Corporate Computing Function and Its Requirements Essay

Exclusively available on IvyPanda Available only on IvyPanda

The point of the company’s mission statement, “Meet information requirements of management” is not only the most important but also the most critical and central component which provides the basis on which the rest of the communication and data sharing capabilities are achieved (Melenets, 2012). Data sharing entails getting accurate and correct information to the right people at the right time in the right way.

We will write a custom essay on your topic a custom Essay on Corporate Computing Function and Its Requirements
808 writers online

That underpins the importance of meeting information requirements and effective communication which creates the right path for the flow of data. To achieve the objectives, the CIO must implement a LAN (Local Area Network) and a WAN (Wide Area Network) to create a strong foundation for communicating and sharing data and information over a wide area. Besides, the CIO should follow corporate guidelines when implementing centralized and distributed access to data.

Besides, the system should be designed to appropriately meet the information requirements of the management in terms of establishing a shared understanding of how the information systems work to support people in their activities. Toval, Nicolás, Moros, and García, F. (2002) note that the entire paradigm involves clear and precise understanding of the existing information needs of the organization, how the organization uses information, how to account for any short term and long term changes to information needs, and an assessment of the existing information structure in terms of its suitability and strengths.

In each case, the information needs requirements should be achieved besides factoring them into the development process of an organization’s information system. Typically, meeting the information needs of the organization is of paramount importance in the development of the network architecture of the organization that enables internal and external communication and sharing of information on the LAN and MAN to be effective. That is besides enabling effective sharing of tasks, supporting collaborative communication, and the sharing of resources.

Evaluation of the roll out points

The most important of the three points in the roll-out plan crystallizes after a complete analysis of the nine points of the company’s mission statement. According to Hirschheim, Porra, and Parks (2003), the first point details the provision of computing capabilities to each department that critically needs them is an important function which is a prerequisite to the development of the LAN and MAN networks. However, this could be one of the most critical points because the information technology architecture provides the base on which cooperate computing functions are provided.

However, the second point that containing the capital and operations costs within the budget comes after the infrastructure such as the LAN and the MAN have been set up, which makes the pointless critical as compared with the first point. The third point, which entails satisfying the computing needs of the end-user departments, compels the need to address the information system requirements that are necessary for setting up the information infrastructure. By conducting a clear description and identification of the exact needs of each department, it could enable precise and cost-effective implementation of the LAN and MAN to be within the budget.

The cost incurred and the type of computing tools to use is not only based on the operational objectives of the organization, but also on the information requirements of each department, which qualifies the first point to override the third point. The fourth point is on maintaining the integrity of each function that depends on the functionalities of computing resources. Integrity is a function of an existing infrastructure that must be maintained, which is an operational component of an existing system. Integrity comes after all other system components and the network has been set up. The fourth point is not critically important during the rollout plan and is disqualified until the system has been set up.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

On the other hand, the fifth point, which entails ‘meeting the information requirements of management” comes first because either in system development or system implementation, the information requirements must be determined to develop and impellent the right systems that address the needs of an organization. In this case, the fifth point overrides all other points and becomes the first point to implement in the roll-out plan.

The following phases, which include the sixth, seventh, eighth, and ninth do not qualify and override the previous phases because the phases focus on services that are provided on an already existing infrastructure. The distinct characteristics and the information requirements of each phase distinctly show that the first point that requires the provision of computing capability followed by the third point (provision of the computing needs of user departments) and the seventh point (allowing organizational units sufficient autonomy) are critical phases to start within the roll-out plan.

The additional point to factor is “checking conformity of the system with existing regulations and standards” (Leow, & MacLennan, 2000). The privacy laws are a prerequisite to the preservation of integrity, confidentiality, and availability and the preservation and protection of organizational data, which is a compelling factor to conform to the laws.

References

Hirschheim, R., Porra, J., & Parks, M. S. (2003). The evolution of the corporate IT function and the role of the CIO at Texaco: how do perceptions of IT’s performance get formed?. ACM SIGMIS Database, 34(4), 8-27. Web.

Leow, K. M., & MacLennan, A. (2000). An investigation of the use of intranet technology in UK retail banks. Journal of librarianship and information science, 32(3), 135-146. Web.

Melenets, A. (2012). The State Corporate Cloud Computing-Based Network for Registration of Potentially Dangerous Objects. Information & Security, 28(1), 52. Web.

Toval, A., Nicolás, J., Moros, B., & García, F. (2002). Requirements reuse for improving information systems security: a practitioner’s approach. Requirements Engineering, 6(4), 205-219. Web.

Remember! This is just a sample
You can get your custom paper by one of our expert writers
Print
Need an custom research paper on Corporate Computing Function and Its Requirements written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, July 18). Corporate Computing Function and Its Requirements. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/

Work Cited

"Corporate Computing Function and Its Requirements." IvyPanda, 18 July 2020, ivypanda.com/essays/corporate-computing-function-and-its-requirements/.

References

IvyPanda. (2020) 'Corporate Computing Function and Its Requirements'. 18 July.

References

IvyPanda. 2020. "Corporate Computing Function and Its Requirements." July 18, 2020. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/.

1. IvyPanda. "Corporate Computing Function and Its Requirements." July 18, 2020. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/.


Bibliography


IvyPanda. "Corporate Computing Function and Its Requirements." July 18, 2020. https://ivypanda.com/essays/corporate-computing-function-and-its-requirements/.

Powered by CiteTotal, online essay citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1