Key Considerations For ICT Investment And Computing Resources

Aligning ICT Investment with Organizational Goals

Before making any investment plan for ICT, the organization is needed to consider that the proposed implementation would be aligned to the aims and objectives of the organization. Apart from that the organization has to maintain proper human resources so that the technical experts can implement and manage the new ICT system in the organization. Apart from that proper maintenance plan is needed to be present in the organization which will help the organization to modify and further improve the whole system. Before making the investment on ICT, the outcome of the newly implemented system is needed to be evaluated.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Computing resources are defined the resources needed for some of the computational models in order to get some computational solutions. Computing resources are significant it indicates the amount of time needed for solving a computing problem. On the basis of computing resources, the complexity of algorithm for solving a problem can be done in a proper way. Some of the examples of computing resources are- memory space, amount of storage space needed for solving the problem and storing the data. Through the term computing resource accessible computing equipment and the software are defined. 

Some of the factors those are needed to be considered while selecting the broadband for the organization are-

  • Download limits:  The download limit is needed to be most suitable at the best price. For the large organization, the download limit is needed to be unlimited and for the smaller companies, the management can set the limits.
  • Cost: The cost of the broadband service is needed to be considered in a proper way. In case, if the broadband service can get better with providing the higher cost, the management should invest money for this improvisation. Apart from that, in case if the speed of the broadband is not fundamental issue for the organization, the company can cut the cost in that case.
  • Speed: The speed of the broadband is needed to be considered while selecting the service provider. The service providers who are able to serve high speed internet are more preferable than the service providers giving low speed broadband service at minimal cost.
  • Customer service: The selected broadband service provider needed to have the right and proper customer care facility. So, in case, if there are some problems or issues regarding the connectivity or service, the users or the organization can contact with the customer care for solving the problem.
  • Reliability: Reliability can be considered as the biggest factors for business consumers. The unreliable broadband service can cause interruption and unproductivity for the organization. In order to avoid the network interruptions service level agreement with the network service provider and the organization is needed to be done before the selection of the broadband service provider.

Thick client

Thin client

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Definition

Software that depends on the cloud data can be regarded as thin client.

Software that runs some of the application on the devices is regarded as thick client.

Offline

Functions do not work offline.

Functions work offline.

Network latency

Functionality depends on the speed of the network connection.

Functionality may or may not depend on the network connection.

Local resources

Consumes few local resources.

Generally consumes more local resources while functioning.

Data

Data stored in servers.

Data stored in local devices.

Three options to scan the core business process:

  • Front-end scanning:  This type of scanning allows the review of all the documents and papers related to the audits and compilation of financial statements. The main concern of this scanning the place for the storage of the documents and the easy access of the documents when needed. The main aim of this type of scanning is to determine whether the document can be handed over to the client to destroy them or modify them.
  • Mid-point scanning:  This type of scanning indicates working with the original document papers in the first part of the process. This can be a process after the review of the process. The optimal scan can be different for the different process.
  • Back-end scanning: This scanning is also regarded as paperless scanning. This is the easiest way of scanning. The electronic archiving is used in this scanning process.

Future computing needs:

The future of the computing needs more advanced computing for the complex problems in smaller time window. In this context the hardware are needed to become cheap and small with higher functionality. Apart from that more open source software is needed for the more innovation.

Improvement of business operations:

Through the use of the information technology can increase the productivity of the business. Apart from that the recruitment of the technical experts in the industry can be increased. Apart from that the elimination of the human errors in the functioning of the business process in the organization can be achieved through the use of technology.

Recommendations for the implementation of the ICT in accounting information system:

The implementation of the accounting information system will deliver the following advantages. These advantages are-

  • Enhancing the security regarding the information of the client.
  • Manual tasks can be automated through the implementation of ICT, that eventually reduces human errors.
  • Extension of the workflows to the clients will be possible.
  • The client service will get innovative.
  • The relationship between the firm and the client can be transformed in a positive way.

From reviewing these advantages it can be said the implementation of ICT in the accounting firm is recommended. 

Mission-critical systems are the system those are responsible for the running of the core functions of the business. If the organization change mission-critical system, certain major disruption in the business process will occur resulting financial losses to the business.

Significance of Computing Resources

The implication of not changing the mission-critical system is the proper running of the major functionalities of the business in the organizations.

  1. Importance of ICT disaster plan:

The ICT disaster plan will help the organization to recover from the disaster and rebuild the system for the organization.

  1. Things covered in ICT disaster plan:
  • Identification of the components in disaster recovery planning.
  • Identification of the people involved in the disaster recovery.
  • Outlining the steps for the disaster recovery system.

In case, if the organization has the wide range of peripherals the expansion of the business can be done in a proper way. Apart from that the productivity of the organization can be increased.

Eight factors needed to be considered while reviewing the desktop-hardware:

a. Factors to consider

b. Relevant information to collect

1. quality

The quality of the material of the hardware.

