StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information System Theories - Report Example

Cite this document
Summary
This report "Information System Theories" discusses various aspects of Information System Theory (IST), International Information System Theory (IIST), the strengths and weaknesses of both theories. Another theory of critical success factor is also part of the study presented…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Information System Theories
Read Text Preview

Extract of sample "Information System Theories"

?Part Information System Theories Introduction Information System Theory (IST) is a theory concerned with design and construction procedures ofthe products related to information technology. There is a need to capture the new ways of thinking to improve the information system theory (IST) concepts and methods. In this regard this study is taken seriously by researchers (Hart & Gregor, 2007). The traditional concept of Information system could be viewed as a part of other systems like social, physical, and mathematical systems. Later on information system is treated as a separate system and many researches and studies are worked out for it. This system has become the focused area of latest research (Bose and Lou, 2011). The understanding of societal, organizational, and human interaction with technology is good defined through the information system theory (IST) (Rose & Scheepersm, 2001). The basic understanding about information system is described in figure below. Social Theory Information system Information system practices Fig.1 Theme of Information System Theory This report surveyed the main ideas about information system theory (IST). Theory of critical success factor and international information system are elaborated in the second and third sections of this report. The second and third section of the report is also representing the general strengths and weaknesses of Theory of critical success factor and international information system theory (IIS) theory. The Forth section will discuss the ways in which these approaches could be used and evaluated. The Fifth section is about the summary and conclusion. 2. Theory of Critical Success Factor 2.1 Main Idea The core success factors according to Wong and Tein about the information system are efficient, effective with a high reliability. For the achievement of success factors key development practices are followed. From available literature list of critical success factors are identified by Wong and Tein, some of them are: the improved information system is required to maintain the change management culture, system integration, software development training and testing, performance monitoring and evaluation, information system management structure. From the study some factors are identified that become the reasons of failure. Some of the factors like risk management and change management are not properly focused. Mismanagement of information system, delay in shipments due to lack of coordination or no proper use of information system. All mentioned factors are critical and need to address seriously, which can bring the organization in a better position. These factors could be converted into critical success factors for organization. The concept of critical theory is about the ethical and moral queries. The work in this area enhances and improves the human condition (Lee and Baskerville, 2003). The contribution of Rockart (1982) in the area of information system theory (IST) is vital for the theory of critical success factors. The information system is all about computer related things, environment and applications. The Computer hardware, software, application area, and communication come under the theory of information system theory (IST). The changes in the field of information system are vital, as information technology is growing day by day and same is adopted in the information system. The progress in the information system is in the form of centralized processing of data and distributed processing of data. In centralized data processing method, all systems are located at same geographical location, while in the case of distributed data processing all systems are dispersed in the different geographical locations. The key areas of activity for information system theory require some critical success factors. These critical success factors may vary from company to company. The nature of organization also provides success factors for it. The set of management tools, techniques, and processing factors for getting the best performance in all critical areas has become the basis for critical success factors of the information system. The development of high quality and reliable services by the organization is one key success factor. The effort to improve the services is also highly important to achieve the success. The support is provided to end users, which results into a success factor of organization (Rockart, 1982). 