• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational Information Systems. In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes

Extracts from this document...

Introduction

In this assignment I will be discussing software used in my chosen department and the key work processes, identify and explain the key mobile devices used and how the internet used by the employees, and which would be the best methodology to improve systems.

Task 1

In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes. According to Z.Hussain (2009) a system ‘is a set of interrelated parts, arranged into an organized whole or orderly structure’ systems within accounting are very systematic a methodical as all decisions is made according to plans. A system contains many sub systems, these are smaller systems (departments) within the system that work to run the system effectively and efficiently, these sub-systems may be different but they are interrelated as they share data/information between each other to goals that help towards filling the larger goals of the accounting system.

Figure.1

ACCOUNTS

MANAGEMENT

FINANCIAL

Budgeting

Sales

Absorption Costing

Cash Flow

Depreciation

Break Even

Profit/ Loss

Ratios

Marginal costing

Income Statements

Investment Appraisal

Financial statements

Figure.1 – The chart above shows that accounts can be separated into two sub systems, and can further be decomposed into sub-sub systems. By decomposing a system it shows the different tasks that occur in the system, what these tasks are and how they are done to meet the main targets of the department.

When systems are decomposed, each system has its own characteristics, which can be explained by the business organizational hierarchy. This hierarchy consists of EIS (executive information system), MIS (management information systems), and TPS (Transaction processing system). An example of this would be at Phones4u the bottom of the hierarchy there would be sales consultants, in the MIS there would be managers and at the top would be head office/ executives/ accounts department.

...read more.

Middle

USB devices- these allow an individual to save all the documents they may need to use outside their office. They can access these files by inputting the USB in another computing device.Smart phones e.g. blackberry, android and Iphones- these allow an individual to access the internet, it also allows them to set up their email account on them, so each email they get is sent straight to their phone like a text message they can also reply to their emails. Smart phones usually have Microsoft word, excel, presentation on them, this allows the individual to work but also open up any Microsoft files.  A ‘Smartphone helps the accountant to ‘connect’, enabling effective out-of-office working through unfettered access to colleagues and clients, office systems, client information and documents. In turn, this increases client responsiveness, satisfaction and retention and improves the productivity and competitiveness of the accountant. Alongside this, the added flexibility delivered can help to improve the work-life balance of a busy professional, even though a small minority may find it an intrusion’

(http://uk.blackberry.com)

  • Portable tablets e.g. Ipads, galaxy tabs - these devices are very similar to laptops, but cant are not as useful as a laptop, as portable tablet do not have CD drives, USB ports and have less memory, but still can be used for email, opening files, and working on your own files, make graphs, use Microsoft Excel and are relatively smaller than a laptop. Hence these are much easier to carry around then a laptop.
  • Internet Dongles- these are small dongles that attach to a computer/laptop via USB port, they allow you to access the internet even without a wireless connection as they use 3G (similar to mobile phones).
...read more.

Conclusion

Week 5

I learnt what telecommunications are and the role they played within a business environment, how telecommunications were used to meet the needs of an organisation, the software that can be used and what hardware would be needed to ensure that the communication is happening effectively e.g. a webcam and a speaker for video calling. This week I also did a draft copy for task one, and structured task two.

Week 6

This week I learnt how mobile computing was used within an organisation; I learnt what devices can be used to form, a wireless network and how to keep these networks safe and the importance of security for the wireless devices/networks. I also completed task one and made a plan and drafted out task two.

Week 7

This week in learnt the different types of e-business modules (B2B, B2C, C2C, C2C), I also learnt about the different web browsers e.g. Java and the benefits of Ecommerce.  This week I completed task 2 and planned task 3.

Week 8

I learnt about the business environment and how the economic environment affects an organisation, learnt about the legal protection behind communication, data etc. I also did further research on task three and completed a draft copy

Week 9

I learnt about global systems development, system design e.g. SLDC and how the system implements and evaluates the information systems. I also completed task 3.

Week 10

I learnt about RAD, and prototyping and how RAD is used within the business environment. I also touched up on all my tasks.

Week 11

I completed the coursework, and did task 4 in which I explained what I learnt in the module

Overall when completing the coursework I spent the most time on task one as I found it difficult to understand and grasp the concepts.

Bibliography

Books:

Hussain, Z. (2009), Organisational Information Systems, 1st Edition, Great Britain: Pearson.

 Elliott, G (2004), Global Business Information Technology.

Websites:

www.comp.glam.ac.uk

http://kane18.wordpress.com

http://uk.blackberry.com

www.2020software.com

                Page  of

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Defining the scope of the Information Security Management System (ISMS) in a company

    The company uses Outlook for their email requirements. Virus protection should be used to avoid any spam/spoofing/mail bombs. Again is the mail account connected with the hosting provider and does it have a secure password. Intrusion detection/prevention system (IDPS) Intrusion detection/prevention system (IDPS) can detect an intrusion and then prevent that intrusion from successfully attacking the company by means of an active response.

  2. Creating a shopping website with Project management

    All images are visible N/a J.Aziz K.Hussain 6 Does the menu show and work? Menus are visible and working Same As expected J.Aziz K.Hussain 7 Can Customers view products? Customers can view products Same As expected J.Aziz K.Hussain 8 Can Customers purchase products?

  1. Office systems project

    prone to be misplaced, stolen or destroyed by natural causes, such as Fire, Hurricane, Water, Oil etc. 2.2. REQUIREMENTS From all the information gathered from conducting an interview with the manager of Titlas Ventures Limited below is a list of requirements which have been identified and agreed before commencing on

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    1.3.4 Design This is the design of a selected new system. The specification of programs, hardware, and procedures involved in the selected solution is what this stage is about. In the process of designing a system some of the following methods may be used: * IPO charts * Structured English

  1. Use the Internet to find ways that some companies currently destroy their data before ...

    * Overwriting your hard drives. Martin (2011) thinks that overwriting a drive is more than simply selecting a file and deleting it. There is a need for you to overwrite each area of the disk several times and NIST recommends overwriting the hard drive three times (Martin, 2011).

  2. The case study I have chosen is Northwestern Business College. Northwestern Business College is ...

    Sniffing Network Traffic 50% of network outage, 75% chance it will affect operation, 1 outage can inflict $1,919.57 (8 hours) p = 0.50 x 0.75 x 1,919.57 p = $479.89 3 Denial of Service 35% of network outage, 90% chance it will affect operation, 1 outage can inflict $1,919.57 (8 hours)

  1. What are the legal requirements for ensuring information security relating to business organizations? How ...

    The Convention focuses on ensuring deterrent action ?directed against the confidentiality, integrity and availability of computer systems, networks and computer data as well as their misuse and the criminalisation of such conduct,? [4] Smedinghoff at Ibid at pages 30 ? 45 See also ANDREAS MITRAKAS, Information Security and Law in Europe: Risks Checked?

  2. Internet Privacy and Security

    The response indicates whether or not the port is being used and can be probed for weaknesses and vulnerabilities. Website www.auditmypc.com compares port scanning to ringing the doorbell to see of someone is home. Another interesting fact about this is that authorities cannot do anything about this until an actual crime is committed.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work