Spreading Our Wings
My five IS-related solutions from the list
-Transaction Processing System (TPS)
-Decision Support System (DSS)
-Cloud Computing
-Electronic Records Management (ERM)
-Transportation Management System (TMS)
Spreading Our Wings
Introduction
A proper management strategy needs to be coordinated, and purely directive to any position of responsibility so as to cater for better handling of the dynamic information daily to maintain a competitive edge in this globally competitive environment to help the business sustain a certain level of activity exchange and maintain a consistent and permanent presence within its field of observation. Spreading Our Wings as a medium-to-large aviation-related enterprise is not exempt from the need to establish a proactive information management strategy through evidence-based solutions that have emerged spontaneously, as these tools and solutions are key in developing a dynamic management strategy that can ensure constant growth and development of the company, amidst competition. The following report reviews five key information system-related solutions that can aid Spread Our Wings work to develop an innovative, information-sensitive culture, and allow its management team to initiate proper and dynamic administration and organization through constant feedback loops, that are efficiently instituted and subject to top-down adoption dynamics as a means of understanding and dealing with information ecosystems.
5 Key Information System-Related Solutions
1. Transaction Processing System (TPS)
TPS are the most basic business solutions to be deployed at an operational level and work to serve the entire organization. A TPS is a computerized system that works by recording the day-to-day routine transactions that are essential for an enterprise to be organizational (Bernstein & Newcomer, 2009). Example of TPS in real life may include sale order entries or employee payroll, employee record keeping eg. attendance, hotel reservation systems among others. Since tasks, objectives and goals, at the operational levels are already predefined and highly organized important decisions may be made in the lower levels as they have an outlined or predefined criteria that makes them legitimate without requiring the intervention of the higher-ups in the chain (Bin Amin et al., 2012). This may include decisions such as which customer gets a loan and which customer does not. The mode of determination as to whether a customer meets the specific criteria may be performed and recorded by the TPS (Bernstein & Newcomer, 2009). The TPS may also account transactions, manage inventories, and track use of money. It generally functions by collecting and storing data about the business itself, and in more advance systems it can be automated to make decision on transactions.
There are generally two types of TPS (Bin Amin et al., 2012):
a. Batch transaction processing: Here information is gathered stored, but never processed immediately. This may include chequing systems or invoice systems in banks.
b. Real time transaction processing: Here information which has been gathered is processed immediately, the operator usually has access to the virtual database, and evaluates information severity as it is processed. This may include aspect such as ATM withdrawals in a bank system.
The TPS can also be evaluated by functionality. There are a variety of programs that support the TPS and the provide five key function (Bernstein & Newcomer, 2009):
a. System runtime functions- The TPS provide an environment for the execution of a program and in the process ensure its integrity, availability and security with relation to the data within the program. Availability provides fast response time and a higher probability throughput for information being transacted.
b. System administration functions-The TPS is also compelled to provide administrative support that allows users to monitor, manage and configure their transactional systems.
c. Application development functions- Here the administrators are allowed to install custom business applications that allow critical access to data, can allow interchangeable designs in the user and backend interface, and establish network communication.
d. Input and output function-
e. Storage and Processing functions-
Spread Our Wings (SOW) could apply TPS to its advantage to accomplish the following:
1. Scheduling and balancing- Here Spread Our Wings could institute a control system to evaluate tasks, and prioritize task in order of importance so as to allow resource availability
2. Managing system resources: The TPS could be effective for SOW in allowing the administrators to maintain a pool of operating system resources by evaluating transaction, loading applications, processing requests and releasing storage.
3. Monitoring activities: This could revolve around tasks, and their progress, as well as monitoring inputs and adjusting tasks according to priorities. Their are a variety if functional categories in which TPS can function as such the activity being monitored may vary from sales/marketing to finance and accounting, to human resource and asset management.
4. Management of critical data: This may include discrete information such as personal data on addresses, names, employee number, to inventories and ongoing tasks.
5. Managing communication: This may involve processes of initiating information, ending communication sessions, managing intra network communication among other aspects
6. Managing time: Here tasks are defined by time, and evaluated by their duration. A TPS may assign task time automatically or be manually edited, log dates, define task end time. All these aspects are important in establishing employee productivity, and may come in very handy for SOW.
Some of the major limitations of TPS is that the systems can be complicated if the company operations are not synchronized well enough to efficiently implement TPS to all sectors. The system additionally requires hardware and software components to efficiently ensure management of high data volume, as such it becomes very much at risk of cybersecurity breaches (Bernstein & Newcomer, 2009). Finally, for successful integration of TPS into company operations there needs to be skilled personnel, all these requirements create greater instability and require a considerable amount of investment.