2.2 Theory of Critical Success Factor Strengths & Weaknesses The theory of critical success factor also has some challenges and the success factors, which are stated as the strength. The serious concern towards the critical success factor results positively and enhances the productivity of the organization. The strength of this theory is based on the key performance features that help the organization to flourish in a healthy environment. The success factors are obviously achieved by facing the challenges and overcome the weaknesses. To achieve the good performance, goals are preset; the operations are performed to achieve the goal. The key performance factors provide point of reference to the organization. Security management is one major area of success factor for any organizations, as it faces many challenges. Risk based approaches are used for the security management in the organizations. Many critical success factors (CSFs) are addressed through a strategic planning process in the organizations CARALLI, R.A. (2004). The success factors were identified by Karen in the research related to best practices and critical success factors for a health information system. The critical factors described by Rockart (1979), revealed the success reasons of the organizations. He belongs to the early researchers of this concept. He introduced many success factors, which are really important for organizations. According to Rockart (1979) critical success factors are the methods and procedures, which attempt for the organization success. These success factors are identified from previous experiences and applied for future success. The deterministic factors were presented by Wanger (2006) regarding critical success factor. The way of success can improve the strength of organization and reduce the weaknesses. 3. International Information System Theory 3.1 Main Idea The challenges of more complex nature are proposed for a global information system. The researchers need to suggest possible solutions for global information systems issues (Earl & Feeny, 1996). The concept of globalization is emerged in the business world to improve the performance of an organization. The globalization also demands different concepts from the traditional businesses. Same is applied for information system theory (IST), the global business requirements are different from the traditional local business. That’s why there is a need of International Information System Theory (IIST). In International Information System Theory (IIST) and Information System Theory (IST) common factors exist, but many additional features are required for IIST. The objectives were different and this explored the International Information System Theory (IIST). In International Information System, external factors give great effect on the system, factors like government interactions and firm interactions. The objectives are high and a good range is developed for the International Information System. This system fulfils the requirements of business at the international level. The famous examples of information systems, which are internationally accessed by many users, are: airline reservation system, automated teller machines (ATMs) networks in multiple countries, payment clearance system in banks and financial institutions. All types of International Information System are different from each other in working, standards and theories. International Information System Theory (IIST) supports various types of businesses and their business activities. The business might be distributed within national boundaries and it would be spread across the boundaries, both systems require information system to handle the functionalities appropriately. This is best described through the example of banking sector. The banks of same title have branches in different location of the country, and the bank also has branches across the country. The Information System Theory (IST) supports many functions of business like sales, and manufacturing of products, etc. The nature of functions is different, so they need information system. The International Information System Theory (IIST) is applied where these organizations and businesses are located globally. The International Information System Theory (IIST) is also called distributed Information System. This supports the activities of business in diverse environment. The International Information System works for critical sectors like international banks, rental firms, and international franchises. The International Information System Theory (IIST) presents the issues related to the theory. This theory defines the single set of business activities, which are being worked in different countries. The applicability of International Information System could not be defined through a single term; it is a vast area where it works (Lehmann, 2010) Fig.2 Categorization of firms by Environmental Diversity and Business The identification of major factors in the International Information System, plan techniques to improve international business, the support of International Information System are available in literature. The issues and possible solutions for International Information System are presented, and also identification of challenges and strategies are planned for International Information System. For example, the customer order is taken in different countries and need to deliver but the system is not in a state to share data among countries. As a solution, it is suggested that a single corporate based database is created and all countries access the same system to share the data. This system follows the same standards in all areas. The coordination is required among organizations, which are merged for specific purpose through the International Information System (IIS). The worldwide synchronized management is the essential feature of International Information System (IIS). The direction of business is related to the environment of business in which it is operated (Hall, 2006). Fig.3 Architecture of International Information System (IIS) The general cultural factors affect the International Information System (IIS), social standards, political constancy, globally distributed knowledge based system. Some other specific factors related to business for