In this way, the social site developers can present a customized service to the users of the social media (Al-Roomi et al. 2013). Taken for instance, Facebook have initiated services like memories a user shared a year ago, their friendship anniversary with their friends, date of joining in Facebook and happy birthday videos with recap videos (See Appendix, Figure 1). Additionally, the possible implications of poorly designed systems are poor performance of the system and erroneous outcome. This hampers the entire working approach of the system either by delaying in accomplishing the entire work or by generating poor result.
Highlighting the incident of Nike’s supply chain issues due to a failed ERP system, where a new demand-planning software solution is directly implemented without testing it. As a resul, the concerned organization has to incur 20% dip in their stock that resembled to the loss in revenue worth $100 million dollar (Gunasekaran et al. 2015).
In order to avoid the same, any application or system software that is developed has to be tested by using SDLC process so that all the module of the program can be tested. Moreover, Balaji and Murugaiyan (2012) also suggested that for reducing the wrong implementation of ERP system of supply chain management system a clearly defined process-flow chart have to be formulated specifying key chain of commands referring to individual functional area. The mistake that Nike have adopted was to implement both “pilot approach” and “plunge approach” in its ERP system; whereas, they should focus one approach with efficient planning and testing (Gunasekaran et al. 2015).
Zhou and Li (2012) depict that a process to extract, structure and organizing knowledge from one source from the other for developing software like ES is known as knowledge acquisition. In informatics knowledge acquisition can be used through three steps- identification of suitable domain that matches the requirement of the software design, identification of the source of expertise and lastly, the identification of the techniques and participants that is used to accomplish the development of the desired software (Marcus 2013).
Pearl (2014) stated that a traditional approach resembles the situation of a custom built data processes that is especially tailored for accomplishing a particular business approach. Informatics professionals have to understand that in conventional period, separate systems like an accounting department or a sales department were easy to set up. Colombo et al. (2014) highlighted the reason that is every department mirrored the business process that allows them to complete things faster with lesser work. However, the professional have to note that after a long time the system became very difficult for individual departments to manage as reliability of the data diminishes. Robillard et al. (2014) stated that there are other problem in the traditional approach that is if every department have different system, there is a chance of data redundancy in the database along with the high rate of unreliable and inconsistent data that on the other hand need more space in computer space and slow down the speed of the entire process.
Hirschheim and Klein (2012) also portray that separate information systems led to conflicts of interest within the company. Thus, it can be said that having the traditional approach allows an informatics professional to gain the idea how a system works. Since, the traditional approach is easy to learn and implement and it does not need much final resources to implement but lack of sharing the data and requirement of more funds to maintain more data processors for each department in the future are the major disadvantages.
On the other hand, the system approach in a system makes the informatics professional involved for the following activities- identifying problems and thinking regarding a system, developing an alternate solution for the project, selection of the system solution that best meet the project requirement along with the designing a selected system solution and implementing and monitoring the success of the designed system. Kerzner (2013) on the other hand highlight that system approach is the collaboration of all the interrelated parts in order to accomplish the set of objectives for the business. Thus, on focusing on the previous example, interrelating the system of sales department and accounting department can be considered as system approach. Tubbs (2012 stated that in this case use of cloud technology can be implemented where only one set of database can be present and all the department can utilized the necessary data. The advantage in this case is lesser data redundancy Peppard and Ward (2016).
It can be said that the knowledge of system approach for the informatics professional is that they can use the knowledge of the traditional approach and combine the module for formulating a single system that can perform all the functionalities through which the objectives of the organization can be fulfilled. The advantage that the application of system approach for handling the business procedure is they can concentrates on end results rather than the means and provides a clear plan for performing the business needs (Peppard and Ward 2016). Kerzner (2013) on the other hand stated that this knowledge of system approach is important for developing coordination of the specialized activities.