2. price

The price is worth or not based on the performance.

3. Service after sale

The warranty period of the hardware.

4. The model type

The model type indicates the compatibility of the hardware with the system.

5. Energy consumption

The consumption of the energy for the hardware system is needed to be considered as it will help the organization to reserve energy.

6. Review about the product

This will indicate the market value of the hardware system.

7. Compatibility

The selection of the hardware needed to be compatible of the system.

8. Performance

The performance of the system will indicate the effectiveness of the implemented hardware.

a. Factors to consider

b. Relevant information to collect

1. Speed

The speed of the internet will deliver the right information at right time.

2. Cost effectiveness

The cost effectiveness will help the organization to mitigate the overhead cost.

3. Availability

The internet should be available so that the access for the information can done at any time.

4. Redundancy

Should provide redundant solution.

Cloud computing is delivering various computing services through the remote servers over internet.

Four types of cloud models are-

  1. Public cloud:  The security and managing of the data and information stored in the public cloud is managed by the user of the organization. The users can access the content in the public cloud at any time.
  2. Private Cloud: The managing of the security and the data in the private cloud may be managed by exclusively the cloud vendor or the organization itself. The access of the content is restricted and is accessible for the selected group of people in private cloud.
  3. Hybrid Cloud: The characteristics of public cloud and private cloud are present in hybrid cloud. The general information can be stored in the public cloud which can be accessible to any person. On the other hand, the important and confidential information can be stored in private cloud.
  4. Community Cloud: Community cloud helps to share the information among selected groups and communities. The responsibility of managing and sharing data are the responsibilities of the communities those are using the cloud service. 

Three main types of cloud services are-

  1. Infrastructure-as-service: This service gives business access to vital web architecture that includes storage space, servers and the connections. It allows to provide the on-demand services in the business. Example- Amazon EC2, Rackspace Cloud
  2. Software-as- service: This cloud architecture leveraged the cloud for software architecture. It also reduces the maintenance cost and support as the most of the applications run on computers through cloud providing vendors.  Example- Gmail, Salesforce
  3. Platform-as-service: This type of cloud computing service provides the environment to develop new application online. Examples-Google App Engine, Force.com

Business capabilities of PC via cloud can mitigate the overhead cost of the organization. In this context, the information and the data would be stored in  the remote server in cloud approach. The clients can fetch data and information by fetching data through servers. In this case, there is no need for the dedicated PC for every client.

Five advantages of Software-as-service:

  • Lower up-front cost: The service is generally subscription based so it has lower up-front cost.
  • Quick setup and deployment:  The software-as-service application is already configured and deployed in the cloud. It helps to mitigate delays from the traditional software deployment.
  • Easy upgrades: The upgrades of the system are easily available and patches can be downloaded online.
  • Accessibility: As the information and applications are stored in the remote serer of the cloud, it is possible for the users to access the data and information through online at any time of the day. From this context, it can be said that the availability of the software as service is high which increase the flexibility of the organization.
  • Scalability: This type of service provides many options regarding the subscriptions to the users so that they can choose from those offers. Apart from that the change of subscriptions can be done in this type of service. In this context it can be said that this cloud service is scalable. 

Security-as-service is a cloud computing model that delivers managed security services over internet. Security-as-service model is indulged in the software-as-service model and limited to specialized security service. Two examples of security-as-software service vendors are- Okta and ProofPoint

The consultancy is needed from the experts before the deployment of the cloud. The expert can suggest the model and the type of the cloud service needed for the organization based on the requirements. The analysis of the requirements and the suggesting the right cloud deployment model can be achieved through the expert advice.

Business protocol is an important aspect in the development of the negotiation process between companies. It can be defined as the proper procedure of conduct. Agreed by the external parties, each organizations have different business protocols. 

Alkhanak, E.N., Lee, S.P. and Khan, S.U.R., 2015. Cost-aware challenges for workflow scheduling approaches in cloud computing environments: Taxonomy and opportunities. Future Generation Computer Systems, 50, pp.3-21.

Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

azure, M. (2019). What is SaaS? Software as a Service | Microsoft Azure. [online] Azure.microsoft.com. Available at: https://azure.microsoft.com/en-us/overview/what-is-saas/ [Accessed 27 Feb. 2019].

Bardsiri, A.K. and Hashemi, S.M., 2014. Qos metrics for cloud computing services evaluation. International Journal of Intelligent Systems and Applications, 6(12), p.27.

Chan, M. (2019). [online] Available at: https://www.thorntech.com/2016/10/ cost-of-cloud-computing-how-to-calculate-the-true-cost-of-moving-to-the-cloud/ [Accessed 27 Feb. 2019].

Broadband Selection Factors

Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.

Chou, D.C., 2015. Cloud computing: A value creation model. Computer Standards & Interfaces, 38, pp.72-77.