International Information System (IIS) are: global market, production, coordination. The standards are different in countries, like the telecommunication standards are different in various countries and the standards of Electronic Data Interchange (EDI) also vary from country to country. These are the challenges faced by the International Information System (IIS) (Peter, 2005) 3.2 The Strengths & Weaknesses of the Theory of Information System The strengths of International Information System Theory (IIST) are the success factors and these factors include different types. Some important challenges of International Information System Theory (IIST) are: management challenges, cost component for software development, cultural differences in international system, technological based challenges (Hall, 2006). The benefits taken from the application of Information system (IS) in various fields are considered as strengths; arising issues and challenges occurred are considered as weaknesses of the Information System (IS). There is a difference in strengths and weaknesses of Information System Theory (IST) and International System Theory. In the study by Hall (2006) many issues and weaknesses are highlighted and possible solutions are also provided. To overcome the connectivity issues globally, some standards are followed which are unique in nature throughout the globe. The concept of virtual networks and intranet and extranet as applied for global communication. These technical standards support the International Information System Theory (IIST) to reduce the weaknesses and improve the strength of an international business organization. The issues focused by Peter (2005) are related to business drivers, which are concerns about a global market, production, operations, coordination, workforce, and global economies of scale. The solutions proposed by Peter are about the creation of international private networks for business. The businesses globally work and use international Information System, and face more challenges than local business, because international business faces the IIS issues along with the core business related issues. 4. Useful Approaches for Information System Theory (IST) As the approaches for Information System Theory (IST) are concerned, the communication among individuals in an organization is one approach. The interaction of people in an organization with other organizations and other fellows is evaluated through the information system approaches. The fact of “act now and plan later” is followed in the article by Weick (1969). The theoretical approaches of information system are presented and implemented. The useful approaches for information system theory provide a large number of benefits. The system is investigated extensively and this approach is useful to improve the performance of information system. The information system is taken as mathematical model (Pawalk, 1990). The theory of information system (IS) needs improvement and it is emerging in every field of life. The approach is built for information system (IS) and known as Framework of Information Systems Concepts (FRISCO). This approach provides solid base and information system as presented pure technical artifact. The framework approach is to promote the conceptual suitability. The consequences of this FRISCO approach are pointed out in the paper. This shows the effectiveness of the approach. This approach is helpful in understanding the basic concepts of information system more appropriately. In the age of internet the concept of virtualization is somehow achieved through such approaches. This framework clarified many aspects of information system theory (IST). Like the conception concept is explained through the action and actor. The action and actor are explained as things and things are again described through the conception (Hesse, 1999). The proposed framework as FRISCO is the step towards the progress in the area of information system. This approach opened many ways for further research for practitioners. The work by Hesse is appraised as good effort in the research field of information system theory (IST), still there is a need to fulfil the gap, which is open for further work. The approach to merge and manage the changes added by users and organization in information system theory (IST) are new trends to a complex task. This complexity of change management is magnified and this issue is simplified by using appropriate methods and techniques. The conceptual analysis and reviews are made for the system and these changes are merged into the existing information system. A different source of complexity is considered to overcome the issues of changes. The emergent nature of information system development is adaptive in terms of additional changes (Benbya & Mckelvey, 2006). 