Wednesday, August 28, 2019
Evaluation of Information System Essay Example | Topics and Well Written Essays - 3000 words
Evaluation of Information System - Essay Example the invention of evaluation and the process of evaluation from which it follows any differentiation in terms of knowledge interests and evaluation process (Cronholm and Goldkuhl, 2003). Evaluating IS has become very important for the organisation because it helps in management structure functions and assessment of the internal operations (AIMTech, 2014). To evaluating IS, some consideration has to be put on the components of IS. This comprises of information which is being fed into the system, processing of the data fed in, output from the system and finally the simple IPO model at the base. With the evaluation of IS special concerned has to be on the effectiveness as well as the efficiency of the system, the quality of information being keyed in and the impacts of the information to the individual or an organization. As evaluations occur in stages, therefore, when and what stage to evaluate must be known. Whether is at the design stage, maturity or whole life (Anderson et al., 1993) . This essay will focus on compare and contrast the contemporary approaches of evaluating IS, identify the challenge and benefits, describe the internal and external factors and trends and advances in IT, and also the recommendation of organizations. The D&M model is an IS theory which tries to give a far-reaching understanding of IS accomplishment by distinguishing, depicting, and clarifying the connections among six of the most critical dimensions of success along which IS are commonly evaluated (Petter, 2008). Initial improvement of the theory was attempted by DeLone and McLean in 1992 and was further refined by the first creators after 10 years because of the input got from different researchers working in the region (DeLone and McLean, 2003). The D&M model has been referred to in a huge number of investigative papers, and is thought to be a standout among the most powerful hypotheses in contemporary IS research (Petter, 2008).