Question

In: Operations Management

Information Systems (IS) inevitably become bound up in organisational politics because they influence access to a...

Information Systems (IS) inevitably become bound up in organisational politics because they influence access to a key resource- namely, information. Information systems can affect who does what to whom, when, where, and how in an organisation. Many organisations require changes in personal, individual routines that can be painful for those involved and required retraining and additional effort that may or may not be compensated. Please note the following:

Discuss the major difficulties of ERP system implementation in USA.


Discuss the reasons behind user, and organizational resistance to ERP systems in USA.

The purpose of this assignment is to build up a better understanding of organizational resistance to change, and to examine theories, which support students’ analysis, findings and results. The students should be able to acquire in-depth understanding of CSFs, and their impact over IS project (e.g. Cloud ERP). This, therefore, encourages students to shape a holistic view of how IS impacts organization, management practices, and people.

Solutions

Expert Solution

Implementing the ERP U.S has to rid away the old system running and hence it created a sense of insecurity in people. as people are aware of the old system they are used to it . when there is a change there will occur resistance to change the human mind will try to restrain it.

the enterprise resource system is the integration of all the departments of the organization H.R Finance, Logistic Supply chain management into a single entity so that seamless flow of the information can be done between the department and also all the employee information is in the single system.

The constraints in the implementation of the ERP in the U.S lies in the -

1. People are aware of the old system they are used to it to learn a new system, they have to acquire a new skill.

2. As in ERP, there is a seamless flow of the information between departments there are times when conflict can happen because of the blame game, efficiency, etc.

3. ERP has all the information of the people it can be efficient in weeding inefficient workforce which prevails in the system so employees got insecure.

4. There is a change in the responsibility also people have to follow some standard procedure to so work people who so work om=n there own now has to be systematic and punctual.

5. As an ERP system will streamline the information between various department employee fear the information between departments can cause harm to their job security.

6. Through ERP people feared that they can longer be free in doing their work they have to follow instructions anytime anywhere with no time delay also performance accordingly can be monitored.

7. Some people felt ERP will bring a change in status co and hence affect their influence in the organization their old reputation, importance can be lost.

8. Organization employees also fear that there may be a breach of their personal and company data if they move to  ERP.

9. Employees also feared that there may be transparency issues after arriving on the ERP.

10. There is also fear that new technology will bring new employees who could be superior to working employees that may eventually, lose their aura in the organization.


Related Solutions

Explain (in logical steps) how an organisations’ choice of Information Systems is determined by Organisational Strategy?
Explain (in logical steps) how an organisations’ choice of Information Systems is determined by Organisational Strategy?
Criticize this discussion base on this information : Explain how information systems influence businesses to be...
Criticize this discussion base on this information : Explain how information systems influence businesses to be more competitive, efficient, and profitable. Provide at least one example for each factor. Discussion : Information systems influence businesses to be more competitive, efficient and profitable in many of ways. Most companies throughout the world utilize information systems for their day to day operations. The introduction part in small business could sometimes be a little easier but at the same time these business could...
Microsoft Access 2016: Computer Information Systems What are the advantages of including a caption for a...
Microsoft Access 2016: Computer Information Systems What are the advantages of including a caption for a form? Do you need both a caption and a title? Why or Why not? What other elements do you think should be standard on a data entry form used by an organization?
1– How does the information systems that operate within an enterprise sphere of influence support an...
1– How does the information systems that operate within an enterprise sphere of influence support an organization in its interactions with its environment? Address three (3) of the following: customers, suppliers, shareholders, competitors, special-interest groups, the financial community, and government agencies. 2 – Designing supporting and implementing Data Systems associated with Big Data is a challenging information systems management problem. List four of the ways organizations are employing big data to improve their day-to-day operations, planning, and decision making. 3...
Information systems in healthcare differ from those in manufacturing and business because: A. healthcare is multidisciplinary....
Information systems in healthcare differ from those in manufacturing and business because: A. healthcare is multidisciplinary. B. healthcare is highly regulated. C. healthcare is professionally driven. D. All of these are correct.
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. 2. Identify and experience the...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. 2. Identify and experience the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT