• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational Information Systems. In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes

Extracts from this document...

Introduction

In this assignment I will be discussing software used in my chosen department and the key work processes, identify and explain the key mobile devices used and how the internet used by the employees, and which would be the best methodology to improve systems.

Task 1

In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes. According to Z.Hussain (2009) a system ‘is a set of interrelated parts, arranged into an organized whole or orderly structure’ systems within accounting are very systematic a methodical as all decisions is made according to plans. A system contains many sub systems, these are smaller systems (departments) within the system that work to run the system effectively and efficiently, these sub-systems may be different but they are interrelated as they share data/information between each other to goals that help towards filling the larger goals of the accounting system.

Figure.1

ACCOUNTS

MANAGEMENT

FINANCIAL

Budgeting

Sales

Absorption Costing

Cash Flow

Depreciation

Break Even

Profit/ Loss

Ratios

Marginal costing

Income Statements

Investment Appraisal

Financial statements

Figure.1 – The chart above shows that accounts can be separated into two sub systems, and can further be decomposed into sub-sub systems. By decomposing a system it shows the different tasks that occur in the system, what these tasks are and how they are done to meet the main targets of the department.

When systems are decomposed, each system has its own characteristics, which can be explained by the business organizational hierarchy. This hierarchy consists of EIS (executive information system), MIS (management information systems), and TPS (Transaction processing system). An example of this would be at Phones4u the bottom of the hierarchy there would be sales consultants, in the MIS there would be managers and at the top would be head office/ executives/ accounts department.

...read more.

Middle

USB devices- these allow an individual to save all the documents they may need to use outside their office. They can access these files by inputting the USB in another computing device.Smart phones e.g. blackberry, android and Iphones- these allow an individual to access the internet, it also allows them to set up their email account on them, so each email they get is sent straight to their phone like a text message they can also reply to their emails. Smart phones usually have Microsoft word, excel, presentation on them, this allows the individual to work but also open up any Microsoft files.  A ‘Smartphone helps the accountant to ‘connect’, enabling effective out-of-office working through unfettered access to colleagues and clients, office systems, client information and documents. In turn, this increases client responsiveness, satisfaction and retention and improves the productivity and competitiveness of the accountant. Alongside this, the added flexibility delivered can help to improve the work-life balance of a busy professional, even though a small minority may find it an intrusion’

(http://uk.blackberry.com)

  • Portable tablets e.g. Ipads, galaxy tabs - these devices are very similar to laptops, but cant are not as useful as a laptop, as portable tablet do not have CD drives, USB ports and have less memory, but still can be used for email, opening files, and working on your own files, make graphs, use Microsoft Excel and are relatively smaller than a laptop. Hence these are much easier to carry around then a laptop.
  • Internet Dongles- these are small dongles that attach to a computer/laptop via USB port, they allow you to access the internet even without a wireless connection as they use 3G (similar to mobile phones).
...read more.

Conclusion

Week 5

I learnt what telecommunications are and the role they played within a business environment, how telecommunications were used to meet the needs of an organisation, the software that can be used and what hardware would be needed to ensure that the communication is happening effectively e.g. a webcam and a speaker for video calling. This week I also did a draft copy for task one, and structured task two.

Week 6

This week I learnt how mobile computing was used within an organisation; I learnt what devices can be used to form, a wireless network and how to keep these networks safe and the importance of security for the wireless devices/networks. I also completed task one and made a plan and drafted out task two.

Week 7

This week in learnt the different types of e-business modules (B2B, B2C, C2C, C2C), I also learnt about the different web browsers e.g. Java and the benefits of Ecommerce.  This week I completed task 2 and planned task 3.

Week 8

I learnt about the business environment and how the economic environment affects an organisation, learnt about the legal protection behind communication, data etc. I also did further research on task three and completed a draft copy

Week 9

I learnt about global systems development, system design e.g. SLDC and how the system implements and evaluates the information systems. I also completed task 3.

Week 10

I learnt about RAD, and prototyping and how RAD is used within the business environment. I also touched up on all my tasks.

Week 11

I completed the coursework, and did task 4 in which I explained what I learnt in the module

Overall when completing the coursework I spent the most time on task one as I found it difficult to understand and grasp the concepts.

Bibliography

Books:

Hussain, Z. (2009), Organisational Information Systems, 1st Edition, Great Britain: Pearson.

 Elliott, G (2004), Global Business Information Technology.

Websites:

www.comp.glam.ac.uk

http://kane18.wordpress.com

http://uk.blackberry.com

www.2020software.com

                Page  of

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Defining the scope of the Information Security Management System (ISMS) in a company

    The company uses Outlook for their email requirements. Virus protection should be used to avoid any spam/spoofing/mail bombs. Again is the mail account connected with the hosting provider and does it have a secure password. Intrusion detection/prevention system (IDPS) Intrusion detection/prevention system (IDPS) can detect an intrusion and then prevent that intrusion from successfully attacking the company by means of an active response.

  2. This research is about Management of network operating system at Natural Forest Resources management ...

    This system grew out because of the need of making use of scarce, sharing of software applications and peripherals costs such as printers, scanners and disk drives. Some organizations tries to make commonly available of resources such as operating system software applications across different number of computers connected to launched

  1. Computer Networks Architectures & Protocols

    It furnishes transmission protocol knowledge and management. The data link layer is often called MAC layer which is Medium Access Control, through the MAC layer there is a sub layer. The data link layer passes data between the physical and network layers.

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    Yeates and Wakefield (2004, p.48) acknowledge that due to this fact, skilled and trained staff are easier to come by. This in turn means the process of developing the system by the SSADM method is less difficult. The SSADM method relies somewhat on the use of diagrams in its approach

  1. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    Some companies like Cisco have routers with so many features they can be compared to Swiss Army knifes while Juniper routers are fast and simple, comparable with a very sharp hunting knife. The quality of products and brand reputation is a huge differentiating factor.

  2. Research into standards and standardisation in modern communication networks and their implications and applications

    ISO is a network of the national standards institutes of 160 countries, one member per country... Therefore, ISO enables a consensus to be reached on solutions that meet both the requirements of business and the broader needs of society."3 For more ICT based standards there is a joint operation between

  1. Knowledge Management

    It also allows you to duplicate your best practises by taking knowledge from best performers in an organisation and applying it in similar situations elsewhere. Benefits and Concerns of Knowledge Management Process Outcomes Organizational Outcomes Communication: Financial: Enhanced communication Increased sales Faster communication Decreased cost More visible opinions of staff

  2. Database Systems modules and course work

    Holiday Booking (BookingId, BookingDate, CustomerNo*) A Holiday Booking made by a customer is sorted out into a separate entity where there are various attributes found such as a Booking Date, Booking Id and Total Cost but since derived attributes are not shown in the relational Schema the total cost is not included here.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work