StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Systems Management - Essay Example

Cite this document
Summary
This essay "Computer Systems Management" is about the benefits are speed and accuracy, which the advantage is that with Electronic transmissions the information involved is exchanged elec¬tronically instead of on pieces of paper…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Computer Systems Management
Read Text Preview

Extract of sample "Computer Systems Management"

Computer Systems Management Question 2. 2a). The emergence of the Internet has changed the understanding of a value chain model proposed by M. Porterin 1985. In general, this model views the firm as "a series or "chain" of basic activities that add a margin of value to a firm's products or services" (Lucas, 1994). Using the Internet and virtual space a firm can faster and more effectively operate on the market to gain its competitive position. The Internet proposes specific activities which help to create new products and services (like on-line shopping) and helps to increase market penetration, providing direct access to customers and suppliers at the same time, but requires less cost for operations. The Internet and digital firms have changed the channels of communication allowing to save time and money. The Internet and digital firms have a great influence on competitive forces changing the structure of the industry within which they operate. Information technology can aid a business in using these competitive forces to its advantage. In this way information technology can be seen as a strategic competitive weapon. 2b) Computer Systems Management allows government agencies to deal with crime and terrorism effectively and give a fast respond. Electronic transmissions allow to communicate with the minimum of human intervention. The advantage is that with Electronic transmissions the information involved are exchanged electronically instead of on pieces of paper. The benefits are speed and accuracy. In addition, confidentiality can be improved because data are sent out accurately and on time. Automatic acknowledgement is made so that there should no longer be the problem of information that in the past was mislaid. 2c) By creating electronic marketplaces and linking suppliers, buyers, and sellers, the Internet and other networking technologies are improving links between them. "Electronic commerce is the process of buying and selling goods electronically by consumers and from company to company through computerized business transactions" (Lucas, 1994). By replacing paper-based work with electronic devices, electronic commerce can accelerate ordering, delivery, and payment for goods and services while reducing companies' operating and inventory. The Internet supported the emergence of B2B model of transactions. The Internet helps to increase productivity and competitive advantage when suppliers and retailers can be connected with each other and are able to connect machines, databases, departments, etc. 2d) WWW marked a significant change in the legal responsibilities of data users holding and personal information on computer systems. Today, digital personal data is also protected. Data subjects have legal rights, including access to their personal data. Privacy concerns relate not only to interception and subsequent misuse of credit card or other personal data on the Internet but also extend to government use of information held on computers about individuals. One of the inherent problems with privacy-protecting technology is that it is very difficult to know whether or not the technology is working properly, and is privacy violated or not. The gap in public trust is going to be one of the biggest problems facing the wiring up of public service delivery, and strong FOI and data protection laws are the absolute minimum requirements to bridge the divide. It is harder, and frequently more expensive, to build devices and construct services that protect people's privacy than to destroy it. Question 3 3a) The recent software platforms development are caused by the aim to produce systems that meet user requirements. There are many systems that are technically efficient but do not serve the needs of the users and so are underused or misused. The recent development of fourth-generation languages is an alternative to the traditional linear approach to programming through specification, coding, testing and maintenance stages. Internet technology and Java software can be used to create an open system environment. For instance, Java is used to "produce machine-independent portable software which can be safely downloaded over the Internet and run immediately on the user's computer without the fear of the introduction of viruses" (McNurlin, Sprague, 1997). So, structured high-level languages are to be viewed within the context of a structured methodology of systems analysis and design. The recent innovations like Linux, open-source software have been designed in conjunction with object-oriented analysis and design methods to lead to a richer and more natural means of capturing data modelling and processing requirements. Another example is the UNIX operating system which is aimed to support open systems as it can operate on many different kinds of computer hardware. 3b) "Data warehouses is a database with reporting and query tools, that stores data extracted from various operational systems and consolidated for management reporting gand analysis" (Peppard, 1993). The data originates in many core operational systems and are copied into the data warehouse database as often as needed. The data are standardized and consolidated so that they can be used across the enterprise for management analysis and decision-making. The benefit is that data warehouses not only offer improved information, but they make it easy for decision makers to obtain it. They even include the ability to model and remodel-the data. These systems also enable decision makers to access data as often as they need without affecting the processing performance of the operational systems. Question 4 4a) "A local area network encompasses a limited distance, usually one building or several buildings in close proximity" (Lucas, 1994). (Appendix 1). The peculiarities of the system is that it requires its own communications channels. LAN consists of cabling (twisted wire, coaxial, or fiber-optic cable) or wireless technology that links individual computer devices, network interface cards (which are special adapters serving as interfaces to the cable), and software to control LAN activities. The LAN interface card specifies the data transmission rate, the size of message units, the addressing information attached to each message, and network topology (Ethernet utilizes a bus topology, for example). LANs allow organizations to share expensive hardware and software. For instance, several PCs can share the same printer with the help of LAN. LANs can promote productivity because users are no longer dependent on a centralized computer system. Today, there are many new applications (electronic mail, graphics, video teleconferencing, and on-line applications) requiring high-capacity networks. 