5. Summary and Conclusion The study has been summarized by various aspects of Information System Theory (IST), International Information System Theory (IIST), the strengths and weaknesses of both of theories. Another theory of critical success factor is also part of study presented. The main ideas about each of theory are elaborated, a good understanding about the Information System Theory (IIS) and international Information System Theory (IIST) are focused. The factors for both of the theories are identified from the work done by practitioners previously. The literature shows that Information System is not considered seriously as area of research previously. The important factors of Information System explored the new ways of success to the business world and other organizations. The further research is done in this area and now it is internationally used in the globe as international Information System (IIS). The useful concepts and approaches are discussed from available literature. Further research work is needed in this area. The information system as locally and internationally is beneficial for organizations. The banking sector is fully dependent upon the information systems. The information system increases the reliability, performance and improvement in the work. Information System Theory (IIS) is the theory of understanding the information systems used in our daily life and human interactions is close to them. Like the usage of ATM (Automated Teller Machine). International Information System Theory (IIST) shares features with Information System Theory along with additional features of international business. The critical success factors are explained in the paper. The success factors related to the Information System Theory are mainly focused in the work. The useful approaches for Information System Theory (IST) are presented in the paper. 6. References BOSE, R. & LUO, X. (2011) Integrative framework for assessing firms' potential to undertake Green IT initiatives via virtualization - A theoretical perspective. The Journal of Strategic Information Systems, 20, 38-54. CARALLI, R.A. (2004) The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management. TECHNICAL REPORT CMU/SEI-2004-TR-010 ESC-TR- 2004-010. EARL, M. J & FEENY, D. F. (1996) Information systems in global business: Evidence from European multinationals. In: Thomas, N., O’Neal, D., Kelly, J. (eds.), Strategic Renaissance and Business Transformation. John Wiley & Sons, Chichester, 183–210. HALL, P. (2006) Managing International Information Systems. HART, D.N. & GREGOR, S.D. (2007) Information Systems Foundations: Theory, Representation and Reality. National Library of Australia. HESSE, W. (1999) Towards a Theory of Information Systems: The FRISCO Approach, FB Mathematik und Informatik, Universitat Marburg, Hans Meerwein-Str. D-35032 Marburg/Lahn, Germany & Alex Verrijn-Stuart, University of Leiden, P.O. Box 9512, NL-2300 RA, The Netherlands KARIN, A., ULF, M. & FREDRIK, S. Analyzing Best Practice And Critical Success Factors In A Health Information System Case – Are There Any Shortcuts To Successful It Implementation? Linkoping University, Department of Management and Engineering, SE-581 83 Linkoping, Sweden, LEE, A. S. & BASKERVILLE, R. L. (2003) Generalizing Generalizability in Information Systems Research. Information Systems Research (14:3), 2003, pp. 221-243. LEHMANN, H. (2010) The Dynamics of International Information Systems. Integrated Series in Information Systems 23, DOI 10.1007/978-1-4419-5750-4_© Springer Science & Business Media, LLC 2010. PETER, L. (2005) Managing International Information Systems. PAWLAK , K. (1980) Information Systems Theoretical Foundations. Institute of Computer Science, Polish Academy of Sciences. P.O. Box 22.00401 Warsaw PKiN. Poland (Received 14 March 1980: in revised form 9 December 1980) ROCKART, J. F. (1979). Chief executives define their own data needs. Harvard Business Review, 57(2), 81–93. ROSE, J. & SCHEEPERSM, R. (2001) Structuration Theory and Information System Development - Frameworks for Practice. Global Co-Operation In The New Millennium The 9th European Conference On Information Systems Bled, Slovenia, June 27-29, 200. ROCKART, J.F. (1982) The Changing Role of the Information Systems Executive: A Critical Success Factors Perspective. Center for Information Systems Research Sloan School of Management Massachusetts Institute of Technology WONG, B. & TEIN, D. Critical Success Factors for ERP Projects WAGNER, E., SCOTT, S. AND GALLIERS, R. (2006) The creation of 'best practice' software: Myth, reality and ethics. Information and Organization, 16(3), 251-275. Weick, K. E. (1969) The social psychology of organizing. Reading, MA: Addison-Wesley. BENBYA, H. & MCKELVEY, B. (2006) Toward a complexity theory of information systems development. UCLA Anderson School of Management, Los Angeles, California, USA. Part 2: Soft System Methodology Case Study Report The House of Commons Report ‘Government & IT – a recipe for rip-offs’ 1. Introduction Soft System Methodology (SSM) is the technique to deal with complex organizational situation; the high social and political activity component is involved in such situations. The types of soft problems are like: how good is the system? How to prepare the disaster plan? The soft issues are the problems that absorb the cultural, social, and psychological elements (Checkland, 1981). A new approach about Government and IT “a recipe for rip-offs” is studied and some major aspects of the approach are presented in this paper. Some queries are covered in the paper. The article is about the Government & IT issues. The government policies are produced by the use of Information Technology (IT) techniques. The need of updated technology in Government sector is in high demand. The innovation in the technologies of Information Technology (IT) should add for the government systems (Twelfth, 2012). This report surveyed the main ideas about Soft System Methodology (SSM) and an approach of Government and IT. The answers related to the approach are also presented. The second section discusses about the Soft System Methodology (SSM). In the third section Government and IT “a recipe for rip-offs is elaborated. The forth section is about the summary and conclusion. 