SWOT Analysis
Strength |
Weakness |
· Share computer resources by not wasting the precious and costly computing power, cloud services provides more efficient and affordable use of computing resources (Qantas Airlines Case Study) · Offer a personalized solution to all the customers · Provision of improves productivity and streamlines operations · The system utilizes the existing system through cloud services which resembles to the less wastage of the resources. Taken for instance, Qantas utilizes the Office 365 with Microsoft Enterprise Cloud Suite (Qantas Airlines Case Study). · This incorporation of the cloud operations fosters innovation as they implement a self services culture where finding answers are easy for customers (Qantas Airlines Case Study). · The cloud services allows all the department of the Qantas airline to work collaboratively and operate the functions easily · Employees also use Microsoft Exchange Online for maintaining contacts and calendaring along with the effective communication system (Qantas Airlines Case Study). |
· Qantas have to face complicated legacy systems in order to incorporate the cloud technology · The users of the cloud technology have to monitor the data and information of the customer database in order to meet the legal and regulatory requirements of the business. · Incorporating all the Qantas business approaches in the cloud services may take time and cause in delay if widespread adoption. · Employees can be trained for adapting the new cloud technology but the users of the Qantas services may not be |
Opportunity |
Threat |
· Qantas have the opportunities of acquisition synergies · Customers can experience the ease in operation due to atomization that on the other hand enhances the customer base. · Consolidation in legal and regulatory environment that is over the next few years Qantas can be able to perform business guidance from law makers and regulators (Qantas Airlines Case Study) |
· In house IT Personnel as most of them need to re-invent themselves in order to cope up with the cloud technology used in the business · Following the data protection system as sate laws are there according to which data transferring can only be possible if data protection laws are adequate. · Formulation of the eDiscovery can be threat due to the high cost and huge knowledge in Information Technology. This approach requires court or tribunal in order to defend allegations of breach of contract. · Monitoring the security of data can be a huge threat as synchronization of all the details of all the destinations needs time and expertise. |
Table 1: SWOT Analysis
(Source: Created by Author)
Some of the problem that can be occurred in implementing this cloud services are described below:
Automatic updation- Sunyaev and Schneider (2013) stated that when a new update is available, the system gets updated on its own that delay the current work and make people wait for accessing the relevant data. Thus, in this way, the system may get delayed and the customers of Qantas have to wait for sometimes. Moreover, there is no way to find out whether or not information is accurate.
Cost-saving benefits disappear as demand grows- It is evident that cloud services are cheaper than on-premise installations (AlZain et al. 2012). However, for larger organization like Qantas, where customer demands is huge, the cost required to maintain this cloud services many need extra financial resources.
Lack of internet problem hampers the performance- Cloud technology is a virtual reality that can only be accessed if internet technology is present. In such cases, if there is a problem in main server or a user does not have an internet connection, the innovative technology cannot be utilized properly.
Moreover the classic themes of informatics use the technique of referencing in which IT professional indexes the informational items through web index, DNA codes. In such system reliable information is considered that have to be trustworthy and in his case also monitoring the authenticity of the data cannot be attained. In conventional time also, any automation process needs internet access (Kulkarni et al. 2012). Thus, the problem for absence of internet is also common with the newly introduced Office 365 for utilizing cloud services.
Lack of proper knowledge- This cloud based services is new and many employee of Qantas and users of the company are not suitable with the technology used.
Personalization needs much time and cost- Though personalization can enhance the organization’s profitability but it will take much time in researching regarding the demands of the customers so that personalized services can be formulated for each individual. Different data and procedures are required to implement for the betterment of the organization.
Improvement in productivity is a challenge- Technology is changing on a daily basis and implementing the necessary updates in the system is very complicated process. The diverse system has the disadvantage of maintaining the system on time. Moreover, monitoring the performance of the system is also a disadvantage in this system.
Additionally, I think that an implementation such as this would be useful as implementing cloud services provide a competitive advantage compared to the other organization. It become necessary to use the cloud technology and assessment of the necessary updates can be easily accomplished through effective training system.
Reference List
Al-Roomi, M., Al-Ebrahim, S., Buqrais, S. and Ahmad, I., 2013. Cloud computing pricing models: a survey. International Journal of Grid and Distributed Computing, 6(5), pp.93-106.
AlZain, M.A., Pardede, E., Soh, B. and Thom, J.A., 2012, January. Cloud computing security: from single to multi-clouds. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5490-5499). IEEE.
Balaji, S. and Murugaiyan, M.S., 2012. Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), pp.26-30.
Colombo, A.W., Bangemann, T., Karnouskos, S., Delsing, J., Stluka, P., Harrison, R., Jammes, F. and Lastra, J.L., 2014. Industrial cloud-based cyber-physical systems. The IMC-AESOP Approach.
Gunasekaran, A., Subramanian, N. and Rahman, S., 2015. Green supply chain collaboration and incentives: Current trends and future directions.
Hirschheim, R. and Klein, H.K., 2012. A glorious and not-so-short history of the information systems field. Journal of the Association for Information Systems, 13(4), p.188.
Kerzner, H., 2013. Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.
Kulkarni, G., Gambhir, J., Patil, T. and Dongare, A., 2012, June. A security aspects in cloud computing. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on (pp. 547-550). IEEE.
Marcus, S. ed., 2013. Automating knowledge acquisition for expert systems(Vol. 57). Springer Science & Business Media.
Pearl, J., 2014. Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann.
Peppard, J. and Ward, J., 2016. The strategic management of information systems: Building a digital strategy. John Wiley & Sons.
Robillard, M.P., Maalej, W., Walker, R.J. and Zimmermann, T. eds., 2014. Recommendation systems in software engineering. Springer Science & Business.
Sunyaev, A. and Schneider, S., 2013. Cloud services certification. Communications of the ACM, 56(2), pp.33-36.
Tubbs, S.L., 2012. A systems approach to small group interaction.
Zhou, K.Z. and Li, C.B., 2012. How knowledge affects radical innovation: Knowledge base, market knowledge acquisition, and internal knowledge sharing. Strategic Management Journal, 33(9), pp.1090-1102.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download