Crusier, C. (2019). [online] Available at: https://www.cloudcruiser.com/wp-content/uploads/2014/06/White-paper_ Making-the-Business-Case-for-Cloud.pdf [Accessed 27 Feb. 2019].

Da Cunha Rodrigues, G., Calheiros, R.N., Guimaraes, V.T., Santos, G.L.D., De Carvalho, M.B., Granville, L.Z., Tarouco, L.M.R. and Buyya, R., 2016, April. Monitoring of cloud computing environments: concepts, solutions, trends, and future directions. In Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 378-383). ACM.

Daši?, P., Daši?, J. and Crvenkovi?, B., 2016. Service models for cloud computing: Search as a service (SaaS). International Journal of Engineering and Technology (IJET), 8(5), pp.2366-2373.

De Wet, P.B., 2018. Adoption of SaaS-based ERP by SMEs in an emerging market economy: giving up control over mission critical business software (Doctoral dissertation, Stellenbosch: Stellenbosch University).

Dimitriu, O. and Matei, M., 2015. Accounting in the Cloud. In Managing Intellectual Capital and Innovation for Sustainable and Inclusive Society: Managing Intellectual Capital and Innovation; Proceedings of the MakeLearn and TIIM Joint International Conference 2015 (pp. 1259-1265). ToKnowPress.

Dissanayake, N.R., Liyanage, G.U. and Dias, G.K.A., 2015. A CONCEPT OF BALANCED-CLIENT FOR RICH INTERNET APPLICATIONS. In International Research Symposium on Engineering Advancements 2015 (RSEA 2015).

Drew, J., 2015. Accounting firms moving slowly toward cloud. Journal of Accountancy, 219(3), p.44.

Fanning, K., 2014. Thin client: new cost savings?. Journal of Corporate Accounting & Finance, 25(3), pp.7-12.

Fehling, C., Leymann, F., Retter, R., Schupeck, W. and Arbitter, P., 2014. Cloud computing patterns: fundamentals to design, build, and manage cloud applications. Springer Science & Business Media.

Fu, Z., Sun, X., Liu, Q., Zhou, L. and Shu, J., 2015. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), pp.190-200.

Goyal, R. and Sidhu, N., 2014. Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing. International Journal of Computer Science & Information Technologies, 5.

Goyal, S., 2014. Public vs private vs hybrid vs community-cloud computing: a critical review. International Journal of Computer Network and Information Security, 6(3), p.20.

Hung, P.P., Bui, T.A., Morales, M.A., Nguyen, M. and Huh, E.N., 2014. Optimal collaboration of thin—thick clients and resource allocation in cloud computing. Personal and ubiquitous computing, 18(3), pp.563-572.

Hussein, N.H. and Khalid, A., 2016. A survey of cloud computing security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), p.52.

Jo, M., Maksymyuk, T., Strykhalyuk, B. and Cho, C.H., 2015. Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications, 22(3), pp.50-58.

Kavis, M.J., 2014. Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons.

Learning Solutions Magazine. (2019). What’s the Difference Between Mentoring and Coaching?. [online] Available at: https://www.learningsolutionsmag.com/articles/whats-the-difference-between-mentoring-and-coaching [Accessed 27 Feb. 2019].

Liu, J.K., Au, M.H., Huang, X., Lu, R. and Li, J., 2016. Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), pp.484-497.

Manzoor, A., 2014. Investigating the factors affecting residential consumer adoption of broadband in India. SAGE Open, 4(4), p.2158244014556998.

Oni, O. and Papazafeiropoulou, A., 2014. Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption. Information Systems Frontiers, 16(4), pp.729-747.

Pahl, C., 2015. Containerization and the paas cloud. IEEE Cloud Computing, 2(3), pp.24-31.

Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features, issues, and challenges: a big picture. In 2015 International Conference on Computational Intelligence and Networks (pp. 116-123). IEEE.

Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.

Rula, J.P., Bischof, Z.S. and Bustamante, F.E., 2015, August. Second Chance: Understanding diversity in broadband access network performance. In Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data (pp. 9-14). ACM.

Sabbir Rahman, M. and Nusrate Aziz, M., 2014. Service quality and behavioural intentions in broadband services selection. Marketing Intelligence & Planning, 32(4), pp.455-474.

Sadiku, M.N., Musa, S.M. and Momoh, O.D., 2014. Cloud computing: opportunities and challenges. IEEE potentials, 33(1), pp.34-36.

Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology: Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.

Tsai, J.L. and Lo, N.W., 2015. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE systems journal, 9(3), pp.805-815.

Weidmann, N.B., Benitez-Baleato, S., Hunziker, P., Glatz, E. and Dimitropoulos, X., 2016. Digital discrimination: Political bias in Internet service provision across ethnic groups. Science, 353(6304), pp.1151-1155.