2. Soft System Methodology 2.1 Main Idea The concept of Soft System Methodology (SSM) deals with the complex tasks. The critical and complex natured tasks are solved and handled through the Soft System Methodology (SSM). The Soft System Methodology (SSM) is consists upon seven parts. A problem is passed through all the part of Soft System Methodology (SSM). These parts are: Situation considered problematic, problem situation expressed, root definition of relevant systems, conceptual models of systems described in root definitions, comparison of models and real world, changes: systemically desirable, culturally feasible, and action to improve the problem situation. 2.1.1 Situation Considered Problematic The time when problem is identified and identified by whom is come under the definition of situation considered problematic. The situation when a phenomenon is considered as problem and with time the problem related to the phenomena is observed by the people. In organization employees or managers initially observe the problem and the identified problem is further investigated for solution. The analyst is called for the purpose of getting the solution of concerned problem. 2.1.2 Problem Situation Expressed The called analyst collects possible solutions for the concerned issue and sorts them. As a next step of analyst for the problem, problem situation is expressed into Rich Picture. The Rich Picture describes the problem in a pictorial form. The pictures can elaborate the problem situation in more depth and represent structures, process; the organization climate is viewed from the pictures. The better understanding is made through the pictorial form. This process of Rich Pictures helps to solve problem. Fig.1 An example of Rich Picture 2.1.3 Root Definition of Relevant Systems In the step of root definition one process is taken from the Rich Picture and a detailed investigation is made on it. It will help to get the root definition of the system. It helps in addressing the concerned issue. A problem is viewed from different prospective in order to identify the selected process. The CATWOE analysis is used for the identification of organization factors, Customers, Actor, Transformation process, Weltanschauung (World Wide), Owner, Environmental Constraints. 2.1.4 Conceptual Models of Systems The conceptual model is the model that shows the minimum set of activities that are required to represent the root definition of the concerned issue. The concept of system thinking is applied in the model development. The activities of system are monitored and control actions are taken. 2.1.5 Comparison of Models and Real World After making the conceptual model of the concerned problem, the features are compared with actual problem faced in reality. This comparison could perform in different ways. Taking conceptual model as base model for answering the queries is the first method of comparison. The comparison could be made with history for future predictions. The general comparison is made for model and real world situation of the concerned problem. 2.1.6 Culturally Feasible and Desirable Changes The comparison of conceptual models and reality, some desired changes are made. These changes must follow some logic, and should be culturally feasible. The common changes made are of three types: Structural changes, Procedural changes, and the changes in attitude. These changes are made for the achievement of initial solution of the problem. 2.1.7 Action to Improve the Problem Situation An action plan is made for the improvement of problem situation. This action plan is implemented to get the solution of problem. 2.2 The Strengths & Weaknesses of Soft system Methodoly (SSM) The benefits and limitation from the Soft System Methodology (SSM) are discussed in the paper. The Soft System Methodology (SSM) provides a well defined structure for the complex organizational problems. The provided solution could be made more technical after some work on it. For messy problems, the specific techniques and methods are provided by Soft System Methodology (SSM) and special tools are available. As the limitation is concerned for Soft System Methodology (SSM) it is the process of adaption to the overall issue. The narrow scope for investigation is made for the situation problem. There are some difficulties involved in the rich pictures concept. The pictorial method is easy to understand the concerned problem but it contains some internal factors that are faced by applying the method. The interpretation is made for the world could make in the loose way. Although Soft System Methodology (SSM) has some limitation but along with these issues it is the most popular technique to be used and applied for the solution of complex organizational problem. This method is widely used in practical application. The possible solutions for critical problems are made by applying the Soft System Methodology (SSM). In information system (IS) for the achievement of some critical success factors this methodology could be applied (Losseva, 2007) The problematic situations are handled by the use of Soft System Methodology (SSM). The complex organizational issues are solved by applying the features introduced by SSM. Some problem case is taken and seven step process of Soft System Methodology (SSM) is applied on it. The critical success factors could be achieved by getting the solution of critical problem. The proposed processes are applicable on some other fields by relating the concepts. (Williams, 2005) 3 The House of Commons Report ‘Government & IT – a recipe for rip-offs’ 3.1 Main Idea The research made on the topic of The House of Commons Report ‘Government & IT – a recipe for rip-offs’ is an interesting article, it provides the understanding about the governmental policies and use of Information Technology (IT). The Government IT does not contain a good background in the past. In last ten years great attempts were made for the improvement in this sector. Till date the progress is going on in this field and many achievements are made. More innovations are required for government IT, in many departments new technologies are added for getting the best results. The use of Information Technology techniques and methods are highly helpful for the betterment of Government sector. The integration of technology in policy making is greatly in use. The essential demands of the Government are to have the right skills, knowledge, and in house capacity to distribute the changes. There is need to understand hat how technology can help and improve the working of public services. Some recommendations are provided in the article. The recommendations are: Lack of information, the concept of Benchmarking, integration of large systems, integration of large systems, integration of Information Technology (IT), polices regarding security and privacy, skills are spread, leadership policies, release of public data, open standards, ownership of persona data, the engagement of users in the process of service design, and the online delivery process of Government services (Twelfth, 2011) 3.1) Judicious uses of SSM have helped in regard to some of the issues raised in the report? According to the described issues raised about the Government & Information Technology are discussed with the methods available in the report. For the concerned issues of Government & Information Technology (IT) could be possibly solved by the use of Information System Theory (IST). The Information System can effectively help the issues raised in Government & IT. Another useful approach is presented in the report is about the Soft System Methodology (SSM) that can improve the problem solving situation and can also provide possible solutions for complex problems (Twelfth, 2011) The concerned query is about the judicious system. The judicious issues could handle by applying the procedure of Soft System Methodology (SSM). The complex problem situation is processed through the parameters of Soft System Methodology (SSM). The Soft System Methodology (SSM) procedures are helpful in organizational issues, the judicious concerns should relate to the concepts proposed for Soft System Methodology (SSM). The possible solution could be achieved. The government initiative regarding the criminal statistics website released for public. This will help the judicious system to work on particular case. The performance is improved by using such methodology (Barden and Darke 2000). 3.2) Apply one or more of the theories covered in the earlier section, explaining how this/these might help in developing an understanding of the context; The proposed theories of the report are about Information System Theory (IST) and International Information System Theory, Soft System Methodology. The Soft System Methodology (SSM) and information System Theory (IST) both are helpful for the issues raised in the article of Government & IT. The lack of information in the government sector regarding Information Technology should be improved through the Information System Theory. The government must have the updated and healthy Information System (IS). In many government sectors Information Technology is implementing and this technology is changed after a while. This issue is resolved only by applying the agile and iterative method for the updating process of technologies. The public services provided by Government should improve and online facility should provide to the public. This will help in resolving many issues of people through online system and this online system is a part of Information System worked for Government sectors. (Twelfth, 2011) The philosophy of Soft system Methodology (SSM) claimed by checkland’s about thinking process of system is based upon two things that are: emergence and hierarchy' and 'communication and control. Emergence and hierarchy shows the general model of the organization. The communication and control are the next parameters that are focused in the organization (University of Calgary, 2010). The methodology proposed by Soft System Methodology (SSM) is required for Information System (IS) when it is in development stage. It may also be used for the solution of further complexities. The use of Soft system Methodology (SSM) in the construction process of Information System (IS) is done by the transformation processes suggested by Checkland’s 5Es method. The activities from are transformed the conceptual models of Soft System Methodology (SSM) to the models flow of information system (Simonsen, 1994). The social and political usage of Soft system Methodology is also expressed by Peter Checkland. It was considered as a modelling tool initially, but later on after some enhancement in it used as the development tool. The model and methods proposed by Soft System Methodology (SSM) are not used in real world but can be used for making rules and principles for thinking about the real world. The Soft System Methodology (SSM) is worked as action research models. The problem is initially identified in the situation where it is occurred. In some cases much attention is required while the data collection process of the concerned issue (Lester, 2008). 