2. Decision Support System (DSS)
The DSS is an IS that helps businesses in decision making activities especially in areas that require timely decision making by determining a sequence of actions. It is perfect for mid and high level management within an organization (Ngai et al., 2011). It is also critical in problem solving and in most cases its functions can be automated. It mainly produces detailed information reports through gathering and analysis of data, but its main purpose differs greatly from normal operations applications as its main aim is in the collection of data and not analysis (Ngai et al., 2011). Within an enterprise the DSS can be key in collecting data and generating report to Help in operational planning, it can be used to offer sales projection based on timeline and inventory related data, as well as creating visually aesthetic information that can be provided to customers for easier understanding.
DSS as an analytical tool is more powerful than other systems since it applies a variety of models to reveal an adequate analysis of the data, condense large amounts of data into forms easier to be understood for decision making (Ngai et al., 2011). The system apply user friendly softwares with easy to understand UI. One example of is the Full Flight Simulator, which is commonly used to train pilots. Its Airline Estimation System (DSS) works to provide financial calculations, airtime, fuel costs, cargo rates, airport expenses, speed of transportation, distance between airports, fuel and water consumption per plane, loading patterns and locations, all of which can be effective in understanding operations and streamlining activities.
It can be beneficial to SOW for team creation and Assessment, providing task definition and requirements, Assessment of alternatives and vendor selection criterias for management. Generally researchers identify that it results in improved internal control, better management awareness of internal system strengths and weaknesses, fast response and better decision making for all, and allows for managers to record experiences and interact better with their clients (Louw, 2002). This is because it outlines all deliverables, and provides succinct understanding to the processes needed to achieve this end goals.
3. Cloud Computing
Cloud computing allows the “computing power of a single machine to be utilized across a wider network of virtual machines, by allowing the hardware to run across multiple OS or multiple sessions within the same operating system” (Yoo, 2011). Cloud computing cater for greater scalability which SOW can implement to provide mobile access to its platform from a wide range of locations. Scalability signifies the ability of a system to handle a growing amount of work and application. In regards to microservices, the architectural style allows one to structure an application as a collection of services that are highly and readily maintainable and testable. These are services that are loosely coupled, independently deployable, and can be organized within the context of the business capabilities. Attributes to any application are in its ability to be scalable. Scalability translates to performance especially when there is a large growth recorded within the service. It can be expressed by end-user latency (Parr, 2014). This becomes very important especially when there are a variety of users or great traffic dependent on the services of an application, or a web program.
Vertical scalability or scaling upward is more manageable, as it can be attained by moving the application or program to bigger virtual machines deployed in the cloud, Cloud services are defined as IaaS vs PaaS vs SaaS, where cloud can be used as infrastructure, program, or as a software service (Mishory, 2013). Clouds allow the provision to add expansion units which can always be extended by the use of more server space to accommodate the traffic as well as application of current infrastructure services. This ability to add or scale upwards is defined as scaling upwards and becomes important, especially when using the cloud as infrastructure as it allows more and more users to utilize the same virtual services. The use of cloud allows for economies of scale. inefficient servers do not allow for virtual machines, efficient servers that are flexible and easily accessible remotely, and by use of mainframes.
The Amazon Web Service is a platform that offers consumers standard automated computer service and SOW can take on a similar service. It is considered the world’s largest computing platform providing most of the business clients Software computing, infrastructure platform as a Service (Saas, IaaS, and PaaS). (Amazon, 2020). For most businesses, especially the small businesses, this service is valuable as it works to reduce the costs of doing businesses ensuring that essential platforms that would otherwise be expensive to acquire individually. Cloud computing is an on-delivery internet technology service that intervenes to prevents businesses from owning business services, that individually would be expensive to acquire, maintain and use. Here are dozens of products on offer within the service and they cumulatively contain detailed infrastructure, large storage, larger computing power, improved networking services and better analytics which boosts business decision making (Duff, 2017). Essentially, they gather the power of cooperation and critically become a way for business to enjoy premium web services at a much cheaper costs.
Some of the more important benefits of the AWS is that they are scalable, application and software becomes utilized based on demand, they offer increased reliability since they offer more secure systems, they are very easy to use and remain to be flexible within a wide range of service it also offers greater customization to meet the needs for individual businesses. Management console is very cost effective for the business as already discussed a business pays only for the computer power and storage, data and networking resources necessary for its operations and finally very secure (Sados, 2020). The management console has a diverse array of tools that are practical and standard since they require little additional training costs. This works to save a lot of on time and resources. The access and management of the AWS is very intuitive and user friendly so as to be able to fit a variety of business need as such opening its platform to countless businesses.
