SlideShare a Scribd company logo
1 of 9
Download to read offline
1
1
Lecture 9
Abdisalam Issa-Salwe
Thames Valley University
Information systems and
Organisational Change
Abdisalam Issa-Salwe, Thames Valley University
2
Change Management and IT
ī‚Ą Change management is the process of
assisting individuals and organisations
passing from an old way of doing things to a
new way of doing things.
ī‚Ą Information Technology can be both a cause
of a major change in doing business and a
response to them
2
Abdisalam Issa-Salwe, Thames Valley University
3
Change Management and IT (contâ€Ļ)
ī‚Ą A new system is more than just the hardware
and the software;
ī‚Ą It is also the people and organisational
considerations
ī‚Ą Significant new systems require cultural
change
ī‚Ą People are often willing to change, but they
resist being changed
Abdisalam Issa-Salwe, Thames Valley University
4
Project and IT
ī‚Ą A project is affected by a number of
factors:
īŦ Quality of system required, in terms of
basic system requirements
īŦ Time, both to complete the project,
and in terms of the opportunity cost of
time spent on this project which could
be spend on others
īŦ Costs and resources allocated to the
project
3
Abdisalam Issa-Salwe, Thames Valley University
5
User resistance
ī‚Ą People might be resistance of change.
Three types of user resistance:
īŦ People oriented:User is caused by factors
internal to the user as individual or as a
group. For example, user may need not
to disrupt their current work practice and
social groupings
īŦ System oriented: User-resistance is
caused by factors inherent in the new
system and functionality. For example, a
poorly designed user-interface will
generate user-resistance.
Abdisalam Issa-Salwe, Thames Valley University
6
User resistance (contâ€Ļ)
ī‚Ą Interaction: User-resistance is
caused by the interaction of people
and the system. For example, the
system may be well-designed but
its implementation will cause
organisational changes that users
resist, e.g.. Reduce change of
bonuses, redundancies,
monotonous work
4
Abdisalam Issa-Salwe, Thames Valley University
7
Problem occurring when implement IS
ī‚Ą Problem that occur when
implementing a new information
system can be usually be traced to
deficiencies in the development
process. Some of these are:
īŦ Analysis:
ī‚Ą the problem the system is intended to
solve is not fully understood.
ī‚Ą User inadequately consulted
Abdisalam Issa-Salwe, Thames Valley University
8
Problem occurring when implement IS (contâ€Ļ)
īŦ Design:
ī‚Ą Insufficient user input
ī‚Ą Lack of flexibility
ī‚Ą Failure to perform organisational impact
analysis
īŦ Programming:
ī‚Ą Insufficient time and money allocated to
programming
ī‚Ą Programmer supplied with incomplete or
inaccurate specification
ī‚Ą The logic of the program misunderstood
5
Abdisalam Issa-Salwe, Thames Valley University
9
īŦ Testing:
ī‚Ą Insufficient time and money allocated to
testing
ī‚Ą Failure to develop an organised testing plan
ī‚Ą Insufficient user involvement
ī‚Ą User management do not review and sign-off
results of testing
īŦ Conversion:
ī‚Ą Insufficient time and money allocated to data
conversion
ī‚Ą Insufficient checking between old and new file
ī‚Ą Process is rushed to compensate for time
overruns elsewhere
Problem occurring when implement IS (contâ€Ļ)
Abdisalam Issa-Salwe, Thames Valley University
10
IT and change (contâ€Ļ)
ī‚Ą Most research seems to indicate
that the major cause of information
systems failure is inadequate user
involvement
ī‚Ą Users need to be involved in the
development process at all stages –
including system design
6
Abdisalam Issa-Salwe, Thames Valley University
11
IT and change (contâ€Ļ)
ī‚Ą Other common cause of dissatisfaction
with information systems
īŦ If IS mangers are technicians, not mangers,
technical ability for IS staff is no guarantee of
management skills
īŦ Poor or non-existing planning is recipe for
disaster:
ī‚Ą Unrealistic deadlines would be identified
much earlier if a proper planning process
was undertaken.
īŦ A lack of monitoring and controlling:
ī‚Ą Users change their requirements,
resulting in costly changes to the system
as it is being developed
Abdisalam Issa-Salwe, Thames Valley University
12
IT Role in Change
ī‚Ą IT can play a significant role as an
enabler in the change management
process
ī‚Ą In some circumstance IT may be
the driving force or trigger of
organisational change
ī‚Ą Even when IT is not significant
factor in the actual change, it can
play an important part in the
change management process
7
Abdisalam Issa-Salwe, Thames Valley University
13
IT Role in Change (contâ€Ļ)
ī‚Ą The type of products or services
that are made and and sold,
īŦ i.e., Internet service
ī‚Ą The way in which products are
made:
īŦ The use of automation and computer
aided design and manufacture, e.i.
Computer Integrated Manufacturing
(CIM)
ī‚Ą CIM changed the methods and cost
profiles of many manufacturing process
Abdisalam Issa-Salwe, Thames Valley University
14
IT Role in Change (contâ€Ļ)
ī‚Ą The way in which employees are
mobilised:
īŦ Computerisation encourages de-laying of
organisational hierarchies and greater
workforce empowerment and skills.
ī‚Ą Using technology frequently requires change
in working methods
ī‚Ą The way in which services are provided:
īŦ High-street banks encourage customers to use
‘hole-in-the-wall’ cash dispensers, or telephone
or Internet banking
īŦ Most large shops now user computerised Point
of Sale Terminals at cash desks.
īŦ Many companies use e-commerce selling
products and services over the Internet
8
Abdisalam Issa-Salwe, Thames Valley University
15
IT Role in Change (contâ€Ļ)
ī‚Ą IT acts as an enabling technology:
īŦ IT can produce dramatic changes in individual
businesses and whole industries. For example,
competition in the airline industry has
intensified due to information systems that
allow easy fare comparisons and booking
ī‚Ą Communication and coordination:
īŦ Coordination is essential when introducing
change
īŦ IT can facilitate this through the use of e-mail,
project management software, an internet, etc
Abdisalam Issa-Salwe, Thames Valley University
16
IT Role in Change (contâ€Ļ)
ī‚Ą Source of unity and structure:
īŦ In times of restructuring, IS can be a
visible sign of the new situation. For
example, an organisation-wide network
perhaps with an intranet provides
evidence of and encourages acceptance
of the new situation
9
Abdisalam Issa-Salwe, Thames Valley University
17
DATA WORKERS
KIND OF SYSTEM GROUPS SERVED
STRATEGIC LEVEL SENIOR
MANAGERS
MANAGEMENT LEVEL MIDDLE
MANAGERS
OPERATIONAL OPERATIONAL
LEVEL MANAGERS
KNOWLEDGE LEVEL KNOWLEDGE &
SALES & MANUFACTURING FINANCE ACCOUNTING HUMAN
RESOURCESMARKETING