4b) A number of different ways exist to organize telecommunications components to form a network and hence provide multiple ways of classifying networks. The star network consists of a central host computer connected to a number of smaller computers or terminals and is used primarily in mainframe systems. This topology is useful for applications in which some processing must be centralized and some can be performed locally. The bus network links a number of computers by a single circuit made of twisted wire, coaxial cable, or fiber-optic cable. All the signals are broadcast in both directions to the entire network, with special software to identify which components receive each message (there is no central host computer to control the network). Ring network does not rely on a central host computer and will not necessarily break down if one of the component computers malfunctions. Each computer in the network can communicate directly with any other computer, and each processes its own applications independently. However, in ring topology, the connecting wire, cable, or optical fiber forms a closed loop. Data are passed along the ring from one computer to another and always flow in one direction (Appendix 2). Networks may be classified by geographic scope into local networks and wide area networks. Local networks consist of private branch exchanges and local area networks. A private branch exchange is a special-purpose computer designed for handling and switching office telephone calls at a company site. Wide area networks span broad geographical distances, ranging from several miles to across entire continents. Value-added networks are private, multipath, data-only, third-party-managed networks that can provide economies in the cost of service and in network management because they are used by multiple organizations. The value-added network is set up by a firm that is in charge of managing the network. 4c) For suppliers, building longer-term customer relationships with the help of m-commerce means maintaining a dynamic knowledge of customers' requirements, preferences and expectations. While corner shop managers may be able to retain customer likes and dislikes in their heads, larger organizations need customer relationship management systems which manage data throughout the customer life-cycle, from initial contact, through information exchange and sales, to delivery and post-sales service. Advertising products and services with the help of m-commerce is relatively easy. M-commerce helps to gather vital customer information, obtain customer feedback, utilize existing knowledge about the customer and exploit the interactive nature, to add value though product configuration. Mobile Commerce can successfully sell propositions where the content owners have failed with a direct approach. M-commerce is very effective tool in the process of customers' acquisition and retention. Question 5. 5a) Wireless technology increases competition. For example, Hospitals can compete for business from fund holders and health authorities, Local Authorities must implement Compulsory Competitive Tendering for an ever-increasing proportion of the services they provide, Government Agencies have to be competitive in pricing and cost control in order to meet targets and so on. The faster pace of society and business is apparent in many ways. New wireless technology of all types helps to make shorter life cycles and as a result allows more goods and services to be soled. With the help of wireless technology existing work patterns and practices are updated more continuously to keep pace. Paging was useful for communicating with mobile workers such as repair crews. Personal digital assistants are small, pen-based, handheld computers capable of entirely digital communications transmission. They have built-in wireless telecommunications capabilities as well as work organization software. It can function as a pager and can transmit e-mail, faxes, documents for printing, and data to other computers. Mobile phones allow people to be out of office but have a connection with the system. 5b) Wireless telecommunications holds great potential for the expansion of communication worldwide, the technology does have limitations. Wireless transmission is highly error prone because it is susceptible to many kinds of environmental disturbance, from magnetic interference from the sun to automobile ignition emissions. Bandwidth and energy supply in wireless devices require careful management from both hardware and software standpoints. Security and privacy will be more difficult to maintain because wireless transmission can be easily intercepted. Wireless networks require complex error-correcting capabilities that result in repeated transmission of message segments, slowing actual transmission throughput speeds. Software and hardware technology advances and agreement on standards are all needed before transmission between various wireless networks becomes seamless. Question 6. 