In: Operations Management
At the Enterprise level, how should we be choosing, implementing and managing information systems resources?explain
How to choose information system resources:
1. Assessment: There are numerous systems available in the market like ERP, RMIS, CMIS, etc. We would first analyze the requirements of the business, the cost of available systems, and accordingly, we would select the most suitable system for the organization.
2. Resource assessment: there are various resources available for usage, we need to assess which are required for our organization:
1. Hardware: What hardware can we afford, what type of network we are in, are we sharing the resources or not: are some of the important decisions to take while assessing the hardware.
2. Software: What type of performance is required, What is our affordable cost for the software, What are the basic requirements of the information system we have selected: these are some questions we ask while deciding the type of software to be used.
3. Data: What type of media is available for data, Where are we going to store data, in what format do we going to encrypt the data: these are some questions on the basis of which resources are selected.
4. Procedures: What are the organizational procedures prevailing in the country, and what are the potential procedures- they too affect the selection of resources for information systems.
5. People: what are the type of people required for the system, what level of administers, data operatives, and managers are required, affect the resource allocation too.
How to implement Information system resources:
1. Maintaining a proper system to promote adequate communication.
2. Focus on the provision of training to the employees for improving skills and knowledge.
3. Review and revalue the working of resources and systems.
4. Making policies and procedures according to the system.
5. Promoting the feedback from employees and outside parties.
How to manage information system resources:
1. Supervise the people involved and control and manage their working.
2. Controlling the assessment of the information collected.
3. Frequently changing the passwords to avoid data theft.
4. Taking feedback from the users and reviewing the plans and policies from time to time.
*PLEASE RATE WITH A THUMBS UP *