.

Thursday, April 4, 2019

Appropriateness Of Tesco Enterprises Information Systems Information Technology Essay

Appropriateness Of Tesco Enterp countermands Information Systems Information Technology seekThe world is fast becoming a global village. The governances apply to collect readings yesterday are diverse from those used today. More advanced and competitive instruction system are being produce everyday. every(prenominal) trade no matter how sm altogether, like a sm on the whole retailer store, depends on high applied science to store data. To them now it is a living tool and the still keep their doors open to welcome raw form of change in culture systems. Information system has now become the bread of invigoration in every organizational operation. This paper is going to expatiate more on how info system operates to enhance business in our world today. Tesco enterprise will be use as the stride stick to better understand the maturation of Information systems.Findings2.1 Information Systems.Definition.According to Kenneth and Jane Laudon, Information systems can be define d technically as a set of interrelated comp starnts that collect to echo process, stores, distributes teaching to hold water decision making and control on an organization.Information systems are the systems of persons, data records and activities that process the data of information in a given organization, either by dint of manual processes or automated processes. This system is incorporate of people, procedures, softwares, hardwares and data that helps in in force(p) decision making. Philip Kotler says A marketing information system consist of people, equipments and procedures to gather, manakin and analyze, evaluate and distribute infallible, timely and accurate information to marketing decision makers.According to Erik BOHLIN, Stranford L. LEVIN, Nakil SUNG, Chang-HO YOON (2004), the effect of information technology systems on globalisation, innovation, growth and productivity are immense. Information technology system has contributed immensely to the globalization o f production and capital markets by reducing cost of information and conversation. They stated that technology has made it easier for multinationals and opposite companies to spread production facilities all over the world, to coordinate international marketing campaigns and to ease collaboration in projects taking place in contrary continents.There are dissimilar types of information systems such as Office Information system, database management system, Decision supporting system and transaction processing system.Information systems are normally created to perform task for which the human brain can not care for well bountiful some of these task are controlling many business processes simultaneously, performing complex calculations and storing large measure of information.Many businesses invest huge amounts of money in information systems for the following reasonsFor rapid production of goods and serveTo develop excellent and effective communication skills.Improve decision m akingHave available justiceFor competitives advantagesFor survivalCustomer and supplier intimacy.It saves time and money and makes life easy and comfortable.Levels of management.There are 3 hierarchical levels of management on an organization the senior level management, the middle level management and the operational level of management.Senior Level focusing.This is the highest level of management. They are concern with making good and effective decisions for the development of the enterprise. They supply answers to questions about the long term plans of the caller-up such as what kind of products will the club be producing in the next five years or what method will they apply to ameliorate their business. There are many kinds of information systems that managers at this level can use in holy order to ease the work and quickly too, some of the systems are seen as followsExecutive Support System. (ESS)It is a report software which helps senior managers transform data into utile summarize reports.It allows them quick assess to reports coming from different levels and different departments in the company such as staffing, billing, cost allocation, scheduling and many others.ESS is most useful to senior managers like Chief Executive Officers in order to enable the make decision easily.ESS fancy the future.ESS relies highly on information MIS and DSS database for decision making. It can not work in isolation slight the company becomes dysfunctional.Middle Management.The main duty of the managers at this level is to monitor the activities of the subordinates, collect information from secondary management and reassemble them and give the feedbacks or report to those at the senior management team.Their reports help in strategic planning thus leading to effective decision making to achieve their objectives.They are liable for implementing the senior managers policies and plans to the workers.They withal need to ensure that employees are well motivated and should act responsibly in maintaining company values.Management Information System (MIS)This system is meant to serve mostly middle managers. It helps them regulate the various operations in an organization. It helps in the internal control procedures. MIS are distinct from regular information systems in that they are used to analyze other information systems applied in operation activities in the organization. OBrien, J (1999).MIS as a system It is a system that makes available the right information to the right person (senior managers) at the right time, place, form and at the right cost.It monitors daily sales, profit and lost accounts.It gathers feedbacks and current reports.It also answers all day to day questions about the company.Inputs of MISCustomer Relationship Management (CRM), this a process created to handle the companys relationship or contact with its customers.Enterprise Resource Planning (ERP). This is a system that helps managers coordinate all the resources in formation and functions of a business.Transaction Process Management (TPS). It records all daily routines in a company.Recommended softwares for MISDatabase retrieve applicationService control manager- a component of Microsoft Windows operating System.Software Configuration Management (SCM) used to track down and control changes in softwares.Decision Support System (DSS).It a group of information systems that support businesses and organizations in decision making activities. It helps most the middle class managers to make quick and effective decisions. It helps middle managers compile important information from a combination of business models, raw data, personal fellowship or documents to solve problems and wherefore take decisions.Functions of DSS.It helps to solve unpredicted problems such as non-routine issues.Deducts impertinent information like price change, government change in tax.It gathers and inventory of current information assets including legacy, dataware house and data marts.It produces