Friday, May 1, 2020

Implementing Enterprise Resource Planning †Free Samples to Students

Question: Discuss about the Implementing Enterprise Resource Planning. Answer: Introduction: The main purpose of the project is to develop a network for the information system for the STP and secure the information system from unauthorized access. The information system is developed according the goals of the business for supporting the future growth of the organization. The information system should be developed for improvement of the business goals of the organization and the privacy of the organization should be kept confidential for securing the organizational data. The growth of the business should be kept in mind for management of the employees of the organization. The information system should be developed for increasing the efficiency of the business process of the organization and decrease the response or waiting time of the users. The scope of the project is to include the different functionality of the business process in the information system for increasing the efficacy of the business. The manual process of the organization can be automated with the development of the information system. The cost of operation of the current business process should be minimized with the implementation of the information system. New equipments and technology should be implemented for improvement of the business process and report should be generated from the information system to show the current sales record and the stocks available in the warehouse of the organization. To develop the information system to meet the current requirement of the organization and comply with the regulations. The network administrator is responsible for monitoring the progress of the project and each of the module should be developed for including the functionality The project should increase the efficiency of the current work process and reduce the workload and complexity of the employees working in the organization. To increase the return of investment and the information system should be developed for facilitating employees to get real time monitoring of the sales report and develop the customer relationship. Strategic alignment of the project The project should aligned with the current business process to view the sales and the stock record and monitor the records at a real time for the increasing the efficiency of the current workplace of the organization. The account manager is responsible to maintain the sales record and the information system should be developed to automatically record the sales of the product sold by the sales representatives and record in the database to generate a sales report. The database of the information system should be encrypted with the application of encryption algorithm and provide permission to the users. Read / write permission should be provided for reducing the risk of illegal access. The data residing in the database of the information system should be stored in different tables and the tables should be normalized such that it can be joined to provide an appropriate result of the querry (Sousa and Oz 2014). The database should be regularly backed up to ensuring the protection of the database and password should be used for the access of the data. Authorization should be added for removal of the risk of access of the content by the employees and accidental damage of the files. A secure connection is required to be established between the database and the interface of the information system for increasing the efficiency of the information system (Rouhani, Ghazanfari and Jafari 2012). The standalone system present in different branches of the organization should be replaced with the information system and the interfaces are required to be hosted on a web platform and connected with a central database server for storing the information generated and inputted into the system. The information system should be connected using mobile devices to increase the flexibility of the system and allow the user to access it from remote locations. The mobile device should be encrypted and antivirus program should be installed for the reducing the risk of virus and corruption of the database of the information system (Oseni et al. 2014). The theft or lost of the mobile phones that is connected with the information system can compromise the security of the information system and make it vulnerable for the attackers to exploit the contents of the information system. The mobile device can be used as an intermediate device to access the content of the information system. The encryption of the data in the mobile phone can use of strong password can reduce the risk of illegal access of the cell phone for accessing the resources of the information system (Jouini, Rabai and Aissa 2014). The operating system of the mobile phones used by the employees to connect with the informat ion system should be kept updated for protecting it from harmful software. Plan for hardware purchases Different hardware are required for the development of the information system and they are categorized as follows: Input devices- This are the devices that takes the input from the users of the information system and it can be mouse, keyboard or touch panels. The choice of the input device that is used for providing input to the information system depends upon the users and the data should be entered on different scales. The information system can be based on several features and it may require different input device. Processing devices- The processing device is required for processing the data residing in the database of the information system and different function of the modules developed. The increasing the processing power of the cpu used for the management of the information system increases the efficiency of the system (Fragkiadakis, Tragos and Askoxylakis 2013). The clock speed of the cpu is used for determination of the number of instruction that is required to be processed per second. Memory- the memory of the computer can be divided into internal and external memory and the data that is held on the memory can be stored in the external device for increasing the flexibility of the system. The running process are stored in the computer memory and the size of the memory depends on the handling of the queue (Bernroider, Wong and Lai 2014). The size of the memory used for processing the queue of the information system is dependent on the controlling and the processing power of the information system. Output devices- The output devices the screen of the information system and the monitors used for getting the output of the results of each of the querry. The printer can also be called as an output device because it is used for printing out the report. Mainframe- The mainframe are used for processing the large scale of data and it is used for recognition of the existing processes and meet the needs of the organization and implement a change over ion the organization. Business continuity To maintain a continuity in the business the information system should increase the customer relationship management of the organization. A business continuity plan is important for the success of the business and a strategy is required for the recognition of the threats acting on the information system. The potential risk acting on the information system and their effect are evaluated for the creation of the business continuity plan and the plan should be periodically reviewed for bringing in the changes in the organization and mitigation of the risk (Acemoglu, Malekian and Ozdaglar 2016). The operational risk such as the human errors and the sudden change in the organizational culture should be included in the plan for creation of a fully functional plan. The areas of improvement of the information system and the dependency of the internal and the external factors such as the decision from the management or higher authorities are seen as higher cost and the human interaction should be minimized for minimizing the risk. The recovery of the system and the interruption should be avoided and a proper risk management is necessary for the implementation of the business continuity plan in the organization. The stakeholders included in the business process and their potential to cause harm to the information system should be identified and the permission for accessing the resources of the organization should be defined to them for reducing the impact of the threat and reducing the complexity of the management of the risk associated with the information system (Golriz and Jaber 2015). The recovery point and the time required for the recovery of the information system in case of failure should be analyzed and maximum tolerable data loss should be ensured for the recovery of the critical functions and maintaining a continuity in the current business process. Risk management Risk management is an important process for the success of the information system and it should be able to automate the different business process and minimize the cost of the development and running of the information system. The supply chain of the products should be managed and the information of the supplier and the customer should be recorded for minimizing the loss of data that may occur at one end of the information system (Harmon 2014). The information system should record the data according to different departments and the accessibility of the data should be given to the manager of the department for improvement of the current business process of the organization. An architecture of the information system should be created for the access right should be provided to the users and a maintenance log should be maintained for storage of the evidence of the illegal activity (Kale 2014). The risk can be categorized into different types such as physical security, hardware security, communication security and data storage security. Physical security of the information system- The data storage rooms and the server rooms should be kept under lock and key and entry of the unauthorized persons should be restricted. The physical access of the servers can make the system vulnerable and the data may be access by the people or virus can be implanted in the server to make the information system unavailable for the users. Security of the hardware- Proper air conditioning should be used routers and the servers and the firmware of the software versions should be upgraded with recent patch and updates to protect the information system from sabotage attacks. Communication - The client relationship management employees must be included for taking criticism about the necessity of the system. A self-appraisal polls is utilized that helps the group to distinguish the hazard related with the framework (Jouini, Rabai and Aissa 2014). The eHealth security strategy is dissected by the security group and they are recorded and lined up with the present framework arrangements for checking on. Meetings were led with the distinctive partners for understanding the framework and approve the assembled data in regards to the framework Data storage security- There are different testing tools available and it should be used for accessing the vulnerability of the network and the configuration should be reviewed for protecting the data center and increasing the efficiency of the information system. Conclusions The report expresses the present status of the STP in executing new PC framework and new advances for dealing with the general population customer. The task is contrasted and the sound undertaking administration practices and proposal is given to close the project. Facilitate proposal for the change of the STP future administration rehearse is likewise given in the report. The aptitudes that a task administrator should have to legitimately deal with the