More Related Content

What's hot

Business & IT: A Winning Combination
Business & IT: A Winning CombinationBusiness & IT: A Winning Combination
Business & IT: A Winning CombinationAl Strauss
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235UMaine
 
Executive Information System or Executive Support System
Executive Information System or Executive Support SystemExecutive Information System or Executive Support System
Executive Information System or Executive Support SystemSaurav (Srv) Singhania
 
Information System's Planning and Change Management
Information System's Planning and Change ManagementInformation System's Planning and Change Management
Information System's Planning and Change Managementuniversity of education,Lahore
 
Executive Supportive System
Executive Supportive SystemExecutive Supportive System
Executive Supportive Systemsadhish jain
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3Waseem Saeed
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSIJMIT JOURNAL
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015clarkems
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information SystemTheju Paul
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )Puja Dhakal
 
Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]sihamy
 
Information systems management
Information systems managementInformation systems management
Information systems managementUMaine
 

What's hot (20)

Business & IT: A Winning Combination
Business & IT: A Winning CombinationBusiness & IT: A Winning Combination
Business & IT: A Winning Combination
 
Executive support system
Executive support systemExecutive support system
Executive support system
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 
Executive Information System or Executive Support System
Executive Information System or Executive Support SystemExecutive Information System or Executive Support System
Executive Information System or Executive Support System
 
Information System's Planning and Change Management
Information System's Planning and Change ManagementInformation System's Planning and Change Management
Information System's Planning and Change Management
 
Excicutive information system
Excicutive information systemExcicutive information system
Excicutive information system
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 
Executive Supportive System
Executive Supportive SystemExecutive Supportive System
Executive Supportive System
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )
 
Mis 2 dss
Mis 2 dssMis 2 dss
Mis 2 dss
 
Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]
 
Lecture 7 - IS Planning & Change Management
Lecture 7 - IS Planning & Change ManagementLecture 7 - IS Planning & Change Management
Lecture 7 - IS Planning & Change Management
 
Information systems management
Information systems managementInformation systems management
Information systems management
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 

Similar to CIMA- Lecture10(Information systems and Organisational Change)

comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
Mc nurlin 02
Mc nurlin 02Mc nurlin 02
Mc nurlin 02mt_magnum
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systemsuniversity of education,Lahore
 
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxmccormicknadine86
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Jim Mason
 