3.3) Explain how Checkland’s 5Es might be used in evaluating the context and any proposed development. In the previous approaches proposed by Information System Theory (IST) are more concentrate on the quality of controlled development, number of software errors, usability of software, and the productivity of developer. The usage view of the quality on Information System (IS) is also observed and monitored. The use on software in the origination context is observed. The need of adoption of new technologies in the Information System is highly required (12 Manage, 2013) The Soft System Methodology (SSM) proposed a framework for providing help to Information System (IT) working. For the assessment of Information System (IS) quality the Checkland’s 5Es are used. In the proposed development of Soft System Methodology (SSM) the evaluation is done through the Chackland’s 5Es. The 5Es are: Efficacy, Efficiency, Elegance, Effectiveness, and Ethicality. The concerned aspects of the quality of Information System (IS) are measured through the 5Es (Vidgen, Harper, and Wood, 1993). According to the work done by Vidgen (1993), a modified form of Soft System Methodology (SSM) is used for the analysis and the emphasis is made on the aspects of quality of Information System (IS). From the logic based perspective the 5Es are used for evaluating the quality of Information System (IS). Efficacy: The transformation work is done through the efficacy process and it actually produces the output. Efficiency: It is the process of transformation that works with the minimum use of resources. Elegance: It is the transformation that is well designed. It is used when quality of system is accessed. Effectiveness: The transformation process applied for long term aims of the system. The efficiency is more necessary for the system than effectiveness. Ethicality: It is the transformation type used when value judgment is needed for the system. The judgment about good or bad for the system is evaluated. The quality of information system requires the deliberation of the artefacts of software in the organizational context. The principle features of Soft System Methodology (SSM) provide base for defining the quality of Information System (IS) (Vidgen, Harper, and Wood, 1993). 4 Summary & Conclusion The work done in the paper is summarized as the description of Soft System Methodology (SSM) and the discussion is made on the article The House of Commons Report ‘Government & IT – a recipe for rip-offs’. The article is about the features of Information Technology and the use of IT in Government sectors. The public services provided by government through the use of technologies of Information Technology (IT). The work contains the queries are answered that are related to the judicious use of soft system methodology (SSM). The complex problems of judicious system are process through the features defined by Soft System Methodology (SSM). The discussed theories regarding Information System Theory (IST), International Information System Theory (IIST) are elaborated for the development of the system. The features of the theories could apply for purposely achievement for any rose issued. The Soft System Methodology (SSM) is another useful method for solving complex tasks in organizational context. The required procedures of Soft system Methodology are discussed in detail. The Checkland’s 5Es are viewed in detailed that are used for the improvement of quality purpose of the Soft System Methodology (SSM). These 5Es are Efficacy, Efficiency, Elegance, Effectiveness, and Ethicality. These 5Es are used for the development process of the system. This will make the system appropriate due to applying the efficiency factors. After the application of such strong application factors system must approach to high level design of problem solution. 5 References Barden , A., and Darke, P. (2000). A Comperison SSM with Organizational Learning Model available from http://ftp.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-72/011%20Barnden%20SSM.pdf accessed on 08/05/2013. CHECKLAND, P. (1981) Soft System Methodology. Published in 1981. LESTER, S. (2008) Soft systems methodology. John Wiley & Sons LOSSEVA, E. (2007) Soft Systems Methodology SSM. November 12, 2007. University of Calgary (2010) Report on SSM, Available from http://sern.ucalgary.ca/courses/seng/613/F97/grp4/ssmfinal.html Accessed on 06/05/2013. SIMONSEN, J. (1994). Soft Systems Methodology. Computer Science/Roskilde University, Spring 1994. TWELFTH. (2011) Government and IT —“a recipe for rip-offs”: time for a new approach. Ordered by the House of Commons to be printed 18 July 2011. VIDGEN, R., HARPER, T.W., and WOOD, R. (1993) Soft System Approaches to Information System Quality. Scandinavian Journal of Information System. WARWICK, J. (2008) A Case Study Using Soft Systems Methodology in the Evolution of a Mathematics Module. London South Bank University, UK. WILLIAMS, B. (2005) Soft systems methodology. The Kellogg Foundation 12 Manage (2013). Soft System Methodology, Available from http://www.12manage.com/methods_checkland_soft_systems_methodology.html Accessed on 05/05/2013 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Systems Theory Essay Example | Topics and Well Written Essays - 5000 words”, n.d.)
Information Systems Theory Essay Example | Topics and Well Written Essays - 5000 words. Retrieved from https://studentshare.org/information-technology/1476777-information-systems-theory
(Information Systems Theory Essay Example | Topics and Well Written Essays - 5000 Words)
Information Systems Theory Essay Example | Topics and Well Written Essays - 5000 Words. https://studentshare.org/information-technology/1476777-information-systems-theory.
“Information Systems Theory Essay Example | Topics and Well Written Essays - 5000 Words”, n.d. https://studentshare.org/information-technology/1476777-information-systems-theory.
  • Cited: 1 times

