14. Strategies for information Flashcards

1
Q

Why do organisations require information?

A
  • Planning
  • Controlling
  • Recording transactions
  • Performance measurement
  • Decision making
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give characteristics of strategic information.

A

Derived from both internal and external sources:

  • Summarised at a high level
  • Relevant to the long term
  • Concerned with the whole organisation
  • Often prepared on an ad hoc basis
  • Both quantitative and qualitative
  • Uncertain, as the future cannot be accurately predicted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give characteristics of tactical information.

A
  • Primarily generated internally (but may have a limited external component)
  • Summarised at a lower level
  • Relevant to the short and medium term
  • Concerned with activities or departments
  • Prepared routinely and regularly
  • Based on quantitative measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give characteristics of operational information.

A
  • Derived from internal sources
  • Detailed, being the processing of raw data
  • Relevant to the immediate term
  • Task specific
  • Prepared very frequently
  • Largely quantitative
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are typical information requirements for the manufacturing sector?

A

Strategic:

  • Future demand estimates
  • New product development plans
  • Competitor analysis

Tactical:

  • Variance analysis
  • Departmental accounts
  • Inventory turnover

Operational:

  • Production reject rate
  • Materials and labour used
  • Inventory levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are typical information requirements for the service sector?

A

Strategic:

  • Forecast sales growth and market share
  • Profitability, capital structure

Tactical:

  • Resource utilisation such as average staff time charged out, number of customers per hairdresser, number of staff per account
  • Customer satisfaction rating

Operational:

  • Staff timesheets
  • Customer waiting time
  • Individual customer feedback
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are typical information requirements for the public sector?

A

Strategic:

  • Population demographics
  • Expected government policy

Tactical:

  • Hospital occupancy rates
  • Average class sizes
  • Percent of reported crimes solved

Operational:

  • Staff timesheets
  • Vehicles available
  • Student daily attendance records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are typical information requirements for NFP organisations?

A

Strategic:

  • Activities of other charities
  • Government (and in some cases overseas government) policy
  • Public attitudes

Tactical:

  • Percent of revenue spent on admin
  • Average donation
  • ‘Customer’ satisfaction statistics

Operational:

  • Households collected from/approached
  • Banking documentation
  • Donations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the qualities of good information?

A
  • Accurate
  • Complete
  • Cost-Beneficial
  • User-targeted
  • Relevant
  • Authoritative
  • Timely
  • Easy to use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define information management strategy.

A

Strategy specifying who controls and uses the technology provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define information systems strategy.

A

Strategy specifying how hardware, software and telecommunications can achieve delivery of the information systems strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define information technology strategy.

A

Strategy specifying the systems that will best enable the use of information to support the business strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits of a proposed information system?

A
  • Increased revenue
  • Cost reduction
  • Enhanced service
  • Improved decision making: Forecasting, developing scenarios, market analysis, project evaluation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When formulating an overall IS/IT strategy, what aspects should be taken into consideration?

A
  • What are the key business areas which could benefit most from an investment in information technology?
  • What form should the investment take, and how could such strategically important units be encouraged to use such technology effectively?
  • Will maintenance of the new system be provided in-house or be outsourced?
  • How much would the system cost in terms of software; hardware; management commitment and time; education and training; conversion; documentation; operational manning; and maintenance?
  • The importance of lifetime application costs must be stressed – the costs and benefits after implementation may be more significant than the more obvious initial costs of installing an information technology function.
  • What criteria for performance should be set for information technology systems?
  • What are the implications for the existing work force – have they the requisite skills; can they be trained to use the systems; will there be any redundancies?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the recommendations of Earl’s systems audit grid?

A
  • A system of poor quality and little value should be disposed of (divest).
  • A system of high business value and low technical quality should be renewed (invested in).
  • A system of high quality but low business value should be reassessed.
  • High quality systems with a high business value should be maintained.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can IS/IT be used in operation?

