Question

In: Computer Science

End user computing------in some cases an organization’s information system (IS) is planned and centered on specific...

End user computing------in some cases an organization’s information system (IS) is planned and centered on specific goals; in other cases, technology is an afterthought to the actual business objectives. Can you think of examples of how technology has altered the way we do business today? Were those changes and implementations accomplished by understanding the goals of the business?

Solutions

Expert Solution

With respect to end-user computing, in organizations, their Information System (IS) is indeed planned, designed, changed, developed, integrated, implemented, and revolved around, and used on specific goals. And yet, in other cases, either for the same organization or other organizations, the very same IS technology is an afterthought to the actual business objectives and specific goals.

Examples of how technology has altered the way we do business today:
Technology has definitely and literally altered the way we do business today, especially, the IS technology. Technology has changed every aspect of the way our businesses are operated, run, and delivered.

Examples:

* Almost all aspects of the business of an organization can be managed remotely, provided the person handling those things, jobs, tasks, etc., has a desktop PC, smart device, phone, or tablet installed and running correct software. This becomes even more easy, less expensive, flexible, convenient, quick, seamless, efficient, and effective if he/she has a mobile device, such as a mobile phone, mobile POS machine, etc. In fact, the business itself can be completely made with mobile solutions.

* Organizations can use Cloud Computing technology, which is basically, the organizations' IS technology been outsourced to a third-party public Cloud Service Provider (CSP). A company can even use Cloud Computing technology to provide them 100% of IS technology, where the company's entire Information Technology (IT) infrastructure is on an isolated network in the public CSP's cloud platform. Thus, allowing the company to concentrate on its core business to manufacture, or develop the products, services, solutions, software, hardware, appliances, etc., they have expertise in.

* Social media impact and other digital footprint: This is an environment, where all the company, their customers, any other potential customers, users, partners, clients, media, public, etc., are online 24/7 and 365 days a year, and any and all information about the organization, their services, products, solutions, customer service, testimonials, reviews, feedbacks, etc. all appear on the Internet and remain there forever either on the company's official website, or any other review, rating, blog, or consumer complaints websites. Social media lets all the above-mentioned players to contact one another, communicate, and collaborate together to do business. Social media also lets a company to go global in just minutes. All the users and customers can connect to the Internet and access and use an organization's information, their products, solutions, services, buy and order them online irrespective of their demographics, geographical locations, financial background, or even social status. So, digital footprint, social identity, and reputation online are very important to a company to do its business.

Yes, those changes and implementations were accomplished by understanding the goals of the business.
In every step and in every layer of the core business goals, activities, jobs, tasks, etc., and any other changes and implementations that are accomplished are understood, and a relevant, appropriate, correct, effective, efficient, convenient, flexible, time-saving IS technology is used. Every time any IS technology tool, appliance, software, hardware, network, service, or solution is used, the concerned team checks to see to ensure the output or outcome of that usage of the technology delivered and achieved the organization's specific goals, core business objectives, values, products, services, and solutions.

However, there are organizations and businesses out there which do use IS technology as an afterthought to the actual business objectives, to only use IS technology as an enhancement tool, equipment, help, or a guide to accomplish the core business goals. These organizations for different reasons do not believe, trust, and rely on modern-day IS technology. These organizations started on their own, established their business, developed and manufactured their products, services, solutions, and marketed and delivered the same, without any technology, using only primitive methods and techniques, manual labor, and other tools pieces of equipment, and solutions. This would have taken more time, labor (manual and other labor), more, energy, lacking convenience, spending more money, etc., however, their primitive method of doing business is, in a way, reliable, would have personal touch to it rather machine or technology touch, and can be used anytime in case, for some odd reason, they are unable to use the IS technology. Even the vice versa is true and possible. To them, IS technology is only an option and is considered only when there is an emergency to use it.

However, there are and have been cases, where certain and even many companies, adopting IS technology, have failed to meet their core or specific business goals and requirements, delivering services, products, and solutions irrelevant to their business objectives forgetting it. Or at least, their business objectives have turned in a different direction to some or large extent.