6a) In his book "Competitive Advantage" Porter identifies five forces that drive competition within an industry (Appendix 3): (1) the threat of entry by new competitors; (2) the intensity of rivalry among existing competitors; (3) pressure from substitute products; (4) the bargaining power of buyers; the bargaining power of suppliers. The threat of entry to an industry by new competitors depends up the 'height' of a number of entry barriers. As a rule of thumb, lower the entry barriers to an industry are, the more competitors i.e. be players in the industry. Barriers to entry can take a number forms. The size of the investment required by a business wishing to enter in industry will be an important determinant of the extent new entrants. The higher the investment required, the less the threat from new entrants. The lower the required investment, the greater the threat. If the players in an industry produce differentiated products a customers are brand loyal, then potential new entrants will encounter resistance in trying to enter the industry. Brand loyalty will also be important factor in increasing the costs for customers of switching the products of new competitors. If existing competitors are already obtaining substantial economies of scale, this will give them an advantage over new competitors who will not be able to match their lower unit costs of production. New competitors may find it difficult to gain access to delivering service, which will make it difficult to provide their service to customers or obtain the inputs required or find markets for their outputs. If existing competitors choose to resist strongly, it will make it difficult for new organizations to enter the industry. For example, if existing businesses are obtaining economies of scale, it will be possible for them to undercut the prices of new entrants because of their cost advantage. In some cases, existing competitors may make price cuts or increase marketing expenditure specifically to deter new entrants. A substitute can be regarded as something that meets the same needs as the service of the industry. The extent of the threat from a particular substitute will depend upon the following two factors. Close substitutes whose performance is comparable to the industry's service and whose price is similar will be a serious threat to an industry. The more indirect the substitute, the less likely will the price and performance be comparable. 6b) Knowledge management software helps to connect people in global organization who operate in a distance, and has no opportunity to use printed matters or other sources. Knowledge management is as much if not more concerned with people and how they acquire, exchange and disseminate knowledge as it is about information technology. That is why it has become an important area for HR practitioners, who are in a strong position to exert influence in this aspect of people management. Software in KM can benefited in any process or practice of creating, acquiring, capturing, sharing and using knowledge, wherever it resides, to enhance learning and performance in organizations. Taking into account operational performance, KM software helps in the development of performance management processes which focus and the development and sharing of knowledge of a particular type for a particular group of employees around the world. It also sustains the redevelopment processes of organizational and individual learning which generate and assist in disseminating knowledge. "In conjunction with IT, develop systems for capturing and, as far as possible, codifying explicit and tacit knowledge" (Card, 1991). 6c) Supply chain is "a collection of physical entities, such as manufacturing plants, distribution centers, conveyances, retail outlets, people, and information, which are linked together into processes supplying goods or services from source through consumption" (Lucas, 1994) Supply chain management "integrates the supplier, distributor, and customer logistics requirements into one cohesive process" (Lucas, 1994). At each stage of a supply chain, the bargaining power of buyers will have a strong influence upon the prices charger, and the industry structure. In the supply chain for beer, for example, the buyers include consumers, wholesalers, supermarket chains, public houses and restaurants. The amount of power that each buyer exerts can differ substantially. Question 7 7a) Organizations are starting to utilize other intelligent computing techniques to extend their knowledge base by providing solutions to specific problems that are too massive or complex to be handled by people with limited time and resources. Neural networks, fuzzy logic, genetic algorithms, and intelligent agents are creating promising business applications. Intelligent techniques help to store information in an active form, to create an organizational knowledge base that many employees can examine, like an electronic textbook or manual, to create a mechanism that is not subject to human feelings such as fatigue. This may be especially useful when jobs are environmentally, physically, or mentally dangerous to humans. These systems may also be useful advisors in times of crises. Intelligent techniques can be used to eliminate routine and unsatisfying jobs held by people and to enhance the organization's knowledge base by suggesting solutions to specific problems that are too massive and complex to be analyzed by human beings in a short time. 7 b) There are two types of decisions: structured and unstructured. Unstructured decisions are those in which the decision maker must provide judgment, evaluation, and insights into the problem definition. Structured decisions are repetitive, routine, and involve a definite procedure for handling so that they do not have to be treated each time as if they were new. Some decisions are semistructured which means that on part of the problem has a clear-cut answer provided by an accepted procedure. There are four different types of decision making: intelligence, design, choice, and implementation. Intelligence consists of identifying the problems occurring in the organization and indicates why, where, and with what effects a situation occurs. It informs managers how well the organization is performing and let them know where problems exist. During design the individual designs possible solutions to the problems. This activity may require more intelligence so that me manager can decide if a particular solution is appropriate. Choice consists of choosing among alternatives. Here a manager can use information tools that can calculate and keep track of the consequences, costs, and opportunities provided by each alternative designed in me second stage. During implementation system reports some of the difficulties that arise, indicates resource constraints, and suggests possible ameliorative actions (Appendix 4). Question 8 8a) GIS presents and analyse data geographically, tying business data to points, lines and areas on a map. Mapping tools are proving valuable as management tools in many ways. For example, to wireless telecommunications the technology means lower customer support costs and improved customer service. Traditionally, customer-service representatives took several minutes to rifle through paper files to find the answer-an expensive routine. Now, using a GIS system, the same representatives can visually see the answer displayed on a map in only seconds. Retail stores also use GIS software to track their competition and, with the use of census data, to analyze their customer pool. The company also requires that location sites are no closer than seven miles from one another. GIS supports decision making process making data available in a seconds after it has been collected around the world. In some cases the data is already analyzed which helps to make a faster decision than competitors. 