A
  • Process control
  • Machine tool control: Numerical control, computer numerical control, direct numerical control
  • Robotic automation
  • Computer aided manufacturing
  • 3D printing
  • Computer Integrated Manufacturing
  • Enterprise Resource Planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can IS/IT be used in logistics?

A
  • The use of IT in inbound logistics includes stock control systems such as MRP, MRPII, ERP and IT.
  • Warehousing: the use of barcodes can increase knowledge about the quantity and nature of stock in hand.
  • It is possible to create computer models, or virtual warehouses, of stock actually held at suppliers.
18
Q

How can IS/IT be used in marketing?

A
  • Social media
  • Buying data about customer purchasing habits
  • A variety of market research companies use IT/IS as a way of interacting with consumers.
  • Supermarkets can use automated EPOS
19
Q

What is Customer Relationship Management (CRM)?

A

Customer relationship management (CRM) describes the methodologies, software, and usually internet capabilities that help an enterprise manage customer relationships.

20
Q

What does CRM consist of?

A
  • Helping an enterprise to identify and target their best customers, manage marketing campaigns with clear goals and objectives, and generate quality leads.
  • Assisting the organisation to improve telesales, account, and sales management by optimising information shared, and streamlining existing processes
  • Allowing the formation of relationships with customers, with the aim of improving customer satisfaction and maximising profits; identifying the most profitable customers and providing them with the highest level of service.
  • Providing employees with the information and processes necessary to know their customers
21
Q

How can IS/IT be used in support activities?

A
  • Procurement.
  • Technology development
  • HR
22
Q

What are five ways in which Big Data and Data Analytics can help organisation?

A
  • Enhanced data transparency
  • Enhanced performance
  • Market segmentation and customisation
  • Improved decision-making
  • New products and services
23
Q

What are the criticisms of Big Data and Data Analytics?

A
  • Latest buzzword
  • Correlation and causation
  • Data overload
  • Ability to verify
  • Sustainable competitive advantage
  • Representative data
24
Q

What are barriers to introducing Big Data and Data Analytics?

A
  • The unknown destinations
  • The underlying technology challenges
  • The lack of a holistic approach
  • The shortage of talent
  • The fear of cyber attack
  • The difficulty of building the business case
  • The need for legal and regulatory compliance
  • The need for customer data
25
Q

Define knowledge.

A

Is the potential for action based on data, information, intuition and experience.

26
Q

Define explicit knowledge.

A

Is knowledge that the company knows that it has. This includes facts, transactions and events that can be clearly stated and stored in management information systems.

27
Q

Define tacit knowledge.

A

Is personal knowledge and expertise held by people within the organisation that has not been formally documented.

28
Q

Define knowledge management.

A

Describes a range of strategies and tools that capture all the knowledge that is valuable to an organisation, and deliver it to the people in such a way that it can be acted on quickly, to the competitive advantage of the business.

29
Q

What does knowledge management concern?

A
  • Designing and installing techniques and processes to create, protect and use explicit knowledge.
  • Designing and creating environments and activities to discover and release tacit knowledge.
  • Capturing good quality information from outside the business as well as within eg, intelligence on competitors.
30
Q

How can knowledge management help promote competitive advantage?

A

• The fast and efficient exchange of information
Effective channelling of the information to:
– Improve processes, productivity and performance.
– Identify opportunities to meet customer needs better than competitors.
– Promote creativity and innovation.

31
Q

What are the risks associated with IT/IS?

A

– The risk of inadequacy: the failure by the firm to utilise IT/IS as effectively as its rivals will lead to loss of competitive advantage, eg, inferior service, poorer products, excess costs.

– The risk of breakdown: where the firm depends on IT/IS a breakdown in its operations threatens the business.

– The risk of excess expense: IT/IS is a significant budget item. Botched projects, expensive contracts, inappropriate systems or non-adoption presents a direct financial risk.

32
Q

What are some common mistakes that adversely affect the implementation of a new information system?

