全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Evaluation of Information Technology Implementation for Business Goal Improvement under Process Functionality in Economic Development

DOI: 10.4236/jdaip.2024.122017, PP. 304-317

Keywords: ISMS, OKC, EA, EAF, EAP

Full-Text   Cite this paper   Add to My Lib

Abstract:

Improving organizational performance can be achieved through business process redesign (BPR). When it comes to modern work practices, organizations must often redesign their processes to keep up. This is where enterprise software comes in, offering a common data infrastructure that enables different parts of the organization to access all necessary financial data. The architecture of network accounting business process is divided into three layers. The core layer lies in the enterprise LAN that it can integrate six business processes information into one unity of financial information and non-financial information, including purchasing, inventory, production, sales, finance and customer service, and it can generate flexibly a variety of accounting statements to meet fully the information users’ demands by providing more complete and more valuable related information. The second layer lies in Intranet among enterprises based on the core layer that it can support the link of business processes and the inter-sharing of information among node enterprises of SCM and other external enterprises. The third layer lies in Internet based on the second layer that it can fit society, enterprise and individual together, the specific lays the solid foundation of business collaboration, remote management, online management and centralized management. The operating mechanisms of the network accounting business processes are as follows. When the business event occurs, the probe can get the event information in real-time and the result is stored in the database. Meanwhile, the drive controller can control the business events in real-time by gaining control criteria and standards from database. In case the standard is exceeded, the event is not allowed to occur. Enterprise’ business staff or external personnel can output automatically the required results through report tools if they had the reading authority. Supported the information system and optimizing processes, the managers can directly use the business event information, criteria and standards to control, guide, regulate and restrict management and operation in real-time, improving operation efficiency and effect. The enterprise can share the accounting information with node enterprises of SCM to bring about JIT that improve the core competitiveness of enterprise. This helps them to function more efficiently, cut costs, enhance customer service, and minimize the risk of human errors. Justifying projects has become increasingly crucial as information systems become more expensive and vital to

References

[1]  Rahm, E. and Do, H.H. (2003) Data Cleaning Problems and Current Approaches. IEEE Bulletin on Data Engineering, 7, 182-185.
[2]  Pipino, L.L., Lee, Y.W. and Wang, R.Y. (2002) Data Quality Assessment. Communications of the ACM, 45, 211-218.
https://doi.org/10.1145/505248.506010
[3]  Aguilarsaven, R. (2004) Business Process Modeling: Review and Framework. International Journal of Production Economics, 90, 129-149.
https://doi.org/10.1016/S0925-5273(03)00102-6
[4]  Lindsay, A. (2003) Business Processes-Attempts to Find a Definition. Information and Software Technology, 45, 1015-1019.
https://doi.org/10.1016/S0950-5849(03)00129-0
[5]  Al-Mashari, M. (2003) A Process Change-Oriented Model for ERP Application. International Journal of Human-Computer Interaction, 16, 39-55.
https://doi.org/10.1207/S15327590IJHC1601_4
[6]  Lee, J., Park, J. and Lee, S. (2015) Raising Team Social Capital with Knowledge and Communication in Information Systems Development Projects. International Journal of Project Management, 33, 797-807.
https://doi.org/10.1016/j.ijproman.2014.12.001
[7]  Hummel, M. and Epp, A. (2015) Success Factors of Agile Information Systems Development: A Quotative Study. 2015 48th Hawaii International Conference on System Sciences, Kauai, HI, 5-8 January 2015, 5045-5054.
https://doi.org/10.1109/HICSS.2015.598
[8]  Mohamad Stambul, M.A. and Razali, R. (2011) An Assessment Model of Information Security Implementation Levels. Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, Bandung, 17-19 July 2011, 1-6.
https://doi.org/10.1109/ICEEI.2011.6021561

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133