Friday, June 26, 2020
The Global RISK Example For Free - Free Essay Example
On a global scale, several important firms are determined to attain ââ¬Å"Agile managementâ⬠as this enhances a companys capability to swiftly manageâ⬠internal and externalâ⬠transformation and gain competitive advantage (Khosrow-Pour, 2001, p 831). An ââ¬Å"agileâ⬠company is adept in its ability to ââ¬Å"detect changing markets, rapidly learn to take advantage of these market changes, detect new techniques, adapt these techniques to organisational cultureâ⬠in order to incorporate them into the company ââ¬Å"while maintaining their spiritâ⬠, efficiently exploiting them to meet changing ââ¬Å"standards in diverse marketsâ⬠and adapting ââ¬Å"products to individual preferencesâ⬠(Desouza, 2006, p123). To be able to react rapidly to transformation by making ââ¬Å"quick decisionsâ⬠on methods to counter the transformation and consequently execute the methods, it is crucial for organisations to effectively utilis e Information Technology (Khosrow-Pour, 2001, p 831). A Management information System (MIS) is useful by way of its procedure and as such it must be effortlessly up to standard for a firm (Khosrow-Pour, 2001, p 831). The usefulness of MIS is measured by how much the system is utilised, whether end-users are content with the system, ââ¬Å"favourable attitudes about MIS functions, achievement of objectivesâ⬠and whether it increases business profitability (Khosrow-Pour, 2001, p 831). MIS Risk As an MIS system is made up of ââ¬Å"hardware and softwareâ⬠, consequently transformations in the system make it susceptible to a ââ¬Å"penalty of changeâ⬠such as ââ¬Å"system failureâ⬠or other costly time consuming risks (Khosrow-Pour, 2001, p 831). As such technology must be effectively applied to the MIS ââ¬Å"infrastructure (hardware, software and data)â⬠in order to eliminate or minimise system risk (Khosrow-Pour, 2001, p 831). MIS issue A ââ¬Å"field researchâ⬠at a UK bank to analyse a ââ¬Å"multidisciplinaryâ⬠move towards ââ¬Å"empirical investigationâ⬠on handling Information Technology concluded that the dialogue between those ââ¬Å"who request development of a management information system (MIS), the client or sponsor and the technologistsâ⬠who build the systems usually creates a ââ¬Å"confused pictureâ⬠(Currie, 1995, p7). The clients are usually not clear about their systems requirements and consequently this leaves room for interpretation on the part of the ââ¬Å"technologistsâ⬠(Currie, 1995, p7). In addition, an ââ¬Å"ad hoc approachâ⬠originates from problems experienced by ââ¬Å"project managersâ⬠in detecting suitable ââ¬Å"financial and non-financial performanceâ⬠measures for continuous observing and managing of Information Technology projects (Currie, 1995, p7). How to address the MIS issue The issue is a result of miscommunication between the business and Information Technology. Management has to ensure that the dialogue between the two teams is effective and also that organisation goals such as high productivity and cost reduction are included in the planning of an MIS systems implementation or change. Design/UCD Failures Strategic Information Systems can sustain and ââ¬Å"shapeâ⬠business strategy to impact ââ¬Å"organisational performanceâ⬠in a relationship that forms a ââ¬Å"trilogyâ⬠(Croteau et al, 2001, p78) however; the design and developmentâ⬠of Information Systems plays a major factor in the use of Information Technology (Das et al 1991, cited in Croteau et al 2001, page 80). User centred design places the end users requirements and ability at the ââ¬Å"forefrontâ⬠, conversely current technology focuses on the quest for technology answers with no consideration for the end users requirements in terms of ââ¬Å"functionalityâ⬠and ease of use (Kent et al, 2003, p87). UCD Failures An eminent online book retailers first online ordering system had a major costly flaw (Hambling et al, 2008, p10). System developers had included an electronic refund facility that allowed users to receive credit on their debit or credit cards if they purchased a negative number of books (Hambling et al, 2008, p10). During testing the systems developers did not anticipate that online shoppers would try to order a negative number (Hambling et al, 2008, p10). The program was amended to allow only the retailers administrative staff to carry out refunds (Hambling et al, 2008, p10). Another UCD failure resulting from inadequate software design and testing was when the ââ¬Å"European Space Agency Ariane 5â⬠was initially launched in June 1996 and failed after 37.5 seconds (Hambling et al, 2008, p10). A software glitch resulted in the rocket deviating from its ââ¬Å"vertical ascentâ⬠and had to be put into ââ¬Å"self-destructâ⬠mode to prevent the disastrous cons equences of an active horizontal rocket (Hambling et al, 2008, p10). Furthermore, when the UK government launched ââ¬Å"online filing tax returnsâ⬠, a weak security design allowed access to other users confidential earnings data regardless of log in location (Hambling et al, 2008, p10). How to prevent UCD failures A manager must ensure that the end users of the system are the main focus of any system design with particular reference to a users computer skills, security and the main objective of building the system, to