software issues & retrieval of data: In any company, different software are installed which are
helpful in performing certain tasks but if employees use their own device it could have software
issues. When an employee quits the company, it may be necessary to delete the company's
private information from his (her) device in order to avoid potential misuse of information.

Conclusion
When using it in a company, individuals must balance positive and negative elements. It could
be challenging to manage all devices and keep company information confidential in the event
that the company has a number of significant and varied obligations. The BYOD agreement
could also help reduce business expenses, regardless of whether the business is a start-up or a
limited business with no IT staff.

You might also like