Discussion
Dsicuss about the Case study on Animal after Hours Services.
The paper mainly focuses on the “Animal after Hours Services” (AAHS), which is one of the veterinary hospitals that is mainly running in Gold coast as well as Brisbane Southside. It is identified that the main purpose of the report is to focus on the implementation of information system for the organization AAHS so that the growth in the business expansion can be effectively managed. It is identified that with the help of the information system, the owners of the hospital can be able to get online updates about their animals.
The report elaborates the kinds of information systems that are required for the small business. The report identifies the issues faced by AAHS and explains the key information requirement by the organization. In addition to this, the paper elaborates how strategically internet, extranet as well as intranet is utilized for fulfilling communication as well as collaboration need. Furthermore the processes with the help of which AAHS manages organizational changes are elaborated.
An information system is one of the organized systems that help in collecting, organizing, storing as well as communicating information (Kadam and Onkar, 2015). It is identified that with the help of the information system, the organization AAHS can be able to manage their business operations quite effectively and can be able to provide proper facility of interface accessibility so that data and information can be easily accessed. In addition to this, the organization can be able to provide the opportunity of online access to the clients for printing as well as for downloading consolidated statement as well as treatment notes for lodging pet insurance claims (Turel 2015).
It is identified that there are number of types of information system that can be utilized by the small business for managing the operations effectively. The information systems include:
Transaction processing system: Transaction processing system generally helps in providing proper way for collecting, processing as well as storing transactions (Bajdor and Grabara 2014). It is identified that most of the system generally helps in allowing number of transactions for taking place simultaneously.
Management information system: It is identified that management information system is one of the information system that utilizes the data, which is collected, by the transaction processing system for using this data in order to create proper reports.
Decision support system: Decision support system generally helps in making proper decisions by working as well as analyzing data, which can be able to generate proper statistical projections as well as data models (Ahmadi, Nilashim and Ibrahim, 2015).
Definition of the information system and explanation about their importance in future operations
Neutral networks: An expert system is defined as one of the computer system that is generally designed for analyzing as well as producing recommendations as well as decisions that are needed to be controlled.
The problems that are generally faced by the organization AAHS are listed below in order of priority:
1st: Safety as well as security of data across different sites
2nd: Logistical issue such as staff files, staff timesheets as well as patient treatment notes.
3rd: Making shareable across sites without making unnecessary duplication
The key information requirements that are generally needed by AAHS are listed in the table below:
Interface requirements: The organizations requires interface so that the veterinaries can be able to access the animal treatment records quite easily (Fountas et al. 2015). It is identified that this requirement will generally help in enhancing as well as improving the AAHS competitive position because if also the client visits different branches at different point of time then they can easily access the records without facing any type of difficulty.
Business requirements: With the help of business requirements, AAHS can be able to provide online updates to the clients about their pets, which would further avoid constant phone calls to practice. This is one of the updated facilities that will be provided by the AAHS to the clients and as a result, the clients can be able get information at any time. Thus, this facility generally assists in improving competitive position of AAHS.
Security requirements: Proper security requirements must be needed in order to secure the details as well as information of the clients properly (Dai, Chen and Zhang 2017). This feature is considered as one of the essential feature that ensures the clients that their data and information will not be misused and as a result, this feature assists in improving competitive position.
Centralized database management system would help AAHS in managing their business problems by making proper business decisions in order to fulfil the information requirements that are needed for their business of the organization. The information requirements that are mainly fulfilled by the centralized database management system are listed below:
Interface requirements: The centralized database management system assists in providing interface so that veterinaries can be able to access animal treatment records quite easily from any of the branch of the organization (Li et al. 2017).
Business requirements: The centralized database management system assists in fulfilling the business requirements by providing online update to the clients about the well-being of the pets so that constant phone call can be avoided.
Listing problems faced by AAHS in the order of priority
Security requirements: The data as well as information related with the clients or any other details can be stored successfully within the centralized database system so that the chances of security issues can be avoided (Theorin et al. 2017).
The organization AAHS will utilize internet by creating proper opportunities of information retrieval, networking, communication as well as collaboration. It is identified that AAHS will generally utilize internet for selling products to various customers. It can be also be utilized for gathering information and for interacting with clients, customers as well as governments for creating awareness (Cats and Loutos 2016). Additionally, the utilization of internet is quite helpful for internal communications as well as other types of electronic activities within the organizations.
The intranet will be utilized by AAHS in order to fulfil the digital communication needs of the organization. It is found that they generally assist in providing proper secure space for accessing, storing as well as developing number of electronic materials (Srivastava et al. 2015). The utilization of intranets helps in replacing older business solutions for producing efficiency in order to speed of different workflows in order to reduce the errors. In addition to this, some of the applications of intranet that is helpful for AAHS generally include network folders where number of employees can be capable of accessing files, offline website as well as testing the functionality.
It is found that Extranet generally helps in connecting number of intranets and thus it is utilized by AAHS for facilitating proper co-operation between various companies in joints projects, information sharing as well as other initiatives (Soppera et al. 2014). It is found that they also helps in allowing AAHS to connect with number of customers in a much more controlled setting. In addition to this, extranet helps in allowing the AAHS to access proper network services that is provided to another company.
Change management is considered as one of the significant concept for the business organization “AAHS”. It is identified that the changes within the organization can be managed by following steps that are elaborated below:
Understanding the present state of AAHS: It is very much necessary to understand the present state of AAHS by determining the issues that the combination faces in order to assign proper level of significance to each one by assessing different types of changes that is required for solving the business issues (Al-Sakran 2015).
