The following is a report on the business cases study on Bentley Beverages Premium study. The cases outline the general problems that an owner faces in their business. The problems are outlined as the recovery in their business process management. In the last five years, they have gained them huge opportunities that can only be explored if the company adapt to the digital business process management. The core elements of this business process are appropriate governance of the established accountability of the terms, roles and responsibility for the various levels. The process of operational tactics is also discussed in the following answers to the questions that are raised for the owner. As the companies are becoming demanding about being more productive from their employees, the robust usage of personal devices is being permitted. Therefore, the owner is also concerned of the BYOD issues in hand. Thus, the security in purpose of securing the data and other protection of their work are identified and mitigation steps are discussed. Different benefits of using HR payroll system are discussed for example ensuring exact amount in the salary account are generated in their account. This also helps in payout system. In many cases, it has been seen that the employees are not paid on time. This can be eliminated if the efficiency is enhanced on time. The process of calculating and generating the pay and processing is discussed thoroughly for the betterment and efficiency of the process. In the end the IT service management and service operation system is are thoroughly discussed for Bentley Beverages.
Bentley beverage services were a small enterprise at the beginning of their wholesaling business. However, the last five years have gained them huge opportunities that can only be explored if the company adapt to the digital business process management. The core elements of this business process are appropriate governance of the established accountability of the terms, roles and responsibility for the various levels. The other major element of the strategic alignment of the process is the implementation stage. The linkage of the enterprise process with the strategy is needed. Thus, it must be designed, planned, executed and managed by the managers. The priorities must be cleared with strategy. Other major parts of business process management are different tactical aspect of operational management. The people, their skills and knowledge, the culture and beliefs, methods their tools and techniques are also considered a major part of the lifecycle process. As a 21st century business also must consider the information technology incorporation in their business to optimise the process outcome.
As slowly becoming a multinational company Bentley Beverages must consider implementation of the ERP system to integrate all the information and related process for the company to help them expand. For aligning the holistic approach towards the logistics, finance and operation of the organisation. The ERP platforms for wholesale distribution Wholesale EDGE may integrates as well as optimise all the intermediate process. To automate the logistics process, accelerate the order flow, while target financial excellence this holistic platform should be considered.
Value chain is the model that takes into consideration of the core business process model that also takes into consideration the competitive aspect of the business.
Alignment of the process model with the strategies of the organisation is major component of to increases the longevity and constant validation through the formulated strategy as well as constant improvement of the quality. There are some basics of SOA (start of authority) methodology. To fulfil the strategy and framework alignment process design. It also increases the effectiveness and efficiency of thee process. In the hierarchy, the senior level executive, operational goals and plans and operational executive define the organisational strategies. In the strategy modelling language organisational goals, plans and improved operational objectives are described. SML describes the milestones, that needs to be achieved and what are the key steps to achieve that.
Governance – the best-practised governance of business process are divide in three level
For the operational process, it can be advised to use the features of the Business process management. The key features of this ERP platform can be explored in all aspect of the business.
On the other hand the increase in the number of usage of mobile devices in all aspects of life as well as the organisations have increase the threat of security issues attached with it. As the companies are becoming demanding about being more productive from their employees, the robust usage of personal devices is being permitted. It has also become essential for the companies to accommodate the device usage. This has drastically improved the productivity and given the company a competitive advantage. However, BYOD situation has also bring forth a security issue. As the owner is concerned with the real times information being circulated in the company, this may increase the organisation risk profile.
The steps and measure that can be recommended to eliminate the problem of mobility and security regarding personal device usage are listed below.
Application of todays has accelerated all business operations. Theses apps present it with two kinds of security vulnerabilities. They are malicious apps and vulnerabilities of applications. The code embedded apps comprises of the security issues and as illegitimate site, or data interface and other sources other than internet, like local file sharing, Bluetooth, NFC.
The above-mentioned barriers can be countered with the following steps.
Managing and supporting the services that can be countered with the BYOD services are one of the most important parts of usage policy. The following are the support standards and services that can enhance the security measures
According to the device management and security features, other things like multiple logins and compartmentalisation will need to be developed and oriented towards the environmental enhancements. Sandboxing can also be recommended. This feature will ensure security in carrying personal Smartphone.
App virtualisation will ensure continuous customisation and integration across platforms. The traditional desktops are not quite utilised and backdated in terms of their utility and cloud version. This end point security on BYOD services will ensure the management of the monitoring services of data across organisation. Deploying endpoint security will also need regulatory policy implemented in the BYOD devices securing process. Taking advice from the legal department from Human resource is also a viable step to mitigate any issues regarding security in future.
Figure: Payroll accounting system
Source: Stovall and John (2017).
The basic payroll accounting system is has become necessary for the Bentley Beverage Inc. Thus, the company may use it as a group of employees that resides in the company as well as for increasing in different location. To manually or physically calculate the pay keeping in mind to fulfil the legal requirements as well as maintaining obligations and key standards. If the company is multinational or have more than 15 different locations, one must consider the payroll accounting software is available. These softwares ensure a smooth process in calculating the results. The Human resource departments are in charge of payroll systems. Collecting the inputs from different sources and based on the disbursements, those criteria features must be made. The considerations, standard deductions and allowances must be decided thoroughly in terms of accounting system. UltiPro and BambooHR are most of the known human resource software solution packages that are required for this company organisation.
The system must ensure the regulatory compliance and administration in the statutory and regulatory requirements. The processing of the payments and relevant decision support capabilities must be given emphasis. The functional requirements are the divided in six part of work.
Calculating the payment at the end with Attendance and Time processing functions must be reverted to personal actions. Based on the effective dates, the adjustment must be made with priority. The retroactive calculations and hour adjustments also should be made proactively to avoid any last minute adjustments, which make it a complex process. The pay entitlements, calculations of overtime, differentials based on calculative hours, premiums, application of caps and limitations, supplemental pay actions must be appropriately implemented with the calculations.
The process deductions according the regulatory limitations must be computed for each type of deduction.
Leave, payments, benefits data must be maintained properly. This will further help in calculations. Supporting the payroll adjustments and regularly calculating the information to the core financial years and information system is necessary. Adjustable taxable payment and calculating gross pay must be given more emphasis for further allotment of payment decisions. Offsetting dollar amount and advances are equal to the receivables to the agency. The earnings based on per period basis also must be applied.
Allowing the personal payroll information in employees discretion like savings information, tax withholding information, electronic fund transfer information and allotments are to be maintained in order to make a decision of basic pay. The record of pay period must be effectively maintained. With the gross and net pay, the standard ledger must be maintained. This will also ensure the possible compensatory management in the future payout. The data of employee indebtedness and health benefits are supporting information that must be maintained.
The unemployment compensatory management to maintain data on severance pay, off-cycle and third party payment, lump sum payment all this are part of generating output through the payments. Generating payment for benefiting unpaid compensation must also be considered in terms of transactional information must be maintained in generating the output. Accommodating information for transactions in accrual pay basis also must prepare in this stage. The pay processing functions consist of internal and external pay report. This will also be processed in time and detailed analysis of the pay transactions must be established while deciding on the payments of their employees.
As implementing an It service is suggested in the answer 1, which is an ERP system for the company to align and integrate its business process. The IT management will include the technologies and investment in computer hardware and software, network and data management and support or employees to maintain them. This is a different from the management information system. The primary focus of this teams remains in improving the technologies and aligning that with the business strategies. The different area of IT management are aligning the business with the IT strategy, IT governing, IT services management and Configuration management.
Figure: IT service management
Source: Paki and Sirous (2015)
It service management includes the activities and policies, process and supporting procedures for Information Technology. In addition, network management and IT system management must be better than continual improvements. Infrastructure technology Infrastructure library is a foundation of standards directed for IT system and frameworks for ITSM.
The most popular and essential type of IT service management plan is Converged infrastructure. It is an optimised computing process and package that includes the data, servers, networking equipment, orchestration of devices and automation.
The five most important component element of ITSM that must be considered while considering the framework are
Figure: IT service lifecycle
Source: Paki and Sirous (2015)
Service operations has become most essential part of thee service process. It is the foundation of the service management and ITIL. Infrastructure library is build in order to ensure the services are effectively or efficiently delivered. The criteria to implement this are to fulfil all the stages of service operation lifecycle. For example, meeting the user request, resolving service, fixing problems occurred in the channel and failures, including all operational tasks. Thus, the owner of the Bentley beverage can seek to minimise those mentioned factor by service operation process discusses below. . Service operation delivers the service on an ongoing basis, overseeing the daily overall health of the service. This includes managing disruptions to service through rapid restoration after incidents; determining the root cause of problems and detecting trends associated with recurring issues; handling daily routine end-user requests; and managing service access.
Main objective of this process is to evaluate and monitored, categorise all the actions in the process and lead to effectiveness. However, the critical part of this process is to ensure all the regarded and appropriate actions are assessed. Bentley Beverages have different actions to be fulfilled regarding order processing and event management all through Australia.
The process objective is to maintain the lifecycle of incidents and increasing service capability. Bentley Beverage can increase all the process times with incident management like increasing the order processing system and fulfilling requests from different outlets of retailers.
Services requests from different outlets can be fulfilled is the access of the resources of Bentley. The Process Objective is to fulfil Service Requests, which in maximum cases are minor (standard) Changes (For example requests to change a password) or requests for updated information.