undertaking are examined in the report and in conclusion some guidance is given to the CEO for dealing with the project. The data framework is intended to record every one of the records of the items sold by the organization and the points of interest of the clients for expanding the proficiency of the framework. The report is set up to depict the foundation of the undertaking, scope and the objectives of the task. The security of the data is the principle worry for the advancement of the project as per the necessity. The information utilized by the data framework ought to be secured from illicit access and the gadget interfacing with the data framework ought to likewise be secured for evacuation of the hazard related with the improvement of the framework. Recommendations The following recommendations n are made for the improvement of the efficiency of the information system deployed in the organization. Increasing the availability of the information All the organizational information such as the stocks available, shipment details, invoice, payment records, customer information should be recorded in the database of the information system such that it can be used for generating report and reduce the chances of the human errors. Inclusion of accurate information A proper validation should be used and the development of the data entry page using drop down list or check box reduces the chances of wrong entry of data in the information system. The information provided should have the option of modification such that the user go back to the previous stage for solving the errors. Checking the compatibility of the application software The external software used in the information system should be checked if it is compatible and works according to the requirement because a flaw in the application software can cause a loop hole in the information system and open path for the hackers to intrude into the information system and get the access of the data. Identification of the authorization The person who are given the full control of the information system should be listed and the improvement can be made in the authorization for making recommendation and taking appropriate action to revise the organization policy and procedures and ensuring that the policy are followed by the group of employees working on the organization. Submission of the proposal A proposal regarding the problems and the actions that is required to be performed for the improvement of the information system should be submitted by the stakeholders involved in the development and using the information system for the removal of the constraints and increasing the efficiency of the system. Bibliography Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion.Journal of Economic Theory,166, pp.536-585. Bernroider, E.W., Wong, C.W. and Lai, K.H., 2014. From dynamic capabilities to ERP enabled business improvements: The mediating effect of the implementation project.International Journal of Project Management,32(2), pp.350-362. Chang, J.F., 2016.Business process management systems: strategy and implementation. CRC Press. Drumm, O., Lutz, B., Palmin, A. and Wolf, G., Siemens Aktiengesellschaft, 2016.Planning and Engineering Method, Software Tool and Simulation Tool for an Automation Solution. U.S. Patent Application 15/083,525. Fragkiadakis, A.G., Tragos, E.Z. and Askoxylakis, I.G., 2013. A survey on security threats and detection techniques in cognitive radio networks.IEEE communications surveys and tutorials,15(1), pp.428-445. Galy, E. and Sauceda, M.J., 2014. Post-implementation practices of ERP systems and their relationship to financial performance.Information Management,51(3), pp.310-319. Golriz, A. and Jaber, N., 2015, October. A High Assurance Firewall in a Cloud Environment Using Hardware and Software. InInternational Telemetering Conference Proceedings. International Foundation for Telemetering. Harmon, P., 2014.Business process change. Morgan Kaufmann. HassabElnaby, H.R., Hwang, W. and Vonderembse, M.A., 2012. The impact of ERP implementation on organizational capabilities and firm performance.Benchmarking: An International Journal,19(4/5), pp.618-633. Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems.Procedia Computer Science,32, pp.489-496. Kale, V., 2014.Implementing SAP CRM: The Guide for Business and Technology Managers. CRC Press. Kumar, M., Kaur, N., Kaur, S. and Singh, R., 2016. Different Security Threats and its Prevention in Computer Network.International Journal of Advanced Research in Computer Science,7(6). Oseni, T., Rahim, M.M., Smith, S.P. and Foster, S., 2014. An initial empirical evaluation of the influence of erp post-implementation modifications on business process optimisation. Parvizi, R., Oghbaei, F. and Khayami, S.R., 2013, May. Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation. InInformation and Knowledge Technology (IKT), 2013 5th Conference on(pp. 274-278). IEEE. Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016.Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley Sons. Rouhani, S., Ghazanfari, M. and Jafari, M., 2012. Evaluation model of business intelligence for enterprise systems using fuzzy TOPSIS.Expert Systems with Applications,39(3), pp.3764-3771. Schniederjans, D. and Yadav, S., 2013. Successful ERP implementation: an integrative model.Business Process Management Journal,19(2), pp.364-398. Seo, G., 2013.Challenges in implementing enterprise resource planning (ERP) system in large organizations: similarities and differences between corporate and university environment(Doctoral dissertation, Massachusetts Institute of Technology). Sousa, K.J. and Oz, E., 2014.Management information systems. Nelson Education. Teittinen, H., Pellinen, J. and Jrvenp, M., 2013. ERP in actionChallenges and benefits for management control in SME context.International Journal of Accounting Information Systems,14(4), pp.278-296.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.