8b) Data quality means accurate, complete and exact information contains in information systems. Unless regular data quality audits are undertaken, organizations have no way of knowing to what extent their information is unreliable. Some organizations, such as the Social Security Administration, establishes data quality procedures. Poor data quality can be attributed to multiple causes. It may stem from errors during data input or it may be the result of faulty information system and database design. Data that are inaccurate, untimely, or inconsistent with other sources of information can also create serious operational and financial problems for businesses. When bad data go unnoticed, they can lead to bad decisions, product recalls, and even financial losses because of changes in accounting systems, billing systems and checkout counters. 8 c) Information technology has an impact on many spheres of life. The impact on environment: organizations and environments have a two-way reciprocal relationship. On the one hand, organizations are open to, and dependent upon, the social and physical environment that surrounds them. Knowledge and technology are a part of the environment: they are produced by other actors in the environment and purchased by the organization as educated labor or as pure knowledge assets. The impact on health: information technologies have a positive impact allowing individuals to safe time and efforts in order to collect and process data. A secure system of IT is one which follows laid-down security procedures with an system alternative system to fall back on in an emergency and where the costs of failure are quantifiable and insured. The impact on workplace problems Properly applied, it can increase productivity. The use of re-programmable robots for such things as welding, spraying, materials handling help to eliminate dirty or hazardous and repetitive work. The use of technology requires more problem solving skills and the ability to interpret data and is thus likely to lead to a widening gulf between skilled and unskilled workers. The impact on employment rates Technology simplifies and reduces tasks needing manual skills and strength especially in factories and all forms of production. Routine tasks requiring a low level of skill are disappearing fast. On the other there is a great need in qualified professionals who are able to work with IT and Information systems. The impact on education. Most programs of IT education are designed in accordance with the culture and specific requirements of the particular segment of IT industry or department, and the demands of particular managerial jobs. The positive role of HRM within IT corporations is to pursue the policy of investing in people and demands that they demonstrate a continuous commitment to training standards. The impact on commerce. Technology influences the way organisations interact with customers, suppliers and competitors. Sometimes, because of the investment required and the mutual benefit competitors collaborate over technology. Sometimes suppliers supply free hardware and software to customers in order to make switching more difficult and costly. The increased use of JIT systems in manufacturing means that much closer liaison is required between suppliers of components and final assemblers. It is worth noting that as well as increasing efficiency the close linkage means that a major assembler of, say, cars or domestic appliances, can exert considerable influence on their suppliers. The impact on the entertainment industry. Information technology has changed the nature of entertainment from traditional forms to on-line entertainment and computer games. People are used to spend their free time before the monitors instead of going into football match or walking. In this case, IT has changed the nature of communication: people can play in virtual casinos and attend any exhibition without living their room. The impact on government Governments receive the possibility to obtain all necessary information their citizens and commercial organization using CCTA technologies. The information is held and permanently stored for statistical and security purposes which allows government to control and prevent terrorist attacks, etc. References 1. Card, David. (1991)."What Makes a Software Measure Successful." American Programmer. September, 2. Lucas H.C. (1994). Informaion systems Concepts for Management. McGrawHill. 3. McNurlin B.C. and Sprague R.H. Jnr. (1997). Information Systems Management in Practice 4th edn. Hemel Hempstead: Prentice Hall 4. Peppard J. ed. (1993). IT Strategy for Business. London: Pitman. Appendixes 1. LAN (Retrieved from http://www.spirentcom.com/analysis/technology.cfmWS=234&SS=246&wt=2) 2. Star, bus and ring types of networks. 3. Porter's five forces model 4. Making decision process Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Systems Management Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Computer Systems Management Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/technology/1521560-computer-systems-management
(Computer Systems Management Essay Example | Topics and Well Written Essays - 2500 Words)
Computer Systems Management Essay Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/technology/1521560-computer-systems-management.
“Computer Systems Management Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/technology/1521560-computer-systems-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Systems Management

