Assessing technology in my organization is important in determining the position and status of technology use. This paper will focus on technology and present a summary of the situation as it is. To achieve this, we will report on the technology inventory, business informationsystems assessment, and risk assessment at the organization.
The technology inventory is simple, and comprises of hardware, software, security, networks, and databases. Hardware in the organization is comprised of basic computers. We do not operate sophisticated or specialized gadgets. For financial, compensation, office administration, training system, communication, and documentation systems we use ordinary computers hooked to cloud servers to provide the needed solution. Oracle-based software is used in all our operations with the exception of the training system. Microsoft dominates the enterprise systems with the exception of the documentation system, which is done using the DocStar Eclipse. The organization’s database management system utilizes Oracle Database. Security to the financial management system and the documentation system is enhanced using the SSL Certificates. There are LAN and WAN networks which allow employees to work from remote areas when necessary. Internet connectivity is allowed through direct access.
The organization operates different business information systems. The financial system is the most sensitive and is used to process payments and disbursements. The system faces the challenge of taking more than necessary time to reimburse customers and as opined by Cassidy (2016), the system faces the risk of hacking, sabotage by disgruntled employees, and downtimes, which is a uniform risk across the entire organization’s business information systems. The compensation system is mainly used in-house in the processing of employee related payments such as reimbursements for overtime, out of pocket expenses and overtime. The compensation system is sometimes rigid which is upsetting of employees. The training system is capable of allowing employees self-training on some identified procedures and practices. The communication system allows for exchange of messages between employees or departments. The system is lagging behind in terms of how well it gets things done compared to what employees would like. The documentation system is critical in maintaining a repository for the organization. As such, the system ranks high in the business information systems.
From a technological point of view, the risk that the business faces need to be ranked and the mitigation measures instituted to ensure a significant improvement in the risk ranking. Conforti et al. (2015), advise that this is the first step in minimizing risk as well as the initial steps in helping the organization take risk informed decisions. The risk that stands highest is unsatisfactory customer service, loss of key personnel and natural disasters. These risks have very high severity and it is important to ensure that they are well mitigated to ensure that there is continued business growth. Staff in the organization are well trained on the use of software and hardware effectively eliminating the risk of systems misuse. To ensure that upcoming technologies are effectively deployed and utilized, the organization should ensure that there is sustained training of employees.
Technology defines how the organization runs. With the business information systems, the organization needs to ensure continued system update and system security to protect the integrity of the organization’s operations. Rosemann and vomBrocke (2015) assert that a business organization needs to develop and improve its information systems by paying attention to strategic alignment of the systems to the organizations strategy, methods of the information systems, governance, the people, and culture of the organization. With a growing organization, there is need to ensure that the organization maintains or improves its IT effectiveness. To mitigate against risks, the organization needs to maintain an up-to-date workforce which can be done through training. Redundancy of systems should also be enforced to ensure that there is sufficient backup and security against loss or compromise on information’s integrity.
Cassidy, A. (2016). A practical guide to information systems strategic planning. Auerbach Publications.
Conforti, R., de Leoni, M., La Rosa, M., van der Aalst, W. M., & ter Hofstede, A. H. (2015). A recommendation system for predicting risks across multiple business process instances. Decision Support Systems, 69, 1-19.Rosemann, M., &vomBrocke, J. (2015). The six core elements of business process management. In Handbook on business process management 1 (pp. 105-122). Springer, Berlin, Heidelberg.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more