Management And Business
Management And BusinessManagement And Business
Management And BusinessKristen Wilson
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowMichelle Singh
 
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITA Data-driven Maturity Model for Modernized, Automated, and Transformed IT
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITbalejandre
 
Two Speed IT
Two Speed ITTwo Speed IT
Two Speed ITSteve Wales
 
Ch1
Ch1Ch1
Ch1SebGEn
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldNIIT Technologies
 
ICT - Lecture Notes 2.pdf
ICT - Lecture Notes 2.pdfICT - Lecture Notes 2.pdf
ICT - Lecture Notes 2.pdfHonKencyTress
 
1.2 Schwalbe Ch2.pptx
1.2 Schwalbe Ch2.pptx1.2 Schwalbe Ch2.pptx
1.2 Schwalbe Ch2.pptxAddayKhan
 
Telecom Mergers and Acquisitions
Telecom Mergers and AcquisitionsTelecom Mergers and Acquisitions
Telecom Mergers and AcquisitionsInfosys
 

Similar to CIMA- Lecture10(Information systems and Organisational Change) (20)

comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
Mc nurlin 02
Mc nurlin 02Mc nurlin 02
Mc nurlin 02
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
 
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
Billing project
Billing projectBilling project
Billing project
 
How an Information System is Developed?
How an Information System is Developed?How an Information System is Developed?
How an Information System is Developed?
 
Management And Business
Management And BusinessManagement And Business
Management And Business
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
Architecture of a Service Systems Engineering Program
Architecture of a Service Systems Engineering ProgramArchitecture of a Service Systems Engineering Program
Architecture of a Service Systems Engineering Program
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
 
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
A Data-driven Maturity Model for Modernized, Automated, and Transformed ITA Data-driven Maturity Model for Modernized, Automated, and Transformed IT
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
 
Two Speed IT
Two Speed ITTwo Speed IT
Two Speed IT
 
Ch1
Ch1Ch1
Ch1
 
Acc 310
Acc 310Acc 310
Acc 310
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
 
ICT - Lecture Notes 2.pdf
ICT - Lecture Notes 2.pdfICT - Lecture Notes 2.pdf
ICT - Lecture Notes 2.pdf
 
1.2 Schwalbe Ch2.pptx
1.2 Schwalbe Ch2.pptx1.2 Schwalbe Ch2.pptx
1.2 Schwalbe Ch2.pptx
 
Telecom Mergers and Acquisitions
Telecom Mergers and AcquisitionsTelecom Mergers and Acquisitions
Telecom Mergers and Acquisitions
 

More from Taibah University, College of Computer Science & Engineering

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 

Recently uploaded

Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 

Recently uploaded (20)

Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 

CIMA- Lecture10(Information systems and Organisational Change)