4. Electronic Records Management (ERM)
The ERM is the process of record (inform of electronic files and documents) management from physical copies to digital records. With greater technological adoption, information and data management has become even more important to ensure better understanding of the market, and accurate decision making. E-record Management (ERM) has manifested as a game changer in record and archives management field, as traditionally physical records have come to be virtually stored for easier access and use (Chigariro and Khumalo, 2017). However, implementing an ERM system usually is a long and complex process subjective to the organizational data that seeks to be stored but the stages are all generally the same. Research indicates that there are generally four stages involved in implementing an ERM system (Gregory, 2005):
I. The pre-award stage-holistic understanding of the process is required in this stage. This includes the purview, functions and modes of installation that will be utilized to implement the ERM, as well as the best ERM system in the market.
II. The development stage: This is usually, all the behind the scenes work that should be implemented in order to have a successful roll-out. It includes training of administrators and other essential personnel on the software that will be used for the ERM system
III. The roll-out phase- Here the system is introduced in a variety of manner to the organization. It may first be implemented by pilot groups in the organization and their progress reviewed or it may be wholly rolled-out to the entire organization
IV. Assessment phase: This is the work done, eg. monitoring or Assessment of all ERM processes to ensure greater adaptation of the system or establish problems in its implementation. It generally reviews its success.
SOW has a general record keeping culture that has been effective in ensuring security of data. ERM is beneficial as it provides easier access to the data, with potential for data security, authenticity of the user, and general integrity. With the increase in dependency on computer system within most organizations today, there has manifested a greater risk to data and virtual information. This is one major challenge for ERM as majority of the information, which is sensitive to company operations are uploaded online where there is a myriad of security risk. SOW as such will be compelled to invest into industry standard policies to protect data, train employees on their role and ensure a general understanding into data use. Cybersecurity results in a lot of reputational and financial damages for most organizations. Upto $400 billion dollars is lowest annually to cybersecurity attacks and the effects of this loss has seen a direct implication in rise of insurance premiums on cybersecurity totalling $1.35 billion (Evans, 2019). Malwares for the most part make up the largest forms of attacks, providing greater operational risks to enterprises. The predominant perception now it is not about “if” there will be an attack on an organizational system or network, but “when” the attack is probable to occur, as such organizations are forced to install mitigative measures to prevent the probability for system failure or compromise due to attacks. This includes investing in risk network and vulnerability assessment, among others in the hopes that they get to always uncover a plot prior to its manifestation. In short provide security assurance to organizational system and networks for constant operational continuity.
In ERM the information is refined data. This is more commonly associated with relevance and purpose, it is valuable since conversion of meaningless data into meaningful information requires a certain degree of knowledge that is specialized (Blyth and Kovacich, 2001). Information Assurance (IA) as such is the action takes to safeguard the said information and defend the information systems by provisioning availability, integrity, confidentiality, authentication and non-repudiation of said data (Blyth and Kovacich, 2001). It is a holistic process of provisioning restoration systems to said data and maintain its relevance to the company/ enterprise overall by detecting, protecting and offering reactionary capabilities to prevent attacks (Shou and Hernandez, 2015).
Essential ERM for example is good ERM system that is embedded with purpose-build enterprise risk management system softwares. It benefits is that it allows shared access to data, greater security to documents, regulatory Assessments to protect user privacy and rights, allows greater connectivity between integrated tools, better rendering and considerably affordable software development cost for organization.
5. Transportation Management System (TMS)
Withe the growing supply chain crunch transport management has gained significant focus related to costs and complexities relative to the global supply chain systems. A TMS is a logistics platform that applies the use of technology to help business plan, execute and increase physical movements of goods and services central to the enterprise (Hamani et al., 2015). It allows the organization to monitor incoming and outgoing products, as well as understanding and achieving regulatory compliance by allowing management to access proper documentation of their goods. It is most important for the day-to-day transportation operations, provision of compliance information and time management for all organizational operations (Hamani et al., 2015). This is effective for a company like SOW that is in the aviation sector.
