Computer Information System For Decision Support System

Classification of different types of ERP software

Describe about the Computer Information System for Decision Support System.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Information management system is important for any business improvement system and operational management (Ward & Peppard, 2016). ERP or enterprise resource planning are very important for integration of the business system. ERP technology and software are classified into industry specific ERP, Web based or cloud service ERP, small business ERP, and computer exchange ERP solutions (Leon, 2014). The strategies are developed for the improvement of the security function in the business organization.

In this assignment the various types of ERP models are being analyzed for understanding their impact on the business operations. The assignment consists of taxonomy of the ERP model for understanding the comparison between the outdated information system and the advanced information system. Various examples for ERP software are shown in the assignment and it would help in understanding the extent of the technological development in information system management. The suggestion provided at the last part of the report would be helpful in providing the effective ways for securing the information system for any business organization.

There are various types of enterprise resource planning software used in integration of the business system. They are classified into industry specific ERP, Web based or cloud service ERP, small business ERP, and computer exchange ERP solutions (Monk & Wagner, 2012).

Industry specific ERP: the Infor ERP is a ERP solution that offers the solution for manufacturing and distributing process of the industries (Nettstrater et al., 2015). The software solution has supported over seventy five thousand businesses across two hundred countries. The industry specific ERP are used by large scale business entities as they need customized operations for their business needs.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Web based or cloud service ERP: The advanced ERP system are broadly sued by many companies. However, there are some companies who use the web based software solution for the integration of the business activities. The cloud based server for business integration has been termed as SaaS or software as a Service. The cloud service ERP helps in accessing and storing the data over the internet based storage system. It would help in remote access of information and data. The cloud ERP provides the organization with fast and accurate access to the information system. Hence, it is ideal for all scales of businesses. However, it is best suited for small business models.

Small business ERP system: this type of ERP system is helpful for small operations like sales and order management (Nettstrater et al., 2015). The human resources management does not require large data house for small scale business organizations. Hence a lower scaled ERP system is beneficial for providing functionality to small scale business problems. It can be implemented at cheaper cost and is very ideal.

Computer exchange ERP solutions: Computer exchange ERP solutions are useful for helping the business centers in improving the efficiency of the operations (Chang et al., 2013). The outdated ERP are not liable for providing the required functionality to the business management. The upscale and updated ERP system would help in increasing the opportunities for accelerating the growth of business.

Comparison of legacy computer system and information security architecture

Some examples of different ERP software are mentioned below.

Software name

Features

SAP R/3

Used in over 120 countries, over 90000 customers, the services are good and excellent support

SAP B1

Business one, suitable for SMEs, low cost, 15 core modules, and effective localization of SAP B1

LN/BaaN

Project based discrete operations, increases productivity, efficiency improvement, and reduction in costs

Microsoft Axapta or Dynamics AX 2009

Used for mid-sized business operations, improve productivity, used by wholesale distributors, service companies, and retailers

Microsoft Navision or dynamics NAV

Assist in financing, manufacturing, SCM, CRM, and analytics

JD Edward enterprise one

Integrated applications, standard based technology, and low total cost

Oracle Suite Financials for E business

Pre integrated financial processes, dynamic budgeting, forecasting and profit analysis

Oracle people soft enterprise

Suitable for complex businesses, improving the performance of the operations, seamless internet services, large choices of infrastructure, and heterogeneous applications

Table1: Different examples of ERP software

(Source: Chang et al., 2013, pp.-1461)

Comparing legacy computer system of Apple and Microsoft

Comparison heading

Apple

Microsoft

OS

Mac short form for Macintosh

It refers to the computer operating system created and patented by Apple INC.

Different versions of Windows like windows vista, windows 8, and windows 10.

The IBM based operating systems has been termed as Personal computer or PC (Arthur, 2014).

Cost

Computers of Apple costing start from $500 or above. Mac mini costs around $550, Mac Air notebook costs around $900, and IMac costs around $1100 (Arthur, 2014)

Windows and its peripherals are cheaper in compare to the Apple computers. Desktop PCs are almost 40% cheaper than Mac.

Manufacturers

Apple

Hewlett Packard, Dell, Asus, Lenovo, and Acer

Developer

Apple

Microsoft, Ubuntu, and Sun

User

Home and Business users (core and technical department)

Business and home users

Compatibility

Can operate all types of software files

Mac based files are not supported

Market reach

App developers, graphic designers, and  music producers

Writers, students and for general users

Piracy

No need of activation

Unique activation key is provided

Registry

No

Yes

Table2: Comparing legacy computer system of Apple and Microsoft

(Source: Wonglimpiyarat, 2012, pp.-101)

Information security architecture of Apple

The apple devices are the most secured device that is being used currently. The software consists of data protection class within the layers of app sandbox, user partition, OS partition and file system (Wonglimpiyarat, 2012). The hardware is protected by using kernel that consists of secure enclave and element. The Crypto engine and root certificates of apple are also used for protecting the device from any security issue.

Information security architecture of Microsoft

The information security used in Microsoft is based on the advent of threat modeling. Threat modeling is an analysis of the risk factors and threats for information security. The four core elements of threat model are processes, data stores, data flow and external entities. The security network architecture of information in Microsoft are protected from Spoofing(S), Tampering(T), Repudiation(R), information disclosure(I), denial of service(D), and elevation of privilege(E). Its acronym is STRIDE (Wonglimpiyarat, 2012). IPSec or transport security layer is used for authentication of the device. The field gateway is protected by using TLS RSA or PSK, RFC 4279, and IPSec protocols.