  • 1. 1 1 Lecture 9 Abdisalam Issa-Salwe Thames Valley University Information systems and Organisational Change Abdisalam Issa-Salwe, Thames Valley University 2 Change Management and IT ī‚Ą Change management is the process of assisting individuals and organisations passing from an old way of doing things to a new way of doing things. ī‚Ą Information Technology can be both a cause of a major change in doing business and a response to them
  • 2. 2 Abdisalam Issa-Salwe, Thames Valley University 3 Change Management and IT (contâ€Ļ) ī‚Ą A new system is more than just the hardware and the software; ī‚Ą It is also the people and organisational considerations ī‚Ą Significant new systems require cultural change ī‚Ą People are often willing to change, but they resist being changed Abdisalam Issa-Salwe, Thames Valley University 4 Project and IT ī‚Ą A project is affected by a number of factors: īŦ Quality of system required, in terms of basic system requirements īŦ Time, both to complete the project, and in terms of the opportunity cost of time spent on this project which could be spend on others īŦ Costs and resources allocated to the project
  • 3. 3 Abdisalam Issa-Salwe, Thames Valley University 5 User resistance ī‚Ą People might be resistance of change. Three types of user resistance: īŦ People oriented:User is caused by factors internal to the user as individual or as a group. For example, user may need not to disrupt their current work practice and social groupings īŦ System oriented: User-resistance is caused by factors inherent in the new system and functionality. For example, a poorly designed user-interface will generate user-resistance. Abdisalam Issa-Salwe, Thames Valley University 6 User resistance (contâ€Ļ) ī‚Ą Interaction: User-resistance is caused by the interaction of people and the system. For example, the system may be well-designed but its implementation will cause organisational changes that users resist, e.g.. Reduce change of bonuses, redundancies, monotonous work
  • 4. 4 Abdisalam Issa-Salwe, Thames Valley University 7 Problem occurring when implement IS ī‚Ą Problem that occur when implementing a new information system can be usually be traced to deficiencies in the development process. Some of these are: īŦ Analysis: ī‚Ą the problem the system is intended to solve is not fully understood. ī‚Ą User inadequately consulted Abdisalam Issa-Salwe, Thames Valley University 8 Problem occurring when implement IS (contâ€Ļ) īŦ Design: ī‚Ą Insufficient user input ī‚Ą Lack of flexibility ī‚Ą Failure to perform organisational impact analysis īŦ Programming: ī‚Ą Insufficient time and money allocated to programming ī‚Ą Programmer supplied with incomplete or inaccurate specification ī‚Ą The logic of the program misunderstood
  • 5. 5 Abdisalam Issa-Salwe, Thames Valley University 9 īŦ Testing: ī‚Ą Insufficient time and money allocated to testing ī‚Ą Failure to develop an organised testing plan ī‚Ą Insufficient user involvement ī‚Ą User management do not review and sign-off results of testing īŦ Conversion: ī‚Ą Insufficient time and money allocated to data conversion ī‚Ą Insufficient checking between old and new file ī‚Ą Process is rushed to compensate for time overruns elsewhere Problem occurring when implement IS (contâ€Ļ) Abdisalam Issa-Salwe, Thames Valley University 10 IT and change (contâ€Ļ) ī‚Ą Most research seems to indicate that the major cause of information systems failure is inadequate user involvement ī‚Ą Users need to be involved in the development process at all stages – including system design
  • 6. 6 Abdisalam Issa-Salwe, Thames Valley University 11 IT and change (contâ€Ļ) ī‚Ą Other common cause of dissatisfaction with information systems īŦ If IS mangers are technicians, not mangers, technical ability for IS staff is no guarantee of management skills īŦ Poor or non-existing planning is recipe for disaster: ī‚Ą Unrealistic deadlines would be identified much earlier if a proper planning process was undertaken. īŦ A lack of monitoring and controlling: ī‚Ą Users change their requirements, resulting in costly changes to the system as it is being developed Abdisalam Issa-Salwe, Thames Valley University 12 IT Role in Change ī‚Ą IT can play a significant role as an enabler in the change management process ī‚Ą In some circumstance IT may be the driving force or trigger of organisational change ī‚Ą Even when IT is not significant factor in the actual change, it can play an important part in the change management process
  • 7. 7 Abdisalam Issa-Salwe, Thames Valley University 13 IT Role in Change (contâ€Ļ) ī‚Ą The type of products or services that are made and and sold, īŦ i.e., Internet service ī‚Ą The way in which products are made: īŦ The use of automation and computer aided design and manufacture, e.i. Computer Integrated Manufacturing (CIM) ī‚Ą CIM changed the methods and cost profiles of many manufacturing process Abdisalam Issa-Salwe, Thames Valley University 14 IT Role in Change (contâ€Ļ) ī‚Ą The way in which employees are mobilised: īŦ Computerisation encourages de-laying of organisational hierarchies and greater workforce empowerment and skills. ī‚Ą Using technology frequently requires change in working methods ī‚Ą The way in which services are provided: īŦ High-street banks encourage customers to use ‘hole-in-the-wall’ cash dispensers, or telephone or Internet banking īŦ Most large shops now user computerised Point of Sale Terminals at cash desks. īŦ Many companies use e-commerce selling products and services over the Internet
  • 8. 8 Abdisalam Issa-Salwe, Thames Valley University 15 IT Role in Change (contâ€Ļ) ī‚Ą IT acts as an enabling technology: īŦ IT can produce dramatic changes in individual businesses and whole industries. For example, competition in the airline industry has intensified due to information systems that allow easy fare comparisons and booking ī‚Ą Communication and coordination: īŦ Coordination is essential when introducing change īŦ IT can facilitate this through the use of e-mail, project management software, an internet, etc Abdisalam Issa-Salwe, Thames Valley University 16 IT Role in Change (contâ€Ļ) ī‚Ą Source of unity and structure: īŦ In times of restructuring, IS can be a visible sign of the new situation. For example, an organisation-wide network perhaps with an intranet provides evidence of and encourages acceptance of the new situation
  • 9. 9 Abdisalam Issa-Salwe, Thames Valley University 17 DATA WORKERS KIND OF SYSTEM GROUPS SERVED STRATEGIC LEVEL SENIOR MANAGERS MANAGEMENT LEVEL MIDDLE MANAGERS OPERATIONAL OPERATIONAL LEVEL MANAGERS KNOWLEDGE LEVEL KNOWLEDGE & SALES & MANUFACTURING FINANCE ACCOUNTING HUMAN RESOURCESMARKETING