comparative sales figures different periods.Finally it presents revenue figures base on new products sales assumptions. sound Components.Knowledge baseUser interfaceThe model ( decision content and user criteria).Holsapple and Whinston (1996) classify DSS in to six frame worksText-oriented DSSDatabase-oriented DSSSpreadsheet-oriented DSSSolver-oriented DSSRule-oriented DSSCompound-oriented DSSDSS support base system can be divided into tercet categoriesPersonal supportGroup supportOrganization supportFirst line managers as operational managers.They control the day to day service in an organization. They focus on manageing the processes to produce and distribute products and serve to customers.Transaction Process System.This system serves the operational level managers. It helps them trace the daily routine in the company for example sales entry and auction pitch. It also helps the managers to monitor status of operations in relation to external environment .3. Appropriateness of TESCO Enterprise Information Systems.TESCO plc is Britains largest retailer enterprise. Tesco furnishs grocery homeshopping go, consumer goods, telecommunication and financial services online.Online shopping is a highly use information system in Tesco. This information system is the direct buying of goods and services over the internet or other deliberation machine networks. Through this system, many businesses have developed out-of-pocket to online competition services.There are other websites besides Tesco that offer hosting services for online stores and small retailers these are Yahoo, Amazon.com and eBay.A collection of online stores are known as Virtual Shopping Malls.Become.com helps online shoppers make the ideal decision on shopping online. That is their mission.Security MeasuresDefinitionThese are steps taken to protect information and information systems from self-appointed users, access, disclosure disruption, modification and destruction. Se curity measures are meant to protect the confidentiality, integrity and availability of information.Tesco has securing tags on its products. This is due to the rise of shoplifting caused by the economic crisis in the country. This was decided by the management team.Many UK businesses whether big or small, depend greatly on American District Telegraph (ADT) or simply ADT, Closed travel Television (CCTV) and Digital Video Recorders (DVR) as a source of integrated electronic pledge system. Tesco is one of those convenience supermarkets that depend highly on the services provided by the above security systems.These security systems provide fast alarm responses to burglary, fire attacks, violence and unnecessary disturbances in Tesco.These security systems reduce a undecomposed and convenient environment for Tesco customers.They help reduce crime wave, protect people and property.Tesco also applies the use of security codes in their online services. This is to ensure that the online c ustomer placing the order is actually in possession of a credit/ debit control panel and that the amount of money in the card is legitimate.All these procedures is to prevent Credit/ Debit card fraudAlso to trace and track down thieves who are in possessions of other peoples cards through well advance information technology.BMT Micro security software makes sures no database after online transaction is stored during online allowance so hackers will not find their way easily into peoples accounts. That is why codes are needed so is will be hard for them to trace.Card Security Code (CSC) or Card Verification care for is another security feature for credit/debit transaction online providing online security against fraudulent cards.Recommended information security. co-ordinated Threat Management (UTM), this is to prevent intruders and softwares from affecting Tesco delicate networks less the loose their data informations.Antivirus is also needed to check Tesco computers for the prese nce of virus that may crash the computers and loss database information that have not only been processed.These antivirus needs constant updates.. foul ComputingCloud cipher is the latest internet base computer system whereby shared resources such as softwares and information are provided to computers. It describes a new suppliement, consumption and delivery Information Technology model services based on the internet. It helps provides easy access to remote computation site provide by the internet.It is a less expensive form of computing. It avoids capital expenditures on hardwares, softwares and services because the pay only provider for they use.Consumption is billed on subscription basis with no upfront cost.Benefits lowly barrier to entry.Share infrastructure and costLow management overheadsImmediate access to a enormous range of applications.The contract can be terminated at any time.According to Nicholas Carr, the strategic wideness of information technology is diminishing as it has become standardized and less expensive.Issues against Cloud Computing.Although taint computing is a less expensive system of computing, enterprises may pay more on operating expenses.Cloud computing has been highly criticized for its lack of privacy between users and their hosting companies. They hosting companies may monitor at will the communication and data stored in their systems. For example the National Security Agency (NSA) that works with American Telephone and Telgraph (AT T) and Verizon Communications, monitors all their phones which make people insecure for lack of privacy.There is no security in cloud computing but the Cloud Computing Alliance has been form to promote security assurances.Tesco is not using cloud computing services. But they can subscribe for it so as to spend less on information technology system.Conclusion.From the above information, we have seen how important information systems are in the development of an organization as it is being appl ied at every managerial level in a business. So it is recommended that business owners should continue searching for more advance information systems that will help ease their supply and dissemination chain.Recommendations.Information system is the only way for businesses to survive the pressure and competition that they are facing. If there is a any business that has not yet be highly connected to advance information systems, then that business should make a strategic plan about implementing cloud computing for a kickoff because it is less expensive and will help the business save for future unforeseen circumstances.ReferencesOBrien, J (1999) Management Information Systems- Manageing Information Systems in the Internet work Enterprise. Boston. Irwin MC Graw-Hill. ISBN 0071123733.Kenneth and Jane Laudon, Managing the Digital Firm, 8th Ed.Kotler, Philip, Keller, Kevin Lane (2006), selling Management, 12th edition. Pearson Education.Erik BOHLIN, Stranford L. Levin, Nakil SUNG, Chan g-HO YOON (2004) Global Economy and Digital Society. Elsevier , Amsterdam.Nichlas Carr, (2008) Clouds and Storms.

No comments:

Post a Comment