воскресенье, 24 февраля 2019 г.

Implementation of an Information System for a Financial Institution

INTRODUCTION Background Ribeiro and David (2001) state that cultivation engineering science over the age has had a number of signifi croupt impact on organizations. Such impacts argon It has created opportunities for competitive advantages amongst competitors in any industry It has modifyd the relationship quick among lymph nodes and organizations It has helped with the tuition of stark naked products as tumesce as service It has tout ensemble in allowed organizations to perform tasks which would adjudge remained impossible without the use of a learning surgerying body t harmonisek. It has trim back the total cost incurred in transaction kneading for slangs and separate fiscal institutions. History of the I. T fill inr Having applied for the post of the I. T organizations manager, listed infra argon my qualifications and teaching about my past puddle become A masters degree in Information organizations with technical background knowledge in Windows Se rver and Desktop technology Professional qualifications in cisco and MCSE with an understanding of whatsoever emcee grade applications including IIS, Apache, Sh argonPoint, DNS, SQL and Foundst unity Reasonable knowledge of braggart(a) enterprise LAN/WAN environments 8 years experience in project management, leadership and organisational skills 7 years IT managerial experience in another(prenominal) monetary institutions 5 years experience with client technologies 4 years working experience developing telling IT for financial institutions History of Progress till Progress bank was schematic in 1999 and up till now does not acquire any I. T de purposement in place. Their node base is relatively small as well as the number of staff.Recently, it mergered with another bank in a bid to make it stronger and this has led to increased operational activities, increased customer base and more staff and a finis to stick in and employ an effective I. T department for the bank . The board decided to set up the department in raise to ease their work, to allow free race of colloquy between the variant departments, to hasten decision make abutes, to improve the turn-around time in their daily operational activities. The board members of the bank compulsion the I. T manager to authorship directly to the Head of Operations of the bank. rough 10 12 reading technology specialists would be required to work with him in the new department and the roles and responsibilities ar to develop, maintain and foul the banks thorny currency and mercenary product management governances, to reconcile ciphers, to manage the cash systems and find disbursement of funds. Some recruitment consultants were consulted to help out with the recruitment of permit dirty dogdidates and so far, 8 plurality have been recruited to work with the I. T manager. These citizenry acknowledge interlocking technicians, network assistants, and network engineers.Responsibilitie s of the I. T manager The major(ip)(ip) tasks and responsibilities of the I. T manager have been identified to be 1. Development of an selective information system for the bank. 2. Coordination, monitoring and supervision of the shoping staff for the ontogeny, traffic patterning, coding, maintaining and modifying application broadcasts for a limited atomic number 18a and small number of projects. 3. Extensively working with the handicraft units of the bank in support of their tune processes, electronic business intercourse and similarly transactional needs. . The provision of analytical support for applications-related activities including customer experience, marketing, technology, human imagery and to a fault the operations department. 5. Leading the deployment of advanced information technology solutions relating to commercial product needs. 6. Recommendation and suggestion of strategies as well as computer hardw ar and software enhancements to increase employee pro ductivities. 7. Administering, recommending and implementing compounds to policies that affect the employees of the several(a) departments. 8.Making the flow of information within the organization easier and faster through the development of the intranet. 9. Making communication a two- way thing i. e. vertical and horizontal. 10. Developing a customer informationbase for the bank. 11. Selecting, developing and evaluating personnel to ensure the efficient and effective operation of delegate functions. 12. Ensuring that the project budget, schedules and instruction execution requirements are completely met. 13. Regular interaction with customers and virtually peer group managers. 14. Ensuring that the organization operates fully in accordance with the established procedures and practices.How to measure the implementation success The success of the implementation of an information system can be measured by taking origin of the pursual i. User satisfaction with the system or with the outcomes of victimization the system. ii. Favorable attitudes on the part of the drug users towards the system. iii. The overall payoff to the organization. iv. The extent to which the system accomplishes the organizational objectives. Limitations The major limitation to be considered is the cost. It would be costly for the organization to fully introduce and to implement an effective information system.A major factor out to be considered is the need for formulation and development of the existing members of staff of the organization. Training and development sessions, on-the-job training, meetings and discussions need to be arranged for the members of staff in a way that it would not interfere with the day-to-day operational activities. The whole process of change may be a cumber whatsoever one for the employees because they would have to enthrall the information and entropy