Envisioning as well as laying proper desired state of AAHS: This generally includes picturing the entire solution of the organization after the change is properly implemented in order to convey the visions who are generally involved in the change effort and for reflecting the transition of the new state.
Key information requirements
Implementing changes in proper manner: This generally involves proper management of transition quite effectively. It is quite helpful in proper planning, allocating resources as well as for appointing key person that charge of the entire change process (Cats and Loutos 2016). The leader of the company must be able to generate proper enthusiasm for the entire change in order to share the vision as well as goals.
The security and ethical issue that can rise within the organization AAHS are listed below:
Unauthorized access: It is identified that utilization of password as well as username is considered as one of the standard convention (Terzi, Terzi and Sagiroglu 2015). However, the hackers generally know how to circumvent this type of controls if appropriate security best practices are not utilized. Thus due to unauthorized access, confidential as well as sensitive data of the organization can get lost.
Computer viruses: It is identified that there are number of malicious programs, which generally pose threat if proper anti-virus software are not installed within the organization. It is identified that in order to avoid ethical as well as security it is quite important to utilize proper anti-viruses within the computers of the organization.
Data loss: If the data centre where all the data as well as information of the organization is stored is flooded then all the data of the organization can be damaged (De Bel-Air 2016). Therefore, in order to avoid this type of situations it is always necessary to have proper backup system within the organization.
The security as well as ethical issues can be resolved by utilizing steps that are elaborated below:
Proper backup facility: It is identified that appropriate facility of backup is very much needed in order to keep the confidential as well as sensitive information of the organization secure as well as safe (Gupta and Gore 2016). It is identified that is due to any type of issue, if the data can get lost then if proper recovery system is present than the entire data can be recovered without facing any type of challenges ad issues.
Installation of proper security software: It is identified that proper software like anti-virus software must be installed in all the computers of the organization so that the data as well as information that are stored with each of the system will remain secure (Bhabad and Bagade 2015)
Proper authentication: Proper authentication facility must be provided so that the chances of security as well as ethical issue that arise due to unauthorized access can be minimized.
Information system that helps in managing the problems of AAHS
Conclusion
It can be concluded from the entire assignment that the implementation of information system for the organization AAHS will be quite beneficial as the organization will be able to provide proper opportunity of data access to its workers as well as provides the opportunity of knowing the well-being of the pets online. In spite of the advantages, it is identified that there are number of issues and challenges that can occur due to the implementation of the information system. It is identified in order to resolve those challenges and issues, it is quite important to following some of the significant steps that are as follows:
Utilization of strong passwords: Utilization of strong password is one of the significant step that generally assists in minimizing the chances of hacking data as well as information by authorized users.
Use of proper security system: Appropriate security system like firewall as well as authentication must be present in order to avoid any type of security as well as ethical challenges.
References
Ahmadi, H., Nilashi, M., and Ibrahim, O., 2015. Organizational decision to adopt hospital information system: An empirical investigation in the case of Malaysian public hospitals. International journal of medical informatics, 84(3), 166-188.
Al-Sakran, H. O., 2015. Intelligent traffic information system based on integration of Internet of Things and Agent technology. International Journal of Advanced Computer Science and Applications (IJACSA), 6(2), 37-43.
Bajdor, P., and Grabara, I., 2014. The Role of Information System Flows in Fulfilling Customers’ Individual Orders. Journal of Studies in Social Sciences, 7(2).
Bhabad, M. A., and Bagade, S. T., 2015. Internet of things: architecture, security issues and countermeasures. International Journal of Computer Applications, 125(14).
Cats, O., and Loutos, G., 2016. Real-time bus arrival information system: an empirical evaluation. Journal of Intelligent Transportation Systems, 20(2), 138-151.
Dai, L., Chen, L., and Zhang, H., 2017. China academic library and information system: an academic library consortium in China. Information technology and libraries, 19(2), 66-70.
De Bel-Air, F., 2016. Gulf and EU Migration Policies after the Arab Uprisings: Arab and Turkish Youth as a Security Issue. Istituto Affari Internazionali.
Fountas, S., Sorensen, C. G., Tsiropoulos, Z., Cavalaris, C., Liakos, V., and Gemtos, T., 2015. Farm machinery management information system. Computers and Electronics in Agriculture, 110, 131-138.
Gupta, A. M., and Gore, Y. R., 2016. Concurrency Control and Security Issue in Distributed Database System. International Journal of Engineering Development and Research, 4, 177-181.
Kadam, K. S., and Onkar, V. C., 2015. A review paper on student information supervision system. International Journal of Research In Science & Engineering, 1, 66-72.
Li, X., Lv, Z., Zheng, Z., Zhong, C., Hijazi, I. H., and Cheng, S., 2017. Assessment of lively street network based on geographic information system and space syntax. Multimedia Tools and Applications, 76(17), 17801-17819.
Soppera, N., Bossant, M., and Dupont, E., 2014. JANIS 4: An improved version of the NEA java-based nuclear data information system. Nuclear Data Sheets, 120, 294-296.
Srivastava, K., Awasthi, A. K., Kaul, S. D., and Mittal, R. C., 2015. A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of medical systems, 39(1), 153.
Terzi, D. S., Terzi, R., and Sagiroglu, S., 2015, December. A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 202-207). IEEE.
Theorin, A., Bengtsson, K., Provost, J., Lieder, M., Johnsson, C., Lundholm, T., and Lennartson, B., 2017. An event-driven manufacturing information system architecture for Industry 4.0. International Journal of Production Research, 55(5), 1297-1311.
Turel, O., 2015. Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users. European Journal of Information Systems, 24(4), 431-446.