A

Analysis:

  • The problem the system is intended to solve is not fully understood.
  • Investigation of the situation is hindered by insufficient resources.
  • User input is inadequate
  • The project team is unable to dedicate the time required.
  • Insufficient time spent planning the project.

Design:

  • Insufficient user input.
  • Lack of flexibility.
  • The system requires unforeseen changes in working patterns.
  • Failure to perform organisation impact analysis.
  • Overlooking organisational factors such as ergonomics, health and safety, compliance with legislation, job design and employee involvement

Programming:

  • Insufficient time and money allocated to programming.
  • Programmers supplied with incomplete or inaccurate specifications.
  • The logic of the program is misunderstood.
  • Poor programming technique results in programs that are hard to modify.
  • Programs are not adequately documented.

Testing:

  • Insufficient time and money allocated to testing.
  • Failure to develop an organised testing plan.
  • Insufficient user involvement.
  • User management do not review and sign-off the results of testing.

Conversion:

  • Insufficient time and money allocated to data conversion.
  • Insufficient checking between old and new files.
  • The process is rushed to compensate for time overruns elsewhere.

Implementation:

  • Insufficient time, money and/or appropriate staff mean the process has to be rushed.
  • Lack of user training increases the risk of system under-utilisation and rejection.
  • Poor system and user documentation.
  • Lack of performance standards to assess system performance against.
  • System maintenance provisions are inadequate.
33
Q

What are the three types of theories to explain user resistence?

A

People-Oriented: Caused by factors internal to users as individuals or as a group. Can be overcome by: Organisation policies, Persuasion, User involvement in system development.

System-Oriented: Caused by factors inherent in the new system design relating to ease of use and functionality. Can be overcome by: User training and education. Improve user-interface. Ensure users contribute to the system design process. Ensure the system ‘fits’ with the organisation.

Interaction: User-resistance is caused by the interaction of people and the system. Can be overcome: Re-organise the organisation before implementing the system. Redesign any affected incentive schemes to incorporate the new system.
Promote user participation and encourage organisation-wide teamwork. Emphasise the benefits the system brings.

34
Q

What are the risks from IT system?

A
  • Natural threats: Fire, flood, electrical storms.
  • Non-compliance with regulations
  • Data systems integrity
  • Accidents
  • Cyber security risks
35
Q

Define cyber security.

A

The protection of systems, networks and data in cyberspace.

36
Q

What are some of the most significant risks that an IT system might encounter?

A
  • Human threats
  • Fraud
  • Deliberate sabotage
  • Viruses and other corruptions
  • Denial of Service (DoS) attack
37
Q

What are some measures that an organisation can take to improve cyber security?

A
  • Embed a greater awareness of cyber risk throughout the organisation’s strategy and operations.
  • Build a security focused culture based on continuous improvement in terms of cyber security.
  • Articulate the organisation’s approach to managing cyber risks through its reporting mechanisms.
  • Reduce complexity in the organisation’s IT environment
  • Develop talent management strategies to attract and retain individuals skilled in managing cyber security.
  • Corporate boards should demand that suppliers to the organisation comply with relevant cyber security laws and standards as this should help to protect IT assets in the supply chain.
  • Organisations should avoid solely relying on point-in-time assessments regarding occasional checks on the security procedures associated with IT infrastructures and instead should make this an on-going activity.
38
Q

In what aspects can IT security controls be subdivided?

A
  • Prevention
  • Detection
  • Deterrence
  • Recovery procedures
  • Correction procedures
  • Threat avoidance
39
Q

What are some practical measures that an organisation can take to combat IT risks?

A
  • Business continuity planning
  • Systems access control
  • Systems development and maintenance
  • Physical and environmental security
  • Compliance with any relevant legal requirements
  • Personnel security
  • Security organisation
  • Computer and network management
  • Asset classification and control
  • Security policy
40
Q

Define Blockchain.

A

Is a technology that allows people who do not know each other to trust a shared record of events.

41
Q

What are the key benefits of Blockchain?

A
  • Building trust
  • Reducing costs
  • Improving money laundering procedures