CHECK THESE SAMPLES OF Information System Theories

Strategic Management and Role of Information Systems in Achieving Strategic Advantages

STRATEGIC MANAGEMENT AND ROLE OF INFORMATION SYSTEMS IN ACHIEVING STRATEGIES ADVANTAGES Strategic management and role of information systems in achieving strategies advantages Author Author Affiliation Date Table of Contents Table of Contents 2 Introduction 3 Strategic management: A detailed overview 4 How Organizations use Strategic Management 5 Strategic Management Theories 7 Information Systems and Strategic Management 8 information system: Basic Overview 8 Role of information system in achieving Strategic Advantages 11 Advantages of using information systems 13 Challenges in implementing Information Systems 15 Bridging the Gap 15 Customized Tools 15 Conclusion 16 References 17 Introductio… n Strategic management is the art of planning business processes at the maximum possible level....
15 Pages (3750 words) Essay

Information Systems Theories

First, the information view that HM Government has of it's IT systems in general must be dramatically improved.... The fair and cost-effective governance of government IT systems on behalf of the taxpayer dictates that the various Ministries and Executive Agencies of Her Majesty's Government and their responsible administrators be thoroughly aware of both the strategic and day-to-day operations of HM Government's IT systems....
21 Pages (5250 words) Essay

Theories of the Policy Process

Although Bentley was not concerned with constructing specific theories on group activity, his research was the first to suggest that groups influenced the policy process.... imilar works that examined the role of interest groups, or pressure groups as they were commonly known during this period, followed with each work examining the importance of interest groups in policymaking and reconciling that notion with theories of government and democracy (Griffith, 1939; Herring, 1929; Odegard, 1928; Schattschneider, 193 5; see also Cleveland, 19 13; Crawford, 1939; Croly, 19 15; Pollock, 1927; Zeller, 1937)....
15 Pages (3750 words) Essay

IS theories, are they emerged in IS disciplines or adopted from other disciplines

Such systems are tasked with various roles within Information System Theories By Impact of Information Systems Being a discipline concerned with the interaction of people, organizations and information systems, information systems strives to enhance organizational goals.... Academic scholars can also make use of Information System Theories to understand and gain deep appreciation for research conducted in the past.... nformation system theories have also been helpful to IT and business professionals in analyzing and understanding information systems....
2 Pages (500 words) Article

Postcolonial Theorists Concerns and Marxists Thinking on International Relations

hellip; Postcolonial theories entail featuring approaches of intellectual discourse that explain, respond and analyze the cultural implications of imperialism and colonialism; to the human aspects of controlling the country and implementing settlements for economic exploitation for the land and its native populace (Sadiki 2004).... Postcolonial theories study political knowledge, through understanding the functional relations of political and social power that ensures colonialism and neocolonialism....
7 Pages (1750 words) Essay

Theories of Rationality Applied to Information Systems Development

theories of Rationality Applied to Information Systems DevelopmentTable of ContentsTopicPage #Introduction------3Objective------4Scope------4Method of Research------4Data Section------5The Concept of Rationality------5-7Relationship of Rationality theories of Rationality Applied to Information Systems DevelopmentTable of ContentsTopicPage #Introduction------3Objective------4Scope------4Method of Research------4Data Section------5The Concept of Rationality------5-7Relationship of Rationality and Information Systems Development Methodologies------8-9Effectiveness and Limitations of New Information Systems Development Approach------9-11The Agile Development Methodology------11-12 How agile is Agile Development------13-14Extreme Programming------14-165....
20 Pages (5000 words) Assignment

Motor Development Theories

This report "Motor Development theories" demonstrates motor skills that infants should learn as they grow.... hellip; The way motor skills develop in children is well explained by the various motor development theories.... There are three major motor development theories, including maturation, information processing, and dynamic theories (Slater 2010, p.... lthough the three major motor development theories are important in explaining how motor skills develop in children, this paper only tackles one of the theories: the dynamic systems model....
9 Pages (2250 words) Report

Sociological Theories of Globalization

Two theories, which examine the globalization process comprising the world-system theory and the network society, are explored in the paper "Sociological theories of Globalization".... hellip; Scholars examine different sociological phenomena through theories to explain the influence of society on individuals and vice versa (Giddens, Duneier & Appelbaum 2003, pg.... The scholars use sociological theories to explain the way society influences people, and at the same time describe and explain social phenomena....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us