from the various departments from blames which were their major form of transshipment center to the computers. INFORMATION SYSTEMThis refers to the interaction between people, processes, information and technology. It refers to the way people interact with technology to support the business processes. Information systems are unalike from the information and communication technology (ICT) and also from business processes although it has an ICT component and it also helps to reserve the performance of the business processes (Zhu and Meredith, 1995). An information system can be defined as a work system involving activities that are incumbent for the processing (capturing, transmitting, storing, retrieving, manipulating and displaying) information (Wang and Strong, 1996).An information system can be considered as a semi-formal language that supports decision making as well as actions. Components of Information System thither are diverse components of the information system and they include i. I. T comprising of the hardware and the software. ii. information/ Information. iii. Procedures/Policies. iv. People. v. Purpose and vi. conference Networks. Hardware Standards There are distinct standards of computer hardware, the hardware consists of the things that can be seen. The standards entrust be reviewed and revised occasionally based on the emerging desktop technologies and development in software (Avgerou, 2001).It is recognized that in the bank, the ability to share vital information easily and quickly is precise principal(prenominal). Apart from the quick sharing of information, the software environment is also important especially those apply for word processing, databases for the customers, spreadsheets, network browsing and electronic mail. Therefore, the development of a wide calculate infrastructure which is based on unspoiled hardware and software standards will improve the day-to-day operational activities and interactivity between the various departments of the bank.The standards would also help facilitate the quick exchange of inf ormation as well as important documents two within and out-of-door the bank. According to Stair and Reynolds, the hardware standards are based on the perplex technology that is available in addition to the present needs of the bank which then applies to two the windows and the mackintosh platforms. However, for each hardware configuration, some considerations have to be made which include i. roaring connectivity to the banks network. ii. Easy connectivity to the outer systems and other organizations. iii. The in-house experience with the chosen product and the configuration. v. The maximum item which the machine can effectively function. v. The presence of service provided by external hardware repairers. Different references of computers can be getd entirely regardless of the symbol purchased, the minimum configuration should be i. Intel core 2 Duo processor. ii. 2 G RAM because well be using windows Vista. iii. 60 GB hard disk. iv. CD ROM/DVD drive. v. Network connectio n. vi. 3 years warranty. Because of the spirit of the tasks performed by the bank, in that location will be a need to register data, so a DVD+R drive is recommended. Recommendations on what to purchaseMonitors Flat panel monitors with high resolutions are recommended due to cost constraint, but as time goes on, we could change them to dual monitors. Printers HP Laser squirt P2015dn (monochrome) and HP Color Laser Jet 2605dn (color) is recommended. Scanners USB scanners are recommended. other(a) Peripherals much(prenominal) as Modems, NICs and Drives From previous experience, a individualised relationship has been developed with MNJ Technologies deal so it is recommended that supplies be purchased from them. Software Standards The software standards have a can of advantages and these include 1. An improved data sharing to ensure . The sharing of data between applications such as word processors, databases, spreadsheets and so on. b. That there are identical resources on eac h of the desktop to provide easy rapture of information and to serve as a consistent tool-set for all the bank workers. c. A consistency of file format to provide optimal file sharing between exclusives, units and departments within the organization. 2. An improved training which concenteres on a. group training in various courses and workshops for different levels of user proficiency i. e. the introductory, intercede as well as the advanced stages. b.Computer based training courses which is centered on selected software packages. 3. An improved support from the I. T support staff to focus on a. The depth of knowledge of application alternatively of the breadth of the large number of applicants. b. Product expertise. 4. Smoother software trigger and upgrades to ensure a. The proper generalisation of the different software for the new computers commonly making it a part of the initial hardware installation. b. That routine installation is made instead of a specialized proce ss for each person resulting in maximization of time and resources. c.That upgrades are tested and properly authenticated in site to reduce potential incompatibilities. Types of software standards 1. Fully back up software it is my responsibility as the I. T manager to ensure that the inhibit software is installed, to troubleshoot software problems, to provide training courses and to provide the documentation of selected packages. perspective productivity suite includes Microsoft word, Microsoft excel, PowerPoint, Access, and MS Office. i. Electronic mail/calendar ii. weathervane browser which includes internet explorer 6, safari 1 (Mac OS 10. 2), Firefox 2. iii. weather vane course development Desire2Learn. v. Web page development Dreamweaver MX. v. Image modify Adobe Creative Suite 2. 0. vi. Operating Systems Windows XP and Windows Vista. vii. File transfer Transmit, Filezilla 1. 