Table3: Information security architecture of Apple and Microsoft

(Source: Stewart, 2015, pp.-29)

The taxonomy of ERP architecture shows five basic elements for the information management system (Ali & Cullinane, 2014). They are Management (Top Level), Strategic level, Tactical level, Operational level, and Integration and Realization.

Management (Top Level): It consists of Business class, Change management, Project management, and Training (Islam Nofal & Yusof, 2016). The management is the top most level of the ERP architecture and it is responsible for all the operations in the business organization. The communication process in the ERP system is very important as it holds all the operations of the organization together.

Strategic level: It consists of Implementation process, Hiring procedure, Benchmarking activities, and Evaluation of the outdated process.

Tactical level: It consists of Client consulting activity, Software selection process, and implementing approach for the information system.

Operational level: It consists of Business process, Configuration of the information system, finalizing the activities, and Going live that means implementing the information system (Islam Nofal & Yusof, 2016).

Integration and Realization: In this step the ERP architecture is implemented and the outcomes from the system are realized for the business organization.

The taxonomy of ERP architecture implementation for improving the legacy system can be understood from the provided figure.

Figure 1: Taxonomy of ERP architecture implementation system

(Source: Roh & Hong, 2015, pp.-636)

The strategies that can be used for improving the information security and management in the organization are policy development, education and training, enforcement of the security model, information exchange, and co-operation (Peltier, 2013).

Policy development: The organization must encourage and adopt the appropriate laws, policies, rules, and agreements for information security management (Gray, Miller & Noakes, 2013). It would help in harmonizing the technical standards among the whole world. The promotion of the expertise would be greatly influenced by the formation of policy for information system.

Education and training: it would help in promoting the necessity of the information and security of the information stored over the database (Sacks & Pikas, 2013). The organization would have to make sure they have educated an trained them about the importance of the information system and its security.

Enforcement of the security policies: it would require providing access to the implementation of the policies recognized for information security improvement (Gray, Miller & Noakes, 2013). The organization would need to expertise and exercise ways for implementing security of the information system.

Information exchange: the information storage system must be made secured and the process of transferring must be made explicitly (Sacks & Pikas, 2013). The exchange of information must be related to the guidelines of the policies and their implementation in the information system management.

Co-operation: the security of the information system can be implemented by the co-operation of the employees (Peltier, 2013). The mutual understanding for the information security is necessary for any organization.

Conclusion

Information management system had held an important place for any business improvement system and operational management. Different types of the ERP are industry specific ERP, Web based or cloud service ERP, small business ERP, and computer exchange ERP solutions. The strategies that have been developed for the improvement of the security function in the business organization would help in understanding the information system management and it security features. The Policy development, Education and training, Enforcement of the security policies, Information exchange, and Co-operation are necessary for improving the security of the information system management.  

In this assignment the various types of ERP software had been classified for developing the scope for improving the information system models in the business organization. The assignment had shown the extent of ERP model and its structure for information system management. It had helped in understanding the comparison between the outdated information system and the advanced information system.

References

Ali, M., & Cullinane, J. (2014). A study to evaluate the effectiveness of simulation based decision support system in ERP implementation in SMEs.Procedia Technology, 16, 542-552.

Arthur, C. (2014). Digital wars: Apple, Google, Microsoft and the battle for the Internet. Kogan Page Publishers.

Chang, J. Y., Wang, E. T., Jiang, J. J., & Klein, G. (2013). Controlling ERP consultants: Client and provider practices. Journal of Systems and Software,86(5), 1453-1461.

Gray, P., Miller, A., & Noakes, J. (2013). Challenging behaviour in schools: Teacher support, practical techniques and policy development. Routledge.

Islam Nofal, M. U. H. M. M. A. D., & Yusof, Z. M. (2016). TAXONOMY FRAMEWORK OF ERP SUCCESS USAGE IN SMEs IN MIDDLE EAST REGION. Journal of Theoretical & Applied Information Technology, 86(3).

Leon, A. (2014). Enterprise resource planning. McGraw-Hill Education.

Monk, E., & Wagner, B. (2012). Concepts in enterprise resource planning. Cengage Learning.

Nettstrater, A., Geißen, T., Witthaut, M., Ebel, D., & Schoneboom, J. (2015). Logistics Software Systems and Functions: An Overview of ERP, WMS, TMS and SCM Systems. In Cloud Computing for Logistics (pp. 1-11). Springer International Publishing.

Peltier, T. R. (2013). Information security fundamentals. CRC Press.

Roh, J. J., & Hong, P. (2015). Taxonomy of ERP integrations and performance outcomes: an exploratory study of manufacturing firms.Production Planning & Control, 26(8), 617-636.

Sacks, R., & Pikas, E. (2013). Building information modeling education for construction engineering and management. I: Industry requirements, state of the art, and gap analysis. Journal of Construction Engineering and Management, 139(11), 04013016.

Stewart, J. (2015). How, and Why, Apple Overtook Microsoft. The New York Times, January, 29.

Ward, J., & Peppard, J. (2016). The Strategic Management of Information Systems: Building a Digital Strategy. John Wiley & Sons.

Wonglimpiyarat, J. (2012). Technology strategies and standard competition—Comparative innovation cases of Apple and Microsoft. The Journal of High Technology Management Research, 23(2), 90-102.