StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Fundamentals of Information Systems - Book Report/Review Example

Cite this document
Summary
This book review "Fundamentals of Information Systems" discusses enterprise architecture for profitability, Stair and Reynolds (2012) give practical means by which companies who implement information systems can benefit in terms of profit-making…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Fundamentals of Information Systems
Read Text Preview

Extract of sample "Fundamentals of Information Systems"

?Review Discussion Enterprise Architecture as Strategy Chapter The emphasized on the need for very firm foundation for the execution of bigger organizational tasks. Making reference to how present day global organizations and companies are finding it extremely difficult to catch up with so called smaller and medium scale businesses from unpopular locations like India, the authors allude that the only secret that the so called smaller and medium scale businesses are holding is the they had very firm foundation for their business. Interestingly, the foundation being referred to was based on modern technology. With something that started as mere mingle with daily fun, smaller and medium scale businesses have succeeded in drawing the use of information systems, corporate social media and other new forms of media to their advantage and are yielding the fruits already. Because of the benefits they have recorded, these unknown companies continue to embed “technology into their processes so that they can efficiently and reliably execute the core operations of the companies” (Ross, Weil and Robertson, 2006, p. 2). Chapter 2 One beauty of technology to the execution of modern business needs is the dynamism it presents. By dynamism, reference is being made to the ability to flexibly manipulate modern technology to suit the very needs of an identified company. It is in this direction that the authors in Enterprise Architecture as Strategy call for the need for all companies to clearly define the model on which they want to operate their information systems and other technology orientations on. There are several companies and organizations who by the mere fact that most other companies are into the use of technology have also taken up to the use of technology. These companies do not take time to scrutinize their business to find the most pressing needs that technology could address and therefore select the wrong models. It is important for such companies to practice the use of models haphazardly to note that “the operating model decision (or lack thereof) has a profound impact on how a company implements business process and IT infrastructure” (Ross, Weil and Robertson, 2006, p. 26). Chapter 3 When the right selections are done, the phase of implementation of models would be quite easier for modern companies and enterprises. Indeed it is very important to have a firm foundation laid for the implementation of a given operating model decision because the implementation stage is very complex and detailed. There are a number of approaches to use in getting the operating model decision underway. The authors are however very much for the use of enterprise architecture. The basis of enterprise architecture is in the belief that “responding to market opportunities is critical to any business – particularly in new areas where the company must establish a presence and a value proposition quickly” (Ross, Weil and Robertson, 2006, p. 46). This is in saying that if enterprises and companies decide to take the designing (architecture) of their enterprises into their own hands, they are offered the opportunity to manipulate their models to suit the very needs of their present situation. Fundamentals of Information Systems. Chapter 1 As if writing a response on the need to start business strategies with core foundations by Ross, Weil and Robertson (2006), Stair and Reynolds (2012) write the first chapter of their book, giving the very basics of information systems. Fusing the two ideas, it would be true to argue that a core way to ensure a firm foundation for any organization or business that wants to succeed on the wings of modern technology is to resort to one of the many forms of information system. This is because information systems have been proved to bring about a lot of benefits including “speed, accuracy, reduced cost, and increased functionality” (Stair and Reynolds, 2012). It therefore becomes more like an inevitable benefit to project managers to have in place information systems technologies that meet their immediate needs. Chapter 2 The dilemma of many project managers undertaking information systems projects of different nature has been on how to get the right hardware and software in place to get their projects kick start. This chapter is therefore dedicated to treating the right hardware and software needed to get various forms of information systems underway. The authors go very detail with specific hardware and software that can and should be used in building information systems. Because the duties of companies and organizations have entailed the handling volumes of data in their database, the second chapter takes critical look at secondary storage and input and output devices. With modernity, it has been advocated that under no circumstance must companies suffer loss of data and information because of a ill-structure information systems storage facility. Enterprise Architecture as Strategy Chapter 4 The dilemma working one’s way through with a new operating model and having to deal with regular business operations at the same time is an issue addressed in the fourth chapter of Enterprise Architecture as Strategy. The authors explain that “management needs to redesign and then implement new systems, processes, and IT infrastructure without sabotaging daily operations” (Ross, Weil and Robertson, 2006, p. 70). To realize this, it is important that the processes of navigating through the stages of enterprise architecture maturity are done cautiously. To avoid mishaps and the missing up of corporate processes, it is advised that there should be a well defined routine or pattern in determining the maturity of enterprise architecture. The authors notice four of the commonly used maturity stages as business silos architecture, standardized technology architecture, optimized core architecture and business modularity architecture. Chapter 5 The title of the fifth chapter of the book Enterprise Architecture as Strategy is ‘Cash In on the Learning’. as the topic suggests, the authors advocate for the need to be Constance learning and transformation in modern businesses when it comes to the application of technological systems. For example the authors could be quoted as saying that “today’s managers must redesign their companies as Ford did – this time to take advantage of the potential of modern technologies” (Ross, Weil and Robertson, 2006, p.92). Using Henry Ford as an example, Ford was able to stand out in his days to transform the car manufacturing industry. Ford used complicated ideas and systems. Today, businesses seem to be having an all easy approach to strategizing for change because of technology, which was not present in the days of Ford. It is sad however that corporate organizations are not ready to learn on the most modernized systems in information and communication technology to suit their immediate needs. Chapter 6 There are several companies who have opined that they will not resort to operating models for their enterprise architecture because the process to too cumbersome and