7. viii. Other utilities PowerArchiver 2000, Norton Antivirus 10. 15, Print Key 2000. ix. N etwork operate system Netware 6, Microsoft waiter. x. Network clients Netware client 4. 9 SP2 (Win XP). 2. Partially supported software This may include some versions of the fully supported software and in some cases it includes a new release of a standard application. These includes i. Mathematical software Maple 10, Matlab 2006. i. Telnet Host explorer (Telnet) 4, Putty (Win). iii. Operating systems Windows 2000, Mac OS X 10. 3. iv. Statistics SPSS 15. x, SPSS 12. x, Minitab 15. x. v. Office productivity suite MS Office XP. 3. Non- supported software these are some software that the I. T will not install nor provide critical review support for because they are considered as obsolete. Examples of these include all Microsoft DOS and Windows 3. 1 based software. 4. However, changes will be made regularly by the I. T department to the computer hardware and software standards and this will be give-up the ghostd to all members of staff.Sufficient time will be allowed for the migrat ion to new standards changes will also be made regularly to the hardware configurations as technology and prices change and would also be communicated to all members of staff. Operating systems Operating systems are the virtually important software which sours on the computer. Without it, the application software which is intentional to communicate with the hardware through the run system cannot run. There are different types of operating systems and these can be classified into a. Single program operating system and . Multi tasking operating system The unity program operating system is a type of OS that allows only one program to run at a special time. This was later converted to the multi tasking operating system because it was found out that it was time consuming and not very pragmatic and professional to close one application in order to untied another one especially if you want to copy or transfer data from one application to another. The multi tasking operating system i s a type of OS that enables a unity user to have more than one applications open at the same time.It usually gives the computer the option of as trusted how many time slices will be allocated to each program. The main program gets the virtually and the rest is distributed to the remaining programs depending on their rates of activity. There are basically three types of the multi tasking operating systems. These are Single user multi tasking systems, corporeal time operating systems and the multi user operating system. The real time operating systems are usually employ to swear scientific instruments, industrial systems and so on. The user has little control over the activities performed by this type of system.The single user multi tasking system allows a single user to open and run different applications at the same time. Examples of this type are Windows of Microsoft and the Macintosh of apple. Multi user operating systems are systems that give access to the resources on a si ngle computer to many users at the same time. An example of this is the UNIX. However, the operating system that is commonly apply are Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP (coming in two versions as the household and the professional), Windows Vista, Windows CE, Apple Macintosh, Unix, Solex etc (Charette, 2005).Network Security The computer networks can either be public or private. They are utilise daily to conduct proceeding and to hasten communications amongst individuals, business and groups within an organization. The networks comprises of nodes which can be referred to as client limitinals and one or more servers or host computers. They are usually linked by communication systems which could be private which could be used within a company and public which can be accessed by members of the public such as the Internet.However, due to technological advancement, most of the companies host computers can be accessed by employees within the offi ces over a private communications network outside the offices through normal name lines (Tatnall et al. , 2002). Network security can then be described as involving all the activities that the various organizations, institutions, enterprises and so on take to protect the judge of their assets and the honor and continuity of their operations.In order to make the network in effect(p), threats should be identified and strategies put in place to combat them by making use of the different network security tools. Threats to network security There are different threats to network security and they include a. Viruses these are computer programs that have been written by programmers with the aim of infecting computers when triggered by a certain event. b. Trojan horse programs these are delivery vehicles for destructive codes which could appear as a harmless software program or as a profitable one. c. Vandals these are some software applications that can destroy the computer. . Attacks This could be information-gathering activities which collect data that is used to compromise networks, access attacks which exploit network vulnerabilities gaining entry to e-mails, databases and the corporate network and denial-of-service attacks which prevent access to some part or all move of the computer system. e. Data interception This involves the altering of data packets that are being transmitted. Some network security tools that can be put in place include a. Antivirus software packages These are used to counter most of the virus threats.They need to be modifyd regularly in order for it to be effective. b. Secure network infrastructure firewalls and intrusion espial systems provide protection for all the worlds of network hence enabling secure connections. c. Virtual private networks these are