Corporate Computing Function and Its Requirements Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The point of the company’s mission statement, “Meet information requirements of management” is not only the most important but also the most critical and central component which provides the basis on which the rest of the communication and data sharing capabilities are achieved (Melenets, 2012). Data sharing entails getting accurate and correct information to the right people at the right time in the right way.

That underpins the importance of meeting information requirements and effective communication which creates the right path for the flow of data. To achieve the objectives, the CIO must implement a LAN (Local Area Network) and a WAN (Wide Area Network) to create a strong foundation for communicating and sharing data and information over a wide area. Besides, the CIO should follow corporate guidelines when implementing centralized and distributed access to data.

Besides, the system should be designed to appropriately meet the information requirements of the management in terms of establishing a shared understanding of how the information systems work to support people in their activities. Toval, Nicolás, Moros, and García, F. (2002) note that the entire paradigm involves clear and precise understanding of the existing information needs of the organization, how the organization uses information, how to account for any short term and long term changes to information needs, and an assessment of the existing information structure in terms of its suitability and strengths.

In each case, the information needs requirements should be achieved besides factoring them into the development process of an organization’s information system. Typically, meeting the information needs of the organization is of paramount importance in the development of the network architecture of the organization that enables internal and external communication and sharing of information on the LAN and MAN to be effective. That is besides enabling effective sharing of tasks, supporting collaborative communication, and the sharing of resources.

Evaluation of the roll out points

The most important of the three points in the roll-out plan crystallizes after a complete analysis of the nine points of the company’s mission statement. According to Hirschheim, Porra, and Parks (2003), the first point details the provision of computing capabilities to each department that critically needs them is an important function which is a prerequisite to the development of the LAN and MAN networks. However, this could be one of the most critical points because the information technology architecture provides the base on which cooperate computing functions are provided.

However, the second point that containing the capital and operations costs within the budget comes after the infrastructure such as the LAN and the MAN have been set up, which makes the pointless critical as compared with the first point. The third point, which entails satisfying the computing needs of the end-user departments, compels the need to address the information system requirements that are necessary for setting up the information infrastructure. By conducting a clear description and identification of the exact needs of each department, it could enable precise and cost-effective implementation of the LAN and MAN to be within the budget.

The cost incurred and the type of computing tools to use is not only based on the operational objectives of the organization, but also on the information requirements of each department, which qualifies the first point to override the third point. The fourth point is on maintaining the integrity of each function that depends on the functionalities of computing resources. Integrity is a function of an existing infrastructure that must be maintained, which is an operational component of an existing system. Integrity comes after all other system components and the network has been set up. The fourth point is not critically important during the rollout plan and is disqualified until the system has been set up.

On the other hand, the fifth point, which entails ‘meeting the information requirements of management” comes first because either in system development or system implementation, the information requirements must be determined to develop and impellent the right systems that address the needs of an organization. In this case, the fifth point overrides all other points and becomes the first point to implement in the roll-out plan.

The following phases, which include the sixth, seventh, eighth, and ninth do not qualify and override the previous phases because the phases focus on services that are provided on an already existing infrastructure. The distinct characteristics and the information requirements of each phase distinctly show that the first point that requires the provision of computing capability followed by the third point (provision of the computing needs of user departments) and the seventh point (allowing organizational units sufficient autonomy) are critical phases to start within the roll-out plan.

The additional point to factor is “checking conformity of the system with existing regulations and standards” (Leow, & MacLennan, 2000). The privacy laws are a prerequisite to the preservation of integrity, confidentiality, and availability and the preservation and protection of organizational data, which is a compelling factor to conform to the laws.

References

Hirschheim, R., Porra, J., & Parks, M. S. (2003). The evolution of the corporate IT function and the role of the CIO at Texaco: how do perceptions of IT’s performance get formed?. ACM SIGMIS Database, 34(4), 8-27. Web.

Leow, K. M., & MacLennan, A. (2000). An investigation of the use of intranet technology in UK retail banks. Journal of librarianship and information science, 32(3), 135-146. Web.

Melenets, A. (2012). The State Corporate Cloud Computing-Based Network for Registration of Potentially Dangerous Objects. Information & Security, 28(1), 52. Web.

Toval, A., Nicolás, J., Moros, B., & García, F. (2002). Requirements reuse for improving information systems security: a practitioner’s approach. Requirements Engineering, 6(4), 205-219. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 18). Corporate Computing Function and Its Requirements. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/

Work Cited

"Corporate Computing Function and Its Requirements." IvyPanda, 18 July 2020, ivypanda.com/essays/corporate-computing-function-and-its-requirements/.

References

IvyPanda. (2020) 'Corporate Computing Function and Its Requirements'. 18 July.

References

IvyPanda. 2020. "Corporate Computing Function and Its Requirements." July 18, 2020. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/.

1. IvyPanda. "Corporate Computing Function and Its Requirements." July 18, 2020. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/.


Bibliography


IvyPanda. "Corporate Computing Function and Its Requirements." July 18, 2020. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1