confusing. What most of these people forget is that there are several ways of killing a cat and that there is not just one way out. The big bang approach has been used for a very long time in most quarters. Though the approach has worked for a number of companies, the authors advise all who feel that they are not comfortable with the big bang approach to resort to implementing their project building one at a time (Ross, Weil and Robertson, 2006, p. 118). This is because this would offer them the opportunity to spend their resources within their means and not exceed them. Once things will not be rushed through, project managers can comfortably say that budgeting, monitoring and evaluation will all work according to plan. Fundamentals of Information Systems Chapter 3 As a major infusion of the discussion on data and information storage that was started in second chapter, database systems are looked into detail in the third chapter. It would be observed that in their book, Enterprise Architecture as Strategy, Ross, Weil and Robertson (2006) talked about defining operating models. Now a perfect response to this is given by asserting that a well defined operating model is one that matches up to the database size of the company involved. If for some reasons therefore a company chooses a database system that is smaller than the data at the disposal of the company, then a wrong definition of operating model was done. The operating model must also be designed in a way that conforms to business intelligence by size. It should however be stated that companies who have dreams of future expansion strategies can select database systems and business intelligence that are far larger than their present size so that there will not be the need for restructuring in the future. Chapter 4 Whiles discussing the need to navigate the operating model via enterprise architecture, Ross, Weil and Robertson (2006) mentioned the use of communication systems that meet modern demands, trends and expansion. In the fourth chapter of their book, Stair and Reynolds (2012) were very clear and loud in naming some of the specific communication technologies that can be used. They paid a lot of attention to the internet, intranets and extranets. These are all telecommunication technologies that have come to make information systems feasible and realistic. In fact at a very faster rate, companies who implement information systems are making very good use of the telecommunications in areas such as electronic commerce, which makes it possible for even smaller businesses and organizations to have global image, customer base and sales points. Enterprise Architecture as Strategy Chapter 7 The authors continue to push for the importance and need for enterprise architecture saying that it can be used extensively to guide outsourcing. Outsourcing in information technology implementation strategies is almost inevitable. This is because most companies who would like to tow the line of information communication strategies do not have immediate provision of resources to make this possible. In order to benefit from the reasons and aims of outsourcing, “which includes lower cost, variable capacity, risk mitigation process reengineering and the opportunity to focus on core capabilities”, Ross, Weil and Robertson (2006, p. 144) explain that there are three types of outsourcing relationships that companies can look up to. These are named as strategic partnership, co-sourcing alliance and transaction relationship. Each of these have its own benefits and the need to select any one of them should be based on the current needs of the company involved. Chapter 8 After most of the steps that have been described above are taken, companies and organizations using enterprise architecture to enhance their information systems operating models can now be thinking of reaping the fruits of their labor and that is profit making. The authors are however cautious in signaling that profitability will not be achieved automatically. Rather, it will take the companies to continue the hard work of feasibility studies that they started. This is because the presence of enterprise architecture is not peculiar to only one company. As long as there are competitive, the need to build a competitive advantage over other competing agents would be the only way to ensure that foundation is laid for profit making. It is therefore advised that here should be a conscious effort of under taking target marketing so as to give just what the market is seeking for to it. Chapter 9 The ninth chapter is the concluding chapter of the book, Enterprise Architecture as a Strategy. Strategically, the authors discuss the issue of leadership. This is because at this point, it is expected that the enterprise might have been built in its complete form. All that would be left would be an effective leadership to ensure that the right provisions are made for the smooth takeover of technology based operating models. Consequently, leaders are advised to be very open in their leadership style. Knowing that technology is a learning process in itself, the authors are of the view that if leaders will stick to a democratic leadership style that brings the ideas and philosophies of all stakeholders on board, it is certain that the long term goal of basing on dynamism to transform change will be achieved. Fundamentals of Information Systems Chapter 5 An elaborative discussion of the use of telecommunications is made in the fifth chapter of Fundamentals of Information Systems. In a much related manner to the need to exploit enterprise architecture for profitability, Stair and Reynolds (2012) give practical means by which companies who implement information systems can benefit in terms of profit making. In the view of the writer, electronic and mobile commerce as well as enterprise systems is the way out. Quoting a number of companies and institutions who are using mobile commerce for profit purposes, the authors advised that all forms of electronic commerce is a positive development and trend that when all stages of information systems are adhered to strictly, project managers should be in a position to benefiting from their efforts through some of these means as electronic commerce. Chapter 6 There is a concluding urgency for securing the safety of information systems. This is because technology security has become an issue of global concern of late. It is very unfortunate that after a lot of efforts have gone in to building very sound and formidable information system, the absence of a very vibrant monitoring technique results in instances were the security of the system is breached and unscrupulous people take advantage to break into the system of companies. To avoid this, the advice given by Ross, Weil and Robertson (2006) on having effective leadership must be applied in this situation also. REFERENCE LIST Ross, J., Weill, P., & Robertson, D. (2006). Enterprise architecture as strategy: Creating a foundation for business execution. Boston: Harvard Business School Press. Stair, R., & Reynolds, G. (2012). Fundamentals of Information Systems. Boston: Course Technology Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Review Discussion: Enterprise Architecture as Strategy Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1443620-review-discussion
(Review Discussion: Enterprise Architecture As Strategy Essay)
https://studentshare.org/information-technology/1443620-review-discussion.
“Review Discussion: Enterprise Architecture As Strategy Essay”, n.d. https://studentshare.org/information-technology/1443620-review-discussion.
  • Cited: 0 times