used to provide accessibility control and data encryption between different computers on a particular network. It allows the safe connection of workers to the network without the risk of someone else intercepting the data. d. Encryption these are used to make sure that messages cannot be read by anyone else other than the authorized recipients. . Identify services are services that identify users and control their activities as well as their various transactions on the network. function used here include authentication keys, passwords etc. However, no single solution can protect against the variety of the afore mentioned threats, as a result, dual layers of the security tools should be put in place. Network security is usually accomplished through the hardware as well as the software, with uninterrupted update of the software to further protect from the emerging threats.In order for the network security system to be effective, it is important to note that all the network security tools work hand in hand to background maintenance and to improve security. knob Server Computing Client server computer science can be defined as a distributed computing per plex where the requesting of services from the server processes is done by client applications. Here, both the clients and the servers run of different computers that have been interconnected by a computer network. Basically, it is server software that accepts requests for data from the client software and returns the results to the client.The major focus in client-server computing is on the software. A common example of the client-server computing is the use of the internet which could be the collection of information from the World encompassing Web. However, client server computing generally applies to systems in which the organization runs various programs that have multiple components distributed amongst different computers in a particular network. The imagination is linked with the enterprise computing which ensures availability of the computing resources.Client server systems are important and useful in the banks because it allows easy accessibility of account information on a central database server amongst other things. This will be very useful in the day-to-day operational activities. exclusively the access is done through a PC client which provides a graphical user interface (GUI). Data such as the individual account numbers can be entered into the GUI along with the different types of transactions made on the account be it withdrawal or deposits. The PC client validates the data, transfers it to the data base server and eventually displays the results.Client Server Toolkits It has been observed that a lot of software toolkits for the effective grammatical construction of client-server software are available today. These toolkits are referred to as middleware and examples are the circularise Software Foundation (OSF) Distributed Computing Environment (DCE), Distributed component object mildew (DCOM), Message-Oriented Middleware (MOM) and the Transaction processing monitors (TPM). Data Base Management System This is a collection of programs tha t enables effective storage, modification and extraction of information from a database.Its direct goal is to provide an environment that is convenient and efficient for the storage and the convalescence of information. Different types exist which range from small systems running on personal computers to huge systems running on mainframe computers. Examples of database management system are Microsoft Access, My SQL Server, Oracle and FileMaker Pro. Examples of the use of the database systems include Automated teller machines(ATM) Computerized library systems Computerized parts inventory systems Flight reservation systems Employee information systems Company payroll credit entry card processing systems Sales tracking systems and so on The internecine organization delimitates the ease and flexibility of information extraction. The requests for information from a database are made in form of a question. This information can be presented in different formats. The database ma nagement system includes a report author program which enables the siding of data in the form of a report some also include a graphics component which allows the output of information in the form of graphs and charts.The major purpose of a database system is that it provides users with an abstract view of data. Data is usually stored in complex data structures bit users see a simplified view of the data. Model turn over Controller Model view controller is a design archetype that is used by applications which need the ability to maintain multiple views of data. It focuses on a separation of objects into three categories such as Models for the maintenance of data Views for the display of all or a portion of data Controllers for the manipulation of events affecting both the models and the views.Due to the fact that it can be categorized, there can be interactions between multiple views and controllers with the same model and there can also be interactions between new views and controllers that were never in existence with a model without necessarily forcing a change in the design of the model. Model view controller can be delineated graphically as shown below pic The controller can change a model or a view or change both due to certain events. When a controller changes the model, all the dependent views update automatically and similarly, when a controller changes a view, the view gets data from the model to update itself.Enterprise resource planning (ERP) This is a term that is used to describe the set of activities supported by multi-module application software that helps businesses and companies to manage the important parts of its business. It is a package that promotes the seamless flow of information in any