Management Information System: Computer Crimes

In the paper “management Information System: Computer Crimes” the author analyzes computer crimes that have been affected and are prone to cyber attacks.... management Information System: Computer CrimesComputer Crimes have been on a rise ever since the internet took over.... Three major types of computer crimes that are affecting people are identity theft, cyber stalking, and malware.... It's not just the commercial organizations that have been affected and are prone to cyber attacks, but even the individuals are equally prone of computer crimes that have reportedly been rising over the past two decades (Icove et al, 1995)....
1 Pages (250 words) Essay

Computer Architecture

It also involves s the management of resources shared among computer users.... Learning about the internal design has significance in different areas such as algorithm design and implementation, dependable programming, modern device development, caching material across the web, building virtual environments, network management, building secure and safe systems, and others.... There are related explanations about different issues that influence the process of designing the current operating systems....
6 Pages (1500 words) Essay

Operating System as a Heart of the Computer

The operating system gives priority to background processes that need to run, such as virus checking and memory management.... (Coustan and Franklin)Memory management goes hand in hand with processor management, as the operating system needs to allocate memory for the processes and applications to run efficiently.... (Coustan and Franklin)In device management, the operating system also talks to the hardware in the computer by way of programs called drivers....
12 Pages (3000 words) Essay

Project Management Computer Systems

ndustry Approach TodayAround the globe, most of the software industry leans to dispatch computer systems/solutions in a standardized manner with all possible efforts and to have a distinct portfolio on their projects list.... First, we need to define what project management software is.... In other words, project management software is a combination of all these tools and resources to help with project development, communication and documentation of large scale and complex projects....
14 Pages (3500 words) Essay

Evolution of Computer Technology

These areas have received tremendous focus and attention in recent years and they undoubtedly would dramatically affect the future computer systems.... As mentioned elsewhere in this paper, since the 1980s the development and design of computer systems have been technology and market driven.... Two important considerations have so far stood out in shaping the evolution of computer systems during these past twenty years – mobility and speed....
4 Pages (1000 words) Essay

Systems Upgrade for an Accounting Firm

Hardware Requirements of ComputersWith respect to the accounting firm in subject, it is undeniable that the smaller firm use old computer systems in conducting their accounting practices.... As a thesis statement of the paper "systems Upgrade for an Accounting Firm", failure to upgrade both hardware and software components of computers within a company leads to system obsolesce, inefficient execution of tasks, and loss of opportunity cost associated with new systems used by competitors....
6 Pages (1500 words) Essay

Value Chain Framework

Companies should become more familiar with the definitions of metrics before selecting the metrics to make use of under each aggregate.... All metrics are not equally important once… Strategy of business is the single largest determinant of the most important metrics.... Finally, the standard metrics that are listed above need to be augmented with the custom prime metrics common to your industry....
11 Pages (2750 words) Essay

Risk Process and Security Policy - Becoming Company

ecoming company has a number of information resources and assets such as hardware, data, software and networks that play a critical role in the information management at the company.... These systems have different vulnerabilities and security risks particularly with regard to the sensitivity and confidentiality of the information they are used to store.... This paper uses OCTAVE methodological approach to assess the security risks of Becoming Company with particular focus to the various information assets (both hardware and software) in the company and their operational contexts, as well as the sensitivity and confidentiality of the kind of information, kept on the company systems....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us