CHECK THESE SAMPLES OF Fundamentals of Information Systems

The Use Of Internet In Business

Fundamentals of Information Systems.... Fundamentals of Information Systems.... -GovernmentIt is a process whereby ICT is used in the sharing of information amongst different parties.... There also exists electronic payment systems that are used to enhance businesses transactions by companies; this allows easy payment of goods and services (Stair & Reynolds, 110).... This suggests that companies implementing electronic commerce into their systems have a better chance of gaining more profits, and are more competitive in the market than organizations that do not use electric commerce for business purposes....
1 Pages (250 words) Essay

EISA: Evaluating and Meeting the Security Needs

Fundamentals of Information Systems security.... The information systems security officers guide: Establishing and managing an information protection program.... Managing information systems security and privacy.... In fact, research shows that the greatest challenge that the organizations faces are the information technology assets and infrastructure.... To ensure stability of the department's… Various researches have proven that the employees in the department contribute a whole lot to the security of the department's information asset....
2 Pages (500 words) Research Paper

The Database Management System

The external data sources include customers, Fundamentals of Information Systems Good decision making skills are vital to solving any problems in information and support systems.... Fundamentals of Information Systems, 7th ed.... Financial management information systems provide financial information to executives.... The internal data sources include TPS and ERP systems, data warehouses and data marts.... The internal data sources include TPS and ERP systems, data warehouses and data marts....
2 Pages (500 words) Essay

Fundamental of management information system

Fundamentals of Information Systems.... The financial… at the head office is straining to collect data from all the fifty branches and analyze them before consolidating them into one document that is then used as a profit and loss statement. This move already shows that the company is not in a position to clearly come up with Fundamental of Management information System Snyders of Hannover which is a multinational company has proved to be using an old-school form of financial tracking which is not up to its standard....
1 Pages (250 words) Essay

Capstone Experience (Business Metrics) 2

Fundamentals of Information Systems.... This follows from the derivation of information that ensures that the unit maintains sufficient stock for its operations.... The calculation is done by comparing on-hand inventory against the demand and deliveries expected....
1 Pages (250 words) Assignment

Intro to Mgt Syst

?Fundamentals of Information Systems security.... Lucey (2005) notes that there is need to protect personal information such as financial data, medical records, political record,… I believe that it is important to protect personal information of a person because vulnerabilities of personal information have significantly increased Ethical Issues in information systems YourFirst YourLast Information or data privacy is an ethical issue in information systems that refer to the aspect of protecting an individual's personal information....
2 Pages (500 words) Assignment

Impact of Information Systems

Fundamentals of Information Systems.... The… ve impacts of ICT to organizations and schools far surpass the negatives and it is no wonder is growing at a very high rate on a daily basis (OECD, 2004). The first element is the hardware which is the computer itself and any other physical machines aiding in the process such Impact of information systems Affiliation: One of the greatest values ICT had addedto the life of the people using it is increasing their productivity and saving of their time....
1 Pages (250 words) Essay

Fundamentals of Information Systems Security

The author of this term paper "Fundamentals of Information Systems Security" states that information security aims at protecting information from unbiased or unauthorized use, it also protects information from being dislocated or used in a manner that will make it accessible to an authorized user.... Julius Caesar has been accredited to the invention of information security as he came up with techniques that could ensure internal information was not leaked to an unwanted person....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us