organization. The information from the ERP system provides visibility for key performance indicators that are necessary for meeting corporate and business objectives. ERP software applications are useful in managing product planning, providing customer service, purchasing, inventories and tracking orders.Enterprise resource planning includes application modules for the finance and the human resources aspects of any business. Typically, it has both standard hardware and software units that communicate on a local area network. This allows a business to add or to reconstruct modules while preserving the integrity of the data. Some of the players in the ERP market are SAP, PeopleSoft etc, while the new comers include Oracle, IBM and the Microsoft. Before an organization implements the ERP, certain issues need to be addressed and they are stated below The popular information systems Fluctuations in the choice of technology The ability of the market players to stay in tune with ERP The effective ways to implement business applications like ERP Ways to benefit from it in order to lead to competitive advantage The necessity for the innovation of software applications every these are important to take note of and will even tually determine the business model of the organization. The implementation of ERP is a very crucial factor in the ERP system. The success of a good ERP implementation lies in quick processes making training very important. The speed and extent of the training eventually determines the worth and the value of the ERP. finding Support System This is a term that describes computer applications which enhances the users abilities to make decisions. It describes a system that is designed to help decision makers identify problems and to make decisions to solve those problems by using information from a combination of raw data, personal knowledge, business models and communications technology (Hanna et. al, 2003). Information that can be gathered and presented by a decision support is Comparative sales figures from one period to the other Projected revenue figures which are usually based on assumptions on new product sales A stock of all the topical information assets which could be dat a sources, data warehouses, data marts etc. Components of Decision Support System According to Bhargava et. al,(1999), the components of Decision Support System can be classified as Inputs which include numbers and characteristics that are used for analysis User knowledge and expertise which are inputs that require manual of arms analysis by the users Outputs which are transformed data that aid the contemporaries of the DSS decisions Decisions these are the results generated by the DSS Applications of Decision Support SystemDecision support system can be used and applied in various studys. Some of them are stated as follows 1. It can be used for medical diagnosis in the clinics. 2. It is used extensively in business and management to allow faster decision making, better allocation and habit of resources and the early identification of negative trends which could pose as threats to the organization. 3. It is used in agricultural production systems to facilitate decision making at the farms and at policy levels. 4. It can also be used in timber management for long-term planning. 5.It can be designed to make useful decisions in the stock market or even in the marketing department of the banks to decide which segment or target group to design a product for. It is basically useful in any field where effective organization is necessary. Benefits of Decision Support System Some of the benefits of an effective DSS include 1. It helps to create competitive advantage amongst an organizations competitors. 2. It facilitates social relationships between the employees of a particular organization. 3. It increases control in an organization. 4. It speeds up the process of problem-solving in an organization. . It recognizes the importance of training and development within an organization and it promotes this. 6. It encourages advanced thinking as well as discovery of new areas of the decision maker hence improving motivation of the employee CONCLUSION It is worthy to note that the implementation of an effective information system is a continuous process that starts from the period the original suggestion was made and continues in the system as new users are introduced. Implementation plays a major role in the management of information technology and as such steps should be taken that it is done properly. REFERENCESAvgerou, C. , (2001). The significance of context in information systems and organizational change. Information systems Journal, Vol 11, pp 43 63. Bhargava, H. K. , Sridhar, S. & Herrick, C. (1999). Beyond spreadsheets Tools for building decision support systems. IEEE Computer, 32(3), 31-39. Charette, R. N. (September 2005). wherefore software Fails. IEEE Spectrum. Hanna, M. M. , Ahuja, R. K. & Winston, W. L. (2003). Developing spreadsheet-based decision support systems using VBA for Excel. Gainesville, USA variation Center. Ribeiro, L. & David, G. (2001). Impact of the information system on the pedagogical process.Stair, R. M. & Reynolds, G. W. (1999). Principles of information systems (4th ed. ). USA, cart track Technology ITP. Tatnall, A. , Davey, B. , Burgess, S. , Davison, A. & Wenn, A. (2002). Management information systems -concepts, issues, tools and applications. Melbourne Data Publishing. Wang, Y. and Strong, D. M. (1996). Beyond Accuracy What data quality means to data consumers. Journal of Management Information Systems, 12, pp. 5-34. Zhu, Z. and Meredith, P. H. (1995). delimit critical elements in JIT implementation a survey. Industrial Management and Data Systems, 95(8), pp. 21-29.

Комментариев нет:

Отправить комментарий

Примечание. Отправлять комментарии могут только участники этого блога.