Some of the key functions of a TMS such as MercuryGate TMS include (altexsoft, 2022):
a. Transportation visibility features with route analysis, connectivity portals, tracking, and tracing tools, Business intelligence and analytic tools
b. Transportation execution features with fleet management, dock scheduling and port operations
c. Transportation planning features with order management, tender management, shipment rate management, load planning and management
Some of the key advantages of implementing a TMS is that it plays a central role in supply chain working to evaluate processes from the planning stage through procurement to logistics on a daily basis, achieving a good lifecycle management. It should be afforded a broad visibility to the entire system operations in order to effect an efficient transportation, planning and execution for better customer satisfaction.
Some of the key benefits of a TMS include (Hamani et al., 2015):
a. Greater ability to provide business insight based on Assessment of the broader process.
b. Ability to track goods on transit locally and in a global perspective
c. Reduced costs of doing business especially in the global perspective
d. Provide better compliance for imports and export of goods.
e. Improve visibility, and good security especially while on transit
Conclusion
Growth of technology has resulted in a very dynamic business environment for many companies who are increasingly impacted by an agency to adapt in order to remain relevant. Adapting into these new bidirectional and participative environment that most business live and compete in today requires a proper information management strategy for day to day business operation planning, budgeting and resource allocation, monitoring, maintenance of assets, and information storage. Spread Our Wings needs to evaluate all its functions and adopt the above IS solutions for security, regulatory compliance, streamlined business service, and better data management in the aviation sector if it seeks to become a leader in the area.
References
Altexsoft. (2022). What is a Transportation Management System: Benefits, Features, and Main Providers. AltexSoft. Retrieved 15 April 2022, from https://www.altexsoft.com/blog/transportation-management-system/.
Amazon. (2020). What is Cloud Computing. Retrieved 14 April 2022, from https://aws.amazon.com/what-is-cloud-computing/
Bernstein, P., & Newcomer, E. (2009). Principles of transaction processing (2nd ed.). Morgan Kaufmann Publishers.
Bin Amin, M., Alauddin, M., & Azad, M. (2012). Business Transaction Processing System. Research Gate. Retrieved 15 April 2022, from https://www.researchgate.net/publication/321070736_Business_Transaction_Processing_System#:~:text=A%20transaction%20processing%20system%20collects,The%20transaction%20is%20the%20activity.
Blyth, A., & Kovacich, G. (2001). Information assurance. Springer-Verland London.
Chigariro, D., & Khumalo, N. (2018). Electronic records management research in ESARBICA: a bibliometric study. Records Management Journal, 28(2), 159-174. https://doi.org/10.1108/rmj-12-2016-0045
Duff. (2017). 10 Reasons To Choose AWS As Your Cloud Platform – CloudRanger. Retrieved 14 April 2022, from https://cloudranger.com/10-reasons-to-choose-aws/
Evans, J. (2019). Apple provides superior cybersecurity protection. Retrieved 13 April 2022, from https://www.computerworld.com/article/3253248/apple-provides-superior- cybersecurity-protection.html
Gregory, K. (2005). Implementing an electronic records management system. Records Management Journal, 15(2), 80-85. https://doi.org/10.1108/09565690510614229
Hamani, N., Kermad, L., Dafaoui, E., & Mhamedi, A. (2015). Development of a Framework of a TMS Benchmark Analysis Applied on an European Airline Company. IFAC-Papersonline, 48(3), 424-429. https://doi.org/10.1016/j.ifacol.2015.06.118
Hernandez, S., & Schou, C. (2015). Information Assurance Handbook: Effective Computer Security and Risk Management Strategies. McGraw-Hill.
Louw, R. (2002). Decision Support Systems (DSS). University of Missouri St. Louis. Retrieved 15 April 2022, from https://www.umsl.edu/~sauterv/analysis/488_f02_papers/dss.html.
Mishory, J. (2012). Panel Prohibits DOD To Use NSA Cloud Database Without CIO Certification. Inside The Army, 24(27), p13. Retrieved from https://www.jstor.org/stable/10.2307/24834720
Ngai, E., Hu, Y., Wong, Y., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569. https://doi.org/10.1016/j.dss.2010.08.006
Parr, D. (2014). Securing the Cloud. Journal Of Information Warfare, Peregrine Technical Solutions, 13(2), 56-69. doi: https://www.jstor.org/stable/10.2307/26487122
https://www.softwaretestinghelp.com/linux-vs-windows/.
Sados, N. (2020). The 5 Benefits of AWS (And 3 Drawbacks) for Your Business. Retrieved 14 April 2022, from https://sados.com/blog/aws-benefits-and-drawbacks/
Yoo, C. (2011). Cloud Computing: Architectural and Policy Implications. Review Of Industrial Organization, 38(4), 405-421. doi: 10.1007/s11151-011-9295-7