improve business process. Consequently if the design is user focused; it is bound to function as intended. In addition, User Acceptance Testing (UAT) is the process whereby end users test a system to ensure that it ââ¬Å"meets their business needsâ⬠(Hambling et al, 2008, p45). Although this process is seen as the responsibility of the end users of a system, it should be managed by managers to prevent errors (Hambling et al, 2008, p45). Project Failures A failed project is one that exceeds its set budget, over runs, does not incorporate organisational goals or just one that is cancelled (Standish Group International 1994, cited in Linberg 1999, page178). The proportion of IT systems failure is still high when compared to other technologically advanced projects (Yeo, 2002) and although there have been some ââ¬Å"success storiesâ⬠in systems ââ¬Å"developmentâ⬠projects these have been overshadowed by ââ¬Å"broadly publicised failuresâ⬠(Linberg, 1999, p177). When Information Systems projects fail, the trustworthiness of technical staff is negatively impacted (Remenyi, 1999, p5) and it is believed that the lack of risk management has greatly contributed to these project failures (Remenyi, 1999, p9). With particular reference to Information Systems projects, failure can range from little technical hardware problems to total ââ¬Å"system failureâ⬠that harms a firms business activity by creating huge cost s (Remenyi, 1999, p19). Consequently, ineffective risk management is synonymous with leaving the results of a project to chance and ââ¬Å"unfounded optimismâ⬠(Fairley 1990, cited in Remenyi 1999, page9). Project Failure Issues When there are unrealistic expectations and people ââ¬Å"try to do the impossibleâ⬠, projects are likely to fail (Linberg, 1999, p177). A good example is a company bending over backwards in an attempt not to lose a significant client (Linberg, 1999). An unrealistic software development project deadline was set and when programmers protested profusely that is was just impossible, more programmers were added on to the project that was already operating around the clock (Linberg, 1999). Needless to say the project failed and the client was not retained (Linberg, 1999). Another example of a failed project was a large one that over run by at least eighteen months, had eight absconding ââ¬Å"team leadersâ⬠out of a total nine, lacked clarity in the project definition and involved excessive working hours of more than sixty a week. However because the project was eventually finished, the project programmers did not have see the project as a failure even though it was du e to the very late completion and inadequate project planning (Linberg, 1999). How to address the project failure issues The approach to the first project should have been honest and realistic in order to meet the clients needs and also increase the likelihood of repeat business with the client. This is due to the fact that ââ¬Å"a consulting engagement is successful if the consultant has met client expectationsâ⬠(McLachlin, 2000) and if this is the situation thenâ⬠the consultant has enhanced his or her reputation, with expectations of future revenue streams ââ¬â whether or not any immediate income has been receivedâ⬠(McLachlin, 2000). Consequently business managers should first ensure that they can deliver before taking on the task. With reference to the second project failure, a carefully structured project plan with a clear project definition needs to be in place before management embarks on a project. A well structure project plan with carefully allocated resources, effective risk management and well monitored project stages will introduce and enforce project and b udget controls. E-Commerce and its Issues E-commerce is a compressed name for a broad range of unified business ideas, ââ¬Å"technologies and cultural phenomenaâ⬠(May, p2). E-commerce is about online retail commerce for certain individuals and for others, it concerns the sale of advertising space amongst other things (May, p2). Nevertheless, irrespective of its definition, E-commerce has warranted a lot of interest and in fact it is a vital transformation in ââ¬Å"the way business is conductedâ⬠(May, p2). E-commerce has resulted in creating new prospects for several businesses in various industries to contend in the ââ¬Å"global marketplaceâ⬠(Chaffey, 2006, p4). As a result of readily available information on businesses, goods and services, companies are rapidly expanding the customer base and retaining customers due to the resulting improved client-customer relationships (Chaffey, 2006, p5). However, E-commerce software programs need more technical support than a good number of conventional â â¬Å"business systemsâ⬠(May, 2000, p222). Business to business and ââ¬Å"business-consumerâ⬠online programs demand twenty four operations around the clock, seven days a week right through the year (May, 2000, p222). Even though mirror sites are run to ensure ââ¬Å"scalabilityâ⬠, web systems failure still occurs with several pages experiencing downtime (May, 2000, p222). E-commerce Issue A website experienced an overload and needed to be taken offline in November 2005 due it being incapable of handling a lot of simultaneous logins resulting from publicity on some information on the website (Hambling et al, 2008, p10). Although this is a frequent occurrence in todays online activity, the main issue in E-commerce is security risk and as the confidence of shoppers determines the frequency and amount of purchases made online, this is indeed a very significant point. An online consumers perception of security is affected by absence or presence of ââ¬Å"third party certificationâ⬠software on their websites (Pingjun et al, 2008). A review of a representation of the link between ââ¬Å"third-party identifying logos, trust transfer and trust build-upâ⬠based on information acquired from an ââ¬Å"online surveyâ⬠confirms that when online consumers see a ââ¬Å"third-party sealâ⬠on a shopping website, they tend to transfer their trust in the s ecurity ââ¬Å"logoâ⬠to ââ¬Å"online e-marketersâ⬠(Pingjun et al, 2008). These issues should be handled by anticipate overload from a technical perspective and also by ensure the consumer confidence is gained and retained in E-commerce. New Technology Todays world is an age of unique transformations within technology in the midst of technology transforming communication, work, how business is conducted and how people socialise (Boreham, 2006, p1). When new technology is implemented, it is expected that management will impact how it is adapted by the workforce, despite this, an empirical study states otherwise (Leonard-Barton et al, 1988). When new technology is implemented, staff with existing technical abilities adapt automatically whereas staff low on computer literacy skills wait to be directed by management (Leonard-Barton et al, 1988). However, as an increasing amount of time and ââ¬Å"investment capitalâ⬠is absorbed by Information Technology and its consequences, business managers have a developing ââ¬Å"awarenessâ⬠that technology cannot be the ââ¬Å"exclusive territoryâ⬠of specialised IT companies or the Information Systems department (Porter 2008, p73). Businesses notice their competitors emp loy Information Technology to gain competitive advantage and acknowledge the necessity to become ââ¬Å"directly involved in the management of new technologyâ⬠although ââ¬Å"in the face of rapid change, they dont know howâ⬠(Porter 2008, p73). New Technology Issues New Technology is usually opposed as it usually involves change and people assess the size of the change required. New technology also usually results in a ââ¬Å"large-scale organisational changeâ⬠and consequently extra caution is applied as individual feelings must be influenced to get people to participate in new technology (Kotter et al, 2002, p1). In theory the opposition to new technology also known as the ââ¬Å"crisis of progressâ⬠is as unconnected as it is connected in that community response to new technology impacts new technology ââ¬Å"in a circular processâ⬠(Bauer, 1997, p2). Management should address resistance to new technology by first ensuring a ââ¬Å"readiness for changeâ⬠through training and guidance. References Bauer M, 1997.Resistance to New Technology: Nuclear Power, Information Technology and Biotechnology; Cambridge University Press Boreham P., Parker R., Thompson P., Hall R., 2006. New Technology Work; Routledge Currie W. 1995.The IT strategy audit: formulation and performance measurement at a UK Bank. Managerial Auditing Journal.10 (1). pp 7-16.DOI:10.1108/02686909510077343. www.emeraldinsight.com. (Accessed: 15th February 2010) Chaffey D., 2006. E-Business and E-Commerce Management; Prentice Hall Desouza K. C., 2006.Agile Information Systems: Conceptualization, Construction, and Management; A Butterworth Heinemann Title Hambling B., Morgan P., Samaroo A., 2008. Software Testing: An ISEB Foundation; British Computer Society Kent S. T., Millet L. I., 2003. Who Goes There?: Authentication Through the Lens of Privacy; National Academics Press Khosrow-Pour M., 2001.Managing Information Technology in a Global Economy: 2001 IRMA Proceedings; IGI Publishing Kotter J P and Cohen D S(2002), The Heart of Change; Real-Life Stories of How People Change Their Organizations, Harvard Business School Press Leonard-Barton D., Deschamps I., 1988.Managerial Influence on the Implementation of New Technology. Management Science. 34(10). Pp 1252-1265.www.jstor.org. (Accessed: 16th February 2010) Linberg K. R., 1999, ââ¬ËSoftware developer perceptions about software project failure: a case study. The Journal of Systems and Software.49 (1). pp 177-192.www.elsevier.com. (Accessed: 16th February 2010) May P., 2000. The Business of Ecommerce: From Corporate Strategy to Technology; Cambridge University Press McLachlin R. D., 2000,Service quality in consulting: what is engagement success, Managing Service quality, 10(4).pp. 239-247. www.emeraldinsight.com. (Accessed: 16th February 2010) Pingjun J., Jones D. B., Javie S., 2008. How third-party certification programs relate to consumer trust in online transactions: An exploratory study .Psych ology and Marketing. 25(9). Pp 839 -858. www3.interscience.wiley.com. (Accessed: 16th February 2010) Porter M. E, 2008, On Competition; Harvard Business School Press 2nd Edition Yeo K. T., 2002.Critical Failure Factors in Information systems projects. International Journal of Project Management.20(3). www.elsevier.com. (Accessed: 16th February 2010)
Subscribe to:
Posts (Atom)