Explain functional roles of information system, Computer Engineering

Assignment Help:

Q. Explain Functional Roles of Information System?

Functional Roles of Information System

1 Lower Costs -

a) Use IT to significantly reduce the cost of business processes.

b) Use IT to lesser the costs of customers or suppliers.

2 Differentiate

a) Develop new IT features to distinguish products and services.

b) Use IT characteristics to reduce the differentiation advantages of competitors.

c) Use IT characteristics to focus products and services at selected market.

3. Innovate

a) Create new products as well as services that include IT components.

b) Make radical transformation to business processes with IT.

c) Develop exclusive new markets with the help of IT.

4. Promote growth

a) Use IT to control regional and global business expansion.

b) Use IT to diversity as well as integrate into other products and services

5. Develop alliances

a) Use IT to create effective organizations of business partners.

b) Develop inter-enterprise information system correlated by the Internet and Entrants that support strategic business relationship with suppliers, customers, sub contractors and others.

6. Improve quality and efficiency

a) Use IT to dramatically get better the quality of products and services.

b) Use IT to make constant improvements to the efficiency of business processes.

c) Use IT to substantially shorten the time essential to produce, develop and deliver products and services.

7. Other strategies

a) Utilize inter-organizational information systems to create switching costs that locks in customers and suppliers.

b) Utilize investment in IT to build barriers to entry against industry outsiders.

c) Utilize IT components to make substitution of competing products unattractive.

d) Utilize IT to help share, create and manage business knowledge.


Related Discussions:- Explain functional roles of information system

Explain the acceptance and request determination, Explain the Acceptance an...

Explain the Acceptance and Request Determination As we have learned, much of the overhead in client-server interaction occurs in the CSInteface, either client or server. It is

State the hardware faults and softwate faults, State the hardware faults an...

State the hardware faults and softwate faults - protection against hardware faults could be to keep backups or use GFS; use of UPS (in case of power loss) and parallel system a

Prove equations by using the boolean algebraic theorems, Prove the equation...

Prove the equations using the Boolean algebraic theorems that is given below A‾BC + AB‾C + ABC‾+ ABC = AB + BC + AC Ans. The equation given is A‾BC + AB‾C + ABC‾+ ABC = AB + BC +

Dram simm, The most common type of non-volatile memory is the ROM device. T...

The most common type of non-volatile memory is the ROM device. This device is read only and the data is masked into the chip during manufacture. Variations of the ROM are one off p

Brief explanation of all elements in activity diagrams, ? Activities: An ac...

? Activities: An activity shows an action that performed in the system. ? Transitions: Transitions are shown by open arrow heads. Transitions are used to specify the flow among

Assembly Language program, How to get an output: Please enter a number betw...

How to get an output: Please enter a number between 0 and 6 (Enter to stop): 2 The Day of Week is Tuesday Please enter a number between 0 and 6 (Enter to stop): 9 Input Invalid Ple

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

What a header represents in CGI document, A Header in CGI document can repr...

A Header in CGI document can represent? A header into CGI document can show format of the document and the location if document used to various URL.

C token, describe briefly about the c token with suitable example program

describe briefly about the c token with suitable example program

Wireless Networking, Suppose you work in a network security company, and yo...

Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wire

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd