The Focus of Business Process Reengineering (BPR) on the Current Issues in Business

The existing system in the organization is totally reexamined and radically modified for incorporating the latest technology. This process of change for the betterment of the organization is called as Business process reengineering. With Business process being reengineered, the organizations have to change the workflow and business procedures for efficiency in the organization. Latest software are used and accordingly the business procedures are modified, so that documents are worked upon more easily and efficiently. This is called as workflow management. Business process reengineering is a major innovation changing the way organizations conduct their business. Such changes are often necessary for profitability or even survival. BPR is employed when major IT projects such as ERP are undertaken. Reengineering involves changes in structure, organizational culture and processes. Many concepts of BPR changes organizational structure. Team based organization, mass customization, empowerment and telecommuting are some of the examples. The support system in any Continue reading

Case Study of Air Asia: Information Technology Implementation for Business Success

Information Technology (IT) is one of the major enablers of AirAsia’s successful low cost business model. AirAsia had demonstrated the strategic value of information and communications technology (ICT) in improving competitiveness with a very high majority of its passengers making their bookings online. AirAsia was also the world’s first airline to allow SMS (short messaging service) booking and payment of airline tickets. In 2003, AirAsia proud to be the first airline in the world to offer flight booking and payment via Short Messaging Service (SMS) and make their guests flight booking anytime and from anywhere 24 hours and 7 days a week. Apart from making a Flight Booking, AirAsia guests can also make enquiry on lowest fare, departure or arrival information and city codes. All this is available at a normal cost of RM0.15 cents per SMS and without any additional charges. AirAsia guests can also register to be the Continue reading

Social Engineering – Meaning, Types and Defenses

Living at the height of the Information Age means information security has never mattered more. With a greater amount of people and businesses going paperless, there is an ever-increasing need and demand to keep digital information secure. The CIA triad or the Confidentiality, Integrity, and Availability of a company’s data is a general model designed to guide security policies for information security inside an organization.  Confidentiality refers to the privacy of data – making sure that only people who are allowed to access data are able to access it.  Integrity refers to maintaining a data’s accuracy and trustworthiness – making sure that data cannot be altered by an unauthorized person. And lastly, availability refers to the ability to access data when an authorized person tries to access it. Cybercrime is a billion-dollar industry, which is built upon hackers breaking an organization’s CIA triad. This includes but is not limited to: Continue reading

Management Information System Growth Stages

It is pertinent to realize the importance of growth of MIS in stages in order to encounter increasing complexity of business processes and changing scenario of management. MIS development evolves from EDP systems. The EDP systems have rudimentary technology to handle clerical and supervisory operations in an organisation. This is initiation stage. The advantages of computerization are gradually realized by most of the people in an organisation. This realization leads to proliferation of computer, networking technologies and computer based system applications within an organisation. This is contagious stage. Next stage is typified by planning and control. As demand for computerization increases, a need is realized for cost-benefit analysis. This is imperative to plan for future MIS in a cost effective manner. Next stage of MIS development is integration of subsystems. This comes with realization of interdependence of inflow of data from various sources for valid information. Management plans to leverage Continue reading

Ethical Hackers and Ethical Hacking

An ethical hacker is a security professional who helps organization to take defensive measures against malicious attacks and usually the process he doing to find those vulnerable point is called Ethical Hacking. Sometimes this is also known as Penetration Testing or Intuition Testing. In this case, the ethical hackers are getting into the minds of computer criminals; think like them to find about innovative ways the hackers may use to get into the systems. Then organizations can take required actions to avoid those vulnerabilities. It has identified that the almost all computer systems have vulnerabilities that can be exploited by a hacker to come to do damages. This can be due to an unpatched application, a misconfigured router or a rough network device and it will be not able to detect unless penetrate the networks and assess the security posture for vulnerabilities and exposures regular basis. As the hacking is Continue reading

Case Study on Information Technology Management: Frito-Lay’s Long-Term IT Plan

Because the rate of technological change is so rapid, most people see IT through the narrow lens of short-term, silver-bullet solutions. IT vendors want you to believe that their important new technologies will blow away what has come before. You can’t blame a salesperson for trying to sell, or CIOs for having a queasy buy-or-lose feeling, but this attitude is precisely the opposite of the one companies should be taking. We would argue that because the winds of change affect IT more than any other area of the organization, IT benefits most from a long-term, disciplined, strategic view, and a square focus on achieving the company’s most fundamental goals. For example, Frito Lay’s strategic goal has always been to make, move, and sell tasty, fresh snack food as rapidly and efficiently as possible. That goal hasn’t changed since 1930s, when founder Herman Lay ran his business from his Atlanta kitchen Continue reading