Granting authorization to users to use a service, whereas preventing access to non-authorized users is method to ensure the accessibility is secured. The Access Management processes essentially execute policies defined in Information Security Management. Access Management is sometimes also referred to as Rights Management or Identity Management
This step is to manage all the life cycle of arising problems and prevent unwanted situations from arousing this stage of management is needed. The collection of relevant data from different sources and using it for future advantage must be done in this stage. The IT trends and problem management is known as the significant part of the problems.
IT control in the execution of the service management is also a significant part of the process. The job scheduling and [backup services are to restore activities and output management, with routine management.
This process is used where the physical environment of the central IT system is managed. This also manages different aspect of physical environment. Building the helping equipment of access management and monitoring them comes under this process.
This stage is dedicated to managing application throughout the lifecycle. The applications that are used for backup is used in this stage is liable to resolving a simplifying the operation.
Technical Management provides proficiency and support for management in IT infrastructure. The objective of this is to make sure that IT services are delivered effectively and efficiently. In this service operation stage, time the main idea is to handle the key performance indicators of the operations. This will ensure the management is effective in solving all the problems at hand. The number of response time, resolution time, unresolved and resolved problems and their degree can be used as performance indicator. Different services includes different indicators. Thus based on the nature of the company and industry the organisation belong to, the metrics should be determined.
Conclusion
Therefore, from the above text it can be concluded that the company is undergoing a shift for their plan of expanding in the international market. In the above text the issues that the owner has highlighted is explained and recommendations based on the process has been given. The Service operations has become most essential part of thee service process. It is the foundation of the service management and ITIL. Infrastructure library is build in order to ensure the services are effectively or efficiently delivered. The criteria to implement this are to fulfil all the stages of service operation lifecycle. The implementation of the ERP and business process cycle has been outlined for the company owner. The basic payroll accounting system is has become necessary for the Bentley Beverage Inc. Thus, the company may use it as a group of employees that resides in the company as well as for increasing in different location. The process of this has been given in the following chapter. The essentials for the BYOD situation are given in the chapters and to prevent the unnecessary outcomes.
References
Abdullah, Nuru Aisyah Sim, Noor Laila Mohd Noor, and Emma Nuraihan Mior Ibrahim. “Information Technology Service Management (ITSM): contributing Factors to IT Service disruptions-a Case of Malaysia Public Service Agencies.” In PACIS, p. 185. 2014.
Bello, A.G., Murray, D. and Armarego, J., 2017. A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. Information & Computer Security, (just-accepted), pp.00-00.
Cates, Steven V. “Administration and Payroll: The Creation of a Professional Payroll Using Software.” Handbook of Human Resources Management (2015): 1-5.
Chang, James F. Business process management systems: strategy and implementation. CRC Press, 2016.
Dhingra, M., 2016. Legal issues in secure implementation of bring your own device (BYOD). Procedia Computer Science, 78, pp.179-184.
Ding, Yi. “Service Delivery Standards (ITIL, COBIT, ETOM, ISO/IEC 20000, Etc.).” Wiley Encyclopedia of Management(2015).
Eikebrokk, T.R. and Iden, J., 2017. Strategising IT service management through ITIL implementation: model and empirical test. Total Quality Management & Business Excellence, 28(3-4), pp.238-265.
Garba, A.B., Armarego, J., Murray, D. and Kenworthy, W., 2015. Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of Information privacy and security, 11(1), pp.38-54.
Garba, Abubakar Bello, Jocelyn Armarego, and David Murray. “A policy-based framework for managing information security and privacy risks in BYOD environments.” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)4, no. 2 (2015): 189-198.
Goldkuhl, Göran, and Malin Nordström. “Challenges in IT service management: institution vs. improvisation.” In the 3rd International workshop on IT Artefact Design & Workpractice Improvement, Friedrichshafen, pp. 1-15. 2014.
Guenther, Fabian. “Meta-model for monitoring payroll processes across a network.” U.S. Patent Application 14/176,680, filed February 10, 2014.
Islam, Kashif, Abdur Rehman CH, AHMAD RAZA Bilal, and M. U. H. A. M. M. A. D. Ilyas. “Accounting Information Systems: Traditions and Future Directions (By Using AIS in Traditional Organizations).” The Journal of Internet Banking and Commerce22, no. 2 (2017): 1-13.
Jäntti, Marko, and Aileen Cater-Steel. “Proactive Management of IT Operations to Improve IT Services.” JISTEM-Journal of Information Systems and Technology Management 14, no. 2 (2017): 191-218.
Jäntti, Marko, and Virpi Hotti. “Defining the relationships between IT service management and IT service governance.” Information Technology and Management 17, no. 2 (2016): 141-150.
Jeston, John, and Johan Nelis. Business process management. Routledge, 2014.
Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson Education India, 2016.
Lebek, B., Degirmenci, K. and Breitner, M.H., 2013. Investigating the influence of security, privacy, and legal concerns on employees’ intention to use BYOD mobile devices.
Leon, Alexis. Enterprise resource planning. McGraw-Hill Education, 2014.
Lowry, P.B., Dinev, T. and Willison, R., 2017. Why Security and Privacy Research Lies at the Centre of the Information Systems (is) Artefact: Proposing a Bold Research Agenda.
Lusch, Robert F., and Stephen L. Vargo. The service-dominant logic of marketing: Dialog, debate, and directions. Routledge, 2014.
Majanoja, Anne-Maarit, Erkki Tervala, Linnéa Linko, and Ville Leppänen. “The Challenge of Global Selective Outsourcing Environment: Implementing Customer-Centric IT Service Operations and ITIL Processes.” Journal of Service Science and Management 7, no. 06 (2014): 396.
Marshall, S., 2014. IT consumerization: A case study of BYOD in a healthcare setting. Technology Innovation Management Review, 4(3).
Mora, Manuel, Jorge Gomez, Rory O’Connor, Mahesh Raisinghani, and Ovsei Gelman. “An extensive review of IT service design in seven international ITSM processes frameworks: Part II.” International Journal of Information Technologies and Systems Approach 8, no. 1 (2015): 69-90.
Nabais, João, Alexandre Miguel Pinto, António Cruz, and Jorge Cardoso. “Interface design for IT service management practice.” In Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on, pp. 1-7. IEEE, 2014.
Nwankpa, Joseph K. “ERP system usage and benefit: A model of antecedents and outcomes.” Computers in Human Behavior 45 (2015): 335-344.
Officer, Chief Financial. “Payroll Practices.” Policy (2016).
Olalere, M., Abdullah, M.T., Mahmod, R. and Abdullah, A., 2015. A review of bring your own device on security issues. Sage Open, 5(2), p.2158244015580372.
Paki, Hasan, and Sirous Fakhimi Azar. “Identification and Prioritization of Obstacles of Implementation of Human Resource Accounting System by TOPSIS.” Journal of Management Sciences 1, no. 3 (2015): 23-31.
Rosemann, Michael, and Jan vom Brocke. “The six core elements of business process management.” In Handbook on business process management 1, pp. 105-122. Springer Berlin Heidelberg, 2015.
Seethamraju, Ravi. “Adoption of software as a service (SaaS) enterprise resource planning (ERP) systems in small and medium sized enterprises (SMEs).” Information systems frontiers 17, no. 3 (2015): 475-492.
Shaul, Levi, and Doron Tauber. “Critical success factors in enterprise resource planning systems: Review of the last decade.” ACM Computing Surveys (CSUR) 45, no. 4 (2013): 55.
Steinberg, Randy A. Measuring ITSM: Measuring, Reporting, and Modeling the IT Service Management Metrics that Matter Most to IT Senior Executives. Trafford Publishing, 2013.
Stovall, O. Scott, and John D. Neill. “The Ethical Implications of Human Resource Accounting.” (2017).
Thite, Mohan, and Kuldeep Sandhu. “Where is My Pay? Critical Success Factors of a Payroll System–A System Life Cycle Approach.” Australasian Journal of Information Systems 18, no. 2 (2014).
Tian, Feng, and Sean Xin Xu. “How Do Enterprise Resource Planning Systems Affect Firm Risk? Post-Implementation Impact.” Mis Quarterly 39, no. 1 (2015).
Van Der Aalst, Wil MP. “Business process management: a comprehensive survey.” ISRN Software Engineering 2013 (2013).
Van der Linden, Sean, Scott Faber, Mark Halstead, and Ebbe Altberg. “System and method to merge pay-for-performance advertising models.” U.S. Patent 9,202,219, issued December 1, 2015.
Wijesinghe, Ravinda, Helana Scheepers, and Stuart Mcloughlin. “Defining the optimal level of business benefits within IS/IT projects: Insights from benefit identification practices adopted in an IT Service Management (ITSM) project.” arXiv preprint arXiv:1606.03537 (2016).
Will, Liane, Veit Köppen, and Gunter Saake. “Flexibility in SOA Operations: The Need for a Central Service Component.” In Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW), 2014 IEEE 18th International, pp. 306-315. IEEE, 2014.
Yazici, Ali, Alok Mishra, and Paul Kontogiorgis. “IT Service Management (ITSM) Education and Research: Global View.” INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION31, no. 4 (2015): 1071-1080.
Zahadat, N., Blessner, P., Blackburn, T. and Olson, B.A., 2015. BYOD security engineering: A framework and its analysis. Computers & Security, 55, pp.81-99.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download