Related Solutions

You and your team are now working on some icons for the organization’s program user interface...
You and your team are now working on some icons for the organization’s program user interface (UI). Based on your first mock-up of the UI, complete the following: Discuss 2 original icons with 3 states each. Explain how the icons would be used, and give the purpose of each state. Investigate emerging alternative I/O devices and discuss their impacts on design.
End user programs are designed for specific functions such as word processing or a game. You...
End user programs are designed for specific functions such as word processing or a game. You have installed a new piece of applications software onto a stand-alone PC. You then find that the printer attached to the PC fails to produce what can be seen on screen in that package. Explain clearly why this might happen.
Simulate a problem with undo. You will need to be connected as user SYSTEM or some...
Simulate a problem with undo. You will need to be connected as user SYSTEM or some other user to whom you have granted the DBA role. . Create an undo tablespace with a single datafile of only 200 KB. Do not set the file to autoextend. . Set the database to use this small undo tablespace. Confirm that an undo segment has been created in this tablespace and that it is online by querying the views DBA_ROLLBACK_SEGS and V$ROLLSTAT. Why...
Since the end of the Great Recession, interest rates have been at historic lows—in some cases,...
Since the end of the Great Recession, interest rates have been at historic lows—in some cases, close to zero. How is expansionary monetary policy, or more specifically a open market purchase, supposed to work? How do near-zero interest rates limit the ability of expansionary monetary policy to work?
Since the end of the Great Recession, interest rates have been at historic lows—in some cases,...
Since the end of the Great Recession, interest rates have been at historic lows—in some cases, close to zero. How is expansionary monetary policy, or more specifically a open market purchase, supposed to work? How do near-zero interest rates limit the ability of expansionary monetary policy to work? How has the Fed responded to this quandary? That is, what policies has the Fed conducted? In your opinion, how effective has the Fed’s policy been as a response to the Great...
A large insurance company maintains a central computing system that contains a variety of information about...
A large insurance company maintains a central computing system that contains a variety of information about customer accounts. Insurance agents in a six-state area use telephone lines to access the customer information database. Currently, the company's central computer system allows three users to access the central computer simultaneously. Agents who attempt to use the system when it is full are denied access; no waiting is allowed. Management realizes that with its expanding business, more requests will be made to the...
A large insurance company maintains a central computing system that contains a variety of information about...
A large insurance company maintains a central computing system that contains a variety of information about customer accounts. Insurance agents in a six-state area use telephone lines to access the customer information database. Currently, the company's central computer system allows three users to access the central computer simultaneously. Agents who attempt to use the system when it is full are denied access; no waiting is allowed. Management realizes that with its expanding business, more requests will be made to the...
A large insurance company maintains a central computing system that contains a variety of information about...
A large insurance company maintains a central computing system that contains a variety of information about customer accounts. Insurance agents in a six-state area use telephone lines to access the customer information database. Currently, the company's central computer system allows three users to access the central computer simultaneously. Agents who attempt to use the system when it is full are denied access; no waiting is allowed. Management realizes that with its expanding business, more requests will be made to the...
Suppose a department has determined that some users have gained unauthorized access to the computing system....
Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $2,000,000 with 5% likelihood per year. One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is is $50,000 with 80% effectiveness. Here is the summary of risk and...
Case Defence sells smartphone cases and uses the perpetual inventory system. The following is information on...
Case Defence sells smartphone cases and uses the perpetual inventory system. The following is information on the purchases and sales of “defender box” cases. On October 1, case Defence had 28 units with a unit cost of $22. Procedures   Sales Date Units Unit Cost Units Unit Price    Oct. 3   18 23 Oct. 6 23 $58 Oct. 12 28 25 Oct. 19 28 $58 Oct. 23 38 27 Oct. 30 33 $58 . 31 23 28 Required: 1. Calculate the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT