The point of the company’s mission statement, “Meet information requirements of management” is not only the most important but also the most critical and central component which provides the basis on which the rest of the communication and data sharing capabilities are achieved (Melenets, 2012). Data sharing entails getting accurate and correct information to the right people at the right time in the right way.
We will write a custom Essay on Corporate Computing Function and Its Requirements specifically for you
301 certified writers online
That underpins the importance of meeting information requirements and effective communication which creates the right path for the flow of data. To achieve the objectives, the CIO must implement a LAN (Local Area Network) and a WAN (Wide Area Network) to create a strong foundation for communicating and sharing data and information over a wide area. Besides, the CIO should follow corporate guidelines when implementing centralized and distributed access to data.
Besides, the system should be designed to appropriately meet the information requirements of the management in terms of establishing a shared understanding of how the information systems work to support people in their activities. Toval, Nicolás, Moros, and García, F. (2002) note that the entire paradigm involves clear and precise understanding of the existing information needs of the organization, how the organization uses information, how to account for any short term and long term changes to information needs, and an assessment of the existing information structure in terms of its suitability and strengths.
In each case, the information needs requirements should be achieved besides factoring them into the development process of an organization’s information system. Typically, meeting the information needs of the organization is of paramount importance in the development of the network architecture of the organization that enables internal and external communication and sharing of information on the LAN and MAN to be effective. That is besides enabling effective sharing of tasks, supporting collaborative communication, and the sharing of resources.
Evaluation of the roll out points
The most important of the three points in the roll-out plan crystallizes after a complete analysis of the nine points of the company’s mission statement. According to Hirschheim, Porra, and Parks (2003), the first point details the provision of computing capabilities to each department that critically needs them is an important function which is a prerequisite to the development of the LAN and MAN networks. However, this could be one of the most critical points because the information technology architecture provides the base on which cooperate computing functions are provided.
However, the second point that containing the capital and operations costs within the budget comes after the infrastructure such as the LAN and the MAN have been set up, which makes the pointless critical as compared with the first point. The third point, which entails satisfying the computing needs of the end-user departments, compels the need to address the information system requirements that are necessary for setting up the information infrastructure. By conducting a clear description and identification of the exact needs of each department, it could enable precise and cost-effective implementation of the LAN and MAN to be within the budget.
The cost incurred and the type of computing tools to use is not only based on the operational objectives of the organization, but also on the information requirements of each department, which qualifies the first point to override the third point. The fourth point is on maintaining the integrity of each function that depends on the functionalities of computing resources. Integrity is a function of an existing infrastructure that must be maintained, which is an operational component of an existing system. Integrity comes after all other system components and the network has been set up. The fourth point is not critically important during the rollout plan and is disqualified until the system has been set up.
On the other hand, the fifth point, which entails ‘meeting the information requirements of management” comes first because either in system development or system implementation, the information requirements must be determined to develop and impellent the right systems that address the needs of an organization. In this case, the fifth point overrides all other points and becomes the first point to implement in the roll-out plan.
The following phases, which include the sixth, seventh, eighth, and ninth do not qualify and override the previous phases because the phases focus on services that are provided on an already existing infrastructure. The distinct characteristics and the information requirements of each phase distinctly show that the first point that requires the provision of computing capability followed by the third point (provision of the computing needs of user departments) and the seventh point (allowing organizational units sufficient autonomy) are critical phases to start within the roll-out plan.
The additional point to factor is “checking conformity of the system with existing regulations and standards” (Leow, & MacLennan, 2000). The privacy laws are a prerequisite to the preservation of integrity, confidentiality, and availability and the preservation and protection of organizational data, which is a compelling factor to conform to the laws.
Hirschheim, R., Porra, J., & Parks, M. S. (2003). The evolution of the corporate IT function and the role of the CIO at Texaco: how do perceptions of IT’s performance get formed?. ACM SIGMIS Database, 34(4), 8-27. Web.
Leow, K. M., & MacLennan, A. (2000). An investigation of the use of intranet technology in UK retail banks. Journal of librarianship and information science, 32(3), 135-146. Web.
Melenets, A. (2012). The State Corporate Cloud Computing-Based Network for Registration of Potentially Dangerous Objects. Information & Security, 28(1), 52. Web.
Toval, A., Nicolás, J., Moros, B., & García, F. (2002). Requirements reuse for improving information systems security: a practitioner’s approach. Requirements Engineering, 6(4), 205-219. Web.